PREFACE - udn.vntapchikhcn.udn.vn/OrtherFile/2018_8_1_9_48_510so 6(127).2018.pdf · 2.3....
Transcript of PREFACE - udn.vntapchikhcn.udn.vn/OrtherFile/2018_8_1_9_48_510so 6(127).2018.pdf · 2.3....
PREFACE
In pursuance of the press restructuring approved by the Prime Minister and the
proposal made by the Ministry of Education and Training, the Ministry of Culture and
Information issued the Decision No 519/GP-BVHTT dated November 25th, 2002,
licensing the publication of the University of Danang journal entitled “Science and
Technology”.
The Press Bureau under the Ministry of Culture and Information issued the official
dispatch No 816/BC dated August 10th, 2006, permitting the University of Danang to
publish the “Science and Technology” every two months instead of every three months.
The National Scientific and Technological Information Centre under the Ministry
of Science and Technology issued the official dispatch No 44/TTKHCN-ISSN dated
February 6th, 2007, agreeing to grant an international standardized code, namely ISSN
1859-1531 to the UD journal “Science and Technology”.
The Press Bureau under the Ministry of Information and Communications issued
the official dispatch No 210/CBC of March 5th, 2008, allowing the UD journal “Science
and Technology” to be published in English and French in addition to the Vietnamese
publication.
On September 15th, 2011, the Ministry of Information and Communications issued
the Decision No 1487 /GP-BVHTT, granting an additional licence which permits the UD
journal “Science and Technology” to increase the publication period frequency from
every 2 months to every month and to raise the number of pages from 80 to 150 pages.
On January 7th, 2016, the Ministry of Information and Communications issued
Decision No 07 /GP-BVHTT, granting a print licence which permits the UD journal
“Science and Technology” to operate with a publication frequency of 15 issues per year
(of which 3 issues are published in English).
The UD journal “Science and Technology” has been established in view of
announcing and introducing scientific researches in the fields of teaching and training,
offering information on the domestic and foreign scientific research results that serve the
education in colleges and universities and propagating the State and Party’s guidelines
and policies in education and training as well as in scientific and technological researches.
Over the past 40 years, the UD journal “Science and Technology” has been
published as the continuity and development of the scientific information journals and
conference proceedings published at the University of Danang and its member
universities.
The journal’s editorial staff wishes to receive many-sided contributions of the
scientists and educators from within the university and from other colleges and
universities inside and outside the country so that the journal’s quality will be more and
more improved in the future.
Journal’s Editorial Staff
CONTENTS ISSN 1859-1531 – THE UNIVERSITY OF DANANG, JOURNAL OF SCIENCE AND TECHNOLOGY, NO. 6(127).2018
ENGINEERING AND TECHNOLOGY
Chemical composition of essential oil extracted from leaves of vitex negundo linn from Binh Thuan province by hydrodistillation and microwave hydrodistillation Nguyen Thi My Dung, Vo Thi Dieu Hoa, Do Thi My Lien, Phung Van Trung, Pham Hong Ngoc,
Le Ngoc Hung 1
A comparative analysis of passivity-based control approaches with application to linear dynamical systems Hoang Ngoc Ha 4
Performance analysis and assessment of a transformer different protection relay SEL387 at 110kV Lang Co substation Le Kim Hung, Vu Phan Huan 8
A study on the reductive dechlorination of chloroform with nano Fe/Cu bimetallic particles in aqueous solution Phan Kim Nguyen, Bui Xuan Vung 13
A study on CF3I-Ar and CF3I-Kr mixture gases substituting SF6 in high voltage equipments Tran Thanh Son, Do Anh Tuan 17
Evaluation of shear strength of reinforced concrete structural walls of ACI 318-14 and eurocodes Tran Anh Thien 21
Fully resolved simulation of the phase change process of a liquid drop Vu Van Truong, Truong Viet Anh, Tran Xuan Bo, Truong Van Thuan 26
Multi-period linearized optimal power flow model incorporating transmission losses and thyristor controlled series compensators Pham Nang Van, Le Thi Minh Chau, Pham Thu Tra My, Pham Xuan Giap, Ha Duy Duc, Tran Manh Tri 31
NATURAL SCIENCES
Applying semismooth newton method to find fixed points of nonsmooth functions of one variable Pham Quy Muoi, Phan Quang Nhu Anh, Duong Xuan Hiep, Phan Duc Tuan 37
Polynomial solution of descriptor system Le Hai Trung 41
Fast gaussian distribution based adaboost algorithm for face detection Tuan M. Pham, Hao P. Do, Danh C. Doan, Hoang V. Nguyen 45
SOCIAL SCIENCES
The empirical study about e-CRM: a case study of Vietnam Airlines Nguyen Thi Khanh Chi 51
Teachers’ perception towards the use of ict in Vietnam: using activity theory to identify contradictions Huynh Ngoc Mai Kha, Pham Thi To Nhu 55
Improving structures of students’ argumentative essays through genre pedagogy Dinh Thanh Liem 59
The use of sociolinguistically rich pedagogical dialogues in teaching conversational English Nguyen Ngoc Nhat Minh 64
ISSN 1859-1531 - THE UNIVERSITY OF DANANG, JOURNAL OF SCIENCE AND TECHNOLOGY, NO. 6(127).2018 1
CHEMICAL COMPOSITION OF ESSENTIAL OIL EXTRACTED FROM LEAVES
OF VITEX NEGUNDO LINN. FROM BINH THUAN PROVINCE BY
HYDRODISTILLATION AND MICROWAVE HYDRODISTILLATION
Nguyen Thi My Dung1, Vo Thi Dieu Hoa4, Do Thi My Lien2, Phung Van Trung3
Pham Hong Ngoc4, Le Ngoc Hung4,* 1National University HCM City, Ho Chi Minh City; [email protected]
2Sai Gon University, Ho Chi Minh City; [email protected], 3Institute of Chemical Technology, Vietnam Academy of Science and Technology
4Center for Research and Technology Transfer, Vietnam Academy of Science and Technology.
[email protected], [email protected], [email protected],
Abstract - Essential oils from fresh and dry leaves of Vitex negundo (HD-Fresh, HD-Dry) were obtained by traditional hydrodistillation (HD) and microwave-assisted hydrodistillation (MHD) (MHD-Fresh, MHD-Dry). The chemical constituents of essential oil of leaves are analyzed by GC/MS technique. The results indicate that the major compound of four essential oil contains the same dominant
components β-caryophyllen (23.5%, 16.3%, 16.4% and 16.8%), eremophilene (18.9%, 15.1%, 14.4% and 14.2%), eucalyptol (16.2%, 16.3%, 13.6% and 19.6%), α-terpinyl acetate (10.8%, 7.6%, 9.2% and 8.8%), and sabinene (7.3%, 8.6%, 8.5% and 10.3%), respectively in oils obtained by MHD, HD from fresh leaves, MHD and HD from dry leaves. The total amount of sesquiterpenoid hydrocarbons (51.5% and 45.3%) is higher than monoterpenoids (44.8% and 43.5%) in essential oil obtained by MHD, respectively in oils from fresh and dry leaves. In contrast, the essential oil obtained by HD shows the greater concentration of monoterpenoids (45.3% and 53.6%) than sesquiterpenoids (44.3% and 41.0%), respectively in oils from fresh and dry leaves. By using MHD method, it is superior in terms of saving energy and extraction time although the total composition decreases with this method.
Key words - Vitex negundo; essential oil; microwave-assisted hydrodistillation; GC/MS; hydrodistillation.
1. Introduction
Essential oils are composed of a wide range of bioactive
chemical compounds. They traditionally found application
as flavour, fragrances and medicinal aroma. Vitex negundo
Linn. belonging to Verbenaceae family is an important
herb with a broad spectrum of pharmacological activities,
medicinal properties and applications. Its essentional oil
extract has been analyzed elsewhere [1].
All parts of the Vitex negundo are used as medicine,
however, the leaves are specially considered to be the most
potent for the isolation of medicinal constituents. It has
been used for the treatment of eye-disease, inflammation,
leucoderma, and toothache, skin-ulcers, in catarrhal fever,
rheumatoid arthritis, gonorrhea, sinuses and bronchitis [2].
The main techniques to obtain essential oils from the
medicinal herbs are hydrodistillation (HD), steam
distillation, steam and water distillation, maceration,
expression. Among these techniques, HD has been the
most common method to extract the essential oils from
plants. The HD method has several drawbacks such as long
extraction time, high energy use and so on. Hence, in order
to increase the extraction yield, save energy and time
extraction, new approaches are improving. In recent years,
the use of microwave-assisted hydrodistillation (MHD)
method has been increasing, especially for extraction [3],
[4]. By using microwave energy, the materials reach their
boiling point rapidly, leading to short extraction or
distillation time and saving energy.
Based on using Vitex negundo as flavor and medicinal
products, the aim of this study is to compare and evaluate
HD and MHD for their effectiveness in the extraction of
essential oils leaves, and to determine and compare the
composition of the essential oil obtained by HD and MHD.
2. Experiment
2.1. Plant materials
The fresh plants of Vitex negundo were collected in
Binh Thuan province, Vietnam. One part of the healthy
matured leaves of V. negundo is thoroughly washed with
distilled water, dried by centrifuge, preserved in low
temperature fridge of 50C and finally cut into small pieces
of 3 mm before hydrodistillation. The second part is also
thoroughly washed with distilled water, shade dried in dust
free condition for 2 weeks and finally cut into small pieces
of 3 mm before hydrodistillation. Moisture content of the
sun-dried samples is measured by a moisture analyzer.
2.2. Hydrodistillation (HD)
The Vitex negundo leaves (300 g fresh sample versus
300 g dried sample) are placed in a 1L round bottom flask
and connected to a Clevenger-type apparatus. The
evaporation is condensed by a condenser combined with a
chiller at 10oC. Hydrodistillation is completed for 2hs. after
boiling. The Vitex negundo hydrodistillation oil is
collected after water separation, stored in a culture tube.
2.3. Microwave-assisted hydrodistillation (MHD)
First MHD of 300 g fresh Vitex negundo leave sample
is carried out without adding water in a 1L glass tube flask
put in a special MHD equipment (Milestone ETHOS X,
Italia). Second experiment used 300 g dried sample with
adding 250 ml distilled water in the same glass tube flask
and MHD equipment. Parameter setting is microwave
energy of 1800W, running time of 20 mins, condensation
temperature at 10oC. The Vitex negundo oil is collected
using separation funnel and stored in culture tube.
2.4. GC/MS analysis
GC/MS data is obtained on the Gas Chromatography-
Mass Spectrometry (GC/MS: SCION 456 equipped SQ
mass spectrometer) using RXi5-ms (30 m×0.25 mm, film
2 Nguyen Thi My Dung, Vo Thi Dieu Hoa, Do Thi My Lien, Phung Van Trung, Pham Hong Ngoc, Le Ngoc Hung
thickness 0.25 µm). The mass range is 50 to 500 amu.
Carrier gas is nitrogen at a linear flow rate of 1.5 ml/min;
injector volume for all samples is 0.1μl. Temperature
programming is from 50ºC to 280ºC. Column oven
temperature is held isothermal at 50ºC for 3 minutes then
heated at 35ºC/min to 100ºC, again it is heated at 7ºC/min
to 220ºC, continue heat at 50C/min to 2800C and is held
isothermal for 3 minutes. The total program time of the
instrument is 34.57 min. The injector and detector
temperatures are 270ºC and 280ºC respectively. The oil is
injected neat with split injection mode having split ratio of
1:50. Quantitative results are mean data derived from GC
analysis. The final confirmation of constituents is made by
computer matching of the mass spectra of peaks with the
Wiley and NIST libraries mass spectral databases. Relative
amounts of individual components are based on GC peak
areas [5].
3. Results and discussion
Sensory properties and yield of Vitex negundo leaf
oils: The moisture content of all dried Vitex negundo leaves
after sun drying is around 13.8 %. The essential oils from the
Vitex negundo leaf obtained by (MHD) and classical
hydrodistillation (HD) are compared in terms of yield and
chemical composition. All the essential oils are pale yellow
liquids with strong characteristic odor and dried over
anhydrous Na2SO4. The HD dry leaves essential oil has
strongest odor. The essential oils obtained by HD give a
yield of 0.05 % and 0.35 % (w/w) on a dry weight basis from
fresh and dry leaves, respectively. When extracted by MHD
0.04 % and 0.30 % (w/w) on a dry weight basis are obtained
for fresh and dry leaves, respectively. Each of the extract is
stored in a sealed glass bottle in a refrigerator until analysis.
The data shows that MHD technique produces lower oil
yield in comparison to HD.
Chemical analysis of Vitex negundo leaf oils
The chemical composition of the essential oils achieved
from leaves Vitex negundo collected from two methods
(microwave-assisted hydrodistillation and hydrodistillation)
are represented together with the retention time in Table 1.
The GC–MS analyses of four samples reveal the presence of
a total of 30 components including monoterpenoids
(44.78%, 43.50%, 45.25% and 53.62), sesquiterpenoids
(51.50%, 44.40%, 43.46% and 40.48) and diterpenoids
(3.72 %, 10.45%, 8.22% and 5.00) from MHD (fresh and dry
leaves) and HD (fresh and dry leaves), respectively. This
result shows the major component of essential oil obtained
by MHD is sequiterpenes, but monoterpenoids is the main
compounds in essential oil obtained by HD method.
From Table 1, it is clearly found that there are
significant differences in the essential oils composition
isolated by two methods (HD and MHD). The essential oil
using MHD for dry leaves detects 30 compounds and then
22 compounds for dry and fresh leaves, while 27 and 29
compounds are detected in HD method for dry and fresh
leaves, respectively.
According to results in current study, the major
compounds are found to be β-caryophyllen (23.5%,
16.3 %, 16.4%, and 16.8%), eremophilene (18.9%, 15.1%,
14.4%, and 14.2%), eucalyptol (16.2%, 16.3%, 13.6% and
19.6%), α-terpinyl acetate (10.8%, 7.6%, 9.2% and 8.8%),
and sabinene (7.3%, 8.6%, 8.5%, and 10.3%) in oils
obtained by MHD, HD from fresh leaves, MHD and HD
from dry leaves, respectively. The major compound in
essential oil obtained by MHD from fresh leaves and HD
from fresh leaves is β-caryophyllen, but eucalyptol is the
major compound in essential oil obtained by HD from dry
leaves. Moreover, β-caryophyllen is the highest (23.5%) in
oils extract from fresh leaves by MHD method. It has
shown anti-bacterial activities by similar chemical
composition [1] and anti-inflammatory [6] and anesthetic
[7] effects.
While the total number of compounds in fresh leaves
essential oil achieved from MHD is less than that from HD
and the oil yield is lower than HD method, the total number
of compounds in dry leaves essential oil from MHD is
more than from HD method. MHD method is important in
terms of saving energy and extraction time (20 min
compared to 120 min with HD method) and the essential
oil with higher content of monoterpenes exhibits better
antibacterial activities [8].
Figure 1. Total ion chromatogram (obtained by GC-MS
analysis) of the Vitex negundo from fresh leave essential
oil extracted by HD method
Table 1. The retention times and chemical composition of
essential oils of Vitex negundo
No RT* Compound
%
MHD
Fresh
HD
Fresh
MHD
Dry
HD
Dry
1 4.68 3- carene 0.88
±0.21
1.87
±0.20
1.64
±0.20
2.32
±0.20
2 5.44 sabinene 7.34
±0.89
8.56
±0.75
8.53
±0.91
10.34
±0.85
3 5.53 (-)-β-pinene - 0.67
±0.20
0.70
±0.29
0.84
±0.31
4 5.75 β-myrcene - 0.51
±0.12
0.57
±0.19
0.57
±0.05
5 6.43 α-terpinene - - 0.35
±0.11
0.52
±0.17
6 6.79 β-phellandrene 3.74
±0.37
3.73
±0.32
3.88
±0.43
4.33
±0.35
ISSN 1859-1531 - THE UNIVERSITY OF DANANG, JOURNAL OF SCIENCE AND TECHNOLOGY, NO. 6(127).2018 3
7 6.86 eucalyptol 16.21±
0.56 16.29
13.57
±0.44
19.57
±0.63
8 7.25 β-ocimene 0.63
±0.11
0.44
±0.23
0.69
±0.20
0.62
±0.32
9 7.61 γ-terpinene 0.71
±0.73
0.48
±0.94
0.73
±0.76
0.98
±0.84
10 8.90 β-linalool 0.70
±0.39
0.45
±0.32
0.62
±0.28
0.72
±0.34
11 11.56 δ-terpineol 0.57
±0.17
0.48
±0.20
0.36
±0.05
0.53
±0.12
12 12.02 (-)-terpinen-4-
ol
2.04
±0.20
1.95
±0.07
1.26
±0.17
2.07
±0.12
13 12.55 terpineol 1.16±
0.78
1.26
±0.67
0.88
±0.52
1.37
±0.72
14 15.43 lavandulol
acetate -
0.43
±0.03
0.46
±0.10 -
15 16.73 α-terpinyl
acetate
10.81
±1.01
7.55
±0.85
9.24
±0.92
8.83
±0.83
16 18.28 β-caryophyllen 23.50
±0.86
16.33
±0.55
16.42
±0.34
16.79
±0.65
17 18.95 α-caryophyllen 1.16
±0.52
0.72
±0.47
0.97
±0.77
0.73
±0.44
18 19.70 eremophilene 18.92
±0.39
15.09
±0.20
14.37
±0.25
14.20
±0.18
19 19.86 (+)-
bicyclogemacrene
2.34
±0.20
1.38
±0.12
2.05
±0.09
1.50
±0.21
20 21.65 caryophyllene
oxide
0.54
±0.19
1.26
±0.16
0.75
±0.34
0.50
±0.42
21 23.07 α-cadinol 0.55
±0.42
1.14
±0.54
1.24
±0.39
0.90
±0.57
22 27.62 cambrene 0.69
±0.77
0.87
±0.64
1.41
±0.86
0.56
±0.43
23 28.78 widdrol 4.50
±0.20
6.68
±0.89
8.59
±0.75
5.86
±0.38
24 28.94 geranyl-α-
terpinene
0.66
±0.23
1.11
±0.20
1.73
±0.15
0.88
±0.26
25 29.14 α-guainene - 0.88
±0.03
0.91
±0.12
0.50
±0.03
26 29.47 epimanool - 0.55
±0.01
0.48
±0.02 -
27 29.60 cis-3,14-
clerodadien-13-ol
0.53
±0.54
2.41
±0.81
2.10
±0.72
1.20
±0.71
28 30.26 kaur-15-ene 1.85
±0.98
1.97
±1.20
4.33
±1.01
2.37
±1.00
29 30.86 phenanthrene - 1.71
±0.54
0.73
±0.51
0.40
±0.47
30 31.94 kolavelool - 0.43
±0.30
0.40
±0.41 -
Monoterpenoids 44.78 44.66 43.50 53.62
Sesquiterpenoids 51.50 42.59 44.40 40.48
Diterpenoids 3.72 7.33 10.45 5.00
Total percentage 94.44 83.37 85.74 90.28
Yeild (%) (w/w) 0.04 0.05 0.3 0.35
Extraction time (mins) 20 120 20 120
*RT: Retention time
4. Conclusion
With MHD method, time extraction is significantly
shorter than with HD method. MHD results in a reduced
extraction time and a substantial energy saving compared
to the conventional HD technique. After 20 minutes of
MHD extraction, it is possible to collect almost all the
existing essential oils of the Vitex negundo leaves.
However, the essential oils achieved from the two
methods have a strong characteristic odor and the essential
oil obtained by HD from dry leaves is the strongest. This
probably causes headache when we smell it for a long time.
In the future, the study on the composition contributing to
this strong characteristic odor will continue.
REFERENCES
[1] Khokra S. L., Prakash O., Jain S., Aneja K.R. and Yogita D., Essential Oil Composition and Antibacterial Studies of Vitex
negundo Linn. Extracts, Indian Journal of Pharmaceutical Sciences,
70(4), 522-526, (2008).
[2] Ladda PL. and Magdum CS, Vitex negundo Linn.: Ethnobotany,
Phytochemistry and Pharmacology- A Review, International
Journal of Advances in Pharmacy, Biology and Chemistry, 1(1),
111-120, (2012).
[3] Golmakani M. T., Rezaei K., Comparison of microwave-assisted
hydrodistillation with the traditional hydrodistillation method in the
extraction of essential oils from Thymus vulgaris L. Food Chem 109, 925–930, (2008).
[4] Khanavi M, Hajimehdipoor H, Emadi F, Kalantari Khandani N.,
Essential oil compositions of Thymus kotschyanus Boiss. Obtained
by hydrodistillation and microwave oven distillation. J. Essent Oil
Bear Plants 16,117–122, (2013).
[5] Adams R. P., Identification of essential oil components by gas
chromatography/ mass spectroscopy. Allured Publishing Corporation, Carol Stream. (1995).
[6] Marin S., Padilla E., Ocete M.A., Galvez J., Jimenez J., Zarzuelo A.,
Anti-inflammatory activity of the essential oil of Bupleurum
fruticescens, Planta Med. 59(6), 533-536, (1993).
[7] Ghelardini C., Galeotti N., Di Cesare Mannelli L., Mazzanti G.,
Bartolini A. Local anaesthetic activity of β-caryophyllene, Farmaco.
56, 387-389, (2001).
[8] Medeiros J. R., Campos LB, Mendonça SC, Davin LB, Lewis NG.
Composition and antimicrobial activity of the essential oils from invasive species of the Azores, Hedychium gardnerianum and
Pittosporum undulatum. Phytochemistry, 64,561-565, (2003).
(The Board of Editors received the paper on 03/4/2018, its review was completed on 26/4/2018)
4 Hoang Ngoc Ha
A COMPARATIVE ANALYSIS OF PASSIVITY-BASED CONTROL
APPROACHES WITH APPLICATION TO LINEAR DYNAMICAL SYSTEMS
Hoang Ngoc Ha
Duy Tan University; [email protected]
Abstract - This study focuses on linear dynamical systems whose dynamics are affine in the control input. Such dynamics are extensively considered to be rewritten into a canonical form, namely the passive port-Hamiltonian representation in order to further explore some structural properties such as interconnection and damping matrices, Hamiltonian storage function and dissipation term. On this basis, the passivity-based control design approaches including proportional controller and energy shaping controller are proposed for the purpose of stabilization. Interestingly, the energy shaping controller seems to be better since the controller gain accepts a larger domain of validity and can even be negative. A mass-spring-damper system is used to illustrate the proposed approach. Besides, numerical simulations are included in both the open loop and closed loop to compare the results.
Key words - Port-Hamiltonian representation; modeling; passivity-based control; proportional controller; energy shaping controller.
1. Introduction
This paper deals with the port-based modeling of
general nonlinear dynamical systems [1–3] whose
dynamics are described by a set of Ordinary Differential
Equations (ODEs) and affine in the input u as follows:
( ) ( ) ; ( 0) init
dxf x g x u x t x
dt= + = = (1)
where ( )x x t= is the state vector in the operating region
nD ; ( ) nf x expresses the smooth (nonlinear)
function with respect to the vector field x . The input-state
map and the control input are represented by ( ) nxmg x
and mu , respectively. It is worth noting that many
industrial applications of electrical, mechanical or
biochemical engineering belong to this kind of systems [4–7].
Many control methodologies have been developed for
the stabilization of the system (1) at a desired set-point *x .
This is for instance the case for sliding mode control,
adaptive control and model predictive control, etc. to cite a
few. Recently, passivity-based control (PBC) methodology
which is recognized as an extension of Lyapunov approach
has attracted much attention from researchers and
practitioners. In the PBC framework, it is always important
to transfer the (original) dynamics (1) to the
port-Hamiltonian (pH) representation prior to developing
state feedback laws for control [6, 8]. The control design and
control scenarios proposed for the simulations are main
contributions of this work.
This paper is organized as follows. Section 2 gives a
brief overview of the pH representation of (affine)
dynamical systems. Section 3 is devoted to the case study
of a mass-spring-damper system modeled within pH
framework. Passivity-based control designs (including
proportional controller and energy shaping controller) and
comparative simulations are given in Section 4. Section 5
ends the paper with some concluding remarks.
Notations: The following notations are considered
throughout the paper:
• is the the set of real number.
• is the matrix transpose operator.
• m and n ( m n ) are the positive integers.
• *x is the set-point.
• initx is the initial value of the state vector.
2. The passive port-Hamiltonian (pH) representation
Assume that if the function ( )f x verifies the so-called
separability condition [7, 9], that is, ( )f x can be
decomposed and expressed as the product of some
(interconnection and damping) structure matrices and the
gradient of a potential function with respect to the state
variables, i.e., the co-state variables:
( ) ( ) ( )( )H x
f x J x R xx
= −
(2)
where ( )J x and ( )R x are the n n skew-symmetric
interconnection matrix (i.e., ( ) ( )J x J x
= − ) and the
n n symmetric damping matrix (i.e., ( ) ( )R x R x
= ),
respectively while ( ) : nH x → represents the
Hamiltonian storage function of the system (possibly
related to the total energy of the system). Furthermore, if
the damping matrix ( )R x is positive semi-definite,
( ) 0R x (3)
Then, the original dynamics described by (1) is said to be
a pH representation with dissipation [4, 5]. Equation (1) is
then rewritten as follows:
( ) ( )( )
( )
( )( )
H xx J x R x g x u
x
H xy g x
x
= − +
=
(4)
where y is the output.
It can be clearly seen for the pH models defined by (3)
(4) that the time derivative of the Hamiltonian storage
function ( )H x satisfies the energy balance equation [5]
below:
( ) ( )( )
( )dH x H x H xR x u y
dt x x
= − +
(5)
ISSN 1859-1531 - THE UNIVERSITY OF DANANG, JOURNAL OF SCIENCE AND TECHNOLOGY, NO. 6(127).2018 5
Thanks to (3), (5) becomes:
( )
supplied power
stored power
TdH x
u ydt
(6)
From a physical point of view, inequality in (6) implies that
the total amount of energy supplied from external source is
always greater than the increase in the energy stored in the
system. Also, equality in (6) holds only if the damping
matrix ( )R x , which is strongly related to the dissipation
term, is equal to 0. Hence, the pH system (4) is said to be
passive with input u and output y corresponding to the
Hamiltonian storage function ( )H x [3]. This is one of
advantageous features of the pH representation and has
been applied to the control design, even for the stabilization
of infinite dimensional systems (see, e.g. [10, 11]).
We shall not elaborate any further on the pH
representation here (for example, the concepts related to
the cyclopassive/ passive property or Dirac structure, etc.)
and refer the reader to [4, 6, 9] for more information.
3. A case study: Mass-spring-damper system
To illustrate the concepts proposed in Section 2, we
illustrate our main points with a simple case study, which
is the mass-spring-damper system. Originally, the port
Hamiltonian representation has been first considered for
electrical or mechanical systems as seen in the literature
(see, e.g. [2, 12]).
Buildings or suspension structure of a vehicle traveling
over a bumpy road can be modeled as a mass-spring-damper
system in a vertical position1 as shown in Figure 1 [12].
Figure 1. A mass-spring-damper system
The following equation is derived using Newton's
second law [14]2:
( )( )
( )2
2
d z t dz tM F kz t c
dtdt= − − (7)
where:
• M is the mass of the body;
• F is the external force;
• k is the stiffness constant of the (linear) spring;
1 Fixed-base or base-excited configuration [13] can be handled similarly. 2 This belongs to the so-called (generalized) Euler-Lagrange equations of classical mechanics [2]. Equation (7) is still valid even in the presence of
friction where the friction force is assumed to be proportional to the velocity.
• c is the damping constant.
Let x be the vector consisting of the position ( )z t and the
momentum of the body ( )
,dz t
Mdt
i.e.
( ) ( )( )
1 2, , ,dz t
x x x z t Mdt
=
(7) can be rewritten as
follows:
11
22
0 1 0
1 1
dxkx
dtFx
dx cM
dt
= + − −
(8)
The system dynamics (8) lead to a pH representation (4)
with:
( )0 1
1 0J x
=
− (9)
( )0 0
0R x
c
=
(10)
( )0
,1
g x u F
= =
(11)
( )2
dz txy
M dt= (the velocity) (12)
and, ( )2
2 2
1
1 1
2 2
xH x kx
M= + (13)
In this case, the Hamiltonian storage function ( )H x (13)
is equal to the total energy of the system, (i.e., it
characterizes the amount of the elastic potential energy of
the spring and the kinetic energy of the body, respectively).
It therefore has the unit of energy. The damping matrix
( )R x (10) is symmetric and positive semi-definite.
Remark 1. The system states 1x and 2x converge to the
nonzero values at steady state (i.e., *
1
Fx
k= and
*
2 0x = ) if
F is different from 0.
Remark 2. As an analogy between mechanical and
electrical systems [15], it is worth noting that a second
order ordinary differential equation of the series RLC
circuit operated under a voltage source ( )V t can be written
as follows:
( ) ( )( )
( )2
2
1d i t di t dV tL R i t
dt C dtdt+ + = where ( )i t is the
electric current. This is clearly equivalent to (7) in some
sense.
6 Hoang Ngoc Ha
4. Passivity-based control design and simulations
4.1. The proportional controller design
Let us state the following proposition.
Proposition 1. Under a zero state detectability condition3
and the boundedness from below of the Hamiltonian storage
function ( )H x by 0, it follows that an explicit proportional
static output feedback law of the form
pu K y= − (14)
with y given by (12) and 0pK a so-called damping
injection gain, renders the controlled pH system (4) with
(9)–(13) dissipative and therefore asymptotically stabilized
at the (singular) equilibrium ( )* 0,0x
= 4.
Proof. From (6) and (14), one obtains:
( )0p
dH xy K y
dt
The proof is followed immediately by invoking La
Salle's invariance principle [1, 6]. A complete version of
the proof can be found in [11].
Remark 3. The convergence speed of the controlled
system goes faster by increasing the controller gain pK .
Better performance of the controller can be proposed with
the gain pK which is derived from the Ziegler-Nichols
tuning method.
4.2. The energy shaping controller design
Proposition 2. A state feedback law
*
1 1
1 1u x k x
K K
= − + +
(15)
with 1
0kK
+
asymptotically stabilizes the system (4)
with (9)–(13) at the (nonsingular) equilibrium ( )* *
1 ,0x x
= .
Proof. From (15), we consider 1
1
( )adH xu
dx− which
leads to 2 *
1 1 1 1
1 1( )
2aH x x k x x
K K
= − +
. On the other hand,
let ( )dH x be the (closed-loop) Hamiltonian storage
function, i.e., 1( ) ( ) ( )d aH x H x H x= + 5. We can easily
check that the function ( )dH x admits a global minimum
at ( )* *
1 ,0x x= since its Hessian matrix
10
01
0
kK
M
+
3 This condition is a version weaker than the observability condition. 4 If a nonzero equilibrium ( )* *
1 ,0x x= is considered as desired set-point, the proposed result can also be deduced similarly using a coordinate
transformation given by *x x x= − .
5 Hence, the open loop Hamiltonian storage function has been shaped by 1( )aH x to become ( )dH x .
6 It can be shown that the damping factor 1
2
c
kM equals 0.2. The open loop system is therefore underdamped.
and the time derivative
2
2( )
0ddH x xc
dt M
= −
. The latter
completes the proof.
4.3. Numerical simulations
The simulations are carried out using MATLAB &
SIMULINK. The model parameters are given with
0.25k = (N/m), 0.5c = (N/(m.s)) and 6.25M = (kg)
(see also [13])6. The input force imposed on the system is
a unit step, i.e., ( ) ( )u t S t= where ( )S t is the unit step
function. The initial conditions are chosen to be
1 1,( 0) 3initx t x= = = and 2 2,( 0) 0initx t x= = = . Figure 2
shows the time evolutions of the states and the storage
function. It is shown that the storage function is bounded
from below by a positive scalar since steady states are
different from 0 (see (13) and Remark 1).
Figure 2. The states and storage function w.r.t. time
In what follows, without loss of generality we propose
to stabilize the system at the natural equilibrium
( )* 0,0x
= . The closed loop simulations with the
proportional feedback law (14) are implemented with
0.1pK = which is derived from the Ziegler-Nichols tuning
method. On the other hand, the stability condition for the
gain K of the energy shaping controller (15) is either
0K or 14K
k − = − . Let us choose 10K = − so that
1pK
K= for the purpose of comparisons. Since the
controlled Hamiltonian storage functions converge to 0 as
t →+ (Figure 3), it implies that the system (4) with
(9)–(13) is globally stabilized with (14) and (15) (see the
closed loop phase plane in Figure 4). In both cases, the
global convergence of the controlled states x to x* is
ISSN 1859-1531 - THE UNIVERSITY OF DANANG, JOURNAL OF SCIENCE AND TECHNOLOGY, NO. 6(127).2018 7
guaranteed. However, the exponential spiral orbit via (15)
is embedded by the orbit generated by (14) (i.e., it seems
to be better for the practical implementations). In addition,
the manipulated inputs u given by (14) and (15) are
physically admissible in terms of amplitude and dynamics
as seen in Figure 5.
Figure 3. The controlled Hamiltonian storage function
Figure 4. The closed loop phase plane
Figure 5. The manipulated input w.r.t. time
5. Conclusion
In this paper, a mass-spring-damper system is used to
introduce the so-called port-Hamiltonian representation. In
this presentation, some structural properties such as
interconnection and damping matrices, Hamiltonian storage
function and dissipation term are highlighted from a physics
point of view. The feedback designs (including proportional
controller and energy shaping controller) and control
scenarios proposed for the comparisons are main
contributions of the paper. Interestingly, the energy shaping
controller seems to be better for the practical implementations
since the controller gain accepts a larger domain of validity
and can even be negative. It remains now to adapt the
proposed results to nonlinear multiphysics multiscale systems.
REFERENCES
[1] H.K. Khalil, Nonlinear systems. Prentice Hall, Upper Saddle River,
3rd edition, 2002.
[2] R. Ortega, A. Loría, P.J. Nicklasson, and H. Sira-Ramírez, Passivity-
based control of Euler-Lagrange systems: Mechanical, electrical and
electromechanical applications. Springer London, 1st edition, 1998.
[3] A. Van der Schaft, L2-gain and passivity techniques in nonlinear
control. Springer, 3rd edition, 2017.
[4] B. Maschke, R. Ortega, and A. Van der Schaft, “Energy-based
Lyapunov functions for forced Hamiltonian systems with dissipation”, IEEE Transactions on Automatic Control, 45(8), pp.
1498-1502, 2000.
[5] R. Ortega, A. Van der Schaft, I. Mareels, and B. Maschke”,Putting
energy back in control”, IEEE Control Syst.Mag., 21(2), pp. 18-33, 2001.
[6] R. Ortega, A. Van der Schaft, B. Maschke, and G. Escobar,
“Interconnection and damping assignment passivity-based control
of port-controlled Hamiltonian systems”, Automatica, 38(4), pp. 585-596, 2002.
[7] M. Guay, and N. Hudon, “Stabilization of nonlinear systems via
potential-based realization”, IEEE Transactions on Automatic
Control, 61(4), pp. 1075-1080, 2016.
[8] T.S. Nguyen, N.H. Hoang, and M.A. Hussain. “Feedback
passivation plus trackingerror-based multivariable control for a class of free-radical polymerization reactors”, Int. J. of Control, 2018.
https://doi.org/10.1080/00207179.2017.1423393
[9] H. Hoang, D. Dochain, F. Couenne, and Y. Le Gorrec, “Dissipative
pseudo-Hamiltonian realization of chemical systems using
irreversible thermodynamics”, Mathematical and Computer Modelling of Dynamical Systems, 23(2), pp. 135-155, 2017.
[10] A.A. Alonso, and B.E. Ydstie, “Stabilization of distributed systems
using irreversible thermodynamics”, Automatica, 37(11), pp. 1739-
1755, 2001.
[11] N.H. Hoang, and D.T. Phan, “Nonlinear control of temperature profile
of unstable heat conduction systems: A port-Hamiltonian approach”,
Journal of Computer Science and Cybernetics, 32(1), pp. 61-74, 2016.
[12] C. Batlle, “Passive control theory I and II”, II EURON/GEOPLEX
Summer School on Modeling and Control of Complex Dynamical Systems, July 18-22, 2005, Bertinoro, Italy.
[13] R.G. Longoria, “Modeling and experimentation: Massspring-
damper system dynamics”, Department of Mechanical Engineering,
The University of Texas at Austin, July 20, 2014.
[14] M.W. McCall, Classical mechanics: From Newton to Einstein - A
modern introduction. Wiley, 2nd edition, 2010. ISBN:
9780470715741
[15] F.A. Firestone, “A new analogy between mechanical and electrical
systems”, The Journal of the Acoustical Society of America, 4(3), pp. 249-267, 1933.
(The Board of Editors received the paper on 29/01/2018, its review was completed on 11/5/2018)
8 Le Kim Hung, Vu Phan Huan
PERFORMANCE ANALYSIS AND ASSESSMENT OF A TRANSFORMER
DIFFERENT PROTECTION RELAY SEL387 AT 110KV LANG CO SUBSTATION
Le Kim Hung1, Vu Phan Huan2 1University of Science and Technology – The University of Danang; [email protected]
2Center Electrical Testing Company Limited; [email protected]
Abstract - Based on the influences of current transformer connection type, CT errors, magnetizing inrush current, errors because of tap changing and fault conditions on differential protection function, the paper establishes and assesses the performance of a numerical relay SEL387 model concerning the protection of the 115/24kV transformer at Lang Co Substation by Matlab/Simulink. The paper also calculates the setting value of two actual slope characteristics (O87P = 0.3, U87P = 10, SLP1 = 25%, SLP2 = 50% and IRS1 = 3). The results can be applied to increase the accurate and reliable performance of the differential transformer protection relay against internal faults. Simulation has simplified the process of selecting relay and protection system. This can improve the quality of the protection system design early, thereby reducing the number of errors found later in the operation.
