Search results for: Artificial Neural Networks (ANN)
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5067

Search results for: Artificial Neural Networks (ANN)

1917 55 dB High Gain L-Band EDFA Utilizing Single Pump Source

Authors: M. H. Al-Mansoori, W. S. Al-Ghaithi, F. N. Hasoon

Abstract:

In this paper, we experimentally investigate the performance of an efficient high gain triple-pass L-band Erbium-Doped Fiber (EDF) amplifier structure with a single pump source. The amplifier gain and noise figure variation with EDF pump power, input signal power and wavelengths have been investigated. The generated backward Amplified Spontaneous Emission (ASE) noise of the first amplifier stage is suppressed by using a tunable band-pass filter. The amplifier achieves a signal gain of 55 dB with low noise figure of 3.8 dB at -50 dBm input signal power. The amplifier gain shows significant improvement of 12.8 dB compared to amplifier structure without ASE suppression.

Keywords: optical amplifiers, EDFA, L-band, optical networks

Procedia PDF Downloads 345
1916 Utilizing Waste Heat from Thermal Power Plants to Generate Power by Modelling an Atmospheric Vortex Engine

Authors: Mohammed Nabeel Khan, C. Perisamy

Abstract:

Convective vortices are normal highlights of air that ingest lower-entropy-energy at higher temperatures than they dismiss higher-entropy-energy to space. By means of the thermodynamic proficiency, it has been anticipated that the force of convective vortices relies upon the profundity of the convective layer. The atmospheric vortex engine is proposed as a gadget for delivering mechanical energy by methods for artificially produced vortex. The task of the engine is in view of the certainties that the environment is warmed from the base and cooled from the top. By generation of the artificial vortex, it is planned to take out the physical solar updraft tower and decrease the capital of the solar chimney power plants. The study shows the essentials of the atmospheric vortex engine, furthermore, audits the cutting edge in subject. Moreover, the study talks about a thought on using the solar energy as heat source to work the framework. All in all, the framework is attainable and promising for electrical power production.

Keywords: AVE, atmospheric vortex engine, atmosphere, updraft, vortex

Procedia PDF Downloads 154
1915 Make Up Flash: Web Application for the Improvement of Physical Appearance in Images Based on Recognition Methods

Authors: Stefania Arguelles Reyes, Octavio José Salcedo Parra, Alberto Acosta López

Abstract:

This paper presents a web application for the improvement of images through recognition. The web application is based on the analysis of picture-based recognition methods that allow an improvement on the physical appearance of people posting in social networks. The basis relies on the study of tools that can correct or improve some features of the face, with the help of a wide collection of user images taken as reference to build a facial profile. Automatic facial profiling can be achieved with a deeper study of the Object Detection Library. It was possible to improve the initial images with the help of MATLAB and its filtering functions. The user can have a direct interaction with the program and manually adjust his preferences.

Keywords: Matlab, make up, recognition methods, web application

Procedia PDF Downloads 138
1914 Polish Police in the Fight against Terrorism and Cyberterrorism

Authors: Izabela Nowicka, Jacek Dworzecki

Abstract:

The paper will be presented to selected legal and organizational solutions for the prevention and combating of terrorism by the police in Poland. Development will include information on the organization and functioning of the police anti-terrorist sub-units, whose officers are on the front line of the fight against terrorism. They will be presented to the conditions and cases of use of firearms by police officers in the course of special operations aimed against organizations and terrorist groups, and the perpetrators of criminal acts of terrorism as well as the legal foundation for the Polish police to take immediate counterterrorism operations. Article will be prepared in the context of an international research project entitled. Understand the Dimensions of Organised Crime and Terrorist Networks for Developing Effective and Efficient Security Solutions for First-line-practitioners and Professionals [Project: H2020-FCT-2015, No: 700688].

Keywords: the fight against terrorism, police, Poland, takedown

Procedia PDF Downloads 329
1913 Familiarity With Civil Engineering and Types of Construction and Its Methods

Authors: Mokhtar Nikgoo

Abstract:

Civil engineering is one of the disciplines that shows the application of science in creating construction and civil engineering. That is, everything that returns to the population of a country, such as dams, airports, roads, bridges, towers, tunnels, telecommunication towers, buildings resistant to earthquakes, floods and fires, power plants and light, cheap and quality materials for construction. And the construction is included in the scope of work of the civil engineer. Civil engineering covers a wide range of tasks. That is, for the construction of buildings, bridges, towers, tunnels, roads, silos, or sewage networks, an efficient civil engineer is needed at the beginning, in addition to complying with the technical and operational aspects, he also works economically. Because being economical is a principle in civil engineering. Is. This field at the undergraduate level has three majors: civil-building, civil-mapping and civil-water.

