Search results for: Access point
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2587

Search results for: Access point

1087 The Role of MAOA Gene in the Etiology of Autism Spectrum Disorder in Males

Authors: Jana Kisková, Dana Gabriková

Abstract:

Monoamine oxidase A gene (MAOA) is suggested to be a candidate gene implicated in many neuropsychiatric disorders, including autism spectrum disorder (ASD). This meta-analytic review evaluates the relationship between ASD and MAOA markers such as 30 bp variable number tandem repeats in the promoter region (uVNTR) and single nucleotide polymorphisms (SNPs) by using findings from recently published studies. It seems that in Caucasian males, the risk of developing ASD increase with the presence of 4- repeat allele in the promoter region of MAOA gene whereas no differences were found between autistic patients and controls in Egyptian, West Bengal and Korean population. Some studies point to the importance of specific haplotype groups of SNPs and interaction of MAOA with others genes (e. g. FOXP2 or SRY). The results of existing studies are insufficient and further research is needed.

Keywords: Autism spectrum disorder, MAOA, uVNTR, single nucleotide polymorphism.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3440
1086 An Analysis of the Strategies Employed to Curate, Conserve and Digitize the Timbuktu Manuscripts

Authors: F. Saptouw

Abstract:

This paper briefly reviews the range of curatorial interventions made to preserve and display the Timbuktu Manuscripts. The government of South Africa and Mali collaborated to preserve the manuscripts, and brief notes will be presented about the value of archives in those specific spaces. The research initiatives of the Tombouctou Manuscripts Project, based at the University of Cape Town, feature prominently in the text. A brief overview of the history of the archive will be presented and its preservation as a key turning point in curating the intellectual history of the continent. ­­­The strategies of preservation, curation, publication and digitization are presented as complimentary interventions. Each materialization of the manuscripts contributes something significant; the complexity of the contribution is dependent primarily on the format of presentation. This integrated reading of the manuscripts is presented as a means to gain a more nuanced understanding of the past, which greatly surpasses how much information would be gleaned from relying on a single media format.

Keywords: Archive, curatorship, cultural heritage, museum practice, Timbuktu manuscripts.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 648
1085 Methods of Estimating the Equilibrium Real Effective Exchange Rate (REER)

Authors: Pavla Ruzickova, Petr Teply

Abstract:

There are many debates now regarding undervalued and overvalued currencies currently traded on the world financial market. This paper contributes to these debates from a theoretical point of view. We present the three most commonly used methods of estimating the equilibrium real effective exchange rate (REER): macroeconomic balance approach, external sustainability approach and equilibrium real effective exchange rate approach in the reduced form. Moreover, we discuss key concepts of the calculation of the real exchange rate (RER) based on applied explanatory variables: nominal exchange rates, terms of trade and tradable and non-tradable goods. Last but not least, we discuss the three main driving forces behind real exchange rates movements which include terms of trade, relative productivity growth and the interest rate differential.

Keywords: real exchange rate, real effective exchange rate, foreign exchange, terms of trade

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2490
1084 Transmission Planning – a Probabilistic Load Flow Perspective

Authors: Constantin Barbulescu, Gh. Vuc, Stefan Kilyeni, Dan Jigoria-Oprea, Oana Pop

Abstract:

Perhaps no single issue has been cited as either the root cause and / or the greatest challenge to the restructured power system then the lack of adequate reliable transmission. Probabilistic transmission planning has become increasingly necessary and important in recent years. The transmission planning analysis carried out by the authors, spans a 10-year horizon, taking into consideration a value of 2 % load increase / year at each consumer. Taking into consideration this increased load, a probabilistic power flow was carried out, all the system components being regarded from probabilistic point of view. Several contingencies have been generated, for assessing the security of the power system. The results have been analyzed and several important conclusions were pointed. The objective is to achieve a network that works without limit violations for all (or most of) scenario realizations. The case study is represented by the IEEE 14 buses test power system.