Key words - Different protection relay; transformer; two slope characteristics; Matlab/Simulink; SEL387.
1. Introduction
Nowadays, there are a variety of numerical transformer
different protective relays on the market such as Siemens
7UT613, SEL387, Schneider P632, Toshiba GRT200,
ABB RET670, which include many functions in one unit,
as well as providing metering, communication, and
transformer protection. These protective relays help us to
simplify implementation of the protection in circuit design
and setting calculations.
The connection diagram is used for the numerical
protective relay SEL387 (shown in Figure 1) that provides
protection of two transformer windings (HV, LV) as well
as differential function (F87T) for sensitive detection of
inter turn faults within the transformer winding. Both HV
CTs and LV CTs are wye connected. The F87T obtains
three phase current inputs from them. This function
compares the currents entering and leaving the protected
zone of the windings of the transformer.
Figure 1. Secondary current in HV and
LV side at normal condition
As with most false trips involving F87T in Central
Power Grid, checking the relay should be done first, and
can be done by inspecting the LED indicators, cable
connections, auxiliary relay and so on. The main cause
shown in Figure 2 is CT secondary wire connected to the
incorrect tap on the CT, Crossed phases, Incorrect CT
polarity in design or construction [2]. In addition, there is a
general lack of understanding the ground differential
protection principle. In most cases, inadequate or no
verification test is performed to check the correctness of the
secondary current circuit. So, these errors depend on skill of
testers. If the hardware has no issues, then it is very likely to
be a setting problem. Unlike hardware issues, setting issues
cannot be assessed by the naked eyes, so the universal relay
test set and commissioning tool are required. It performs to
check wiring and setting of relays, by using
primary/secondary injection of currents from the test set.
Figure 2. Incorrect CT Ratio, CT Polarity, or Crossed Phases
But even in a no fault situation, the magnitude and the
phase of the currents in both sides of the transformer will
not have the same value. This is often the case that mis-
operation on relay does not become apparent immediately.
One possibility is CT errors, magnetizing inrush current
during initial energization, CTs mismatch and saturation.
Another possibility is that the transformation ratio changes
due to Tap changer. These have already been introduced to
the different currents by devices that have not yet caused
any problems, but will cause significant disruption to the
transformer in the future. Besides, the possibility is that
someone with unauthorized access infiltrates the relay and
reconfigures incorrect setting to a relay, instructing it to
release a false trip signal without the existence of any fault.
When these types of mis-operation risks go undetected, it
is very easy for substation operators to mistakenly believe
that their relay protection is secure. The question substation
operators need to ask is, “How confident am I that my relay
protection is reliable and secure?”
After this introduction, the rest of the paper is organized
as follows. The section 2 describes the transformer
different protection function and provides instructions for
setting calculation SEL387 in Lang Co substation. The
section 3 builds the power system and the relay protection
on Matlab Simulink. The section 4 simulates the testing
normal/fault conditions. The section 5 gives the
conclusions related to the transformer different protection.
ISSN 1859-1531 - THE UNIVERSITY OF DANANG, JOURNAL OF SCIENCE AND TECHNOLOGY, NO. 6(127).2018 9
2. Transformer different protection function
The main operation of a current differential protection
relay is made by comparing the vector current in both sides
of the transformer: IDIFF = |I1 + I2| (1)
Restraint current:
IBIAS = |I1| + |I2| (Siemens, Sel, Abb) (2)
IBIAS = 0.5(|I1| + |I2|) (Schneider) (3)
a. Siemens 7UT613 characteristic b. SEL387 characteristic
c. ABB RET670 characteristic d. Schneider P632 characteristic
Figure 3. Differential protection characteristic
Based on these values of IBIAS and values of IDIFF, the
trip/restrain characteristics offer from vendors of
protection relay such as Siemens, Sel, Abb, and Schneider
which has a three-step shape (two slopes and one pickup
level) as in Figure 3 and defined by the following settings
as in Table 1. The F87T operates when IDIFF exceeds a
minimum operate current threshold and a percentage of
IBIAS, defined by a slope setting (slope 1, slope 2). Consider
matlab code of this matter in subsection 3 below.
Table 1. Parameter characteristic of relay vendors
Parameter Siemens Sel Abb Schneider
Minimum
pickup IDIFF> 87OP Idmin IS1
Slope 1 Slope 1 Slope 1 Slope Section 2 K1
Slope 2 Slope 2 Slope 2 Slope Section 3 K2
Unrestraint
tripping IDIFF>> 87UP ID>>
Points of
intersection Base Point 2 IRS1
End Section1,
End Section 2 IS2
To help us understand a setting calculation for relays,
we use SEL 387 to protect a 25MVA, 50Hz, (115/24) kV,
Y/y0 Vina Takaoka transformer in Lang Co Substation that
has CTHV = 200/1, CTLV = 800/1, and an OLTC with
tapping range from 1 to 19 positions. It has satisfied the
following requirements from Decision No. A3-06-
2015/LCO110 by the Central Region Load Dispatch
Centre of Vietnam [3, 6].
Windings 1 and 3 are validated for differential
protection. Settings will be: E87W1 = Y, E87W3 = Y.
The voltages for winding 1 and 3 are 115kV and 24kV,
respectively: VWDG1 = 115, VWDG3 = 24.
The internal compensation (ICOM = Y) for the
wye-wye transformer with a wye-wye CT can be set to
12 to remove the zero sequence currents.
Winding 1 CT Conn.Compensation W1CTC =12
Winding 3 CT Conn.Compensation W3CTC =12
The following settings refer to the CTs connection and
to the current ratio for each winding: W1CT = Y;
CTR1 =200; W3CT = Y; CTR3 = 800.
The secondary current of CT HV side under normal
operating condition is:
IHV = MVA/(1.732 × VWDG1× CTR1)
IHV = 25×106/(1.732×115×103×200) = 0.628 [A]
and requires ratio compensation TAP1 = 1/0.628 = 1.593
Under normal condition, secondary current in LV side is:
ILV = MVA/(1.732 ×VWDG3×CTR3)
ILV = 25×106/(1.732×24×103×800) = 0.752 [A]
and requires ratio compensation TAP3 = 1/0.752 = 1.33
a. Setting characteristic b. Test point in
Normal/ Fault conditions
Figure 4. SEL 387 setting characteristic in Lang Co Substation
As shown in Figure 4a, dual slope characteristics can
be used with a minimum pickup setting. This can be
mathematically represented as follows:
The minimum pickup O87P should be set as sensitively
as possible while considering the steady state CT error and
transformer magnetizing current. The O87P setting must
yield an operating current value of at least 0.1×IN, at the
least tap. In this case O87P ≥ 0.1IN/TAPMIN = 0.1x1/
1.33 = 0.0752. The typical O87P range is 0.3 to 0.5.
Therefore, the O87P setting of 0.3 is valid.
The instantaneous unrestrained current element is
intended to react quickly to very heavy current levels that
clearly indicate an internal fault. Set the pickup level (U87P)
about 10 times TAP. The unrestrained differential element
only responds to the fundamental frequency component of the
differential operating current. It is not affected by the SLP1,
SLP2, IRS1, PCT2, PCT5, or IHBL settings. Thus, it must be
set high enough so as not to react to large inrush currents.
Slope 1 region is used between the minimum pickup
region and the slope 2 breakpoint. Slope 1 provides
security against false tripping due to the following factors:
Excitation current = 2 %, CT accuracy = 3%, NLTC = 5%,
LTC = 10%, Tap mismatch = 0%, and Relay
accuracy = 5%. All these percentages sum to 25 %, thus a
setting of SLP1 = 25% can be used.
IDIFF/IN
IBIAS/IN
Idmin
End Section 1
Slope Section 2
End Section 2
Slope Section 3
IDIFF/IN
IBIAS/IN I
K1
IS2
K2
TAP Pos is 18
IDIFF/IN
IBIAS/IN
O87P
IRS1
CT Error
U87P
TAP Pos is 9
External Fault
Internal Fault
Magnetization
SLP1 = 0.25
SLP2 = 0.5
IDIFF/IN
IBIAS/IN
O87P
Sum
IRS1 = 3
Saturation
TAP
changer
U87P
10 Le Kim Hung, Vu Phan Huan
Slope 2 is used to prevent false tripping caused by
saturation of the CTs. A setting of SLP2 = 50 % for slope
2 covers all the situation.
IRS1 = 3 is restraint current slope 1 limit.
Operate time (restrained function): 20 to 35 ms.
Operate time (unrestrained function): 5 to 20 ms.
PCT2 = 15% (the F87T is going to be blocked if the
second harmonic is higher than 15% from fundamental).
PCT5 = 35% (the F87T is going to be blocked if the
fifth harmonic is higher than 35% from fundamental) and
TH5P = OFF (the 5th harmonic alarm is deactivated).
3. Building of the differential protection function using
Matlab Simulink
For the purpose of testing reliability of the relay
protection from SEL vendor to test the algorithm of
different protection, the power system model has been
simulated in the Matlab Simulink and it is depicted in
Figure 5. It consists of a 115 kV, 1000 MVA system, a
25MVA, 50Hz, (115/24) kV, Y/y0 OLTC regulating
transformer, two CT (200/1A and 800/1A), 24 MW /1Mvar
loading and SEL 387 relay protection. All fault conditions
are created to transformer via the three phase fault block.
A relay SEL387 model shown in Figure 6 combines
functions of vector group compensation, TAP factor
compensation, different and bias current calculation,
inrush harmonic blocking and slope characteristics. Firstly,
current signals have been simulated in Matlab, which
combines vector group value of current throw S-function,
which is used to correct the phase shift across the YNy0
transformer. Since the HV, LV side of the transformer are
wye connected, they require and will use the same Ɵ = 00.
The identity matrix is shown below:
)cos()120cos()120cos(
)120cos()cos()120cos(
)120cos()120cos()cos(
3
2)(0
00
00
00
−+
+−
−+
=CTC
C
B
A
C
B
A
COMPC
COMPB
COMPA
I
I
I
I
I
I
CTC
I
I
I
−−
−−
−−
==
211
121
112
3
1)0(0 0
_
_
_
After that it sends to the subsystem combined TAP
factor compensation (TAP1 = 1.59, TAP3 = 1.32).
Secondly, the subsystem different value and bias of current
are calculated for each phase separately according to the
relation of the equation (1) and (2). Similarly, in the
harmonic subsystem the F87T is going to be blocked if the
second harmonic is higher than 15% from fundamental.
Finally, S-Function Builder checks the position of operating
point described by currents (for each phase separately) with
respect to the pick-up characteristic IDIFF = f(IBIAS) and
decision tripping the pulse, which opens a circuit breakers
located on both sides of the protected transformer. The
following Matlab code is written for phase A:
Figure 5. Matlab/Simulink Model of the proposed system
Figure 6. Overview of the function blocks of the F87T
ISSN 1859-1531 - THE UNIVERSITY OF DANANG, JOURNAL OF SCIENCE AND TECHNOLOGY, NO. 6(127).2018 11
double IRT = (*O87P) / (*SLP1);/* starting point of
SLP1*/
double IRT2 = (*U87P) / (*SLP2); /* ending point of
SLP2*/
if ((*Ibias_A <= IRT) && (*Harmonic_Block == 0))
{
if (*Idiff_A > (*O87P))
*Output = 1;
else
*Output=0;
}
else
{
if (*Idiff_A > (*U87P))
*Output = 1;
else
*Output=0;
}
if ((*Ibias_A > IRT) && (*Ibias_A <= *IRS1) &&
(*Harmonic_Block == 0))
{
if (*Idiff_A > ((*Ibias_A) * (*SLP1)))
*Output = 1;
else
*Output=0;
}
if ((*Ibias_A > *IRS1) && (*Ibias_A <= IRT2) &&
(*Harmonic_Block == 0))
{
if (*Idiff_A > ((*Ibias_A) * (*SLP2)))
*Output = 1;
else
*Output=0;
}
4. Simulation results and discussion
The main goal of the simulation is either to obtain or
calculate waveforms such as currents on both sides of
transformer, TAP position, voltage at bus C41, IDIFF, IBIAS,
trip signal, and harmonic block signal during normal/fault
conditions for analysis of the behavior of relay.
4.1. Case.1. Normal Condition
When the transformer is operating normally, TAP
position is 9 and the resulting voltage at bus C41 is
0.99pu. The differential currents in all the phases
(IDIFF = 0.028) are well below pick up value O87P = 0.3,
IBIAS = 1.35 and the relay does not issue any trip signal.
Figure 7 shows IDIFF and IBIAS in any one phase (phase
A) and relay output.
Figure 7. TAP position at 9
As the transformer taps further from the balance
position (9), i.e. TAP position is 18 and voltage at bus C41
is 0.855pu, so the magnitude of the different current
increases IDIFF = 0.14, IBIAS = 1.08. However, the
differential current is still smaller than 0.2, the relay will
not trip (shown in Figure 8).
Figure 8. TAP position at 18
There are other ways to increase IDIFF by the CT errors.
It makes secondary current on two sides, not equation
under healthy conditions; for example a 15VA - 5P20 CT
has a guaranteed error of less than ± 5% when it is
subjected to 20 times its nominal current and delivers into
its nominal load (15 VA to In). At TAP = 9, current in HV
side is (CT error +5%) and current in LV side is (CT error
-5%), then IDIFF = 0.11, IBIAS = 1.35. Relay does not issue
any trip signal as shown in Figure 9.
Figure 9. TAP position at 9, CTHV error +5%, CTLV error -5%
At TAP = 9, the transformer is energized from the HV
side, magnetizing currents appear due to its core
magnetization and saturation. Figure 10 shows the waveform
of a magnetizing inrush current with transformer energized at
0.1s. The IDIFF is = 0.88, IBIAS = 0.44 but the relay does not
issue any trip signal because harmonic blocking signal is = 1.
12 Le Kim Hung, Vu Phan Huan
Figure 10. Harmonic block for energization condition
4.2. Case.2. Fault Condition
There are various types of faults, such as single phase to
ground, double phase, double phase-to-ground, and three
phases. If a fault is detected, i.e. the start signals will be set
by the differential protection (the measured IDIFF > O87P),
and at the same time the internal/ external fault discriminator
will determine the relative phase angle between them.
Figure 11. Internal fault at phase A to ground
For an internal AG fault is performed on F1, it is located
within the differential protection zone. Therefore, the fault
currents will flow out from the faulty power transformer on
both sides. The fault currents on the HV and LV sides will
have the same direction as shown in Figure 11. In the figure
immediately after the fault is applied, we can observe that
fault current in HV side is increased enormously,
IDIFF is = 4.35, IBIAS = 3.1 and the trip signal occurs at 0.12s.
Figure 12. External fault at phase AB
For an external AB fault is performed on F2, it is
located in the LV side of the transformer model. The fault
current contributions from the HV and LV side are
180 degrees out of phase as shown in Figure 12.
IDIFF is = 0.106, IBIAS is = 3.76 and relay does not trip.
Reviews: By using numerical relays, problems like CT
ratio mismatches and phase shift compensation can be
solved mathematically in the software of the relay. Besides,
the test point results of relay SEL387 (shown in Figure 4b)
demonstrate the stable operation during cases of normal
conditions (CT error, the change in tap position of a power
transformer, and magnetizing inrushes), external fault and
higher sensitivity during internal faults.
5. Summary
This paper provides a detailed description of a
transformer different protection function based on a
two-slope characteristic. It also provides valuable tips on
how to guide the setting calculation and troubleshooting
process. Furthermore, the power system model simulates
numerous test cases for an existing power transformer of
Lang Co Substation, Viet Nam using Matlab/Simulink
software package. These test cases save time by
immediately indicating whether the issue has occurred on
the SEL387. As a result, protection engineers can easily
analyze the mis-operation to determine the root cause and
can fulfill very demanding requirements set by power
utilities.
REFERENCES
[1] Sandro Gianny Aquiles Perez, “Modeling relays for power system
protection studies”, the Degree of Doctor of Philosophy in the Department of Electrical Engineering University of Saskatchewan
Saskatoon, Saskatchewan Canada, July 2006.
[2] Casper Labuschagne and Normann Fischer, "Relay-Assisted
Commissioning", 59th Annual Conference for Protective Relay
Engineers College Station, Texas, April 4–6, 2006.
[3] SEL, “SEL-387 Relay Current Differential Instruction Manual”,
2010.
[4] Zoran Gajić, “Differential Protection for Arbitrary Three-Phase
Power Transformers”, Doctoral Dissertation Department of Industrial Electrical Engineering and Automation, Lund University,
SWEDEN, 2008.
[5] M. Tanveer Ahmad, “Differential Protection of Transformer using
Harmonic Restraint Circuitry”, The 12th GCC Cigre International
Conference, Doha, Qatar, 8-10 November, 2016.
[6] Decision No. A3-06-2015/LCO110 by the Central Region Load
Dispatch Centre of Vietnam.
(The Board of Editors received the paper on 31/01/2018, its review was completed on 26/02/2018)
ISSN 1859-1531 - THE UNIVERSITY OF DANANG, JOURNAL OF SCIENCE AND TECHNOLOGY, NO. 6(127).2018 13
A STUDY ON THE REDUCTIVE DECHLORINATION OF CHLOROFORM WITH
NANO Fe/Cu BIMETALLIC PARTICLES IN AQUEOUS SOLUTION
Phan Kim Nguyen, Bui Xuan Vung
University of Education – The University of Danang; [email protected]
Abstract - In this work, nano-Fe/Cu bimetallic particles are synthesized and used to reduce chloroform to methane in aqueous solution. The synthesized particles are characterized by X ray diffraction (XRD) pattern, Transmission electron microscopy (TEM) images and energy dispersive X ray (EDX) analysis. Such key parameters on the reduction of chloroform as pH, nano-Fe/Cu dosage, treatment time have been investigated. Closed batch experiments have been conducted for this investigation. Experimental results show that the de-chlorination of 50 mL of 20 ppm chloroform aqueous solution has the highest degradation efficiency of 88.93% under the experimental conditions such as pH = 3, reaction time of 30 minutes and nano-Fe/Cu dosage of 0.05 gram. GC-MS analysis for a 20 ppm chloroform aqueous solution before and after treatment has shown that there is no formation of such products containing chlorine as CH2Cl2 and CH3Cl.
Key words - Nano-Fe/Cu; bimetallic particles; chloroform; de-chlorination; degradation; aqueous solution.
1. Introduction
Trihalomethanes including mainly chloroform (CHCl3)
are disinfection by-products formed when using chlorine
for disinfecting drinking water [1] and treated wastewater
before it is conveyed into water distribution systems [2].
Chlorine is by far the most widely used chemical
disinfectant in water and wastewater treatment. These by-
products are linked to a direct health risk such as liver and
kidney cancer, nervous system and reproductive effects.
The recommended concentration value by WHO for
chloroform in drinking water is 0.3 mg/L [1].
Many technologies such as advanced oxidation, air
stripping, and physical adsorption have been applied to the
removal of chloroform in water [3-6]. A reductive system
with zero- valence iron and the reductive process coupled
with Fenton’s reagent were also used for such a purpose.
However, the destruction of chloroform requires additional
treatment [7].
Another efficient approach for degrading a variety of
contaminants is that using nano-Fe0 coated with another
metal such as Ag, Pd, Pt, Ni or Cu because the rate of
reduction by bimetallic particles is significantly faster than
those observed for Fe0 alone [8]. An investigation shows
that nano-Fe/Cu particles increase the rate of reduction
1,1,1-trichloroethane related to Fe/Ni combination and the
bimetals show a dramatically faster rate than Fe0 alone [9].
In this regards, Fe/Cu combination was chosen to degrade
chloroform in aqueous solution. In this study, nano Fe/Cu
particles are firstly synthesized and characterized and then
used for the investigation of effects on the removal of
chloroform from aqueous solution.
2. Experimental
2.1. Synthesizing nano-Feo and nano-Fe/Cu particles
To synthesize nano-Fe0 particles, two solutions of A
and B were respectively prepared by dissolving 4 gr of
FeSO4.7H2O (99%, China) into 50 mL of distilled water
and 0.4 gr of NaBH4 (99%, Merck) into 10 mL of distilled
water to form the solution that was then added with 10 mL
of 1% w/v starch solution. Solution B was added slowly in
the rate of 3-4 mL.min−1 to solution A at ambient
temperature and vigorous stirring. All aqueous solutions
removed dissolved oxygen by bubbling argon gas for 20
min. During this reaction, ferrous ion (Fe2+) was reduced
into black particles by sodium borohydride reductant in the
following reaction:
4Fe2+ + 2BH4- + 3H2O → 4Fe0 + 2H2BO3
- + 8H+ + 2H2
The black precipitates were filtered by vacuum
filtration and then, washed with distilled water and ethanol
at least three times. The prepared Fe0 particles were mixed
with 10 mL of 1% w/v starch solution, and then distilled
water was added to obtain 50 mL of solution C.
Bimetallic nano-Fe/Cu particles were prepared by
adding drop by drop 10 mL of aqueous solution D containing
0.500 gr CuSO4.7H2O to solution C in vigorous stirrer and
ambient temperature. After a few minutes, a redox reaction
occurred between Cu2+ and nano-Fe0 as follows:
Fe0 + Cu2+ → Fe2+ + Cu0
The resulting nano-Fe/Cu particles were washed with
distilled water, and stored in ethanol. The whole process
above was carried out under the condition of bubbling the
solutions with clean argon gas [10,11].
2.2. Effect on the CHCl3 de-chlorination
To find out the de-chlorination capacity of the
synthesized material, experiments were set up to investigate
effects of pH, material dosage, and treatment time on the
degradation of chloroform. These de-chlorination
experiments were performed in a closed batch system.
Determinations of pH were carried out by using the pH
meter (Sension+ PH31, Hatch (UK)) that was daily
calibrated at pH 4.00 and 7.00 using commercial buffers. In
most cases, each bottle received 50 mL of 20 ppm CHCl3.
2.3. Analytical methods
Chloroform degradation was analyzed by gas
chromatography coupled with mass spectrometry (GC-MS
Triple Quad 7098A-7001B Agilent, USA). The injection
temperature and detector temperature of the GC were set at
110 and 230oC, respectively, and a gradient program was
applied in the oven with an initial temperature of 50oC held
for 1 min and then gradually increased to 230oC at a rate of
15oC min-1, and remained at 230oC for 1 min. Chloride ion
concentration was determined by spectrometry (Lamda
650 UV-VIS spectrometer, USA) at a wavelength of
460 nm after reaction with mercury thiocyanate to form an
14 Phan Kim Nguyen, Bui Xuan Vung
orange-red compound [12]. The remaining chloroform
concentration after treatment was calculated based on the
chloride formation, which was quantitatively analyzed by
UV-VIS spectrometry. Finally, the efficiency of
chloroform degradation was calculated using initial
chloroform concentration and its remaining concentration
after the reduction.
3. Results and Discussion
3.1. Characterization of synthesized Fe/Cu nano particles
The synthesized nano-Fe/Cu particles were
characterized by XRD, TEM and EDX. Figure 1A shows X-
ray diffraction of the synthesized Fe/Cu nano particles were
obtained by a D8 Advanced Bruker diffractometer. It can be
seen from Figure 1A and 1B that there is a similarity of XRD
spectra obtained from this study and from the work of Chien-
Li Lee and Chih-Ju G Jou [13]. Figuge 2A presents TEM
image of nano-Fe/Cu particles which have been recorded by
a JEOL JEM-1010 transmission electron microscope. It is
found that the diffraction patterns indicate the state of
chemical combination of the bimetallic nanoparticles, and
the TEM image shows the particles are well-combined and
crystalline sizes are less than 1000Ao (or 100nm). Elemental
analysis performed by energy dispersive spectrometry
(EDX) with Horiba EMAX EDS detectors were presented in
Figure 2B. The weight percentage of Fe and Cu in the
synthesized nano-Fe/Cu particles obtained from the
elemental analysis is 81.72% and 13.04% respectively.
Figure 1. (A) Fe/Cu nano particle XRD patterns of this study and (B) of Chien-Li Lee & Chih-Ju G Jou
Figure 2. (A) TEM image and (B) EDX spectrum of fresh Fe/Cu particles
3.2. Effect on the chloroform de-chlorination
3.2.1. Effect of pH
Figure 3. Effect of initial pH on the CHCl3 degradation
The effect of initial pH on the reduction reaction of
chloroform by the synthesized nano-Fe/Cu is shown in
Figure 3. In each experiment 0.025 gr of the material was
added to 50 mL of 20 ppm CHCl3.
As can be seen from Figure 3 in the pH range from 3 to
7 the more acidic medium, the faster rates of chloroform
reduction are achieved. When the initial pH is 3.0, the
degradation efficiency of chloroform at 10 min reaction
reaches the maximum at 85.35%. When the initial pH is
7.0, the degradation efficiency of chloroform at 10 min
reaction decreases to 44.49%, much smaller than that at pH
3.0. However, at the initial pH 2 the degradation efficiency
is only 35.50 %, a much smaller value as compared with
that at pH 3.0. This abnormal issue could be explained by
the dehalogenation mechanism suggested by Leah J.
Matheson and Paul G. Tratnyek [14]. Alkyl halides, RX,
ISSN 1859-1531 - THE UNIVERSITY OF DANANG, JOURNAL OF SCIENCE AND TECHNOLOGY, NO. 6(127).2018 15
approach to the surface of the reductive material and then
can be reduced by iron according to the following reaction:
Fe0 + RX + H+ → Fe2+ + RH + X-
The increase in pH favors the formation of iron
hydroxide precipitates that may eventually form a surface
layer on the metal, which leads to inhibiting further
dissolution of the metal. Otherwise, at a more acidic pH,
there is an additional reaction between Fe0 and H+ to form
H2. In the absence of an effective catalyst such as Pd or Pt,
H2 is not a facile reductant, and this reaction will not
contribute directly to dehalogenation. In fact, excessive H2
accumulation at the metal surface inhibits the continuation
of reduction reactions in organic synthesis.
3.2.2. Effect of treatment time
For each experiment to investigate the effect of
treatment time on the chloroform de-chlorination, 0.025 gr
of the material was added to 50 mL of 20 ppm CHCl3 at pH
3 in the reaction time intervals of 5, 10, 30, 60 minutes.
Figure 4 shows that the degradation efficiency rises up
from 45.15% for 5 min treatment to 87.88% for 30 min
treatment. The degradation efficiency of 88.76% for
60 min treatment implies that there is an insignificant change
in the degradation efficiency after 30 min treatment.
Figure 4. Effect of treatment time on the CHCl3 degradation
3.2.3. Effect of nano-Fe/Cu dosage
In order to investigate the effect of synthesized nano
Fe/Cu dosage on the chloroform de-chlorination, the
dosage of 0.01, 0.025, 0.05 and 0.1 gr was respectively
added to 50 mL of 20 ppm CHCl3 at pH 3 with the
treatment time of 30 min.
Figure 5. Effect of nano Fe/Cu particle dosage on the CHCl3
degradation
From Figure 5 we can see when the material dosage
increases from 0.01 to 0.05 gr, the degradation efficiency
of chloroform increases from 79.33% to 86.84% and then
when adding 0.1 gr of the material, the degradation
efficiency is almost unchanged any more. So the material
dosage of 0.05 gr per 50 mL of 20 ppm CHCl3 can be
optimum for the investigation.
3.3. GC/MS analysis of chloroform degradation
In order to investigate whether such fewer chlorine
intermediate products as CH2Cl2, CH3Cl were formed from
chloroform de-chlorination by the synthesized nano Fe/Cu
particles, GC-MS analysis was performed for 20 ppm
chloroform solution before and after the treatment with the
reaction conditions of pH 3, treatment time of 30 min,
nano-Fe/Cu dosage of 0.05 gr, and illustrated by GC-MS
chromatograms in Figure 6E and 6F respectively. In
addition to this purpose, based on GC-MS analysis, the
degradation efficiency was also evaluated to compare with
that calculated by UV-VIS method as mentioned above. A
comparison between Figure 6A and 6B shows that the peak
of CH2Cl2 impurity at the retention time of 6.623 min
almost disappeared after the treatment. Meanwhile, the
area of the CHCl3 peak at the retention time of 8.037 min
is decreased from 4344995 to 482577, corresponding to the
degradation efficiency of 88.93%. This efficiency shows a
resemblance to the one calculated by using UV-VIS
method. From the comparison of Figure 6A and Figure 6B,
there is no evidence for the formation of fewer chlorine
intermidiate products from the treatment.
Figure 6. (A) GC-MS chromatograms of the sample before treatment and (B) the sample after the treatment
16 Phan Kim Nguyen, Bui Xuan Vung
4. Conclusion
Under the conditions of our experiments, chloroform
undergoes rapid reductive dehalogenation in the presence of
the synthesized nano-Fe/Cu particles with the degradation
efficiency is nearly up to 90%. Dehalogenation efficient of
chloroform is higher in a more acidic medium for the pH
range from 3 to 7, but this trend will be reversed at a pH of
2. This indicates that a strongly acidic medium is not in favor
of the chloroform de-chlorination. Results of GC-MS
analysis show that chloroform is completely transformed
into methane without forming products containing chlorine
such as CH2Cl2 or CH3Cl. Further investigations on the
effect of ions present in aqueous solution such as sulfate,
nitrate, phosphate, and of dissolving oxygen should be
conducted to approach the practical conditions.
REFERENCES
[1] W.H.O. Guidelines for drinking water quality (Chloroform),
incorporating 1st and 2nd addenda, 3rd ed. (2008), Vol(1), 451-453.
[2] Hua G.; Yeats S. Control of Trihalomethanes in Wastewater
Treatment. The Florida Water Resources Conference. (2009), USA.
[3] Alavi, N.; Tahvildari, K. Removal of Trihalomethanes in Tehran
Drinking Water by an Advanced Oxidation Process (2015), Nature Environment and Pollution Technology Vol.14, No.1, pp. 211-216.
[4] Wu, F.; Wu, S. Removal of Trihalomethanes from Drinking Water
by Air Stripping (2009). 2009 international conference on energy
and environmental technology, Vol2, pp. 695-698.
[5] Babaei, A. A.; Niknam, E.; Ansari, A.; Godini, K. Removal of
trihalomethane precursors from water using activated carbon
obtained from oak wood residue: kinetic and isotherm investigation
of adsorption process (2017). Desalination and Water Treatment, 92, 116–127.
[6] Lu, C.; Chung, Y.L.; Chang, K.F. Adsorption of trihalomethanes from
water with carbon nanotubes (2005). Water Res.,39(6),1183-9.
[7] Arruda, T. L. D.; Jardim, W. F. Treatment of groundwater
contaminated with chlorinated compounds using elemental iron and
Fenton's reagent. Quim. Nova. (2007), 30, 1628-1632.
[8] Wang, C.Y.; Chen, Z.Y. The preparation, surface modification, and
characterization of metallic nanoparticles. Chin. J. Chem. Phys.
(1999), 12, 670–674.
[9] Fennelly, J.P.; Roberts, A.L. Reaction of 1,1,1-trichloroethane with zero-valent metals and bimetallic reductants. Environ. Sci. Technol.
(1998), 32, 1980–1988.
[10] Zin, M.T.; Borja, J.; Hinode, H.; Kurniawar, W. “Synthesis of
Bimetallic Fe/Cu Nanoparticles with different Copper loading ratios”,
International Journal of Chemical, Molecular, Nuclear, Materials and Metallurgical Engineering (2013), Vol:7, No:12, 1031.
[11] He, F.; Zhao, D. Preparation and characterization of a new class of
starch-stabilized bimetallic nanoparticles for degradation of
chlorinated hydrocarbons in water. Environmental Science and
Technology, (2005), Vol. 39, No. 9, pp. 3314–3320.
[12] “Methods for chemical analysis of water and wastes” (1983),
Environmental Monitoring Support Laboratory (EMSL), Cincinnati, Ohio, pages 325, 2, 1-2.
[13] Lee, C. L.; & Jou, C. J. G. Integrating Suspended Copper/Iron
Bimetal Nanoparticles and Microwave Irradiation for Treating
Chlorobenzene in Aqueous Solution. Environment and Pollution
(2012), Vol. 1, No. 2, 159-168.
[14] Matheson, L.J.; Tratnyek, P. G. Reductive Dehalogenation of
Chlorinated Methanes by Iron Metal. Environ. Sci. Technol. (1994), 28, 2045-2053.
(The Board of Editors received the paper on 27/3/2018, its review was completed on 15/6/2018)
ISSN 1859-1531 - THE UNIVERSITY OF DANANG, JOURNAL OF SCIENCE AND TECHNOLOGY, NO. 6(127).2018 17
A STUDY ON CF3I-Ar AND CF3I-Kr MIXTURE GASES SUBSTITUTING SF6
IN HIGH VOLTAGE EQUIPMENTS
Tran Thanh Son1, Do Anh Tuan2 1Electric Power University; [email protected]
2Hung Yen University of Technology and Education; [email protected]
Abstract - The present binary mixtures of the SF6 gas with Ar and Kr gases have not been used in many industries as long-term measures for totally eliminating the potential contribution of SF6 to global warming. In order to gain more insight into electron transport coefficients in mixture gases as substitutes for SF6 in high voltage equipment, transport coefficients such as electron drift velocity, density-normalized longitudinal diffusion coefficient, ratio of the longitudinal diffusion coefficient to the electron mobility, Townsend first ionization coefficient, electron attachment coefficient, and density-normalized effective ionization coefficient in CF3I-Ar and CF3I-Kr mixture gases are calculated and analyzed in the wide E/N range of 0.01 – 1000 Td using a two-term approximation of the Boltzmann equation for the energy. These calculated coefficients are analyzed and compared to those in pure SF6 gas. The limiting field strength values of E/N, (E/N)lim, of these mixture gases are also derived and compared with those of the pure SF6 gas at different percentages of CF3I and SF6. The mixture gases of 70% CF3I with Ar and Kr have (E/N)lim values greater than those of the pure SF6 gas. Therefore, these mixture gases could be considered to substitute SF6 gas in high voltage equipment.
Key words - Trifluoroiodomethane; CF3I; SF6; Boltzmann equation analysis; electron transport coefficients; gas mixture
1. Introduction
Sulfur hexafluoride (SF6) has been widely used as an
isolated gas in high voltage equipment. The Kyoto
Protocol, however, has listed the greenhouse gases as CO2,
CH4, N2O, hydrofluorocarbons (HFCs), perfluorocarbons
(PFCs) and SF6, and we need to regulate the emissions and
the utilizations of those gases in the many industries [1]. In
recent decades, the conventional gases such as N2, CO2,
and air and the rare gases such as Ar, Kr, Xe, He, and Ne
have been considered to mix with the SF6 gas as a potential
to reach those attempts [2]. However, the present binary
mixtures of the SF6 gas with other gases have not been used
in many industries as long-term measures for totally
eliminating the potential contribution of SF6 to global
warming [2].
Recently, much research has been concentrated on
trifluoroidomethane (CF3I) gas because of its low global
warming potential, very short atmospheric lifetime and
relatively low toxicity gas [3]-[5]. It is a gas that is a
substitution candidate for the SF6 gas and as a candidate to
the replacement of potent greenhouse affects. This gas has
also been considered to be a candidate replacement for
bromotrifluoromethane (CF3Br), which is used in aircraft
for fuel inertness and for fire-fighting [3]. The boiling point
of CF3I gas is higher than that of the SF6 gas [4]. At an
absolute pressure of 0.5 MPa, CF3I becomes liquids at
about 260C, whereas the SF6 gas becomes liquids at about
-300C [4]. On the other hand, the SF6 gas is used in gas
circuit breakers at 0.5 to 0.6 MPa. Therefore, it is
impossible to use CF3I gas if this gas is used at this pressure
level [4]. However, in order to reduce the liquefaction
temperature of CF3I gas, Taki et al. [4] decreased partial
pressure by mixing it with other gases such as N2 and CO2.
For example, the boiling point can be reduced from about
260C (pure CF3I) to about -120C at 0.5 MPa by using a 30%
CF3I-CO2 mixture [5]. Therefore, it is necessary to mix the
CF3I gas with different buffer gases.
Moreover, the sets of electron collision cross sections
and electron transport coefficients for atoms, molecules,
and binary mixture gases are necessary for quantitative
understanding of plasma phenomena. Some gases, such as
rare gases (Ar, Kr, Xe, Ne, and He), N2, CO2, air, and O2
mixed with each of F2, Cl2, and SF6, are also necessary for
many applications, such as rare-gas halide laser, plasma
etching, and gaseous dielectric materials [2]. On the other
hand, the collision processes and electron transport
coefficients of the binary mixtures of CF3I gas with other
gases have been scarce so far. To the best of our
knowledge, neither measurements nor calculations of the
electron transport coefficients in the binary mixtures of the
CF3I gas with the Kr gas with the entire CF3I concentration
range have been performed previously.
In the present study, in order to gain more insight into
the electron transport coefficients, the electron transport
coefficients (electron drift velocity, density-normalized
longitudinal coefficient, and density-normalized effective
ionization coefficient) in the E/N range(ratio of the electric
field E to the neutral number density N) of 10 - 1000 Td
and the limiting field strength of E/N, (E/N)lim, for the
CF3I-Ar and CF3I-Kr mixtures are calculated by a two-term
approximation of the Boltzmann equation for the energy.
