Search results for: Future of work
2904 Adsorption of Phenol and 4-Hydroxybenzoic Acid onto Functional Materials
Authors: Mourad Makhlouf, Omar Bouchher, Messabih Sidi Mohamed, Benrachedi Khaled
Abstract:
The objective of this study was to investigate the removal of two organic pollutants; 4-hydroxybenzoic acid (p-hydroxybenzoic acid) and phenol from synthetic wastewater by the adsorption on mesoporous materials. In this context, the aim of this work is to study the adsorption of organic compounds phenol and 4AHB on MCM-41 and FSM-16 non-grafted (NG) and other grafted (G) by trimethylchlorosilane (TMCS). The results of phenol and 4AHB adsorption in aqueous solution show that the adsorption capacity tends to increase after grafting in relation to the increase in hydrophobicity. The materials are distinguished by a higher adsorption capacity to the other NG materials. The difference in the phenol is 14.43% (MCM-41), 14.55% (FSM-16), and 16.72% (MCM-41), 13.57% (FSM-16) in the 4AHB. Our adsorption results show that the grafted materials by TMCS are good adsorbent at 25 °C.
Keywords: MCM-41, FSM-16, TMCS, phenol, 4AHB.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 10592903 The Labeled Classification and its Application
Authors: M. Nemissi, H. Seridi, H. Akdag
Abstract:
This paper presents and evaluates a new classification method that aims to improve classifiers performances and speed up their training process. The proposed approach, called labeled classification, seeks to improve convergence of the BP (Back propagation) algorithm through the addition of an extra feature (labels) to all training examples. To classify every new example, tests will be carried out each label. The simplicity of implementation is the main advantage of this approach because no modifications are required in the training algorithms. Therefore, it can be used with others techniques of acceleration and stabilization. In this work, two models of the labeled classification are proposed: the LMLP (Labeled Multi Layered Perceptron) and the LNFC (Labeled Neuro Fuzzy Classifier). These models are tested using Iris, wine, texture and human thigh databases to evaluate their performances.Keywords: Artificial neural networks, Fusion of neural networkfuzzysystems, Learning theory, Pattern recognition.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14112902 One scheme of Transition Probability Evaluation
Authors: Alexander B. Bichkov, Alla A. Mityureva, Valery V. Smirnov
Abstract:
In present work are considered the scheme of evaluation the transition probability in quantum system. It is based on path integral representation of transition probability amplitude and its evaluation by means of a saddle point method, applied to the part of integration variables. The whole integration process is reduced to initial value problem solutions of Hamilton equations with a random initial phase point. The scheme is related to the semiclassical initial value representation approaches using great number of trajectories. In contrast to them from total set of generated phase paths only one path for each initial coordinate value is selected in Monte Karlo process.Keywords: Path integral, saddle point method, semiclassical approximation, transition probability
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16052901 Analysis of a Double Pipe Heat Exchanger Performance by Use of Porous Baffles and Nanofluids
Authors: N. Targui, H. Kahalerras
Abstract:
The present work is a numerical simulation of nanofluids flow in a double pipe heat exchanger provided with porous baffles. The hot nanofluid flows in the inner cylinder, whereas the cold nanofluid circulates in the annular gap. The Darcy- Brinkman-Forchheimer model is adopted to describe the flow in the porous regions, and the governing equations with the appropriate boundary conditions are solved by the finite volume method. The results reveal that the addition of metallic nanoparticles enhances the rate of heat transfer in comparison to conventional fluids but this augmentation is accompanied by an increase in pressure drop. The highest heat exchanger performances are obtained when nanoparticles are added only to the cold fluid.
