Search results for: deterioration mechanism
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1111

Search results for: deterioration mechanism

931 A Software of Intrusion Detection Mechanism for Virtual Platforms

Authors: Ying-Chuan Chen, Shuen-Tai Wang

Abstract:

Security is an interesting and significance issue for popular virtual platforms, such as virtualization cluster and cloud platforms. Virtualization is the powerful technology for cloud computing services, there are a lot of benefits by using virtual machine tools which be called hypervisors, such as it can quickly deploy all kinds of virtual Operating Systems in single platform, able to control all virtual system resources effectively, cost down for system platform deployment, ability of customization, high elasticity and high reliability. However, some important security problems need to take care and resolved in virtual platforms that include terrible viruses, evil programs, illegal operations and intrusion behavior. In this paper, we present useful Intrusion Detection Mechanism (IDM) software that not only can auto to analyze all system-s operations with the accounting journal database, but also is able to monitor the system-s state for virtual platforms.

Keywords: security, cluster, cloud, virtualization, virtual machine, virus, intrusion detection

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1495
930 Smart Monitoring and Control of Tap Changer Using Intelligent Electronic Device

Authors: K. N. Dinesh Babu, G. R. Manjunatha, R. Ramaprabha, V. Rajini, M. V. Gopalan

Abstract:

In this paper, monitoring and control of tap changer mechanism of a transformer implementation in an Intelligent Electronic Device (IED) is discussed. It has been a custom for decades to provide a separate panel for on load tap changer control for monitoring the tap position. However, this facility cannot either record or transfer the information to remote control centers. As there is a technology shift towards the smart grid protection and control standards, the need for implementing remote control and monitoring has necessitated the implementation of this feature in numerical relays. This paper deals with the programming, settings and logic implementation which is applicable to both IEC 61850 compatible and non-compatible IEDs thereby eliminating the need for separate tap changer control equipment. The monitoring mechanism has been implemented in a 28MVA, 110 /6.9kV transformer with 16 tap position with GE make T60 IED at Ultratech cement limited Gulbarga, Karnataka and is in successful service.

Keywords: Transformer protection, tap changer control, tap position monitoring, on load tap changer, intelligent electronic device (IED).

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3975
929 rRNA Maturation Genes (KRR1 and PWP2) in Saccharomyces cerevisiae Inhibited by Silver Nanoparticles

Authors: Anjali Haloi, Debabrata Das

Abstract:

Silver nanoparticles inhibit a wide variety of microorganisms. The mechanism of inhibition is not entirely known although it is recognized to be concentration dependent and associated with the disruption of membrane permeability. Data on differential gene expression as a response to nanoparticles could provide insights into the mechanism of this inhibitory effect. Silver nanoparticles were synthesized in yeast growth media using a modification of the Creighton method and characterized with UV-Vis spectrophotometry, transmission electron microscopy (TEM), and X-ray diffraction (XRD). In yeasts grown in the presence of silver nanoparticles, we observed that at concentrations below the minimum inhibitory concentration (MIC) of 48.51 µg/ml, the total RNA content was steady while the cellular protein content declined rapidly. The analysis of the expression levels of KRR1 and PWP2, two important genes involved in rRNA maturation in yeasts, showed up to 258 and 42-fold decreases, respectively, compared to that of control samples. Whether silver nanoparticles have an adverse effect on ribosome assembly and function could be an area of further investigation.

Keywords: Ag NP, yeast, qRT-PCR, KRR1, PWP2.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 320
928 Cloudburst-Triggered Natural Hazards in Uttarakhand Himalaya: Mechanism, Prevention, and Mitigation

Authors: Vishwambhar Prasad Sati

Abstract:

This article examines cloudburst-triggered natural hazards mainly flashfloods and landslides in the Uttarakhand Himalaya. It further describes mechanism and implications of natural hazards and illustrates the preventive and mitigation measures. We conducted this study through collection of archival data, case study of cloudburst hit areas, and rapid field visit of the affected regions. In the second week of August 2017, about 50 people died and huge losses to property were noticed due to cloudburst-triggered flashfloods. Our study shows that although cloudburst triggered hazards in the Uttarakhand Himalaya are natural phenomena and unavoidable yet, disasters can be minimized if preventive measures are taken up appropriately. We suggested that construction of human settlements, institutions and infrastructural facilities along the seasonal streams and the perennial rivers should be avoided to prevent disasters. Further, large-scale tree plantation on the degraded land will reduce the magnitude of hazards.

