Search results for: node points
2587 Stochastic Multicast Routing Protocol for Flying Ad-Hoc Networks
Authors: Hyunsun Lee, Yi Zhu
Abstract:
Wireless ad-hoc network is a decentralized type of temporary machine-to-machine connection that is spontaneous or impromptu so that it does not rely on any fixed infrastructure and centralized administration. As unmanned aerial vehicles (UAVs), also called drones, have recently become more accessible and widely utilized in military and civilian domains such as surveillance, search and detection missions, traffic monitoring, remote filming, product delivery, to name a few. The communication between these UAVs become possible and materialized through Flying Ad-hoc Networks (FANETs). However, due to the high mobility of UAVs that may cause different types of transmission interference, it is vital to design robust routing protocols for FANETs. In this talk, the multicast routing method based on a modified stochastic branching process is proposed. The stochastic branching process is often used to describe an early stage of an infectious disease outbreak, and the reproductive number in the process is used to classify the outbreak into a major or minor outbreak. The reproductive number to regulate the local transmission rate is adapted and modified for flying ad-hoc network communication. The performance of the proposed routing method is compared with other well-known methods such as flooding method and gossip method based on three measures; average reachability, average node usage and average branching factor. The proposed routing method achieves average reachability very closer to flooding method, average node usage closer to gossip method, and outstanding average branching factor among methods. It can be concluded that the proposed multicast routing scheme is more efficient than well-known routing schemes such as flooding and gossip while it maintains high performance.Keywords: Flying Ad-hoc Networks, Multicast Routing, Stochastic Branching Process, Unmanned Aerial Vehicles
Procedia PDF Downloads 1232586 Quintic Spline Method for Variable Coefficient Fourth-Order Parabolic Partial Differential Equations
Authors: Reza Mohammadi, Mahdieh Sahebi
Abstract:
We develop a method based on polynomial quintic spline for numerical solution of fourth-order non-homogeneous parabolic partial differential equation with variable coefficient. By using polynomial quintic spline in off-step points in space and finite difference in time directions, we obtained two three level implicit methods. Stability analysis of the presented method has been carried out. We solve four test problems numerically to validate the proposed derived method. Numerical comparison with other existence methods shows the superiority of our presented scheme.Keywords: fourth-order parabolic equation, variable coefficient, polynomial quintic spline, off-step points, stability analysis
Procedia PDF Downloads 3662585 Study on Impact of Road Loads on Full Vehicle Squeak and Rattle Performance
Authors: R. Praveen, B. R. Chandan Ravi, M. Harikrishna
Abstract:
Squeak and rattle noises are the most annoying transient vehicle noises produced due to different terrain conditions. Interpretation and prohibition of squeak and rattle noises are the dominant aspects of a vehicle refinement. This paper describes the computer-aided engineering (CAE) approach to evaluating the full vehicle squeak and rattle performance with the measured road surface profile as enforced excitation at the tire patch points. The E-Line methodology has been used to predict the relative displacement at the interface points and the risk areas were identified. Squeak and rattle performance has been evaluated at different speeds and at different road conditions to understand the vehicle characteristics. The competence of the process in predicting the risk and root cause of the problems showcased us a pleasing conformity between the physical testing and CAE simulation results.Keywords: e-line, enforced excitation, full vehicle, squeak and rattle, road excitation
Procedia PDF Downloads 1422584 Comparison of Different Hydrograph Routing Techniques in XPSTORM Modelling Software: A Case Study
Authors: Fatema Akram, Mohammad Golam Rasul, Mohammad Masud Kamal Khan, Md. Sharif Imam Ibne Amir
Abstract:
A variety of routing techniques are available to develop surface runoff hydrographs from rainfall. The selection of runoff routing method is very vital as it is directly related to the type of watershed and the required degree of accuracy. There are different modelling softwares available to explore the rainfall-runoff process in urban areas. XPSTORM, a link-node based, integrated storm-water modelling software, has been used in this study for developing surface runoff hydrograph for a Golf course area located in Rockhampton in Central Queensland in Australia. Four commonly used methods, namely SWMM runoff, Kinematic wave, Laurenson, and Time-Area are employed to generate runoff hydrograph for design storm of this study area. In runoff mode of XPSTORM, the rainfall, infiltration, evaporation and depression storage for sub-catchments were simulated and the runoff from the sub-catchment to collection node was calculated. The simulation results are presented, discussed and compared. The total surface runoff generated by SWMM runoff, Kinematic wave and Time-Area methods are found to be reasonably close, which indicates any of these methods can be used for developing runoff hydrograph of the study area. Laurenson method produces a comparatively less amount of surface runoff, however, it creates highest peak of surface runoff among all which may be suitable for hilly region. Although the Laurenson hydrograph technique is widely acceptable surface runoff routing technique in Queensland (Australia), extensive investigation is recommended with detailed topographic and hydrologic data in order to assess its suitability for use in the case study area.Keywords: ARI, design storm, IFD, rainfall temporal pattern, routing techniques, surface runoff, XPSTORM
Procedia PDF Downloads 4532583 On Tarski’s Type Theorems for L-Fuzzy Isotone and L-Fuzzy Relatively Isotone Maps on L-Complete Propelattices
Authors: František Včelař, Zuzana Pátíková
Abstract:
Recently a new type of very general relational structures, the so called (L-)complete propelattices, was introduced. These significantly generalize complete lattices and completely lattice L-ordered sets, because they do not assume the technically very strong property of transitivity. For these structures also the main part of the original Tarski’s fixed point theorem holds for (L-fuzzy) isotone maps, i.e., the part which concerns the existence of fixed points and the structure of their set. In this paper, fundamental properties of (L-)complete propelattices are recalled and the so called L-fuzzy relatively isotone maps are introduced. For these maps it is proved that they also have fixed points in L-complete propelattices, even if their set does not have to be of an awaited analogous structure of a complete propelattice.Keywords: fixed point, L-complete propelattice, L-fuzzy (relatively) isotone map, residuated lattice, transitivity
Procedia PDF Downloads 2792582 The Use of Correlation Difference for the Prediction of Leakage in Pipeline Networks
Authors: Mabel Usunobun Olanipekun, Henry Ogbemudia Omoregbee
Abstract:
Anomalies such as water pipeline and hydraulic or petrochemical pipeline network leakages and bursts have significant implications for economic conditions and the environment. In order to ensure pipeline systems are reliable, they must be efficiently controlled. Wireless Sensor Networks (WSNs) have become a powerful network with critical infrastructure monitoring systems for water, oil and gas pipelines. The loss of water, oil and gas is inevitable and is strongly linked to financial costs and environmental problems, and its avoidance often leads to saving of economic resources. Substantial repair costs and the loss of precious natural resources are part of the financial impact of leaking pipes. Pipeline systems experts have implemented various methodologies in recent decades to identify and locate leakages in water, oil and gas supply networks. These methodologies include, among others, the use of acoustic sensors, measurements, abrupt statistical analysis etc. The issue of leak quantification is to estimate, given some observations about that network, the size and location of one or more leaks in a water pipeline network. In detecting background leakage, however, there is a greater uncertainty in using these methodologies since their output is not so reliable. In this work, we are presenting a scalable concept and simulation where a pressure-driven model (PDM) was used to determine water pipeline leakage in a system network. These pressure data were collected with the use of acoustic sensors located at various node points after a predetermined distance apart. We were able to determine with the use of correlation difference to determine the leakage point locally introduced at a predetermined point between two consecutive nodes, causing a substantial pressure difference between in a pipeline network. After de-noising the signal from the sensors at the nodes, we successfully obtained the exact point where we introduced the local leakage using the correlation difference model we developed.Keywords: leakage detection, acoustic signals, pipeline network, correlation, wireless sensor networks (WSNs)
Procedia PDF Downloads 1092581 Maximization of Lifetime for Wireless Sensor Networks Based on Energy Efficient Clustering Algorithm
Authors: Frodouard Minani
Abstract:
Since last decade, wireless sensor networks (WSNs) have been used in many areas like health care, agriculture, defense, military, disaster hit areas and so on. Wireless Sensor Networks consist of a Base Station (BS) and more number of wireless sensors in order to monitor temperature, pressure, motion in different environment conditions. The key parameter that plays a major role in designing a protocol for Wireless Sensor Networks is energy efficiency which is a scarcest resource of sensor nodes and it determines the lifetime of sensor nodes. Maximizing sensor node’s lifetime is an important issue in the design of applications and protocols for Wireless Sensor Networks. Clustering sensor nodes mechanism is an effective topology control approach for helping to achieve the goal of this research. In this paper, the researcher presents an energy efficiency protocol to prolong the network lifetime based on Energy efficient clustering algorithm. The Low Energy Adaptive Clustering Hierarchy (LEACH) is a routing protocol for clusters which is used to lower the energy consumption and also to improve the lifetime of the Wireless Sensor Networks. Maximizing energy dissipation and network lifetime are important matters in the design of applications and protocols for wireless sensor networks. Proposed system is to maximize the lifetime of the Wireless Sensor Networks by choosing the farthest cluster head (CH) instead of the closest CH and forming the cluster by considering the following parameter metrics such as Node’s density, residual-energy and distance between clusters (inter-cluster distance). In this paper, comparisons between the proposed protocol and comparative protocols in different scenarios have been done and the simulation results showed that the proposed protocol performs well over other comparative protocols in various scenarios.Keywords: base station, clustering algorithm, energy efficient, sensors, wireless sensor networks
Procedia PDF Downloads 1442580 An Autopilot System for Static Zone Detection
Authors: Yanchun Zuo, Yingao Liu, Wei Liu, Le Yu, Run Huang, Lixin Guo
Abstract:
Electric field detection is important in many application scenarios. The traditional strategy is measuring the electric field with a man walking around in the area under test. This strategy cannot provide a satisfactory measurement accuracy. To solve the mentioned problem, an autopilot measurement system is divided. A mini-car is produced, which can travel in the area under test according to respect to the program within the CPU. The electric field measurement platform (EFMP) carries a central computer, two horn antennas, and a vector network analyzer. The mini-car stop at the sampling points according to the preset. When the car stops, the EFMP probes the electric field and stores data on the hard disk. After all the sampling points are traversed, an electric field map can be plotted. The proposed system can give an accurate field distribution description of the chamber.Keywords: autopilot mini-car measurement system, electric field detection, field map, static zone measurement