Keywords: Double pipe heat exchanger, Nanofluids, Nanoparticles, Porous baffles.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 35182900 Synthesis of Wavelet Filters using Wavelet Neural Networks
Authors: Wajdi Bellil, Chokri Ben Amar, Adel M. Alimi
Abstract:
An application of Beta wavelet networks to synthesize pass-high and pass-low wavelet filters is investigated in this work. A Beta wavelet network is constructed using a parametric function called Beta function in order to resolve some nonlinear approximation problem. We combine the filter design theory with wavelet network approximation to synthesize perfect filter reconstruction. The order filter is given by the number of neurons in the hidden layer of the neural network. In this paper we use only the first derivative of Beta function to illustrate the proposed design procedures and exhibit its performance.Keywords: Beta wavelets, Wavenet, multiresolution analysis, perfect filter reconstruction, salient point detect, repeatability.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16652899 Challenges for Security in Wireless Sensor Networks (WSNs)
Authors: Muazzam A. Khan, Ghalib A. Shah, Muhammad Sher
Abstract:
Wireless sensor network is formed with the combination of sensor nodes and sink nodes. Recently Wireless sensor network has attracted attention of the research community. The main application of wireless sensor network is security from different attacks both for mass public and military. However securing these networks, by itself is a critical issue due to many constraints like limited energy, computational power and lower memory. Researchers working in this area have proposed a number of security techniques for this purpose. Still, more work needs to be done.In this paper we provide a detailed discussion on security in wireless sensor networks. This paper will help to identify different obstacles and requirements for security of wireless sensor networks as well as highlight weaknesses of existing techniques.
Keywords: Wireless senor networks (WSNs), security, denial of service, black hole, cryptography, stenography.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 29232898 Edge Segmentation of Satellite Image using Phase Congruency Model
Authors: Ahmed Zaafouri, Mounir Sayadi, Farhat Fnaiech
Abstract:
In this paper, we present a method for edge segmentation of satellite images based on 2-D Phase Congruency (PC) model. The proposed approach is composed by two steps: The contextual non linear smoothing algorithm (CNLS) is used to smooth the input images. Then, the 2D stretched Gabor filter (S-G filter) based on proposed angular variation is developed in order to avoid the multiple responses in the previous work. An assessment of our proposed method performance is provided in terms of accuracy of satellite image edge segmentation. The proposed method is compared with others known approaches.Keywords: Edge segmentation, Phase congruency model, Satellite images, Stretched Gabor filter
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 26672897 Using of Cavitation Disperser, for Porous Ceramic and Concrete Material Preparation
Authors: A. Shishkin, A. Korjakins, V. Mironovs
Abstract:
Present paper describes method of obtaining clay ceramic foam (CCF) and foam concrete (FC), by direct foaming with high speed mixer-disperser (HSMD). Three foaming agents (FA) are compared for the FC and CCF production: SCHÄUMUNGSMITTEL W 53 FLÜSSIG (Zschimmer & Schwarz Gmbh, Germany), SCF- 1245 (Sika, test sample, Latvia) and FAB-12 (Elade, Latvija). CCF were obtained at 950, 1000°C, 1150°C and 1150°C firing temperature and have mechanical compressive strength 1.2, 2.55 and 4.3 MPa and porosity 79.4, 75.1, 71.6%, respectively. Obtained FC has 6-14 MPa compressive strength and porosity 44-55%. The goal of this work was development of a sustainable and durable ceramic cellular structures using HSMD.
Keywords: Ceramic foam, foam concrete, clay foam, open cell, close cell, direct foaming.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 25042896 A Novel Solution to Restricted Earth Fault Low Impedance Relay Maloperation
Authors: K. N. Dinesh Babu, R. Ramaprabha, V. Rajini, V. Nagarajan
Abstract:
In this paper, various methods of providing restricted earth fault protection are discussed. The proper operation of high and low impedance Restricted Earth Fault (REF) protection for various applications has been discussed. The maloperation of a relay due to improper placement of CTs has been identified and a simple/unique solution has been proposed in this work with a case study. Moreover, it is found that the proper placement of CT in high impedance method will provide the same result with reduced CT. This methodology has been successfully implemented in Al Takreer refinery for a 2000 KVA transformer. The outcome of the paper may be included in IEEEC37.91 standard to give the proper guidance for protection engineers to sort out the issues related to mal functioning of REF relays.Keywords: Relay maloperation, transformer, low impedance REF, MatLab, 64R, IEEE C37.91.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 39242895 FPGA Implementation of the “PYRAMIDS“ Block Cipher
Authors: A. AlKalbany, H. Al hassan, M. Saeb
Abstract:
The “PYRAMIDS" Block Cipher is a symmetric encryption algorithm of a 64, 128, 256-bit length, that accepts a variable key length of 128, 192, 256 bits. The algorithm is an iterated cipher consisting of repeated applications of a simple round transformation with different operations and different sequence in each round. The algorithm was previously software implemented in Cµ code. In this paper, a hardware implementation of the algorithm, using Field Programmable Gate Arrays (FPGA), is presented. In this work, we discuss the algorithm, the implemented micro-architecture, and the simulation and implementation results. Moreover, we present a detailed comparison with other implemented standard algorithms. In addition, we include the floor plan as well as the circuit diagrams of the various micro-architecture modules.
