Search results for: back propagation algorithm
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5687

Search results for: back propagation algorithm

2387 Limit State of Heterogeneous Smart Structures under Unknown Cyclic Loading

Authors: M. Chen, S-Q. Zhang, X. Wang, D. Tate

Abstract:

This paper presents a numerical solution, namely limit and shakedown analysis, to predict the safety state of smart structures made of heterogeneous materials under unknown cyclic loadings, for instance, the flexure hinge in the micro-positioning stage driven by piezoelectric actuator. In combination of homogenization theory and finite-element method (FEM), the safety evaluation problem is converted to a large-scale nonlinear optimization programming for an acceptable bounded loading as the design reference. Furthermore, a general numerical scheme integrated with the FEM and interior-point-algorithm based optimization tool is developed, which makes the practical application possible.

Keywords: limit state, shakedown analysis, homogenization, heterogeneous structure

Procedia PDF Downloads 339
2386 Real-Time Implementation of Self-Tuning Fuzzy-PID Controller for First Order Plus Dead Time System Base on Microcontroller STM32

Authors: Maitree Thamma, Witchupong Wiboonjaroen, Thanat Suknuan, Karan Homchat

Abstract:

First order plus dead time (FOPDT) is a high dynamic system. Therefore, the controller must be intelligent. This paper presents the development and implementation of self-tuning Fuzzy-PID controller for controlling the FOPDT system. The water level process used represented FOPDT system and the mathematical model of the system was approximated by using System Identification toolbox in Matlab. The control programming and Fuzzy-PID algorithm used Matlab/Simulink and run on Microcontroller STM32.

Keywords: real-time control, self-tuning fuzzy-PID, FOPDT system, the water lever process

Procedia PDF Downloads 292
2385 Emotional Awareness and Working Memory as Predictive Factors for the Habitual Use of Cognitive Reappraisal among Adolescents

Authors: Yuri Kitahara

Abstract:

Background: Cognitive reappraisal refers to an emotion regulation strategy in which one changes the interpretation of emotion-eliciting events. Numerous studies show that cognitive reappraisal is associated with mental health and better social functioning. However the examination of the predictive factors of adaptive emotion regulation remains as an issue. The present study examined the factors contributing to the habitual use of cognitive reappraisal, with a focus on emotional awareness and working memory. Methods: Data was collected from 30 junior high school students, using a Japanese version of the Emotion Regulation Questionnaire (ERQ), the Levels of Emotional Awareness Scale for Children (LEAS-C), and N-back task. Results: A positive correlation between emotional awareness and cognitive reappraisal was observed in the high-working-memory group (r = .54, p < .05), whereas no significant relationship was found in the low-working-memory group. In addition, the results of the analysis of variance (ANOVA) showed a significant interaction between emotional awareness and working memory capacity (F(1, 26) = 7.74, p < .05). Subsequent analysis of simple main effects confirmed that high working memory capacity significantly increases the use of cognitive reappraisal for high-emotional-awareness subjects, and significantly decreases the use of cognitive reappraisal for low-emotional-awareness subjects. Discussion: These results indicate that under the condition when one has an adequate ability for simultaneous processing of information, explicit understanding of emotion would contribute to adaptive cognitive emotion regulation. The findings are discussed along with neuroscientific claims.

Keywords: cognitive reappraisal, emotional awareness, emotion regulation, working memory

Procedia PDF Downloads 231
2384 Disaster Management and Resilience: A Conceptual Synthesis of Local

Authors: Oshienemen Albert, Dilanthi Amaratunga, Richard Haigh

Abstract:

Globally, disasters of any form can affect the environment, built environment, the waterways, societies, nations and communities in diverse areas. The such impacts could cut across, economic loss, social setting, cultural and livelihood structures of affected population. Thus, the raise of disaster impacts across developing nations are alarming with decades impact due to the lack of hard and soft infrastructural development across communities, inconsistency in the governmental policy and implementation, making it difficult for disaster affected communities to bounce back when necessary, especially in Nigeria. The Nigeria disasters, especially oil spillages have affected diverse communities across the Niger Delta region for decades with little or nothing as external support for the broken livelihood structure, cultural and economic damages of the people. Though, in the spirit of contribution to the communities affected by oil spill and negative consequence of petroleum production, the federal government at different times established some impressionistic bodies and agencies to oversee the affairs of the region as with regards to oil spillages and development. Thus, the agencies contributions are yet to manifest in practice. This amplifies the quest for the structural clarities of the management systems and the resilience’s of the communities, to better equip the communities for any such disaster. Therefore, the study sets to explore the Nigerian disaster management systems and resilience concept at local community level. Thus, desk-based approach and interviews are employed for the synthesis while, drawing conclusion and recommendations.

