Search results for: machine monitoring
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5679

Search results for: machine monitoring

2499 Generating Insights from Data Using a Hybrid Approach

Authors: Allmin Susaiyah, Aki Härmä, Milan Petković

Abstract:

Automatic generation of insights from data using insight mining systems (IMS) is useful in many applications, such as personal health tracking, patient monitoring, and business process management. Existing IMS face challenges in controlling insight extraction, scaling to large databases, and generalising to unseen domains. In this work, we propose a hybrid approach consisting of rule-based and neural components for generating insights from data while overcoming the aforementioned challenges. Firstly, a rule-based data 2CNL component is used to extract statistically significant insights from data and represent them in a controlled natural language (CNL). Secondly, a BERTSum-based CNL2NL component is used to convert these CNLs into natural language texts. We improve the model using task-specific and domain-specific fine-tuning. Our approach has been evaluated using statistical techniques and standard evaluation metrics. We overcame the aforementioned challenges and observed significant improvement with domain-specific fine-tuning.

Keywords: data mining, insight mining, natural language generation, pre-trained language models

Procedia PDF Downloads 107
2498 Regulation of the Commercial Credits in the Foreign Exchange Operations

Authors: Marija Vicic

Abstract:

The purpose of commercial credit regulation in an unified way under Law on Foreign Exchange Operations in Republic of Serbia allows an easier state monitoring of credit operations performed by non-professionals on foreign exchange market. By broadly defining the term “commercial credits“, the state (i.e. National Bank of Serbia) is given the authority to monitor the performance of all obligations under commercial contracts in which the obligations are not performed simultaneously. In the first part of the paper, the author analyses the economic gist of commercial credits with the purpose of giving an insight into their special treatment. The author examines the term „commercial credits“ given in Law on foreign exchange operations and the difference between financial credits and irregular commercial credits (exports and imports of goods and services deemed to be commercial credits) is particularly highlighted. In the second part, the author emphasizes the specifics of commercial credit contracts, especially the effects of special requests for the parties to these contracts to notify National Bank of Serbia and specific regulations regarding maturity of obligations under these commercial credits and the assignment and compensation of the said contracts.

Keywords: commercial credit, foreign exchange operations, commercial transactions, deferred payment, advance payment, (non) resident

Procedia PDF Downloads 417
2497 Recognition of Voice Commands of Mentor Robot in Noisy Environment Using Hidden Markov Model

Authors: Khenfer Koummich Fatma, Hendel Fatiha, Mesbahi Larbi

Abstract:

This paper presents an approach based on Hidden Markov Models (HMM: Hidden Markov Model) using HTK tools. The goal is to create a human-machine interface with a voice recognition system that allows the operator to teleoperate a mentor robot to execute specific tasks as rotate, raise, close, etc. This system should take into account different levels of environmental noise. This approach has been applied to isolated words representing the robot commands pronounced in two languages: French and Arabic. The obtained recognition rate is the same in both speeches, Arabic and French in the neutral words. However, there is a slight difference in favor of the Arabic speech when Gaussian white noise is added with a Signal to Noise Ratio (SNR) equals 30 dB, in this case; the Arabic speech recognition rate is 69%, and the French speech recognition rate is 80%. This can be explained by the ability of phonetic context of each speech when the noise is added.

Keywords: Arabic speech recognition, Hidden Markov Model (HMM), HTK, noise, TIMIT, voice command

Procedia PDF Downloads 371
2496 Evaluation of Excision Wound Healing Activity of Ethanolic Extract of Michelia Champaca ın Diabetic Wistar Rats

Authors: Smita Shenoy, Amoolya Gowda, Tara Shanbhag, Krishnananda Prabhu, Venumadhav Nelluri

Abstract:

The study was undertaken to assess the effect of ethanolic extract of Michelia champaca on excision wound healing in diabetic wistar rats. Excision wound was made in five groups of rats after inducing diabetes with streptozotocin in four groups. Paraffin was applied to wounds in nondiabetic and diabetic control and 2.5%, 5%, 10% ointment of extract to wounds in three diabetic test groups. Monitoring of wound contraction rate, the period of epithelization and histopathological examination of granulation tissue was done. There was a significant (p < 0.05) decrease in the period of epithelization and a significant increase in the wound contraction rate on day 12 and 16 in rats treated with 5% and 10% ointment as compared to diabetic rats. There was a better organization of collagen fibers in the granulation tissue of wounds treated with 10% ointment. The higher dose of ethanolic extract of Michelia champaca promoted wound healing in diabetic Wistar rats.

Keywords: Michelia champaca, excision wound, contraction, epithelization

Procedia PDF Downloads 354
2495 'Low Electronic Noise' Detector Technology in Computed Tomography

Authors: A. Ikhlef

Abstract:

Image noise in computed tomography, is mainly caused by the statistical noise, system noise reconstruction algorithm filters. Since last few years, low dose x-ray imaging became more and more desired and looked as a technical differentiating technology among CT manufacturers. In order to achieve this goal, several technologies and techniques are being investigated, including both hardware (integrated electronics and photon counting) and software (artificial intelligence and machine learning) based solutions. From a hardware point of view, electronic noise could indeed be a potential driver for low and ultra-low dose imaging. We demonstrated that the reduction or elimination of this term could lead to a reduction of dose without affecting image quality. Also, in this study, we will show that we can achieve this goal using conventional electronics (low cost and affordable technology), designed carefully and optimized for maximum detective quantum efficiency. We have conducted the tests using large imaging objects such as 30 cm water and 43 cm polyethylene phantoms. We compared the image quality with conventional imaging protocols with radiation as low as 10 mAs (<< 1 mGy). Clinical validation of such results has been performed as well.