Keywords: Contingency, load, operating state, probabilistic power flow, transmission planning

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1862
1083 Vessel Inscribed Trigonometry to Measure the Vessel Progressive Orientations in the Digital Fundus Image

Authors: Pil Un Kim, Yunjung Lee, Gihyoun Lee, Jin Ho Cho, Myoung Nam Kim

Abstract:

In this paper, the vessel inscribed trigonometry (VITM) for the vessel progression orientation (VPO) is proposed in the two-dimensional fundus image. The VPO is a major factor in the optic disc (OD) detection which is a basic process in the retina analysis. To measure the VPO, skeletons of vessel are used. First, the vessels are classified into three classes as vessel end, vessel branch and vessel stem. And the chain code maps of VS are generated. Next, two farthest neighborhoods of each point on VS are searched by the proposed angle restriction. Lastly, a gradient of the straight line between two farthest neighborhoods is estimated to measure the VPO. VITM is validated by comparing with manual results and 2D Gaussian templates. It is confirmed that VPO of the proposed mensuration is correct enough to detect OD from the results of experiment which applied VITM to detect OD in fundus images.

Keywords: Angle measurement, Optic disc, Retina vessel, Vessel progression orientation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1417
1082 Chaos Theory and Application in Foreign Exchange Rates vs. IRR (Iranian Rial)

Authors: M. A. Torkamani, S. Mahmoodzadeh, S. Pourroostaei, C. Lucas

Abstract:

Daily production of information and importance of the sequence of produced data in forecasting future performance of market causes analysis of data behavior to become a problem of analyzing time series. But time series that are very complicated, usually are random and as a result their changes considered being unpredictable. While these series might be products of a deterministic dynamical and nonlinear process (chaotic) and as a result be predictable. Point of Chaotic theory view, complicated systems have only chaotically face and as a result they seem to be unregulated and random, but it is possible that they abide by a specified math formula. In this article, with regard to test of strange attractor and biggest Lyapunov exponent probability of chaos on several foreign exchange rates vs. IRR (Iranian Rial) has been investigated. Results show that data in this market have complex chaotic behavior with big degree of freedom.

Keywords: Chaos, Exchange Rate, Nonlinear Models.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2477
1081 Optimization of Asphalt Binder Modified with PP/SBS/Nanoclay Nanocomposite using Taguchi Method

Authors: Abolghasem Yazdani, Sara Pourjafar

Abstract:

This study has applied the L16 orthogonal array of the Taguchi method to determine the optimized polymeric Nanocomposite asphalt binder. Three control factors are defined as polypropylene plastomer (PP), styrene-butadiene-styrene elastomer (SBS) and Nanoclay. Four level of concentration contents are introduced for prepared asphalt binder samples. all samples were prepared with 4.5% of bitumen 60/70 content. Compressive strength tests were carried out for defining the optimized sample via QUALITEK-4 software. SBS with 3%, PP with 5 % and Nanoclay with 1.5% of concentrations are defined as the optimized Nanocomposite asphalt binders. The confirmation compressive strength and also softening point tests showed that modification of asphalt binders with this method, improved the compressive strength and softening points of asphalt binders up to 55%.

Keywords: modified asphalt, Polypropylene, SBS, Nanoclay, Taguchi method

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3175
1080 Virtual Training, Human-Computer and Software Interactions, and Social-Based Embodiness

Authors: Philippe Fauquet-Alekhine

Abstract:

For professions of high risk industries, simulation training has always been thought in terms of high degree of fidelity regarding the real operational situation. Due to the recent progress, this way of training is changing, modifying the human-computer and software interactions: the interactions between trainees during simulation training session tend to become virtual, transforming the social-based embodiness (the way subjects integrate social skills for interpersonal relationship with co-workers). On the basis of the analysis of eight different profession trainings, a categorization of interactions has help to produce an analytical tool, the social interactions table. This tool may be very valuable to point out the changes of social interactions when the training sessions are skipping from a high fidelity simulator to a virtual simulator. In this case, it helps the designers of professional training to analyze and to assess the consequences of the potential lack the social-based embodiness.

Keywords: Interface, interaction, simulator, virtual training.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1828
1079 An Evaluation of a Psychotherapeutic Service for Engineering Students: The Role of Race, Gender and Language

Authors: Nazeema Ahmed

Abstract:

Mental health in higher education has received increasing attention over the past few decades. The high academic demands of the engineering degree, coupled with students’ mental health challenges, have led to higher education institutions offering psychotherapeutic services to students. This paper discusses an evaluation of the psychotherapy service at the University of Cape Town. The aim was to determine (i) the efficacy of the service; and (ii) the impact of race, gender, and language of the therapist on the students’ therapeutic process. An online survey was sent to 109 students who attended psychotherapy. The majority expressed favorable experiences of psychotherapy, with reports of increased capacity to engage with their academic work. Most students did not experience the gender, race, or language of the psychologists to be barriers to their therapy. The findings point to a need for ongoing psychological support for students.