Keywords: disaster, community, management, resilience

Procedia PDF Downloads 185
2383 GIS-Based Topographical Network for Minimum “Exertion” Routing

Authors: Katherine Carl Payne, Moshe Dror

Abstract:

The problem of minimum cost routing has been extensively explored in a variety of contexts. While there is a prevalence of routing applications based on least distance, time, and related attributes, exertion-based routing has remained relatively unexplored. In particular, the network structures traditionally used to construct minimum cost paths are not suited to representing exertion or finding paths of least exertion based on road gradient. In this paper, we introduce a topographical network or “topograph” that enables minimum cost routing based on the exertion metric on each arc in a given road network as it is related to changes in road gradient. We describe an algorithm for topograph construction and present the implementation of the topograph on a road network of the state of California with ~22 million nodes.

Keywords: topograph, RPE, routing, GIS

Procedia PDF Downloads 546
2382 The Effects of Emotional Working Memory Training on Trait Anxiety

Authors: Gabrielle Veloso, Welison Ty

Abstract:

Trait anxiety is a pervasive tendency to attend to and experience fears and worries to a disproportionate degree, across various situations. This study sought to determine if participants who undergo emotional working memory training will have significantly lower scores on the trait anxiety scales post-intervention. The study also sought to determine if emotional regulation mediated the relationship between working memory training and trait anxiety. Forty-nine participants underwent 20 days of computerized emotional working memory training called Emotional Dual n-back, which involves viewing a continuous stream of emotional content on a grid, and then remembering the location and color of items presented on the grid. Participants of the treatment group had significantly lower trait anxiety compared to controls post-intervention. Mediation analysis determined that working memory training had no significant relationship to anxiety as measured by the Beck’s Anxiety Inventory-Trait (BAIT), but was significantly related to anxiety as measured by form Y2 of the Spielberger State-Trait Anxiety Inventory (STAI-Y2). Emotion regulation, as measured by the Emotional Regulation Questionnaire (ERQ), was found not to mediate between working memory training and trait anxiety reduction. Results suggest that working memory training may be useful in reducing psychoemotional symptoms rather than somatic symptoms of trait anxiety. Moreover, it proposes for future research to further look into the mediating role of emotion regulation via neuroimaging and the development of more comprehensive measures of emotion regulation.

Keywords: anxiety, emotion regulation, working-memory, working-memory training

Procedia PDF Downloads 151
2381 Finding Viable Pollution Routes in an Urban Network under a Predefined Cost

Authors: Dimitra Alexiou, Stefanos Katsavounis, Ria Kalfakakou

Abstract:

In an urban area the determination of transportation routes should be planned so as to minimize the provoked pollution taking into account the cost of such routes. In the sequel these routes are cited as pollution routes. The transportation network is expressed by a weighted graph G= (V, E, D, P) where every vertex represents a location to be served and E contains unordered pairs (edges) of elements in V that indicate a simple road. The distances/cost and a weight that depict the provoked air pollution by a vehicle transition at every road are assigned to each road as well. These are the items of set D and P respectively. Furthermore the investigated pollution routes must not exceed predefined corresponding values concerning the route cost and the route pollution level during the vehicle transition. In this paper we present an algorithm that generates such routes in order that the decision maker selects the most appropriate one.

Keywords: bi-criteria, pollution, shortest paths, computation

Procedia PDF Downloads 374
2380 Particle Swarm Optimisation of a Terminal Synergetic Controllers for a DC-DC Converter

Authors: H. Abderrezek, M. N. Harmas

Abstract:

DC-DC converters are widely used as reliable power source for many industrial and military applications, computers and electronic devices. Several control methods were developed for DC-DC converters control mostly with asymptotic convergence. Synergetic control (SC) is a proven robust control approach and will be used here in a so-called terminal scheme to achieve finite time convergence. Lyapunov synthesis is adopted to assure controlled system stability. Furthermore particle swarm optimization (PSO) algorithm, based on an integral time absolute of error (ITAE) criterion will be used to optimize controller parameters. Simulation of terminal synergetic control of a DC-DC converter is carried out for different operating conditions and results are compared to classic synergetic control performance, that which demonstrate the effectiveness and feasibility of the proposed control method.