Keywords: Cloudburst, flashfloods, landslides, fragile landscape, Uttarakhand Himalaya.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1255
927 Local Perspectives on Climate Change Mitigation and Sustainability of Clean Development Mechanism (CDM) Project: A Case Study in Thailand

Authors: S. Kittipongvises, T. Mino, C. Polprasert

Abstract:

Global climate change has become the preeminent threat to human security in the 21st century. From mitigation perspective, this study aims to evaluate the performance of biogas renewable project under clean development mechanism activities (namely Korat-Waste-to-Energy) in Thailand and to assess local perceptions towards the significance of climate change mitigation and sustainability of such project in their community. Questionnaire was developed based on the national sustainable development criteria and was distributed among systematically selected households within project boundaries (n=260). Majority of the respondents strongly agreed with the reduction of odor problems (81%) and air pollution (76%). However, they were unsure about greenhouse gas reduction from such project and ignorant about the key issues of climate change. A lesson learned suggested that there is a need to further investigate the possible socio-psychological barriers may significantly shape public perception and understandings of climate change in the local context.

Keywords: Climate Change Mitigation, Local Perspective, Sustainability, Thailand

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1582
926 Data Transmission Reliability in Short Message Integrated Distributed Monitoring Systems

Authors: Sui Xin, Li Chunsheng, Tian Di

Abstract:

Short message integrated distributed monitoring systems (SM-DMS) are growing rapidly in wireless communication applications in various areas, such as electromagnetic field (EMF) management, wastewater monitoring, and air pollution supervision, etc. However, delay in short messages often makes the data embedded in SM-DMS transmit unreliably. Moreover, there are few regulations dealing with this problem in SMS transmission protocols. In this study, based on the analysis of the command and data requirements in the SM-DMS, we developed a processing model for the control center to solve the delay problem in data transmission. Three components of the model: the data transmission protocol, the receiving buffer pool method, and the timer mechanism were described in detail. Discussions on adjusting the threshold parameter in the timer mechanism were presented for the adaptive performance during the runtime of the SM-DMS. This model optimized the data transmission reliability in SM-DMS, and provided a supplement to the data transmission reliability protocols at the application level.

Keywords: Delay, SMS, reliability, distributed monitoringsystem (DMS), wireless communication.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1662
925 The Causation and Solution of Ringing Effect in DCT-based Video Coding

Authors: Yu Yuan, David Feng, Yu-Zhuo Zhong

Abstract:

Ringing effect is one of the most annoying visual artifacts in digital video. It is a significant factor of subjective quality deterioration. However, there is a widely-accepted misunderstanding of its cause. In this paper, we propose a reasonable interpretation of the cause of ringing effect. Based on the interpretation, we suggest further two methods to reduce ringing effect in DCT-based video coding. The methods adaptively adjust quantizers according to video features. Our experiments proved that the methods could efficiently improve subjective quality with acceptable additional computing costs.

Keywords: ringing effect, video coding, subjective quality, DCT.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1706
924 Development of Underactuated Robot Hand Using Cross Section Deformation Spring

Authors: Naoki Saito, Daisuke Kon, Toshiyuki Sato

Abstract:

This paper describes an underactuated robot hand operated by low-power actuators. It can grasp objects of various shapes using easy operations. This hand is suitable for use as a lightweight prosthetic hand that can grasp various objects using few input channels. To realize operations using a low-power actuator, a cross section deformation spring is proposed. The design procedure of the underactuated robot finger is proposed to realize an adaptive grasping movement. The validity of this mechanism and design procedure are confirmed through an object grasping experiment. Results demonstrate the effectiveness of across section deformation spring in reducing the actuator power. Moreover, adaptive grasping movement is realized by an easy operation.