Keywords: computed tomography, electronic noise, scintillation detector, x-ray detector

Procedia PDF Downloads 115
2494 Communication Layer Security in Smart Farming: A Survey on Wireless Technologies

Authors: Hossein Mohammadi Rouzbahani, Hadis Karimipour, Evan Fraser, Ali Dehghantanha, Emily Duncan, Arthur Green, Conchobhair Russell

Abstract:

Human population growth has driven rising demand for food that has, in turn, imposed huge impacts on the environment. In an effort to reconcile our need to produce more sustenance while also protecting the world’s ecosystems, farming is becoming more reliant on smart tools and communication technologies. Developing a smart farming framework allows farmers to make more efficient use of inputs, thus protecting water quality and biodiversity habitat. Internet of Things (IoT), which has revolutionized every sphere of the economy, is being applied to agriculture by connecting on-farm devices and providing real-time monitoring of everything from environmental conditions to market signals through to animal health data. However, utilizing IoT means farming networks are now vulnerable to malicious activities, mostly when wireless communications are highly employed. With that in mind, this research aims to review different utilized communication technologies in smart farming. Moreover, possible cyber-attacks are investigated to discover the vulnerabilities of communication technologies considering the most frequent cyber-attacks that have been happened.

Keywords: smart farming, Internet of Things, communication layer, cyber-attack

Procedia PDF Downloads 237
2493 Monitoring the Phenomenon of Black Sand in Hurghada’s Artificial Lakes from Sources of Groundwater and Removal Techniques

Authors: Ahmed M. Noureldin, Khaled M. Naguib

Abstract:

This experimental investigation tries to identify the root cause of the black sand issue in one of the man-made lakes in a well-known Hurghada resort. The lake is nourished by the underground wells' source, which continuously empties into the Red Sea. Chemical testing was done by looking at spots of stinky black sand beneath the sandy lake surface. The findings on samples taken from several locations (wells, lake bottom sand samples, and clean sand with exact specifications as bottom sand) indicated the existence of organic sulfur bacteria that are responsible for the phenomena of black sand. Approximately 39.139 mg/kg of sulfide in the form of hydrogen sulfide was present in the lake bottom sand, while 1.145 mg/kg, before usage, was in the bare sand. The study also involved modeling with the GPS-X program for cleaning bottom sand that uses hydro cyclones as a physical-mechanical treatment method. The modeling findings indicated a Total Organic Carbon (TOC) removal effectiveness of 0.65%. The research recommended using hydro cyclones to routinely mechanically clear the sand from lake bottoms.

Keywords: man-made lakes, organic sulfur bacteria, total organic carbon, hydro cyclone

Procedia PDF Downloads 66
2492 Characterization and Detection of Cadmium Ion Using Modification Calixarene with Multiwalled Carbon Nanotubes

Authors: Amira Shakila Razali, Faridah Lisa Supian, Muhammad Mat Salleh, Suriani Abu Bakar

Abstract:

Water contamination by toxic compound is one of the serious environmental problems today. These toxic compounds mostly originated from industrial effluents, agriculture, natural sources and human waste. These study are focused on modification of multiwalled carbon nanotube (MWCNTs) with nanoparticle of calixarene and explore the possibility of using this nanocomposites for the remediation of cadmium in water. The nanocomposites were prepared by dissolving calixarene in chloroform solution as solvent, followed by additional multiwalled carbon nanotube (MWCNTs) then sonication process for 3 hour and fabricated the nanocomposites on substrate by spin coating method. Finally, the nanocomposites were tested on cadmium ion (10 mg/ml). The morphology of nanocomposites was investigated by FESEM showing the formation of calixarene on the outer walls of carbon nanotube and cadmium ion also clearly seen from the micrograph. This formation was supported by using energy dispersive x-ray (EDX). The presence of cadmium ions in the films, leads to some changes in the surface potential and Fourier Transform Infrared spectroscopy (FTIR).This nanocomposites have potential for development of sensor for pollutant monitoring and nanoelectronics devices applications

Keywords: calixarene, multiwalled carbon nanotubes, cadmium, surface potential

Procedia PDF Downloads 477
2491 Unearthing Air Traffic Control Officers Decision Instructional Patterns From Simulator Data for Application in Human Machine Teams

Authors: Zainuddin Zakaria, Sun Woh Lye

Abstract:

Despite the continuous advancements in automated conflict resolution tools, there is still a low rate of adoption of automation from Air Traffic Control Officers (ATCOs). Trust or acceptance in these tools and conformance to the individual ATCO preferences in strategy execution for conflict resolution are two key factors that impact their use. This paper proposes a methodology to unearth and classify ATCO conflict resolution strategies from simulator data of trained and qualified ATCOs. The methodology involves the extraction of ATCO executive control actions and the establishment of a system of strategy resolution classification based on ATCO radar commands and prevailing flight parameters in deconflicting a pair of aircraft. Six main strategies used to handle various categories of conflict were identified and discussed. It was found that ATCOs were about twice more likely to choose only vertical maneuvers in conflict resolution compared to horizontal maneuvers or a combination of both vertical and horizontal maneuvers.