Keywords: Psychotherapy, efficacy, engineering, education.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 947
1078 Modelling for Temperature Non-Isothermal Continuous Stirred Tank Reactor Using Fuzzy Logic

Authors: Nasser Mohamed Ramli, Mohamad Syafiq Mohamad

Abstract:

Many types of controllers were applied on the continuous stirred tank reactor (CSTR) unit to control the temperature. In this research paper, Proportional-Integral-Derivative (PID) controller are compared with Fuzzy Logic controller for temperature control of CSTR. The control system for temperature non-isothermal of a CSTR will produce a stable response curve to its set point temperature. A mathematical model of a CSTR using the most general operating condition was developed through a set of differential equations into S-function using MATLAB. The reactor model and S-function are developed using m.file. After developing the S-function of CSTR model, User-Defined functions are used to link to SIMULINK file. Results that are obtained from simulation and temperature control were better when using Fuzzy logic control compared to PID control.

Keywords: CSTR, temperature, PID, fuzzy logic.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2484
1077 Effects of used Engine Oil in Reinforced Concrete Beams: The Structural Behaviour

Authors: S.C. Chin, N. Shafiq, M.F. Nuruddin

Abstract:

In the modern construction practices, industrial wastes or by-products are largely used as raw materials in cement and concrete. These impart many benefits to the environment and bringabout an economic impact because the cost of waste disposal is constantly increasing due to strict environmental regulations. It was reported in literature that the leakage of oil onto concrete element in older cement grinding unit resulted in concrete with greater resistance to freezing and thawing. This effect was thought to be similar to adding an air-entraining chemical admixture to concrete. This paper presents an investigation on the load deflection behaviour and crack patterns of reinforced concrete (RC) beams subjected to four point loading. Ten 120x260x1900 mm beams were cast with 100% ordinary Portland cement (OPC) concrete, 20% fly ash (FA) and 20% rice husk ash (RHA) blended cement concrete. 0.15% dosage of admixtures (used engine oil, new engine oil, and superplasticizer) was used throughout the experiment. Results show that OPC and OPC/RHA RC beams containing used engine oil and superplasticizer exhibit higher capacity, 18-26% than their corresponding control mix.

Keywords: by-products, RC beams, superplasticizer, used engine oil

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3088
1076 Exploring the Potential of Chatbots in Higher Education: A Preliminary Study

Authors: S. Studente, S. Ellis, S. F. Garivaldis

Abstract:

We report upon a study introducing a chatbot to develop learning communities at a London University, with a largely international student base. The focus of the chatbot was twofold; to ease the transition for students into their first year of university study, and to increase study engagement. Four learning communities were created using the chatbot; level 3 foundation, level 4 undergraduate, level 6 undergraduate and level 7 post-graduate. Students and programme leaders were provided with access to the chat bot via mobile app prior to their study induction and throughout the autumn term of 2019. At the end of the term, data were collected via questionnaires and focus groups with students and teaching staff to allow for identification of benefits and challenges. Findings indicated a positive correlation between study engagement and engagement with peers. Students reported that the chatbot enabled them to obtain support and connect to their programme leader. Both staff and students also made recommendation on how engagement could be further enhanced using the bot in terms of; clearly specified purpose, integration with existing university systems, leading by example and connectivity. Extending upon these recommendations, a second pilot study is planned for September 2020, for which the focus will be upon improving attendance rates, student satisfaction and module pass rates.

Keywords: Chatbot, e-learning, learning communities, student engagement.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1716
1075 Secure Socket Layer in the Network and Web Security

Authors: Roza Dastres, Mohsen Soori

Abstract:

In order to electronically exchange information between network users in the web of data, different software such as outlook is presented. So, the traffic of users on a site or even the floors of a building can be decreased as a result of applying a secure and reliable data sharing software. It is essential to provide a fast, secure and reliable network system in the data sharing webs to create an advanced communication systems in the users of network. In the present research work, different encoding methods and algorithms in data sharing systems is studied in order to increase security of data sharing systems by preventing the access of hackers to the transferred data. To increase security in the networks, the possibility of textual conversation between customers of a local network is studied. Application of the encryption and decryption algorithms is studied in order to increase security in networks by preventing hackers from infiltrating. As a result, a reliable and secure communication system between members of a network can be provided by preventing additional traffic in the website environment in order to increase speed, accuracy and security in the network and web systems of data sharing.