Keywords: civil engineering, construction, surveying, mapping, pile

Procedia PDF Downloads 79
1912 Neural Correlates of Decision-Making Under Ambiguity and Conflict

Authors: Helen Pushkarskaya, Michael Smithson, Jane E. Joseph, Christine Corbly, Ifat Levy

Abstract:

Studies of decision making under uncertainty generally focus on imprecise information about outcome probabilities (“ambiguity”). It is not clear, however, whether conflicting information about outcome probabilities affects decision making in the same manner as ambiguity does. Here we combine functional Magnetic Resonance Imaging (fMRI) and a simple gamble design to study this question. In this design, the levels of ambiguity and conflict are parametrically varied, and ambiguity and conflict gambles are matched on both expected value and variance. Behaviorally, participants avoided conflict more than ambiguity, and attitudes toward ambiguity and conflict did not correlate across subjects. Neurally, regional brain activation was differentially modulated by ambiguity level and aversion to ambiguity and by conflict level and aversion to conflict. Activation in the medial prefrontal cortex was correlated with the level of ambiguity and with ambiguity aversion, whereas activation in the ventral striatum was correlated with the level of conflict and with conflict aversion. This novel double dissociation indicates that decision makers process imprecise and conflicting information differently, a finding that has important implications for basic and clinical research.

Keywords: decision making, uncertainty, ambiguity, conflict, fMRI

Procedia PDF Downloads 559
1911 Small Scale Mobile Robot Auto-Parking Using Deep Learning, Image Processing, and Kinematics-Based Target Prediction

Authors: Mingxin Li, Liya Ni

Abstract:

Autonomous parking is a valuable feature applicable to many robotics applications such as tour guide robots, UV sanitizing robots, food delivery robots, and warehouse robots. With auto-parking, the robot will be able to park at the charging zone and charge itself without human intervention. As compared to self-driving vehicles, auto-parking is more challenging for a small-scale mobile robot only equipped with a front camera due to the camera view limited by the robot’s height and the narrow Field of View (FOV) of the inexpensive camera. In this research, auto-parking of a small-scale mobile robot with a front camera only was achieved in a four-step process: Firstly, transfer learning was performed on the AlexNet, a popular pre-trained convolutional neural network (CNN). It was trained with 150 pictures of empty parking slots and 150 pictures of occupied parking slots from the view angle of a small-scale robot. The dataset of images was divided into a group of 70% images for training and the remaining 30% images for validation. An average success rate of 95% was achieved. Secondly, the image of detected empty parking space was processed with edge detection followed by the computation of parametric representations of the boundary lines using the Hough Transform algorithm. Thirdly, the positions of the entrance point and center of available parking space were predicted based on the robot kinematic model as the robot was driving closer to the parking space because the boundary lines disappeared partially or completely from its camera view due to the height and FOV limitations. The robot used its wheel speeds to compute the positions of the parking space with respect to its changing local frame as it moved along, based on its kinematic model. Lastly, the predicted entrance point of the parking space was used as the reference for the motion control of the robot until it was replaced by the actual center when it became visible again by the robot. The linear and angular velocities of the robot chassis center were computed based on the error between the current chassis center and the reference point. Then the left and right wheel speeds were obtained using inverse kinematics and sent to the motor driver. The above-mentioned four subtasks were all successfully accomplished, with the transformed learning, image processing, and target prediction performed in MATLAB, while the motion control and image capture conducted on a self-built small scale differential drive mobile robot. The small-scale robot employs a Raspberry Pi board, a Pi camera, an L298N dual H-bridge motor driver, a USB power module, a power bank, four wheels, and a chassis. Future research includes three areas: the integration of all four subsystems into one hardware/software platform with the upgrade to an Nvidia Jetson Nano board that provides superior performance for deep learning and image processing; more testing and validation on the identification of available parking space and its boundary lines; improvement of performance after the hardware/software integration is completed.