Procedia PDF Downloads 1012579 Internet Versus Muslim Communities Challenges, Problems and Solutions
Authors: Bashir Muhammad
Abstract:
The present research contains the definition of the internet, the inter-relationship between and globalization as well as the divergent views of scholars on internet net-work. Additionally, both the positive and the negative impacts of the internet on Muslim communities were elucidated. As an example, it is part of the positive effect that the internet constitutes a vital source of vast information and data acquisition in various academic sciences in general and Islamic Studies in particular. The most recent and current facts and scientific discoveries by specialists of various ramifications could be fund as fast as possible. Many other exciting points were also cited. And on the negative side of the internet, among many other points, it releases uncontrolled promiscuous pictures and sometimes misguiding information about Islam, which could gradually and easily destroy the sound moral up bring of our young Muslim generation and pollute their positive thinking and reasoning. Another problem is that, Muslims in most cases pertaining to internet services are passive consumers, having no power to control it and manipulate it for their welfare and well being. Due to that, they have to pay the price for that, directly or indirectly.Keywords: internet, muslim, challenges, communities
Procedia PDF Downloads 1212578 Human Posture Estimation Based on Multiple Viewpoints
Authors: Jiahe Liu, HongyangYu, Feng Qian, Miao Luo
Abstract:
This study aimed to address the problem of improving the confidence of key points by fusing multi-view information, thereby estimating human posture more accurately. We first obtained multi-view image information and then used the MvP algorithm to fuse this multi-view information together to obtain a set of high-confidence human key points. We used these as the input for the Spatio-Temporal Graph Convolution (ST-GCN). ST-GCN is a deep learning model used for processing spatio-temporal data, which can effectively capture spatio-temporal relationships in video sequences. By using the MvP algorithm to fuse multi-view information and inputting it into the spatio-temporal graph convolution model, this study provides an effective method to improve the accuracy of human posture estimation and provides strong support for further research and application in related fields.Keywords: multi-view, pose estimation, ST-GCN, joint fusion
Procedia PDF Downloads 702577 MBES-CARIS Data Validation for the Bathymetric Mapping of Shallow Water in the Kingdom of Bahrain on the Arabian Gulf
Authors: Abderrazak Bannari, Ghadeer Kadhem
Abstract:
The objectives of this paper are the validation and the evaluation of MBES-CARIS BASE surface data performance for bathymetric mapping of shallow water in the Kingdom of Bahrain. The latter is an archipelago with a total land area of about 765.30 km², approximately 126 km of coastline and 8,000 km² of marine area, located in the Arabian Gulf, east of Saudi Arabia and west of Qatar (26° 00’ N, 50° 33’ E). To achieve our objectives, bathymetric attributed grid files (X, Y, and depth) generated from the coverage of ship-track MBSE data with 300 x 300 m cells, processed with CARIS-HIPS, were downloaded from the General Bathymetric Chart of the Oceans (GEBCO). Then, brought into ArcGIS and converted into a raster format following five steps: Exportation of GEBCO BASE surface data to the ASCII file; conversion of ASCII file to a points shape file; extraction of the area points covering the water boundary of the Kingdom of Bahrain and multiplying the depth values by -1 to get the negative values. Then, the simple Kriging method was used in ArcMap environment to generate a new raster bathymetric grid surface of 30×30 m cells, which was the basis of the subsequent analysis. Finally, for validation purposes, 2200 bathymetric points were extracted from a medium scale nautical map (1:100 000) considering different depths over the Bahrain national water boundary. The nautical map was scanned, georeferenced and overlaid on the MBES-CARIS generated raster bathymetric grid surface (step 5 above), and then homologous depth points were selected. Statistical analysis, expressed as a linear error at the 95% confidence level, showed a strong correlation coefficient (R² = 0.96) and a low RMSE (± 0.57 m) between the nautical map and derived MBSE-CARIS depths if we consider only the shallow areas with depths of less than 10 m (about 800 validation points). When we consider only deeper areas (> 10 m) the correlation coefficient is equal to 0.73 and the RMSE is equal to ± 2.43 m while if we consider the totality of 2200 validation points including all depths, the correlation coefficient is still significant (R² = 0.81) with satisfactory RMSE (± 1.57 m). Certainly, this significant variation can be caused by the MBSE that did not completely cover the bottom in several of the deeper pockmarks because of the rapid change in depth. In addition, steep slopes and the rough seafloor probably affect the acquired MBSE raw data. In addition, the interpolation of missed area values between MBSE acquisition swaths-lines (ship-tracked sounding data) may not reflect the true depths of these missed areas. However, globally the results of the MBES-CARIS data are very appropriate for bathymetric mapping of shallow water areas.Keywords: bathymetry mapping, multibeam echosounder systems, CARIS-HIPS, shallow water
Procedia PDF Downloads 3812576 The Implementation of Secton Method for Finding the Root of Interpolation Function
Authors: Nur Rokhman
Abstract:
A mathematical function gives relationship between the variables composing the function. Interpolation can be viewed as a process of finding mathematical function which goes through some specified points. There are many interpolation methods, namely: Lagrange method, Newton method, Spline method etc. For some specific condition, such as, big amount of interpolation points, the interpolation function can not be written explicitly. This such function consist of computational steps. The solution of equations involving the interpolation function is a problem of solution of non linear equation. Newton method will not work on the interpolation function, for the derivative of the interpolation function cannot be written explicitly. This paper shows the use of Secton method to determine the numerical solution of the function involving the interpolation function. The experiment shows the fact that Secton method works better than Newton method in finding the root of Lagrange interpolation function.Keywords: Secton method, interpolation, non linear function, numerical solution
Procedia PDF Downloads 3792575 A Novel Machining Method and Tool-Path Generation for Bent Mandrel
Authors: Hong Lu, Yongquan Zhang, Wei Fan, Xiangang Su
Abstract:
Bent mandrel has been widely used as precise mould in automobile industry, shipping industry and aviation industry. To improve the versatility and efficiency of turning method of bent mandrel with fixed rotational center, an instantaneous machining model based on cutting parameters and machine dimension is prospered in this paper. The spiral-like tool path generation approach in non-axisymmetric turning process of bent mandrel is developed as well to deal with the error of part-to-part repeatability in existed turning model. The actual cutter-location points are calculated by cutter-contact points, which are obtained from the approach of spiral sweep process using equal-arc-length segment principle in polar coordinate system. The tool offset is set to avoid the interference between tool and work piece is also considered in the machining model. Depend on the spindle rotational angle, synchronization control of X-axis, Z-axis and C-axis is adopted to generate the tool-path of the turning process. The simulation method is developed to generate NC program according to the presented model, which includes calculation of cutter-location points and generation of tool-path of cutting process. With the approach of a bent mandrel taken as an example, the maximum offset of center axis is 4mm in the 3D space. Experiment results verify that the machining model and turning method are appropriate for the characteristics of bent mandrel.Keywords: bent mandrel, instantaneous machining model, simulation method, tool-path generation
Procedia PDF Downloads 3362574 A Model for Helicopter Routing Problem
Authors: Aydin Sipahioglu, Gokhan Celik
Abstract:
Helicopter routing problem (HRP) is finding good tours for helicopter so as to pick up and deliver personnel or material among specified nodes, mutually. It can be encountered in case of being lots of supply and demand points for different commodities and requiring delivering commodities with helicopter. For instance, to deliver personnel or material from shore to oil rig is a good example. In fact, HRP is a branch of vehicle routing problem with pickup and delivery (VRPPD). However, it has additional constraints such that fuel capacity, performance of helicopter in different altitude and temperature, and the number of maximum takeoff and landing allowed. This kind of pickup and delivery problems can be classified into 3 groups, basically. 1-1 (one to one), M-M (many to many) and 1-M-1 (one to many to one). 1-1 means each commodity has only one supply and one demand point. M-M means there can be more than one supply and demand points for each kind of commodity. 1-M-1 means commodities at depot are delivered to demand points and commodities at customers are delivered to depot. In this case helicopter takes off from its own base, complete its tour and return to its own base. In this study, we define 1-M-M-1 type HRP. That means helicopter takes off from its home base, deliver commodities among the nodes as well as between depot and customers and return to its home base. These problems have NP-hard nature. Therefore, obtaining a good solution in a reasonable time is not easy. In this study, a model is offered for 1-M-M-1 type HRP. It is shown on small scale test instances that the model can find the optimal solution.Keywords: helicopter routing problem, vehicle routing with pickup and delivery, integer programming
Procedia PDF Downloads 4302573 Proposal for Sustainable Construction of a New College Hostel Building
Authors: Reshma Raskar-Phule, Abhay Shinde, Manesh Konkani, Rohit Nighot, Shrirang Mahajan, Viraj Thorat
Abstract:
Sustainability in construction projects can be considered from three dimensions - environment, economy and society. Key concepts of sustainable construction include the protection of the natural environment, choice of non-toxic materials, reduction and reuse of resources, waste minimization, and life cycle analysis. The present paper attempts to identify and analyze the use of sustainable construction materials for a new college hostel building in terms of sustainability development indices (SDIs). Low SDI materials, say as composite fiberglass reinforcement (SDI 4074.96), compressed earth blocks (SDI 0.47), and fiber-reinforced doors (SDI 0.13) are the proposed sustainable materials for the hostel building. Indian Green Building Certification (IGBC) is applied for the hostel building and it earns 5 points out of total 16 points for criterion 5 – Building Materials and Resources of IGBC.Keywords: sustainable development, construction materials, IGBC, hostel building
Procedia PDF Downloads 1162572 Comparisons of Surveying with Terrestrial Laser Scanner and Total Station for Volume Determination of Overburden and Coal Excavations in Large Open-Pit Mine
Authors: B. Keawaram, P. Dumrongchai
Abstract:
The volume of overburden and coal excavations in open-pit mine is generally determined by conventional survey such as total station. This study aimed to evaluate the accuracy of terrestrial laser scanner (TLS) used to measure overburden and coal excavations, and to compare TLS survey data sets with the data of the total station. Results revealed that, the reference points measured with the total station showed 0.2 mm precision for both horizontal and vertical coordinates. When using TLS on the same points, the standard deviations of 4.93 cm and 0.53 cm for horizontal and vertical coordinates, respectively, were achieved. For volume measurements covering the mining areas of 79,844 m2, TLS yielded the mean difference of about 1% and the surface error margin of 6 cm at the 95% confidence level when compared to the volume obtained by total station.Keywords: mine, survey, terrestrial laser scanner, total station