Keywords: DC-DC converter, PSO, finite time, terminal, synergetic control

Procedia PDF Downloads 502
2379 Development of Academic Software for Medial Axis Determination of Porous Media from High-Resolution X-Ray Microtomography Data

Authors: S. Jurado, E. Pazmino

Abstract:

Determination of the medial axis of a porous media sample is a non-trivial problem of interest for several disciplines, e.g., hydrology, fluid dynamics, contaminant transport, filtration, oil extraction, etc. However, the computational tools available for researchers are limited and restricted. The primary aim of this work was to develop a series of algorithms to extract porosity, medial axis structure, and pore-throat size distributions from porous media domains. A complementary objective was to provide the algorithms as free computational software available to the academic community comprising researchers and students interested in 3D data processing. The burn algorithm was tested on porous media data obtained from High-Resolution X-Ray Microtomography (HRXMT) and idealized computer-generated domains. The real data and idealized domains were discretized in voxels domains of 550³ elements and binarized to denote solid and void regions to determine porosity. Subsequently, the algorithm identifies the layer of void voxels next to the solid boundaries. An iterative process removes or 'burns' void voxels in sequence of layer by layer until all the void space is characterized. Multiples strategies were tested to optimize the execution time and use of computer memory, i.e., segmentation of the overall domain in subdomains, vectorization of operations, and extraction of single burn layer data during the iterative process. The medial axis determination was conducted identifying regions where burnt layers collide. The final medial axis structure was refined to avoid concave-grain effects and utilized to determine the pore throat size distribution. A graphic user interface software was developed to encompass all these algorithms, including the generation of idealized porous media domains. The software allows input of HRXMT data to calculate porosity, medial axis, and pore-throat size distribution and provide output in tabular and graphical formats. Preliminary tests of the software developed during this study achieved medial axis, pore-throat size distribution and porosity determination of 100³, 320³ and 550³ voxel porous media domains in 2, 22, and 45 minutes, respectively in a personal computer (Intel i7 processor, 16Gb RAM). These results indicate that the software is a practical and accessible tool in postprocessing HRXMT data for the academic community.

Keywords: medial axis, pore-throat distribution, porosity, porous media

Procedia PDF Downloads 115
2378 Efficient Positioning of Data Aggregation Point for Wireless Sensor Network

Authors: Sifat Rahman Ahona, Rifat Tasnim, Naima Hassan

Abstract:

Data aggregation is a helpful technique for reducing the data communication overhead in wireless sensor network. One of the important tasks of data aggregation is positioning of the aggregator points. There are a lot of works done on data aggregation. But, efficient positioning of the aggregators points is not focused so much. In this paper, authors are focusing on the positioning or the placement of the aggregation points in wireless sensor network. Authors proposed an algorithm to select the aggregators positions for a scenario where aggregator nodes are more powerful than sensor nodes.

Keywords: aggregation point, data communication, data aggregation, wireless sensor network

Procedia PDF Downloads 158
2377 3D Model Completion Based on Similarity Search with Slim-Tree

Authors: Alexis Aldo Mendoza Villarroel, Ademir Clemente Villena Zevallos, Cristian Jose Lopez Del Alamo

Abstract:

With the advancement of technology it is now possible to scan entire objects and obtain their digital representation by using point clouds or polygon meshes. However, some objects may be broken or have missing parts; thus, several methods focused on this problem have been proposed based on Geometric Deep Learning, such as GCNN, ACNN, PointNet, among others. In this article an approach from a different paradigm is proposed, using metric data structures to index global descriptors in the spectral domain and allow the recovery of a set of similar models in polynomial time; to later use the Iterative Close Point algorithm and recover the parts of the incomplete model using the geometry and topology of the model with less Hausdorff distance.

Keywords: 3D reconstruction method, point cloud completion, shape completion, similarity search

Procedia PDF Downloads 122
2376 Memorabilia of Suan Sunandha through Interactive User Interface

Authors: Nalinee Sophatsathit

Abstract:

The objectives of memorabilia of Suan Sunandha are to develop a general knowledge presentation about the historical royal garden through interactive graphic simulation technique and to employ high-functionality context in enhancing interactive user navigation. The approach infers non-intrusive display of relevant history in response to situational context. User’s navigation runs through the virtual reality campus, consisting of new and restored buildings. A flash back presentation of information pertaining to the history in the form of photos, paintings, and textual descriptions are displayed along each passing-by building. To keep the presentation lively, graphical simulation is created in a serendipity game play so that the user can both learn and enjoy the educational tour. The benefits of this human-computer interaction development are two folds. First, lively presentation technique and situational context modeling are developed that entail a usable paradigm of knowledge and information presentation combinations. Second, cost effective training and promotion for both internal personnel and public visitors to learn and keep informed of this historical royal garden can be furnished without the need for a dedicated public relations service. Future improvement on graphic simulation and ability based display can extend this work to be more realistic, user-friendly, and informative for all.