Keywords: autonomous parking, convolutional neural network, image processing, kinematics-based prediction, transfer learning

Procedia PDF Downloads 131
1910 Evaluation of Low Power Wi-Fi Modules in Simulated Ocean Environments

Authors: Gabriel Chenevert, Abhilash Arora, Zeljko Pantic

Abstract:

The major problem underwater acoustic communication faces is the low data rate due to low signal frequency. By contrast, the Wi-Fi communication protocol offers high throughput but limited operating range due to the attenuation effect of the sea and ocean medium. However, short-range near-field underwater wireless power transfer systems offer an environment where Wi-Fi communication can be effectively integrated to collect data and deliver instructions to sensors in underwater sensor networks. In this paper, low-power, low-cost off-the-shelf Wi-Fi modules are explored experimentally for four selected parameters for different distances between units and water salinities. The results reveal a shorter operating range and stronger dependence on water salinity than reported so far for high-end Wi-Fi modules.

Keywords: Wi-Fi, wireless power transfer, underwater communications, ESP

Procedia PDF Downloads 111
1909 #Push Mo Yan: A Study of the Influence of Facebook and Twitter to Adolescent Communication

Authors: Rebecca Cervantes, Elishah Maro Pangilinan

Abstract:

The current research used Uses and gratifications theory to further understand the motivations and satisfaction students get from Facebook and Twitter. The researchers relate the objectives in developing uses and gratifications theory 1) to explain how individuals use mass communication to gratify their needs, “what do people do with the media” many of these young adults use social media networks to communicate with family, friends, and even strangers. Social media sites have created new and non-personal ways for people to interact with others and young adults have taken advantage of this technological trend; 2) to discover underlying motives for individuals’ media use 3) to identify the positive and the negative consequences of individual media use. The researchers use survey questionnaires to gather information that is used in this study. A descriptive analysis was used to measure the answers to a 24-item questionnaire.

Keywords: adolescent, communication, social media, #Hashtag

Procedia PDF Downloads 287
1908 Cyber Security in Nigeria: A Collaboration between Communities and Professionals

Authors: Alese Boniface K., Adu Michael K., Owa Victor K.

Abstract:

Security can be defined as the degree of resistance to, or protection from harm. It applies to any vulnerable and valuable assets, such as persons, dwellings, communities, nations or organizations. Cybercrime is any crime committed or facilitated via the Internet. It is any criminal activity involving computers and networks. It can range from fraud to unsolicited emails (spam). It includes the distant theft of government or corporate secrets through criminal trespass into remote systems around the globe. Nigeria like any other nations of the world is currently having their own share of the menace that has been used even as tools by terrorists. This paper is an attempt at presenting cyber security as an issue that requires a coordinated national response. It also acknowledges and advocates the key roles to be played by stakeholders and the importance of forging strong partnerships to prevent and tackle cybercrime in Nigeria.

Keywords: security, cybercrime, internet, government, stakeholders, partnerships

Procedia PDF Downloads 534
1907 Secure Network Coding-Based Named Data Network Mutual Anonymity Transfer Protocol

Authors: Tao Feng, Fei Xing, Ye Lu, Jun Li Fang

Abstract:

NDN is a kind of future Internet architecture. Due to the NDN design introduces four privacy challenges,Many research institutions began to care about the privacy issues of naming data network(NDN).In this paper, we are in view of the major NDN’s privacy issues to investigate privacy protection,then put forwards more effectively anonymous transfer policy for NDN.Firstly,based on mutual anonymity communication for MP2P networks,we propose NDN mutual anonymity protocol.Secondly,we add interest package authentication mechanism in the protocol and encrypt the coding coefficient, security of this protocol is improved by this way.Finally, we proof the proposed anonymous transfer protocol security and anonymity.

Keywords: NDN, mutual anonymity, anonymous routing, network coding, authentication mechanism

Procedia PDF Downloads 448
1906 Performance Comparison of ADTree and Naive Bayes Algorithms for Spam Filtering

Authors: Thanh Nguyen, Andrei Doncescu, Pierre Siegel

Abstract:

Classification is an important data mining technique and could be used as data filtering in artificial intelligence. The broad application of classification for all kind of data leads to be used in nearly every field of our modern life. Classification helps us to put together different items according to the feature items decided as interesting and useful. In this paper, we compare two classification methods Naïve Bayes and ADTree use to detect spam e-mail. This choice is motivated by the fact that Naive Bayes algorithm is based on probability calculus while ADTree algorithm is based on decision tree. The parameter settings of the above classifiers use the maximization of true positive rate and minimization of false positive rate. The experiment results present classification accuracy and cost analysis in view of optimal classifier choice for Spam Detection. It is point out the number of attributes to obtain a tradeoff between number of them and the classification accuracy.