Keywords: air traffic control strategies, conflict resolution, simulator data, strategy classification system

Procedia PDF Downloads 143
2490 Perspectives of Computational Modeling in Sanskrit Lexicons

Authors: Baldev Ram Khandoliyan, Ram Kishor

Abstract:

India has a classical tradition of Sanskrit Lexicons. Research work has been done on the study of Indian lexicography. India has seen amazing strides in Information and Communication Technology (ICT) applications for Indian languages in general and for Sanskrit in particular. Since Machine Translation from Sanskrit to other Indian languages is often the desired goal, traditional Sanskrit lexicography has attracted a lot of attention from the ICT and Computational Linguistics community. From Nighaŋţu and Nirukta to Amarakośa and Medinīkośa, Sanskrit owns a rich history of lexicography. As these kośas do not follow the same typology or standard in the selection and arrangement of the words and the information related to them, several types of Kośa-styles have emerged in this tradition. The model of a grammar given by Aṣṭādhyāyī is well appreciated by Indian and western linguists and grammarians. But the different models provided by lexicographic tradition also have importance. The general usefulness of Sanskrit traditional Kośas is well discussed by some scholars. That is most of the matter made available in the text. Some also have discussed the good arrangement of lexica. This paper aims to discuss some more use of the different models of Sanskrit lexicography especially focusing on its computational modeling and its use in different computational operations.

Keywords: computational lexicography, Sanskrit Lexicons, nighanṭu, kośa, Amarkosa

Procedia PDF Downloads 159
2489 Preliminary Design of Maritime Energy Management System: Naval Architectural Approach to Resolve Recent Limitations

Authors: Seyong Jeong, Jinmo Park, Jinhyoun Park, Boram Kim, Kyoungsoo Ahn

Abstract:

Energy management in the maritime industry is being required by economics and in conformity with new legislative actions taken by the International Maritime Organization (IMO) and the European Union (EU). In response, the various performance monitoring methodologies and data collection practices have been examined by different stakeholders. While many assorted advancements in operation and technology are applicable, their adoption in the shipping industry stays small. This slow uptake can be considered due to many different barriers such as data analysis problems, misreported data, and feedback problems, etc. This study presents a conceptual design of an energy management system (EMS) and proposes the methodology to resolve the limitations (e.g., data normalization using naval architectural evaluation, management of misrepresented data, and feedback from shore to ship through management of performance analysis history). We expect this system to make even short-term charterers assess the ship performance properly and implement sustainable fleet control.

Keywords: data normalization, energy management system, naval architectural evaluation, ship performance analysis

Procedia PDF Downloads 444
2488 Importance of New Policies of Process Management for Internet of Things Based on Forensic Investigation

Authors: Venkata Venugopal Rao Gudlur

Abstract:

The Proposed Policies referred to as “SOP”, on the Internet of Things (IoT) based Forensic Investigation into Process Management is the latest revolution to save time and quick solution for investigators. The forensic investigation process has been developed over many years from time to time it has been given the required information with no policies in investigation processes. This research reveals that the current IoT based forensic investigation into Process Management based is more connected to devices which is the latest revolution and policies. All future development in real-time information on gathering monitoring is evolved with smart sensor-based technologies connected directly to IoT. This paper present conceptual framework on process management. The smart devices are leading the way in terms of automated forensic models and frameworks established by different scholars. These models and frameworks were mostly focused on offering a roadmap for performing forensic operations with no policies in place. These initiatives would bring a tremendous benefit to process management and IoT forensic investigators proposing policies. The forensic investigation process may enhance more security and reduced data losses and vulnerabilities.

Keywords: Internet of Things, Process Management, Forensic Investigation, M2M Framework

Procedia PDF Downloads 96
2487 Wear Performance of Stellite 21 Cladded Overlay on Aisi 304L

Authors: Sandeep Singh Sandhua, Karanvir Singh Ghuman, Arun Kumar

Abstract:

Stellite 21 is cobalt based super alloy used in improving the wear performance of stainless steel engineering components subjected to harsh environmental conditions. This piece of research focuses on the wear analysis of satellite 21 cladded on AISI 304 L substrate using SMAW process. Bead on plate experiments were carried out by varying current and electrode manipulation techniques to optimize the dilution and microhardness. 80 Amp current and weaving technique was found to be optimum set of parameters for overlaying which were further used for multipass multilayer cladding of AISI 304 L substrate. The wear performance was examined on pin on dics wear testing machine under room temperature conditions. The results from this study show that Stellite 21 overlays show a significant improvement in the frictional wear resistance after TIG remelting. It is also established that low dilution procedures are important in controlling the metallurgical composition of these overlays which has a consequent effect in enhancing hardness and wear resistance of these overlays.