Keywords: Robot hand, Underactuated mechanism, Cross section deformation spring, Prosthetic hand.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1619
923 Apoptosis Inspired Intrusion Detection System

Authors: R. Sridevi, G. Jagajothi

Abstract:

Artificial Immune Systems (AIS), inspired by the human immune system, are algorithms and mechanisms which are self-adaptive and self-learning classifiers capable of recognizing and classifying by learning, long-term memory and association. Unlike other human system inspired techniques like genetic algorithms and neural networks, AIS includes a range of algorithms modeling on different immune mechanism of the body. In this paper, a mechanism of a human immune system based on apoptosis is adopted to build an Intrusion Detection System (IDS) to protect computer networks. Features are selected from network traffic using Fisher Score. Based on the selected features, the record/connection is classified as either an attack or normal traffic by the proposed methodology. Simulation results demonstrates that the proposed AIS based on apoptosis performs better than existing AIS for intrusion detection.

Keywords: Apoptosis, Artificial Immune System (AIS), Fisher Score, KDD dataset, Network intrusion detection.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2144
922 A Structured Mechanism for Identifying Political Influencers on Social Media Platforms: Top 10 Saudi Political Twitter Users

Authors: Ahmad Alsolami, Darren Mundy, Manuel Hernandez-Perez

Abstract:

Social media networks, such as Twitter, offer the perfect opportunity to either positively or negatively affect political attitudes on large audiences. The existence of influential users who have developed a reputation for their knowledge and experience of specific topics is a major factor contributing to this impact. Therefore, knowledge of the mechanisms to identify influential users on social media is vital for understanding their effect on their audience. The concept of the influential user is related to the concept of opinion leaders' to indicate that ideas first flow from mass media to opinion leaders and then to the rest of the population. Hence, the objective of this research was to provide reliable and accurate structural mechanisms to identify influential users, which could be applied to different platforms, places, and subjects. Twitter was selected as the platform of interest, and Saudi Arabia as the context for the investigation. These were selected because Saudi Arabia has a large number of Twitter users, some of whom are considerably active in setting agendas and disseminating ideas. The study considered the scientific methods that have been used to identify public opinion leaders before, utilizing metrics software on Twitter. The key findings propose multiple novel metrics to compare Twitter influencers, including the number of followers, social authority and the use of political hashtags, and four secondary filtering measures. Thus, using ratio and percentage calculations to classify the most influential users, Twitter accounts were filtered, analyzed and included. The structured approach is used as a mechanism to explore the top ten influencers on Twitter from the political domain in Saudi Arabia.

Keywords: Twitter, influencers, structured mechanism, Saudi Arabia.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 466
921 Development of Roller-Based Interior Wall Painting Robot

Authors: Mohamed T. Sorour, Mohamed A. Abdellatif, Ahmed A. Ramadan, Ahmed A. Abo-Ismail

Abstract:

This paper describes the development of an autonomous robot for painting the interior walls of buildings. The robot consists of a painting arm with an end effector roller that scans the walls vertically and a mobile platform to give horizontal feed to paint the whole area of the wall. The painting arm has a planar twolink mechanism with two joints. Joints are driven from a stepping motor through a ball screw-nut mechanism. Four ultrasonic sensors are attached to the mobile platform and used to maintain a certain distance from the facing wall and to avoid collision with side walls. When settled on adjusted distance from the wall, the controller starts the painting process autonomously. Simplicity, relatively low weight and short painting time were considered in our design. Different modules constituting the robot have been separately tested then integrated. Experiments have shown successfulness of the robot in its intended tasks.