Keywords: classification, data mining, spam filtering, naive bayes, decision tree

Procedia PDF Downloads 407
1905 Stimuli Responsives of Crosslinked Poly on 2-HydroxyEthyl MethAcrylate – Optimization of Parameters by Experimental Design

Authors: Tewfik Bouchaour, Salah Hamri, Yasmina Houda Bendahma, Ulrich Maschke

Abstract:

Stimuli-responsive materials based on UV crosslinked acrylic polymer networks are fabricated. A various kinds of polymeric systems, hydrophilic polymers based on 2-Hydroxyethyl methacrylate have been widely studied because of their ability to simulate biological tissues, which leads to many applications. The acrylic polymer network PHEMA developed by UV photopolymerization has been used for dye retention. For these so-called smart materials, the properties change in response to an external stimulus. In this contribution, we report the influence of some parameters (initial composition, temperature, and nature of components) in the properties of final materials. Optimization of different parameters is examined by experimental design.

Keywords: UV photo-polymerization, PHEMA, external stimulus, optimization

Procedia PDF Downloads 252
1904 A Secure Survey against Black Hole Attack in MANET

Authors: G. Usha, S. Kannimuthu, K. Mahalakshmi

Abstract:

Mobile Adhoc Network (MANET) is one of the most promising technologies that have applications ranging from various portable devices to military networks. MANET has no fixed infrastructure and the security of such network is a big concern. Therefore, in order to operate MANET’s securely, the misbehavior and intrusions should be detected before the attackers affect the network communication. In this article, we make a comprehensive survey against black hole attack that is a serious threat against MANET that exploits the routing behavior of the MANET. We have given broad survey solutions that detect black hole attacks in MANET. This is achieved by analyzing the techniques involved in detecting the attacks in each scheme. Furthermore, we examine about the challenges to the researchers for constructing an in-depth solution against black hole attack.

Keywords: AODV, cross layer security, mobile Adhoc network (MANET), packet delivery ratio, single layer security

Procedia PDF Downloads 404
1903 A Review on Water Models of Surface Water Environment

Authors: Shahbaz G. Hassan

Abstract:

Water quality models are very important to predict the changes in surface water quality for environmental management. The aim of this paper is to give an overview of the water qualities, and to provide directions for selecting models in specific situation. Water quality models include one kind of model based on a mechanistic approach, while other models simulate water quality without considering a mechanism. Mechanistic models can be widely applied and have capabilities for long-time simulation, with highly complexity. Therefore, more spaces are provided to explain the principle and application experience of mechanistic models. Mechanism models have certain assumptions on rivers, lakes and estuaries, which limits the application range of the model, this paper introduces the principles and applications of water quality model based on the above three scenarios. On the other hand, mechanistic models are more easily to compute, and with no limit to the geographical conditions, but they cannot be used with confidence to simulate long term changes. This paper divides the empirical models into two broad categories according to the difference of mathematical algorithm, models based on artificial intelligence and models based on statistical methods.

Keywords: empirical models, mathematical, statistical, water quality

Procedia PDF Downloads 254
1902 An Exploration of Policy-related Documents on District Heating and Cooling in Flanders: a Slow and Bottom-up Process

Authors: Isaura Bonneux

Abstract:

District heating and cooling (DHC) is increasingly recognized as a viable path towards sustainable heating and cooling. While some countries like Sweden and Denmark have a longstanding tradition of DHC, Belgium is lacking behind. The Northern part of Belgium, Flanders, had only a total of 95 heating networks in July 2023. Nevertheless, it is increasingly exploring its possibilities to enhance the scope of DHC. DHC is a complex energy system, requiring a lot of collaboration between various stakeholders on various levels. Therefore, it is of interest to look closer at policy-related documents at the Flemish (regional) level, as these policies set the scene for DHC development in the Flemish region. This kind of analysis has not been undertaken so far. This paper has the following research question: “Who talks about DHC, and in which way and context is DHC discussed in Flemish policy-related documents?” To answer this question, the Overton policy database was used to search and retrieve relevant policy-related documents. Overton retrieves data from governments, think thanks, NGOs, and IGOs. In total, out of the 244 original results, 117 documents between 2009 and 2023 were analyzed. Every selected document included theme keywords, policymaking department(s), date, and document type. These elements were used for quantitative data description and visualization. Further, qualitative content analysis revealed patterns and main themes regarding DHC in Flanders. Four main conclusions can be drawn: First, it is obvious from the timeframe that DHC is a new topic in Flanders with still limited attention; 2014, 2016 and 2017 were the years with the most documents, yet this number is still only 12 documents. In addition, many documents talked about DHC but not much in depth and painted it as a future scenario with a lot of uncertainty around it. The largest part of the issuing government departments had a link to either energy or climate (e.g. Flemish Environmental Agency) or policy (e.g. Socio-Economic Council of Flanders) Second, DHC is mentioned most within an ‘Environment and Sustainability’ context, followed by ‘General Policy and Regulation’. This is intuitive, as DHC is perceived as a sustainable heating and cooling technique and this analysis compromises policy-related documents. Third, Flanders seems mostly interested in using waste or residual heat as a heating source for DHC. The harbors and waste incineration plants are identified as potential and promising supply sources. This approach tries to conciliate environmental and economic incentives. Last, local councils get assigned a central role and the initiative is mostly taken by them. The policy documents and policy advices demonstrate that Flanders opts for a bottom-up organization. As DHC is very dependent on local conditions, this seems a logic step. Nevertheless, this can impede smaller councils to create DHC networks and slow down systematic and fast implementation of DHC throughout Flanders.

