Search results for: Long Short-Term Memory Network
2716 Study on Using the Ground as A Heat Sink for A 12,000-Btu/h Modified Air Conditioner
Authors: W. Permchart, S. Tanatvanit
Abstract:
This paper presents the results of the experimental tests of the cooling performance of a 12,000-Btu/h modified air conditioner (referred to as M-AC) that use the ground as a heat sink of a condenser. In the tests, cooling capacity of M-AC with an optimal length of a condensing coil as well as life expectancy of copper coil buried underground were investigated. The lengths of copper coil fabricated and used as condenser coil of M-AC were set at 67, 50, 40 and 30 m whereas that of a 12,000-Btu/h conventional split-type air conditioner (referred to as C-AC) was about 22 m. The results showed that the ground can absorb heat rejected from a condenser of M-AC. The coefficient of performance (COP) of C-AC was about 2.5 whereas those of M-AC were found to be higher. It was found that the values of COP of M-AC with condensing coils of 67, 50 and 40 m long were about 6.9, 5.5 and 3.3, respectively, while that of 30-m-long one was found to be about 2.1. The electrical consumptions of M-AC were found lower than that of C-AC in the range of 11.5 – 15.5%. Additionally, life expectancy of underground condensing coil of M-AC was found to be over 7 years.Keywords: Air conditioner, condenser, copper coil, ground.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 27252715 Integration of Asian Stock Markets
Authors: Noor A. Auzairy, Rubi Ahmad, Catherine S.F. Ho, Ros Z. Z. Sapian
Abstract:
This paper is to explore the relationship and the level of stock market integration of the Asian countries, primarily concentrating on Malaysia, Thailand, Indonesia, and South Korea, with the world from January 1997 to December 2009. The degree of short-run and long-run stock market integration of those Asian countries are analyzed in order to determine the significance of series of regional and world financial crises, liberalization policies and other financial reforms in influencing the level of stock market integration. To test for cointegration, this paper applies coefficient correlation, univariate regression analyses, cointegration tests, and vector autoregressive models (VAR) by using the four Asian stock markets main indices and the MSCI World index. The empirical findings from this work reveal that there is no long-run stock market integration for the four countries and the world market. However, there is short run integration.Keywords: Asia, integration, relationship, stock market.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 24782714 A New Protocol for Concealed Data Aggregation in Wireless Sensor Networks
Authors: M. Abbasi Dezfouli, S. Mazraeh, M. H. Yektaie
Abstract:
Wireless sensor networks (WSN) consists of many sensor nodes that are placed on unattended environments such as military sites in order to collect important information. Implementing a secure protocol that can prevent forwarding forged data and modifying content of aggregated data and has low delay and overhead of communication, computing and storage is very important. This paper presents a new protocol for concealed data aggregation (CDA). In this protocol, the network is divided to virtual cells, nodes within each cell produce a shared key to send and receive of concealed data with each other. Considering to data aggregation in each cell is locally and implementing a secure authentication mechanism, data aggregation delay is very low and producing false data in the network by malicious nodes is not possible. To evaluate the performance of our proposed protocol, we have presented computational models that show the performance and low overhead in our protocol.Keywords: Wireless Sensor Networks, Security, Concealed Data Aggregation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17352713 An Improved Transfer Logic of the Two-Path Algorithm for Acoustic Echo Cancellation
Abstract:
Adaptive echo cancellers with two-path algorithm are applied to avoid the false adaptation during the double-talk situation. In the two-path algorithm, several transfer logic solutions have been proposed to control the filter update. This paper presents an improved transfer logic solution. It improves the convergence speed of the two-path algorithm, and allows the reduction of the memory elements and computational complexity. Results of simulations show the improved performance of the proposed solution.Keywords: Acoustic echo cancellation, Echo return lossenhancement (ERLE), Two-path algorithm, Transfer logic
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17712712 Eco-Design of Multifunctional System Based on a Shape Memory Polymer and ZnO Nanoparticles for Sportswear