Keywords: Secure Socket Layer, Security of networks.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 510
1074 Fatigue Properties of Steel Sheets Treated by Nitrooxidation

Authors: M. Maronek, J. Barta, P. Palcek, K. Ulrich

Abstract:

Low carbon deep drawing steel DC 01 according to EN 10130-91 was nitrooxidized in dissociated ammonia at 580°C/45 min and consequently oxidised at 380°C/5 min in vapour of distilled water. Material after nitrooxidation had 54 % increase of yield point, 34 % increase of strength and 10-times increased resistance to atmospheric corrosion in comparison to the material before nitrooxidation. The microstructure of treated material consisted of thin ε-phase layer connected to layer containing precipitated massive needle shaped Fe4N - γ' nitrides. This layer passed to a diffusion layer consisting of fine irregular shaped Fe16N2 - α'' nitrides regularly dispersed in ferritic matrix. Fatigue properties were examined under bending load with frequency of 20 kHz and sinusoidal symmetric cycle. The results confirmed positive influence of nitrooxidation on fatigue properties as fatigue limit of treated material was double in comparison to untreated material.

Keywords: steel sheet, fatigue, nitrooxidation, S-N diagram

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1722
1073 Enhancing IoT Security: A Blockchain-Based Approach for Preventing Spoofing Attacks

Authors: Salha Alshamrani, Maha Aljohni, Eman Aldhaheri

Abstract:

With the proliferation of Internet of Things (IoT) devices in various industries, there has been a concurrent rise in security vulnerabilities, particularly spoofing attacks. This study explores the potential of blockchain technology in enhancing the security of IoT systems and mitigating these attacks. Blockchain's decentralized and immutable ledger offers significant promise for improving data integrity, transaction transparency, and tamper-proofing. This research develops and implements a blockchain-based IoT architecture and a reference network to simulate real-world scenarios and evaluate a blockchain-integrated intrusion detection system. Performance measures including time delay, security, and resource utilization are used to assess the system's effectiveness, comparing it to conventional IoT networks without blockchain. The results provide valuable insights into the practicality and efficacy of employing blockchain as a security mechanism, shedding light on the trade-offs between speed and security in blockchain deployment for IoT. The study concludes that despite minor increases in time consumption, the security benefits of incorporating blockchain technology into IoT systems outweigh potential drawbacks, demonstrating a significant potential for blockchain in bolstering IoT security.

Keywords: Internet of Thing, Spoofing, IoT, Access control, Blockchain, Raspberry pi.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 118
1072 A Study on the Effect of Variation of the Cross-sectional Area of Spiral Volute Casing for Centrifugal Pump

Authors: Hyun Bae Jin, Myung Jin Kim, Wui Jun Chung

Abstract:

The impeller and the casing are the key components of a centrifugal pump. Although there have been many studies on the impeller and the volute casing of centrifugal pump, further study of the volute casing to improve the performance of centrifugal pumps is needed. In this paper, the effect of cross-sectional area on the performance of volute casing was investigated using a commercial CFD code. The performance characteristics, not only at the off-design point but also for a full type model are required these days. So we conducted numerical analysis for all operating points by using complete geometry through transient analysis. Transient analysis on the complete geometry of a real product has the advantage of simulating realistic flow. The results of this study show the variation of a performance curve by modifying the above-mentioned design parameter.

Keywords: Centrifugal Pump, Volute Casing, Cross-Section area, CFD

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3740
1071 Theoretical Background of Dividend Taxation

Authors: Margareta Ilkova, Petr Teply

Abstract:

The article deals with dividends and their distribution from investors from a theoretical point of view. Some studies try to analyzed the reaction of the market on the dividend announcement and found out the change of dividend policy is associated with abnormal returns around the dividend announcement date. Another researches directly questioned the investors about their dividend preference and beliefs. Investors want the dividend from many reasons (e.g. some of them explain the dividend preference by the existence of transaction cost; investors prefer the dividend today, because there is less risky; the managers have private information about the firm). The most controversial theory of dividend policy was developed by Modigliani and Miller (1961) who demonstrated that in the perfect and complete capital markets the dividend policy is irrelevant and the value of the company is independent of its payout policy. Nevertheless, in the real world the capital markets are imperfect, because of asymmetric information, transaction costs, incomplete contracting possibilities and taxes.