Keywords: district heating and cooling, flanders, overton database, policy analysis

Procedia PDF Downloads 42
1901 Investigation of Unusually High Ultrasonic Signal Attenuation in Water Observed in Various Combinations of Pairs of Lead Zirconate Titanate Pb(ZrxTi1-x)O3 (PZT) Piezoelectric Ceramics Positioned Adjacent to One Another Separated by an Intermediate Gap

Authors: S. M. Mabandla, P. Loveday, C. Gomes, D. T. Maiga, T. T. Phadi

Abstract:

Lead zirconate titanate (PZT) piezoelectric ceramics are widely used in ultrasonic applications due to their ability to effectively convert electrical energy into mechanical vibrations and vice versa. This paper presents a study on the behaviour of various combinations of pairs of PZT piezoelectric ceramic materials positioned adjacent to each other with an intermediate gap submerged in water, where one piezoelectric ceramic material is excited by a cyclic electric field with constant frequency and amplitude displacement. The transmitted ultrasonic sound propagates through the medium and is received by the PZT ceramic at the other end, the ultrasonic sound signal amplitude displacement experiences attenuation during propagation due to acoustic impedance. The investigation focuses on understanding the causes of extremely high amplitude displacement attenuation that have been observed in various combinations of piezoelectric ceramic pairs that are submerged in water arranged in a manner stipulated earlier. by examining various combinations of pairs of these piezoelectric ceramics, their physical, electrical, and acoustic properties, and behaviour and attributing them to the observed significant signal attenuation. The experimental setup involves exciting one piezoelectric ceramic material at one end with a burst square cyclic electric field signal of constant frequency, which generates a burst of ultrasonic sound that propagates through the water medium to the adjacent piezoelectric ceramic at the other end. Mechanical vibrations of a PZT piezoelectric ceramic are measured using a double-beam laser Doppler vibrometer to mimic the incident ultrasonic waves generated and received ultrasonic waves on the other end due to mechanical vibrations of a PZT. The measured ultrasonic sound wave signals are continuously compared to the applied cyclic electric field at both ends. The impedance matching networks are continuously tuned at both ends to eliminate electromechanical impedance mismatch to improve ultrasonic transmission and reception. The study delves into various physical, electrical, and acoustic properties of the PZT piezoelectric ceramics, such as the electromechanical coupling factor, acoustic coupling, and elasticity, among others. These properties are analyzed to identify potential factors contributing to the unusually high acoustic impedance in the water medium between the ceramics. Additionally, impedance-matching networks are investigated at both ends to offset the high signal attenuation and improve overall system performance. The findings will be reported in this paper.

Keywords: acoustic impedance, impedance mismatch, piezoelectric ceramics, ultrasonic sound

Procedia PDF Downloads 77
1900 The Application of the Enterprise Systems through the Cloud Computing in Company: A Review and Suggestions

Authors: Mohanaad Talal Shakir, Saad AJAJ Khalaf, Nawar Ahmed Aljumaily, Mustafa Talal Shakere

Abstract:

Cloud computing is a model for enabling convenient, on demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. Objectives of this paper are to investigate the role of the Enterprise System and Cloud Computing Services to assist and guide him to ensure the initiative become successful. The cloud computing technology offers great potential for Enterprise such as the speed of dealing with data and product introductions, innovations and speed of response. The use of cloud computing technology leads to the rapid development and competitiveness of enterprises in various fields.