Authors: Inês Boticas, Diana P. Ferreira, Ana Eusébio, Carlos Silva, Pedro Magalhães, Ricardo Silva, Raul Fangueiro
Abstract:
Since the beginning of the 20th century, sportswear has a major contribution to the impact of fashion on our lives. Nowadays, the embracing of sportswear fashion/looks is undoubtedly noticeable, as the modern consumer searches for high comfort and linear aesthetics for its clothes. This compromise lead to the arise of the athleisure trend. Athleisure surges as a new style area that combines both wearability and fashion sense, differentiated from the archetypal sportswear, usually associated to “gym clothes”. Additionally, the possibility to functionalize and implement new technologies have shifted and progressively empowers the connection between the concepts of physical activities practice and well-being, allowing clothing to be more interactive and responsive with its surroundings. In this study, a design inspired in retro and urban lifestyle was envisioned, engineering textile structures that can respond to external stimuli. These structures are enhanced to be responsive to heat, water vapor and humidity, integrating shape memory polymers (SMP) to improve the breathability and heat-responsive behavior of the textiles and zinc oxide nanoparticles (ZnO NPs) to heighten the surface hydrophobic properties. The best results for hydrophobic exhibited superhydrophobic behavior with water contact angle (WAC) of more than 150 degrees. For the breathability and heat-response properties, SMP-coated samples showed an increase in water vapour permeability values of about 50% when compared with non SMP-coated samples. These innovative technological approaches were endorsed to design innovative clothing, in line with circular economy and eco-design principles, by assigning a substantial degree of mutability and versatility to the clothing. The development of a coat and shirt, in which different parts can be purchased separately to create multiple products, aims to combine the technicality of both the fabrics used and the making of the garments. This concept translates itself into a real constructive mechanism through the symbiosis of high-tech functionalities and the timeless design that follows the athleisure aesthetics.
Keywords: Breathability, sportswear and casual clothing, sustainable design, superhydrophobicity.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 10822711 Governance of Inter-Organizational Research Cooperation
Authors: Guenther Schuh, Sebastian Woelk
Abstract:
Companies face increasing challenges in research due to higher costs and risks. The intensifying technology complexity and interdisciplinarity require unique know-how. Therefore, companies need to decide whether research shall be conducted internally or externally with partners. On the other hand, research institutes meet increasing efforts to achieve good financing and to maintain high research reputation. Therefore, relevant research topics need to be identified and specialization of competency is necessary. However, additional competences for solving interdisciplinary research projects are also often required. Secured financing can be achieved by bonding industry partners as well as public fundings. The realization of faster and better research drives companies and research institutes to cooperate in organized research networks, which are managed by an administrative organization. For an effective and efficient cooperation, necessary processes, roles, tools and a set of rules need to be determined. Goal of this paper is to show the state-of-art research and to propose a governance framework for organized research networks.Keywords: Interorganizational cooperation, design of network governance, research network.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14942710 Parallel Discrete Fourier Transform for Fast FIR Filtering Based on Overlapped-save Block Structure
Authors: Ying-Wen Bai, Ju-Maw Chen
Abstract:
To successfully provide a fast FIR filter with FTT algorithms, overlapped-save algorithms can be used to lower the computational complexity and achieve the desired real-time processing. As the length of the input block increases in order to improve the efficiency, a larger volume of zero padding will greatly increase the computation length of the FFT. In this paper, we use the overlapped block digital filtering to construct a parallel structure. As long as the down-sampling (or up-sampling) factor is an exact multiple lengths of the impulse response of a FIR filter, we can process the input block by using a parallel structure and thus achieve a low-complex fast FIR filter with overlapped-save algorithms. With a long filter length, the performance and the throughput of the digital filtering system will also be greatly enhanced.