Keywords: dividend distribution, taxation, payout policy, investor, Modigliani and Miller theorem

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2120
1070 Impact of Fly Ash-Based Geopolymer Modification on the High-Temperature Properties of Bitumen

Authors: Burak Yigit Katanalp, Murat Tastan, Perviz Ahmedzade, Çigdem Canbay Turkyilmaz, Emrah Turkyilmaz

Abstract:

This study evaluated the mechanical and rheological performance of fly ash-based geopolymer at high temperatures. A series of laboratory tests were conducted on neat bitumen and three modified bitumen samples, which incorporated fly ash-based geopolymer at various percentages. Low-calcium fly ash was used as the alumina-silica source. The dynamic shear rheometer and rotational viscometer were employed to determine high-temperature properties, while conventional tests such as penetration and softening point were used to evaluate the physical properties of bitumen. Short-term aging resistance of the samples was assessed using the rolling thin film oven. The results show that geopolymer has a compromising effect on bitumen properties, with improved stiffness, enhanced mechanical strength, and increased thermal susceptibility of the asphalt binder.

Keywords: Bitumen, geopolymer, rutting, dynamic mechanical analysis.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 174
1069 On-line Testing of Software Components for Diagnosis of Embedded Systems

Authors: Thi-Quynh Bui, Oum-El-Kheir Aktouf

Abstract:

This paper studies the dependability of componentbased applications, especially embedded ones, from the diagnosis point of view. The principle of the diagnosis technique is to implement inter-component tests in order to detect and locate the faulty components without redundancy. The proposed approach for diagnosing faulty components consists of two main aspects. The first one concerns the execution of the inter-component tests which requires integrating test functionality within a component. This is the subject of this paper. The second one is the diagnosis process itself which consists of the analysis of inter-component test results to determine the fault-state of the whole system. Advantage of this diagnosis method when compared to classical redundancy faulttolerant techniques are application autonomy, cost-effectiveness and better usage of system resources. Such advantage is very important for many systems and especially for embedded ones.

Keywords: Dependability, diagnosis, middlewares, embeddedsystems, fault tolerance, inter-component testing.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1747
1068 Design of Optimal Proportional Integral Derivative Attitude Controller for an Uncoupled Flexible Satellite Using Particle Swarm Optimization

Authors: Martha C. Orazulume, Jibril D. Jiya

Abstract:

Flexible satellites are equipped with various appendages which vibrate under the influence of any excitation and make the attitude of the satellite to be unstable. Therefore, the system must be able to adjust to balance the effect of these appendages in order to point accurately and satisfactorily which is one of the most important problems in satellite design. Proportional Integral Derivative (PID) Controller is simple to design and computationally efficient to implement which is used to stabilize the effect of these flexible appendages. However, manual turning of the PID is time consuming, waste energy and money. Particle Swarm Optimization (PSO) is used to tune the parameters of PID Controller. Simulation results obtained show that PSO tuned PID Controller is able to re-orient the spacecraft attitude as well as dampen the effect of mechanical resonance and yields better performance when compared with manually tuned PID Controller.

Keywords: Attitude control, flexible satellite, particle swarm optimization, PID controller.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1275
1067 How Efficiency of Password Attack Based on a Keyboard

Authors: Hsien-cheng Chou, Fei-pei Lai, Hung-chang Lee

Abstract:

At present, dictionary attack has been the basic tool for recovering key passwords. In order to avoid dictionary attack, users purposely choose another character strings as passwords. According to statistics, about 14% of users choose keys on a keyboard (Kkey, for short) as passwords. This paper develops a framework system to attack the password chosen from Kkeys and analyzes its efficiency. Within this system, we build up keyboard rules using the adjacent and parallel relationship among Kkeys and then use these Kkey rules to generate password databases by depth-first search method. According to the experiment results, we find the key space of databases derived from these Kkey rules that could be far smaller than the password databases generated within brute-force attack, thus effectively narrowing down the scope of attack research. Taking one general Kkey rule, the combinations in all printable characters (94 types) with Kkey adjacent and parallel relationship, as an example, the derived key space is about 240 smaller than those in brute-force attack. In addition, we demonstrate the method's practicality and value by successfully cracking the access password to UNIX and PC using the password databases created

Keywords: Brute-force attack, dictionary attack, depth-firstsearch, password attack.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3475
1066 Global Exponential Stability of Impulsive BAM Fuzzy Cellular Neural Networks with Time Delays in the Leakage Terms