Keywords: Automated roller painting, Construction robots, Mobile robots, service robots, two link planar manipulator

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 6910
920 Customization of a Real-Time Operating System Scheduler with Aspect-Oriented Programming

Authors: Kazuki Abe, Myungryun Yoo, Takanori Yokoyama

Abstract:

Tasks of an application program of an embedded system are managed by the scheduler of a real-time operating system (RTOS). Most RTOSs adopt just fixed priority scheduling, which is not optimal in all cases. Some applications require earliest deadline first (EDF) scheduling, which is an optimal scheduling algorithm. In order to develop an efficient real-time embedded system, the scheduling algorithm of the RTOS should be selectable. The paper presents a method to customize the scheduler using aspectoriented programming. We define aspects to replace the fixed priority scheduling mechanism of an OSEK OS with an EDF scheduling mechanism. By using the aspects, we can customize the scheduler without modifying the original source code. We have applied the aspects to an OSEK OS and get a customized operating system with EDF scheduling. The evaluation results show that the overhead of aspect-oriented programming is small enough.

Keywords: aspect-oriented programming, embedded system, operating system, real-time system

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1777
919 Passive Non-Prehensile Manipulation on Helix Path Based on Mechanical Intelligence

Authors: Abdullah Bajelan, Adel Akbarimajd

Abstract:

Object manipulation techniques in robotics can be categorized in two major groups including manipulation with grasp and manipulation without grasp. The original aim of this paper is to develop an object manipulation method where in addition to being grasp-less, the manipulation task is done in a passive approach. In this method, linear and angular positions of the object are changed and its manipulation path is controlled. The manipulation path is a helix track with constant radius and incline. The method presented in this paper proposes a system which has not the actuator and the active controller. So this system requires a passive mechanical intelligence to convey the object from the status of the source along the specified path to the goal state. This intelligent is created based on utilizing the geometry of the system components. A general set up for the components of the system is considered to satisfy the required conditions. Then after kinematical analysis, detailed dimensions and geometry of the mechanism is obtained. The kinematical results are verified by simulation in ADAMS.

Keywords: Mechanical intelligence, Object manipulation, Passive mechanism, Passive non-prehensile manipulation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1223
918 Pyrethroid Resistance and Its Mechanism in Field Populations of the Sand Termite, Psammotermes hypostoma Desneux

Authors: Mai. M. Toughan, Ahmed A. A. Sallam, Ashraf O. Abd El-Latif

Abstract:

Termites are eusocial insects that are found on all continents except Antarctica. Termites have serious destructive impact, damaging local huts and crops of poor subsistence. The annual cost of termite damage and its control is determined in the billions globally. In Egypt, most of these damages are due to the subterranean termite species especially the sand termite, P. hypostoma. Pyrethroids became the primary weapon for subterranean termite control, after the use of chlorpyrifos as a soil termiticide was banned. Despite the important role of pyrethroids in termite control, its extensive use in pest control led to the eventual rise of insecticide resistance which may make many of the pyrethroids ineffective. The ability to diagnose the precise mechanism of pyrethroid resistance in any insect species would be the key component of its management at specified location for a specific population. In the present study, detailed toxicological and biochemical studies was conducted on the mechanism of pyrethroid resistance in P. hypostoma. The susceptibility of field populations of P. hypostoma against deltamethrin, α-cypermethrin and ƛ-cyhalothrin was evaluated. The obtained results revealed that the workers of P. hypostoma have developed high resistance level against the tested pyrethroids. Studies carried out through estimation of detoxification enzyme activity indicated that enhanced esterase and cytochrome P450 activities were probably important mechanisms for pyrethroid resistance in field populations. Elevated esterase activity and also additional esterase isozyme were observed in the pyrethroid-resistant populations compared to the susceptible populations. Strong positive correlation between cytochrome P450 activity and pyrethroid resistance was also reported. |Deltamethrin could be recommended as a resistance-breaking pyrethroid that is active against resistant populations of P. hypostoma.

Keywords: Psammotermes hypostoma, pyrethroid resistance, esterase, cytochrome P450.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1746
917 Control of Thermal Flow in Machine Tools Using Shape Memory Alloys

Authors: Reimund Neugebauer, Welf-Guntram Drossel, Andre Bucht, Christoph Ohsenbrügge

Abstract:

In this paper the authors propose and verify an approach to control heat flow in machine tool components. Thermal deformations are a main aspect that affects the accuracy of machining. Due to goals of energy efficiency, thermal basic loads should be reduced. This leads to inhomogeneous and time variant temperature profiles. To counteract these negative consequences, material with high melting enthalpy is used as a method for thermal stabilization. The increased thermal capacity slows down the transient thermal behavior. To account for the delayed thermal equilibrium, a control mechanism for thermal flow is introduced. By varying a gap in a heat flow path the thermal resistance of an assembly can be controlled. This mechanism is evaluated in two experimental setups. First to validate the ability to control the thermal resistance and second to prove the possibility of a self-sufficient option based on the selfsensing abilities of thermal shape memory alloys.