Keywords: FPGA, VHDL, micro-architecture, encryption, cryptography, algorithm, data communication security.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17042894 Thermal Conductivity of Al2O3/Water-Based Nanofluids: Revisiting the Influences of pH and Surfactant
Authors: Nizar Bouguerra, Ahmed Khabou, Sébastien Poncet, Saïd Elkoun
Abstract:
The present work focuses on the preparation and the stabilization of Al2O3-water based nanofluids. Though they have been widely considered in the past, to the best of our knowledge, there is no clear consensus about a proper way to prepare and stabilize them by the appropriate surfactant. In this paper, a careful experimental investigation is performed to quantify the combined influence of pH and the surfactant on the stability of Al2O3-water based nanofluids. Two volume concentrations of nanoparticles and three nanoparticle sizes have been considered. The good preparation and stability of these nanofluids are evaluated through thermal conductivity measurements. The results show that the optimum value for the thermal conductivity is obtained mainly by controlling the pH of the mixture and surfactants are not necessary to stabilize the solution.
Keywords: Nanofluid, thermal conductivity, pH, transient hot wire, surfactant, Al2O3, stability, dispersion, preparation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17602893 Compliance Modelling and Optimization of Kerf during WEDM of Al7075/SiCP Metal Matrix Composite
Authors: Thella Babu Rao, A. Gopala Krishna
Abstract:
This investigation presents the formulation of kerf (width of slit) and optimal control parameter settings of wire electrochemical discharge machining which results minimum possible kerf while machining Al7075/SiCp MMCs. WEDM is proved its efficiency and effectiveness to cut the hard ceramic reinforced MMCs within the permissible budget. Among the distinct performance measures of WEDM process, kerf is an important performance characteristic which determines the dimensional accuracy of the machined component while producing high precision components. The lack of available of the machinability information such advanced MMCs result the more experimentation in the manufacturing industries. Therefore, extensive experimental investigations are essential to provide the database of effect of various control parameters on the kerf while machining such advanced MMCs in WEDM. Literature reviled the significance some of the electrical parameters which are prominent on kerf for machining distinct conventional materials. However, the significance of reinforced particulate size and volume fraction on kerf is highlighted in this work while machining MMCs along with the machining parameters of pulse-on time, pulse-off time and wire tension. Usually, the dimensional tolerances of machined components are decided at the design stage and a machinist pay attention to produce the required dimensional tolerances by setting appropriate machining control variables. However, it is highly difficult to determine the optimal machining settings for such advanced materials on the shop floor. Therefore, in the view of precision of cut, kerf (cutting width) is considered as the measure of performance for the model. It was found from the literature that, the machining conditions of higher fractions of large size SiCp resulting less kerf where as high values of pulse-on time result in a high kerf. A response surface model is used to predict the relative significance of various control variables on kerf. Consequently, a powerful artificial intelligence called genetic algorithms (GA) is used to determine the best combination of the control variable settings. In the next step the conformation test was conducted for the optimal parameter settings and found good agreement between the GA kerf and measured kerf. Hence, it is clearly reveal that the effectiveness and accuracy of the developed model and program to analyze the kerf and to determine its optimal process parameters. The results obtained in this work states that, the resulted optimized parameters are capable of machining the Al7075/SiCp MMCs more efficiently and with better dimensional accuracy.