Keywords: cloud computing, information management, marketing, enterprise systems

Procedia PDF Downloads 680
1899 Factors Related with Self-Care Behaviors among Iranian Type 2 Diabetic Patients: An Application of Health Belief Model

Authors: Ali Soroush, Mehdi Mirzaei Alavijeh, Touraj Ahmadi Jouybari, Fazel Zinat-Motlagh, Abbas Aghaei, Mari Ataee

Abstract:

Diabetes is a disease with long cardiovascular, renal, ophthalmic and neural complications. It is prevalent all around the world including Iran, and its prevalence is increasing. The aim of this study was to determine the factors related to self-care behavior based on health belief model among sample of Iranian diabetic patients. This cross-sectional study was conducted among 301 type 2 diabetic patients in Gachsaran, Iran. Data collection was based on an interview and the data were analyzed by SPSS version 20 using ANOVA, t-tests, Pearson correlation, and linear regression statistical tests at 95% significant level. Linear regression analyses showed the health belief model variables accounted for 29% of the variation in self-care behavior; and perceived severity and perceived self-efficacy are more influential predictors on self-care behavior among diabetic patients.

Keywords: diabetes, patients, self-care behaviors, health belief model

Procedia PDF Downloads 465
1898 Femtocell Stationed Flawless Handover in High Agility Trains

Authors: S. Dhivya, M. Abirami, M. Farjana Parveen, M. Keerthiga

Abstract:

The development of high-speed railway makes people’s lives more and more convenient; meanwhile, handover is the major problem on high-speed railway communication services. In order to overcome that drawback the architecture of Long-Term Evolution (LTE) femtocell networks is used to improve network performance, and the deployment of a femtocell is a key for bandwidth limitation and coverage issues in conventional mobile network system. To increase the handover performance this paper proposed a multiple input multiple output (MIMO) assisted handoff (MAHO) algorithm. It is a technique used in mobile telecom to transfer a mobile phone to a new radio channel with stronger signal strength and improved channel quality.

Keywords: flawless handover, high-speed train, home evolved Node B, LTE, mobile femtocell, RSS

Procedia PDF Downloads 472
1897 Proactive Pure Handoff Model with SAW-TOPSIS Selection and Time Series Predict

Authors: Harold Vásquez, Cesar Hernández, Ingrid Páez

Abstract:

This paper approach cognitive radio technic and applied pure proactive handoff Model to decrease interference between PU and SU and comparing it with reactive handoff model. Through the study and analysis of multivariate models SAW and TOPSIS join to 3 dynamic prediction techniques AR, MA ,and ARMA. To evaluate the best model is taken four metrics: number failed handoff, number handoff, number predictions, and number interference. The result presented the advantages using this type of pure proactive models to predict changes in the PU according to the selected channel and reduce interference. The model showed better performance was TOPSIS-MA, although TOPSIS-AR had a higher predictive ability this was not reflected in the interference reduction.

Keywords: cognitive radio, spectrum handoff, decision making, time series, wireless networks

Procedia PDF Downloads 482
1896 Modelling of Powered Roof Supports Work

Authors: Marcin Michalak

Abstract:

Due to the increasing efforts on saving our natural environment a change in the structure of energy resources can be observed - an increasing fraction of a renewable energy sources. In many countries traditional underground coal mining loses its significance but there are still countries, like Poland or Germany, in which the coal based technologies have the greatest fraction in a total energy production. This necessitates to make an effort to limit the costs and negative effects of underground coal mining. The longwall complex is as essential part of the underground coal mining. The safety and the effectiveness of the work is strongly dependent of the diagnostic state of powered roof supports. The building of a useful and reliable diagnostic system requires a lot of data. As the acquisition of a data of any possible operating conditions it is important to have a possibility to generate a demanded artificial working characteristics. In this paper a new approach of modelling a leg pressure in the single unit of powered roof support. The model is a result of the analysis of a typical working cycles.