The negative differential conductivity (NDC) phenomena,
that is, decreasing electron drift velocity with increasing
electric field strength, in these binary gas mixtures are
suggested. The electron transport coefficients calculated
are also compared with those of pure SF6 gas and the
(E/N)lim values in those mixtures are also compared
respectively with those of SF6 mixtures with correlative
gases (Ar and Kr) in the experiments. The binary mixtures
of CF3I gas with Ar and Kr gases with CF3I concentration
equal to about 65 - 75%, are considered for use in high
voltage and many industries.
2. Calculation method of electron transport coefficients
in CF3I-Ar and CF3I-Kr mixtures
The electron transport coefficients are calculated by
sets of electron collision cross sections for gases and a two-
term approximation of the Boltzmann equation for the
18 Tran Thanh Son, Do Anh Tuan
energy given by Tagashira et al. [6]. The accurate electron
collision cross section sets for each gas in mixture are
chosen for calculation to obtain the reliable electron
transport coefficients. The electron energy distribution
function (EEDF) can be computed by solving the
Boltzmann equation. In this study, a two-term
approximation is applied as successfully used in our
previous article [7]. Based on the EEDF, f(ε, E/N), the
electron drift velocity, W, the density-normalized
longitudinal diffusion coefficient, NDL, the Townsend first
ionization, α, and the electron attachment coefficient, η,
can be calculated as following equations:
1/2
m0
1 2 eE df ( ,E / N)W d .
3 m N q ( ) d
= −
(1)
where ε is the electron energy, m is the electron mass, e is
the elementary charge, and qm(ε) is the momentum-transfer
cross section.
( )
121
1 2L 1 0
0 0T T
0 2 1 1 02
VND E (F )d F d
3N q q
A A .
− = +
− − −
(2)
where V1 is the speed of electron, qT is the total cross
section. Fn and n (n = 0, 1, 2) are respectively the electron
energy distributions of various orders and their
eigenvalues.V1, n , 0n , and An are given by
1/2
1
2eV
m
=
; 1
20 1 i 0
0V N q F d
= ;
11 2
1 0 0 1 010
T
V E(F )d ( A )
3N q
− = − + −
;
12
0n 1 i n0
V N q F d
= ; n n0
A F d .
=
where qi is the ionization cross section.
1/2
1/2
i
I
1 2/ N f ( ,E / N) q ( )d .
W m
=
(3)
where I is the ionization onset energy and qi(ε) is the
ionization cross section.
1/2
1/2
a
0
1 2/ N f ( ,E / N) q ( )d .
W m
=
(4)
where qa(ε) is the attachment cross section.
The electron collision cross sections for CF3I
determined by Kimura and Nakamura [8], Ar determined
by Nakamura and Kurachi [9], and Kr determined by
Hayashi [10] are used throughout the present study. The set
of electron collision cross sections for the CF3I molecule
[8] includes one momentum transfer, one attachment, three
vibrational excitations (threshold energies of 0.032 -
0.134 eV), five electronic excitations (threshold energies
of 4.7 - 9.6 eV), and one total ionization (threshold energy
of 10.2 eV) cross sections.
The set of electron collision cross sections for Ar atom
[9] includes one momentum transfer, five electronic
excitations (threshold energies of 11.6 - 13.9 eV), and one
total ionization (threshold energy of 15.69 eV) cross
sections. The set of electron collision cross sections for Kr
atom [10] includes one momentum transfer, fourteen
electronic excitations (threshold energies of 9.915 -
13.437 eV), and one total ionization (threshold energy of
14 eV) cross sections. The accuracy of the electron collision
cross section set for each gas is confirmed to be consistent
with all electron transport coefficients in each pure gas.
3. Results and discussions
The results for the electron drift velocities, W, as
functions of E/N for the binary mixtures of CF3I gas with
Ar and Kr gases calculated in the E/N range 10 < E/N <
1000 Td by a two-term approximation of the Boltzmann
equation are shown in Figures 1-2, respectively. Slight
regions of the NDC phenomena in these gas mixtures are
observed in the E/N range 15 < E/N < 170 Td. The NDC is
relatively shallow for all mixtures. The occurrences of
these phenomena are due to the Ramsauer-Townsend
minimum (RTM) of the elastic momentum transfer cross
sections of the Ar and Kr atoms, and the CF3I molecule.
These suggestions are analyzed and explained thoroughly
by Chiflikian [11]. In the binary mixtures of the CF3I gas
with the Ar and Kr gases, the values of W are suggested to
be between those of the pure gases over E/N > 100 Td and
these values grow linearly over E/N > 200 Td. For the sake
of comparison, the electron drift velocity obtained by
Aschwanden [12] for the pure SF6 gas is shown in Figures
1-2. The calculated electron drift velocities in 70%
CF3I-Ar in the E/N ranges of E/N < 600 Td are very close
to those of the pure SF6 gas.
Figure 1. Electron drift velocity, W, as functions of E/N for the
CF3I-Ar mixtures with 10%, 30%, 50%, and 70% CF3I.
The solid line and symbols show present W values calculated using
a two-term approximation of the Boltzmann equation for the CF3I-
Ar mixtures. The solid curves show present W values calculated for
the pure CF3I molecule and pure Ar atom. The star symbol shows
the measurement value of the pure SF6 [12]. The inset figure shows
these results calculated in the E/N range of 200 - 1000 Td
ISSN 1859-1531 - THE UNIVERSITY OF DANANG, JOURNAL OF SCIENCE AND TECHNOLOGY, NO. 6(127).2018 19
Figure 2. Electron drift velocity, W, as functions of E/N for the
CF3I-Kr mixtures with 10%, 30%, 50%, and 70% CF3I. The solid
line and symbols show present W values calculated using a two-
term approximation of the Boltzmann equation for the CF3I-Kr
mixtures. The solid curves show present W values calculated for
the pure CF3I molecule and pure Kr atom. The star symbol shows
the measurement value of the pure SF6 [12]. The inset figure
shows these results calculated in the E/N range of 200 - 1000 Td
The results for the density-normalized longitudinal
coefficients, NDL, as functions of E/N for the binary
mixtures of CF3I gas with Ar and Kr gases calculated in the
E/N range 10 < E/N < 1000 Td by a two-term
approximation of the Boltzmann equation are shown in
Figures 3-4, respectively.
For each E/N value, the NDL values of the binary
mixtures of the CF3I gas with Ar and Kr gases decrease with
the increase in the CF3Icontent in the mixture. This behavior
is due to the growing influence of the electron-CF3I
interaction as the CF3Icontent increases. In these figures, on
the other hand, these NDL curves have minima in the E/N
range of 15 - 170 Td for these binary mixtures. The same
process responsible for the NDC region in the electron drift
velocity curves in these binary mixtures caused the
occurrence of these minima. Urquijo et al. [13] also
observed the similar behavior for the C2F6-Ar mixtures. The
density-normalized longitudinal coefficient for the pure SF6
obtained by Aschwanden [12] is also shown in Figures 3-4
for the sake of comparison. The NDL values of the pure SF6
are greater than those of these binary mixtures.
The results for the density-normalized effective
ionization coefficients, (α - η)/N, as functions of E/N for the
binary mixtures of CF3I gas with Ar and Kr gases calculated
by a two-term approximation of the Boltzmann equation are
shown in Figures 5-6, respectively. In the binary mixtures of
the CF3I with the Ar and Kr gases, the values of (α - η)/N are
also suggested to be between those of the pure gases,
respectively. For the sake of comparison, the density-
normalized effective ionization coefficient obtained by
Aschwanden [12] for the pure SF6 gas is also shown in
Figures 5-6. The (α - η)/N values for 70% CF3I mixtures
with the Ar and Kr gases are very close to those of the pure
SF6 gas over E/N < 450 Td and E/N < 470 Td, respectively.
Because of the accuracy of the electron collision cross
sections for the present gases and the validity of the
Boltzmann equation, the present calculated results are
reliable. More experiments of the electron transport
coefficients for the binary mixtures of the CF3I gas with
these buffer gases need to be performed over the wide
range of E/N in the future. In general, when the percentage
ratio of the CF3I gas in binary mixtures increases, the
values of the electron transport coefficients increase
progressively to those of the pure CF3I.
The limiting field strength values of E/N, (E/N)lim, at
which α = η for the binary mixtures of CF3I gas with Ar
and Kr gases are derived at 133.322 Pa and shown in Figure
7. These values are also compared respectively with those
of the binary mixtures of the SF6 gas with the Ar [14] and
Kr [15] gases shown in Figure 7. The (E/N)lim value
calculated for the pure CF3I gas is equal to 437 Td greater
than the (E/N)lim of the pure SF6 gas (361 Td) [12]. It can
be considered as a prospective substitute for the SF6 gas. In
Figure 7, the CF3I concentration in the binary mixtures of
CF3I gas with Ar and Kr gases equal to about 65 - 75%, is
considered for use in high voltage and many industries if
other chemical, physical, electrical, thermal, and
economical studies are considered thoroughly.
Figure 3. Density-normalized longitudinal coefficient, NDL, as
functions of E/N for the CF3I-Ar mixtures with 10%, 30%, 50%, and
70% CF3I. The solid line and symbols show present NDL values
calculated using a two-term approximation of the Boltzmann
equation for the CF3I-Ar mixtures. The solid curves show present
NDL values calculated for the pure CF3I molecule and pure Ar atom.
The star symbol shows the measurement value of the pure SF6 [12]
Figure 4. Density-normalized longitudinal coefficient, NDL, as
functions of E/N for the CF3I-Kr mixtures with 10%, 30%,
50%, and 70% CF3I. The solid line and symbols show present
NDL values calculated using a two-term approximation of the
Boltzmann equation for the CF3I-Kr mixtures. The solid curves
show present NDL values calculated for the pure CF3I molecule
and pure Kr atom. The star symbol shows the measurement
value of the pure SF6 [12]
20 Tran Thanh Son, Do Anh Tuan
Figure 5. Density normalized effective ionization coefficient,
(α - η)/N, as functions of E/N for the CF3I-Ar mixtures with
10%, 30%, 50%, and 70% CF3I. The solid line and symbols
show present (α - η)/N values calculated using a two-term
approximation of the Boltzmann equation for the CF3I-Ar
mixtures. The solid curves show present (α - η)/N values
calculated for the pure CF3I molecule and pure Ar atom. The
star symbol shows the measurement value of the pure SF6 [12]
Figure 6. Density normalized effective ionization coefficient,
(α - η)/N, as functions of E/N for the CF3I-Kr mixtures with
10%, 30%, 50%, and 70% CF3I. The solid line and symbols
show present (α - η)/N values calculated using a two-term
approximation of the Boltzmann equation for the CF3I-Kr
mixtures. The solid curves show present (α - η)/N values
calculated for the pure CF3I molecule and pure Kr atom. The
star symbol shows the measurement value of the pure SF6 [12]
Figure 7. Limiting field strength values of E/N, (E/N)lim, as
functions of the percentage of CF3I gas for the binary mixtures
CF3I-Ar and CF3I-Kr. The solid line and solid symbols show
present (E/N)lim values for these binary mixtures calculated
using a two-term approximation of the Boltzmann equation.
The dotted curves and the open symbols show (E/N)lim values for
the binary mixtures SF6-Ar [14] and SF6-Kr [15]
4. Conclusion
The electron drift velocity, density-normalized
longitudinal coefficient, and density-normalized effective
ionization coefficient in the binary mixtures in CF3I with
Ar and Kr gases are calculated using a two-term
approximation of the Boltzmann equation for the energy in
the E/N range of 10 - 1000 Td for the first time. The NDC
phenomena in these binary gas mixtures are suggested. The
electron transport calculated coefficients are also
compared with those of the pure SF6 gas in experiments.
The limiting field strength values of E/N for the binary
mixtures of 70% CF3I gas with Ar and Kr gases are
determined and greater than those of the pure SF6 gas.
Therefore, these binary mixtures with CF3I concentration
equal to about 65 - 75% are considered for use in high
voltage and many industries. For the purposes of
justification of the accuracy of our results, more
experimental data for electron transport coefficients for the
binary mixtures of CF3I with these gases need to be
performed over a wide range of E/N.
REFERENCES
[1] Conference of the Parties, Third Session Kyoto, Kyoto, Japan (1997).
[2] L. G. Christophorou and R. J. Van Brunt, IEEE Trans. Dielectrics
and Elec. Insulation, 2, 952 (1995).
[3] M. K. M. Jamil, Ph.D. dissertation, Dept. Elect. Electron. Eng.,
Kyushu Institute of Technology, Fukuoka, Japan (2007).
[4] M. Taki, D. Maekawa, H. Odaka, H. Mizoguchi, and S. Yanabu,
IEEE Trans. Dielectrics and Elec. Insulation, 14, 341 (2007).
[5] H. Takagari, H. Kasuya, H. Mizoguchi, and S. Yanabu, IEEE Trans.
Dielectrics and Elec. Insulation, 15, 1424 (2008).
[6] H. Tagashira, Y. Sakai, and S. Sakamoto, J. Phys. D, Appl. Phys.,
10, 1051 (1977).
[7] D. A. Tuan, J. Korean Phys. Soc., 64, 23 (2014).
[8] M. Kimura and Y. Nakamura, J. Phys. D, Appl. Phys., 43, 145202-
1 (2010).
[9] Y. Nakamura and M. Kurachi, J. Phys. D, Appl. Phys., 21, 718 (1988).
[10] M. Hayashi, J. Phys. D, Appl. Phys., 15, 1411 (1982).
[11] R. V. Chiflikian, Phys. Plasmas, 2, 3902 (1995).
[12] T. Aschwanden, Ph.D. dissertation, Eidgenössische Technische
Hochschule Zürich, Zurich, Germany, 1985 (in German).
[13] J. de Urquijo, A. A. Castrejón-Pita, J. L. Hernández-Ávila, and E.
Basurto, J. Phys. D, Appl. Phys., 37, 1774 (2004).
[14] J. de Urquijo, J. L. Hernández-Ávila, E. Basurto, and F. Ramírez, J.
Phys. D, Appl. Phys., 36, 1489 (2003).
[15] Y. Qiu and D. M. Xiao, J. Phys. D, Appl. Phys., 27, 2663 (1994).
(The Board of Editors received the paper on 27/02/2018, its review was completed on 14/3/2018)
ISSN 1859-1531 - THE UNIVERSITY OF DANANG, JOURNAL OF SCIENCE AND TECHNOLOGY, NO. 6(127).2018 21
EVALUATION OF SHEAR STRENGTH OF REINFORCED CONCRETE
STRUCTURAL WALLS OF ACI 318-14 AND EUROCODES
Tran Anh Thien
University of Science and Technology - University of Danang; [email protected]
Abstract - Reinforced concrete structural walls are very effective in resisting lateral loads due to their high strength and stiffness. While Vietnamese Standard TCVN 5574-2012 does not provide detailed provisions for design of structural walls, the shear strength of reinforced concrete structural walls according to various building codes are very different. The paper investigates the design shear strength of reinforced concrete structural walls using provisions from ACI 318-14, Eurocode 2 EN 1992-1:2004, and Eurocode 8 EN 1998-1:2004. The theory used in these building codes to determine wall shear strength is analyzed and numerical comparison is carried out to evaluate the influence of key parameters, including compressive concrete strength, axial load level, and shear span ratio, on the wall shear capacity, for both non-seismic and seismic design.
Key words - reinforced concrete; structural wall; shear wall; shear strength; building code
1. Introduction
Reinforced concrete structural walls are commonly
used to resist lateral loads, such as wind or earthquake
loads, due to their high strength and stiffness. Although
being important structural members, detailed provisions
for behavior and design of structural walls are not provided
in Vietnamese Standard TCVN 5574-2012 [1]. In fact, the
design of reinforced concrete structural walls for shear has
become an issue as the shear capacity according to various
building codes are very different due to the complex stress
redistributions that occur after cracking. Shear transfer
mechanisms have been proved to be influenced by various
parameters.
Several factors have an influence on the shear capacity
of reinforced concrete structural walls. The most
influenced parameters are known as wall cross section,
concrete strength, axial force and shear span ratio. There
has been much research on the shear performance and
design of reinforced concrete structural walls according to
different building codes [2], [3], [4], [5], [6]... However, no
investigation has been done on direct comparison of design
provisions from ACI 318 and Eurocodes with respect to
specific parameters. This study investigates the design
shear strength of reinforced concrete structural walls using
provisions from ACI 318-14 [7], Eurocode 2 EN
1992-1:2004 [8], and Eurocode 8 EN 1998-1:2004 [9] for
both non-seismic and seismic design.
2. Shear provisions of structural walls in ACI 318-14,
Eurocode 2 EN 1992-1:2004, and Eurocode 8 EN
1998-1:2004
2.1. ACI 318-14
In ACI 318-14, design provisions for shear of reinforced
concrete structural walls are presented in Sections 11.5.4 and
18.10.4. These two semi-empirical equations are based on
the modified truss analogy approach and can be used to
predict the peak shear capacity of reinforced concrete walls.
According to this modified truss analogy approach, the peak
wall shear strength is the summation of two shear forces, one
resisted by concrete and the other resisted by horizontal web
reinforcement. Both sections assume a diagonal tension
failure mechanism with a 45-degree crack and diagonal
compression failure is prevented by controlling an upper
limit for the wall shear stress. While Section 11.5.4 provides
requirements for non-seismic design (NSD) of structural
walls, Section 18.10.4 provides provisions for seismic
design (SD) of structural walls.
The procedure to predict the shear capacity of
reinforced concrete walls in Section 11.5.4 is given by the
following equations.
'10n c s cV V V f hd= +
(1)
1 2min[ , ]c c cV V V=
(2)
'
1 3.34
uc c
w
N dV f hd
l= +
(3)
'
'
2
0.21.25
0.6
2
uw c
w
c cu w
u
Nl f
l hV f hd
M l
V
=
+
+
−
(4)
v yt
s
A f dV
s=
(5)
where Vn (lb) is the nominal shear strength of the wall;
Vc (lb) is the nominal shear strength provided by concrete;
Vs (lb) is the nominal shear strength provided by horizontal
web reinforcement; is the modification factor to reflect the
reduced mechanical properties of lightweight concrete
relative to normal weight concrete of the same compressive
strength, =1.0 for normal concrete; f’c (psi) is the specified
compressive strength of concrete; h (in.) is the thickness of
the wall; lw (in.) is the length of the wall; d (in.) is the
distance from the extreme compressive fiber to centroid of
longitudinal tension reinforcement and assumed to be 0.8lw
unless a larger value is determined by a strain compatibility
analysis; Mu (lb-in) and Vu (lb) are the factored moment and
shear force at the critical section, respectively; Nu (lb) is the
factored axial load that is positive in compression and
negative in tension; Av is the area of horizontal web
reinforcement within spacing s; fyt is the specified yield
strength of horizontal web reinforcement.
The value for u uM V is evaluated at the critical section
above the base of the wall, and the location of that section
is described in Figure 1.
22 Tran Anh Thien
Figure 1. Location of critical section for checking flexural-
shear strength [10]
Equation (4) does not apply if:
02
u w
u
M l
V− (6)
In order to avoid diagonal compression failure, the wall
shear stress is limited to '10 cf . The horizontal web
reinforcement has the minimum ratio of 0.25%:
0.0025t
(7)
The minimum vertical web reinforcement ratio is given by:
( )0.0025 0.5 2.5 0.0025wl t
w
h
l
+ − −
(8)
In SI units, the three equations (1), (3), (4) are replaced
by the three following equations (9), (10), (11),
respectively,
'0.83n c s cV V V f hd= +
(9)
'
1 2.74
uc c
w
N dV f hd
l= +
(10)
'
'
2
0.20.1
0.05
2
uw c
w
c cu w
u
Nl f
l hV f hd
M l
V
=
+
+
−
(11)
where f’c is (MPa), h (mm), lw (mm), d (mm), Mu (Nm), Vu
(N), and Nu (N).
The nominal shear strength of reinforced concrete
structural walls per Section 18.10.4 is given as follows.
( )' '10n c c t yt cv c cvV f f A f A = +
(12)
where Vn (lb) is the nominal shear strength of the wall;
c is a function of wall aspect ratio, equal to 2.0 for
2.0w
w
h
l , 3.0 for 1.5w
w
h
l
and varies linearly for
1.5 2.0w
w
h
l ; f’c (psi) is the specified compressive
strength of concrete; t is the horizontal web
reinforcement ratio; ytf (psi) is the yield stress of the
horizontal web reinforcement; Acv (in2) is the gross area
of the wall bounded by the web thickness and the wall
length; hw (in) and lw (in) are the height and length of the
wall, respectively.
In SI units, Equation (12) is rewritten as the following
equation.
( )' '0.83n c c t yt cv c cvV f f A f A = +
(13)
where Vn (N); c is equal to 0.17 for 2.0w
w
h
l , 0.25 for
1.5w
w
h
l
and varies linearly for 1.5 2.0w
w
h
l ; f’c (MPa);
ytf (MPa); Acv (mm2); hw (mm) and lw (mm).
The major difference between sections 11.5.4 and
18.10.4 is the calculation of wall shear strength provided
by concrete. In Section 11.5.4, the two values of the
concrete contribution corresponding to different cracking
conditions are determined. Equation (3) corresponds to
the occurrence of web shear cracking at a principal tensile
stress of approximately '4 cf at the centroid of the shear
wall cross section. Equation (4) corresponds
approximately to the occurrence of flexure-shear
cracking at a flexural tensile stress of '6 cf at a section
above the section being investigated. In Section
18.10.4, the concrete contribution is determined using an
empirical factor c that is a function of wall aspect ratio.
The design shear strength of reinforced concrete
structural walls is Vn, where is the strength reduction
factor for shear.
2.2. Eurocode 2 EN 1992-1:2004
The non-seismic design provisions for shear of
reinforced concrete structural walls in Eurocode 2 EN
1992-1:2004 (EC2 (2004)) are presented in Section 6.2.
According to EC2 (2004), horizontal shear reinforcement
of structural walls is calculated on the basis of a variable
inclination truss model, which is similar to the theory
applied to beams. It should be noted that in this model, all
shear is resisted by the provision of links with no direct
contribution from the shear capacity of the concrete itself.
The shear resistance RdV in Section 6.2 is determined as
follows.
, ,max;minRd Rd s RdV V V =
(14)
, cotsw ywd
Rd s
A f zV
s=
(15)
1,max
cot tan
cw cd wRd
f b zvV
=
+ (16)
where ,Rd sV is the shear resistance of the links which are
horizontal web reinforcement; ,maxRdV is the maximum
2
wl
ISSN 1859-1531 - THE UNIVERSITY OF DANANG, JOURNAL OF SCIENCE AND TECHNOLOGY, NO. 6(127).2018 23
design value of the shear which can be resisted by the
concrete strut; swA is the cross-sectional area of the shear
reinforcement; s is the spacing of horizontal web
reinforcement; ywdf is the design yield strength of the
horizontal web reinforcement, 1.15
yk
ywd
ff = ;
ykf is the
ultimate design yield strength of the horizontal web
reinforcement; z is lever arm between the upper and lower
chord members of the analogous truss, which can be taken
as 0.8 wl ; is the angle between the diagonal concrete
compression struts to the wall axis perpendicular to the
shear force; cw is a coefficient taking account of the state
of the stress in the compression chord, which is taken as 1
for non-prestressed structures; cdf is the design concrete
compressive strength, 1.5
ckcd
ff = ;
ckf is the ultimate
design concrete compressive strength; 1v is a strength
reduction factor for concrete cracked in shear
1 0.6 1250
ckfv
= −
.
In EC2 (2004), the angle has a value between 21.8
and 45 degrees, or:
1.0 cot 2.5 (17) 2.3. Eurocode 8 EN 1998-1:2004
The seismic design provisions for ductile reinforced
concrete structural walls in Eurocode 8 EN 1998-1:2004
(EC8 (2004)) are presented in Section 5.5. The following
provisions are required to prevent diagonal tension failure
of the wall web due to shear.
If the shear span ratio 2.0Eds
Ed w
M
V l = , the previous
provisions in EC2 (2004) are applied with the angle
taken as 45 degrees.
If the shear span ratio 2.0s , the shear resistance RdV
is determined as follows.
, , ,0.75Rd s Rd c h yd h wo s wV V f b l = +
(18)
where ,Rd cV is the design value of shear resistance for
members without shear reinforcement, h is the
reinforcement ratio of horizontal web bars, bh
wo h
A
b s = ;
,yd hf is the design yield strength of the horizontal web
reinforcement; wob is the thickness of the wall.
The design value ,Rd cV of shear resistance for members
without shear reinforcement is given by:
1/3
, 1 1 w ,min(100 )
c Rd c ck cp cV C k f k b d V = +
(19)
The shear resistance Vc is not less than:
,min min 1 w(v )
c cpV k b d= + (20)
where fck (MPa) is the characteristic compressive cylinder
strength of concrete at 28 days;
2002,01k
d
= +
(21)
with d (mm); 1 is the longirtudinal tension with d (mm)
1
1
w
0.02s
A
b d = 22)
Asl is the area of longitudinal tension reinforcement,
which extends (lbd+d) beyond the section considered; k1
is 0.15; cp (MPa) is the compressive stress in the concrete
from axial load,
c
0.2Ed
cp
Nfcd
A = (23)
NEd (N) is the axial force in the cross-section due to
loading; to be taken as positive for compression and
negative for tension; Ac (mm2) is the area of the concrete
cross section; fcd (MPa) is the design value of concrete
compressive strength; bw (mm) is the smallest width of the
cross-section in the tensile area; d (mm) is the distance
from the extreme compressive fiber to centroid of
longitudinal tension reinforcement, vmin is determined as: 3/2 1/2
min 0.035 ckv k f= (24)
3. Comparison of design code provisions
The shear resistance of a reinforced concrete shear
wall is investigated based on the following building code
provisions: ACI 318-14 (NSD), ACI 318-14 (SD),
EC2 (2004) and EC8 (2004), where NSD and SD stand
for non-seismic design and seismic design, respectively.
The structural wall has the rectangular cross section of
25×300cm and is subjected to a concentrated force at the
top of the wall. Horizontal web reinforcement consists of
two layers of 14mm-diameter bars at spacing of 200mm,
and has the design yield strength of 280MPa.
3.1. Shear strength versus concrete compressive strength
level
Figure 2. Comparison of *
nV versus B for walls with
the axial load of 2400kN
24 Tran Anh Thien
Figure 3. Comparison of *
nV versus B for walls with
the axial load of 6000kN
Figures 2 and 3 present the relation between the design
shear resistance *
nV
and concrete strength grade B
mentioned in TCVN 5574-2012. *
nV stands for nV in ACI
318-14 and RdV
in Eurocodes. The structural wall has
aspect ratio of 2.0. The axial load acting on the wall is kept
constant as 2400kN and 6000kN, which is equal to '0.2 c cvf A and '0.5 c cvf A for B15 concrete, in Figures 2
and 3, respectively.
As can be seen from the figures, *
nV calculated for non-
seismic wall design is significantly larger than that for
seismic design in Eurocodes, especially with high concrete
compressive strength. That is because ,maxRdV is
proportional to cdf , leading to that ,max .Rd Rd sV V with
high concrete compressive strength for all 21.8 45 = degrees. At B45 or above, *
nV of EC8 (2004) is 2.5 times
larger than that of EC2 (2004). This difference in wall
shear strength is also obvious between ACI 318-14 (NSD)
and ACI 318-14 (SD), especially with high axial load.
In EC8 (2004), as the angle is set constant as 45
degrees and , .max( 45)Rd s RdV V = , the design shear
resistance does not change with varied concrete strength. *
nV based on ACI 318-14 (SD) and EC8 (2004) are quite
closed together for walls with low concrete compressive
strength, EC8 (2008) always gives more conservative shear
strength compared with ACI 318-14 (SD).
3.2. Shear strength versus axial load ratio
Figures 4 and 5 show the relation between the design
shear resistance *
nV
and axial load ratio '
c cv
N
f A. The
structural wall also has aspect ratio of 2.0. The concrete
strength grade is B20 and B50 in Figures 4 and 5,
respectively. Of these building code provisions, only the
design shear resistance calculated in ACI 318-14 (NSD)
depends on the axial load. *
nV in ACI 318-14 (NSD)
increases much more significantly with higher concrete
compressive strength. For walls using B20 concrete,
*
nV at '
0.5c cv
N
f A is 1.7 times larger than that at
'0.2
c cv
N
f A. This difference increases up to 2.5 times for
walls using B50 concrete.
Figure 4. Comparison of *
nV versus axial load ratio for concrete B20
Figure 5. Comparison of *
nV versus axial load ratio for concrete B50
3.3. Shear strength versus shear span ratio
When the wall shear span ratio increases from 2.0, the
shear strength based on ACI 318-14 (NSD) decreases,
while that based on the other building code provisions
remains the same. Figure 6 presents the relation between
the design shear resistance *
nV from ACI 318-14 (NSD)
and concrete strength grade B, corresponding to the shear
span ratio of 2.0, 3.0, and 4.0. The figure indicates that *
nV
decreases when the shear span ratio increases. However, *
nV decreases substantially at low shear span ratio and
decreases slightly at high shear span ratio.
Figure 6. Comparison of *
nV versus B at shear span ratio
ranging from 2.0 to 4.0
ISSN 1859-1531 - THE UNIVERSITY OF DANANG, JOURNAL OF SCIENCE AND TECHNOLOGY, NO. 6(127).2018 25
4. Conclusion
The study is carried out to investigate the influence of
various parameters on the shear resistance of structural
walls in the following building codes: ACI 318-14,
Eurocode 2 EN 1992-1:2004, and Eurocode 8 EN 1998-
1:2004. The structural wall has the rectangular cross
section of 25×300cm and is subjected to a concentrated
force at the top of the wall. Horizontal web reinforcement
consists of two layers of 14mm-diameter bars at spacing of
200mm, and has the design yield strength of 280MPa.
From the study, the following conclusions can be drawn.
- ACI 318-14 provides semi-empirical equations to
determine the wall shear strength which are based on the
modified truss analogy approach. The peak wall shear
strength is the summation of two shear forces, one resisted
by concrete and the other resisted by horizontal web
reinforcement. ACI 318-14 assumes a diagonal tension
failure mechanism with a 45-degree crack.
- According to EC2 (2004) and EC8 (2004), the wall
shear strength is calculated on the basis of a variable
inclination truss model, in which all shear is resisted by the
provision of horizontal web reinforcement with no direct
contribution from the shear capacity of the concrete. The
angle between the diagonal concrete compression struts
to the wall axis perpendicular to the shear force varies from
21.8 to 45 degrees in EC2 (2004), while it is set constant
as 45 degrees in EC8 (2004).
- Generally, the wall shear resistance increases with
concrete compressive strength, except for that calculated
from EC8 (2004). In EC8 (2004), as the angle is set
constant as 45 degrees and , .max( 45)Rd s RdV V = ,
the design shear resistance does not change with varied
concrete strength.
- EC8 (2008) provides more conservative wall shear
strength compared with ACI 318-14 (SD). Shear strength
calculated from ACI 318-14 (SD) is almost 1.5 times larger
than that from EC8 (2008) for walls with shear span ratio
of 2.0 and B60 concrete.
- Of these building code provisions, only the design
shear resistance calculated in ACI 318-14 (NSD) depends
on the axial load. *
nV in ACI 318-14 (NSD) increases much
more significantly with higher concrete compressive
strength.
- The shear strength based on ACI 318-14 (NSD)
decreases when the wall shear span ratio increases from
2.0, while that based on the other building code provisions
remains the same. The shear strength decreases more
slightly at higher shear span ratio.
REFERENCES
[1] TCVN 5574-2012 Concrete and reinforced concrete structures - Design standard.
[2] ASCE-ACI Committee 426 (1973). The Shear Strength of
Reinforced Concrete Members, Journal of Structural Division,
ASCE, V. 99, No. 6, pp. 1091-11872.
[3] ASCE-ACI Committee 445 (1999). ACI 445R-99 Recent
Approaches to Shear Design of Structural Concrete.
[4] Rangan, B. V. (1998). Shear design of reinforced concrete beams, slabs
and walls, Cement and Concrete Composites, No. 20, pp. 455-464.
[5] Gulec, C. K., and Whittaker, A.S. (2009). Performance-based
assessment and design of squat reinforced concrete shear walls,
Technical Report MCEER-09-0010, 660 pp.
[6] Dashti, F. and Dhakal R. (2013). Comparative performance of RC
shear walls designed by different standards. Advances in Structural Engineering and Mechanics, pp. 1084-1103.
[7] ACI 318-14 Building code requirements for structural concrete and
commentary. American Concrete Institute. Farmington Hills.
[8] Eurocode 2 EN 1992-1:2004. Design of concrete structures - Part 1-
1: General rules and rules for buildings.
[9] Eurocode 8 EN 1998-1:2004. Design of structures for earthquake
resistance – Part 1: General rules, seismic actions and rules for
buildings.
[10] Wight, J.K., and MacGregor, J.G. (2012). Reinforced concrete –
Mechanics and design, Pearson Education, Inc., 1157 pp.
(The Board of Editors received the paper on 29/5/2018, its review was completed on 13/6/2018)
26 Vu Van Truong, Truong Viet Anh, Tran Xuan Bo, Truong Van Thuan
FULLY RESOLVED SIMULATION OF THE PHASE CHANGE PROCESS OF
A LIQUID DROP
Vu Van Truong, Truong Viet Anh, Tran Xuan Bo, Truong Van Thuan
School of Transportation Engineering, Hanoi University of Science and Technology;
[email protected], [email protected], [email protected], [email protected]
Abstract - This paper presents a numerical investigation of the solidification process of a liquid drop on a cold solid surface. The drop is immersed in the computational domain with the presence of three phases: solid – liquid – gas. The Navier-Stokes and energy equations are used to solve the problem in which the interface separating different phases is represented by a front-tracking method. The interpolation technique is used to impose the non-slip boundary condition on the solid surface. The cold surface on which the drop is placed is the cause of solidification with the phase change interface propagating from the cold surface to the top of the drop. The numerical results of some typical cases that are compared with the available experimental ones indicate the accuracy of the numerical method used in this study.
Key words - Numerical simulation; phase change; liquid drop; front-tracking; three phases
1. Introduction
Understanding of the dynamics of a drop including
phase change heat transfer is very important because of its
wide range applications such as atomization, crystal
growth, food processing and so on. In nature, one can find
the solidification of water drops attaching to leaves, cable
lines, wind turbine blades and aircraft wings. Accordingly,
there have been many studies concerned with this
solidification problem.
Experimentally, Enríquez et al. [1] dripped a water drop
on a subzero temperature plate that caused the drop to
freeze. Jin and co-workers [2] used a molecular tagging
thermometry technique to capture the motion of the water–
ice phase change interface during the solidification of a
water drop on a cold plate. Recently, Zhang et al. [3] also
paid attention to the freezing process of a water drop on a
plate. Itoh and co-workers [4] used molten silicon, a
semiconductor material, as a phase change material to
growth crystallized silicon drops for solar cell applications.
Satunkin [5] used molten silicon, germanium and indium
antimonide to form solid drops and to find the growth
angles at the tri-junction (where the three phases meet).
A common interesting feature of all above-mentioned
works is the formation of an apex at the top of the drop
after complete solidification because of volume expansion
and the effect of the growth angle.
Theoretically, Sanz [6] and Nauenberg [7] developed
models to reproduce the evolution of the phase change and
drop fronts of a drop solidifying on a cold plate. In another
recent work, Zhang et al. [8] also theoretically investigated
the freezing process of a water drop on a plate.
Concerning numerical simulations, a few studies have
been done for the solidification problem of a liquid drop on
a plate. For instance, the boundary integral method [9], the
Galerkin finite element method [10] and the front-tracking
method [11,12] have been used to investigate the dynamics
of the phase change heat transfer of the drop solidification
problem.
It is evident that the problem of a liquid drop solidifying
on a cold plate has been getting more and more attractive.
Thus, an accurate method for simulating the problem
becomes very important. Accordingly, the present study
presents a direct numerical method for simulations of a
liquid drop solidifying on a cold plate. The methods used
here are the front-tracking technique to represent the
interface and an interpolation technique to deal with the
non-slip boundary condition.
2. Numerical problem and governing equations
We consider an axisymmetric liquid drop placed on a
cold plate whose temperature Tc is below the fusion
temperature Tm of the drop liquid (Figure 1). Because of
the cold plate, the solidifying front formed on the plate
surface propagates upwards to the top of the drop. Initially,
the liquid drop is assumed to be a section of a sphere with
a volume denoted by V0. The contact angle 0 is then
defined at the plate. The growth angle at the tri-junction
(i.e. triple point) at which three phases meet [12,13] is
defined as
gr s l = − (1)
where s is the angle between the tangent to the solid–gas
interface and the horizontal, and l the tangent to the
liquid–gas interface and the horizontal. Assuming all fluids
(i.e. gas and liquid) to be incompressible, immiscible and
Newtonian, the one-fluid formulation gives
( ) ( ) Tt p ( ) + = − + +u uu u u
( )f f
f
dS+ − + x x n f g (2)
( ) ( ) ( )p pC T t C T k T + = u
( )f
f
q dS+ − x x (3)
0 =u (4)
ISSN 1859-1531 - THE UNIVERSITY OF DANANG, JOURNAL OF SCIENCE AND TECHNOLOGY, NO. 6(127).2018 27
Figure 1. A liquid drop solidifying on a cold plate: (a) computational domain and (b) front-tracking representation
Here, u is the velocity vector, p is the pressure, g is the
acceleration induced by gravity, T is the temperature and
f is the forcing term used to enforce the non-slip velocity
boundary condition at the solid surface. , , k and Cp are
respectively the density, viscosity, thermal conductivity
and heat capacity that are assumed constant in each phase.