Keywords: Al7075SiCP MMC, kerf, WEDM, optimization.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 20192892 A “Greedy“ Czech Manufacturing Case
Authors: George Cristian Gruia, Michal Kavan
Abstract:
The article describes a case study on one of Czech Republic-s manufacturing middle size enterprises (ME), where due to the European financial crisis, production lines had to be redesigned and optimized in order to minimize the total costs of the production of goods. It is considered an optimization problem of minimizing the total cost of the work load, according to the costs of the possible locations of the workplaces, with an application of the Greedy algorithm and a partial analogy to a Set Packing Problem. The displacement of working tables in a company should be as a one-toone monotone increasing function in order for the total costs of production of the goods to be at minimum. We use a heuristic approach with greedy algorithm for solving this linear optimization problem, regardless the possible greediness which may appear and we apply it in a Czech ME.Keywords: Czech, greedy algorithm, minimize, total costs.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16212891 An Improved QRS Complex Detection for Online Medical Diagnosis
Authors: I. L. Ahmad, M. Mohamed, N. A. Ab. Ghani
Abstract:
This paper presents the work of signal discrimination specifically for Electrocardiogram (ECG) waveform. ECG signal is comprised of P, QRS, and T waves in each normal heart beat to describe the pattern of heart rhythms corresponds to a specific individual. Further medical diagnosis could be done to determine any heart related disease using ECG information. The emphasis on QRS Complex classification is further discussed to illustrate the importance of it. Pan-Tompkins Algorithm, a widely known technique has been adapted to realize the QRS Complex classification process. There are eight steps involved namely sampling, normalization, low pass filter, high pass filter (build a band pass filter), derivation, squaring, averaging and lastly is the QRS detection. The simulation results obtained is represented in a Graphical User Interface (GUI) developed using MATLAB.Keywords: ECG, Pan Tompkins Algorithm, QRS Complex, Simulation
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 25742890 Transformation of Vocal Characteristics: A Review of Literature
Authors: Dong-Yan Huang, Ee Ping Ong, Susanto Rahardja, Minghui Dong, Haizhou Li
Abstract:
The transformation of vocal characteristics aims at modifying voice such that the intelligibility of aphonic voice is increased or the voice characteristics of a speaker (source speaker) to be perceived as if another speaker (target speaker) had uttered it. In this paper, the current state-of-the-art voice characteristics transformation methodology is reviewed. Special emphasis is placed on voice transformation methodology and issues for improving the transformed speech quality in intelligibility and naturalness are discussed. In particular, it is suggested to use the modulation theory of speech as a base for research on high quality voice transformation. This approach allows one to separate linguistic, expressive, organic and perspective information of speech, based on an analysis of how they are fused when speech is produced. Therefore, this theory provides the fundamentals not only for manipulating non-linguistic, extra-/paralinguistic and intra-linguistic variables for voice transformation, but also for paving the way for easily transposing the existing voice transformation methods to emotion-related voice quality transformation and speaking style transformation. From the perspectives of human speech production and perception, the popular voice transformation techniques are described and classified them based on the underlying principles either from the speech production or perception mechanisms or from both. In addition, the advantages and limitations of voice transformation techniques and the experimental manipulation of vocal cues are discussed through examples from past and present research. Finally, a conclusion and road map are pointed out for more natural voice transformation algorithms in the future.Keywords: Voice transformation, Voice Quality, Emotion, Individuality, Speaking Style, Speech Production, Speech Perception.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 20432889 Digital Marketing Maturity Models: Overview and Comparison
Authors: Elina Bakhtieva
Abstract:
The variety of available digital tools, strategies and activities might confuse and disorient even an experienced marketer. This applies in particular to B2B companies, which are usually less flexible in uptaking of digital technology than B2C companies. B2B companies are lacking a framework that corresponds to the specifics of the B2B business, and which helps to evaluate a company’s capabilities and to choose an appropriate path. A B2B digital marketing maturity model helps to fill this gap. However, modern marketing offers no widely approved digital marketing maturity model, and thus, some marketing institutions provide their own tools. The purpose of this paper is building an optimized B2B digital marketing maturity model based on a SWOT (strengths, weaknesses, opportunities, and threats) analysis of existing models. The current study provides an analytical review of the existing digital marketing maturity models with open access. The results of the research are twofold. First, the provided SWOT analysis outlines the main advantages and disadvantages of existing models. Secondly, the strengths of existing digital marketing maturity models, helps to identify the main characteristics and the structure of an optimized B2B digital marketing maturity model. The research findings indicate that only one out of three analyzed models could be used as a separate tool. This study is among the first examining the use of maturity models in digital marketing. It helps businesses to choose between the existing digital marketing models, the most effective one. Moreover, it creates a base for future research on digital marketing maturity models. This study contributes to the emerging B2B digital marketing literature by providing a SWOT analysis of the existing digital marketing maturity models and suggesting a structure and main characteristics of an optimized B2B digital marketing maturity model.