Keywords: FIR Filter, Overlapped-save Algorithm, ParallelStructure
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16692709 Distributed Coverage Control by Robot Networks in Unknown Environments Using a Modified EM Algorithm
Authors: Mohammadhosein Hasanbeig, Lacra Pavel
Abstract:
In this paper, we study a distributed control algorithm for the problem of unknown area coverage by a network of robots. The coverage objective is to locate a set of targets in the area and to minimize the robots’ energy consumption. The robots have no prior knowledge about the location and also about the number of the targets in the area. One efficient approach that can be used to relax the robots’ lack of knowledge is to incorporate an auxiliary learning algorithm into the control scheme. A learning algorithm actually allows the robots to explore and study the unknown environment and to eventually overcome their lack of knowledge. The control algorithm itself is modeled based on game theory where the network of the robots use their collective information to play a non-cooperative potential game. The algorithm is tested via simulations to verify its performance and adaptability.Keywords: Distributed control, game theory, multi-agent learning, reinforcement learning.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 9732708 Throughput Enhancement in AUDTWMN Using Throwboxes – An Overview
Authors: Laveen Sundararaj, Palanisamy Vellaiyan
Abstract:
Delay and Disruption Tolerant Networking is part of the Inter Planetary Internet with primary application being Deep Space Networks. Its Terrestrial form has interesting research applications such as Alagappa University Delay Tolerant Water Monitoring Network which doubles as test beds for improvising its routing scheme. DTNs depend on node mobility to deliver packets using a store-carry-and forward paradigm. Throwboxes are small and inexpensive stationary devices equipped with wireless interfaces and storage. We propose the use of Throwboxes to enhance the contact opportunities of the nodes and hence improve the Throughput. The enhancement is evaluated using Alunivdtnsim, a desktop simulator in C language and the results are graphically presented.Keywords: Alunivdtnsim – Alagappa University Delay TolerantNetwork Simulator, AUDTWMN- Alagappa University DelayTolerant Water Monitoring Network, DTN - Delay and DisruptionTolerant Networking, LTP – Lick Lider Transmission Protocol.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17522707 The New Method of Concealed Data Aggregation in Wireless Sensor: A Case Study
Authors: M. Abbasi Dezfouli, S. Mazraeh, M. H. Yektaie
Abstract:
Wireless sensor networks (WSN) consists of many sensor nodes that are placed on unattended environments such as military sites in order to collect important information. Implementing a secure protocol that can prevent forwarding forged data and modifying content of aggregated data and has low delay and overhead of communication, computing and storage is very important. This paper presents a new protocol for concealed data aggregation (CDA). In this protocol, the network is divided to virtual cells, nodes within each cell produce a shared key to send and receive of concealed data with each other. Considering to data aggregation in each cell is locally and implementing a secure authentication mechanism, data aggregation delay is very low and producing false data in the network by malicious nodes is not possible. To evaluate the performance of our proposed protocol, we have presented computational models that show the performance and low overhead in our protocol.
Keywords: Wireless Sensor Networks, Security, Concealed Data Aggregation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17682706 Face Recognition with Image Rotation Detection, Correction and Reinforced Decision using ANN
Authors: Hemashree Bordoloi, Kandarpa Kumar Sarma
Abstract:
Rotation or tilt present in an image capture by digital means can be detected and corrected using Artificial Neural Network (ANN) for application with a Face Recognition System (FRS). Principal Component Analysis (PCA) features of faces at different angles are used to train an ANN which detects the rotation for an input image and corrected using a set of operations implemented using another system based on ANN. The work also deals with the recognition of human faces with features from the foreheads, eyes, nose and mouths as decision support entities of the system configured using a Generalized Feed Forward Artificial Neural Network (GFFANN). These features are combined to provide a reinforced decision for verification of a person-s identity despite illumination variations. The complete system performing facial image rotation detection, correction and recognition using re-enforced decision support provides a success rate in the higher 90s.Keywords: Rotation, Face, Recognition, ANN.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 20622705 Semi-Supervised Outlier Detection Using a Generative and Adversary Framework
Authors: Jindong Gu, Matthias Schubert, Volker Tresp
Abstract:
In many outlier detection tasks, only training data belonging to one class, i.e., the positive class, is available. The task is then to predict a new data point as belonging either to the positive class or to the negative class, in which case the data point is considered an outlier. For this task, we propose a novel corrupted Generative Adversarial Network (CorGAN). In the adversarial process of training CorGAN, the Generator generates outlier samples for the negative class, and the Discriminator is trained to distinguish the positive training data from the generated negative data. The proposed framework is evaluated using an image dataset and a real-world network intrusion dataset. Our outlier-detection method achieves state-of-the-art performance on both tasks.Keywords: Outlier detection, generative adversary networks, semi-supervised learning.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 10742704 An Earth Mover’s Distance Algorithm Based DDoS Detection Mechanism in SDN