Keywords: energy-efficiency, heat transfer path, MT thermal stability, thermal shape memory alloy

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1881
916 Visualization of Latent Sweat Fingerprints Deposit on Paper by Infrared Radiation and Blue Light

Authors: Xiaochun Huang, Xuejun Zhao, Yun Zou, Feiyu Yang, Wenbin Liu, Nan Deng, Ming Zhang, Nengbin Cai

Abstract:

A simple device termed infrared radiation (IR) was developed for rapid visualization of sweat fingerprints deposit on paper with blue light (450 nm, 11 W). In this approach, IR serves as the pretreatment device before the sweat fingerprints was illuminated by blue light. An annular blue light source was adopted for visualizing latent sweat fingerprints. Sample fingerprints were examined under various conditions after deposition, and experimental results indicate that the recovery rate of the latent sweat fingerprints is in the range of 50%-100% without chemical treatments. A mechanism for the observed visibility is proposed based on transportation and re-impregnation of fluorescer in paper at the region of water. And further exploratory experimental results gave the full support to the visible mechanism. Therefore, such a method as IR-pretreated in detecting latent fingerprints may be better for examination in the case where biological information of samples is needed for consequent testing.

Keywords: Forensic science, visualization, infrared radiation, blue light, latent sweat fingerprints, detection.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1415
915 BTG-BIBA: A Flexibility-Enhanced Biba Model Using BTG Strategies for Operating System

Authors: Gang Liu, Can Wang, Runnan Zhang, Quan Wang, Huimin Song, Shaomin Ji

Abstract:

Biba model can protect information integrity but might deny various non-malicious access requests of the subjects, thereby decreasing the availability in the system. Therefore, a mechanism that allows exceptional access control is needed. Break the Glass (BTG) strategies refer an efficient means for extending the access rights of users in exceptional cases. These strategies help to prevent a system from stagnation. An approach is presented in this work for integrating Break the Glass strategies into the Biba model. This research proposes a model, BTG-Biba, which provides both an original Biba model used in normal situations and a mechanism used in emergency situations. The proposed model is context aware, can implement a fine-grained type of access control and primarily solves cross-domain access problems. Finally, the flexibility and availability improvement with the use of the proposed model is illustrated.

Keywords: Biba model, break the glass, context, cross-domain, fine-grained.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1107
914 Neuroplasticity: A Fresh Beginning for Life

Authors: Leila Maleki, Ezatollah Ahmadi

Abstract:

Neuroplasticity or the flexibility of the neural system is the ability of the brain to adapt to the lack or deterioration of sense and the capability of the neural system to modify itself through changing shape and function. Not only have studies revealed that neuroplasticity does not end in childhood, but also they have proven that it continues till the end of life and is not limited to the neural system and covers the cognitive system as well. In the field of cognition, neuroplasticity is defined as the ability to change old thoughts according to new conditions and the individuals' differences in using various styles of cognitive regulation inducing several social, emotional and cognitive outcomes. This paper attempts to discuss and define major theories and principles of neuroplasticity and elaborate on nature or nurture.

Keywords: Neuroplasticity, Cognitive plasticity, Plasticity theories, Plasticity mechanisms.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2472
913 The Effect of Social Structural Change on the Traditional Turkish Houses Becoming Unusable

Authors: Gamze Fahriye Pehlivan, Tulay Canitez

Abstract:

The traditional Turkish houses becoming unusable are a result of the deterioration of the balanced interaction between users and house (human and house) continuing during the history. Especially depending upon the change in social structure, the houses becoming neglected do not meet the desires of the users and do not have the meaning but the shelter are becoming unusable and are being destroyed. A conservation policy should be developed and renovations should be made in order to pass the traditional houses carrying the quality of a cultural and historical document presenting the social structure, the lifestyle and the traditions of its own age to the next generations and to keep them alive.