Keywords: B2B digital marketing strategy, digital marketing, digital marketing maturity model, SWOT analysis.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 33192888 Business Diversification Strategies in the Italian Energy Markets
Authors: F. Di Pillo, G. Capece, L. Cricelli, N. Levialdi
Abstract:
The liberalization and privatization processes have forced public utility companies to face new competitive challenges, implementing strategies to gain market share and, at the same time, keep the old customers. To this end, many companies have carried out mergers, acquisitions and conglomerations in order to diversify their business. This paper focuses on companies operating in the free energy market in Italy. In the last decade, this sector has undergone profound changes that have radically changed the competitive scenario and have led companies to implement diversification strategies of the business. Our work aims to evaluate the economic and financial performances obtained by energy companies, following the beginning of the liberalization process, verifying the possible relationship with the implemented diversification strategies.Keywords: Business diversification strategies, M&A, the Italian energy market liberalization, economic and financial performances.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 21332887 Rethinking Research for Genetically Modified (GM) Food
Abstract:
This paper suggests a rethinking of the existing research about Genetically Modified (GM) food. Since the first batch of GM food was commercialised in the UK market, GM food rapidly received and lost media attention in the UK. Disagreement on GM food policy between the US and the EU has also drawn scholarly attention to this issue. Much research has been carried out intending to understand people-s views about GM food and the shaping of these views. This paper was based on the data collected in twenty-nine semi-structured interviews, which were examined through Erving Goffman-s idea of self-presentation in interactions to suggest that the existing studies investigating “consumer attitudes" towards GM food have only considered the “front stage" in the dramaturgic metaphor. This paper suggests that the ways in which people choose to present themselves when participating these studies should be taken into account during the data analysis.Keywords: Boundary work, demarcation of science, GM food, self-presentation
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14282886 Position Awareness Mechanisms for Wireless Sensor Networks
Authors: Seyed Mostafa Torabi
Abstract:
A Wireless sensor network (WSN) consists of a set of battery-powered nodes, which collaborate to perform sensing tasks in a given environment. Each node in WSN should be capable to act for long periods of time with scrimpy or no external management. One requirement for this independent is: in the presence of adverse positions, the sensor nodes must be capable to configure themselves. Hence, the nodes for determine the existence of unusual events in their surroundings should make use of position awareness mechanisms. This work approaches the problem by considering the possible unusual events as diseases, thus making it possible to diagnose them through their symptoms, namely, their side effects. Considering these awareness mechanisms as a foundation for highlevel monitoring services, this paper also shows how these mechanisms are included in the primal plan of an intrusion detection system.
Keywords: Awareness Mechanism, Intrusion Detection, Independent, Wireless Sensor Network
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14522885 Predictability Analysis on HIV/AIDS System using Hurst Exponents
Authors: K. Kamalanand, P. Mannar Jawahar
Abstract:
Methods of contemporary mathematical physics such as chaos theory are useful for analyzing and understanding the behavior of complex biological and physiological systems. The three dimensional model of HIV/AIDS is the basis of active research since it provides a complete characterization of disease dynamics and the interaction of HIV-1 with the immune system. In this work, the behavior of the HIV system is analyzed using the three dimensional HIV model and a chaotic measure known as the Hurst exponent. Results demonstrate that Hurst exponents of CD4, CD8 cells and viral load vary nonlinearly with respect to variations in system parameters. Further, it was observed that the three dimensional HIV model can accommodate both persistent (H>0.5) and anti-persistent (H<0.5) dynamics of HIV states. In this paper, the objectives of the study, methodology and significant observations are presented in detail.Keywords: HIV/AIDS, mathematical model, chaos theory, Hurst exponent
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17432884 Towards Self-ware via Swarm-Array Computing
Authors: Blesson Varghese, Gerard McKee
Abstract:
The work reported in this paper proposes Swarm-Array computing, a novel technique inspired by swarm robotics, and built on the foundations of autonomic and parallel computing. The approach aims to apply autonomic computing constructs to parallel computing systems and in effect achieve the self-ware objectives that describe self-managing systems. The constitution of swarm-array computing comprising four constituents, namely the computing system, the problem/task, the swarm and the landscape is considered. Approaches that bind these constituents together are proposed. Space applications employing FPGAs are identified as a potential area for applying swarm-array computing for building reliable systems. The feasibility of a proposed approach is validated on the SeSAm multi-agent simulator and landscapes are generated using the MATLAB toolkit.Keywords: Swarm-Array computing, Autonomic computing, landscapes.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15832883 Perceptions on Accounting Career: A Study among the Secondary School Students in a Regional Kelantan State