Authors: Yang Zhou, Kangfeng Zheng, Wei Ni, Ren Ping Liu
Abstract:
Software-defined networking (SDN) provides a solution for scalable network framework with decoupled control and data plane. However, this architecture also induces a particular distributed denial-of-service (DDoS) attack that can affect or even overwhelm the SDN network. DDoS attack detection problem has to date been mostly researched as entropy comparison problem. However, this problem lacks the utilization of SDN, and the results are not accurate. In this paper, we propose a DDoS attack detection method, which interprets DDoS detection as a signature matching problem and is formulated as Earth Mover’s Distance (EMD) model. Considering the feasibility and accuracy, we further propose to define the cost function of EMD to be a generalized Kullback-Leibler divergence. Simulation results show that our proposed method can detect DDoS attacks by comparing EMD values with the ones computed in the case without attacks. Moreover, our method can significantly increase the true positive rate of detection.Keywords: DDoS detection, EMD, relative entropy, SDN.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 7662703 Analysis of Linear Equalizers for Cooperative Multi-User MIMO Based Reporting System
Authors: S. Hariharan, P. Muthuchidambaranathan
Abstract:
In this paper, we consider a multi user multiple input multiple output (MU-MIMO) based cooperative reporting system for cognitive radio network. In the reporting network, the secondary users forward the primary user data to the common fusion center (FC). The FC is equipped with linear equalizers and an energy detector to make the decision about the spectrum. The primary user data are considered to be a digital video broadcasting - terrestrial (DVB-T) signal. The sensing channel and the reporting channel are assumed to be an additive white Gaussian noise and an independent identically distributed Raleigh fading respectively. We analyzed the detection probability of MU-MIMO system with linear equalizers and arrived at the closed form expression for average detection probability. Also the system performance is investigated under various MIMO scenarios through Monte Carlo simulations.
Keywords: Cooperative MU-MIMO, DVB-T, Linear Equalizers.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 20232702 Target Tracking in Sensor Networks: A Distributed Constraint Satisfaction Approach
Authors: R.Mostafaei, A.Habiboghli, M.R.Meybodi
Abstract:
In distributed resource allocation a set of agents must assign their resources to a set of tasks. This problem arises in many real-world domains such as distributed sensor networks, disaster rescue, hospital scheduling and others. Despite the variety of approaches proposed for distributed resource allocation, a systematic formalization of the problem, explaining the different sources of difficulties, and a formal explanation of the strengths and limitations of key approaches is missing. We take a step towards this goal by using a formalization of distributed resource allocation that represents both dynamic and distributed aspects of the problem. In this paper we present a new idea for target tracking in sensor networks and compare it with previous approaches. The central contribution of the paper is a generalized mapping from distributed resource allocation to DDCSP. This mapping is proven to correctly perform resource allocation problems of specific difficulty. This theoretical result is verified in practice by a simulation on a realworld distributed sensor network.
Keywords: Distributed CSP, Target Tracking, Sensor Network
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 11922701 A New Scheme for Improving the Quality of Service in Heterogeneous Wireless Network for Data Stream Sending
Authors: Ebadollah Zohrevandi, Rasoul Roustaei, Omid Moradtalab
Abstract:
In this paper, we first consider the quality of service problems in heterogeneous wireless networks for sending the video data, which their problem of being real-time is pronounced. At last, we present a method for ensuring the end-to-end quality of service at application layer level for adaptable sending of the video data at heterogeneous wireless networks. To do this, mechanism in different layers has been used. We have used the stop mechanism, the adaptation mechanism and the graceful degrade at the application layer, the multi-level congestion feedback mechanism in the network layer and connection cutting off decision mechanism in the link layer. At the end, the presented method and the achieved improvement is simulated and presented in the NS-2 software.Keywords: Congestion, Handoff, Heterogeneous wireless networks, Adaptation mechanism, Stop mechanism, Graceful degrade.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14242700 A Hybrid Approach for Thread Recommendation in MOOC Forums
Authors: Ahmad. A. Kardan, Amir Narimani, Foozhan Ataiefard
Abstract:
Recommender Systems have been developed to provide contents and services compatible to users based on their behaviors and interests. Due to information overload in online discussion forums and users diverse interests, recommending relative topics and threads is considered to be helpful for improving the ease of forum usage. In order to lead learners to find relevant information in educational forums, recommendations are even more needed. We present a hybrid thread recommender system for MOOC forums by applying social network analysis and association rule mining techniques. Initial results indicate that the proposed recommender system performs comparatively well with regard to limited available data from users' previous posts in the forum.Keywords: Association rule mining, hybrid recommender system, massive open online courses, MOOCs, social network analysis.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 12632699 Authentication in Multi-Hop Wireless Mesh Networks
Authors: Kaleemullah Khan, Muhammmad Akbar
Abstract:
Wireless Mesh Networks (WMNs) are an emerging technology for last-mile broadband access. In WMNs, similar to ad hoc networks, each user node operates not only as a host but also as a router. User packets are forwarded to and from an Internet-connected gateway in multi-hop fashion. The WMNs can be integrated with other networking technologies i.e. ad hoc networks, to implement a smooth network extension. The meshed topology provides good reliability and scalability, as well as low upfront investments. Despite the recent start-up surge in WMNs, much research remains to be done in standardizing the functional parameters of WMNs to fully exploit their full potential. An edifice of the security concerns of these networks is authentication of a new client joining an integrated ad hoc network and such a scenario will require execution of a multihop authentication technique. Our endeavor in this paper is to introduce a secure authentication technique, with light over-heads that can be conveniently implemented for the ad-hoc nodes forming clients of an integrated WMN, thus facilitating their inter-operability.Keywords: Multi-Hop WMNs, PANA, EAP-TTLS, Authentication, RADIUS.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 18212698 Design of a Three Phase Active Power Filter with Sliding Mode Control and Energy Feedback
Authors: M. Nayeripour, T. Niknam
Abstract:
Nonlinear and unbalance loads in three phase networks create harmonics and losses. Active and passive filters are used for elimination or reduction of these effects. Passive filters have some limitations. For example, they are designed only for a specific frequency and they may cause to resonance in the network at the point of common coupling. The other drawback of a passive filter is that the sizes of required elements are normally large. The active filter can improve some of limitations of passive filter for example; they can eliminate more than one harmonic and don't cause resonance in the network. In this paper inverter analysis have been done simultaneously in three phase and the RL impedance of the line have been considered. A sliding mode control based on energy feedback of capacitors is employed in the design with this method, the dynamic speed of the filter is improved effectively and harmonics and load unbalance is compensating quickly.Keywords: Shunt active filter, harmonic, inverter, sliding mode control, energy feedback.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 18462697 Personal Knowledge Management among Adult Learners: Behind the Scene of Social Network
Authors: Shahrinaz Ismail, Zulhelmi Mohammed, Nur Waheda Md Yusof, Mohd Sharifuddin Ahmad
Abstract:
The burst of Web 2.0 technology and social networking tools manifest different styles of learning and managing knowledge among both knowledge workers and adult learners. In the Western countries, open-learning concept has been made popular due to the ease of use and the reach that the technology provides. In Malaysia, there are still some gaps between the learners- acceptance of technology and the full implementation of the technology in the education system. There is a need to understand how adult learners, who are knowledge workers, manage their personal knowledge via social networking tools, especially in their learning process. Four processes of personal knowledge management (PKM) and four cognitive enablers are proposed supported by analysed data on adult learners in a university. The model derived from these processes and enablers is tested and presented, with recommendations on features to be included in adult learners- learning environment.Keywords: Personal knowledge management, adult learners, social network, learning environment.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 19892696 Impact of Altered Behavioral Condition on Markers of Oxidative Stress and Different Biochemical Parameters
Authors: D. S. Mohale, A. V. Chandewar
Abstract:
Aim- Study was undertaken to investigate the effect of altered behavioral condition like depression on various oxidative stress markers and biochemical parameters in rats. Methods- Rats were subjected for short (21 days) and long term (84 days) social isolation; the rats displayed an increase in depression on force swim test relative to control. Various markers of oxidative stress like lipid per oxidation (LPO), reduced glutathione (GSH), Supers oxide dismutase (SOD), catalase (CAT) and biochemical parameters like SGOT, SGPT, and blood glucose were determined. Results- There was significant increase in the level of LPO and decrease in the levels of GSH, SOD and CAT after long term isolation. Biochemical parameters were significantly altered after social isolation. Conclusion- Increased oxidative stress in depression which may leads to alteration of biochemical parameters.