Keywords: interactive user navigation, high-functionality context, situational context, human-computer interaction

Procedia PDF Downloads 357
2375 Applying a Noise Reduction Method to Reveal Chaos in the River Flow Time Series

Authors: Mohammad H. Fattahi

Abstract:

Chaotic analysis has been performed on the river flow time series before and after applying the wavelet based de-noising techniques in order to investigate the noise content effects on chaotic nature of flow series. In this study, 38 years of monthly runoff data of three gauging stations were used. Gauging stations were located in Ghar-e-Aghaj river basin, Fars province, Iran. The noise level of time series was estimated with the aid of Gaussian kernel algorithm. This step was found to be crucial in preventing removal of the vital data such as memory, correlation and trend from the time series in addition to the noise during de-noising process.

Keywords: chaotic behavior, wavelet, noise reduction, river flow

Procedia PDF Downloads 468
2374 A Summary-Based Text Classification Model for Graph Attention Networks

Authors: Shuo Liu

Abstract:

In Chinese text classification tasks, redundant words and phrases can interfere with the formation of extracted and analyzed text information, leading to a decrease in the accuracy of the classification model. To reduce irrelevant elements, extract and utilize text content information more efficiently and improve the accuracy of text classification models. In this paper, the text in the corpus is first extracted using the TextRank algorithm for abstraction, the words in the abstract are used as nodes to construct a text graph, and then the graph attention network (GAT) is used to complete the task of classifying the text. Testing on a Chinese dataset from the network, the classification accuracy was improved over the direct method of generating graph structures using text.

Keywords: Chinese natural language processing, text classification, abstract extraction, graph attention network

Procedia PDF Downloads 100
2373 Yellow Necklacepod and Shih-Balady: Possible Promising Sources Against Human Coronaviruses

Authors: Howaida I. Abd-Alla, Omnia Kutkat, Yassmin Moatasim, Magda T. Ibrahim, Marwa A. Mostafa, Mohamed GabAllah, Mounir M. El-Safty

Abstract:

Artemisia judaica (known shih-balady), Azadirachta indica and Sophora tomentosa (known yellow necklace pod) are members of available medicinal plants well-known for their traditional medical use in Egypt which suggests that they probably harbor broad-spectrum antiviral, immunostimulatory and anti-inflammatory functions. Their ethyl acetate-dichloromethane (1:1, v/v) extracts were evaluated for the potential anti-Middle East respiratory syndrome-related coronavirus (anti-MERS-CoV) activity. Their cytotoxic activity was tested in Vero-E6 cells using 3-(4,-dimethylthiazol-2-yl)-2,5-diphenyltetrazolium bromide (MTT) method with minor modification. The plot of percentage cytotoxicity for each extract concentration has calculated the concentration which exhibited 50% cytotoxic concentration (TC50). A plaque reduction assay was employed using safe dose of extract to evaluate its effect on virus propagation. The highest inhibition percentage was recorded for the yellow necklace pod, followed by Shih-balady. The possible mode of action of virus inhibition was studied at three different levels viral replication, viral adsorption and virucidal activity. The necklace pod leaves have induced virucidal effects and direct effects on the replication of virus. Phytochemical investigation of the promising necklace pod led to the isolation and structure determination of nine compounds. The structure of each compound was determined by a variety of spectroscopic methods. Compounds 4-O-methyl sorbitol 1, 8-methoxy daidzin 6 and 6-methoxy apigenin-7-O-β-D-glucopyranoside 8 were isolated for the first time from the Sophora genus and the other six compounds were the first time that they were isolated from this species according to available works of literature. Generally, the highest anti-CoV 2 activity of S. tomentosa was associated with the crude ethanolic extract, indicating the possibility of synergy among the antiviral phytochemical constituents (1-9).

Keywords: coronavirus, MERS-CoV, mode of action, necklace pod, shih-balady

Procedia PDF Downloads 209
2372 Radar on Bike: Coarse Classification based on Multi-Level Clustering for Cyclist Safety Enhancement

Authors: Asma Omri, Noureddine Benothman, Sofiane Sayahi, Fethi Tlili, Hichem Besbes

Abstract:

Cycling, a popular mode of transportation, can also be perilous due to cyclists' vulnerability to collisions with vehicles and obstacles. This paper presents an innovative cyclist safety system based on radar technology designed to offer real-time collision risk warnings to cyclists. The system incorporates a low-power radar sensor affixed to the bicycle and connected to a microcontroller. It leverages radar point cloud detections, a clustering algorithm, and a supervised classifier. These algorithms are optimized for efficiency to run on the TI’s AWR 1843 BOOST radar, utilizing a coarse classification approach distinguishing between cars, trucks, two-wheeled vehicles, and other objects. To enhance the performance of clustering techniques, we propose a 2-Level clustering approach. This approach builds on the state-of-the-art Density-based spatial clustering of applications with noise (DBSCAN). The objective is to first cluster objects based on their velocity, then refine the analysis by clustering based on position. The initial level identifies groups of objects with similar velocities and movement patterns. The subsequent level refines the analysis by considering the spatial distribution of these objects. The clusters obtained from the first level serve as input for the second level of clustering. Our proposed technique surpasses the classical DBSCAN algorithm in terms of geometrical metrics, including homogeneity, completeness, and V-score. Relevant cluster features are extracted and utilized to classify objects using an SVM classifier. Potential obstacles are identified based on their velocity and proximity to the cyclist. To optimize the system, we used the View of Delft dataset for hyperparameter selection and SVM classifier training. The system's performance was assessed using our collected dataset of radar point clouds synchronized with a camera on an Nvidia Jetson Nano board. The radar-based cyclist safety system is a practical solution that can be easily installed on any bicycle and connected to smartphones or other devices, offering real-time feedback and navigation assistance to cyclists. We conducted experiments to validate the system's feasibility, achieving an impressive 85% accuracy in the classification task. This system has the potential to significantly reduce the number of accidents involving cyclists and enhance their safety on the road.

Keywords: 2-level clustering, coarse classification, cyclist safety, warning system based on radar technology

Procedia PDF Downloads 80
2371 Joint Path and Push Planning among Moveable Obstacles

Authors: Victor Emeli, Akansel Cosgun

Abstract:

This paper explores the navigation among movable obstacles (NAMO) problem and proposes joint path and push planning: which path to take and in what direction the obstacles should be pushed at, given a start and goal position. We present a planning algorithm for selecting a path and the obstacles to be pushed, where a rapidly-exploring random tree (RRT)-based heuristic is employed to calculate a minimal collision path. When it is necessary to apply a pushing force to slide an obstacle out of the way, the planners leverage means-end analysis through a dynamic physics simulation to determine the sequence of linear pushes to clear the necessary space. Simulation experiments show that our approach finds solutions in higher clutter percentages (up to 49%) compared to the straight-line push planner (37%) and RRT without pushing (18%).

Keywords: motion planning, path planning, push planning, robot navigation

Procedia PDF Downloads 165
2370 Functional Profiling of a Circular RNA from the Huntingtin (HTT) Gene

Authors: Laura Gantley, Vanessa M. Conn, Stuart Webb, Kirsty Kirk, Marta Gabryelska, Duncan Holds, Brett W. Stringer, Simon J. Conn

Abstract:

Trinucleotide repeat disorders comprise ~20 severe, inherited human neuromuscular and neurodegenerative disorders, which are a result of an abnormal expansion of repetitive sequences in the DNA. The most common of these, Huntington’s disease, results from the expansion of the CAG repeat region in exon 1 of the HTT gene via an unknown mechanism. Non-coding RNAs have been implicated in the initiation and progression of many diseases; thus, we focus on one circular RNA (circRNA) molecule arising from non-canonical splicing (back splicing) of HTT pre-mRNA. This circRNA and its mouse orthologue were transgenically overexpressed in human cells (SHSY-5Y and HEK293T) and mouse cells (Mb1), respectively. High-content imaging and flow cytometry demonstrated the overexpression of this circRNA reduces cell proliferation, reduces nuclear size independent of cellular size, and alters cell cycle progression. Analysis of protein by western blot and immunofluorescence demonstrated no change to HTT protein levels but altered nuclear-cytoplasmic distribution without impacting the expansion of the HTT repeat region. As these phenotypic and genotypic changes are found in Huntington’s disease patients, these results may suggest that this circRNA may play a functional role in the progression of Huntington’s disease.

Keywords: cell biology, circular RNAs, Huntington’s disease, molecular biology, neurodegenerative disorders

Procedia PDF Downloads 99
2369 Path Planning for Collision Detection between two Polyhedra

Authors: M. Khouil, N. Saber, M. Mestari

Abstract:

This study aimed to propose, a different architecture of a Path Planning using the NECMOP. where several nonlinear objective functions must be optimized in a conflicting situation. The ability to detect and avoid collision is very important for mobile intelligent machines. However, many artificial vision systems are not yet able to quickly and cheaply extract the wealth information. This network, which has been particularly reviewed, has enabled us to solve with a new approach the problem of collision detection between two convex polyhedra in a fixed time (O (1) time). We used two types of neurons linear and threshold logic, which simplified the actual implementation of all the networks proposed. This article represents a comprehensive algorithm that determine through the AMAXNET network a measure (a mini-maximum point) in a fixed time, which allows us to detect the presence of a potential collision.