Procedia PDF Downloads 3852571 Integrated On-Board Diagnostic-II and Direct Controller Area Network Access for Vehicle Monitoring System
Authors: Kavian Khosravinia, Mohd Khair Hassan, Ribhan Zafira Abdul Rahman, Syed Abdul Rahman Al-Haddad
Abstract:
The CAN (controller area network) bus is introduced as a multi-master, message broadcast system. The messages sent on the CAN are used to communicate state information, referred as a signal between different ECUs, which provides data consistency in every node of the system. OBD-II Dongles that are based on request and response method is the wide-spread solution for extracting sensor data from cars among researchers. Unfortunately, most of the past researches do not consider resolution and quantity of their input data extracted through OBD-II technology. The maximum feasible scan rate is only 9 queries per second which provide 8 data points per second with using ELM327 as well-known OBD-II dongle. This study aims to develop and design a programmable, and latency-sensitive vehicle data acquisition system that improves the modularity and flexibility to extract exact, trustworthy, and fresh car sensor data with higher frequency rates. Furthermore, the researcher must break apart, thoroughly inspect, and observe the internal network of the vehicle, which may cause severe damages to the expensive ECUs of the vehicle due to intrinsic vulnerabilities of the CAN bus during initial research. Desired sensors data were collected from various vehicles utilizing Raspberry Pi3 as computing and processing unit with using OBD (request-response) and direct CAN method at the same time. Two types of data were collected for this study. The first, CAN bus frame data that illustrates data collected for each line of hex data sent from an ECU and the second type is the OBD data that represents some limited data that is requested from ECU under standard condition. The proposed system is reconfigurable, human-readable and multi-task telematics device that can be fitted into any vehicle with minimum effort and minimum time lag in the data extraction process. The standard operational procedure experimental vehicle network test bench is developed and can be used for future vehicle network testing experiment.Keywords: CAN bus, OBD-II, vehicle data acquisition, connected cars, telemetry, Raspberry Pi3
Procedia PDF Downloads 2032570 The Use of Geographic Information System in Spatial Location of Waste Collection Points and the Attendant Impacts in Bida Urban Centre, Nigeria
Authors: Daramola Japheth, Tabiti S. Tabiti, Daramola Elizabeth Lara, Hussaini Yusuf Atulukwu
Abstract:
Bida urban centre is faced with solid waste management problems which are evident in the processes of waste generation, onsite storage, collection, transfer and transport, processing and disposal of solid waste. As a result of this the urban centre is defaced with litters of garbage and offensive odours due to indiscriminate dumping of refuse within the neighborhood. The partial removal of the fuel subsidy by the Federal Government in January 2012 leads to the formation of Subsidy Reinvestment Programmes (SURE-P), the Federal Government’s share is 41 per cent of the savings while the States and Local Government shared the remaining 59 percent. The SURE-P Committee in carrying out the mandate entrusted upon it by the President by identifying few critical infrastructure and social Safety nets that will ameliorate the sufferings of Nigerians. Waste disposal programme as an aspect of Solid waste management is one of the areas of focus for Niger State SURE-programmes incorporated under Niger State Environmental Protection Agency. The emergence of this programme as related to waste management in Bida has left behind a huge refuse spots along major corridors leading to a serious state of mess. Major roads within the LGA is now turned to dumping site, thereby obstructing traffic movements, while the aesthetic nature of the town became something else with offensive odours all over. This paper however wishes to underscore the use of geographical Information System in identifying solid waste sports towards effective solid waste management in the Bida urban centre. The paper examined the spatial location of dumping points and its impact on the environment. Hand held Global Position System was use to pick the dumping points location; where a total number of 91 dumping points collected were uploaded to ArcGis 10.2 for analysis. Interview method was used to derive information from households living near the dumping site. It was discovered that the people now have to cope with offensive odours, rodents invasion, dog and cats coming around the house as a result of inadequate and in prompt collection of waste around the neighborhood. The researchers hereby recommend that more points needs to be created with prompt collections of waste within the neighborhood by the necessary SURE - P agencies.Keywords: dumping site, neighborhood, refuse, waste
Procedia PDF Downloads 5292569 A Three-Step Iterative Process for Common Fixed Points of Three Contractive-Like Operators
Authors: Safeer Hussain Khan, H. Fukhar-ud-Din
Abstract:
The concept of quasi-contractive type operators was given by Berinde and extended by Imoru and Olatinwo. They named this new type as contractive-like operators. On the other hand, Xu and Noo introduced a three-step-one-mappings iterative process which can be seen as a generalization of Mann and Ishikawa iterative processes. Approximating common fixed points has its own importance as it has a direct link with minimization problem. Motivated by this, in this paper, we first extend the iterative process of Xu and Noor to the case of three-step-three-mappings and then prove a strong convergence result using contractive-like operators for this iterative process. In general, this generalizes corresponding results using Mann, Ishikawa and Xu-Noor iterative processes with quasi-contractive type operators. It is to be pointed out that our results can also be proved with iterative process involving error terms.Keywords: contractive-like operator, iterative process, common fixed point, strong convergence