Keywords: surfacing, stellite 21, dilution, SMAW, frictional wear, micro-hardness

Procedia PDF Downloads 245
2486 Study on Status of Child Labour in Metal Fabrication Industries of Kathmandu Valley

Authors: Bikas Chandra Bhattarai

Abstract:

Child labour is the serious issue all over the world. In Nepal, many children are working in different structured and unstructured sector. Metal fabrication is one of the sectors where many children are involved. The present study is carried out to focus on the overall socio-economic condition, psychological aspect, working environment condition and welfare of the child labour. Metal fabrication factories from Kirtipur, Chovar Area, Gongabu, Sitapaila and Sankhamul area of Kathmandu municipality were selected for the study. The structured questionnaire was prepared, and overall 55 children under age 16 were interviewed. Working in metal fabrication factory is risky job for children. The main reason behind child labour is poverty. The working environment in the metal fabrication factory was not found satisfactory. Children are exposed to various types of physical and chemical hazards. Factories are not paying proper attention to safety condition at the workplace. Large number of children is attracted towards smoking and drinking alcohol leading to unnecessary expense of their income. There should be the provision of regular health check up and insurance to the working children. Monitoring from the government level should be implemented for the betterment of working children.

Keywords: child labour, Kathmandu, Nepal, metal fabrication

Procedia PDF Downloads 323
2485 A Resource Optimization Strategy for CPU (Central Processing Unit) Intensive Applications

Authors: Junjie Peng, Jinbao Chen, Shuai Kong, Danxu Liu

Abstract:

On the basis of traditional resource allocation strategies, the usage of resources on physical servers in cloud data center is great uncertain. It will cause waste of resources if the assignment of tasks is not enough. On the contrary, it will cause overload if the assignment of tasks is too much. This is especially obvious when the applications are the same type because of its resource preferences. Considering CPU intensive application is one of the most common types of application in the cloud, we studied the optimization strategy for CPU intensive applications on the same server. We used resource preferences to analyze the case that multiple CPU intensive applications run simultaneously, and put forward a model which can predict the execution time for CPU intensive applications which run simultaneously. Based on the prediction model, we proposed the method to select the appropriate number of applications for a machine. Experiments show that the model can predict the execution time accurately for CPU intensive applications. To improve the execution efficiency of applications, we propose a scheduling model based on priority for CPU intensive applications. Extensive experiments verify the validity of the scheduling model.

Keywords: cloud computing, CPU intensive applications, resource optimization, strategy

Procedia PDF Downloads 274
2484 Assessment of Naturally Occurring Radionuclides of the Surface Water in Vaal River, South Africa

Authors: Kgantsi B. T., Ochwelwang A. R., Mathuthu M., Jegede O. A.

Abstract:

Anthropogenic activities near water bodies contribute to poor water quality, which degrades the condition of the biota and elevates the risk to human health. The Vaal River is essential in supplying Gauteng and neighboring regions of South Africa with portable water for a variety of consumers and industries. Consequently, it is necessary to monitor and assess the radioactive risk in relation to the river's water quality. This study used an inductive coupled plasma mass spectrometer (ICPMS) to analyze the radionuclide activity concentration in the Vaal River, South Africa. Along with thorium and potassium, the total uranium concentration was calculated using the isotopic content of uranium. The elemental concentration of ²³⁸U, ²³⁵U, ²³⁴U, ²³²Th, and 40K were translated into activity concentrations. To assess the water safety for all users and consumers, all values were compared to world average activity concentrations 35, 30, and 400 Bqkg⁻¹ for ²³⁸U, ²³⁴Th, and ⁴⁰K, respectively, according to the UNSCEAR report. The results will serve as a database for further monitoring and evaluation of the radionuclide from the river, taking cognisance of potential health hazards.

Keywords: Val Rivers, ICPMS, uranium, risks

Procedia PDF Downloads 159
2483 Kiddo: Design and Prototype of a Useable Mobile Application for Kids to Learn under Parental Control

Authors: Albandary Alamer, Noura Alaskar, Sana Bukhamseen, Jawaher Alkhamis, Enas Alghamdi, Almaha Almulhim, Hina Gull, Rachid Zagrouba, Madeeha Saqib

Abstract:

A good and healthy seed will always produce a nice fruit, whereas an infected seed will produce an infected fruit. The same concept applies to the children, and the healthier the environment in which the kids grow, the more likely they become valuable members of society. Kiddo project introduces us to a mobile application that focuses on enhancing the sense of responsibility from a young age and makes raising kids fun and easy. The application aims to enhance the communication between parents and their children and to enrich the good habits of the kid. Kiddo Application enables kids to share their accomplishments with their peers in an interactive environment full of enjoyment, followed by parental monitoring to handle what their kids are posting and friends following. Kiddo provides the kids' and parents’ society with a safe platform free of cyberbullying and inappropriate content with parents' fun engagement.