Authors: Liping Zhang, Kelin Li

Abstract:

In this paper, a class of impulsive BAM fuzzy cellular neural networks with time delays in the leakage terms is formulated and investigated. By establishing a delay differential inequality and M-matrix theory, some sufficient conditions ensuring the existence, uniqueness and global exponential stability of equilibrium point for impulsive BAM fuzzy cellular neural networks with time delays in the leakage terms are obtained. In particular, a precise estimate of the exponential convergence rate is also provided, which depends on system parameters and impulsive perturbation intention. It is believed that these results are significant and useful for the design and applications of BAM fuzzy cellular neural networks. An example is given to show the effectiveness of the results obtained here.

Keywords: Global exponential stability, bidirectional associative memory, fuzzy cellular neural networks, leakage delays, impulses.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1330
1065 Maximum Wind Power Extraction Strategy and Decoupled Control of DFIG Operating in Variable Speed Wind Generation Systems

Authors: Abdellatif Kasbi, Abderrafii Rahali

Abstract:

This paper appraises the performances of two control scenarios, for doubly fed induction generator (DFIG) operating in wind generation system (WGS), which are the direct decoupled control (DDC) and indirect decoupled control (IDC). Both control scenarios studied combines vector control and Maximum Power Point Tracking (MPPT) control theory so as to maximize the captured power through wind turbine. Modeling of DFIG based WGS and details of both control scenarios have been presented, a proportional integral controller is employed in the active and reactive power control loops for both control methods. The performance of the both control scenarios in terms of power reference tracking and robustness against machine parameters inconstancy has been shown, analyzed and compared, which can afford a reference to the operators and engineers of a wind farm. All simulations have been implemented via MATLAB/Simulink.

Keywords: DFIG, WGS, DDC, IDC, vector control, MPPT.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 708
1064 User Behavior Based Enhanced Protocol (UBEP) for Secure Near Field Communication

Authors: Vinay Gautam, Vivek Gautam

Abstract:

With increase in the unauthorized users access, it is required to increase the security in the Near Field Communication (NFC). In the paper we propose a user behavior based enhanced protocol entitled ‘User Behavior based Enhanced Protocol (UBEP)’ to increase the security in NFC enabled devices. The UBEP works on the history of interaction of a user with system.The propose protocol considers four different factors (touch, time and distance & angle) of user behavior to know the authenticity or authorization of the users. These factors can be same for a user during interaction with the system. The UBEP uses two phase user verification system to authenticate a user. Firstly the acquisition phase is used to acquire and store the user interaction with NFC device and the same information is used in future to detect the authenticity of the user. The second phase (recognition) uses analysis of current and previous scenario of user interaction and digital signature verification system to finally authenticate user. The analysis of user based input makes a NFC transaction more advance and secure. This security is very tactical because it is completely depends on usage of the device.

Keywords: Security, Network Field communication, NFC Protocol.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2008
1063 2-Dimensional Finger Gesture Based Mobile Robot Control Using Touch Screen

Authors: O. Ejale, N.B. Siddique, R. Seals

Abstract:

The purpose of this study was to present a reliable mean for human-computer interfacing based on finger gestures made in two dimensions, which could be interpreted and adequately used in controlling a remote robot's movement. The gestures were captured and interpreted using an algorithm based on trigonometric functions, in calculating the angular displacement from one point of touch to another as the user-s finger moved within a time interval; thereby allowing for pattern spotting of the captured gesture. In this paper the design and implementation of such a gesture based user interface was presented, utilizing the aforementioned algorithm. These techniques were then used to control a remote mobile robot's movement. A resistive touch screen was selected as the gesture sensor, then utilizing a programmed microcontroller to interpret them respectively.

Keywords: 2-Dimensional interface, finger gesture, mobile robot control, touch screen.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1928
1062 Lessons from Applying XP Methodology to Business Requirements Engineering in Developing Countries Context

Authors: Olugbara O.O., Adebiyi A.A.

Abstract:

Most standard software development methodologies are often not applied to software projects in many developing countries of the world. The approach generally practice is close to what eXtreme Programming (XP) is likely promoting, just keep coding and testing as the requirement evolves. XP is an agile software process development methodology that has inherent capability for improving efficiency of Business Software Development (BSD). XP can facilitate Business-to-Development (B2D) relationship due to its customer-oriented advocate. From practitioner point of view, we applied XP to BSD and result shows that customer involvement has positive impact on productivity, but can as well frustrate the success of the project. In an effort to promote software engineering practice in developing countries of Africa, we present the experiment performed, lessons learned, problems encountered and solution adopted in applying XP methodology to BSD.