The Dirac delta function δ(x − xf) is zero everywhere
except a unit impulse at the interfaces xf with f denoting
interface. The superscript T denotes the transpose. At the
liquid–gas interface, and are the interfacial tension
coefficient and twice mean curvature, respectively. q is the
heat source at the solidification interface, given as
s l
s l
T Tq k k
n n
= −
(5)
where the subscripts s, l and g (when available) represent
solid, liquid and gas, respectively.
For some phase change materials such as water, silicon,
and germanium, the density of the solid phase is different
from that of the liquid phase, and thus change in volume
occurs during solidification. Accordingly, Eq. (4) is
rewritten as follows [12]
( )1 1 1
f
h s l f
qdSL
= − −
u x x (6)
where Lh denotes the latent heat. The boundary conditions
are as follows: symmetry at the left, full slip at the right,
open at the top and non-slip at the bottom (Figure 1a).
3. Numerical method
To solve the problem, we use a front-tracking method
for three phase simulations with an interpolation technique
to treat the presence of the solid phase within the
computational domain on which a uniformly distributed
rectangular grid is constructed [14]. The spatial derivaties
are descritized by a second-order central difference
approximation. The time integration is approximated by a
predictor-corrector scheme. The interface separating
different phases is represented by connected points moving
on the fixed grid (Figure 1b). We update the position of the
liquid–gas and solid–liquid front points by
1n n
f f f fV t+ = + x x n (7)
where the superscripts n and n+1denote the current and
next time levels. nf is the unit vector normal to the
interface. Vf, the velocity magnitude of the front point, is
given as [15]
( ) ( )
( )
1 0 1
where 1 1 0
0 1
f f x y ijV d r d r
r, r ,
d r r, r ,
, r
=
−
= + −
n u
(8)
for the liquid–gas front, and ( )f s hV q L= − (9)
for the solid–liquid front with q calculated by a normal
probe technique
( ) ( )1
s s m l m lq k T T k T Th
= − − − (10)
where h is the grid spacing. Ts and Tl are the temperature
of the solid and liquid near the phase change front at the
solid and liquid points that are h away from the front. At
the triple point, we impose a constant growth angle,
gr = constant [12]. Thereby, the solid–gas points are
constructed.
To identify the phases as well as their fluid and thermal
properties, we construct two indicator functions Is (from
the solid–liquid and solid–gas interfaces) and Il (from the
liquid–gas and solid–gas interfaces) whose values are
specified as
0 in solid, and 1 in liquid and gas
0 in solid and liquid, and 1 in gas
s s
l l
I I
I I
= =
= = (11)
Accordingly, the values of the material properties such
as , , k and Cp (represented by ) at every location in the
domain are given by
( )1l s s s l g lI I I I = + − + (12)
A more detailed description of the method used in this
study can be found in [12,14].
4. Numerical parameters
We choose an equivalent radius of the drop
Rc = R = ( )1 3
03 4V as a scaling length. Here, V0 is the
28 Vu Van Truong, Truong Viet Anh, Tran Xuan Bo, Truong Van Thuan
volume of the initial liquid drop. An alternative scaling
length is the wetting radius Rw (Figure 1), i.e. Rc = Rw. The
characteristic time scale is 2c l l c lC R k = . The
characteristic velocity scale is taken to be .c c cU R =
With these above choices, the dynamics of the problem is
governed by the following dimensionless parameters
(Prandtl number Pr, Stefan number St, Bond number Bo,
Ohnesorge number Oh, dimensionless initial temperature
0, density ratios sl and gl, viscosity ratio gl, thermal
conductivity ratios ksl and kgl, heat capacity ratios Cpsl and
Cpgl):
2pl l pl m c l c l
l h l c
C C (T T ) gRPr ,St ,Bo ,Oh
k L R
−= = = = (13)
00
g gc ssl gl gl
m c l l l
T T, , ,
T T
−= = = =
− (14)
g ps pgs
sl gl psl pgl
l l pl pl
k C Ckk , k , C , C
k k C C= = = = (15)
Figure 2. Evolution of the solidifying front at different stages of solidification with the temperature contours (color) plotted every
= 0.1 and the velocity field normalized by Uc. Rc is equal to R. The parameters are shown in the text
The temperature is non-dimensionalized as
( ) ( ).c m cT T T T = − − The dimensionless time is = t/c.
5. Results and discussion
Figure 2 shows the temporal evolution of the
solidification front with the temperature contours and the
velocity field. The parameters for this calculation are
Pr = 7.25, St = 0.104, Oh = 0.2, Bo = 2.0, sl = 0.9,
gl = gl = 0.05, ksl = 4.0, kgl = 0.05, Cpsl = 0.5, Cpsl = 0.24,
gr = 00, 0 = 1 and 0= 900. At = 0.016 (Figure 2a), the
gravity results in a downward flow at the center of the drop
and deforms the drop, inducing counter clockwise
circulations around the drop. This downward flow causes a
reduction in the temperature field within the liquid phase
while the temperature in the solid phase increases from the
wall value ( =c = 0) at the wall to the fusion value
( =m = 1) at the solid–liquid interface. At a later time
= 0.4, the gravity balances with the surface tension force
holding the drop in a spherical shape, and thus no flow
appears at this time (Figure 2b). Accordingly, the
temperature in the liquid phase is almost at the fusion value.
At = 1.25 (Figure 2c), almost all liquid has solidified, and
the solidified drop has an apex at the top because of volume
expansion (i.e., sl = 0.9) [12,14].
Figure 3 shows the temporal variation of the drop
height and the drop volume for the case shown in Figure 2.
This figure clearly shows the effect of the gravity at the
beginning of solidification with a decrease in the height of
the drop. Then, the surface tension force acting on the
liquid–gas interface pushes the liquid–gas interface up to
be against the gravity. Because the liquid is denser than the
solid (sl < 1.0), the drop height and volume increase in
time as the solidification proceeds as shown in Figure 3.
After complete solidification, the volume of the solidified
drop is about 1.1 times the volume of the initial liquid drop.
A few phase change materials having such a feature, i.e.
volume expansion upon solidification, include water,
silicon and germanium [5]. However, most metals have the
solid denser than the liquid and thus experience shrinkage
upon solidification.
Figure 3. Temporal variation of the solidifying front and the
drop volume for the case shown in Figure 2
To evaluate the capability of the method for
computations of the solidification process of a drop, we
perform a simulation of a water drop freezing on a cold
plate and compared the results with the experiment of
Zhang et al. [3], as shown in Figure 4. Experimentally,
Zhang and co-workers [3] placed a water drop of 10 L
ISSN 1859-1531 - THE UNIVERSITY OF DANANG, JOURNAL OF SCIENCE AND TECHNOLOGY, NO. 6(127).2018 29
on a horizontal wall that was kept at Tc = –16.50C, and
used a photographic technique to capture the evolution of
the ice–water phase change interface during freezing
(bottom row in Figure 4). The corresponding Prandtl,
Stefan and Bond numbers for this case are Pr = 7.5,
St = 0.209 and Bo = 0.25, based on the properties of water
and ice and Rc = R. The growth angle gr is set to 00 [5].
The top row in Figure 4 shows the time sequence of the
freezing of the drop yielded from the present computation.
The comparison indicates that the computation result
agrees quite well with the experimental data of
Zhang et al. [3].
Figure 4. Evolution of the water–ice front at different stages of freezing in comparison with
the experiments of Zhang et al. [3]. Rc is equal to R
Figure 5 shows the evolution of the average height Hs
of the freezing front for the case shown in Figure 4. The
variation with respect to time of Hs indicates that the
freezing rate is high at the beginning and near the end of
the freezing process. This tendency is in accordance with
Nauenberg’s theoretical analysis [7]. As previously
mentioned, water is a phase change material whose liquid
density is higher than that of ice, and thus the drop expands
in volume as the freezing process progresses, with a
volume increment of about 10% after complete
solidification, as shown in Figure 5. Figure 5 also confirms
that the increase in the volume of the computational drop
is in good agreement with the experimental result of Zhang
et al. [3].
Figure 5. Temporal evolutions of the average height of the
water–ice front Hs and of the volume of the drop Vd normalized
by the volume of the initial liquid drop V0. The cirles are data
from the experiment of Zhang et al. [3]
Silicon, a semiconductor material, also has a liquid
phase denser than the solid phase, and thus experiences
volume expansion upon crystallization. Figure 6 shows the
evolution of the solid–liquid interface during the
crystallization process of a molten silicon drop attaching to
a cold wall. The main parameters for this computation are
Pr = 0.013, St = 0.116, sl = 0.91 and gr = 120, based on
the properties of silicon [5]. Because of volume expansion
and the effect of the growth angle, the crystallized silicon
drop is very different from the initial molten one with an
apex at the drop top. This crystallized drop shape agrees
very well with the experimental drop shape (the most right
frame in Figure 6) reported in Satunkin’s work [5]. For
more details of the comparison, see [11].
Figure 7 shows the evolution of the solidifying
interface during the solidification process of an indium
antimonide drop whose main parameters are Pr = 0.0255,
St = 0.278, sl = 0.8 and gr = 250. The corresponding
solidified drop yielded from Satunkin’s experiment [5] is
present at the right of Figure 7. Because of the significant
effects of the growth angle and volume change, the initial
molten drop with a spherical cap solidifies to a very conical
solid drop with a large increase in its height (the final
height is more than two times higher than the initial height).
This shape of the solidified drop is in good agreement with
the experiment one reported by Satunkin [5]. For more
details of the comparison, see [11].
Based on the comparisons with the available
experiments, we can conclude that the method presented
here can accurately capture the evolution of the solidifying
drop attached to a cold wall.
6. Conclusion
We have presented a numerical method to simulate the
solidification process of a liquid drop. The method is the
front-tracking technique representing the interface by
connected elements laid on a fixed rectangular grid. The
drop with the presence of three phases (solid, liquid and
gas) is immersed in the computational domain. The Navier-
Stokes and energy equations are used in the entire domain
with the solid treated by the interpolation technique. The
propagation of the solid–liquid interface is calculated by
the normal probe technique. The liquid drop initialy treated
as a section of a sphere is placed on the plate whose
temperature below the fusion value of the liquid causes the
30 Vu Van Truong, Truong Viet Anh, Tran Xuan Bo, Truong Van Thuan
solidifying front to form and move upwards. The numerical
results show that the solidification process progresses fast
at the begining, and the solidified drop forms a cone at the
top of the drop in the case of volume expansion. The
comparisons with the available experiments for various
phase change materials including water, silicon, and
indium antimonide show that the numerical method
accurately captures the evolution of the solidification
interface as wells as the drop shape after complete
solidification.
Figure 6. The solidification process of a molten silicon drop in comparison with the crystallized drop of Satunkin [5]
Figure 7. The solidification process of a molten indium antimonide drop in comparison with the crystallized drop of Satunkin [5]
Acknowledgments
This research is funded by Vietnam National
Foundation for Science and Technology Development
(NAFOSTED) under grant number 107.03-2017.01.
REFERENCES
[1] O.R. Enríquez, Á.G. Marín, K.G. Winkels, J.H. Snoeijer, Freezing singularities in water drops, Phys. Fluids. 24 (2012) 091102-
091102-2.
[2] Z. Jin, X. Cheng, Z. Yang, Experimental investigation of the
successive freezing processes of water droplets on an ice surface,
Int. J. Heat Mass Transfer. 107 (2017) 906–915.
[3] X. Zhang, X. Wu, J. Min, Freezing and melting of a sessile water
droplet on a horizontal cold plate, Exp. Therm. Fluid Sci. 88 (2017) 1–7.
[4] H. Itoh, H. Okamura, C. Nakamura, T. Abe, M. Nakayama, R.
Komatsu, Growth of spherical Si crystals on porous Si3N4 substrate
that repels Si melt, J. Cryst. Growth. 401 (2014) 748–752.
[5] G.A. Satunkin, Determination of growth angles, wetting angles,
interfacial tensions and capillary constant values of melts, J. Cryst.
Growth. 255 (2003) 170–189.
[6] A. Sanz, The crystallization of a molten sphere, J. Cryst. Growth. 74
(1986) 642–655.
[7] M. Nauenberg, Theory and experiments on the ice–water front
propagation in droplets freezing on a subzero surface, Eur. J. Phys. 37 (2016) 045102.
[8] X. Zhang, X. Wu, J. Min, X. Liu, Modelling of sessile water droplet
shape evolution during freezing with consideration of supercooling
effect, Appl. Therm. Eng. 125 (2017) 644–651.
[9] W.W. Schultz, M.G. Worster, D.M. Anderson, Solidifying sessile
water droplets, in: Interactive Dynamics of Convection and Solidification, Kluwer Academic Publishers, 2001: pp. 209–226.
[10] A. Virozub, I.G. Rasin, S. Brandon, Revisiting the constant growth
angle: Estimation and verification via rigorous thermal modeling, J.
Cryst. Growth. 310 (2008) 5416–5422.
[11] T.V. Vu, G. Tryggvason, S. Homma, J.C. Wells, H. Takakura, A
front-tracking method for three-phase computations of solidification
with volume change, J. Chem. Eng. Jpn. 46 (2013) 726–731.
[12] T.V. Vu, G. Tryggvason, S. Homma, J.C. Wells, Numerical
investigations of drop solidification on a cold plate in the presence of volume change, Int. J. Multiphase Flow. 76 (2015) 73–85.
[13] T.V. Vu, Three-phase computation of solidification in an open
horizontal circular cylinder, Int. J. Heat Mass Transfer. 111 (2017)
398–409.
[14] T.V. Vu, J.C. Wells, Numerical simulations of solidification around
two tandemly-arranged circular cylinders under forced convection,
Int. J. Multiphase Flow. 89 (2017) 331–344.
[15] G. Tryggvason, R. Scardovelli, S. Zaleski, Direct numerical
simulations of gas-liquid multiphase flows, Cambridge University Press, Cambridge; New York, 2011.
(The Board of Editors received the paper on 25/02/2018, its review was completed on 28/3/2018)
ISSN 1859-1531 - THE UNIVERSITY OF DANANG, JOURNAL OF SCIENCE AND TECHNOLOGY, NO. 6(127).2018 31
MULTI-PERIOD LINEARIzED OPTIMAL POWER FLOW MODEL
INCORPORATING TRANSMISSION LOSSES AND THYRISTOR CONTROLLED
SERIES COMPENSATORS
Pham Nang Van1, Le Thi Minh Chau1, Pham Thu Tra My2, Pham Xuan Giap2, Ha Duy Duc2, Tran Manh Tri2 1Hanoi University of Science and Technology (HUST); [email protected], [email protected]
2Student at Department of Electric Power Systems, Hanoi University of Science and Technology (HUST)
Abstract - This paper presents multi-period linearized optimal power flow (MPLOPF) with the consideration of transmission network losses and Thyristor Controlled Series Compensators (TCSC). The transmission losses are represented using piecewise linear approximation based on line flows. In addition, the nonlinearity due to the impedance variation of transmission line with TCSC is linearized deploying the big-M based complementary constraints. The proposed model in this paper is evaluated using PJM 5-bus test system. The impact of a variety of factors, for instance, the number of linear blocks, the location of TCSC and the ramp rate constraints on the power output and locational marginal price (LMP) is also analyzed using this proposed model.
Key words - Multi-period linearized optimal power flow (MPLOPF); mixed-integer linear programming (MILP); transmission losses; Thyristor Controlled Series Compensators (TCSC); big-M
1. Introduction
Electricity networks around the world are experiencing
extensive change in both operation and infrastructure due
to the electricity market liberalization and our increased
focus on eco-friendly generation. Managing and operating
power systems with considerable penetration of renewable
energy sources (RES) is an enormous challenge and many
approaches are applied to cope with RES integration,
mainly the management of intermittency. In addition to
increasing power reserves, energy storage systems (ESS)
can be invested to mitigate the uncertainty of RES. The
increasing application of ESS as well as problems
including time-coupled formulations such as power grid
planning, N-1 secure dispatch and optimal reserve
allocation for outage scenarios have led to extended
optimal power flow (OPF) model referred to as multi-
period OPF problems (MPOPF) [1]-[2].
Typically, the MPOPF problem is approximated using the
DC due to its convexity, robustness and speed in the electricity
market calculation [3]. To improve the accuracy of the
MPOPF model, transmission power losses have been
integrated. This is significant because the losses typically
account for 3% to 5% of total system load [4]. When power
losses are incorporated in the MPOPF model, this model
becomes nonlinear. To address the nonlinearity, reference [3]
deploys the iterative algorithm based on the concept of
fictitious nodal demand (FND). The disadvantage of this
approach is that the MPOPF problem must be iteratively
solved. Reference [5] presents another approach in which
branch losses are linearized. The branch losses can be
expressed as the difference between node phase angles or line
flows [4]. The main drawback of this model is that it can lead
to “artificial losses” without introducing binary variables [5].
Moreover, the TCSC is increasingly leveraged in power
systems to improve power transfer limits, to enhance
power system stability, to reduce congestion in power
market operations and to decrease power losses in the grid
[6]. When integrating TCSC in the MPOPF problem, this
model becomes nonlinear and non-convex since the TCSC
reactance becomes a variable to be found [7]. At present,
there are several strong solvers like CONOPT, KNITRO
for solving this nonlinear optimization problem [8].
However, directly solving nonlinear optimization
problems cannot guarantee the global optimal solution.
References [9]-[10] demonstrate the relaxation technique
to solve the nonlinear optimization problem in power
system expansion planning considering TCSC investment.
Furthermore, the iterative method is used to determine
optimal parameter of TCSC in reference [11].
The main contributions of the paper are as follows:
- Combining different linearized techniques to convert
the nonlinear MPOPF to the mixed-integer linear MPOPF.
- Analysing the impact of some factors such as the
number of loss linear segments, the location of TCSC as
well as the ramp rate of the units on the locational marginal
price (LMP) and generation output.
The next sections of the article are organized as
follows. In section 2, the authors present general
mathematical formulation of multi-period optimal power
flow (MPOPF) model incorporating losses and TCSC. The
different linearization techniques are specifically presented
in section 3 and 4. Section 5 demonstrates multi-period
linearized optimal power flow (MPLOPF) model. The
simulation results, numerical analyses of PJM 5-bus
system are given in section 6. Section 7 provides some
concluding remarks.
2. General mathematical formulation
For normal operation conditions, the node voltage can
be assumed to be flat. A multi-period optimal power flow
(MPOPF) considering network constraints can be modeled
for all hour t, all buses n, all generators i, and all lines (s, r)
as follows:
( ) ( )( )
,min , . ,
i
gi giP
t T i I b G t
b t P b t
(1)
Subject to
( )( )
( )( )
( ): , : ,
, 0
,
g d
gi dj n
i i n M j j n M
P t P t P t
n N t T
− − =
(2)
( ) ( ) ( )max , ; , ; , ,ub lsr rs srP t P t P s r t T (3)
( ) ( ) ( )0 , , ; , ,ubgi gi iP b t P b t i I b G t t T (4)
32 Pham Nang Van, Le Thi Minh Chau, Pham Thu Tra My, Pham Xuan Giap, Ha Duy Duc, Tran Manh Tri
( ) ; ,lb ubgi gi giP P t P i I t T (5)
( ) ( )1 ; ,upgi gi iP t P t R i I t T− − (6)
( ) ( )1 ; ,dngi gi iP t P t R i I t T− − (7)
The objective function in (1) represents the total
system cost in T hours (here, T = 24 h). The constraints
(2) enforce the power balance at every node and every
hour. The constraints (3) enforce the line flow limits at
every hour. The constraints (4) and (5) are operating
constraints that specify that a generator’s power output as
well as power output of each energy block must be within
a certain range. The other constraints included in the
formulation above are the ramp-up constraints (6) and
ramp-down constraints (7).
If the reactance of branch xsr is taken as a variable due
to TCSC installation, in the range of min max[ , ]sr srx x , it yields
a new model:
( ) ( )( )
, ,min , . ,
sri
gi giP x
t T i I b G t
b t P b t
(8)
Subject to
min maxsr sr srx x x (9)
( ) ( )2 7− (10)
The above general model is nonlinear. Sections 3 and 4
present different linearization methods to convert this
model to the linear form.
3. Linearization of the network losses
In this section, the subscript t is dropped for notational
simplicity. However, it could appear in every variable and
constraint. Additionally, the expressions presented below
apply to every transmission line; therefore, the indication
( ), ls r will be explicitly omitted.
The real power flows in the line (s, r) determined at bus
s and r, respectively, are given by
( ) ( ) ( ), 1 cos sinsr s r sr s r sr s rP G B = − − − − (11)
( ) ( ) ( ), 1 cos sinrs s r sr s r sr s rP G B = − − + − (12)
The real power loss in the line (s, r), ( ),losssr s rP can
be attained as follows:
( ) ( ) ( ) ( )2
, , ,losssr s r sr s r rs s r sr s rP P P G = + − (13)
In the lossless DC model, the real power flow in the line
(s, r) at bus s is approximately calculated as in (14):
( ) ( ) ( )1
,sr s r sr s r s rsr
F BX
− − = − (14)
Substituting (14) in (13), the real power loss in the line
(s, r) is expressed as in (15):
( ) ( )( )
2 2
2,
1 /
loss srsr s r sr sr sr sr
sr sr
RP G X F F
R X = =
+ (15)
Equation (15) can be further simplified. The resistance
Rsr is usually much smaller than its reactance Xsr,
particularly in high voltage lines. Consequently, (15) can
be further reduced to (16)
( ) 2,losssr s r sr srP R F = (16)
The first advantage of (16) compared to (13) is that
power flows in lines neither built nor operative are zero.
Another advantage of (16) is its possible application to
model losses in HVDC lines.
The quadratic losses function (16) can be expressed
using piecewise linear approximation according to
absolute value of the line flow variable as follows:
( ) ( ) ( )1
,L
losssr s r sr sr sr
l
P R l F l =
= (17)
To complete the piecewise linearization of the power
flows and line loss, the following constraints are necessary
to enforce adjacency blocks:
( ) ( )max. ; 1,..., 1sr sr srl p F l l L = − (18)
( ) ( ) max1 . ; 2,...,sr sr srF l l p l L − = (19)
( ) ( )1 ; 2,..., 1sr srl l l L − = − (20)
( ) 0; 1,...,srF l l L = (21)
( ) 0;1 ; 1,..., 1sr l l L = − (22)
Constraints (18) and (19) set the upper limit of the
contribution of each branch flow block to the total power
flow in line (s, r). This contribution is non-negative, which
is expressed in (21) and limited upper by max /ubsr srp P L = ,
the “length” of each segment of line flow (18). A set of
binary variables ( )sr l is deployed to guarantee that the
linear blocks on the left will always be filled up first;
therefore, this model eliminates the fictitious losses. Finally,
constraints (22) state that the variables ( )sr l are binary.
A linear expression of the absolute value in (17) is
needed, which is obtained by means of the following
substitutions:
sr sr srF F F+ −= + (23)
sr sr srF F F+ −= − (24)
( )0 1 ubsr sr srF P− − (25)
0 ubsr sr srF P+ (26)
In (24), two slack variables srF +and srF −
are used to
replace Fsr. Constraints (25) and (26) with binary variable θsr
ensure that the right-hand side of (23) equals its left-hand side.
Moreover, the slopes of the blocks of line flow ( )sr l
for all transmission lines can be given by Eq. (27).
( ) ( ) max2 1sr srl l p = − (27)
It is emphasized that the number of linear segments will
radically affect the accuracy of the optimal problem
solution. Moreover, this linear technique is independent of
the reference bus selection and thereby eliminating
discrimination in the electricity market operation.
Using the above expressions, the real power flow in line
(s, r) computed at bus s and r can be recast as follows,
respectively:
ISSN 1859-1531 - THE UNIVERSITY OF DANANG, JOURNAL OF SCIENCE AND TECHNOLOGY, NO. 6(127).2018 33
( ) ( )
( ) ( )1
1, ,
2
1
2
losssr s r sr s r sr
L
sr sr sr sr
l
P P F
R l F l F
=
= +
= + (28)
( ) ( )
( ) ( )1
1, ,
2
1
2
lossrs s r sr s r sr
L
sr sr sr sr
l
P P F
R l F l F
=
= −
= − (29)
The power withdrawn into a node n, ( ),nP t can be
written as
( ) ( )1:( , )
1
2l
L
n nk nk nk nk
lk n k
P R l F l F=
= +
(30)
A linear substitution for the function in (3) can be found
by the following equivalent constraints without increasing
the number of rows
( ) ( )1
1
2
Lub
sr sr sr sr sr
l
R l F l F P=
+ (31)
Rewriting Eq. (31), the constraints (3) are expressed as
follows
( ) ( )1
11
2
Lub
sr sr sr sr
l
R l F l P=
+
(32)
4. Linearization of a bilinear function
When xsr is taken as a variable, constraint (14) also
makes the MPOPF model nonlinear since this constraint is
a bilinear function. To overcome the nonlinearity of this
constraint, we introduce a new variable Fsr, instead of
variable xsr. After obtaining the optimal solution with
variable (P, F, δ), the optimal reactance can be uniquely
determined according to Eq. (33)
s rsr
sr
xF
−= (33)
Therefore, the constraint (9) becomes:
min maxs rsr sr sr
sr
x x xF
− = (34)
It is noted that the sign of Fsr cannot be determined
beforehand. Moreover, if the denominator Fsr is zero, the
numerator s r − must be zero. As a result, (34) can be
converted into the expression (35) depending on the sign
of Fsr.
min max
max min
0 .
0 0
0 .
sr sr sr s r sr sr
sr s r
sr sr sr s r sr sr
if F F x F x
if F
if F F x F x
−
= − =
−
(35)
These condition constraints can be combined by
leveraging binary variables ysr and big-M based
complementary constraints as follows [12]. In our model, M
is taken to be / 2 due to system stability requirement [13].
( ) ( )
min max
max min1 1
sr sr sr s r sr sr sr
sr sr sr s r sr sr sr
My F x F x My
M y F x F x M y
− + − +− − + − + −
(36)
It is important to stress that linear technique using the
above binary variable is exact while the linearized
technique in Section 3 is approximately presented.
5. Multi-period linearized optimal power flow
(MPLOPF) model with losses and TCSC
The MPLOPF model with losses and TCSC has the
following form:
( ) ( )( )
, ,min , . ,
i
gi giP F
t T i I l G t
b t P b t
(37)
Subject to
( )( )
( )( )
( ) ( ) ( )
( ) ( )
: , : ,
1
:( , )
1 1
1, ,
2; ,
, ,
g d
l
gi dj
i i n M j j n M
L
nk nk nk nk
l
L Lk n k
nk nk
l l
P t P t
R l F l t F l t
n t
F l t F l t
+ −
=
+ −
= =
− =
+
+ −
(38)
( ) ( ) ( )1
11 , ,
2
Lub
sr sr sr sr sr
l
R l F l t F l t P + −
=
+ + (39)
( ) ( ) ( )max, . , F , ; 1,..., 1sr sr sr srl t p F l t l t l L + − + = − (40)
( ) ( ) ( ) max, , 1, . ; 2,...,sr sr sr srF l t F l t l t p l L+ −+ − = (41)
( ) ( ), 1, ; 2,..., 1;sr srl t l t l L − = − (42)
( ) ( ) ( ) , 0; , 0; , 0;1sr srF l t F l t l t+ − = (43)
( ) ( ) ( )1
0 , ; , ,L
ub lsr sr
l
F l t t P s r t T+
=
(44)
( ) ( ) ( )1
0 , 1 ; , ,L
ub lsr sr
l
F l t t P s r t T−
=
− (45)
( ) ( ) ( ) ( )
( ) ( ) ( ) ( )
( ) ( ) ( ) ( )
( ) ( ) ( ) ( )
min
max
max
min
1
1
sr sr sr s r
s r sr sr sr
sr sr sr s r
s r sr sr sr
My t F t x t t
t t F t x My t
M y t F t x t t
t t F t x M y t
− + − − +− − + −
− + −
(46)
( ) ( )4 7− (47)
Regarding the computational complexity of the model,
the number of continuous variable is 24. .GEN GENiN N
( )24. 1 2.24. .BUS LINN N L+ − + and the number of binary
variables is ( )24. . 1 2.24.LIN LINN L N− + .
After the MPLOPF problem is solved, the marginal cost
at the node i in hour t can be determined by the following
expression [3]:
. .i E i E l i l
l
LMP LMP LF LMP SF −= − + (48)
6. Results and discussions
In this section, the multi-period linearized optimal
power flow model is performed on the modified PJM 5-bus
system [3]. The MPLOPF problem is solved by CPLEX
12.7 [15] under MATLAB environment.
34 Pham Nang Van, Le Thi Minh Chau, Pham Thu Tra My, Pham Xuan Giap, Ha Duy Duc, Tran Manh Tri
6.1. System data
The test system is shown in Figure 1. The total peak
demand in this system is 1080 MW and the total load is
equally distributed among buses B, C and D. The daily load
curve is depicted in Figure 2. Two small size generators on
bus A have the capability to quickly start up. The ramp rate
for the other generators is 50% of the rated power output [14].
E D
A
B C
Limit=240 MW
Brighton
Park
City Load
CenterSolitude
Sundance
110MW
$14
600MW
$10
200MW
$35
520MW
$30100MW
$15
Figure 1. PJM 5-bus system and generation parameters
Figure 2. Daily load curve for PJM system
6.2. Impact from the number of linear blocks
Table 1. The effects of number of linear blocks
Linear blocks Objective ($) Total losses (MW) Time (s)
2 3844.43 316.69 1.71
4 3824.04 244.83 2.97
6 3822.96 238.56 5.28
8 3820.70 230.41 8.42
10 3820.55 229.49 12.35
11 3820.51 229.49 14.61
The number of linear blocks can significantly affect the
solution time as well as the model accuracy listed in Table
1. The key idea in this paper is to find the number of linear
blocks which give the best balance between the model
accuracy and the solution time. In this case, 10 is an
appropriate number in terms of objective value, total losses
and calcultaion time.
6.3. Impact from losses
Table 2 compares the results of power output at 10 AM
using the proposed model. These results are also compared
with those of POWERWORLD software using the ACOPF
model [16]. When comparing to POWERWORLD
software, the calculated results using the proposed model
considering losses are more accurate and less different than
that of the model neglecting losses.
Table 2. Generating output results at 10 AM
Bus Lossless (MW) Losses (MW) POWERWORLD (MW)
A1 110 110 110
A2 100 100 100
C 19.95 30.1 27.83
D 195.05 194.8 197.2
E 600 600 600
Figure 3. LMP at bus B at different hours without losses
and with losses
The results of LMP calculations at node B for 24 hours
using the proposed model with and without losses are given
in Figure 3. This figure illustrates that the effect of power
losses on LMP is very little. This result is consistent because
the power losses account for about 1% of the total load for
this PJM 5-bus system, therefore the marginal generating
units as well as congested lines are the same in both cases.
6.4. Impact from TCSC location
It is assumed that power losses are not considered and
the ramp rate of the generating units (not including units
at node A) are taken as 25% of the maximum power
output. Also, the compensation level of TCSC varies from
30% to 70%.
Figure 4 depicts the power output of generator at node
C for 24 hours for different locations of TCSC. During the
period from 1 AM to 3 AM, the power output of the unit at
node C nearly remains when the location of TCSC varies.
In addition, the power output of this unit is highest in 24
hours when TCSC is located in line A-B.
Figure 4. The dependence of Generating output of
Unit at bus C on TCSC location
6.5. Impact from ramp rate constraints
Figure 5 shows the power output of generator located
at node C when changing the ramp rate of generators and
it is assumed that TCSC is not applied to the power grid.
From the 5 AM to 24 PM, the power output of this unit is
the same for ramp rates of 25%, 35% and 50%. At the same
time, the output of this unit is the highest for ramp rate
100% of the maximum power.
900
950
1000
1050
1100
0 5 10 15 20 25
Load
(M
W)
Hour
20
25
30
35
0 5 10 15 20 25
LM
P (
$/M
Wh
)
Hour
Losses
Lossless
0
200
400
0 5 10 15 20 25
Gen
era
tio
n (
MW
))
Hour
Line A-B
Line B-C
ISSN 1859-1531 - THE UNIVERSITY OF DANANG, JOURNAL OF SCIENCE AND TECHNOLOGY, NO. 6(127).2018 35
Figure 6 depicts the effect of TCSC placement on the
power output with different ramp rate scenarios at 10 AM.
We see that the power output of generator at node C does
not change as the ramp rate of the units changes in case of
placing TCSC on line A-B. However, when TCSC is not
installed, the ramp rate of units has a significant effect on
the unit's output, increasing from 30,097 MW for the ramp
rate of 50% to 223,37 MW for the ramp rate of 100%. Thus,
using TCSC also reduces the impact of the ramp rate on the
power output.
Figure 5. The dependence of generating output of
Unit at bus C on Ramp rate without TCSC
Figure 6. The dependence of power output of
Unit at bus C on Ramp rate with TCSC in line A-B at 10 AM
7. Conclusion
This paper presents multi-period linearized optimal
power flow (MPLOPF) model based mixed-integer linear
programming (MILP). This MPLOPF integrates line losses
and Thyristor Controlled Series Compensator (TCSC). The
different linearization techniques, such as piecewise linear
approximation and big-M based complementary
constraints are deployed to convert multi-period nonlinear
OPF problem to multi-period linearized OPF model. The
calculated results using the proposed model are compared
to those of the commercial POWERWORLD software and
this proves the validation of the proposed model.
Additionally, the influences of the number of linear blocks,
line losses, location of TCSC and ramp rate are analyzed.
The results reveal that these factors can importantly impact
on LMP, generating output of units as well as revenue of
participants in electricity markets.
NOMENCLATURE
The main mathematical symbols used throughout this
paper are classified below.
Constants:
( )sr l Slope of the lth segment of the linearized power flow
in line (s, r)
( ),gi b t Offered price of the bth linear block of the energy bid
by the ith generating unit in hour t
srB Imaginary part of the admittance of line (s, r)
srG Real part of the admittance of line (s, r)
srR Resistance of the line (s, r)
srX Reactance of the line (s, r)
( )djP t Power consumed by the jth load in hour t
L Number of the blocks of the loss linearization ubsrP Transmission limit of line (s, r)
ubgiP
Upper bound on the power output of the ith producer
lbgiP
Lower bound on the power output of the ith producer
upiR Ramp-up limit of the ith unit
dniR Ramp-down limit of the ith unit
minsrx Lower bound of the reactance of the line with TCSC
maxsrx Upper bound of the reactance of the line with TCSC
BUSN Number of nodes
GENN Number of generators
LINN Number of transmission lines
GENiN Number of energy blocks of unit i
Variables:
( ),giP b t Power output corresponding to the bth block of the
ith unit in hour t
( ),nP t Power withdrawal at bus n in hour t
( ),srP t Power flow in line (s, r) at node s in hour t
( ),rsP t Power flow in line (s, r) at node r in hour t
( )s t Voltage angle at node s in hour t
( )srF t Power flow in line (s, r) in hour t without losses
( ),losssrP t Power losses in line (s, r) in hour t
( )sr l Binary variable relating to the line flow linearization
( )sry t Binary variable corresponding the big-M based
complementary constraints
( )srx t The reactance of the line with TCSC in hour t
iLF Loss factor at bus i
l iSF − Sensitivity of branch power flow l with respect to
injected power i
l Shadow price of transmission constraint on line l
Sets: I Set of indices of the generating units
( )iG t Set of blocks energy bid offered by the ith unit in
hour t N Set of indices of the network nodes
l Set of transmission lines
ACKNOWLEDGMENT
This research is funded by the Hanoi University of
Science and Technology (HUST) under project number
T2017-PC-093.
REFERENCES
[1] D. Kourounis, A. Fuchs, and O. Schenk, “Towards the next
generation of multiperiod optimal power flow solvers”, IEEE Trans.
0
200
400
1 3 5 7 9 11 13 15 17 19 21 23
Gen
era
tio
n (
MW
)
Hour
Ramp rate 25%
Ramp rate 35%
Ramp rate 50%
0
50
100
150
200
250
25% 35% 50% 100%
Gen
erat
ion (
MW
)
Ramp-rate
TCSC in line A-B
No TCSC
36 Pham Nang Van, Le Thi Minh Chau, Pham Thu Tra My, Pham Xuan Giap, Ha Duy Duc, Tran Manh Tri
Power Syst., vol. 8950, pp. 1–10, 2018.
[2] P. N. Van, N. D. Huy, N. Van Duong, and N. T. Huu, “A tool for
unit commitment schedule in day-ahead pool based electricity
markets”, J. Sci. Technol. Univ. Danang, vol. 6, pp. 21–25, 2016.
[3] F. Li, S. Member, R. Bo, and S. Member, “DCOPF-Based LMP
Simulation : Algorithm, comparison with ACOPF and sensitivity”, IEEE Trans. Power Syst., vol. 22, no. 4, pp. 1475–1485, 2007.
[4] D. Z. Fitiwi, L. Olmos, M. Rivier, F. de Cuadra, and I. J. Pérez-
Arriaga, “Finding a representative network losses model for large-
scale transmission expansion planning with renewable energy
sources”, Energy, vol. 101, pp. 343–358, 2016.
[5] J. M. Arroyo and A. J. Conejo, “Network-constrained Multiperiod auction for a pool-based electricity market”, IEEE Trans. Power
Syst., vol. 17, no. 4, pp. 1225–1231, 2002.
[6] P. N. Van, N. D. Hung, and N. D. Huy, “The impact of TCSC on
transmission costs in wholesale power markets considering bilateral
transactions and active power reserves”, J. Sci. Technol. Univ. Danang, vol. 12, pp. 24–28, 2016.