Keywords: path planning, collision detection, convex polyhedron, neural network

Procedia PDF Downloads 438
2368 Proposed Terminal Device for End-to-End Secure SMS in Cellular Networks

Authors: Neetesh Saxena, Narendra S. Chaudhari

Abstract:

Nowadays, SMS is a very popular mobile service and even the poor, illiterate people and those living in rural areas use SMS service very efficiently. Although many mobile operators have already started 3G and 4G services, 2G services are still being used by the people in many countries. In 2G (GSM), only encryption provided is between the MS and the BTS, there is no end-to-end encryption available. Sometimes we all need to send some confidential message to other person containing bank account number, some password, financial details, etc. Normally, a message is sent in plain text only to the recipient and it is not an acceptable standard for transmitting such important and confidential information. Authors propose an end-to-end encryption approach by proposing a terminal for sending/receiving a secure message. An asymmetric key exchange algorithm is used in order to transmit secret shared key securely to the recipient. The proposed approach with terminal device provides authentication, confidentiality, integrity and non-repudiation.

Keywords: AES, DES, Diffie-Hellman, ECDH, A5, SMS

Procedia PDF Downloads 417
2367 Analyzing Initial Efficacy of Animal Assisted Therapy for Autism Spectrum Disorders: A Case Study

Authors: Georgitta Joseph Valiyamattam

Abstract:

Autism spectrum disorders (ASD) are a growing phenomenon in India with over 10 million cases being recorded. Children with various levels and forms of ASD can be a major challenge both within the context of regular or special schooling. According to statistics by the Centers for Disease Control and Prevention (CDC), one in every 88 children today is born with autism spectrum disorder (ASD) against a ratio of one in 110 few years back. The growing number of children with autism spectrum disorders places greater demands on health services and necessitates the roping in of non-traditional modes of treatment to complement or even substitute traditional health care methods when possible. Research evidence, particularly from Western countries, as also some parts of Asia, suggests that animal-assisted therapy, or zootherapy, may be used as an effective individual or complementary therapeutic tool for increasing overall wellbeing and quality of life among children with Autism spectrum disorders. The paper through a case-study format seeks to evaluate the efficacy (initial stage) of animal assisted therapy (canine-therapy with visiting dog: breed-Golden retriever), as a non-conventional treatment modality for improving cognitive functioning and managing the behavioral and psychological symptoms of Autism Spectrum Disorders. As a pilot study forming the basis for subsequent larger application of AAT, it analyses areas of efficacy as also the challenges faced, both with regard to the mode of therapy, as also particular to the Indian setting.

Keywords: animal assisted therapy, autism, canine therapy, analyzing initial efficacy

Procedia PDF Downloads 548
2366 Landfill Failure Mobility Analysis: A Probabilistic Approach

Authors: Ali Jahanfar, Brajesh Dubey, Bahram Gharabaghi, Saber Bayat Movahed

Abstract:

Ever increasing population growth of major urban centers and environmental challenges in siting new landfills have resulted in a growing trend in design of mega-landfills some with extraordinary heights and dangerously steep slopes. Landfill failure mobility risk analysis is one of the most uncertain types of dynamic rheology models due to very large inherent variabilities in the heterogeneous solid waste material shear strength properties. The waste flow of three historic dumpsite and two landfill failures were back-analyzed using run-out modeling with DAN-W model. The travel distances of the waste flow during landfill failures were calculated approach by taking into account variability in material shear strength properties. The probability distribution function for shear strength properties of the waste material were grouped into four major classed based on waste material compaction (landfills versus dumpsites) and composition (high versus low quantity) of high shear strength waste materials such as wood, metal, plastic, paper and cardboard in the waste. This paper presents a probabilistic method for estimation of the spatial extent of waste avalanches, after a potential landfill failure, to create maps of vulnerability scores to inform property owners and residents of the level of the risk.

Keywords: landfill failure, waste flow, Voellmy rheology, friction coefficient, waste compaction and type

Procedia PDF Downloads 290
2365 Mapping the Core Processes and Identifying Actors along with Their Roles, Functions and Linkages in Trout Value Chain in Kashmir, India

Authors: Stanzin Gawa, Nalini Ranjan Kumar, Gohar Bilal Wani, Vinay Maruti Hatte, A. Vinay

Abstract:

Rainbow trout (Oncorhynchus mykiss) and Brown trout (Salmo trutta fario) are the two species of trout which were once introduced by British in waters of Kashmir has well adapted to favorable climatic conditions. Cold water fisheries are one of the emerging sectors in Kashmir valley and trout holds an important place Jammu and Kashmir fisheries. Realizing the immense potential of trout culture in Kashmir region, the state fisheries department started privatizing trout culture under the centrally funded scheme of RKVY in which they provide 80 percent subsidy for raceway construction and supply of feed and seed for the first year since 2009-10 and at present there are 362 private trout farms. To cater the growing demand for trout in the valley, it is important to understand the bottlenecks faced in the propagation of trout culture. Value chain analysis provides a generic framework to understand the various activities and processes, mapping and studying linkages is first step that needs to be done in any value chain analysis. In Kashmir, it is found that trout hatcheries play a crucial role in insuring the continuous supply of trout seed in valley. Feed is most limiting factor in trout culture and the farmer has to incur high cost in payment and in the transportation of feed from the feed mill to farm. Lack of aqua clinic in the Kashmir valley needs to be addressed. Brood stock maintenance, breeding and seed production, technical assistance to private farmer, extension services have to be strengthened and there is need to development healthier environment for new entrepreneurs. It was found that trout farmers do not avail credit facility as there is no well define credit scheme for fisheries in the state. The study showed weak institutional linkages. Research and development should focus more on applied science rather than basic science.

Keywords: trout, Kashmir, value chain, linkages, culture

Procedia PDF Downloads 403
2364 An Online Priority-Configuration Algorithm for Obstacle Avoidance of the Unmanned Air Vehicles Swarm

Authors: Lihua Zhu, Jianfeng Du, Yu Wang, Zhiqiang Wu

Abstract:

Collision avoidance problems of a swarm of unmanned air vehicles (UAVs) flying in an obstacle-laden environment are investigated in this paper. Given that the UAV swarm needs to adapt to the obstacle distribution in dynamic operation, a priority configuration is designed to guide the UAVs to pass through the obstacles in turn. Based on the collision cone approach and the prediction of the collision time, a collision evaluation model is established to judge the urgency of the imminent collision of each UAV, and the evaluation result is used to assign the priority of each UAV to further instruct them going through the obstacles in descending order. At last, the simulation results provide the promising validation in terms of the efficiency and scalability of the proposed approach.

Keywords: UAV swarm, collision avoidance, complex environment, online priority design

Procedia PDF Downloads 214
2363 Reliability Analysis of Glass Epoxy Composite Plate under Low Velocity

Authors: Shivdayal Patel, Suhail Ahmad

Abstract:

Safety assurance and failure prediction of composite material component of an offshore structure due to low velocity impact is essential for associated risk assessment. It is important to incorporate uncertainties associated with material properties and load due to an impact. Likelihood of this hazard causing a chain of failure events plays an important role in risk assessment. The material properties of composites mostly exhibit a scatter due to their in-homogeneity and anisotropic characteristics, brittleness of the matrix and fiber and manufacturing defects. In fact, the probability of occurrence of such a scenario is due to large uncertainties arising in the system. Probabilistic finite element analysis of composite plates due to low-velocity impact is carried out considering uncertainties of material properties and initial impact velocity. Impact-induced damage of composite plate is a probabilistic phenomenon due to a wide range of uncertainties arising in material and loading behavior. A typical failure crack initiates and propagates further into the interface causing de-lamination between dissimilar plies. Since individual crack in the ply is difficult to track. The progressive damage model is implemented in the FE code by a user-defined material subroutine (VUMAT) to overcome these problems. The limit state function is accordingly established while the stresses in the lamina are such that the limit state function (g(x)>0). The Gaussian process response surface method is presently adopted to determine the probability of failure. A comparative study is also carried out for different combination of impactor masses and velocities. The sensitivity based probabilistic design optimization procedure is investigated to achieve better strength and lighter weight of composite structures. Chain of failure events due to different modes of failure is considered to estimate the consequences of failure scenario. Frequencies of occurrence of specific impact hazards yield the expected risk due to economic loss.

Keywords: composites, damage propagation, low velocity impact, probability of failure, uncertainty modeling

Procedia PDF Downloads 279
2362 Secure Transfer of Medical Images Using Hybrid Encryption Authentication, Confidentiality, Integrity

Authors: Boukhatem Mohammed Belkaid, Lahdir Mourad

Abstract:

In this paper, we propose a new encryption system for security issues medical images. The hybrid encryption scheme is based on AES and RSA algorithms to validate the three security services are authentication, integrity, and confidentiality. Privacy is ensured by AES, authenticity is ensured by the RSA algorithm. Integrity is assured by the basic function of the correlation between adjacent pixels. Our system generates a unique password every new session of encryption, that will be used to encrypt each frame of the medical image basis to strengthen and ensure his safety. Several metrics have been used for various tests of our analysis. For the integrity test, we noticed the efficiencies of our system and how the imprint cryptographic changes at reception if a change affects the image in the transmission channel.