Authors: Hezlina Mohd Hashim, Abdul Mutalib Embong, Zullina H. Shaari
Abstract:
This study analyses the perceptions of secondary school students about the accounting profession in Malaysia. Fifty five form three and form four students who are taking accounting/commerce subjects were met. Individual-s perception data were collected through questionnaires. The results at the secondary school level suggest that the stereotypical negative image of the accountant ends, with students expressing the positive view of the work of an accountant. There were also gender differences in perceiving the accounting profession. Overall, the results of the study suggest that we are now in line in projecting positive and accurate perceptions of the accounting profession to secondary school students.Keywords: Perceptions, secondary school students, accounting profession, Malaysia.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 59412882 LumaCert: Conception and Creation of New Digital Certificate for Online User Authentication in e-Banking Systems
Authors: Artan Luma, Betim Prevalla, Besart Qoku, Bujar Raufi
Abstract:
Electronic banking must be secure and easy to use and many banks heavily advertise an apparent of 100% secure system which is contestable in many points. In this work, an alternative approach to the design of e-banking system, through a new solution for user authentication and security with digital certificate called LumaCert is introduced. The certificate applies new algorithm for asymmetric encryption by utilizing two mathematical operators called Pentors and UltraPentors. The public and private key in this algorithm represent a quadruple of parameters which are directly dependent from the above mentioned operators. The strength of the algorithm resides in the inability to find the respective Pentor and UltraPentor operator from the mentioned parameters.Keywords: Security, Digital Certificate, Cryptography.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 22142881 CFD Simulations of a Co-current Spray Dryer
Authors: Saad Nahi Saleh
Abstract:
This paper presents the prediction of air flow, humidity and temperature patterns in a co-current pilot plant spray dryer fitted with a pressure nozzle using a three dimensional model. The modelling was done with a Computational Fluid Dynamic package (Fluent 6.3), in which the gas phase is modelled as continuum using the Euler approach and the droplet/ particle phase is modelled by the Discrete Phase model (Lagrange approach).Good agreement was obtained with published experimental data where the CFD simulation correctly predicts a fast downward central flowing core and slow recirculation zones near the walls. In this work, the effects of the air flow pattern on droplets trajectories, residence time distribution of droplets and deposition of the droplets on the wall also were investigated where atomizing of maltodextrin solution was used.Keywords: Spray, CFD, multiphase, drying, droplet, particle.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 40132880 Dynamic Performance Analysis of Distribution/ Sub-Transmission Networks with High Penetration of PV Generation
Authors: Cristian F.T. Montenegro, Luís F. N. Lourenço, Maurício B. C. Salles, Renato M. Monaro
Abstract:
More PV systems have been connected to the electrical network each year. As the number of PV systems increases, some issues affecting grid operations have been identified. This paper studied the impacts related to changes in solar irradiance on a distribution/sub-transmission network, considering variations due to moving clouds and daily cycles. Using MATLAB/Simulink software, a solar farm of 30 MWp was built and then implemented to a test network. From simulations, it has been determined that irradiance changes can have a significant impact on the grid by causing voltage fluctuations outside the allowable thresholds. This work discussed some local control strategies and grid reinforcements to mitigate the negative effects of the irradiance changes on the grid.
Keywords: Utility-scale PV systems, reactive power control, solar irradiance, voltage fluctuation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 12532879 Factors Affecting Employee Decision Making in an AI Environment
Authors: Yogesh C. Sharma, A. Seetharaman
Abstract:
The decision-making process in humans is a complicated system influenced by a variety of intrinsic and extrinsic factors. Human decisions have a ripple effect on subsequent decisions. In this study, the scope of human decision making is limited to employees. In an organisation, a person makes a variety of decisions from the time they are hired to the time they retire. The goal of this research is to identify various elements that influence decision making. In addition, the environment in which a decision is made is a significant aspect of the decision-making process. Employees in today's workplace use artificial intelligence (AI) systems for automation and decision augmentation. The impact of AI systems on the decision-making process is examined in this study. This research is designed based on a systematic literature review. Based on gaps in the literature, limitations and the scope of future research have been identified. Based on these findings, a research framework has been designed to identify various factors affecting employee decision making. Employee decision making is influenced by technological advancement, data-driven culture, human trust, decision automation-augmentation and workplace motivation. Hybrid human-AI systems require development of new skill sets and organisational design. Employee psychological safety and supportive leadership influences overall job satisfaction.