[7] G. Y. Yang, G. Hovland, R. Majumder, and Z. Y. Dong, “TCSC allocation
based on line flow based equations via mixed-integer programming”, IEEE
Trans. Power Syst., vol. 22, no. 4, pp. 2262–2269, 2007.
[8] Alireza Soroudi, Power System Optimization Modeling in GAMS.
Springer, 2017.
[9] O. Ziaee, O. Alizadeh Mousavi, and F. Choobineh, “Co-
optimization of transmission expansion planning and TCSC placement considering the correlation between wind and demand
scenarios”, IEEE Trans. Power Syst., vol. 8950, no. c, pp. 1–1, 2017.
[10] M. Farivar and S. H. Low, “Branch Flow Model: Relaxations and
Convexification (Parts I, II)”, pp. 1–11, 2012.
[11] P. N. Van and L. M. Khanh, “The optimal location and
compensation level of Thyristor Controlled Series Compensator
(TCSC) in Wholesale Electricity Markets considering Active Power Reserves”, J. Sci. Technol. Tech. Univ. Vietnam, 2017.
[12] T. Ding, R. Bo, W. Gu, and H. Sun, “Big-M Based MIQP Method
for Economic Dispatch With Disjoint Prohibited Zones”, IEEE
Trans. Power Syst., vol. 29, no. 2, pp. 976–977, 2014.
[13] T. Ding, R. Bo, F. Li, and H. Sun, “Optimal Power Flow with the
Consideration of Flexible Transmission Line Impedance”, IEEE Trans. Power Syst., vol. 31, no. 2, pp. 1655–1656, 2016.
[14] Y. Wei, H. Cui, X. Fang, and F. Li, “Strategic scheduling of energy
storage for load serving entities in locational marginal pricing
market”, IET Gener. Transm. Distrib., vol. 10, no. 5, 2016.
[15] IBM, “IBM ILOG CPLEX Optimization Studio Community
Edition”.
[16] https://www.powerworld.com/
(The Board of Editors received the paper on 18/4/2018, its review was completed on 04/5/2018)
ISSN 1859-1531 - THE UNIVERSITY OF DANANG, JOURNAL OF SCIENCE AND TECHNOLOGY, NO. 6(127).2018 37
APPLYING SEMISMOOTH NEWTON METHOD TO FIND FIXED POINTS OF
NONSMOOTH FUNCTIONS OF ONE VARIABLE
Pham Quy Muoi, Phan Quang Nhu Anh, Duong Xuan Hiep, Phan Duc Tuan
University of Education – The University of Danang;
[email protected]; [email protected]; [email protected]; [email protected]
Abstract - In this paper, we investigate the problem of finding a
fixed point of the nonsmooth function,1 2
max ( ), ( ), , ( ) .n
f x f x f x
First, we recall the definition of Newton derivative and examine some basic properties. Then, we investigate the Newton
differentiability of function 1 2
max ( ), ( ), , ( ) .n
f x f x f x We give the
necessary and sufficient conditions for Newton differentiability of
this function in two cases: A special case:1 2
max ( ), ( )f x f x and the
general case: 1 2
max ( ), ( ), , ( ) .n
f x f x f x We emphasize that, the
sufficient condition for the special case is much weaker than that of the general case. After that, we apply the semismooth Newton method to find a fixed point of the above function. The local quadratic order convergence of the method is proven. Finally, we present the numerical results for some specific examples.
Key words - Newton Derivative; Newton differential; Fixed point; Semismooth Newton method; Nonsmooth function
1. Introduction
Thought out the history, fixed point theory has been
widely considered by numerous researchers both
domestically and internationally. There is a large amount
of published research including Banach, Browder and
Borel’s fixed point theory, ... [1, 4]. Fixed point theory has
wide applications in abundant areas such as partial
differential equation theory, economics (game theory), ...
[3, 4]. In numerical programming, the familiar method
which has been used is fixed point’s iteration as well as
advanced one [2]. As we know, fixed point iteration
converges in linear speed.
Recently, in optimization theory for non-smooth
problems, there are more advanced algorithms with high
convergent speed that have been studied and improved. In
these algorithms, semismooth Newton’s method for fixed
point problems is widely researched and applied. In this
paper, we investigate semismooth Newton’s method for
fixed point problems and provide quadratic convergence of
our algorithm. Specially, we study this method for fixed
point problems:
1 2( ) max ( ), ( ), , ( ) ,
nF x f x f x f x (1)
where :if C with C ( 1, ,i n ) is
smooth, continuous functions.
Problem (1) appears in different areas, especially in
constrained optimization problems. Some special cases are
most likely to find in the necessary condition of solution in
sparsity problems [7] and non-sparsity problems [8].
Noticeably, fixed point problem of F is equivalent to
finding solution to the following equation
( ) : ( ) 0.G x x F x (2)
We want to emphasize that function F is continuous
function but non-smooth so that G is non-smooth function
too. Hence, the efficient method to find solution to this
function like gradient method and Newton method, ... that
are not utilized. In this paper, we investigate Newton
differentiable of F and apply semismooth Newton to find
solution to equation (2). Finally, we apply this method in
some examples.
The other parts of this paper are organized as follows.
In section 2, we first re-define Newton derivative for one
variable and recall some its properties. In section 3, we
present Newton differentiable of F with 2n . In
section 4, we state Newton differentiable of F for 2n
in general. In section 5, we introduce and prove the
convergence of semismooth Newton method for equation
(2). In conclusion, we also present many numerical
examples.
2. Newton derivative
Definition 2.1. Let U be a open subset of ,
:F U be a function that defines in U . Function F
is Newton differentiable at x U if exist function
: ( , )G U U so that
0
| ( ) ( ) ( ) |lim 0.
| |h
F x h F x G x h h
h
where ( , )U is the space of all linear bounded mappings
from U to .
The function G is called one of Newton derivative F at x .
From the previous definition, we imply that Newton
derivative of F at one point is a function and it is not a real
number like Fréchet derivative.
Remark 2.2. In [7], authors indicated that:
a) Newton derivative is not singular.
b) If function F is continuous and Fréchet
differentiable in ( , )a b then F is Newton differentiable in
( , )a b . Moreover, F is one of Newton derivative of
function F .
c) If function f and g are Newton differentiable at x
then , ,f f g fg are Newton differentiable and one of their
Newton derivative is equivalent to Fréchet derivative [5].
Next, we consider Newton derivative of function F
that was given by (1). Because of the distinction of Newton
differentiable of function F when 2n and general case
( 2n ) we will present its differentiable in individual
38 Pham Quy Muoi, Phan Quang Nhu Anh, Duong Xuan Hiep, Phan Duc Tuan
cases. In addition, the sufficient condition to reach Newton
differentiable of F when 2n (that is presented in [5])
is weaker than this one in general case.
3. Newton derivative of F when 2n
Newton derivative of F when 2n was presented in
[5]. For the convenience for readers, we recall some
important properties in [5] by the following theorem.
Theorem 3.2. Let f and g be continuously Fréchet
differentiable in then function ( ) max{ ( ), ( )}F x f x g x
is Newton differentiable for all x and one of Newton
derivative of ( )F x is G which is defined by
( ),( )
( ), ,
f x x PG x
g x x Q
where,
{ | ( ) ( )}P x f x g x and { | ( ) ( )}.Q x f x g x
4. Newton derivative of F when 2n
Theorem 4.3. Let 1( ),..., ( )
nf x f x be n continuously
differentiable function in which has finite intersections.
Denote 1( ) max{ ( ),..., ( )},
nF x f x f x
( ) { {1,2,..., } | ( ) ( )},
iI x i n f x F x
( ) min ( ).A x I x
Then, ( )F x is Newton differentiable for all 0x
and one of Newton derivatives of ( )F x at 0x is
( )( ) ( ),
A xG x f x x .
Prove. For all 0x , we consider two cases:
Case 1: 0( ) { }, {1,2,.., }.I x k k n
Then 0 0( ) ( ), {1,.., }, .k jf x f x j n j k
Since if is continuous in for all 1,..,i n then for
all x , there must be a 0 that satisfies
0 0( , )x x x and we have
( ) ( ), {1,.., },k jf x f x j n j k .
For h so that 0 0 0( , )x h x x , we have
0 0 0| ( ) ( ) ( ) |
0| |
F x h F x G x h h
h
0 0 0| ( ) ( ) ( ) |
| |k k kf x h f x f x h h
h
0 0 00 0
| ( ) ( ) ( ) || ( ) ( ) |
| |k k k
k k
f x h f x f x hf x f x h
h 0, 0.h
The last one follows from the continuity and
differentiability of function ( )kf x in .
Case 2: 0( )I x contains more than one element.
Because of the finite intersections, there must be a
0 so that 0 0
( ) { }, ( , )I x k x x x
and
0 0( ) { }, ( , ).I x l x x x
+ For h so that 0 0 0
( , )x h x x we have
0 0 0| ( ) ( ) ( ) |
0| |
F x h F x G x h h
h
0 0 0| ( ) ( ) ( ) |
| |k k kf x h f x f x h h
h
0 0 00 0
| ( ) ( ) ( ) || ( ) ( ) |
| |k k k
k k
f x h f x f x hf x f x h
h
as0, 0.h
The last one follows from the continuity and
differentiability of function ( )kf x in .
+ For h so that 0 0 0( , )x h x x we have
0 0 0| ( ) ( ) ( ) |
0| |
F x h F x G x h h
h
0 0 0| ( ) ( ) ( ) |
| |l l lf x h f x f x h h
h
0 0 00 0
| ( ) ( ) ( ) || ( ) ( ) |
| |l l l
l l
f x h f x f x hf x f x h
h
0, 0.h
The last one follows from the continuity and
differentiability of function ( )lf x in .
5. Semismooth Newton’s method for finding fixed point
Consider function 1( ) max{ ( ),..., ( )}
nF x f x f x where
( ), 1,if x i n is continuously Fréchet differentiable
which has finite intersections.
Denote ( ) ( )G x x F x and consider the following
problem
( ) 0G x (3)
Denote *x is a solution to function (3) then the iteration
of semismooth Newton method for problem (3) is given by
1
1( ),
( )n n n
n
x x G xG x
(4)
where G is one of Newton derivative of G .
Theorem 5.4. Assume *x is one solution to problem
ISSN 1859-1531 - THE UNIVERSITY OF DANANG, JOURNAL OF SCIENCE AND TECHNOLOGY, NO. 6(127).2018 39
(3) and function G is Newton differentiable with G the
Newton derivative of G at *x . If there is a neighborhood
U of *x so that ( ) 1, , 1,if x x U i n then Newton
iteration (4) converges to *x when *
0| |x x is small
enough.
Prove. We have *( ) 0G x .
*
1 *
1| | | ( ) |
( )k k k
k
x x x G x xG x
* *1[ ( )( ) ( ) ( ))]
( )| |
k k k
k
G x x x G x G xG x
* *1( ) ( ) ( )( )
( )| || |
k k k
k
G x G x G x x xG x
(5)
Since *( ) 1, ( ), 1,if x x U x i n
it follows that *
( )( ) 1 0, ( )
A xG x f x U x .
This implies that 1
( )G x is bounded in U .
Choose 0 so that * *( , )x x contains U and
0M so that
* *1, ( , ).
( )| | M x x xG x
Since G is Newton derivative of G at *x then exists
(0, )r so that
* * *| ( ) ( )| |
( ) | ,2
G x h G x G x h hM
h (6)
for all | | .h r In addition, by choosing 0x so that
*
0| |x x r then from (5), (6) and
*
kh x x we
deduce that
* *( , ),kx x x k and
* *
1
1 1| | . | | | | .
2 2k kx x M h x x
M
Therefore, iteration (4) is completely defined and *.
kx x
Example 5.1. Find the fixed point of function 3 2( ) max{2 , }F x x x x .
Denote ( ) ( )G x x F x .
According to the prove in previous theorems, G is
Newton differentiable. Noticeably, * 0x and * 1x
are zero-point of ( )G x . Moreover, Newton derivative G
satisfies assumption in Theorem 5.1. Therefore, we apply
semismooth Newton method that is given by
1
1( ).
( )n n n
n
x x G xG x
The iterations of semismooth Newton method are
showed in Table 1 with 0
1x . We see that kx speedily
converges to *x within 6 iterations. Importantly, if 0x
closes 0 or 1 then kx converges to its, respectively.
Table 1. The iterations of semismooth Newton method with 0
1x
k xk G G’
0 -1 -2 3
1 -0,333333333 -0,592592593 1,3333333
2 0,111111111 0,098765432 0,7777778
3 -0,015873016 -0,031738033 1,9984883
4 8,00455E-06 8,00448E-06 0,999984
5 -6,40738E-11 -1,28148E-10 2
6 0 0 1
Example 5.2. Find the fixed point of function 2 3 4( ) max{ , , }.F x x x x
Denote ( ) ( )G x x F x . Noticeably, * 0x and
* 1x are zero-point of ( )G x . As well as Example 5.1,
we apply semismooth Newton method that is given by
1
1( ).
( )n n n
n
x x G xG x
The iterations of semismooth Newton method are
showed in Table 2 with 01,2x . We see that k
x speedily
converges to *x within 5 iterations. Importantly, if 0x
closes 0 or 1 then kx converges to its, respectively.
Table 2. The iterations of semismooth Newton method with 01,2x
k xk G G’
0 1,2 -0,8736 -5,912
1 1,052232747 -0,225585556 -4,6431625
2 1,003648284 -0,014673094 -4,0438593
3 1,000019796 -7,91882E-05 -4,0002376
4 1,000000001 -2,35129E-09 -4
5 1 0 -1
6 1 0 -1
6. Conclusion
In this paper, we have investigated Newton
differentiable of function
1 2
( ) max ( ), ( ), , ( )n
F x f x f x f x
in special case 2n as well as in general case. The
sufficient condition of each case is also different. That is,
the condition in the case 2n is weaker than one in
general case.
40 Pham Quy Muoi, Phan Quang Nhu Anh, Duong Xuan Hiep, Phan Duc Tuan
Next, semismooth Newton method is applied to find
fixed point for function ( )F x , the convergence and the
quadratic rate of convergence for this problem. All
examples have slightly showen that semismooth Newton
method reach fast convergence within several iterations to
reaches exact solution.
REFERENCE
[1] Ravi P Agarwal, Maria Meehan, and Donal O'Regan. Fixed point theory and applications, volume141. Cambridge university press,
2001.
[2] Vasile Berinde. Iterative approximation of fixed points, volume
1912. Springer, 2007.
[3] Kim C Border. Fixed point theorems with applications to economics
and game theory. Cambridge university press, 1989.
[4] Andrzej Granas and James Dugundji. Fixed point theory. Springer
Science & Business Media, 2013.
[5] Duong Xuan Hiep, Pham Quy Muoi, Phan Duc Tuan. Some basic
properties of Newton derivatives of one variable function. Journal of Science and Technology, The University of Danang, Number 9
(118):94-98, 2017.
[6] Mohamed A Khamsi and William A Kirk. An introduction to metric
spaces and fixed point theory (volume 53). John Wiley & Sons,
2011.
[7] Pham Quy Muoi, Dinh Nho Hào, Peter Maass, and Michael Pidcock.
Semismooth newton and quasi-newton methods in weighted l1 - regularization. Journal of Inverse and Ill-Posed Problems,
21(5):665–693, 2013.
Pham Quy Muoi, Dinh Nho Hào, Peter Maass, and Michael Pidcock.
Descent gradient methods for non-smooth minimization problems in ill-posed problems. Journal of Computational and Applied
Mathematics, 298:105–122, 2016.
(The Board of Editors received the paper on 21/04/2018, its review was completed on 25/05/2018)
ISSN 1859-1531 - THE UNIVERSITY OF DANANG, JOURNAL OF SCIENCE AND TECHNOLOGY, NO. 6(127).2018 41
POLYNOMIAL SOLUTION OF DESCRIPTOR SYSTEM
Le Hai Trung
University of Education - The University of Danang; [email protected]
Abstract - The aim of article is to prove that it is possible to find state function x(t) and controllability function ( )u t of the descriptor
systems '( ) ( ) ( )Ex t Bx t Du t= + in which E, B, D are real matrices
with size equivalent to state function and controllability vector in the type of polynomials of degree 2 1.p + The basis of the
theory is a method to prove the cascade splitting to transform the original system into an equivalent system in the type
' ( ) ( ) ( ).p p p p px t B x t D z t= + In the final step, we obtain function
( )px t satisfying the condition and substituting this in the previous
step. Hence continuing this process, we can find out the functions
( )x t and ( )u t of the initial descriptor system.
Key words - Descriptor systems; controllability function; state function; polynomial; differential algebraic equations
1. Rationale
Consider the descriptor system, also known as the
differential algebraic equation, as follows:
( ) ( ) ( )Ex t Bx t Du t= + (1)
with , ( , ),n mE B L ( , ),l mD L ( ) ,nx t ; ( )x t
is
the state function and ( )u t is the controllability function.
The system is called controllable in the interval [0, ]T
if for any a, b in ,n it exists the control function ( )u t so
that its root ( )x t satisfies the following condition:
(0) , ( )x a x T b= = (2)
The problem of descriptor system has received the
attention of many mathematicians around the world, such
as Amit Ailon (see [8], [9]), S. P Zubova (see [2], [3], [4],
[10]), Раецкая Е. В. (see [7]). Amit Ailon (see [9]) has
demonstrated that existed a polynomial function ( )u t of
the system (1) with degree not large than M where
2 1, ,M r r n l + = − can be computed so that the solution
( )x t of the system (1) is a polynomial trajectory of
degree M with (0) , ( ) .x a x T b= = In this article, the
author proposes a method for constructing solution )(tx
of the system (1) in polynomial form which satisfies the
condition (2) in polynomial form of degree 2 1p + , where
p is the step at which we obtain a linearly ceasing system
satisfying the controllable criterion.
Use the following property of the matrix :: sk RRC →
ker Coim ; im Cokerk sC C C C= + = + (3)
and contracted matrix C~
on CoimC, : Coim im ,C C C→
and its inverse matrix .~ 1−C
In addition, we use P − the projection matrix on ker ,C
Q − the project matrix on Coker ,C in which kerC and
CokerC are described in the formula (3),
( ).C C I Q+ = −
2. Results and Survey Research
Consider the following lemma (см [7]):
Lemma. The equation ,,, sk RvRuvCu = is
equivalent to system:
+=
=+ ,
0
PuvCu
Qv
in which −Pu is an element in .ker C
Apply this lemma to equation (1) when C D= , then
(1) is equivalent to the system:
( ) '( ) ( ) ( )
'( ) ( ),
u t D Ex t D Bx t Pu t
QEx t QBx t
+ += − +
=
(4)
in which ( )Pu t − is an element in ker D . The second
equation of (4) is rewritten as ,QE G= hence we have the
equation:
'( ) ( ).Gx t QBx t=
Using the lemma with ,C G= the final equation is
equivalent to system:
'( ) ( ) '( )
( ) 0,
G
G
x t G QBx t P x t
Q QBx t
+ = +
=
(5)
in which GQ and
GP − are projection matrices on
CokerG and kerG respectively.
The first equation of the system (5) after
transformation becomes:
( ) '( ) ( ) ( ) ( )G GI P x t G QBx t I P QBx t+− = = − (6)
Using the properties of the matrices , ,G GQ PGI P− we
have:
( ) ( ) ( ) ( )( ) ( )
( ) ( ).
G G G G
G G G
I P QBx t I P QB I P I P x t
I P QBP P x t
− = − − −
+ −
We denote:
( ) ( ) ( ), ( ) ( ),
( ) ( ) , ( )
G G
G G G G
I P x t x t P x t u t
I P QB I P B I P QBP D
− = =
− − = − = (7)
Then equation (6) becomes:
'( ) ( ) ( )x t B x t Du t= + (8)
And the condition (2) becomes:
0(0) ( ) (0) ( ) ;
( ) ( ) ( ) ( ) .
G G
G G T
x I P x I P a a
x T I P x T I P b b
= − = − =
= − = − = (9)
The problem in equation (1) – (2) becomes the problem
(8) – (9).
Again we apply the lemma to equation (8) with
.C D= Hence (8) is equivalent to system:
42 Le Hai Trung
( ) '( ) ( ) ( )
'( ) ( ),D
D D
u t D x t D Bx t P u t
Q x t Q Bx t
+ + = − +
=
(10)
Our goal is to find ( )x t satisfying the system of
equations (10) and the condition (9).
We have obviously:
( ) ( ) ( ) ( )D D
x t Q x t I Q x t= + −
Using the properties of the matrices ,D D
Q I P− we
have:
'( ) ( ( )) ( )( ) ( )D D D D D D D
Q x t Q BQ Q x t Q B I Q I Q x t= + − − (11)
We denote:
1 1
1 1
( ) ( ), ( ) ( ) ( ),
, ( ) ,
D D
D D D D
Q x t x t I Q x t z t
Q BQ B Q B I Q D
= − =
= − =
The equation (11) becomes:
'1 1 1 1 1( ) ( ) ( )x t B x t D z t= + (12)
The condition (9) becomes:
1 1,0 1 1,
1 1
(0) (0) , ( ) ( ) ,
(0) ( ) (0), ( ) ( ) ( )
TD D
D D
x Q x a x T Q x T a
z I Q x z T I Q x T
= = = =
= − = − (13)
From formula (12) we get the condition:
'1 1 1 1 1 1,1
'1 1 1 1 1 1,1
(0) (0) (0) ,
( ) ( ) ( ) .
x B x D z a
x T B x T D z T b
= + =
= + =
(14)
Then (8) – (9) becomes:
1 1
'1 1 1 1 1
( ) '( ) ( ) ( )
( ) ( ) ( ),
( ) ( ) ( )
Du t D x t D Bx t P u t
x t x t z t
x t B x t D z t
+ + = − +
= +
= +
(15)
with the conditions (13) – (14).
Again we use again the lemma for the third equation
in (15) with 1C D= to obtain:
1
1 1
'1 1 1 1 1 1 1
1 2 2
'2 2 2 2 2
( ) '( ) ( ) ( ),
( ) ( ) ( ),
( ) ( ) ( ) ( ),
( ) ( ) ( ),
( ) ( ) ( )
D
D
u t D x t D Bx t P u t
x t x t z t
z t D x t D B x t P z t
x t x t z t
x t B x t D z t
+ + = − +
= +
= − +
= +
= +
(16)
in which:
1 1
1 1 1 1
1 2 1 2
1 2 1 2
( ) ( ), ( ) ( ) ( ),
, ( ) ,
D D
D D D D
Q x t x t I Q x t z t
Q B Q B Q B I Q D
= − =
= − =
And the new conditions:
1 12 1 2,0 2 1 2,
'2 2 2 2 2 2,1
'2 2 2 2 2 2,1
'' ' '2 2 2 2 2 2,2
'' ' '2 2 2 2 2 2,2
(0) (0) , ( ) ( ) ,
(0) (0) (0) ,
( ) ( ) ( ) ,
(0) (0) (0) ,
( ) ( ) ( ) .
TD Dx Q x a x T Q x T a
x B x D z a
x T B x T D z T b
x B x D z a
x T B x T D z T a
= = = =
= + =
= + =
= + =
= + =
(13)
In this second step appear 2.2 + 2 = 6 conditions for
2 ( ),x t in which two new conditions appear by '' ''
2 2(0), ( ).x x T
Keep using the lemma for 2C D= and so on…
At j-th step we obtain the system:
1
1 1
'1 1 1 1 1 1 1
1
'1
'
( ) '( ) ( ) ( ),
( ) ( ) ( ),
( ) ( ) ( ) ( )
....
( ) ( ) ( ),
( ) ( ) ( ) ( ),
( ) ( ) ( )
j
D
D
j j j
j j j j j j jD
j j j j j
u t D x t D Bx t P u t
x t x t z t
z t D x t D B x t P z t
x t x t z t
z t D x t D B x t P z t
x t B x t D z t
+ +
+ +
−
+ +−
= − +
= +
= − +
= +
= − +
= +
and appear new (2j+2) conditions (similar (17)):
es es( ) ( )
,0 ,(0) , ( ) , 0, .d d
v vj k j k Tx a x T a v j= = = (18)
According to the content in [7]1 we receive an
equivalent system to (8) as follows:
' ( ) ( ) ( )p p p p px t B x t D z t= + (19)
with (2p+2) new conditions (similar to (18) for the
function ( )px t , at the p-th step, we can affirm the
controllability of the system ' ( ) ( ) ( )p p p p px t B x t D z t= +
and from this step, we are able to infer the controllability
of the system (8). As a result, we have the following
system of the equations:
1
1 1
'1 1 1 1 1 1 1
1
'1
'
( ) '( ) ( ) ( ),
( ) ( ) ( ),
( ) ( ) ( ) ( )
....
( ) ( ) ( ),
( ) ( ) ( ) ( ),
( ) ( ) ( )
p
D
D
p p p
p p p p p p pD
p p p p p
u t D x t D Bx t P u t
x t x t z t
z t D x t D B x t P z t
x t x t z t
z t D x t D B x t P z t
x t B x t D z t
+ +
+ +
−
+ +−
= − +
= +
= − +
= +
= − +
= +
with new conditions:
es es( ) ( )
,0 ,(0) , ( ) , 0, .d d
k kp k p k Tx a x T a k p= = = (20)
Whether we can continue to find the function ( )px t
under the polynomial form (2p+1) or not, the following
arguments will answer this question by proving the
existence of the vector factor , 0,2 1i i p = +
in the
representation2 1
0
( ) .p
i
p i
i
x t t+
=
=
Substitute (19) to this representation ( )px t we have:
,0
1, 0, .
!i ia i p
i = = (21)
Using conditions (18) we obtain the system of
equations:
1Theorem. There exits the number *p so that either the matrix
pD = or pD ís surjective.
The meaning of the above theorem in the first case is that the system (8)
is uncontrollable, while in the second case the system (8) is controllable.
ISSN 1859-1531 - THE UNIVERSITY OF DANANG, JOURNAL OF SCIENCE AND TECHNOLOGY, NO. 6(127).2018 43
1 2 2 11 2 2 1 0,
0
11 2
2 12 1 1,
0
21 2
2 1 ,
... ,
( 1) ( 2) ...
(2 1) ,
..............,
( 1) ...2 ( 2)( 1)...3 ...
(2 1)2 ...( 1) (
pp p p i
p p p T i
i
p pp p
pp i
p T i
i
p p
pp p T
T T T a T
p T p T
p T a i T
p p T p p T
p p p T a i j
+ + ++ + +
=
++ +
++
=
+ +
+
+ + + = −
+ + + +
+ + = −
+ + + + +
+ + + = − −
1
0 0
) .
ppi j
i
i j
T
−−
= =
(22)
The determinant of the system (22) is defined as:
1 2 2 1
1 2
2
...
( 1) ( 2) ... (2 1)
...
( 1) ...2 ( 2)( 1)...3 ... (2 1)...( 1)
p p p
p p p
p
T T T
p T p T p T
p p T p p T p p T
+ + +
++ + + =
+ + + + +
This is the Wronxki determinant, i.e 0. Combine this
with (21) we can imply the existence of , 0,2 1.i i p = +
Hence, the following theorem is proved:
Theorem 1. If the system (17) - (19) - (20) is
controllable, then there exists the state function ( )px t in
polynomial form of degree (2p + 1).
According to the instruction above, when ( )px t is
determined we can determine1( ),px t−
when 1( )px t−
is
determined we can determine2 ( ),px t−
... So on, we can
determine ( ).x t With the determination of ( )x t of the
system (8) - (9), ( )x t and ( )u t of (1) - (2) are
determined via (7) and (4), respectively. Then we have:
Theorem 2. If the system (17) - (19) - (20) is
controllable, then there exists the control function ( )u t
and the state function )(tx of (1) - (2) in polynomial form
of degrees not exceeding (2p + 1).
3. Example
Consider the system of equations:
'1 1 2 3 1
'2 1 2 3 2
1 2 3 3
0.
0 0.
x x x x u
x x x x u
x x x u
= + − +
= − + + = − − +
(23)
with initial conditions:
(0) (1), (1) (2)x x= = (24)
The system (23) is written in matrix form as follows:
,
000
000
001
111
111
111
000
010
001
3
2
1
3
2
1
'
3
'
2
'
1
+
−
−
−
=
u
u
u
x
x
x
x
x
x
with: 1 0 0 1 1 1 1 0 0
0 1 0 ; 1 1 1 ; 0 0 0 .
0 0 0 1 1 1 0 0 0
E B D
−
= = − = −
We have:
2
3
1 0 0 0 0 0
0 0 0 ; 0 1 0 ;
0 0 1 0 0 1
1 0 0 0
0 0 0 ; .
0 0 0
P Q
D Pu u
u
+
= =
= =
Using the projection matrices ,Q P , (see lemma) the
system (23) is equivalent to systems: '11 1'
2 2 2 2
'3 3 33
1 0 0 1 0 0 1 1 1 0
0 0 0 0 0 0 1 1 1 ,
0 0 0 0 0 0 1 1 1
xu x
u x x u
u x ux
− = − − + −
or
'1 1 2 3 1
2 2
3 3
( )
.
x x x x u
u u
u u
− + − =
= =
(25)
And:
'1 1'2 2
'33
0 0 0 1 0 0 0 0 0 1 1 1
0 1 0 0 1 0 0 1 0 1 1 1 ,
0 0 1 0 0 0 0 0 1 1 1 1
x x
x x
xx
− = − −
'2 1 2 3
1 2 3
0 0
0 .
x x x x
x x x
=
= − + = − −
(26)
From the last equation of the system (26) we get
1 2 3 ,x x x− = substitute the final equation into the second
equation we obtain '
2 2 12 2 (*).x x x= − + This equation has
the form of (8) with 1x as control function, because
1 2 0D = therefor this "system '
2 2 12 2x x x= − + " is
controllable (In this step we can write ' '
2 1 2 1 1 1, , .x x x x x z= = = ). According to theorem 1 we can
define 1,p = we can determine subsequently2 ( )x t (now
serves as the pseudo-state function of the "system" (*)) in
polynomial form of degree 2 1 2.1 1 3.p+ = + = Denoting:
2 32 0 1 2 3( )x t a a t a t a t= + + +
and using conditions (24) we obtain:
2 0 2 1 2 3(0) 1; (1) 2 1x a x a a a= = = = + + + (27)
Using (*) we obtain:
'2 2 1
'2 2 1
' 22 1 2 3 1 2 3
(0) 2 (0) 2 (0) 0;
(1) 2 (1) 2 (1) 0
( ) 2 3 0; 0 2 3 .
x x x
x x x
x t a a t a t a a a
= − + =
= − + =
= + + = = +
(28)
Using (27) and (28) we obtain system:
2 3 2
2 3 3
1 3
2 3 0, 2,
a a a
a a a
+ = =
+ = = −
i.e 2 32 ( ) 1 3 2 ,x t t t= + − then 2
1 1 3 2 .x t t= + − We finally
obtain 2 3
3 3 5 2 ,x t t t= − + 2 3
1 1 4 6 4 .u t t t= − − +
44 Le Hai Trung
4. Conclusion
This paper demonstrates that the solution ( )u t and the
control functions ( )u t of (1) - (2) can be found in
polynomial form of degree not exceeding (2p +1). The
basis for the above problem is based on the fact that we
can transform the descriptor control system (1) to the
ceasing linear system (8), then performs the substitution
and transformation, then prove the possibility to define
the degree of the system’s solutions in polynomial form.
We then use the initial conditions to draw out the
conclusions for ( )x t and ( )u t .
Acknowledgement
This research was supported in part by Foundation for
Science and Technology Development of Vietnams
Ministry of Education and Training. No. B2017.DNA.09
REFERENCES
[1] Андреев Ю. Н, Управление конечномерными линейными
объектами. М. Наука, 1976.
[2] Зубова С.П., Раецкая Е.В., Ле Хай Чунг, “ О полиномиальных
решениях линейной стационарной системы управления”.
Автоматика и Телемеханика. No 11. стр: 41-47. 2008.
[3] Зубова С.П., Ле Хай Чунг, “Полиномиальное решение
линейной стационарной системы управления при наличии контрольных точек и ограничений на управление”.
SpectralandEvolutionproblems. No: Vol. 18. стр 71 – 75. 2008.
[4] ЗубоваС.П., Ле Хай Чунг, “Построение полиномиального
решения линейной стационарной системы с контрольными
точками и дополнительными ограничениями”. Системы управления и информационные технологии. No 1.2(31). стр:
225 – 227. 2008.
[5] Красовский Н. Н, Теория управления движением. М. Наука.
1968.
[6] Ле Хай Чунг, Полиномиальное решение задач управления для
линейной стационарной динамической системы. Дисс...канд. физ. – мат. наук. Воронеж 2009.
[7] Раецкая Е. В, Условная управляемость и наблюдаемость
линейных систем. Дисс...канд. физ. – мат. Наук. Воронеж 2004.
[8] AilonA., Langholz G, “More on the controllability of linear time-
invariant systems”. Int. J. Contr. 1986. 44. № 4. P. 1161 – 1176.
[9] Ailon A., “Polynomial controllability in linear time-invariant
systems: some further results and applications to optimal control”.
15th Triennial Word Congress, Barcelona, Spain. P. 449 – 454.
[10] S. P. Zubova, Le Hai Trung, “Construction of polynomial controls
for linear stationary system with control points and additional
constrains”. Automation and Remote Control. Volume 71, Number 5. Pages 971-975. 2010.
[11] Lê Hải Trung, “Về hàm trạng thái đa thức cho hệ dừng động học
tuyến tính”. Tạp chí Khoa học và Công nghệ Đại học Đà Nẵng.
Số: 11(60). Trang 53 - 57. 2012.
(The Board of Editors received the paper on 07/05/2018, its review was completed on 29/05/2018)
ISSN 1859-1531 - THE UNIVERSITY OF DANANG, JOURNAL OF SCIENCE AND TECHNOLOGY, NO. 6(127).2018 45
FAST GAUSSIAN DISTRIBUTION BASED ADABOOST ALGORITHM
FOR FACE DETECTION
Tuan M. Pham1, Hao P. Do2, Danh C. Doan2, Hoang V. Nguyen2 1University of Science and Technology - The University of Danang; [email protected]
2Hippo Tech Vietnam; {haodophuc, danhdoan.es, nguyenviethoang.25}@gmail.com
Abstract - In the past few years, Paul Viola and Michael J. Jones have successfully developed a new face detection approach which has been widely applied to many detection systems. Even though the efficiency and robustness are proved in both performance and accuracy, there is still a number of improvements that we can apply to enhance their algorithm. This paper inherits face detection framework of Viola-Jones and introduces two key contributions. First, the modification is used to apply integral image so that features are more informative and help increase detection performance. The second contribution is the new approach to utilize AdaBoost that uses Gaussian Probability Distribution to compute how close to the mean positive and negative distributions are, then classify them more efficiently. Furthermore, by experiments, we also prove that a small fraction of a feature set is far enough to develop a good strong classifier instead of the whole feature set. As a result, the memory required as well as the time for training is minimized.
Key words - face detection; Gaussian distribution; AdaBoost; Haar-like pattern; weak classifier
1. Introduction
In recent decades, along with the rapidly advanced
improvement in technology, face detection has now
become the most popular topic that can be applied to many
fields in industries or in real life. Algorithms for face
detections are developed quickly and become more
enhanced to support complicated applications like multi-
view face detection [1-4], occluded face detection [3, 5],
pedestrian detection [6, 7], ... In this paper, we inherit the
work of Viola-Jones [8] which has been proved successful
in accuracy as well as in performance.
Thanks to their great work, the number of practical
real-time applications and systems are built for face
detection or related topics. We will propose some new
methods for feature extraction and implementation so that
the system can train and detect images faster than previous
one from Viola-Jones and it also utilizes less memory
storage. Besides, new Haar-like patterns are proposed to
improve the efficiency of detection.
There are two main contributions in our face detection
systems and they are briefly introduced below and in detail
in next sections.
First, we utilize integral image representation as the
main component to quickly compute feature values.
Nevertheless, it is more efficient when applying non
integer-sized pattern as described in section 3. In this way,
given a feature, we can obtain much more information that
is necessary for classification process. In this step, Viola-
Jones system pre-calculates feature values and stores them
in hard drive. This method is useful in training process
because all information is already computed. In contrast,
the significantly long time is used for this calculation and
working with hard drive. Instead of following their method,
we introduce another approach. Given the size of a data set,
size of image as well as the features patterns, a lookup table
used for feature indexing can be generated separately
before training procedure proceeds. We have to compute a
specific feature value when needed. It is more efficient than
the previous work [8] not only in performance but also in
memory consumption.
The second enhancement is how AdaBoost [9] is
applied. Viola-Jones used threshold to classify positive and
negative example images. Multiple weaker classifiers are
combined to form a strong one which can divide data
perfectly when learning, but in testing, it might fail. The
detection quality depends much on the correctness of the
AdaBoost function to classify data. In case the positive and
negative distribution overlap, it is apparently difficult to
choose a good threshold between those regions. In this
paper we apply Gaussian probability distribution for the
classification task. Why we use and how we apply this
method to AdaBoost process is described in this section,
and pseudo-code is also provided. Besides, the number of
operations for Gaussian is less than using threshold, thus
the training and detection time is reduced.
a. Overview
We start by review Viola-Jones systems and point out
some functions that we need to improve. The review is in
section 1. In section 2, we describe and explain how we
choose and implement our new algorithms and why they
are effective in face detection system. After that, the
experiments and results are clearly shown in Section 3.