Keywords: Depression, Glucose, LPO, Oxidative stress.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 18552695 Linguistic Phenomena in Men and Women - TOT, FOK, Verbal Fluency
Authors: Ewa Szepietowska, Barbara Gawda, Agnieszka Gawda
Abstract:
The aim of this study is to describe the differences between women and men in the phenomena of feeling of knowing/know (FOK), tip of the tongue (TOT), and verbal fluency. Two studies are presented. The first included a group of 60 participants and focused on the analysis of FOK and TOT in men and women. The second study described the performance of 302 participants in verbal fluency tasks. Both studies showed that sex is not a significant predictor of linguistic abilities. Rather, the main factors influencing one’s linguistic ability were Vocabulary and education. This study enriches the knowledge on mechanisms of memory and verbal production.
Keywords: Feeling of knowing, Tip of the tongue, Verbal fluency, Sex differences.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 25282694 New Design Constraints of FIR Filter on Magnitude and Phase of Error Function
Authors: Raghvendra Kumar, Lillie Dewan
Abstract:
Exchange algorithm with constraints on magnitude and phase error separately in new way is presented in this paper. An important feature of the algorithms presented in this paper is that they allow for design constraints which often arise in practical filter design problems. Meeting required minimum stopband attenuation or a maximum deviation from the desired magnitude and phase responses in the passbands are common design constraints that can be handled by the methods proposed here. This new algorithm may have important advantages over existing technique, with respect to the speed and stability of convergence, memory requirement and low ripples.
Keywords: Least square estimation, Constraints, Exchange algorithm.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16542693 Second-Order Slip Flow and Heat Transfer in a Long Isothermal Microchannel
Authors: Huei Chu Weng, Chien-Hung Liu
Abstract:
This paper presents a study on the effect of second-order slip and jump on forced convection through a long isothermally heated or cooled planar microchannel. The fully developed solutions of thermal flow fields are analytically obtained on the basis of the second-order Maxwell-Burnett slip and Smoluchowski jump boundary conditions. Results reveal that the second-order term in the Karniadakis slip boundary condition is found to contribute a negative velocity slip and then to lead to a higher pressure drop as well as a higher fluid temperature for the heated-wall case or to a lower fluid temperature for the cooled-wall case. These findings are contrary to predictions made by the Deissler model. In addition, the role of second-order slip becomes more significant when the Knudsen number increases.Keywords: Microfluidics, forced convection, gas rarefaction, second-order boundary conditions.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 20802692 Minimizing Energy Consumption in Wireless Sensor Networks using Binary Integer Linear Programming
Authors: Chompunut Jantarasorn, Chutima Prommak
Abstract:
The important issue considered in the widespread deployment of Wireless Sensor Networks (WSNs) is an efficiency of the energy consumption. In this paper, we present a study of the optimal relay station planning problems using Binary Integer Linear Programming (BILP) model to minimize the energy consumption in WSNs. Our key contribution is that the proposed model not only ensures the required network lifetime but also guarantees the radio connectivity at high level of communication quality. Specially, we take into account effects of noise, signal quality limitation and bit error rate characteristics. Numerical experiments were conducted in various network scenarios. We analyzed the effects of different sensor node densities and distribution on the energy consumption.