Keywords: Requirements engineering, Requirements elicitation, Extreme programming, Mobile Work force

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1461
1061 Transesterification of Jojoba Oil-Wax Using Microwave Technique

Authors: Labiba I. Hussein, Maher Z. Elsabee, Eid A. Ismail, Hala F. Naguib, Hilda A. Aziz, Moataz A. Elsawy

Abstract:

Jojoba oil-wax is extracted from the seeds of the jojoba (Simmondsia chinensis Link Schneider), a perennial shrub that grows in semi desert areas in Egypt and in some parts of the world. The main uses of jojoba oil-wax are in the cosmetics and pharmaceutical industry, but new uses could arise related to the search of new energetic crops. This paper summarizes a process to convert the jojoba oil-wax to biodiesel by transesterification with ethanol and a series of aliphatic alcohols using a more economic and energy saving method in a domestic microwave. The effect of time and power of the microwave on the extent of the transesterification using ethanol and other aliphatic alcohols has been studied. The separation of the alkyl esters from the fatty alcohols rich fraction has been done in a single crystallization step at low temperature (−18°C) from low boiling point petroleum ether. Gas chromatography has been used to follow up the transesterification process. All products have been characterized by spectral analysis.

Keywords: Jojoba oil, transesterification, microwave, gas chromatography jojoba esters, Jojoba alcohol.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3712
1060 A Technique for Improving the Performance of Median Smoothers at the Corners Characterized by Low Order Polynomials

Authors: E. Srinivasan, D. Ebenezer

Abstract:

Median filters with larger windows offer greater smoothing and are more robust than the median filters of smaller windows. However, the larger median smoothers (the median filters with the larger windows) fail to track low order polynomial trends in the signals. Due to this, constant regions are produced at the signal corners, leading to the loss of fine details. In this paper, an algorithm, which combines the ability of the 3-point median smoother in preserving the low order polynomial trends and the superior noise filtering characteristics of the larger median smoother, is introduced. The proposed algorithm (called the combiner algorithm in this paper) is evaluated for its performance on a test image corrupted with different types of noise and the results obtained are included.

Keywords: Image filtering, detail preservation, median filters, nonlinear filters, order statistics filtering, Rank order filtering.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1374
1059 Control of A Cart-Ball System Using State-Feedback Controller

Authors: M. Shakir Saat, M. Noh Ahmad, Dr, Amat Amir

Abstract:

A cart-ball system is a challenging system from the control engineering point of view. This is due to the nonlinearities, multivariable, and non-minimum phase behavior present in this system. This paper is concerned with the problem of modeling and control of such system. The objective of control strategy is to place the cart at a desired position while balancing the ball on the top of the arc-shaped track fixed on the cart. A State-Feedback Controller (SFC) with a pole-placement method will be designed in order to control the system. At first, the mathematical model of a cart-ball system in the state-space form is developed. Then, the linearization of a model will be established in order to design a SFC. The integral control strategy will be performed as to control the cart position of a system. Simulation work is then performed using MATLAB/SIMULINK software in order to study the performance of SFC when applied to the system.

Keywords: Cart-Ball System, Integral Control, Pole-PlacementMethod, State-Feedback Controller.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1654
1058 Suitability of Class F Flyash for Construction Industry: An Indian Scenario

Authors: M. N. Akhtar, J. N. Akhtar

Abstract:

The present study evaluates the properties of class F fly ash as a replacement of natural materials in civil engineering construction industry. The low-lime flash similar to class F is the prime variety generated in India, although it has significantly smaller volumes of high-lime fly ash as compared to class C. The chemical and physical characterization of the sample is carried out with the number of experimental approaches in order to investigate all relevant features present in the samples. For chemical analysis, elementary quantitative results from point analysis and scanning electron microscopy (SEM)/dispersive spectroscopy (EDS) techniques were used to identify the element images of different fractions. The physical properties found very close to the range of common soils. Furthermore, the fly ash-based bricks were prepared by the same sample of class F fly ash and the results of compressive strength similar to that of Standard Clay Brick Grade 1 available in the local market of India.

Keywords: Flyash, class F, class C, chemical, physical, SEM, EDS.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 859