Keywords: kids social media, educational app, child-raising, parental control, cyberbullying, parent-child relationship, good habits

Procedia PDF Downloads 150
2482 User-Based Cannibalization Mitigation in an Online Marketplace

Authors: Vivian Guo, Yan Qu

Abstract:

Online marketplaces are not only digital places where consumers buy and sell merchandise, and they are also destinations for brands to connect with real consumers at the moment when customers are in the shopping mindset. For many marketplaces, brands have been important partners through advertising. There can be, however, a risk of advertising impacting a consumer’s shopping journey if it hurts the use experience or takes the user away from the site. Both could lead to the loss of transaction revenue for the marketplace. In this paper, we present user-based methods for cannibalization control by selectively turning off ads to users who are likely to be cannibalized by ads subject to business objectives. We present ways of measuring cannibalization of advertising in the context of an online marketplace and propose novel ways of measuring cannibalization through purchase propensity and uplift modeling. A/B testing has shown that our methods can significantly improve user purchase and engagement metrics while operating within business objectives. To our knowledge, this is the first paper that addresses cannibalization mitigation at the user-level in the context of advertising.

Keywords: cannibalization, machine learning, online marketplace, revenue optimization, yield optimization

Procedia PDF Downloads 156
2481 The Impact of Recurring Events in Fake News Detection

Authors: Ali Raza, Shafiq Ur Rehman Khan, Raja Sher Afgun Usmani, Asif Raza, Basit Umair

Abstract:

Detection of Fake news and missing information is gaining popularity, especially after the advancement in social media and online news platforms. Social media platforms are the main and speediest source of fake news propagation, whereas online news websites contribute to fake news dissipation. In this study, we propose a framework to detect fake news using the temporal features of text and consider user feedback to identify whether the news is fake or not. In recent studies, the temporal features in text documents gain valuable consideration from Natural Language Processing and user feedback and only try to classify the textual data as fake or true. This research article indicates the impact of recurring and non-recurring events on fake and true news. We use two models BERT and Bi-LSTM to investigate, and it is concluded from BERT we get better results and 70% of true news are recurring and rest of 30% are non-recurring.

Keywords: natural language processing, fake news detection, machine learning, Bi-LSTM

Procedia PDF Downloads 10
2480 Mediation in Criminal Matters: A Perspective from Kosovo

Authors: Flutura Tahiraj, Emine Abdyli

Abstract:

As a new alternative, mediation is integrated in the legislation of both developed and developing countries in Europe. Various researches in member states of the Council of Europe revealed obstacles, particularly related to the implementation of mediation in criminal matters. They are addressed through several recommendations and non-binding guidelines. However, there is limited empirical research on how the mediation in criminal matters is being implemented in the contexts of developing countries in South-Eastern Europe. Hence, the purpose of this qualitative study is to assess mediation in criminal matters in Kosovo by exploring how the main stakeholders describe the legal basis and implementation process and what it indicates for future practices. The data were gathered through 11 semi-structured interviews with judges, prosecutors, mediation clerks and mediators. Results show that laws and other guidelines that have been introduced since 2008 constitute a solid legal ground that facilitates mediation in criminal matters. The stakeholders are well aware of benefits mediation brings and express their willingness to advance its application to criminal matters. Results also indicate uncertainty among judges and prosecutors regarding the assessment and referral of certain criminal offences to mediation. To address it, specialized trainings, exchange programs and continuous monitoring and evaluation of the process could be supportive.

Keywords: mediation in criminal matters, legislation, implementation of mediation

Procedia PDF Downloads 19
2479 Critical Review of Oceanic and Geological Storage of Carbon Sequestration

Authors: Milad Nooshadi, Alessandro Manzardo

Abstract:

CO₂ emissions in the atmosphere continue to rise, mostly as a result of the combustion of fossil fuels. CO₂ injection into the oceans and geological formation as a process of physical carbon capture are two of the most promising emerging strategies for mitigating climate change and global warming. The purpose of this research is to evaluate the two mentioned methods of CO₂ sequestration and to assess information on previous and current advancements, limitations, and uncertainties associated with carbon sequestration in order to identify possible prospects for ensuring the timely implementation of the technology, such as determining how governments and companies can gain a better understanding of CO₂ storage in terms of which media have the most applicable capacity, which type of injection has the fewer environmental impact, and how much carbon sequestration and storage will cost. The behavior of several forms is characterized as a near field, a far field, and a see-floor in ocean storage, and three medias in geological formations as an oil and gas reservoir, a saline aquifer, and a coal bed. To determine the capacity of various forms of media, an analysis of some models and practical experiments are necessary. Additionally, as a major component of sequestration, the various injection methods into diverse media and their monitoring are associated with a variety of environmental impacts and financial consequences.

Keywords: carbon sequestration, ocean storage, geologic storage, carbon transportation

Procedia PDF Downloads 96
2478 Effects of Tool State on the Output Parameters of Front Milling Using Discrete Wavelet Transform

Authors: Bruno S. Soria, Mauricio R. Policena, Andre J. Souza

Abstract:

The state of the cutting tool is an important factor to consider during machining to achieve a good surface quality. The vibration generated during material cutting can also directly affect the surface quality and life of the cutting tool. In this work, the effect of mechanical broken failure (MBF) on carbide insert tools during face milling of AISI 304 stainless steel was evaluated using three levels of feed rate and two spindle speeds for each tool condition: three carbide inserts have perfect geometry, and three other carbide inserts have MBF. The axial and radial depths remained constant. The cutting forces were determined through a sensory system that consists of a piezoelectric dynamometer and data acquisition system. Discrete Wavelet Transform was used to separate the static part of the signals of force and vibration. The roughness of the machined surface was analyzed for each machining condition. The MBF of the tool increased the intensity and force of vibration and worsened the roughness factors.