Keywords: Binary Integer Linear Programming, BILP, Energy consumption, Optimal node placement and Wireless sensor networks.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 22042691 Handwritten Character Recognition Using Multiscale Neural Network Training Technique
Authors: Velappa Ganapathy, Kok Leong Liew
Abstract:
Advancement in Artificial Intelligence has lead to the developments of various “smart" devices. Character recognition device is one of such smart devices that acquire partial human intelligence with the ability to capture and recognize various characters in different languages. Firstly multiscale neural training with modifications in the input training vectors is adopted in this paper to acquire its advantage in training higher resolution character images. Secondly selective thresholding using minimum distance technique is proposed to be used to increase the level of accuracy of character recognition. A simulator program (a GUI) is designed in such a way that the characters can be located on any spot on the blank paper in which the characters are written. The results show that such methods with moderate level of training epochs can produce accuracies of at least 85% and more for handwritten upper case English characters and numerals.Keywords: Character recognition, multiscale, backpropagation, neural network, minimum distance technique.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 19292690 Analysis of Electromagnetic Field Effects Using FEM for Transmission Lines Transposition
Authors: S. Tupsie, A. Isaramongkolrak, P. Pao-la-or
Abstract:
This paper presents the mathematical model of electric field and magnetic field in transmission system, which performs in second-order partial differential equation. This research has conducted analyzing the electromagnetic field radiating to atmosphere around the transmission line, when there is the transmission line transposition in case of long distance distribution. The six types of 500 kV transposed HV transmission line with double circuit will be considered. The computer simulation is applied finite element method that is developed by MATLAB program. The problem is considered to two dimensions, which is time harmonic system with the graphical performance of electric field and magnetic field. The impact from simulation of six types long distance distributing transposition will not effect changing of electric field and magnetic field which surround the transmission line.
Keywords: Transposition, Electromagnetic Field, Finite Element Method (FEM), Transmission Line, Computer Simulation
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 40342689 Visualisation and Navigation in Large Scale P2P Service Networks
Authors: H. Unger, H. Coltzau
Abstract:
In Peer-to-Peer service networks, where peers offer any kind of publicly available services or applications, intuitive navigation through all services in the network becomes more difficult as the number of services increases. In this article, a concept is discussed that enables users to intuitively browse and use large scale P2P service networks. The concept extends the idea of creating virtual 3D-environments solely based on Peer-to-Peer technologies. Aside from browsing, users shall have the possibility to emphasize services of interest using their own semantic criteria. The appearance of the virtual world shall intuitively reflect network properties that may be of interest for the user. Additionally, the concept comprises options for load- and traffic-balancing. In this article, the requirements concerning the underlying infrastructure and the graphical user interface are defined. First impressions of the appearance of future systems are presented and the next steps towards a prototypical implementation are discussed.
Keywords: Internet Operating System, Peer-To-Peer, Service Exploration
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 12832688 Enhance Power Quality by HVDC System, Comparison Technique between HVDC and HVAC Transmission Systems
Authors: Smko Zangana, Ergun Ercelebi
Abstract:
The alternating current is the main power in all industries and other aspects especially for the short and mid distances, but as far as long a distance which exceeds 500 KMs, using the alternating current technically will face many difficulties and more costs because it's difficult to control the current and also other restrictions. Therefore, recently those reasons led to building transmission lines HVDC to transmit power for long distances. This document presents technical comparison and assessments for power transmission system among distances either ways and studying the stability of the system regarding the proportion of losses in the actual power sent and received between both sides in different systems and also categorizing filters used in the HVDC system and its impact and effect on reducing Harmonic in the power transmission. MATLAB /Simulink simulation software is used to simulate both HVAC & HVDC power transmission system topologies.Keywords: HVAC power system, HVDC power system, power system simulation (MATLAB), the alternating current, voltage stability.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 25072687 The Impact of Seasonality on Rainfall Patterns: A Case Study
Authors: Priti Kaushik, Randhir Singh Baghel, Somil Khandelwal
Abstract:
This study uses whole-year data from Rajasthan, India, at the meteorological divisional level to analyze and evaluate long-term spatiotemporal trends in rainfall and looked at the data from each of the thirteen tehsils in the Jaipur district to see how the rainfall pattern has altered over the last 10 years. Data on daily rainfall from the Indian Meteorological Department (IMD) in Jaipur are available for the years 2012 through 2021. We mainly focus on comparing data of tehsil wise in the Jaipur district, Rajasthan, India. Also analyzed is the fact that July and August always see higher rainfall than any other month. Rainfall usually starts to rise around week 25th and peaks in weeks 32nd or 33rd. They showed that on several occasions, 2017 saw the least amount of rainfall during a long span of 10 years. The greatest rain fell between 2012 and 2021 in 2013, 2019, and 2020.
Keywords: Data analysis, extreme events, rainfall, descriptive case studies, precipitation temperature.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 191