Keywords: Employee decision making, artificial intelligence, environment, human trust, technology innovation, psychological safety.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15852878 Improved Power Spectrum Estimation for RR-Interval Time Series
Authors: B. S. Saini, Dilbag Singh, Moin Uddin, Vinod Kumar
Abstract:
The RR interval series is non-stationary and unevenly spaced in time. For estimating its power spectral density (PSD) using traditional techniques like FFT, require resampling at uniform intervals. The researchers have used different interpolation techniques as resampling methods. All these resampling methods introduce the low pass filtering effect in the power spectrum. The lomb transform is a means of obtaining PSD estimates directly from irregularly sampled RR interval series, thus avoiding resampling. In this work, the superiority of Lomb transform method has been established over FFT based approach, after applying linear and cubicspline interpolation as resampling methods, in terms of reproduction of exact frequency locations as well as the relative magnitudes of each spectral component.Keywords: HRV, Lomb Transform, Resampling, RR-intervals.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 32372877 Automatic Moment-Based Texture Segmentation
Authors: Tudor Barbu
Abstract:
An automatic moment-based texture segmentation approach is proposed in this paper. First, we describe the related work in this computer vision domain. Our texture feature extraction, the first part of the texture recognition process, produces a set of moment-based feature vectors. For each image pixel, a texture feature vector is computed as a sequence of area moments. Then, an automatic pixel classification approach is proposed. The feature vectors are clustered using an unsupervised classification algorithm, the optimal number of clusters being determined using a measure based on validation indexes. From the resulted pixel classes one determines easily the desired texture regions of the image.
Keywords: Image segmentation, moment-based texture analysis, automatic classification, validity indexes.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 23792876 Knowledge and Skills Requirements for Software Developer Students
Authors: J. Liebenberg, M. Huisman, E. Mentz
Abstract:
It is widely acknowledged that there is a shortage of software developers, not only in South Africa, but also worldwide. Despite reports on a gap between industry needs and software education, the gap has mostly been explored in quantitative studies. This paper reports on the qualitative data of a mixed method study of the perceptions of professional software developers regarding what topics they learned from their formal education and the importance of these topics to their actual work. The analysis suggests that there is a gap between industry’s needs and software development education and the following recommendations are made: 1) Real-life projects must be included in students’ education; 2) Soft skills and business skills must be included in curricula; 3) Universities must keep the curriculum up to date; 4) Software development education must be made accessible to a diverse range of students.
Keywords: Software development education, Software industry, IT workforce, Computing curricula.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 24752875 Water Resources Crisis in Saudi Arabia, Challenges and Possible Management Options: An Analytic Review
Authors: A. A. Ghanim
Abstract:
The Kingdom of Saudi Arabia (KSA) is heading towards a severe and rapidly expanding water crisis, which can have negative impacts on the country’s environment and economy. Of the total water consumption in KSA, the agricultural sector accounts for nearly 87% of the total water use and, therefore, any attempt that overlooks this sector will not help in improving the sustainability of the country’s water resources. KSA Vision 2030 gives priority of water use in the agriculture sector for the regions that have natural renewable water resources. It means that there is little concern for making reuse of municipal wastewater for irrigation purposes in any region in general and in water-scarce regions in particular. The use of treated wastewater is very limited in Saudi Arabia, but it has very considerable potential for future expansion due its numerous beneficial uses. This study reviews the current situation of water resources in Saudi Arabia, providing more highlights on agriculture and wastewater reuse. The reviewed study is proposing some corrective measures for development and better management of water resources in the Kingdom. Suggestions also include consideration of treated water as an alternative source for irrigation in some regions of the country. The study concluded that a sustainable solution for the water crisis in KSA requires implementation of multiple measures in an integrated manner. The integrated solution plan should focus on two main directions: first, improving the current management practices of the existing water resources; second, developing new water supplies from both conventional and non-conventional sources.Keywords: Saudi Arabia, water resources, water crisis, treated wastewater.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1938