Keywords: face milling, stainless steel, tool condition monitoring, wavelet discrete transform

Procedia PDF Downloads 140
2477 Assessment of Air Pollution Impacts On Population Health in Béjaia City

Authors: Benaissa Fatima, Alkama Rezak, Annesi-Maesano Isabella

Abstract:

To assess the health impact of the air pollution on the population of Béjaia, we carried out a descriptive epidemiologic inquiry near the medical establishments of three areas. From the registers of hospital admissions, we collected data on the hospital mortality and admissions relating to the various cardiorespiratory pathologies generated by this type of pollution. In parallel, data on the automobile fleet of Bejaia and other measurements were exploited to show that the concentrations of the pollutants are strongly correlated with the concentration the urban traffic. This study revealed that the whole of the population is touched, but the sensitivity to pollution can show variations according to the age, the sex and the place of residence. So the under population of the town of Bejaia marked the most raised death and morbidity rates, followed that of Kherrata. Weak rates are recorded for under rural population of Feraoun. This approach enables us to conclude that the population of Béjaia could not escape the urban pollution generated by her old automobile fleet. To install a monitoring and measuring site of the air pollution in this city could provide a beneficial tool to protect its inhabitants by them informing on quality from the air that they breathe and measurements to follow to minimize the impacts on their health and by alerting the authorities during the critical situations.

Keywords: air, urban pollution, health, impacts

Procedia PDF Downloads 354
2476 Corrosion Fatigue of Al-Mg Alloy 5052 in Sodium Chloride Solution Contains Some Inhibitors

Authors: Khalid Ahmed Eldwaib

Abstract:

In this study, Al-Mg alloy 5052 was used as the testing material. Corrosion fatigue life was studied for the alloy in 3.5% NaCl (pH=1, 3, 5, 7, 9, and 11), and 3.5% NaCl (pH=1) with inhibitors. The compound inhibitors were composed mainly of phosphate (PO4³-), adding a certain proportion of other nontoxic inhibitors so as to select alternatives to environmentally hazardous chromate (Cr2O7²-). The inhibitors were sodium dichromate Na2Cr2O7, sodium phosphate Na3PO4, sodium molybdate Na2MoO4, and sodium citrate Na3C6H5O7. The total amount of inhibiting pigments was at different concentrations (250,500,750, and 1000 ppm) in the solutions. Corrosion fatigue behavior was studied by using plane-bending corrosion fatigue machine with stress ratio R=0.5 and under the constant frequency of 13.3 Hz. Results show that in 3.5% NaCl the highest fatigue life (number of cycles to failure Nf) is obtained at pH=5 where the oxide film on aluminum has very low solubility, and the lowest number of cycles is obtained at pH=1, where the media is too aggressive (extremely acidic). When the concentration of inhibitor increases the cycles to failure increase. The surface morphology and fracture section of the specimens had been characterized through scanning electron microscope (SEM).

Keywords: Al-Mg alloy 5052, corrosion, fatigue, inhibitors

Procedia PDF Downloads 451
2475 The Effectiveness of National Fiscal Rules in the Asia-Pacific Countries

Authors: Chiung-Ju Huang, Yuan-Hong Ho

Abstract:

This study utilizes the International Monetary Fund (IMF) Fiscal Rules Dataset focusing on four specific fiscal rules such as expenditure rule, revenue rule, budget balance rule, and debt rule and five main characteristics of each fiscal rule those are monitoring, enforcement, coverage, legal basis, and escape clause to construct the Fiscal Rule Index for nine countries in the Asia-Pacific region from 1996 to 2015. After constructing the fiscal rule index for each country, we utilize the Panel Generalized Method of Moments (Panel GMM) by using the constructed fiscal rule index to examine the effectiveness of fiscal rules in reducing procyclicality. Empirical results show that national fiscal rules have a significantly negative impact on procyclicality of government expenditure. Additionally, stricter fiscal rules combined with high government effectiveness are effective in reducing procyclicality of government expenditure. Results of this study indicate that for nine Asia-Pacific countries, policymakers’ use of fiscal rules and government effectiveness to reducing procyclicality of fiscal policy are effective.