Procedia PDF Downloads 5942568 An Efficient Fundamental Matrix Estimation for Moving Object Detection
Authors: Yeongyu Choi, Ju H. Park, S. M. Lee, Ho-Youl Jung
Abstract:
In this paper, an improved method for estimating fundamental matrix is proposed. The method is applied effectively to monocular camera based moving object detection. The method consists of corner points detection, moving object’s motion estimation and fundamental matrix calculation. The corner points are obtained by using Harris corner detector, motions of moving objects is calculated from pyramidal Lucas-Kanade optical flow algorithm. Through epipolar geometry analysis using RANSAC, the fundamental matrix is calculated. In this method, we have improved the performances of moving object detection by using two threshold values that determine inlier or outlier. Through the simulations, we compare the performances with varying the two threshold values.Keywords: corner detection, optical flow, epipolar geometry, RANSAC
Procedia PDF Downloads 4092567 A Cloud-Based Federated Identity Management in Europe
Authors: Jesus Carretero, Mario Vasile, Guillermo Izquierdo, Javier Garcia-Blas
Abstract:
Currently, there is a so called ‘identity crisis’ in cybersecurity caused by the substantial security, privacy and usability shortcomings encountered in existing systems for identity management. Federated Identity Management (FIM) could be solution for this crisis, as it is a method that facilitates management of identity processes and policies among collaborating entities without enforcing a global consistency, that is difficult to achieve when there are ID legacy systems. To cope with this problem, the Connecting Europe Facility (CEF) initiative proposed in 2014 a federated solution in anticipation of the adoption of the Regulation (EU) N°910/2014, the so-called eIDAS Regulation. At present, a network of eIDAS Nodes is being deployed at European level to allow that every citizen recognized by a member state is to be recognized within the trust network at European level, enabling the consumption of services in other member states that, until now were not allowed, or whose concession was tedious. This is a very ambitious approach, since it tends to enable cross-border authentication of Member States citizens without the need to unify the authentication method (eID Scheme) of the member state in question. However, this federation is currently managed by member states and it is initially applied only to citizens and public organizations. The goal of this paper is to present the results of a European Project, named eID@Cloud, that focuses on the integration of eID in 5 cloud platforms belonging to authentication service providers of different EU Member States to act as Service Providers (SP) for private entities. We propose an initiative based on a private eID Scheme both for natural and legal persons. The methodology followed in the eID@Cloud project is that each Identity Provider (IdP) is subscribed to an eIDAS Node Connector, requesting for authentication, that is subscribed to an eIDAS Node Proxy Service, issuing authentication assertions. To cope with high loads, load balancing is supported in the eIDAS Node. The eID@Cloud project is still going on, but we already have some important outcomes. First, we have deployed the federation identity nodes and tested it from the security and performance point of view. The pilot prototype has shown the feasibility of deploying this kind of systems, ensuring good performance due to the replication of the eIDAS nodes and the load balance mechanism. Second, our solution avoids the propagation of identity data out of the native domain of the user or entity being identified, which avoids problems well known in cybersecurity due to network interception, man in the middle attack, etc. Last, but not least, this system allows to connect any country or collectivity easily, providing incremental development of the network and avoiding difficult political negotiations to agree on a single authentication format (which would be a major stopper).Keywords: cybersecurity, identity federation, trust, user authentication
Procedia PDF Downloads 1662566 Retina Registration for Biometrics Based on Characterization of Retinal Feature Points
Authors: Nougrara Zineb
Abstract:
The unique structure of the blood vessels in the retina has been used for biometric identification. The retina blood vessel pattern is a unique pattern in each individual and it is almost impossible to forge that pattern in a false individual. The retina biometrics’ advantages include high distinctiveness, universality, and stability overtime of the blood vessel pattern. Once the creases have been extracted from the images, a registration stage is necessary, since the position of the retinal vessel structure could change between acquisitions due to the movements of the eye. Image registration consists of following steps: Feature detection, feature matching, transform model estimation and image resembling and transformation. In this paper, we present an algorithm of registration; it is based on the characterization of retinal feature points. For experiments, retinal images from the DRIVE database have been tested. The proposed methodology achieves good results for registration in general.Keywords: fovea, optic disc, registration, retinal images
Procedia PDF Downloads 2662565 From Protection of Sacrificial Self, to Critical Turning Points and Growth: Nurses’ Experiences of Caring for Patients on the Frontline in Ireland during the COVID-19 Pandemic
Authors: Sinead Creedon, Anna Trace
Abstract:
Nurses were the most exposed of all frontline healthcare workers during the COVID-19 pandemic. Mainly female nurses working in the acute hospital sector formed the frontline defence in the Irish health service. They faced it with resilience and courage despite exposure to risk of burnout and threats to their mental health and wellbeing. Gaining an understanding of the nurses’ journey in adapting to this harsh climate could inform positive psychology interventions and / or support staff such as senior hospital managers in an adverse work situation. Furthermore, it would strengthen our insight and theoretical understanding on the use of positive psychology interventions in adverse work conditions. An interpretative phenomenological analysis was carried out to gain insight into how nurses adapted to the changing work environment during the pandemic. Online semi-structured interviews were done with six experienced female nurses who were all redeployed to the frontline from their own roles. The three themes representing the nurses’ journey were the Protection of Sacrificial Self, The Fortifying Effect of Us, and Critical Turning Points & Growth. Nurses revitalised themselves by creating a sense of ‘us’ to help them face a harsh climate against others, which enabled additional critical turning points. This study further enriches our understanding of personal growth and trauma in adverse work conditions by including an exploration of what sacrificial commitment adds to our understanding of physical and moral courage.Keywords: COVID-19, nurses, positive psychology, resilience, sacrificial commitment, supports
Procedia PDF Downloads 1472564 Oncological Consequences of Heavy Metal Deposits in Jos East, Plateau State, Nigeria
Authors: Jasini Waida, Usman Rilwan, S. I. Ikpughul, E. I. Ugwu
Abstract:
Carcinogenic substances are those that induce tumours (benign or malignant), increase their incidence or malignancy, or shorten the time of tumour occurrence when they get into the body through inhalation, injection, dermal application, or ingestion. Using X-Ray Fluorescence, this study reveals the accumulation of heavy metals in Jos East. The results of this study showed that the Geo-Accumulation Index (Igeo) of water for different heavy metals decreased in the order of Cd (0.15) > Cr and As (0.03) > Pb (-0.13) > Ni (-0.6). The soil content for different heavy metals decreased in the order of As and Cd (0.4) > Ni, Cr and Pb (0.2). The edible plants for different heavy metals decreased in the order of Cd (0.512) > As (0.25) > Pb (0.23) > Ni (0.01) > Ni (-0.06). 21% of these points are uncontaminated, except for a few points that are found within the uncontaminated to moderately contaminated level. It is possible to conclude that the area is uncontaminated to moderately contaminated, necessitating regulation. Hence, this study can be used as reference data for regulatory bodies like the Nigerian Nuclear Regulatory Authority (NNRA) and the rest.Keywords: heavy metals, soil, plants, water, contamination factor
Procedia PDF Downloads 852563 Assessment of Groundwater Quality in Kaltungo Local Government Area of Gombe State
Authors: Rasaq Bello, Grace Akintola Sunday, Yemi Sikiru Onifade
Abstract:
Groundwater is required for the continuity of life and sustainability of the ecosystem. Hence, this research was purposed to assess groundwater quality for domestic use in Kaltungo Local Government Area, Gombe State. The work was also aimed at determining the thickness and resistivity of the topsoil, areas suitable for borehole construction, quality and potentials of groundwater in the study area. The study area extends from latitude N10015’38” - E11008’01” and longitude N10019’29” - E11013’05”. The data was acquired using the Vertical Electrical Sounding (VES) method and processed using IP12win software. Twenty (20) Vertical Electrical Soundings were carried out with a maximum current electrode separation (AB) of 150m. The VES curves generated from the data reveal that all the VES points have five to six subsurface layers. The first layer has a resistivity value of 7.5 to 364.1 Ωm and a thickness ranging from 0.8 to 7.4m, and the second layer has a resistivity value of 1.8 to 600.3 Ωm thickness ranging from 2.6 to 31.4m, the third layer has resistivity value of 23.3 to 564.4 Ωm thickness ranging from 10.3 to 77.8m, the fourth layer has resistivity value of 19.7 to 640.2 Ωm thickness ranging from 8.2m to 120.0m, the fifth layer has resistivity value of 27 to 234 Ωm thickness ranging from 8.2 to 53.7m and the six-layer is the layer that extended beyond the probing depth. The VES curves generated from the data revealed KQHA curve type for VES 1, HKQQ curve for VES 4, HKQ curve for VES 5, KHA curve for VES 11, QQHK curve for VES 12, HAA curve for VES 6 and VES 19, HAKH curve for VES 7, VES 8, VES 10 and VES 18, HKH curve for VES 2, VES 3, VES 9, VES 13, VES 14, VES 15, VES 16, VES 17 and VES 20. Values of the Coefficient of Anisotropy, Reflection Coefficient, and Resistivity Contrast obtained from the Dar-Zarrouk parameters indicated good water prospects for all the VES points in this study, with VES points 4, 9 and 18 having the highest prospects for groundwater exploration.Keywords: formation parameters, groundwater, resistivity, resistivity contrast, vertical electrical sounding
Procedia PDF Downloads 522562 Hydrogeological Study of the Different Aquifers in the Area of Biskra
Authors: A. Sengouga, Y. Imessaoudene, A. Semar, B. Mouhouche, M. Kadir
Abstract:
Biskra or Zibans, is located in a structural transition zone between the chain of the Saharan Atlas Mountains and the Sahara. It is an arid region where the superficial water resource is the mild, hence the importance of the lithological description and the evaluation of aquifers rock’s volumes, which are highly dependent on the mobilized water contained in the various reservoirs (Quaternary, Mio-Pliocene, Eocene and Continental intercalary). Through a data synthesis which is particularly based on stratigraphic logs of drilling, the description of aquifers heterogeneity and the determining of the spatial variability of aquifer appearance became possible, by using geostatistical analysis, which allowed the representation of the aquifer thicknesses mapping and their space variation. The different thematic maps realized focus on drilling position, the substratum shape and finally the aquifers thicknesses of the region. It is found that the high density of water points especially these of drilling points are superposed on the hydrologic reservoirs with significant thicknesses.Keywords: log stratigraphic ArcGIS 10, geometry of aquifers, rocks reservoir volume, Biskra
Procedia PDF Downloads 4602561 Scalable Performance Testing: Facilitating The Assessment Of Application Performance Under Substantial Loads And Mitigating The Risk Of System Failures
Authors: Solanki Ravirajsinh
Abstract:
In the software testing life cycle, failing to conduct thorough performance testing can result in significant losses for an organization due to application crashes and improper behavior under high user loads in production. Simulating large volumes of requests, such as 5 million within 5-10 minutes, is challenging without a scalable performance testing framework. Leveraging cloud services to implement a performance testing framework makes it feasible to handle 5-10 million requests in just 5-10 minutes, helping organizations ensure their applications perform reliably under peak conditions. Implementing a scalable performance testing framework using cloud services and tools like JMeter, EC2 instances (Virtual machine), cloud logs (Monitor errors and logs), EFS (File storage system), and security groups offers several key benefits for organizations. Creating performance test framework using this approach helps optimize resource utilization, effective benchmarking, increased reliability, cost savings by resolving performance issues before the application is released. In performance testing, a master-slave framework facilitates distributed testing across multiple EC2 instances to emulate many concurrent users and efficiently handle high loads. The master node orchestrates the test execution by coordinating with multiple slave nodes to distribute the workload. Slave nodes execute the test scripts provided by the master node, with each node handling a portion of the overall user load and generating requests to the target application or service. By leveraging JMeter's master-slave framework in conjunction with cloud services like EC2 instances, EFS, CloudWatch logs, security groups, and command-line tools, organizations can achieve superior scalability and flexibility in their performance testing efforts. In this master-slave framework, JMeter must be installed on both the master and each slave EC2 instance. The master EC2 instance functions as the "brain," while the slave instances operate as the "body parts." The master directs each slave to execute a specified number of requests. Upon completion of the execution, the slave instances transmit their results back to the master. The master then consolidates these results into a comprehensive report detailing metrics such as the number of requests sent, encountered errors, network latency, response times, server capacity, throughput, and bandwidth. Leveraging cloud services, the framework benefits from automatic scaling based on the volume of requests. Notably, integrating cloud services allows organizations to handle more than 5-10 million requests within 5 minutes, depending on the server capacity of the hosted website or application.Keywords: identify crashes of application under heavy load, JMeter with cloud Services, Scalable performance testing, JMeter master and slave using cloud Services
Procedia PDF Downloads 272560 A Novel Search Pattern for Motion Estimation in High Efficiency Video Coding
Authors: Phong Nguyen, Phap Nguyen, Thang Nguyen
Abstract:
High Efficiency Video Coding (HEVC) or H.265 Standard fulfills the demand of high resolution video storage and transmission since it achieves high compression ratio. However, it requires a huge amount of calculation. Since Motion Estimation (ME) block composes about 80 % of calculation load of HEVC, there are a lot of researches to reduce the computation cost. In this paper, we propose a new algorithm to lower the number of Motion Estimation’s searching points. The number of computing points in search pattern is down from 77 for Diamond Pattern and 81 for Square Pattern to only 31. Meanwhile, the Peak Signal to Noise Ratio (PSNR) and bit rate are almost equal to those of conventional patterns. The motion estimation time of new algorithm reduces by at 68.23%, 65.83%compared to the recommended search pattern of diamond pattern, square pattern, respectively.Keywords: motion estimation, wide diamond, search pattern, H.265, test zone search, HM software
Procedia PDF Downloads 6112559 Exploring and Evaluating the Current Style of Teaching Biology in Saudi Universities from Teachers' Points of View
Authors: Ibraheem Alzahrani
Abstract:
The Saudi Arabia ministry of higher education has established 24 universities across various cities in the kingdom. The universities have the mandate of sustaining technological progress in both teaching and learning. The present study explores the statues of teaching in Saudi universities, focusing on biology, a critical curriculum. The paper explores biology teachers’ points of view is several Saudi higher education institutions through questionnaires disseminated via emails. According to the findings, the current teaching methods are traditional and the teachers believe that it is critical to change it. This study also, reviews how biology has been taught in the kingdom over the past, as well as how it is undertaken presently. In addition, some aspects of biology teaching are considered, including the biology curriculum and learning objectives in higher education biology.Keywords: higher education, teaching style, traditional learning, electronic learning, web 2.0 applications, blended learning
Procedia PDF Downloads 3842558 Experimental Investigation of Soil Corrosion and Electrical Resistance in Depth by Geoelectrical Method
Authors: Seyed Abolhassan Naeini, Maedeh Akhavan Tavakkoli
Abstract:
Determining soil engineering properties is essential for geotechnical problems. In addition to high cost, invasive soil survey methods can be time-consuming, so geophysical methods can be an excellent choice to determine soil characteristics. In this study, geoelectric investigation using the Wenner arrangement method has been used to determine the amount of soil corrosion in soil layers in a project site as a case study. This study aims to assess the degree of corrosion of soil layers to a depth of 5 meters and find the variation of soil electrical resistance versus depth. For this purpose, the desired points in the study area were marked and specified, and all withdrawals were made within the specified points. The collected data have been processed by standard and accepted methods, and the results have been presented in the form of calculation tables and curves of electrical resistivity with depth.Keywords: Wenner array, geoelectric, soil corrosion, electrical soil resistance
Procedia PDF Downloads 103