2. Review of Viola-Jones Algorithms
a. Haar-like patterns
In every vision system, the efficiency and accuracy
depend strongly on the features it uses and the quality of
those features. Feature design and its calculation is the key
to the success of a computer vision or machine learning
system. To extract features from example images, Viola-
Jones used Haar-like rectangle features in their systems as
shown in Figure 1.
Figure 1. Haar-like rectangle patterns in Viola-Jones system
Feature value for a certain rectangle is the difference
between white and black pixel values. If doing this task by
common methods, it would take the complexity of O(HW)
where H and W are height and width of a pattern.
46 Tuan M. Pham, Hao P. Do, Danh C. Doan, Hoang V. Nguyen
Integral image representation is one of their
contributions in their paper. It is applied to rapidly compute
feature values. Its formula is described below:
𝑖𝑖(𝑥, 𝑦) = ∑ 𝑖(𝑥′, 𝑦′)
0 ≤𝑥′≤𝑥,0 ≤𝑦′≤𝑦
Where 𝑖(𝑥, 𝑦) is the image intensity at pixel (𝑥, 𝑦) and
𝑖𝑖(𝑥, 𝑦) is the value of integral image at pixel (𝑥, 𝑦).
By using integral image method, we are able to
calculate any rectangular sum by pre-computed referenced
rectangles. Thus, the complexity is approximately O(1).
In their detection system, they trained and tested by
24x24 Grayscale PNG images. For each image, they
applied those 5 rectangle features. Heights, widths and
positions of each rectangle are also varied. Because
information of images and feature patterns are given, the
number of features which can be applied to an image is
known. There were 43200, 43200, 27600, 27600 and
20736 features for each rectangle of category (a), (b), (c),
(d) and (e) respectively, thus 162336 features in total.
b. AdaBoost algorithm
From that, there were a huge number of features
corresponding to each image sub-window. Due to this fact,
it is still a lot of work even when those features are
calculated quickly and efficiently. However, by using a
very small set of features, detection system can form an
effective classifier.
Thanks to the invention of AdaBoost [9], this method
can be used to select the essential features as well as to train
for a strong classifier. AdaBoost is an algorithm for
constructing a strong classifier from a linear combination
of weak classifier.
𝐹(𝑥) = ∑ 𝑎𝑡ℎ𝑡(𝑥)
𝑇
𝑡=1
Where 𝑥 is an example (19x19 image in our system),
ℎ𝑡(𝑥) is a weak or basis classifier. Normally, the set
ℋ = ℎ(𝑥) is finite.
A weak classifier is a function of a feature (f), a
threshold (𝜃) and a polarity (p) that denotes the direction
of the inequality:
ℎ(𝑥, 𝑓, 𝑝, 𝜃) = {1 𝑝. 𝑓(𝑥) < 𝑝. 𝜃0 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
For a weak learner, we do not expect the best
classification. After each round of AdaBoost, a weak
classifier with a smallest weighted error is chosen:
ℎ̂𝑡 = arg𝑚𝑖𝑛
ℎ𝑗 ∈ 𝐻𝜀𝑗 = ∑ 𝑤𝑖|ℎ𝑗(𝑥𝑖 , 𝑓, 𝑝, 𝜃) − 𝑦𝑖|
𝑖
Where 𝑦𝑖 is the correct label for example 𝑥𝑖, 𝑦𝑖 is 1 if
𝑥𝑖 represents a face, otherwise it is 0.
In additions, every example is re-weighted so that it is
emphasized in the next training round. Clearly, an example
which is incorrectly labeled in the current round will have
the greater weight compared to correct ones.
𝑤𝑡+1,𝑖 = 𝑤𝑡,𝑖𝛽1−𝑒𝑖
Where 𝑒𝑖 = 0 if 𝑥𝑖 is correctly classified, otherwise it
is 1, and 𝛽 =𝑒𝑖
1−𝑒𝑖
AdaBoost is very simple to implement and efficiently
extract good features from a very large set. One of the
disadvantages of AdaBoost algorithm is that over fit is the
result of choosing a very complex-training model, turning
this to the key challenge to applying this method.
Graphic visualization of AdaBoost process after each
round is shown in Figure 2 below. In this example, we need
to detect and classify blue dots from red ones. We apply
AdaBoost to this problem and try to find the best weak
classifier to classify these two regions in each round.
Figure 2. Visualization for AdaBoost process after t=1 and t=3
After completing the first round, 1 weak classifier is
chosen as described by the black straight line. The total
detection quality is now very low. However, by combining
3 weak classifiers, the accuracy is significantly improved.
In Viola-Jones system, they used AdaBoost and for
each weak learner, tried to find the optimal threshold
classification function. Supposing that there are N image
examples and K features for each image, so they had KN
combinations for feature and threshold. For the data set
used by Viola-Jones, K was 162336 features and N was
6977 images to train. In a training round of AdaBoost
procedure, it needs to iterate the whole data set to evaluate
the training error for a feature/threshold combination. It
means, the complexity required for each round was
O(NKN) to find a weak classifier. By setting the number of
weak classifiers to M, the total complexity to train their
system is O(MNKN). With M = 200, at least 1.58x1015
operations needed to be processed in any training machine.
Even when working with a super computer, it is still a
tremendous procedure and takes a significantly long time
to finish.
To improve the system as well as reduce the training
time, they proposed the modified algorithm. With a
specific feature, they could find the optimal threshold by
using current example weights without generating all
possible combinations of this feature and every image
example. To apply this algorithm, with each feature,
examples should be sorted by their feature values, and the
complexity for this process is O(Nlog2N). Thereafter, it
only requires O(N) to find the optimal threshold for current
feature. Hence, the complexity to this sub-task is O(max(N,
Nlog2N)) = O(Nlog2N). This algorithm led to the reduced
complexity of O(MKNlog2N) and sustainable decrease in
the number of operations to 2.89x1012.
ISSN 1859-1531 - THE UNIVERSITY OF DANANG, JOURNAL OF SCIENCE AND TECHNOLOGY, NO. 6(127).2018 47
Pseudo-code for Viola-Jones' algorithm is shown as
below:
1. Giving example image (𝑥1, 𝑦1), … , (𝑥𝑛 , 𝑦𝑛) where
𝑦𝑖 = 0, 1 for negative and positive examples
respectively.
2. Initializing weights 𝑤𝑡,𝑖 =1
2𝑚,
1
2𝑙 for 𝑦𝑖 = 0, 1
respectively, where m and l are the number of
negatives and positives respectively.
3. For 𝑡 = 1, … , 𝑇:
a. Normalizing the weights 𝑤𝑡,𝑖 ←𝑤𝑡,𝑖
∑ 𝑤𝑡,𝑗𝑛𝑗
b. Selecting the best weak classifier with
respect to the weighted error
𝜀𝑡 =𝑚𝑖𝑛
𝑓, 𝑝, 𝜃∑ 𝑤𝑖|ℎ(𝑥𝑖 , 𝑓, 𝑝, 𝜃) − 𝑦𝑖|
𝑖
a. Defining ℎ𝑡(𝑥) = ℎ(𝑥, 𝑓𝑡 , 𝑝𝑡 , 𝜃𝑡) where
𝑓𝑡 , 𝑝𝑡 , and 𝜃𝑡 are the minimizers of 𝜀𝑡
b. Updating the weights:
𝑤𝑡+1,𝑖 = 𝑤𝑡,𝑖𝛽1−𝑒𝑖
Where 𝑒𝑖 = 0 if example 𝑥𝑖 is classified
correctly, 𝑒𝑖 = 1 otherwise, and 𝛽 =𝑒𝑖
1−𝑒𝑖
4. Combining strong classifier
3. Proposed Method to Improve Viola-Jones system
The main purpose of this paper is to propose the new
method that can perform detection faster than the
traditional Viola-Jone system, so we choose the same
Haar-like rectangle features in their system. Besides, we
also introduce our new features which are more efficient
for face detection systems when the complexity level
increases, such as detecting rotated faces.
3.1. New feature selection
In Viola-Jones system, they used integer-size of
rectangle. In our research, we again use those rectangle but
with non-integer size. With this method, features can be
more informative, thus the detection performance is higher
than that by the Viola-Jones system. Figure 3 shows some
examples of new non integer-sized rectangle. This is 2x2
sub-window from an image and the height of rectangle
feature is 3.
Figure 3. 2x2 sub-window image with non- integer-sized feature
Because the size is a non -integer number, feature
values are represented by floating-point number. It results
in new difficulties when systems use complicated pattern
of features. For this problem, we also figure out the
approach which can quickly compute the feature values in
few operations with the complexity of O(1). Compared to
the traditional feature calculation, processing time is now
nearly the same.
To apply new rectangle features, users only need to
clearly specify new pattern before training their models.
Below is an example for pattern (d) in Figure 1. The matrix
shows color map of features with 1 for white and -1 for
black.
1 1 1
-1 -1 -1
1 1 1
By using the color map above, we can quickly compute
the feature value for each rectangle with non-integer size.
The size and position of a feature can vary
correspondingly to the 19x19 image. Given the size of a
pattern, we can manage the number of arising features.
This point leads to another improvement for our system,
that is pre-calculating and storing for feature values are no
longer required. Back to Viola-Jones approach, they have
to use hard drive to store the whole set of feature values.
Apparently, the way costs a tremendously long time to get
the training data available. Besides, it consumes huge
memory storage which is now not essential in our system.
There are 29241, 29241. 23409, 23409 and 29241
features for category (a), (b), (c), (d) and (e) respectively.
Thanks to the constraint of rectangle sizes, we
separately make a lookup table from the given information
about those rectangles. It means that when it requires any
single feature value, our system can immediately find the
exact feature as well as its size and position. After that we
easily compute them by our formula as we have mentioned
before. To generate this lookup table, we just apply brute-
force algorithm to iterate and find feature information.
3.2. Gaussian distribution as classification function
Even though the training time is significantly reduced,
it is still a long time. In our research and experiment, we
propose a new way to train our detection system by
applying Gaussian probability distribution instead of
finding optimal threshold for each feature.
Starting with the point that positive and negative
distribution of Haar-like feature for an image are very hard
to classify by a single threshold. By combining multiple
weak classifiers with many thresholds, the number of
operations exponentially increases without guaranteeing
the increase of detection accuracy. Besides, it can result in
over-fitting problem on the training process.
Figure 4. Histogram of a specific feature for face and
non-face images
48 Tuan M. Pham, Hao P. Do, Danh C. Doan, Hoang V. Nguyen
Figure above shows histogram of feature values for
face and non-face images computed from a specific feature.
Blue region denotes feature values for face images, and
non-faces are drawn in orange. The x-axis is the feature
values; meanwhile y-axis shows the frequency after
normalization of each value. From the figure, it is clear that
2 histograms are overlapped, leading to the difficulty to
select a threshold. Moreover, in those situations, a weak
classifier's performance is poor but the training time is
longer and finally the testing result is poor as a
consequence.
In this paper, we propose the AdaBoost algorithm that
uses Gaussian distribution of feature values. Gaussian
distribution is one of the most important probability
distributions for continuous variables and it is really useful
in natural sciences. From theory, the averages of samples
of a variable from independent distributions converge in
distribution to the normal. In other words, it becomes
normally distributed when we have enough observations.
Below is the formula for a Gaussian distribution of a single
real-valued variable x:
𝑓𝑔(𝑥|𝜇, 𝜎2) =1
√2𝜋𝜎2𝑒
−(𝑥−𝜇)2
2𝜎2
Where 𝜇 is the mean and 𝜎2 is the variance of the
sequence of feature values for the data set with a specific
feature.
To overcome this overlapping problem, we apply
Gaussian distribution to calculate and compare the
difference to 2 means of positive and negative distributions.
The classification function is applied as follows:
ℎ(𝑥, 𝑓, 𝜇𝑝, 𝜎𝑝2, 𝜇𝑛, 𝜎𝑛
2)
= {1 𝑓(𝑥|𝜇𝑝, 𝜎𝑝
2) > 𝑓(𝑥|𝜇𝑛, 𝜎𝑛2)
0 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
Where 𝑓(𝑥|𝜇, 𝜎2) is the Gaussian function that is
mentioned above. 𝑥 is a feature value of an example image.
𝜇𝑝, 𝜎𝑝2, 𝜇𝑛, and 𝜎𝑛
2 are means and variances for positive
and negative distributions respectively.
Our method proceeds as follows. For each feature, all
corresponded values to image examples are computed at a
given feature. Next , we calculate means and variances for
2 distributions. After that, formula of Gaussian distribution
is applied to find the distance to the means before
comparison. If an image example is more likely to be a face,
so the closer it is from the means of a positive region.
Otherwise, it is closer to negative distribution. With this
method, the difficulty of overlapping is overcome because
the means of distributions are all always separated.
After finishing the current classification, error is
computed to select the best feature of the current AdaBoost
round. Clearly, the weights of image examples are
re-computed to emphasize incorrect classification for later
training.
Our procedure is described in the pseudo-code below.
The only difference between our algorithm and Viola-
Jones' is the classification function with Gaussian method.
1. Giving example image (𝑥1, 𝑦1), … , (𝑥𝑛 , 𝑦𝑛) where
𝑦𝑖 = 0, 1 for negative and positive examples
respectively.
2. Initializing weights 𝑤𝑡,𝑖 =1
2𝑚,
1
2𝑙 for 𝑦𝑖 = 0, 1
respectively, where m and l are the number of
negatives and positives respectively.
3. For 𝑡 = 1, … , 𝑇:
a. Normalizing the weights 𝑤𝑡,𝑖 ←𝑤𝑡,𝑖
∑ 𝑤𝑡,𝑗𝑛𝑗
b. Selecting K’ features from full set of features
c. For each feature:
i. Computing feature values for every
example
ii. Calculating means and variances for
positive and negative distributions.
iii. Selecting the best weak classifier that
minimizes the error:
𝜀𝑡 = 𝑚𝑖𝑛𝑓 ∑ 𝑤𝑖|ℎ(ℎ(𝑥𝑖 , 𝑓, 𝜇𝑝, 𝜎𝑝2, 𝜇𝑛, 𝜎𝑛
2 ) − 𝑦𝑖|𝑖
iv. Defining ℎ𝑡(𝑥) = ℎ(𝑥, 𝑓𝑡) where 𝑓𝑡 is the
minimizer of 𝜀𝑡
d. Updating the weights:
𝑤𝑡+1,𝑖 = 𝑤𝑡,𝑖𝛽1−𝑒𝑖
Where 𝑒𝑖 = 0 if example 𝑥𝑖 is classified
correctly, 𝑒𝑖 = 1 otherwise, and 𝛽 =𝑒𝑖
1−𝑒𝑖
4. Combining strong classifier
In our method, it takes linear time to compute mean and
variance for each positive or negative distribution with
complexity of O(N) and all simple operations. O(MKN) is
the total complexity for our algorithm. However, due to the
use of Gaussian distribution, the floating-point operations
are obligated. Indeed, exponential operation for floating-
point numbers is far complicated than simple arithmetic
ones. In our system, this expression is used to find 𝑒𝑥 for
classification function 𝑓(𝑥|𝜇𝑝, 𝜎𝑝2). Although the current
complexity is O(MKN), it costs even longer time than
O(MKNlog2N) does if those operations are not well
computed. Thus, for this step, instead of exponentials we
use inverse operation which is natural logarithm 𝑙𝑛(𝑥). By
our experiment, it takes much less time to compute
𝑙𝑛(𝑒𝑥) compared to 𝑒𝑥. By simplifying expressions to find
Gaussian function, the number of operations is also
remarkably reduced.
If an image is a face, ratio of Gaussian functions for two
distributions should be greater than 1:
1
√2𝜋𝜎𝑝2
𝑒
(𝑥−𝜇𝑝)2
2𝜎𝑝2
1
√2𝜋𝜎𝑛2
𝑒(𝑥−𝜇𝑛)2
2𝜎𝑛2
> 1
or,
√𝜎𝑛2
√𝜎𝑝2
> 𝑒
(𝑥−𝜇𝑝)2
2𝜎𝑝2 −
(𝑥−𝜇𝑛)2
2𝜎𝑛2
ISSN 1859-1531 - THE UNIVERSITY OF DANANG, JOURNAL OF SCIENCE AND TECHNOLOGY, NO. 6(127).2018 49
Because all elements are non-negative numbers, the
inequality remains unchanged when taking square of both
sides:
𝜎𝑛2
𝜎𝑝2
> 𝑒
(𝑥−𝜇𝑝)2
2𝜎𝑝2 −
(𝑥−𝜇𝑛)2
2𝜎𝑛2
Moreover, natural exponential is a one-to-one and
increasing function, we can apply natural logarithm to the
inequality:
ln (𝜎𝑛
2
𝜎𝑝2
) >(𝑥 − 𝜇𝑝)2
2𝜎𝑝2
−(𝑥 − 𝜇𝑛)2
2𝜎𝑛2
At this point, we can use the above inequality to make
comparison; all of those operations can be calculated in a
short time. We have reduced a lot of operations and the
computation is now much simpler.
The following shows pseudo-code for our approach:
1. Computing feature values for the whole data set
2. Finding mean 𝜇 and variance 𝜎2for positive and
negative distributions
3. Using natural logarithm to find: 𝑎 = ln (𝜎𝑛
2
𝜎𝑝2)
4. Finding the value of 𝑏 = (𝑥−𝜇𝑝)2
𝜎𝑝2 −
(𝑥−𝜇𝑛)2
𝜎𝑛2
5. Comparing 𝑎 and 𝑏, return 1 if 𝑎 > 𝑏, otherwise 0
4. Experiments and Results
a. Experiments
As mentioned before, to train and test this system, we
use data set from MIT cbcl Face Data [10] and it contains
19x19 grayscale PGM images.
In this procedure, we conduct some experiments to
evaluate and compare the processing time between original
method with our proposed one. Before preparing lookup
table and training, we normalize the whole data set for both
train and test images [11] Thus, those images are now in
the same standard. Samples of images before and after the
normalization process are listed below:
Figure 5. Original images before normalization
Figure 6. Images after normalization
In the experiment, we implement our algorithm from
scratch in Java. After that, the system runs in a normal
computer with Mac OS, memory 8 GB 1600MHz DDR3
and processor 2.6 GHz Intel Core i5. The amount of hard
drive is not specified due to the fact that we only use Ram
to experiment our system. It means, hard drive is not
mandatory as in Viola-Jones's.
b. Results
Theoretically, for each round of AdaBoost process,
there are totally 134541 features used for testing to choose
the best weak classifier. By analysis and experiments, it is
unnecessary to test all of those features, instead, a small
number of them can be used to reduce the training time but
still maintain the accuracy level. From experimenting
different numbers of features for training each round,
we have found that K' = 5000 features are sufficient for
2 criteria above.
The graph in Figure 7 shows the comparison between
choosing K' = 5000 features versus the whole 134541
features. Both of two AdaBoost algorithms that are used
Viola-Jones with threshold and proposed method with
Gaussian distribution are involved. Viola-Jones’
approaches are figured by blue and gray dashed lines.
Figure 7. Processing time and accuracy between 2 methods
with different number of chosen features on training image set
In this experiment, we do not follow Viola-Jones
method which requires hard drive to store feature values
due to the long processing time with memory storage.
Hence, in our proposed method, lookup table is utilized to
reduce the training time.
The x-axis is processing time measured in second and
the y-axis is the corresponding accuracy by percentage.
When Viola-Jones method using threshold is applied to
classify face/non-face images, it takes approximately
760 seconds for a weak classifier if we test the whole set of
features. In contrast, 30 seconds is needed if this procedure
is performed by 5000 features. When applying Gaussian
distribution, the processing time decreases. It requires
600 seconds for the full feature set and 22 seconds if
5000 features are chosen.
Figure 8. Result from experimenting with testing image set
By conducting this experiment, it is proved that the
detection system can still obtain the high performance
50 Tuan M. Pham, Hao P. Do, Danh C. Doan, Hoang V. Nguyen
without choosing the whole set of features. From the above
figure, applying Gaussian distribution is better than
original Viola-Jones method in both cases. This result is
gained by testing with the training image set, we have the
similar result with the testing image set and it is shown in
Figure 8.
In those experiment processes, we compute the
accuracy of detection in the fixed processing time of about
1 hour. With this period of time, AdaBoost by Viola-Jones’
algorithm can produce 5 and 125 weak classifiers for the
whole set and 5000 features set respectively. Similarly,
6 and 160 weak classifiers are chosen with Gaussian
distribution algorithm.
We also conduct another experiment that sets the fixed
value of T - the number of weak classifiers. For T = 200,
if we apply Viola-Jones system that pre-compute all feature
values and store to hard drive, then use those values for
training, it takes 46 seconds to compute and choose 1 weak
class. Approximately, 153 minutes or 2 hours 33 minutes
is required for the complete training process. By setting the
same value for T, but keep using threshold for AdaBoost
procedure, our new system requires 30 seconds for each
weak classifier even though our computation is more
complicated by using floating-point numbers. The total
training time is now about 96 minutes or 1 hours
36 minutes, 2/3 of the previous time if we compare that to
Viola-Jones system.
The training time is significantly reduced if Gaussian
probability distribution is applied. For each weak classifier,
the processing time decreases to 22 seconds. Clearly, the
training process costs half of the original time with
76 minutes or 1 hour 16 minutes.
By using Gaussian probability distribution, the number
of operations is reduced and now the speed of training is
2 times faster than that of the previous work. However, in
Viola-Jones method, they had to use hard drive to
pre-compute training data and this process took a
significant time as described in previous section. If this
factor is taken into account, our new method is proved to
be far efficient not only in processing time but also in
memory usage.
5. Conclusion
In this paper, we propose a new way to apply Haar-like
patterns as well as how to use integral image technique for
computing feature values. For the same feature, much more
informative values can be extracted and hence, detection
rate is better as well.
The more important contribution is how we apply
Gaussian probability distribution to AdaBoost to improve
its performance. By utilizing this function, we can avoid
the difficulty to choose optimal thresholds for each round
of AdaBoost. Classification problem becomes simpler and
more straightforward by determining how far to the mean
positive and negative distributions are. Besides, the
detection speed is also faster because of classification rate.
Those two contributions have been characterized into
the success of our paper. By applying this system or this
idea about implementation, face detection system can be
run in a normal computer or machine. From the advance in
performance, this method can be used in other real-time
detection systems in practice.
Acknowledgement
This research was funded by Vietnam Ministry of
Science and Technology Research Project in 2017-2018,
No. CNTT-10
REFERENCES
[1] Bo Wu, Haizhou AI, Chang Huang and Shihong Lao, “Fast Rotation
Invariant Multi-View Face Detection Based on Real Adaboost”, IEEE FGR'04, 2004.
[2] Paul Viola, Michael J. Jones, “Fast Multi-view Face Detection”,
Mitsubishi Electric Research Lab TR-2003-96, 2003.
[3] Shengcai Liao, Anil K. Jain, and Stan Z. Li, “A Fast and Accurate
Unconstrained Face Detector”, 2015.
[4] T. Mita, T. Kaneko, and O. Hori, “Joint Haar-like Features for Face
Detection”, ICCV 2005.
[5] X. P. Burgos-Artizzu, P. Perona, “Robust Face Landmark
Estimation Under Occlusion”, ICCV, 2013.
[6] B. Leibe, E. Seemann, and B. Schiele, “Pedestrian Detection in
Crowded Scenes”, CVPR, 2005.
[7] S. Zhang, R. Benenson, M. Omran, J. Hosang, and B. Schiele,
“Towards Reaching Human Performance In Pedestrian Detection”,
IEEE PAMI, 2017.
[8] Paul Viola, Michael J. Jones, “Robust Real-time Face Detection”,
International Journal of Computer Vision, 2004, pp. 138-143.
[9] Robert E. Schapire, “Explaining AdaBoost”, In Empirical Inference,
2013.
[10] CBCL Face Database. Retrieved from http://cbcl.mit.edu/software-
datasets/FaceData2.html
[11] Dwayne Philips, “Image Processing in C 2nd”. R&D Publications,
2000.
(The Board of Editors received the paper on 03/01/2018, its review was completed on 03/4/2018)
ISSN 1859-1531 - THE UNIVERSITY OF DANANG, JOURNAL OF SCIENCE AND TECHNOLOGY, NO. 6(127).2018 51
THE EMPIRICAL STUDY ABOUT E-CRM:
A CASE STUDY OF VIETNAM AIRLINES
Nguyen Thi Khanh Chi
Foreign Trade University, Ha Noi; [email protected]
Abstract - Customer relationship management is now the tools and strategies for airlines to increase service quality and customer satisfaction which in turn gain customer loyalty on the age of IT. The objective of the present study is to analyze the effect of electronic customer relationship management (e-CRM) on customer’s loyalty in Vietnam Airlines (VNA). Research methodologies used in this paper are qualitative and quantitative methods. Qualitative method is expert interview conducted by questionnaires from 5 key managers to examine the e-CRM features and factors affecting customer loyalty from e-CRM. Quantitative method is qualified by a survey given to 401 customers randomly selected. Data is collected and examined by CFA and SEM through AMOS 20.0. The results of the study show that loyalty is significantly and positively affected by the largest determinant Service quality, followed by e-CRM features and Customer satisfaction.
Key words - e-CRM; service quality; customer satisfaction; loyalty; Vietnam Airlines
1. Introduction
E-CRM is Electronic Customer Relationship
Management and is defined in different ways by many
scholars, administrators and researchers to help businesses
attract more customers and attend customer loyalty. From
a technological perspective, e-CRM is a technology that is
used to create value when defining, implementing,
integrating, and concentrating on the business capabilities,
based on customers’ need. The aim of e-CRM is to create
customer value in the long run to segment existing
customers and improve customer profitability through the
use of software and the internet (Blery and
Michalakopoulos, 2006; Starkey and Woodcok, 2002; Xu
et al., 2002; Frow and Payne, 2004). From a strategic
perspective, e-CRM is a business strategy that builds and
develops long-term relationships with customers (Blery và
Michalakopoulos, 2006; Reichheld. F.F, 1996; Reichheld.
F.F & Sasser, 1990; Winer, 2001; Chen, L., & Sukpani, N.,
1998; Chan, S., & Lam, J., 2009).
The biggest benefit of e-CRM is to help enterprises
provide good services/products at levels above customer
expectations in order to attract more customers, retain
existing customers, improve customer profitability,
increase customer advocacy and engagement, gain
customer insight, increase customer lifetime value and
interaction. In return, customers will be loyal to the
enterprises for longer periods of time. Especially, Airlines’
effort to provide better loyalty programs and customization
of service (Ahodmotlghi, E. and Pawar, P., 2013). In
Vietnam, Vietnam Airlines (VNA) not only has e-CRM
features in e-CRM program such as Apps on mobile
devices, Website to provide service instantly to customers
but also has customer care like Frequent Flyer Program
(FFP), Email and Call Center to solve customer problems
and understand customer needs. VNA also offers
customers promotional fares and special discounts to
partner businesses based on FFP. The objectives of this
research are (1) to examine the factors affecting customer
loyalty, (2) to find the impact of factors affecting customer
loyalty, (3) to recommend VNA measures for improving
customer loyalty.
2. Literature review
2.1. E-CRM features
Anton and Postmus (1999) defined e-CRM features and
identified 25 features in their analysis and study of e-CRM
in retailing. E-CRM features are described as a site
customization, alternative channels, local search engine,
membership, mailing list, site tour, site map, introduction
for first-time users, chat, electronic bulletin board, online
purchasing, product information online, customization
possibilities, purchase condition, preview product, external
links, problem solving, complaining ability, spare parts,
customer service page (Anton, J. and Postmus, R., 1999).
In 2000, e-CRM features were added 17 features by
Feinberg et al. (2002). Several studies have attempted to
determine both empirical and conceptual relationship
between e-CRM features and customer satisfaction, and
e-CRM features and customer loyalty. There was a
statically significant positive relationship between the
number of e-CRM features and customer satisfaction
(Feinberg and Kadam, 2002; Anton and Postmus, 1999;
Feinberg et.al, 2002; Fragouli and Noutrixa, 2014; Kim
et.al, 2003; Mithas et. Al., 2005).
2.2. Service quality
Service quality has been defined in services marketing
literature as an overall assessment of service by the customers
(Ganguli, S. and Roy, S.K., 2011). According to Parasuraman
et al. (1985), service quality is the differences between
customer expectations and perceptions of service.
Parasuraman et al. introduced a formal service quality model
including 5 dimensions: tangibleness, reliability,
responsiveness, assurance, empathy. Gronroos (1984) offered
a service quality model with dimensions of technical quality,
functional quality and corporate image. Service quality is
found to be a strong predictor of customer satisfaction (Cronin
and Taylor, 1992; Dabholkar et al., 2000)
2.3. Customer satisfaction
Satisfaction was considered to be transaction-specific
construct which resulted from immediate post purchase
judgment or affective reaction (Oliver, 1993). Customer
satisfaction is also considered from a cumulative
satisfaction perspective and is defined as customer’s
overall experience to date with a product or service
provider (Johnson et al., 2001; Krepapa et al., 2003). Many
52 Nguyen Thi Khanh Chi
researchers reveal that service quality influences customer
loyalty indirectly through customer satisfaction (Anderson
and Sullivian, 1993; Caruana, 2002; Beerli et al., 2004;
Lewis and Soureli, 2006).
2.4. Loyalty
According to Kandampully and Suhartanto (2000),
loyal customer is a customer who intends to repurchase
from the same service provider, to keep a positive attitude
towards the service firm, and willing to refer the service to
others. Customer loyalty is defined as a deeply held
commitment to rebuy or patronize a preferred product or
service consistently in the future, despite situational
influences and marketing efforts having the potential to
cause switching behaviour (Oliver, 1997).
3. Methodology
3.1. Questionnaire design
Expert interview was conducted directly by
questionnaires from five key managers of VNA including
IT manager, Commerce manager, Service manager,
Investment and Strategy manager, and manager in human
resource department. The qualitative method was used to
examine the e-CRM features applied at VNA and factors
affecting customer loyalty from e-CRM at VNA. Basing on
42 e-CRM features identified by Anton and Postmus (1999)
and Feinberg et al. (2000) to interview three managers
(IT, commerce and service department), the result showed
that seven e-CRM features used at VNA were identified to
directly affect service quality and customer loyalty. They are
Email, Online purchasing, FAQ, Postal address, Problem
solving, Information online, and Perceived rewards.
Especially, when five managers were asked about the effect
of these e-CRM features on loyalty, they confirmed that
e-CRM features have had impact on service quality,
customer satisfaction and loyalty.
Therefore, this study also examined two more factors
(service quality and customer satisfaction) outside e-CRM
features affecting customer loyalty. An empirical research
model is developed in Figure 1. There are four constructs
such as e-CRM features (EC), Service quality (SQ),
Customer satisfaction (CS) and Loyalty (LO).
Figure 1. The empirical research model
The questionnaire was designed in three parts. The first
part contained 6 questions related to general information of
customers such as kind of passenger, the times of passenger
flying with VNA, kind of light route, kind of seat class, the
way to buy tickets and the reason to choose VNA. The
second part contained 19 questions about e-CRM features,
Service quality, Customer satisfaction and Loyalty. The
third part was designed to identify demographic attributes
of the respondents and consisted of 4 questions such as
gender, age group, nationality and occupation. The total
questions were 29. The form of survey was set online by
using Google docs. The languages of questionnaires were
set in two languages (English and Vietnamese).
Table 1. Measurement scale of research
The questions in Part 1 and Part 3 were set as fixed-
alternative which were designed as multiple-choice
answers. Questions in Part 2 were structured which were
designed as Likert with 05 scale from “1” to “5” where “1”
Strongly Disagree, "2" Disagree, "3" No Comment, "4"
Agree, "5" Strongly Agree.
3.2. Sample size
The population of research consists of international
passengers travelling to Vietnam using VNA service and
domestic customers. According to the report of CAPA,
VNA reached 20 million arrivals in 2016 (Hoang, 2017).
In the first six months of 2017, VNA had nearly 10.3 million
arrivals, up 6% over the same period last year. In order to
collect data, a random sample was conducted in this
research. The target group was VNA customers who are the
member of VNA’s Frequent Flyer Program. It is almost
impossible to collect all passengers because there are a large
number of passengers in Viet Nam and over the world.
Therefore, random sampling method was necessary to select
a small group from the list of customers who are member of
Vietnam Airlines Frequent Flyer Program. The sample size
is 600 including international and domestic passengers.
The questionnaires were sent to 600 customers including
Vietnamese and Foreigner ones. and the respondents were
401, the return rate was at 66.83%.
3.3. Statistical procedures
Data was collected by questionnaires and took place
over 56 days. The data was recorded firstly in Excel
program from 401 online answers from automatic excel in
Google document. SPSS 20.0 was conducted secondly for
analyzing Cronbach’ Alpha and EFA. The results of EFA
analyzing was used for CFA and structural equation
modelling analysis (SEM) in AMOS 20.0 program in order
to test hypotheses
4. Findings
The results show that out of 401 respondents, 214 of
whom are male (53.3%) and 187 are female (46.7%). The
respondents concentrated on the age group of 23 to 45 with
ISSN 1859-1531 - THE UNIVERSITY OF DANANG, JOURNAL OF SCIENCE AND TECHNOLOGY, NO. 6(127).2018 53
the total number of 240 (69.8%) which was under the
working age while the other is lower (<23 is only 8% and
>45 is 22.2%). Regarding to occupation, the respondents
were mainly officers, which could make the result more
applicable towards the officer sample. The number of
officers is 212 (52.9%), of senior officers is 112 (27.9%),
others are 52 (13%) and retired/house wives are only
25 (6.2%). For nationality, there are a number of
nationalities such as Vietnamese, Hong Kong, French,
Australian, Korean, Taiwanese, Japanese and Singapore.
Most of them are Vietnamese. In terms of passenger card,
184 (45.9%) were Silver card passengers, 128 (31.9%) was
Titan card passengers, 48 (12%) was Gold card passengers
and the remainder 41 (10.2%) was Platinum card passengers.
The major reason why customer choose Vietnam Airlines
was its service quality (29.9%), next was suitable flight
schedule (26.9%), followed was better connectivity to
various destination (22%), ticket price (13.9%), Brand
image (7%), the last was others (0.3%). The flight frequency
of passengers mostly concentrates on more than
20 times/year (40%). This is the reasonable representation of
flight frequency due to the subjects of this research are
member of Frequent Flyer Program. The major routes which
passenger selected were both (domestic route and
international route) and mark up 41.2%. The economy class
was mostly chosen by passenger (50.2%). The business class
and premium economy class were the same with
24.9% each.
Using the Cronbach’ Alpha coefficient to measure the
reliability of data with 4 constructs and 19 observed
variables, the Cronbach’ Alpha values of EC, SQ, CS and
LO are 0.867, 0.850, 0.805 and 0.801 respectively (>0.6) and
the Corrected items (Total Correlation coefficient) of
19 observed variables are higher than 0.3. It can be
concluded that there are 19 good reliability variables from 4
constructs.
By conducting an EFA with the principal axis factoring
of component method and the Promax with Kaiser
Normalization method, the first result has not reached
convergence value even though KMO is high at 0.900 and
sig is 0.000. Continuously removing fours inappropriate
variables from the model (EC7, SQ3, SQ7, CS3), the model
has been conducted secondly and the results get convergence
factor at four group components (EC, SQ, CS and LO) with
KMO of 0.879 and sig of 0.000. In the extraction sums of
squared loadings, the percentage of cumulative is 59.620%
and the total of initial eigenvalues is 1.005.
Confirmatory factor analysis (CFA) was conducted to
identify the relationship between 4 constructs and
19 observed variables and was examined two times. The
results for the first running CFA show that Chi-square/df
was 4.317, GFI was 0.893, TLI was 0.883, CFI was
0.907 and RMSE was 0.091. Meanwhile CFI and GFI
values greater than 0.90 indicate good model fit (Hu, L.T.
& Bentler, P.M. , 1999). GFI values greater than
0.70 indicate good model fit (Schumacker, R.E. & Lomax,
R. G., 2004). RMSEA (root mean squared error) values
less than 0.06 also indicate a good model fit (Hu, L.T. &
Bentler, P.M. , 1999) while values ranging from 0.08 to
0.10 indicate mediocre model fit and those greater than
0.10 indicate poor fit (Byrne, 2001). Therefore, model fit
of the first CFA running is not good, but the covariance of
M.I (modification indices) between two exogenous
variables (e1 and e2) was highest at 61.240, followed by
the covariance of e5 and e6 at 24.534. Thus, CFA was
conducted the second time to adjust the absolute value by
linking e1with e2 and e5 with e6. Consequently, the GFI
(goodness-of-fit index), TLA, CFI (comparative fit index)
had higher value than the first one.
Structural Equation Modelling (SEM) procedures were
used to determine the impact of e-CRM features (EC),
service quality (SQ) and customer satisfaction (CS) on
loyalty (LO) and were also used to determine the
relationship between EC and SQ (H1); EC and CS (H2);
EC and LO (H3); SQ and CS (H4); SQ and LO (H5);
CS and LO (H6); the interrelationship among EC and SQ
on CS (H7); EC, CS, SQ on LO (H8).
Figure 2. The SEM analysis result
The SEM showed the total effect between CS and LO
(0.204), SQ and LO (0.343), EC and LO (0.208) whereas SQ
has strongest impact on LO. However, the result of SEM
analysis did not show an indirect effect link from EC and CS
to LO, an indirect effect link from SQ and CS to LO. It can
be concluded that e-CRM features, customer satisfaction and
service quality have direct impact on loyalty.