Keywords: counter-cyclical policy, fiscal rules, government efficiency, procyclical policy

Procedia PDF Downloads 267
2474 Internet of Things, Edge and Cloud Computing in Rock Mechanical Investigation for Underground Surveys

Authors: Esmael Makarian, Ayub Elyasi, Fatemeh Saberi, Olusegun Stanley Tomomewo

Abstract:

Rock mechanical investigation is one of the most crucial activities in underground operations, especially in surveys related to hydrocarbon exploration and production, geothermal reservoirs, energy storage, mining, and geotechnics. There is a wide range of traditional methods for driving, collecting, and analyzing rock mechanics data. However, these approaches may not be suitable or work perfectly in some situations, such as fractured zones. Cutting-edge technologies have been provided to solve and optimize the mentioned issues. Internet of Things (IoT), Edge, and Cloud Computing technologies (ECt & CCt, respectively) are among the most widely used and new artificial intelligence methods employed for geomechanical studies. IoT devices act as sensors and cameras for real-time monitoring and mechanical-geological data collection of rocks, such as temperature, movement, pressure, or stress levels. Structural integrity, especially for cap rocks within hydrocarbon systems, and rock mass behavior assessment, to further activities such as enhanced oil recovery (EOR) and underground gas storage (UGS), or to improve safety risk management (SRM) and potential hazards identification (P.H.I), are other benefits from IoT technologies. EC techniques can process, aggregate, and analyze data immediately collected by IoT on a real-time scale, providing detailed insights into the behavior of rocks in various situations (e.g., stress, temperature, and pressure), establishing patterns quickly, and detecting trends. Therefore, this state-of-the-art and useful technology can adopt autonomous systems in rock mechanical surveys, such as drilling and production (in hydrocarbon wells) or excavation (in mining and geotechnics industries). Besides, ECt allows all rock-related operations to be controlled remotely and enables operators to apply changes or make adjustments. It must be mentioned that this feature is very important in environmental goals. More often than not, rock mechanical studies consist of different data, such as laboratory tests, field operations, and indirect information like seismic or well-logging data. CCt provides a useful platform for storing and managing a great deal of volume and different information, which can be very useful in fractured zones. Additionally, CCt supplies powerful tools for predicting, modeling, and simulating rock mechanical information, especially in fractured zones within vast areas. Also, it is a suitable source for sharing extensive information on rock mechanics, such as the direction and size of fractures in a large oil field or mine. The comprehensive review findings demonstrate that digital transformation through integrated IoT, Edge, and Cloud solutions is revolutionizing traditional rock mechanical investigation. These advanced technologies have empowered real-time monitoring, predictive analysis, and data-driven decision-making, culminating in noteworthy enhancements in safety, efficiency, and sustainability. Therefore, by employing IoT, CCt, and ECt, underground operations have experienced a significant boost, allowing for timely and informed actions using real-time data insights. The successful implementation of IoT, CCt, and ECt has led to optimized and safer operations, optimized processes, and environmentally conscious approaches in underground geological endeavors.

Keywords: rock mechanical studies, internet of things, edge computing, cloud computing, underground surveys, geological operations

Procedia PDF Downloads 51
2473 Cross Coupling Sliding Mode Synchronization Control of Dual-Driving Feed System

Authors: Hong Lu, Wei Fan, Yongquan Zhang, Junbo Zhang

Abstract:

A cross coupling sliding synchronization control strategy is proposed for the dual-driving feed system. This technology will minimize the position error oscillation and achieve the precise synchronization performance in the high speed and high precision drive system, especially some high speed and high precision machine. Moreover, a cross coupling compensation matrix is provided to offset the mismatched disturbance and the disturbance observer is established to eliminate the chattering phenomenon. Performance comparisons of proposed dual-driving cross coupling sliding mode control (CCSMC), normal cross coupling control (CCC) strategy with PID control, and electronic virtual main shaft control (EVMSC) strategy with SMC control are investigated by simulation and a dual-driving control system; the results show the effectiveness of the proposed control scheme.

Keywords: cross coupling matrix, dual motors, synchronization control, sliding mode control

Procedia PDF Downloads 359
2472 On the Bias and Predictability of Asylum Cases

Authors: Panagiota Katsikouli, William Hamilton Byrne, Thomas Gammeltoft-Hansen, Tijs Slaats

Abstract:

An individual who demonstrates a well-founded fear of persecution or faces real risk of being subjected to torture is eligible for asylum. In Danish law, the exact legal thresholds reflect those established by international conventions, notably the 1951 Refugee Convention and the 1950 European Convention for Human Rights. These international treaties, however, remain largely silent when it comes to how states should assess asylum claims. As a result, national authorities are typically left to determine an individual’s legal eligibility on a narrow basis consisting of an oral testimony, which may itself be hampered by several factors, including imprecise language interpretation, insecurity or lacking trust towards the authorities among applicants. The leaky ground, on which authorities must assess their subjective perceptions of asylum applicants' credibility, questions whether, in all cases, adjudicators make the correct decision. Moreover, the subjective element in these assessments raises questions on whether individual asylum cases could be afflicted by implicit biases or stereotyping amongst adjudicators. In fact, recent studies have uncovered significant correlations between decision outcomes and the experience and gender of the assigned judge, as well as correlations between asylum outcomes and entirely external events such as weather and political elections. In this study, we analyze a publicly available dataset containing approximately 8,000 summaries of asylum cases, initially rejected, and re-tried by the Refugee Appeals Board (RAB) in Denmark. First, we look for variations in the recognition rates, with regards to a number of applicants’ features: their country of origin/nationality, their identified gender, their identified religion, their ethnicity, whether torture was mentioned in their case and if so, whether it was supported or not, and the year the applicant entered Denmark. In order to extract those features from the text summaries, as well as the final decision of the RAB, we applied natural language processing and regular expressions, adjusting for the Danish language. We observed interesting variations in recognition rates related to the applicants’ country of origin, ethnicity, year of entry and the support or not of torture claims, whenever those were made in the case. The appearance (or not) of significant variations in the recognition rates, does not necessarily imply (or not) bias in the decision-making progress. None of the considered features, with the exception maybe of the torture claims, should be decisive factors for an asylum seeker’s fate. We therefore investigate whether the decision can be predicted on the basis of these features, and consequently, whether biases are likely to exist in the decisionmaking progress. We employed a number of machine learning classifiers, and found that when using the applicant’s country of origin, religion, ethnicity and year of entry with a random forest classifier, or a decision tree, the prediction accuracy is as high as 82% and 85% respectively. tentially predictive properties with regards to the outcome of an asylum case. Our analysis and findings call for further investigation on the predictability of the outcome, on a larger dataset of 17,000 cases, which is undergoing.