Keywords: House, social structural change, social structural, traditional Turkish houses.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1666
912 Identification of High Stress and Strain Regions in Proximal Femur during Single-Leg Stance and Sideways Fall Using QCT-Based Finite Element Model

Authors: H. Kheirollahi, Y. Luo

Abstract:

Studying stress and strain trends in the femur and recognizing femur failure mechanism is very important for preventing hip fracture in the elderly. The aim of this study was to identify high stress and strain regions in the femur during normal walking and falling to find the mechanical behavior and failure mechanism of the femur. We developed a finite element model of the femur from the subject’s quantitative computed tomography (QCT) image and used it to identify potentially high stress and strain regions during the single-leg stance and the sideways fall. It was found that fracture may initiate from the superior region of femoral neck and propagate to the inferior region during a high impact force such as sideways fall. The results of this study showed that the femur bone is more sensitive to strain than stress which indicates the effect of strain, in addition to effect of stress, should be considered for failure analysis.

Keywords: Finite element analysis, hip fracture, strain, stress.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2464
911 Incidence of Disasters and Coping Mechanism among Farming Households in South West Nigeria

Authors: Fawehinmi Olabisi Alaba, Adeniyi O. R.

Abstract:

Farming households faces lots of disaster which contribute to endemic poverty. Anticipated increases in extreme weather events will exacerbate this. Primary data was administered to farming household using multi-stage random sampling technique. The result of the analysis shows that majority of the respondents (69.9%) are male, have mean household size, years of formal education and age of 5±1.14, 6±3.41, and 51.06±10.43 respectively. The major (48.9%) type of disaster experienced is flooding. Major coping mechanism adopted is sourcing for support from family and friends. Age, education, experience, access to extension agent, and mitigation control method contribute significantly to vulnerability to disaster. The major adaptation method (62.3%) is construction of drainage.

The study revealed that the coping mechanisms employed may become less effective as increasingly fragile livelihood systems struggle to withstand disaster shocks. Thus there is need for training of the farmers on measures to adapt to mitigate the shock from disasters

Keywords: Adaptation, Disasters, Flooding, Vulnerability.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2076
910 The Removal of Cu (II) Ions from Aqueous Solutions on Synthetic Zeolite NaA

Authors: Dimitar Georgiev, Bogdan Bogdanov, Yancho Hristov, Irena Markovska

Abstract:

In this study the adsorption of Cu (II) ions from aqueous solutions on synthetic zeolite NaA was evaluated. The effect of solution temperature and the determination of the kinetic parameters of adsorption of Cu(II) from aqueous solution on zeolite NaA is important in understanding the adsorption mechanism. Variables of the system include adsorption time, temperature (293- 328K), initial solution concentration and pH for the system. The sorption kinetics of the copper ions were found to be strongly dependent on pH (the optimum pH 3-5), solute ion concentration and temperature (293 – 328 K). It was found, the pseudo-second-order model was the best choice among all the kinetic models to describe the adsorption behavior of Cu(II) onto ziolite NaA, suggesting that the adsorption mechanism might be a chemisorptions process The activation energy of adsorption (Ea) was determined as Cu(II) 13.5 kJ mol-1. The low value of Ea shows that Cu(II) adsorption process by zeolite NaA may be an activated chemical adsorption. The thermodynamic parameters (ΔG0, ΔH0, and ΔS0) were also determined from the temperature dependence. The results show that the process of adsorption Cu(II) is spontaneous and endothermic process and rise in temperature favors the adsorption.