The finding indicates that e-CRM features (EC),
service quality (SQ) and customer satisfaction (CS) have
significant and positive influence on Loyalty (LO) with
Beta at 0.215, 0.391 and 0.175, p value <0.05. Thus, H3,
H5 and H6 are asserted. Besides, EC and SQ, SQ and CS,
EC and CS have interaction at 0.224, 0.206 and
0.321 respectively whereby e-CRM features and customer
satisfaction have largest impact (Beta at 0.321). Thus, H1,
H2, H4 are supported. Moreover, H7 is also asserted
because Customer satisfaction (CS) is predicted positively
by e-CRM features (EC) and Service quality (SQ).
Additionally, Loyalty (LO) is positively influenced by EC,
SQ and CS, hence, H8 is asserted.
Consequently, eight hypotheses are examined by
confirming the presence of a statistically significant
relationship in the predicted direction. Loyalty is
significantly and positively impacted by the largest
54 Nguyen Thi Khanh Chi
determinant Service quality, followed by e-CRM features
and Customer satisfaction in case of VNA.
5. Conclusion
The results show that e-CRM features, service quality
and customer satisfaction are factors affecting VNA
customer loyalty. Particularly, e-CRM features have large
impact on service quality and customer satisfaction which in
turn affect loyalty. Service quality has great influence on
customer loyalty. The results of this study have important
implications to VNA for obtaining customer loyalty in the
long time. In all empirical research, this study has limitations
that need to be identified. Firstly, the sample is limited to
VNA customers. Secondly although the results from this
research are useful for describing the characteristics of a
large population of passengers, the generalizations of the
results are limited to all VNA customers who are not in the
list of FFP. In our future work, we will try to examine new
variables in context of applying e-CRM at VNA.
REFERENCE
[1] Anton, J. and Postmus, R., 1999. The CRM performance index for Web based business. unpublished paper, available at:
www.benchmarportal.com
[2] Byrne, B. M., 2001. Structural equation modeling with AMOS.
Mahwah, NJ: Lawrence Erlbaum Associates.
[3] Caruana, A., 2002. Service loyalty, the effects of service quality and
the mediating role of customer satisfaction. European Journal of
Marketing, Volume 36, pp. 811-828.
[4] Chen, I.J and Popovich, K., 2003. Understanding customer
relationship management: people, process and technology. Business Process Management, 9(5), pp. 672-687.
[5] Cronin, J.J. Jr and Taylor, S.A. , 1992. Measuring service quality: a
reexamination and extension. Journal of Marketing, 56(3), pp. 55-68.
[6] Dabholkar, P. and Bagozzi, R.P, 2002. An attitudinal model of
technology-based self-service: moderating effects of consumer traits
and situational factors. Journal of the Academy of Marketing
Science, 30(3), pp. 184-201.
[7] Feinberg, R. and Kadam, R., 2002. E-CRM web service attributes as
determinants of customer satisfaction with retail websites. International
journal of service industry management, 13(5), pp. 432-451.
[8] Gronroos, C., 1984. A service quality model and its marketing
implications. European Journal of Marketing, 18(4), pp. 36-44.
[9] Hoang, N., 2017. Vietnam Airlines là nhà vận chuyển hành khách lớn thứ 2 ĐNA. [Online] Available at: https://news.zing.vn/vietnam-
airlines-la-nha-van-chuyen-hanh-khach-lon-thu-2-dna-
post716293.html [Accessed 1 1 2018].
[10] Kandampully, J., and Suhartanto, D, 2000. Customer Loyalty in the
Hotel Industry: The Role of Customer Satisfaction and Image. International Journal of Contemporary Hospitality Management,
Volume 12, p. 346.
[11] Kim, J., Suh, E. and Hwang, H., 2003. A model for evaluating the
effectiveness of CRM using the balanced scorecard. Journal of
interactive Marketing, 17(2), pp. 5-19.
[12] Krepapa, A., Berthon, P., Webb, D. and Pitt, L, 2003. Mind the gap:
an analysis of service provider versus customer perceptions of market orientation and the impact on satisfaction. European Journal
of Marketing, 37(2), pp. 197-218.
[13] Lewis, B., and Soureli, M, 2006. The antecedents of consumer
loyalty in retail banking. Journal of Consumer Behaviour, Volume
5, pp. 15-31.
[14] Mithas, S., Krishnan, M.S. and Fornell, C., 2005. Why do customer
relationship management applications affect customer satisfaction?. Journal of Marketing, 69(4), pp. 201-209.
[15] Parasuraman, A., Zeithaml, V.A. and Berry, L.L, 1985. “A
conceptual model of service quality and its implications for future
research. Journal of Marketing, 49(4), pp. 41-50.
(The Board of Editors received the paper on 06/4/2018, its review was completed on 18/5/2018)
ISSN 1859-1531 - THE UNIVERSITY OF DANANG, JOURNAL OF SCIENCE AND TECHNOLOGY, NO. 6(127).2018 55
TEACHERS’ PERCEPTION TOWARDS THE USE OF ICT IN VIETNAM:
USING ACTIVITY THEORY TO IDENTIFY CONTRADICTIONS
Huynh Ngoc Mai Kha1, Pham Thi To Nhu2 1University of Foreign Language Studies – The University of Danang;[email protected]
2Universiti Malaysia Sabah; [email protected]
Abstract - This paper presents the findings of a study which was undertaken at five different primary schools in Vietnam. The participants were 5 teachers of English aged 28 to 35 in Quang Ngai province. This quantitative study aims to explore teachers’ perception towards the use of ICT in their schools in Vietnam. Activity Theory is employed as the framework for guiding the study owing to the fact that its focus is on the identification of contradictions occurring in the activity system. From Activity Theory analysis, several contradictions could be located. The study provides implications for future research in terms of teachers’ adoption of ICT at different levels as well as recommendations for ICT use improvements.
Key words - activity theory; contradictions; ICT; perception; teacher
1. Introduction
ICT (Information and Communications Technology) has
played an important role in English language teaching and
learning in the world. The use of ICT has been emphasized
and spread all over the world in this field. Developed countries
in Asia strongly endorse and support ICT as an essential
component of innovative student-centered pedagogy (Albion,
Tondeur, Forkosh-Baruch, & Peeraer, 2015). As Peearer and
Van Petegem (2011) mentioned, with directive 55 (MOET,
2008), an educational reform rationale puts the emphasis in
that direction in Vietnam too. In the context of the movement
for friendly schools and active students (MOET, 2009) the
role of ICT is conceptualized as to support educational
renovation towards a creative learning society. In addition,
educators in Vietnam were encouraged to reasonably
implement ICT applications as part of new and innovative
methods of teaching and learning (MOET, 2008). However,
whether ICT has been adopted effectively or not is still
controversial. In fact, few studies have consistently shown that
technology integration shows disappointing levels of
penetration and success (Cuban, Kirkpatrick& Peck, 2001;
Bauer & Kenton, 2005; Dang, 2013). Recently, it has been
pointed out that there are crucial teacher attributes including
perceptions, beliefs and attitudes which play an important part
in the acceptance or rejection of ICT (Vandelinde, 2011;
Veen, 1993; Mumtaz, 2000, Jimoyiannis& Komis, 2006).
Moreover, according to Loveless (2003), teachers are aware
of the ubiquitous presence of ICT in their teaching
environment, but may not perceive the link to their teaching
practices. In reality, teachers’ perception towards the use of
ICT in teaching is very important as it forms a tendency that
makes them feel favorable or unfavorable towards the use of
modern technology in teaching (Qasem, 2016). In Vietnam,
this situation is not different with poor penetration of ICT in
teaching (Hong, 2014). On the other hand, Activity Theory
(AT) is thought to be the best kept secret in academia
(Engestrom, 1993) due to its popularity for use in the field of
education. Besides, AT can be used as a lens to understand the
important issues related to a certain matter (Murpy &
Rodruguez - Manzanares, 2008). In fact, in simple terms,
ATis all about ‘who is doing what, why and how’ (Hasan &
Kazlauskas, 2013). In AT, the relationship between subject
(the doer) and doer (the thing being done) forms the core of an
activity (Figure 1)
The Core of an Activity
Subject object outcomes
(the doer) (the deed)
Figure 1. The core of an activity
(Adapted from Activity Theory: who is doing what, why
and how (Hassan &Kasslauskas, 2013)
As can be seen from Figure 1, the subject of an activity
encompasses the activity’s focus and purpose while the
subject, a person or group engaged in the activity,
incorporates the subject’s/s’ various motives. The outcomes
of an activity can be the intended ones, but there can also be
others that are unintended (Hassan &Kasslauskas, 2013).
In addition, according to Hardman (2005), the basic
unit of analysis for AT is an activity system which refers to
a group of people who share a common object (or problem
space) and who use tools to act on that object, transforming
it. In Figure 2, the object is represented as a circle
indicating that this space is subject to change and is in a
state of flux, making it difficult to pin down (Hardman,
2005). This author also maintains that relationships in this
system are driven by rules, which both afford and constrain
behaviors. Rules are the norms and sanctions that specify
and regulate the expected correct procedures and
acceptable interactions among the participants (Cole &
Engerstrom, 1993). Division of labour within the system
describes both a horizontal division among community
members, as well as a vertical division between power-and
status-holders which then can be understood as related to
power within and between systems (Hardman, 2005).
Figure 2. An activity system
(Adapted from Activity Theory as a Framework for
Understanding Teachers’ Perceptions of Computer Usage at a
Primary School Level in South Africa (Hardman, 2005))
Using the above-mentioned model to analyze teachers’
perception on the use of ICT, the elements of AT of the
56 Huynh Ngoc Mai Kha, Pham Thi To Nhu
present study can be mapped as follows:
Subject Teachers
Object The goal of teaching (quality
communication skills both written and spoken)
Tools Methods and facilities used for teaching
Rules Rules of the schools and relevant authorities
Community students, teachers, and relevant
administration as well as staff
Division of Labour The roles and
responsibilities of members of the community
(Adapted from English Teachers’ Perceptions about
Their Teaching: Using Activity Theory to Identify
Contradictions (Marwan, 2009)).
In this study, AT is used to examine the contradictions
within teachers’ perception on the use of ICT in their
teaching. Therefore, the following research question is
used to guide this study:
Research question: What are the contradictions within
teachers’ perception on the use of ICT in their teaching?
1.1. Literature review
The term 'ICT' is defined as “forms of technology used
for creating, displaying, storing, manipulating, and
exchanging information” (Donnelly, McGarr, & O’Reilly,
2011). This definition seems to be general, thus, within the
scope of this study, ICT is defined as computer, and the
internet-based technologies which can be categorised into
two types: i) generic software applications, e.g., word
processors, presentation software, email packages, and
web browsers; and ii) CALL software applications and
useful websites with a focus on purposeful language
teaching and learning (Sarkar, 2012).
1.2. Teachers’ Perception on ICT Use
Hepp, Hinostraza, Lavaland Rehpain (2004) suggest
that teacher beliefs and attitude to ICT influence the rate of
ICT adoption. In fact, they identify those who recognize
the potential of ICT will quickly explore tools in their
practice and perceive computers as a ‘valuable tool’ and
‘useful’ (Hepp et. al, 2004).
In addition, Loveless (2003) claims that teachers’
perceptions on ICT use are fashioned by their identity and
participation in wider cultural and social sphere which
influence the professional areas and settings in which they
practice. Besides, in Rogers’ Diffusion of Innovation Theory
(2003), perceptions on ICT use include perceived ease of use,
perceived usefulness and satisfaction. According to Roger,
perceived ease of use refers to the degree to which a teacher
believes that using ICT will be free from effort. Teachers may
believe that technology is useful and at the same time, they may
perceive the use of technology to be too difficult and therefore
performance benefits of usage are outweighed by the effort of
using the technology. This in turn affects the actual use of ICT
in education. Perceived usefulness is the degree to which a
teacher believes that using ICT will enhance his or her job
performance at school (Rogers, 2003). It has been proved that
teachers tend to use ICT when they think that it will help
enhancing their teaching (Ma, Anderson &Streith, 2005). This
is also supported by Knezek and Christenen (2002) who
reasons that perception of potential usefulness of the computer
could influence attitude towards use of ICT. Also, according to
Huang and Liaw (2005), teachers’ attitudes towards ICT and
their perceptions on ICT use play an important role in their
making use of ICT in their teaching activities. Such perceptions
are significant as they may influence the teachers’ future ICT
pedagogical practices (Von Konsky et al, 2009; Al-Zaidiyeen
et al, 2010). Last but not least, Harris (2002) holds the
viewpoint that the benefits of ICT will be gained when
confident teachers with high perceptions on ICT use are willing
to explore new opportunities for changing their classroom
practices by using ICT.
2. Method
Five full time teachers at 5 different primary schools in
QuangNgai province located in the Central of Vietnam
were invited to take part voluntarily in this research. Prior
to the recruitment, fliers containing information about the
study, including the research contents, the research aim and
the researcher’s contact details were sent to potential
teachers. After some time, five teachers contacted the
researcher and expressed their interests in sharing their
perception on the use of ICT in their teaching context.
Details of the 5 teachers (already coded as T1, T2, T3,
T4 and T5) are shown in Table 1.
Table 1. List of teachers in this study by genders, highest
academic achievements, number of years teaching English
No. Participant
Code Gender
Highest
academic
achievement
Number of
years teaching
English
1 T1 Male BA in TEFL 5
2 T2 Male BA in English 4
3 T3 Female BA in English 1
4 T4 Male BA in TEFL 4
5 T5 Female BA in TEFL for
Primary Education 3
Semi-structured interview is chosen as an instrument
for data collection. This tool is used because it allows the
researcher to probe for views and opinions of the
participants (Corbetta, 2003). Furthermore, it gives the
researchers the chance to gain deep information about the
phenomena being investigated (Cresswell, 2005). The
interview questions were used to explore all the issues
related to the contradictions within the activity system at
such schools in Quang Ngai provice. All the questions in
this kind of focus group interview were intended to give a
full description of each component of the Activity system
of the teaching context in terms of Activity Theory as a
framework of this study. (See Appendix for the questions)
Data is analyzed using Nvivo 8 (2008). The tree nodes
(tho (T4) ughts and definitions about data, together with
selected passages of text) are developed to create ideas,
concepts, categorize the data. Walsh (2006) claims that this
software is useful as it helps the researcher organize raw
data and links them with memos and data biting where the
researcher can make codes and analytical notes, and then
edit and rework ideas as the project progresses. For
preserving the participants’ anonymity, the participants are
referred to as T1, T2, T3, T4 and T5.
ISSN 1859-1531 - THE UNIVERSITY OF DANANG, JOURNAL OF SCIENCE AND TECHNOLOGY, NO. 6(127).2018 57
3. Results
The findings presented below are some of
contradictions found from participants’ responses.
In this research, teachers are willing to promote the use
of ICT in their teaching to help students improve their
communications skills, but find they are incapable of
designing suitable activities with ICT as they think such
designing activities would take time and much effort. In
addition, lacking facilities in teaching is another problem.
This is a contradiction related to Subject and Tools (1).
This is acknowledged in the following comments:
Nowadays using technology in teaching also gives
teacher some difficulties. Teachers need a lot of time to
find material to prepare lesson plans as well as it also
depends on many extent factors.
(T1)
I know that using ICT in my teaching is very useful as it may
help me to save my time and it will have great effect to students
but my ICT use is quite limited because I am not confident in using
ICT in my class. I can only use powerpoint and some audio.
(T5)
My school is in a poor village and far from town so I
only use my computer to prepare lesson plan, check
pronunciation and play recording for my students to listen
to. As a result during English lessons some students feel
bored and difficult to learn. (T2)
It is very difficult for me to teach English. At my school,
there is nothing in it although it is in the central of Duc pho
town. There isn't computer room, interactive table and
many different facilities. I do everything myself. I buy a
cassette to teach listening for my students and I only use
cassette to teach English at school
(T3)
The inadequacy of technical staff leads to a
contradiction between Subject and Division of Labour (2)
as teachers need technical support when they encounter
difficulties when using ICT in their teaching but usually
there are few staff available when teachers are in need. For
example, a teacher commented as follows.
Teacher needs a lot of time to prepare electric lesson
planning such as search pictures, fun games, .... Teaching
technology depends on many things: electricity,
computers, machines but I often have some difficulties in
using them. Unluckily, whenever I have problems, I can’t
find any technical staff to help me.
The workload teachers suffer from other work besides
teaching hinders teachers from raising good quality in using
ICT for their teaching. This is one form of contradiction
between Tools and Object (3). It is true that if teachers are
given a fine workload where there are chances for them to
fulfill, they could provide quality teaching to students
(Dison, Scott, & Dixon, 2007). T4 said:
Using ICT is time consuming and there are not enough
facilities. Moreover, the new curriculum contains too many
lessons. Besides teaching, I still have a lot of things to do
such as doing the task as a form teacher. You see, I have to
attend many meetings.
The lack of coordination and support among teachers
and administrative staff (i.e. those in charge for timetable
management and curriculum management) leads to the
contradiction between Division of Labor and Object (4)
because teachers’ willingness to diversify their teaching to
motivate their students so that their learning will become
better due to the fact that teachers sometime cannot use the
language laboratory or the contents of the lesson are too
long for teachers to cover in one period. One teacher
expressed his opinion as follows:
(T2)
Sometimes I cannot use the lab as it is overlapped and
my lesson has too many contents. I cannot let students play
some games with ICT though I know they will be very
interested in it.
(T1)
A contradiction also occurs between the Subject ad
Rules (5) since teachers’ effort in using ICT to create
exciting activities may not be supported by a number of
schools’ regulations due to the workload or textbook (T3).
One teacher said during the interview:
The curriculum is so long, it is hard for me cover all the
contents. If I create more products, it will take not only my
time at home but also my time in class. It is very hard for
me in my situation
Figure 3. Contradictions within the activity system
4. Conclusions and Suggestions
The good adoption of ICT into teaching requires many
different factors. To understand which factors may facilitate
or constrain the adoption process requires a good
understanding of activity system in which they are located.
Engesstrom (2001) claims that an analysis of contradiction
using Activity Theory is a useful way. Thanks to such analysis
approach, the researcher could understand the whole process
within its activity system, teachers’ use of ICT in their
teaching in this context. In addition, she could also identify
problems that need to be addressed so that the situation would
be improved. Hence, the contradictions in this research should
not be merely seen as the problems, but they are considered as
the useful sources for improvements (Nelson, 2002).
In this study, there are several contradictions within
teachers’ perceptions on the use of ICT in their teaching context.
First, the use of compulsory textbooks puts some constraints on
teachers as its long contents hinder teachers from performing
some other kinds of activities that bring good motivation and
58 Huynh Ngoc Mai Kha, Pham Thi To Nhu
interest to their students. Consequently, the view that requires
teachers teach the whole contents of the books should be
reviewed so that teachers could base on the main contents of the
textbooks and choose what and how to teach so that their
teaching will bring the best quality to their students.
Second, the contradiction related to the lack of
technical support for supporting teachers in their use of
ICT in teaching should not happen in the future. This can
be done in different ways. On the one hand, all the facilities
must be checked regularly to make sure that they are in
good conditions. On the other hand, each school should
have enough technicians who are present at the language
laboratory so that teachers could be supported in time. This
will, in turn, encourages teachers use ICT in their teaching
as teachers feel more confident.
Third, the contradictions triggered by teachers and other
staff in administration due to workload and timetable
management can be solved if the teaching quality is considered
a priority and teachers should be facilitated in their teaching.
In summary, this study has provided some
recommendations for the improvements based on the findings
regarding to the contradictions happening within the system
using AT as the framework. The study cannot avoid some
limitations due to the limited number of participants and
therefore the results might hardly be generalized.
Furthermore, the study is carried out at primary school level;
further study can also be conducted at different levels.
Appendix
Questions for the focus group interviews
i. What is your viewpoint about ICT use in teaching? Do you
often use ICT in your teaching? When teaching speaking skills, what
advantages and disadvantages do you encounter if you use ICT?
ii. Do your school and relevant authorities support your use
of ICT in teaching? In what ways?
iii. Do you use ICT in teaching speaking skills? Which ICT
use do you adopt in teaching speaking? What are the students’
attitudes toward such use of ICT?
iv. Do you think it is necessary to integrate ICT in your
teaching? What will facilitate this integration?
v. In what ways could the skills you presented in your
products be applied into real life setting or workplace?
vi. How did educational technology (eg. Web Tools 2.0) help
in teaching and learning?
vii. Do you think it was important to integrate educational
technology into curriculum-based learning? Why do you think so?
viii. What were the changes you wish you could have
made during the planning, designing, and implementation stage
and how could the changes affect teaching and learning?
ix. How could you further improve your classroom
management/teaching method?
x. Did your product(s) benefit your learners in terms of their
knowledge and soft skills? Why do you think so?
xi. Do you think your teaching approaches work well with the
application of educational technology? If so, in what way? If not, why?
xii. How did your instructions and product(s) impact the
learners? If so, in what way? If not, why?
xiii. What difficulties do you encounter when developing
technology based materials for teaching speaking skills?
xiv. Could you suggest some solutions to those problems?
REFERENCES
[1] Bauer, J., & Kenton, K. (2005). Toward technology integration in
the schools: Why it isn’t happening. Journal of Technology and
Teacher Education, 13(4), 519-546.
[2] Bingimlas, K. A. (2009). Barriers to the successful integration of
ICT in teaching and learning environments: A review of the literature. Eurasia Journal of Mathematics, Science and Technology
Education, 5(3), 235-245.
[3] Creswell, J. W. (2005). Educational research: Planning, conducting
and evaluating quantitative and qualitative research (2nd ed.). Upper Saddle River: Merrill Prentice Hall.
[4] Dang, X. T. (2013). ICT in Foreign Language Teaching in an
Innovative University in Vietnam: Current Practices and Factors
Affecting ICT Use. La Trobe University: Australia.
[5] Donnelly, D., McGarr, O., & O’Reilly, J. (2011). A framework for teachers’ integration of ICT into their classroom practice. Computers and Education,
57(2), 1469–1483. https://doi.org/10.1016/j.compedu.2011.02.014
[6] Engestrom, Y. (1993). Development Studies of Work as a Testbench
of Activity Theory: The Case of Primary Care Medical Practice. In S. Chaiklin & J. Lave (Eds.) Understanding practice: Perspective on
Activity and Context. Cambridge: Cambridge University Press.
[7] Hardman, J. (2005). Activity Theory as a framework for understanding
teachers' perceptions of computer usage at a primary school level in South Africa. South African Journal of Education. Retrieved from
https://vn.search.yahoo.com/yhs/search?hspart=visicom&hsimp=yhs-
weathernow&p=Activity+Theory+as+a+framework+for+understanding+teachers%27+perceptions+of+computer+usage+at+a+primary+sc
hool+level+in+South+Africa&type=150_VN_vn
[8] Hassn, H., & Kazlauskas, A. (2013). Activity Theory: who is doing what,
why and how. Theori Research Group. University of Wollongong.
[9] Loveless, A. (2003). The Role of ICT. Continuum: London & New York.Knezek, G. & Christensen, R. (2002). Impact of New
Information Technologies on Teachers and Students. Education and
Information Technologies, Vol. 7, no. 4, 369-376.
[10] Krashen, S. (2013). Second Language Acquisition: Theory, Applications, and Some Conjectures. Cambridge University Press.
[11] Levy, M. and Stockwell, G. (2006). CALL dimensions: Options and issues
in computer-assisted language learning. Mahwah, NJ: Lawrence Erlbaum.
[12] MOET. (2009). Report on 2009 national university entrance
examinations. Retrieved November 20, 2009, from http://moet.gov.vn/?page=1.26&view=1368.
[13] Murphy, E., & Rodruguez- Manzanares, M.A. (2008). Using
Activity Theory and Its Principle of Contradictions to Guide Research in Educational Technology. Australia Journal of
Educational Technology, 24 (4): 442: 457.
[14] Peeraer, J., & Van Petegem, P. (2011). ICT in teacher education in an
emerging developing country: Vietnam’s baseline situation at the start
of “The Year of ICT”. Computers and Education, 56(4), 974–982
[15] Rogers, E.M. (2003). Diffusion of Innovation Theory. Macmilan
Publishers: London.
[16] Sarkar, S. (2012). The Role of Information and Communication
Technology (ICT) in Higher Education for the 21st Century. The Science Probe, 1(1), 30–41.
[17] Vanderlilnde, R. (2011). School-based ICT Policy Planning in a
Context of Curriculum Reform (Doctoral Disseratation, Faculty of
Psychology & Pedagogic Sciences, University of Gent)
[18] Veen, W. (1993). The Roles of Beliefs in the Use of Information Technology: implications for teacher educaiton, or teaching the right
thing at the right time, Journal of Information Technology for
Teacher Education, 2: 2, 139-153.
[19] Von Konsky, B.R., Ivins, J. & Gribble, S.J., 2009. Lecture attendance and web based lecture technologies: A comparison of
student perceptions and usage patterns. Australasian Journal of
Educational Technology, 25 (4), 581-595.
[20] Vu, N.T.T. & Burns. A. (2014). English as a medium of instruciton: Challenges for Vietnamese tertiary lecturers. The Jounal of ASIA
TEFL, 11(3), 1-31.
(The Board of Editors received the paper on 29/5/2018, its review was completed on 13/6/2018)
ISSN 1859-1531 - THE UNIVERSITY OF DANANG, JOURNAL OF SCIENCE AND TECHNOLOGY, NO. 6(127).2018 59
IMPROVING STRUCTURES OF STUDENTS’ ARGUMENTATIVE ESSAYS
THROUGH GENRE PEDAGOGY
Dinh Thanh Liem
University of Foreign Language Studies - The University of Danang; [email protected]
Abstract - This paper analyses the structures of argumentative texts produced by second-year students who major in English for Tourism at the Department of English for Specific Purposes, University of Foreign Language Studies – the University of Danang. It seeks to examine whether the students’ text structures can be improved after they complete a ten-hour writing course informed through genre pedagogy. The article is underpinned by genre theory developed within Systemic Functional Linguistics. As the finding indicates, the students show an improvement in rhetorical structures of texts, which allows them to achieve communicative purposes in the cultural and situational contexts thanks to the adoption of genre pedagogy.
Key words - genre pedagogy; learners; teachers; argumentative writing; text structure
1. Introduction
Argumentative writing is one of the key skills in
curricula at many educational levels in many countries. In
Australia, the argumentative genre is foregrounded in the
school curriculum where students are expected to
demonstrate the ability to write effective argumentative
essays and appraise diverse opinions. In EFL contexts such
as Vietnam, the importance of argumentative writing is
also emphasized in the curricula of many disciplines,
including the English major.
Argumentative writing is prominent not only in the
curricula of many countries, but is also emphasized in a
range of high-stakes testing and assessment contexts. It is
assessed in the National Assessment Program – Literacy and
Numeracy (NAPLAN) in Australia as persuasive writing.
Internationally, the ability to persuade others is privileged in
the high-stakes standardized exams and is tested in both the
International English Language Testing System (IELTS)
and the Test of English as a Foreign Language (TOEFL),
both of which act as gate-keeper for admission to an English-
speaking university. In China, argumentative writing is
included as a major component of the college test
administered upon completion of tertiary studies. Similarly,
this argumentative genre is also a core requirement of three-
level Vietnamese Standardized Test of English Proficiency
(VSTEP) in Vietnam. Although the ability to write well-
constructed arguments with persuasive supporting evidence
is critical for academic success, little attention has been paid
to building the capability of student writers to meet high
demands of the academic world as well as to satisfy the
requirements of future professions upon graduation.
On the other hand, previous traditional approaches to
writing instruction do not generate significant benefical
impacts on students’ writing skills. One of these approaches
is product-oriented, which has been dominant in Vietnamese
classrooms for years. This approach has been criticised due
to the failure to prepare students with necessary linguistic
resources to make meanings and raise student awareness of
text in its social context. Writing in this approach is seen just
as a different way of learning about grammar and the job of
the teacher is confined to designing, assigning and assessing
student writing. As a response to the shortcomings of the
traditional model, educational institutions have, in recent
years, adopted a process-oriented approach. This approach
has been long applauded for its contributions to developing
cycles of planning, drafting and revising. One serious
concern with this tradition, however, is its efficacy as an
instructional approach in EFL classrooms to deal with the
complicated nature of the writing task. This approach places
an over-emphasis on ones’ personal experience and one’s
own writing process without a theoretical base of the way
language is patterned to make meanings in human interaction
and underestimates the role of the teacher who should be
empowered to teach rather than raise metacognitive
awareness (Hyland, 2003). This approach also does not give
enough attention to L2 learners, particularly struggling ones
who have limited understanding of the rhetorical structures
of target text (Cope & Kalantzis, 1993).
Although the above-mentioned orientations have been
criticized by many scholars, genre-based tradition has been
developed as an innovative pedagogy to develop
knowledge of text structure for learners through explicit
teaching of genre. The genre pedagogy views the social
nature of language use and prototypical structures of texts
as a central point to make meanings and accomplish the
purposeful act of writing. The fundamental tenet of the
pedagogy is based on “guidance through interaction in the
context of shared experience” (Rose & Martin, 2012,
p. 58). It aims to develop conscious understandings of
genre and build up a repertoire of language to enable
successful written performance. The pedagogy not only
focuses on the writing product, but also the process of how
to write to achieve communicative goals.
The genre pedagogy is developed based on the theory
of systemic functional linguistics (SFL) (Halliday &
Matthiessen, 2013). In SFL, texts with similar social
purposes and linguistic patterns are considered to be
instances of the same genre (Humphrey, Droga, & Feez,
2012). Genre can be defined as ‘staged, goal-oriented,
social activity’ (Rose & Martin, 2012, p. 53) which meet
various social purposes in the cultural and situational
contexts. Depending on the social purpose of a text in its
cultural context, it has its own text organizations with
Stages and Phases to achieve its purpose and depending on
the situational context including field (topic), tenor (who is
involed in the communication) and mode (written or oral),
a text has its own distinctive linguistic features approroriate
with the genre. Based on the purpose of persuasion,
argumentative texts are classified into four distinct genres:
60 Dinh Thanh Liem
hortatory exposition, analytical exposition, discussion and
challenge (Derewianka, 2016).
In this article, the structure of analytical exposition is
chosen for research because learners often encounter this
genre in important exams such as VSTEP. The structure of
analytical exposition has three main Stages: Thesis,
Arguments and Reiteration (Martin & Rose, 2012). In the
thesis, the writer states his or her views on the topic of
discussion and previews key points. In the body
paragraphs, the writer analyzes and supports their
arguments with persuasive and reliable evidence,
explanation and counter-arguments. In the conclusion, the
writer reiterates his/her position on the subject of debate to
persuade readers to change their thoughts on the issue.
The following section deals with genre-based pedagogy
developed within the theoretical underpinning of SFL. As
seen from the figure below, the genre approach offers
useful instructional cycles enabling the teacher to organize
classroom sequences through three main stages:
deconstruction, joint construction and independent
construction. Throughout the three stages, the teacher
continually provides students with knowledge about
contexts: context of culture and context of situation, which
aims to help them understand the social purpose of writing
and linguistic characteristics typical of genres. At the same
time, the teacher also builds up the subject-matter
knowledge for learners through a variety of activities such
as reading newspapers and magazines. Through these
activities, the teacher helps students develop vocabulary
and background knowledge about the subject.
Figure 1. Instructional cycles of genre pedagogy (Rose, 2012)
In Stage 1, sample texts are analysed to help learners
grasp rhetorical structure of written discourse and relevant
language patterns used to achieve the social purpose of
genres. During the course of analyzing model texts, stages
and phases unfolded in the texts are made explicit to
students and guidance is given to develop learners’ deeper
understanding of meaning-making choices made by
competent authors at each stage and phase of sample texts.
Guidance is also given to lead learners to color main
linguistic features that appear in sample texts and
understand the metafunctions of language including
expressing ideas, connecting ideas, interacting with others,
and creating a well-linked text. Before the analysis of
linguistic characteristics, students are supported to increase
their knowledge about field, tenor and mode, since all three
register factors have significat impacts on language choices
being made to fulfil communicative purposes.
In Stage 2, students are guided to write a similar text
with shifted field. They are asked to negotiate meaning,
discuss and give their ideas under the guidance of the
teacher. While they are voicing their ideas, the teacher is
writing them up on the board. During collaborative writing,
the teacher helps students to select linguistic choices
appropriate to field, tenor and mode and to apply the
knowledge learned in the first stage to produce a new text.
In Stage 3, students write a similar text on their own.
Before writing, they are supported to develop knowledge
of the topic and discuss with other peers about outlining of
ideas. After that, they begin to write either individually or
in groups. Once their texts are completed, they will be
collected for feedback by the teacher.
The genre approach has been very successful in
developing writing skills for learners in many countries
around the world. However, little is known about the
impact of this pedagogy on the writing performance of
students of English for Tourism at University of Foreign
Languages - University of Da Nang. In this article, an
attempt is made to compare two argumentative texts
written at two points in time by a full-time student. One
text is written before the student partakes in a genre-based
writing program and the other is produced after the
program. The purpose of this paper is to determine the
effect of genre pedagogy on the improvement of the
discourse structure of student writing.
2. Content
2.1. Object of the study
The study examines the impact of genre pedagogy on the
improvement of argumentative text structures of second-
year students who major in English for Tourism at
Department of English for Specific Purposes - Danang
University of Foreign Language Studies. The study analyzes
the structure of students' texts produced before and after they
undertake a writing course underpinned by genre pedagogy.
In this article, the detailed analysis of only one text written
by a student from the Department - Lan will be presented.
Lan's text is chosen as a case study because she has difficulty
presenting her ideas during her course participation.
Although Lan is a student who demonstrates spoken English
fluency, intelligible pronunciation, rich vocabulary and good
grammar knowledge she has great challenges in expressing
herself in writing. She does not know how to arrange ideas
in a logical well-sequenced manner because of her illogical
and unsystematic way of thinking. She has problem seeing
relationships of ideas and categorizing them into a system
network. In addition, she usually makes inaccurate choices
of meanings and this thus results in the production of an
ambiguous or obscure text. Her text also lacks coherence and
close connection between ideas, making it difficult for the
reader to grasp the main ideas and supporting details of her
writing; to recognize the link between the preceding and
following ideas in the same paragraph and between the
previous paragraph and the following paragraph in a full
single text. It can be said that Lan is a typical case
representing many students of English for Tourism. The
students in this discipline have relatively good oral
ISSN 1859-1531 - THE UNIVERSITY OF DANANG, JOURNAL OF SCIENCE AND TECHNOLOGY, NO. 6(127).2018 61
communicative skills but have huge difficulty with the
writing skills, especially text organization, arrangement of
ideas, meaning-making choices and logical critical-thinking.
2.2. Procedures
Students enrolled in a five-week writing course with
two hours per week. The stages and phases of the course
were developed based on the above-mentioned teaching
cycle with three main stages.
Stage 1 - Deconstruction - includes the following main
phases. Phase 1, eveloping field knowledge. In this course,
the topic "The Impact of Tourism on Economy, the
Environment and Cultures" was selected. To develop
relevant topic and vocabulary knowledge, students were
guided to watch a video about the impact of tourism on local
communities in the city of Cornwall, England and then to
discuss it in groups. In their discussion, they were requested
to relate what they had seen in the video to the current
situation of tourism development in their local areas. Phase
2, analyzing sample texts. In this phase, the students were
supported to understand register variables: field, tenor and
mode of communication. Phase 3, the students were step-by-
step guided to analyze the structures of sample texts,
recognize the stages and phases of texts. They were also
required to color key language features typical of the genre.
These linguistic characteristics include norminalization (the
process of translating verbs, adjectives, adverbs, and
conjunctions into nouns) to produce abstract, formal and
informative texts, constrastive conjunctions (although,
however...) to help the author present his or her views and
counter-arguments, Tenses (Present Simple, Present Perfect)
to express temporal meanings, language used to indicate the
causal relationship of ideas as well as cohesive links to
connect ideas together as a whole.
Stage 2 - Joint Construction – the students were
directed to collaboratively write a new text responding to a
task prompt about "The Impact of Tourism on the
Environment" with the teacher. Before collaborative
writing, open-ended questions were asked to activate
students’ prior knowledge. In the following phase, the
students were gradually instructed to complete the stages
and phases of the new text, and to apply the knowledge
they had learned in the Deconstruction stage to construct a
new text. While writing, the teacher had the role of asking
guiding questions, listening to the students' ideas, and
writing their responses up on the board. The teacher also
provided qualitative feedback on their writing product and
guided the whole class to make changes to their orginal text
in order to ensure the quality of their text.
Stage 3 - Independent Construction. In this stage,
students began to write their own text on "The cultural
Impact of Tourism”. This stage includes the following
phases. Phase 1, develoing field knowledge. The students
were guided to understand reading texts related to the topic.
Phase 2, they were supported to outline a plan for their text.
Phase 3, they began to write their own essays and
submitted them. In the last phase, they received the
teacher’s written feedback for their texts. After receiving
the feedback, students were asked to revise their essays
according to comments supplied by the teacher.
2.3. Data collection
The article analyses Lan's essay collected at two points
in time: before and after her participation in a writing
course adopting genre pedagogy for the organization of
learning activities. Prior to her involvement, Lan was
assigned to a writing task asking her to express her views
on the impact of tourism on local communities. As
requested, she needs to demonstrate her position on
whether the positive impacts of tourism on the local
community are superior to the negative effects. Upon
completion of the program, Lan was asked to present her
views on the issue of whether “the environment and local
cultures are often ignored by the tourism industry”
3. Findings and Discussion
3.1. Lan’s text structure
3.1.1. Lan’s text written before her course participation
The analysis of the structure of Lan's essay (Table 1),
indicates that although the task prompt asked her to state
her opinion on whether the positive impact of tourism on
communities outweighs negative effects, she failed to do
so at the opening paragraph. Rather than writing an
analytical exposition, she decided to write a discussion text
which is to discuss the benefits and drawbacks of tourism
development. Thus, her essay did not meet rhetorical
purposes of argumentative genre.