Keywords: asylum adjudications, automated decision-making, machine learning, text mining

Procedia PDF Downloads 88
2471 Clarifier Dialogue Interface to resolve linguistic ambiguities in E-Learning Environment

Authors: Dalila Souilem, Salma Boumiza, Abdelkarim Abdelkader

Abstract:

The Clarifier Dialogue Interface (CDI) is a part of an online teaching system based on human-machine communication in learning situation. This interface used in the system during the learning action specifically in the evaluation step, to clarify ambiguities in the learner's response. The CDI can generate patterns allowing access to an information system, using the selectors associated with lexical units. To instantiate these patterns, the user request (especially learner’s response), must be analyzed and interpreted to deduce the canonical form, the semantic form and the subject of the sentence. For the efficiency of this interface at the interpretation level, a set of substitution operators is carried out in order to extend the possibilities of manipulation with a natural language. A second approach that will be presented in this paper focuses on the object languages with new prospects such as combination of natural language with techniques of handling information system in the area of online education. So all operators, the CDI and other interfaces associated to the domain expertise and teaching strategies will be unified using FRAME representation form.

Keywords: dialogue, e-learning, FRAME, information system, natural language

Procedia PDF Downloads 371
2470 Integrating the Modbus SCADA Communication Protocol with Elliptic Curve Cryptography

Authors: Despoina Chochtoula, Aristidis Ilias, Yannis Stamatiou

Abstract:

Modbus is a protocol that enables the communication among devices which are connected to the same network. This protocol is, often, deployed in connecting sensor and monitoring units to central supervisory servers in Supervisory Control and Data Acquisition, or SCADA, systems. These systems monitor critical infrastructures, such as factories, power generation stations, nuclear power reactors etc. in order to detect malfunctions and ignite alerts and corrective actions. However, due to their criticality, SCADA systems are vulnerable to attacks that range from simple eavesdropping on operation parameters, exchanged messages, and valuable infrastructure information to malicious modification of vital infrastructure data towards infliction of damage. Thus, the SCADA research community has been active over strengthening SCADA systems with suitable data protection mechanisms based, to a large extend, on cryptographic methods for data encryption, device authentication, and message integrity protection. However, due to the limited computation power of many SCADA sensor and embedded devices, the usual public key cryptographic methods are not appropriate due to their high computational requirements. As an alternative, Elliptic Curve Cryptography has been proposed, which requires smaller key sizes and, thus, less demanding cryptographic operations. Until now, however, no such implementation has been proposed in the SCADA literature, to the best of our knowledge. In order to fill this gap, our methodology was focused on integrating Modbus, a frequently used SCADA communication protocol, with Elliptic Curve based cryptography and develop a server/client application to demonstrate the proof of concept. For the implementation we deployed two C language libraries, which were suitably modify in order to be successfully integrated: libmodbus (https://github.com/stephane/libmodbus) and ecc-lib https://www.ceid.upatras.gr/webpages/faculty/zaro/software/ecc-lib/). The first library provides a C implementation of the Modbus/TCP protocol while the second one offers the functionality to develop cryptographic protocols based on Elliptic Curve Cryptography. These two libraries were combined, after suitable modifications and enhancements, in order to give a modified version of the Modbus/TCP protocol focusing on the security of the data exchanged among the devices and the supervisory servers. The mechanisms we implemented include key generation, key exchange/sharing, message authentication, data integrity check, and encryption/decryption of data. The key generation and key exchange protocols were implemented with the use of Elliptic Curve Cryptography primitives. The keys established by each device are saved in their local memory and are retained during the whole communication session and are used in encrypting and decrypting exchanged messages as well as certifying entities and the integrity of the messages. Finally, the modified library was compiled for the Android environment in order to run the server application as an Android app. The client program runs on a regular computer. The communication between these two entities is an example of the successful establishment of an Elliptic Curve Cryptography based, secure Modbus wireless communication session between a portable device acting as a supervisor station and a monitoring computer. Our first performance measurements are, also, very promising and demonstrate the feasibility of embedding Elliptic Curve Cryptography into SCADA systems, filling in a gap in the relevant scientific literature.

Keywords: elliptic curve cryptography, ICT security, modbus protocol, SCADA, TCP/IP protocol

Procedia PDF Downloads 256