Keywords: Zeolite NaA, adsorption, adsorption capacity, kinetic sorption

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2162
909 When Explanations “Cause“ Error: A Look at Representations and Compressions

Authors: Michael Lissack

Abstract:

We depend upon explanation in order to “make sense" out of our world. And, making sense is all the more important when dealing with change. But, what happens if our explanations are wrong? This question is examined with respect to two types of explanatory model. Models based on labels and categories we shall refer to as “representations." More complex models involving stories, multiple algorithms, rules of thumb, questions, ambiguity we shall refer to as “compressions." Both compressions and representations are reductions. But representations are far more reductive than compressions. Representations can be treated as a set of defined meanings – coherence with regard to a representation is the degree of fidelity between the item in question and the definition of the representation, of the label. By contrast, compressions contain enough degrees of freedom and ambiguity to allow us to make internal predictions so that we may determine our potential actions in the possibility space. Compressions are explanatory via mechanism. Representations are explanatory via category. Managers are often confusing their evocation of a representation (category inclusion) as the creation of a context of compression (description of mechanism). When this type of explanatory error occurs, more errors follow. In the drive for efficiency such substitutions are all too often proclaimed – at the manager-s peril..

Keywords: Coherence, Emergence, Reduction, Model

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1198
908 Exploiting Query Feedback for Efficient Query Routing in Unstructured Peer-to-peer Networks

Authors: Iskandar Ishak, Naomie Salim

Abstract:

Unstructured peer-to-peer networks are popular due to its robustness and scalability. Query schemes that are being used in unstructured peer-to-peer such as the flooding and interest-based shortcuts suffer various problems such as using large communication overhead long delay response. The use of routing indices has been a popular approach for peer-to-peer query routing. It helps the query routing processes to learn the routing based on the feedbacks collected. In an unstructured network where there is no global information available, efficient and low cost routing approach is needed for routing efficiency. In this paper, we propose a novel mechanism for query-feedback oriented routing indices to achieve routing efficiency in unstructured network at a minimal cost. The approach also applied information retrieval technique to make sure the content of the query is understandable and will make the routing process not just based to the query hits but also related to the query content. Experiments have shown that the proposed mechanism performs more efficient than flood-based routing.

Keywords: Unstructured peer-to-peer, Searching, Retrieval, Internet.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1492
907 Influence of After Body Shape on the Performance of Blunt Shaped Bodies as Vortex Shedders

Authors: Lavish Ordia, A. Venugopal, Amit Agrawal, S. V. Prabhu

Abstract:

The present study explores flow visualization experiments with various blunt shaped bluff bodies placed inside a circular pipe. The bodies mainly comprise of modifications of trapezoidal cylinder, most widely used in practical applications, such as vortex flowmeters. The present configuration possesses the feature of both internal and external flows with low aspect ratio. The vortex dynamics of bluff bodies in such configuration is seldom reported in the literature. Dye injection technique is employed to visualize the complex vortex formation mechanism behind the bluff bodies. The influence of orientation, slit and after body shape is studied in an attempt to obtain better understanding of the vortex formation mechanism. Various wake parameters like Strouhal number, vortex formation length and wake width are documented for these shapes. Vortex formation both with and without shear layer interaction is observed for most of the shapes.

Keywords: Flow visualization, Reynolds number, Strouhal number, vortex, vortex formation length, wake width.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2922
906 Consideration a Novel Manner for Data Sending Quality in Heterogeneous Radio Networks

Authors: Mohammadreza Amini, Omid Moradtalab, Ebadollah Zohrevandi

Abstract:

In real-time networks a large number of application programs are relying on video data and heterogeneous data transmission techniques. The aim of this research is presenting a method for end-to-end vouch quality service in surface applicationlayer for sending video data in comparison form in wireless heterogeneous networks. This method tries to improve the video sending over the wireless heterogeneous networks with used techniques in surface layer, link and application. The offered method is showing a considerable improvement in quality observing by user. In addition to this, other specifications such as shortage of data load that had require to resending and limited the relation period length to require time for second data sending, help to be used the offered method in the wireless devices that have a limited energy. The presented method and the achieved improvement is simulated and presented in the NS-2 software.