As she did not organize her ideas according to an
analytical exposition, but in a discussion right at the
beginning, she focused on developing two main parts of a
discussion paper: advantages and disadvantages of tourism
development in the subsequent body paragraphs. In
general, she made strong attempts to explain ideas in the
body sections. However, her explanation was somewhat
problematic. In her presentation about the impact of
tourism on security and safety in the local community, she
provided an illustrative example of Hoi An case, but this
example did not clarify her point. She claimed that tourism
has generated detrimental impacts on Hoi An security, but
her example failed to do its job.
Take Hoian ancient town as an example, that place is
regarded as renowned for its old city, path, temples or some
traditional crafts. This is a main cause to bring in a lot of
problems about overpopulated or untouched city.
Lan did not make the relationship of a densely
populated city with the security and safety of the local
community clear and obvious to the reader. Therefore, the
conclusion that tourism has an impact on local security
drawn at the end of the paragraph is illogical.
In the last paragraph, Lan provided a conclusion.
However, this conclusion was not that of a discussion
paper, but of an analytical exposition. Even though she
pointed out her point of view, it was just a balanced view
without adopting her own position. In the next phase, she
wrote her suggestion:
Besides, not only headquarters but also citizens or habitants
need to put much effort into improving some drawbacks to make
our countries better than ever.
At the end of the essay, she gave her personal
62 Dinh Thanh Liem
assessment of travelling. However, the assessment was still
unclear and obscure.
Table 1. Lan’s text written before her course participation
Structure Content
Thesis,
but no
position
Accompanying with dominant development of technology, modernization or even industrialization, tourism renovation
which plays a crucial part in growth of countries exists two
specific factors: drawbacks and benefits.
Side 1:
Benefits
There is no doubt that the development of tourism which is
a breakthrough step all over the world not only generates a
lot of job opportunities, but also promotes our countries’s
cultures and customs.
Evidence
for job
opportunitites
According to statistics, the percentage of unemployed people has decreased dramatically in some recent decades
thanks to tourism industry. It means that that is the first
successful step to enhance the standard of life in some
developing or poor countries.
Explanation
Another novel good effect, exchange experience or culture is
regarded as a dominant prediction for cooperation and development of numerous countries in the world. We will
have plenty of chances to promote some attractions,
incredible views, some traditional crafts and so on which
attracts a bunch of visitors to our fabulous countries.
Side 2:
Drawbacks
It is undeniable that besides incredibly various advantages, tourism development emerges a few of bably little-known
aspects such as environment or local habitants.
Environm
ental
impact
More and more domestic people or foreigners have taken a
trip to other countries. A lot of headquarters or
environmentalists ensure that pollution is inevitible. By dint of unawareness, holiday makers from other countries who
may not obey some rules or laws relating to environment
may do harm to the health of local people more or less.
Impact on
security
Moreover, the security of communities is more and more
difficult to ensure.
Irrelavant
Example
Take Hoian ancient town as an example, that place is
regarded as a renowned for old city, path, temples or some
traditional crafts. This is a main cause to bring in a lot of
problems about an overpopulated or untouched city.
Link It has a dramatical impact on a lot of inhabitants’s safety
in terms of enhancing development of some countries.
Conclusio
n
In a nutshell, tourism development has two sides: superb
or even bad influences.
Position In my view, I am mutual between two standpoints because
of unpredictable convertion.
Proposal
Besides, not only headquarters but also citizens or habitants
need to put much effort into improving some drawbacks to
make our countries better than ever.
Evaluation What is not a responsibility, is mission of a lot of people
to go further than we have gone in tourism industry.
3.1.2. Lan’s text written after her course participation
The analysis of the post-intervention text (Table 2)
showed that Lan structured her text quite well to meet the
requirement of the writing prompt. The prompt asked her
to express an opinion on whether the local environment and
culture are often ignored by the tourism industry. In the
opening section, Lan introduced the topic of argumentation
by acknowledging the contribution of the tourism sector to
the economic development. After the introduction, she
wrote a counter-argument that denies the role of the
tourism sector in environmental protection and in the
preservation of cultural values and immediately argued
against it and adopted her position. Her position is that
tourism has made great efforts in preserving cultural values
1 Bold words in the structure column of Table 2 indicates differences in Lan’s texts written before and after her course participation.
as well as contributing to an increase in state revenues used
to pay for environmental protection.
Table 2. Lan’s text written after her course participation
Structure1 Content
Orientation Tourism is one of the most developed industries in the world that contributes to the development of an
economy.
Counter-
argument
Although the tourism sector puts a strain on the preservation of cultures and protection of the
environment,
Position
it has been making high efforts to preserve cultural
values through historical and cultural exhibits and
raise the government’s environmental revenues.
Counter-
argument and
Point 1
Some may say that the tourism industry might be the
main factor that could cause the negative changes in
values and customs, but it may not be the case.
Explanation
The tourism sectors heads towards to preserve local
traditions and cultures by some practical ways such as
organizing some historical artifacts and architecture exhibits.
Example
For example, annually, in Danang city, the tourism
industry usually holds large-scale cultural heritage exhibits for local people and tourists to discover. This
makes people more understand and aware of
importance of cultural preservation.
Link It is obvious that the tourism industry contributes to
the preservation of cultural values.
Point 2
Another contribution is that the tourism sector helps
increase the government’s revenues spent on the
protection of environmentally sensitive areas.
Counter-
argument
Some people argue that the tourism sector rarely pays
attention to these areas.
Rebuttal
In reality, this industry contributes to the
government’s revenues from park entrance fees and similar sources which can be spent on maintenance
and management of these places.
Example
For example, the funds from those sources can be used for overall conservation programs and activities
such as park ranger salaries. This leads to the
improvements of park maintenance.
Link
There is no doubt that the tourism sector makes big
efforts to enhance the protection of these sensitive
areas through revenues.
Conclusion
(Restatement
of a Position)
In conclusion, although the damages of tourism industry
have been emerging continuously, the tourism sector has
attempted to save cultures and the environment.
In the body, Lan presented her point about culture
through the use of counter-argument.
Some may say that the tourism industry might be the main
factor that could cause the negative changes in values and
customs, but it may not be the case.
While she wrote the travel industry as a major factor
making negative changes to the local cultures and customs in
the counter-argument, she immediately rejected it. Next, she
gave her explanations for her argument that the tourism
industry has implemented strategies to preserve cultural
values through cultural exhibitions. She provided an example
of tourism-related events organized in Danang and argued for
the role of these events in raising public awareness and
understanding of the importance of the maintenance of
cultural identity. In the last sentence, she reaffirmed the
contribution of tourism to the preservation of cultural values.
In the second paragraph of the body section, she
ISSN 1859-1531 - THE UNIVERSITY OF DANANG, JOURNAL OF SCIENCE AND TECHNOLOGY, NO. 6(127).2018 63
presented a point towards the role of the travel industry in
raising revenues used for the protection of the
environment. After presenting her argument, she
recognized a counter-argument and rebuttal. In the counter-
argument, she wrote:
Some people argue that the tourism sector rarely pays
attention to these areas.
In the rebuttal, she wrote:
In reality, this industry contributes to the government’s
revenues from park entrance fees and similar sources which can
be spent on maintenance and management of these places.
In the next phases, Lan provided an example of financial
sources from tourism earnings allocated for conservation
activities such as salaries for conservationists. She also
included a conclusion about significant efforts made by the
tourism industry to preserve environmentally sensitive areas.
In the iteration, she restated her position about big
attempts made to protect the environment and culture.
3.2. Discussion
Through the interpretation of Lan’s texts, it is found
that Lan develops an understanding of text structure and is
able to apply her understanding in structuring and
sequencing her post-intervention text in a more persuasive
and argumentative way.
Before undertaking the intervention program, Lan could
not make differences between different genres such as
analytical exposition and discussion and thus she structures
her text in a way that does not meet communicative
functions required by the writing task. Instead of organizing
ideas according to analytical exposition, she decides to write
a discussion. Thus, her text does not meet the requirement of
the task prompt and does not achieve communicative
purposes in the cultural and situational context.
After the intervention, Lan develops a better and deeper
understanding of the structure of written discourse as
manifested in the quality of her text. She clearly
understands that an argumentative text needs to undergo
major stages and phases. These stages and phases are to
argue for a position supported by points followed by
explanation, example and link in order to persuade the
reader. She understands that an argumentative text must
include the writer’s position in the orientation, points,
counter-arguments, rebuttal and persuasive evidence
through specific illustrations and a restatement of the
writer’s position at the end of the text.
That the student develops knowledge about text
structure is thanks to genre pedagogy. This pedagogy is
advanced based on the principle of guidance through
interaction in the context of shared experience. According
to this principle, students are step-by-step guided to
understand and apply knowledge gained through quality
interaction with the teacher and other peers to complete a
new task. At the beginning stage, the teacher is a
knowledge transmitter and simultaneously a person who
offer favorable conditions for students to absorb new
kmowledge through interactions so that both the teacher
and students share the same understanding. At the
following stage, the teacher is a guide and a participant
who collaboratively works with students to co-construct a
new text. In the last stage, once new knowledge has been
achieved and students demonstrates abilities to do similar
task on their own, the teacher will act as a supervisor and
evaluator who organizes learning activities and provides
feedback and evaluation of students’ performance. Genre
pedagogy is a balanced approach which both focuses on the
writing process and the product enabling students’ success
in the academic world.
4. Conclusion
The student shows a significant improvement in text
structure upon completion of a writing course informed by
genre pedagogy. The pedagogy is considered effective to
be adopted for the delivery of writing lessons because of
several reasons. This pedagogy is a balanced approach that
focuses on developing the writing ability for learners which
allows them to produce meaningful argumentative texts. It
is also a balanced approach in terms of the role of the
teacher and students. The pedagogy appreciates the
controlling role of the teacher in the first stage when
students need the teacher to impart new knowledge but the
teacher becomes a facilitator who offers needed help at
later stages. Once students become more independent, the
teacher begins to hand over control to students who take
full charge of completing new tasks on their own.
The genre pedagogy is regarded as useful for teaching
writing skills. However, there are some considerations that
need to be taken. In the process of analyzing structures of
sample texts, the teacher should make learners aware that
stages and phases in the samples should not be treated as a
rigid formula, but as a flexbile frame that can be altered or
changed. If the teacher intentionally sees text structure as
fixed, the teacher is reinforcing the notion of formulaic
writing and restricting creativity and originality of learners
in the presentation of their arguments. Only when attention
to the flexibility of text structures has been drawn, can the
pedagogy act as a fruitful tool enabling teachers to organize
useful classroom activities and supporting the development
of writing skills for learners.
REFERENCES
[1] Cope, B., & Kalantzis, M. (1993). The Powers of Literacy: a Genre
Approach to Teaching Writing. London: Falmer Press, 1993.
[2] Derewianka, B., & Jones, P. (2016). Teaching Language in Context.
South Melbourne, Victoria Oxford University Press, 2016.
[3] Halliday, M. A. K., & Matthiessen, C. M. I. M. (2013). Halliday's
Introduction to Functional Grammar. London: Routledge.
[4] Humphrey, S., Droga, L., & Feez, S. (2012). Grammar and
Meaning. Australia: PETAA.
[5] Hyland, K. (2003). Genre-based pedagogies: A social response to
process. Journal of Second Language Writing, 12, 17-29.
[6] Martin, J., & Rose, D. (2012). Pedagogic Discourse: Contexts of
Schooling. International Journal of Language and Communication
(38), 219-264.
(The Board of Editors received the paper on 31/03/2018, its review was completed on 26/04/2018)
64 Nguyen Ngoc Nhat Minh
THE USE OF SOCIOLINGUISTICALLY RICH PEDAGOGICAL DIALOGUES IN
TEACHING CONVERSATIONAL ENGLISH
Nguyen Ngoc Nhat Minh
University of Foreign Language Studies - The University of Danang; [email protected]
Abstract - This paper discusses the potential use of sociolinguistically rich pedagogical dialogues, i.e., textbook dialogues replayed by real speakers of English. Due to the increasing recognition for English language varieties, exposing learners to naturalistic language and language variations in real life can contribute to the effective use of textbook dialogues in communication/conversation classes. To create such dialogues, teachers can guide learners to record people performing textbook dialogues and then compare the language used in the recordings to that introduced in the textbook. When being recorded, the interlocutors rely on the given prompts, which show the speech acts of the sample dialogue, to reproduce the conversation in their own language. This technique was trialed by the researcher and the results are discussed in this paper to examine how the speakers’ identities influence their language use and how this might benefit learner language repertoire, from which conclusions are drawn regarding the use of sociolinguistically rich pedagogical dialogues. The analysis of the replayed dialogues reveals that language use is affected by the speaker’ identities including gender, age, etc., and that some language elements which do not appear in textbook dialogues, such as hedging or some spoken expressions, are actually useful for learner language repertoire.
Key words - sociologically rich dialogue; naturalistic language; language variations; identity; language repertoire
1. Introduction
Due to the increasing importance of intercultural
communication, language variations are more and more
welcomed in addition to the so-called standard English. The
language that speakers use reflects their identities and what role
they decide to take in communicative social situations. There
are cases in which English language learners may not
understand the language used in real-life communication, or
they produce the language they have learned from the textbook
dialogues in communication/conversation classes. Therefore,
it is useful to make the textbook dialogues more real with
varieties of the English language that embrace the
interlocutors’ identities when they are conversing. In this way,
textbook dialogues would become sociolinguistically rich and
therefore benefit learner active language repertoire more by
preparing them for English variations they might encounter
outside the classroom. One way of creating such
sociolinguistically rich pedagogical dialogues is to record a
textbook dialogue role-played by real speakers of English. In
implementing this technique, the speakers do not memorize the
content and turns of the conversation. Instead, they use their
own language following the given prompts to re-produce the
speech acts performed in the sample dialogue. To visualize this
technique and explore its potential benefits, the researcher
trialed it and reported the results in this paper. The trial aimed
to examine: 1/ how the interlocutors’ identities influence their
language use in the conversations; and 2/ how the speakers’
language use (influenced by their identities) can benefit learner
active language repertoire, or in other words, what we can learn
from the use of sociolinguistically rich pedagogical dialogues.
2. Literature review
Although Lammers (2005) believes that textbook
dialogues and drills serve as the primary source of acquiring
“spoken command” of the target language, he agrees that they
are “limited in variety” and seem to provide the language
which is probably much more polite than the variations we are
actually exposed to on the street. Such variations might be
language use associated with interlocutors’ identities since “in
our use of language we represent a particular identity at the
same time that we construct it” (Hall, 2003). They might also
be varieties of the English language.
Thanks to the global need of using English as a medium
of communication, we are now using English in multicultural
contexts. As a result, the Englishes used by non-native
speakers are being added to our linguistic repertoire (Gallowa,
2017). Gallowa (2017) suggests that those variations greatly
influence how English should be taught to our students,
raising questions like “What grammatical, pragmatic, and
cultural norms should they learn?” or “How can I ensure they
are prepared to use the language as a lingua franca?” Kendall
(2011) also recognizes the importance of spoken language
varieties, assuming that they constitute the sociolinguistic
richness of communication in that language. These authors’
views have inspired the attempt on making textbook dialogues
become more sociolinguistically rich. Listening to textbook
dialogues played by real English users (who can be native or
non-native speakers), learners are expected to have their
linguistic repertoire improved.
3. Methodology
3.1. Materials
The original dialogue was selected from the Student
book Solutions Intermediate (Solution series), involving 14
turn-taking moves between two speakers. The conversation
(see Table 1), which is somewhat stilted, took place
between a female speaker calling to ask the male speaker
out. To ease the data analysis and discussion, the recipient
(man) was named A as the first person to start the dialogue
by picking up the phone, and the caller was B. The
conversation was tried and recorded with three pairs of
speakers, referred as A1-B1, A2-B2, and A3-B3, in
dialogue 1, 2, and 3, respectively.
The conversation was first divided into specific social
interactions, which were then broken into smaller speech
acts as the prompts for the real interlocutors.
3.2. Participants
As Norton & Toohey (2011) proved, identity categories
including race, gender, and sexuality had interacted with
language learning and teaching, the dialogue was tried on very
different pairs of speakers to see how they would respond in
ISSN 1859-1531 - THE UNIVERSITY OF DANANG, JOURNAL OF SCIENCE AND TECHNOLOGY, NO. 6(127).2018 65
that context and the language they used in terms of the
identities they took/chose. The first pair included two non-
native speakers of English, who were close friends in real life.
They actually found the situation embarrassing about the
invitation for a date out made by the woman, but they still
played the assigned roles as in the textbook (the male student
named A1, and the female B1). However, the second pair of
speakers asked to switch the roles as the female participant did
not agree to take the initiative as person B did in the given
dialogue. As a result, A2 was female who received the
invitation and B2 was male asking her for a date. These
speakers were native speakers of English and were actually in
a relationship. The last pair was two women who were
classmates. Interestingly, the fact that they had the same
gender probably did not enable them to recognise that the
social actions on the “invitation”, in fact, suggested some
ways to ask out a person. This pair, certainly, did not have any
problems taking the roles. A3 was a non-native speaker, living
in the US before to study her first master, so she was fluent in
English, and B3 was an American student. However, these
participants, who were not interested in parties, decided to
make the invitation for a farmer market instead. The recorded
conversations of the three pairs can be found in the results and
discussion of each dialogue.
Table 1. Social interactions and speech acts observed in the original dialogue
Social actions Speech acts Turns
I. Initial greetings Greeting on the phone 1. A: Hello?
Greeting & Introduce name 2. B: Hi! It’s Grace.
II. Identifying the
caller
Expressing hesitation because you don’t remember B 3. A: Er… right. Grace?
Introducing yourself as X’ friend & Reminding that you
met each other at the cinema
4. B: Abigail’s friend. We met last Saturday, at the
cinema.
Remembering & Asking if B got your number from X 5. A: Oh, yes, I remember! Did Abigail give you my
number?
Agreeing 6. B: Yes, she did.
Accepting (this turn can be neglected) 7. A: Oh, OK.
III. Making an
invitation
Asking if A has free time 8. B: Harvey, I was wondering. Are you doing
anything tonight?
Agreeing & Wanting to know why B asked 9. A: No, not really. Why?
Asking if A would like to join a party with you/do
something together
10. B: I was wondering … do you fancy going to a
party?
IV. Asking for more
information
Agreeing & Asking information on the party 11. A: Yes, why not? Whose party is it?
Answering & Confirming if A will come 12. B: A friend of mine from school. So, you’ll come,
then?
V. Accepting Accepting/Confirming the invitation 13. A: Yes.
Showing excitement 14. B: Great.
4. Findings and Discussion
4.1. The influence of identities on language use
In terms of overall structure, the original dialogue consists
of 14 turns whereas the recorded ones were all longer. The
first pair had the same number of turns but produced more
words in each turn-taking move. The two other pairs took
many more turns (23 turns in dialogue 2, and 28 turns in
dialogue 3), both of which included longer information
clarification and conversation closing. Despite the variation in
the length of the dialogues, the speakers still performed
necessary speech acts analyzed from the textbook version.
Language variation revealed much more clearly in
regard to the correspondence between the identities taken
by the participants and the language they produced.
Dialogue 1
From Table 2, we can see that the structures and phrases
used by both interlocutors, especially A1 (the male),
clearly defined them as non-native speakers of English.
Their language, in general, is relatively controlled, i.e. each
turn exactly serves a specific speech act given in the
prompts. Also, they barely used indirect language as native
speakers often use as a tool to mitigate Face-threatening
acts (FTA), which was noticeable in many of A1’s turns.
He picked up the phone starting with “Hey, who’s
calling?”, and insisted on identifying the caller (“but who’s
calling?”) when she had not answered his question. His use
of “I don’t quite remember…”, “So what?” or “I will be
there as long as we will have fun.” can be considered very
rude and highly threatened the other’s face in an actual
situation. At the same time, this linguistic feature
highlights A1’s identity as a man with the strong directness
adopted in his language, and gives an impression that the
speaker was a young man who might have been arrogant
and self-centered. However, the way he talked might
possibly come from the fact that he knew the other speaker
quite well, therefore was relaxed and not conscious of his
language use.
Despite B1’s limited use of indirect speech in the
conversation, she performed occasional hedging, which
helps mark her femininity (“I’m calling and wonder if … I
wonder if you wanna join.”, or “…if you have time.”).
Linguistic devices used for hedging signal the speaker’ lack
of assertiveness which is found to have high correlation with
femininity and therefore characterizes women’s speech
(Lakoff, 1973). How she made the invitation with the
repetition of “if you have time” also revealed her hesitation
and lack of confidence asking the man out.
66 Nguyen Ngoc Nhat Minh
Table 2. Dialogue 1 of the pair A1 – B1
Social
actions First pair
I. Initial
greetings
1. A1: Hey, who’s calling?
2. B1: Hi. Is it Oumar speaking?
II.
Identifying
the caller
3. A1: Yes, but who’s calling?
4. B1: Hi. It’s Amber. Do you remember me?
5. A1: Amber? I don’t quite remember who is
Amber.
6. B1: We met last Sunday at the cinema. I was
with Minh. I’m her friend.
7. A1: Oh, I see, I see. Where did you get my
number from?
8. B1: From Minh.
9. A1: Okay. So what?
III. Making
an invitation
10. B1: So I’m calling and wonder if you have
time this Saturday. We’ ve got a party, and I
wonder if you wanna join.
IV. Asking
for more
information
11. A1: I have time, but what type of party are
you talking about?
12. B1: It’s a bonfire party…uhm..around the
Del Monte beach, if you have time.
V. Accepting 13. A1: Ok. Ok. I will be there as long as we will
have fun.
14. B1: That would be great.
Dialogue 2
The language produced in this conversation presented
as Table 3 was much less controlled than that of the first
one, and contained typical linguistic components by
English native speakers.
A2’s spoken English featured the identity as a female
speaker due to the excessive use of hedging language
including fillers (“oh”, “um”, ok”, “yeah”) and indirect
requests – a “superpolite” form (Lakoff, 1973). While the
male native speaker in the original conversation also
sought the information indirectly (“Did you get my number
from Abigail?”), A2, as a female, sounded friendlier and
softer when she showed hesitation “Uhm …” followed by
“Can I ask how…?”
As a native speaker, B2 produced very natural
English, using phrasal verbs (“coming up”, “pick you
up”) and currently common spoken expressions (“it’s up
in …”). Interestingly, his maleness was strongly revealed,
although not explicitly, in his saying “I thought I’d give
you a call.” Traditionally, men have often said this when
asking another out, but women normally do not. It does
not mean a woman cannot say that in a similar context
(actually, some women have said that way in this modern
time), but this expression, which seems somehow
“powerful,” supposedly bears “a male’s voice/position”.
Compared to his partner, B2 did not have many filled
pauses. Most of his utterances were quite direct and took
fewer words to perform speech acts. In addition, B2
brought his real identity to the conversation with the
phrase “have got” in turn 14. His parents, who are South
Africans, speak British English and its very similar
version – South African English, so his English was
sometimes mixed with British English even though he
was raised and grown up in the US.
Table 3. Dialogue 2 of the pair A2 – B2
Social
actions
Second pair
I. Initial
greetings
1. A2: Hello?
2. B2: Hey Lisa. This is Mike!
3. A2: Oh. Hey Mike.
4. B2: Hey, how are you?
5. A2: I’m good. How are you doing?
II.
Identifying
the caller
6. B2: Oh, you don’t remember me?
7. A2: Um…
8. B2: Oh, ok. Well, we met at the cinema
recently. And I thought I’d give you a call.
9. A2: Oh. Oh, Ok. Ok, yeah, I remember. Uhm.
Can I ask how you got my number from?
10. B2: Oh, yeah, I got your number from John at
the cinema last week.
11. A2: Oh, ok, ok, yeah. How are you?
12. B2: Oh, I’m doing well. How are you?
13. A2: Good.
III. Making
an invitation
14. B2: Uhh. This weekend we’ve got a party
coming up on Friday. Would you like to go?
IV. Asking
for more
information
15. A2: Um, what time?
16. B2: Um, it’s about 7.
17. A2: Ok. Where is it?
18. B2: Uh, it’s up in Ford Collin’s.
V. Accepting 19. A2: Oh, that sounds good.
20. B2: Alright, ah. so I’ll pick you up at 6?
21. A2: Great. Yeah, that sounds good.
Dialogue 3
Generally speaking, the speakers’ choice of grocery
shopping over party already constituted part of their
identities as female speakers, and possibly marked their
age (nearly 40) as well (see Table 4).
Table 4. Dialogue 3 of the pair A3 – B3
Social
actions
Third pair
I. Initial
greetings
1. A3: Hi. Who is it?
2. B3: Hi. This is Janelle.
II.
Identifying
the caller
3. A3: Oh.. Janelle...uhm.. Janelle? Like..are you
– like - from my Financial Administration class?
4. B3: No, remember we had Marketing together?
We were in a group with Lucy and Dash?
5. A3: Ohh.. Yeah, I remember. Yeah,
Dash..yeah, that was a great project.
6. B3: I know. And a lot of work.
7. A3: Yeah, it did, but finally, it’s over. So,
yeah, so I I remember you, Janelle, but like, I
don’t remember, like, giving you my phone
number? Did you get it from Dash?
8. B3: Well, sort of. I just got it from our group
work together, when we all exchanged numbers. I
just kept it in my phone.
9. A3: Oh, yeah, I remember at the very beginning
of the semester, yeah, we did, like exchange
numbers. And I remember that we also had like this
post-it notes and the Google documents.
III. Making
an invitation
10. B3: Yeah, all that work. Uhm, I was calling to
see if you’re free tonight.
11. A3: Uh, maybe I will have to check my
schedule. Like, you know, we have so many
ISSN 1859-1531 - THE UNIVERSITY OF DANANG, JOURNAL OF SCIENCE AND TECHNOLOGY, NO. 6(127).2018 67
things, but yeah, but I have some time, but like, I
was wondering like why, why do you ask?
12. B3: Well, I was just wondering if you wanted to
come with me to the Farmer’s market for dinner later.
IV. Asking
for more
information
13. A3: Oh, yeah, like, that would be awesome.
Like, but, where is it? Like…
14. B3: It’s downtown, on Alvarado street.
V. Accepting 15. A3: Oh..so yeah, I think that I can come. Like, but
like, then I would just want to know where will we
meet. At Alvarado, you know, it’s a very long street.
16. B3: Yeah, I was thinking we could meet at
Plumes, and, and go from there. There’s – they
have all different kinds of food, and produce, if
you need produce for the week.
17. A3: Oh, so I might want to, like, bring a
grocery bag?
18. B3: Sure.
19. A3: Do they take cash?
20. B3: They do. And there are a few ATMs
around if you don’t have cash.
21. A3: Oh, ok. So or maybe like I should even
better, you know, carry some cash with me.
22. B3: Yeah.
Not much pausing and a large amount of hedging
helped identify A3 as a native-like, female speaker.
Noticeably, her overuse of “like” in the conversation might
signal quite different aspects of the identity she aligned
herself with. Many native speakers agree that they used
“like” quite often (even on a sentence basis), especially
when they were younger, like in their 20s. “Like” was
observed one of the fillers found more common among
women and younger participants (Laserna, Seih, and
Pennebaker, 2014). This is also a lexical hedge which
shows a lack of the speaker’s assertiveness and is
frequently encountered in women’ speech (Lakeoff, 1973).
However, it is quite certain that her use of “like” does not
mark her age as “young”. Therefore, the abused “like” in
dialogue 3 might be a linguistic feature that portraits A3’s
lack of confidence and comfort in the conversation, or her
desire to sound like a native speaker of English, either of
which support her native-like fluency and “female” voice.
The language B3 used to proceed the conversation also
highlighted her femininity. She answered A3’s questions
with many details (“I just got it from our group work
together, when we all exchanged numbers. I just kept it in
my phone.” at turn 8) and even added some information not
required in the questions (“…they have all different kinds
of food, and produce, if you need produce for the week.” at
turn 16), which is “being considerate and caring” – a
quality often recognised in females. Additionally,
B3 showed her personality as a direct person giving
unambiguous information. Although she did use hedging
language (“I was just wondering…”, “I was calling to
see…”), she answered directly almost all the questions and
included sufficient directions in her answers (e.g. turn 12)
without taking many turns.
4.2. Lessons from sociolinguistically rich pedagogical
dialogues
4.2.1. From the perspective of discourse analysis
Compared to the dialogue taken from the textbook, the
recorded ones contained more use of linguistic features that
might be considered “problematic” for prescriptive
grammar. One easily identifiable category is the
appearance of filler words, or in a broader term,
non-fluency features. These features, mentioned as
“disfluencies”, are linguistic phenomena that “interrupt the
flow of speech” and barely contribute to the spoken content
(Gilquin, & De Cock, 2013). Filled pauses appeared from
time to time in the original dialogue (“Er…right” – turn 3,
“Oh, OK.” – turn 7) but occurred with high frequency in
the conversations made between real speakers. They were
used in almost every turn in dialogues 2 and 3; however,
they did not disrupt the structures of expressions produced
by the second pair (“Well, we met at the cinema recently”,
“Ok, yeah, I remember. Uhm…Can I ask how you got my
number from?”), but they seemed distracting in the last
dialogue (“Like…are you – like – from my Financial
Administration class?”, “… but like, I don’t remember,
like, giving you my phone number?”, or “maybe like I
should even better, you know, carry some cash with me.”).
These disfluency features might be erroneous if they were
abused as in dialogue 3, but is acceptable and natural as in
dialogue 2. It can be said that although they do not provide
any “propositional content” to utterances or even
sometimes distracting for listeners, they have been used
constantly in the flow of natural speech and “deliberately
for intelligibility and rhetorical affects” very often in daily
speech and therefore identified as inevitable and
indispensable (Gilquin, & De Cock, 2013).
Another group of “potential erroneous” language
behaviours is the spoken form of certain patterns used in
the recorded conversations. These look “problematic”
because they missed some sentence elements or were not
produced in accurate form. For example, at turn 15, A2
asked “What time?” instead of “What time is the party?”,
or at the turn 22, B2 said “See you soon” instead of “I’ll
see you soon.” Some other noticeable examples would be
the common use of yes-no questions in statement form with
question mark:
Dialogue 2:
“Oh, you don’t remember me?” (turn 6)
“…so I’ll pick you up at 6?” (turn 20)
Dialogue 3:
“We were in a group with Lucy and Dash?” (turn 4)
“…I might want to, like, bring a grocery bag?” (turn 17)
These uses are actually shortened question forms
known as declarative yes-no questions in casual speech,
which means the speaker’s being surprised or intention of
checking information (Cowan, 2014).
From the utterances discussed above, it should be
understood that some elements of real-life communication
which are often considered grammatically inaccurate are
acceptable in the communicative discourse. However,
there are several structures produced by the participants
that were actual errors. Dialogue 1 involving two non-
native speakers of English revealed some incorrect
linguistic forms that characterize English language learner
(ELL) problems. For example, in turn 5, A1 did not
68 Nguyen Ngoc Nhat Minh
produce the right form of reported speech (“I don’t quite
remember who is Amber”), or he used “… as long as we
will have fun” instead of “as long as we have fun” for
adverb clause form. These phenomena would require
interference and treatment in order not to be repeated
(Cowan, 2014).
4.2.2. For learner active language repertoire
Both the original dialogue and its recorded versions
have the desirable lexical sources and structures for
language learners’ productive repertoire. Those linguistic
features can fall into following categories:
Overall structure
The textbook dialogue, claimed to be authentic by the
book series authors, are still slightly unrealistic. In a real-
life situation, the call or the conversation would not just
stop at where the recipient accepts the invitation. Normally,
(s)he would seek further information of how and when to
meet like the speakers did in dialogues 2 and 3. Also,
speakers would naturally take turns to signal the
conversation closing. For example:
“Yeah, that sounds good.” → “Ok. See you soon.”
(Dialogue 2)
“Like, well, sounds like we have a plan.” → “Ok. I’ll
see you then.” (Dialogue 3)
As learners might encounter similar communicative
situations at some points in real life, they should stay aware
of the natural structure in implementing such events to
produce more native-like language and reduce awkward
interactions in the target language.
Patterns and hedging
The dialogues are about making an invitation on the
phone, so they all contain useful expressions that help
achieve the communicative purposes. The usefulness of the
linguistic devices in use comes from not only its intended
functions but also its embedded cultural element – hedging
- which is valued in Western culture to avoid potential face-
threatening acts.
The target language intended in the dialogues is the
structures to make an invitation. This language function,
involving either making a normal invitation or an invitation
for a date, takes place very often in our daily interactions
and is therefore useful learners’ effective communication.
Several structures students should be exposed to are:
“Are you doing anything tonight?” / “I was calling to
see if you’re free tonight.”
“I was wondering…”
“This weekend we’ve got (the event). Would you like to go?”
How to respond to an invitation is equally important. In
the discussed context, expressions for “accepting”
language/purpose were given:
“Yes, why not?”
“Oh, that sounds good.”
“Yeah, that works for me.”
“sounds like we have a plan.”
Besides, students should stay informed of relevant
expressions so they would be able to successfully
communicate in similar social actions, including phone
language and closing phrases. For example:
“Hello?” / “Hi. Is it (name) speaking?
“Hey/Hi. This is (name).”
“See ya.”
“Well, cool.”
Learners’ active repertoire can also be enriched given
access to real-life use of phrasal verbs and common spoken
expressions by native speakers (“I’m doing well.”, “Well,
sort of.”, “I just kept it (your number) in my phone.”,
“if you need produce for the week.”, “then” in “You’ll
come, then?”, etc.).
Last but not least, part of the hedging language that
would well benefit learner’s oral language ability is filler
words. As mentioned before, filled pauses help with the
flow of speech, when speakers need more time to think
about what to say next. Laserna, Seih, and Pennebaker
(2014) found out that conscious participants reflect high
frequency of fillers. Despite the recognised indirectness of
this type of non-fluency linguistic features, learners should
be advised against the overuse of fillers to limit distractions
for listeners.
The above-discussed findings have shown what and
how students can learn from sociolinguistically rich
pedagogical dialogues, which helps highlight their
potential benefits if used in teaching communication/
conversation classes. Teachers are therefore advised to
adopt the technique of re-playing textbook dialogues with
real English speakers in their classroom, at intermediate
level and above. This language level is recommended for
using the technique since textbook dialogues at this level
might contain more helpful communicative expressions.
When using the technique, teachers should sample the
procedure and guide their learners in creating such
sociolinguistically rich dialogues and exploring which
language elements of the recorded dialogues should be
added to their language repertoire.
5. Conclusion
Analyzing the collected data allowed a chance to
examine how the speakers’ identities were captured in the
language they used, and saw how different dimensions like
gender, age, background, personality, etc. shaped their
language choices. There were some insights into certain
linguistic features that are constantly adopted in our daily
speech. It was interesting to be informed of different
perspectives to look at and discuss the speakers’ identities
through their using “like” or “you know”. Using
sociolinguistically rich dialogues with the same social
actions performed by different groups of speakers enables
students to become aware of language variations and of
how these can fit in their current linguistic repertoire.
Specifically, they can have their active (and perhaps
passive) English develop with regard to the overall
structure of a real conversation in English and
communicative strategies involving hedging and spoken
structures. However, challenges might arise as there are
ISSN 1859-1531 - THE UNIVERSITY OF DANANG, JOURNAL OF SCIENCE AND TECHNOLOGY, NO. 6(127).2018 69
structures that students need to understand but should not
produce. From one of the recorded dialogues appeared
some language components that were not really authentic
or useful. For example, the phrases produced by speaker
A1 in dialogue 1 could potentially make the listener,
especially someone from Western culture, lose face, hence
lead to conversational breakdowns. As language teachers,
we can try to handle this challenge, need to explain and
notify our learners of these linguistic behaviors.
REFERENCES
[1] Cowan, R. (2014). The teacher’s grammar of English. Cambridge
University Press.
[2] Falla, T., & Davies, P. A. (2012). Solutions Intermediate: Student's
book with multirom pack. Oxford: Oxford University Press.
[3] Gallowa, N. (2017). Global Englishes and change in English
language teaching: Attitudes and impact. Abingdon: Routledge.
[4] Gilquin, G., & De Cock, S. (2013). Errors and disfluencies in spoken
corpora. Amsterdam: John Benjamins Publishing Company.
[5] Hall J.K. (2003). Teaching and Researching Language and Culture.
London: Pearson. (Applied Linguistics in Action Series)
[6] Kendall, T. (2011). Corpora from a sociolinguistic perspective.
Revista Brasileira de Linguística Applicada, vol. 11(2).
http://dx.doi.org/10.1590/S1984-63982011000200005
[7] Lakoff, R. (1973). Language and woman's place. Language in
Society, 2(1), 45-80.
[8] Lammers, W. P. (2005). Japanese the Manga way: An illustrated
guide to grammar and structure. Berkeley: Stone Bridge Press.
[9] Laserna, C. M., Seih, Y. T., & Pennebaker, J. W. (2014). Um... Who like says you know: Filler word use as a function of age, gender, and
personality. Journal of Language and Social Psychology, 33(3),
328–338.
[10] Norton, B., & Toohey, K., (2011). Identity, language learning, and
social change. Language Teaching, 44(4), 412-446.
(The Board of Editors received the paper on 08/5/2018, its review was completed on 11/6/2018)