Keywords: machine modelling, underground mining, coal mining, structure

Procedia PDF Downloads 364
1895 The Impact of Artificial Intelligence on Construction Engineering

Authors: Mina Fawzy Ishak Gad Elsaid

Abstract:

There is a strong link between technology and development. Architecture as a profession is a call to service and society. Maybe next to soldiers, engineers and patriots. However, unlike soldiers, they always remain employees of society under all circumstances. Despite the construction profession's role in society, there appears to be a lack of respect as some projects fail. This paper focuses on the need to improve development engineering performance in developing countries, using engineering education in Nigerian universities as a tool for discussion. A purposeful survey, interviews and focus group discussions were conducted on one hundred and twenty (120) prominent companies in Nigeria. The subject is approached through a large number of projects that companies have been involved in from the planning stage, some of which have been completed and even reached the maintenance and monitoring stage. It has been found that certain factors beyond the control of engineers are hindering the full development and success of the construction sector in developing countries. The main culprit is corruption and its eradication will put the country on a stable path to develop construction and combat poverty.

Keywords: decision analysis, industrial engineering, direct vs. indirect values, engineering management

Procedia PDF Downloads 32
1894 The Impact of Artificial Intelligence on Construction Engineering

Authors: Haneen Joseph Habib Yeldoka

Abstract:

There is a strong link between technology and development. Architecture as a profession is a call to service and society. Maybe next to soldiers, engineers and patriots. However, unlike soldiers, they always remain employees of society under all circumstances. Despite the construction profession's role in society, there appears to be a lack of respect as some projects fail. This paper focuses on the need to improve development engineering performance in developing countries, using engineering education in Nigerian universities as a tool for discussion. A purposeful survey, interviews and focus group discussions were conducted on one hundred and twenty (120) prominent companies in Nigeria. The subject is approached through a large number of projects that companies have been involved in from the planning stage, some of which have been completed and even reached the maintenance and monitoring stage. It has been found that certain factors beyond the control of engineers are hindering the full development and success of the construction sector in developing countries. The main culprit is corruption and its eradication will put the country on a stable path to develop construction and combat poverty.

Keywords: decision analysis, industrial engineering, direct vs. indirect values, engineering management

Procedia PDF Downloads 30
1893 Modified RSA in Mobile Communication

Authors: Nagaratna Rajur, J. D. Mallapur, Y. B. Kirankumar

Abstract:

The security in mobile communication is very different from the internet or telecommunication, because of its poor user interface and limited processing capacity, as well as combination of complex network protocols. Hence, it poses a challenge for less memory usage and low computation speed based security system. Security involves all the activities that are undertaken to protect the value and on-going usability of assets and the integrity and continuity of operations. An effective network security strategies requires identifying threats and then choosing the most effective set of tools to combat them. Cryptography is a simple and efficient way to provide security in communication. RSA is an asymmetric key approach that is highly reliable and widely used in internet communication. However, it has not been efficiently implemented in mobile communication due its computational complexity and large memory utilization. The proposed algorithm modifies the current RSA to be useful in mobile communication by reducing its computational complexity and memory utilization.

Keywords: M-RSA, sensor networks, sensor applications, security

Procedia PDF Downloads 341
1892 Age-Dependent Anatomical Abnormalities of the Amygdala in Autism Spectrum Disorder and their Implications for Altered Socio-Emotional Development

Authors: Gabriele Barrocas, Habon Issa

Abstract:

The amygdala is one of various brain regions that tend to be pathological in individuals with autism spectrum disorder (ASD). ASD is a prevalent and heterogeneous developmental disorder affecting all ethnic and socioeconomic groups and consists of a broad range of severity, etiology, and behavioral symptoms. Common features of ASD include but are not limited to repetitive behaviors, obsessive interests, and anxiety. Neuroscientists view the amygdala as the core of the neural system that regulates behavioral responses to anxiogenic and threatening stimuli. Despite this consensus, many previous studies and literature reviews on the amygdala’s alterations in individuals with ASD have reported inconsistent findings. In this review, we will address these conflicts by highlighting recent studies which reveal that anatomical and related socio-emotional differences detected between individuals with and without ASD are highly age-dependent. We will specifically discuss studies using functional magnetic resonance imaging (fMRI), structural MRI, and diffusion tensor imaging (DTI) to provide insights into the neuroanatomical substrates of ASD across development, with a focus on amygdala volumes, cell densities, and connectivity.

Keywords: autism, amygdala, development, abnormalities

Procedia PDF Downloads 123
1891 Location Tracking of Human Using Mobile Robot and Wireless Sensor Networks

Authors: Muazzam A. Khan

Abstract:

In order to avoid dangerous environmental disasters, robots are being recognized as good entrants to step in as human rescuers. Robots has been gaining interest of many researchers in rescue matters especially which are furnished with advanced sensors. In distributed wireless robot system main objective for a rescue system is to track the location of the object continuously. This paper provides a novel idea to track and locate human in disaster area using stereo vision system and ZigBee technology. This system recursively predict and updates 3D coordinates in a robot coordinate camera system of a human which makes the system cost effective. This system is comprised of ZigBee network which has many advantages such as low power consumption, self-healing low data rates and low cost.