Keywords: Heterogeneous wireless networks, adaptation mechanism, multi-level, Handoff, stop mechanism, graceful degrades, application layer.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1626
905 Adjusting the Furnace and Converter Temperature of the Sulfur Recovery Units

Authors: Hamid Reza Mahdipoor, Hamid Ganji, Hamed Naderi, Hajar Yousefian, Hooman Javaherizadeh

Abstract:

The modified Claus process is commonly used in oil refining and gas processing to recover sulfur and destroy contaminants formed in upstream processing. A Claus furnace feed containing a relatively low concentration of H2S may be incapable of producing a stable flame. Also, incomplete combustion of hydrocarbons in the feed can lead to deterioration of the catalyst in the reactors due to soot or carbon deposition. Therefore, special consideration is necessary to achieve the appropriate overall sulfur recovery. In this paper, some configurations available to treat lean acid gas streams are described and the most appropriate ones are studied to overcome low H2S concentration problems. As a result, overall sulfur recovery is investigated for feed preheating and hot gas configurations.

Keywords: Sulfur recovery unit, Low H2S content

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4578
904 Impact of Government Spending on Private Consumption and on the Economy: The Case of Thailand

Authors: Paitoon Kraipornsak

Abstract:

Government spending is categorized into consumption spending and capital spending. Three categories of private consumption are used: food consumption, nonfood consumption, and services consumption. The estimated model indicates substitution effects of government consumption spending on budget shares of private nonfood consumption and of government capital spending on budget share of private food consumption. However, the results do not indicate whether the negative effects of changes in the budget shares of the nonfood and the food consumption equates to reduce total private consumption. The concept of aggregate demand comprising consumption, investment, government spending (consumption spending and capital spending), export, and import are used to estimate their relationship by using the Vector Error Correction Mechanism. The study found no effect of government capital spending on either the private consumption or the growth of GDP while the government consumption spending has negative effect on the growth of GDP.

Keywords: Complementary effect, government capital spending, government consumption spending, private consumption on food, nonfood, and services, substitution effect, vector error correction mechanism.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2140
903 An Evaluation Method of Accelerated Storage Life Test for Typical Mechanical and Electronic Products

Authors: Jinyong Yao, Hongzhi Li, Chao Du, Jiao Li

Abstract:

Reliability of long-term storage products is related to the availability of the whole system, and the evaluation of storage life is of great necessity. These products are usually highly reliable and little failure information can be collected. In this paper, an analytical method based on data from accelerated storage life test is proposed to evaluate the reliability index of the long-term storage products. Firstly, singularities are eliminated by data normalization and residual analysis. Secondly, with the preprocessed data, the degradation path model is built to obtain the pseudo life values. Then by life distribution hypothesis, we can get the estimator of parameters in high stress levels and verify failure mechanism consistency. Finally, the life distribution under the normal stress level is extrapolated via the acceleration model and evaluation of the actual average life is available. An application example with the camera stabilization device is provided to illustrate the methodology we proposed.

Keywords: Accelerated storage life test, failure mechanism consistency, life distribution, reliability.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2223
902 An Infrared Investigation on Surface Species over Iron-Based Catalysts: Implications for Oxygenates Formation

Authors: Wanyu Mao, Hongfang Ma, Haitao Zhang, WeixinQian, Weiyong Ying

Abstract:

The nature of adsorbed species on catalytic surface over an industrial precipitated iron-based high temperature catalyst during FTS was investigated by in-situ DRIFTS and chemical trapping. The formulation of the mechanism of oxygenates formation and key intermediates were also discussed. Numerous oxygenated precursors and crucial intermediates were found by in-situ DRIFTS, such as surface acetate, acetyl and methoxide. The results showed that adsorbed molecules on surface such as methanol or acetaldehyde could react with basic sites such as lattice oxygen or free surface hydroxyls. Adsorbed molecules also had reactivity of oxidizing. Moreover, acetyl as a key intermediate for oxygenates was observed by investigation of CH3OH + CO and CH3I + CO + H2. Based on the nature of surface properties, the mechanism of oxygenates formation on precipitated iron-based high temperature catalyst was discussed.

Keywords: Iron-based catalysts, intermediates, oxygenates, in-situ DRIFTS, chemical trapping.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1510