Keywords: stereo vision, segmentation, classification, human tracking, ZigBee module

Procedia PDF Downloads 490
1890 Quality and Quantity in the Strategic Network of Higher Education Institutions

Authors: Juha Kettunen

Abstract:

The study analyzes the quality and the size of the strategic network of higher education institutions and the concept of fitness for purpose in quality assurance. It also analyses the transaction costs of networking that have consequences on the number of members in the network. Empirical evidence is presented from the Consortium on Applied Research and Professional Education, which is a European strategic network of six higher education institutions. The results of the study support the argument that the number of members in the strategic network should be relatively small to provide high-quality results. The practical importance is that networking has been able to promote international research and development projects. The results of this study are important for those who want to design and improve international networks in higher education.

Keywords: higher education, network, research and development, strategic management

Procedia PDF Downloads 343
1889 Symmetric Arabic Language Encryption Technique Based on Modified Playfair Algorithm

Authors: Fairouz Beggas

Abstract:

Due to the large number of exchanges in the networks, the security of communications is essential. Most ways of keeping communication secure rely on encryption. In this work, a symmetric encryption technique is offered to encrypt and decrypt simple Arabic scripts based on a multi-level security. A proposed technique uses an idea of Playfair encryption with a larger table size and an additional layer of encryption to ensure more security. The idea of the proposed algorithm aims to generate a dynamic table that depends on a secret key. The same secret key is also used to create other secret keys to over-encrypt the plaintext in three steps. The obtained results show that the proposed algorithm is faster in terms of encryption/decryption speed and can resist to many types of attacks.

Keywords: arabic data, encryption, playfair, symmetric algorithm

Procedia PDF Downloads 83
1888 Pump-as-Turbine: Testing and Characterization as an Energy Recovery Device, for Use within the Water Distribution Network

Authors: T. Lydon, A. McNabola, P. Coughlan

Abstract:

Energy consumption in the water distribution network (WDN) is a well established problem equating to the industry contributing heavily to carbon emissions, with 0.9 kg CO2 emitted per m3 of water supplied. It is indicated that 85% of energy wasted in the WDN can be recovered by installing turbines. Existing potential in networks is present at small capacity sites (5-10 kW), numerous and dispersed across networks. However, traditional turbine technology cannot be scaled down to this size in an economically viable fashion, thus alternative approaches are needed. This research aims to enable energy recovery potential within the WDN by exploring the potential of pumps-as-turbines (PATs), to realise this potential. PATs are estimated to be ten times cheaper than traditional micro-hydro turbines, presenting potential to contribute to an economically viable solution. However, a number of technical constraints currently prohibit their widespread use, including the inability of a PAT to control pressure, difficulty in the selection of PATs due to lack of performance data and a lack of understanding on how PATs can cater for fluctuations as extreme as +/- 50% of the average daily flow, characteristic of the WDN. A PAT prototype is undergoing testing in order to identify the capabilities of the technology. Results of preliminary testing, which involved testing the efficiency and power potential of the PAT for varying flow and pressure conditions, in order to develop characteristic and efficiency curves for the PAT and a baseline understanding of the technologies capabilities, are presented here: •The limitations of existing selection methods which convert BEP from pump operation to BEP in turbine operation was highlighted by the failure of such methods to reflect the conditions of maximum efficiency of the PAT. A generalised selection method for the WDN may need to be informed by an understanding of impact of flow variations and pressure control on system power potential capital cost, maintenance costs, payback period. •A clear relationship between flow and efficiency rate of the PAT has been established. The rate of efficiency reductions for flows +/- 50% BEP is significant and more extreme for deviations in flow above the BEP than below, but not dissimilar to the reaction of efficiency of other turbines. •PAT alone is not sufficient to regulate pressure, yet the relationship of pressure across the PAT is foundational in exploring ways which PAT energy recovery systems can maintain required pressure level within the WDN. Efficiencies of systems of PAT energy recovery systems operating conditions of pressure regulation, which have been conceptualise in current literature, need to be established. Initial results guide the focus of forthcoming testing and exploration of PAT technology towards how PATs can form part of an efficiency energy recovery system.

Keywords: energy recovery, pump-as-turbine, water distribution network, water distribution network

Procedia PDF Downloads 255