Keywords: AES, RSA, integrity, confidentiality, authentication, medical images, encryption, decryption, key, correlation

Procedia PDF Downloads 540
2361 Stabilization of the Bernoulli-Euler Plate Equation: Numerical Analysis

Authors: Carla E. O. de Moraes, Gladson O. Antunes, Mauro A. Rincon

Abstract:

The aim of this paper is to study the internal stabilization of the Bernoulli-Euler equation numerically. For this, we consider a square plate subjected to a feedback/damping force distributed only in a subdomain. An algorithm for obtaining an approximate solution to this problem was proposed and implemented. The numerical method used was the Finite Difference Method. Numerical simulations were performed and showed the behavior of the solution, confirming the theoretical results that have already been proved in the literature. In addition, we studied the validation of the numerical scheme proposed, followed by an analysis of the numerical error; and we conducted a study on the decay of the energy associated.

Keywords: Bernoulli-Euler plate equation, numerical simulations, stability, energy decay, finite difference method

Procedia PDF Downloads 416
2360 Correlation between Clinical Measurements of Static Foot Posture in Young Adults

Authors: Phornchanok Motantasut, Torkamol Hunsawong, Lugkana Mato, Wanida Donpunha

Abstract:

Identifying abnormal foot posture is important for prescribing appropriate management in patients with lower limb disorders and chronic non-specific low back pain. The normalized navicular height truncated (NNHt) and the foot posture index-6 (FPI-6) have been recommended as the common, simple, valid, and reliable static measures for clinical application. The NNHt is a single plane measure while the FPI-6 is a triple plane measure. At present, there is inadequate information about the correlation between the NNHt and the FPI-6 for categorizing foot posture that leads to a difficulty of choosing the appropriate assessment. Therefore, the present study aimed to determine the correlation between the NNHt and the FPI-6 measures in adult participants with asymptomatic feet. Methods: A cross-sectional descriptive study was conducted in 47 asymptomatic individuals (23 males and 24 females) aged 28.89 ± 7.67 years with body mass index 21.73 ± 1.76 kg/m². The right foot was measured twice by the experienced rater using the NNHt and the FPI-6. A sequence of the measures was randomly arranged for each participant with a 10-minute rest between the tests. The Pearson’s correlation coefficient (r) was used to determine the relationship between the measures. Results: The mean NNHt score was 0.23 ± 0.04 (ranged from 0.15 to 0.36) and the mean FPI-6 score was 4.42 ± 4.36 (ranged from -6 to +11). The Pearson’s correlation coefficient among the NNHt score and the FPI-6 score was -0.872 (p < 0.01). Conclusion: The present finding demonstrates the strong correlation between the NNHt and FPI-6 in adult feet and implies that both measures could be substituted for each other in identifying foot posture.

Keywords: foot posture index, foot type, measurement of foot posture, navicular height

Procedia PDF Downloads 138
2359 Numerical Analysis of Supersonic Impinging Jets onto Resonance Tube

Authors: Shinji Sato, M. M. A. Alam, Manabu Takao

Abstract:

In recent, investigation of an unsteady flow inside the resonance tube have become a strongly motivated research field for their potential application as high-frequency actuators. By generating a shock wave inside the resonance tube, a high temperature and pressure can be achieved inside the tube, and this high temperature can also be used to ignite a jet engine. In the present research, a computational fluid dynamics (CFD) analysis was carried out to investigate the flow inside the resonance tube. The density-based solver of rhoCentralFoam in OpenFOAM was used to numerically simulate the flow. The supersonic jet that was driven by a cylindrical nozzle with a nominal exit diameter of φd = 20.3 mm impinged onto the resonance tube. The jet pressure ratio was varied between 2.6 and 7.8. The gap s between the nozzle exit and tube entrance was changed between 1.5d and 3.0d. The diameter and length of the tube were taken as D = 1.25d and L=3.0D, respectively. As a result, when a supersonic jet has impinged onto the resonance tube, a compression wave was found generating inside the tube and propagating towards the tube end wall. This wave train resulted in a rise in the end wall gas temperature and pressure. While, in an outflow phase, the gas near tube enwall was found cooling back isentropically to its initial temperature. Thus, the compression waves repeated a reciprocating motion in the tube like a piston, and a fluctuation in the end wall pressures and temperatures were observed. A significant change was found in the end wall pressures and temperatures with a change of jet flow conditions. In this study, the highest temperature was confirmed at a jet pressure ratio of 4.2 and a gap of s=2.0d

Keywords: compressible flow, OpenFOAM, oscillations, a resonance tube, shockwave

Procedia PDF Downloads 149
2358 Block Matching Based Stereo Correspondence for Depth Calculation

Authors: G. Balakrishnan

Abstract:

Stereo Correspondence plays a major role in estimation of distance of an object from the stereo camera pair for various applications. In this paper, a stereo correspondence algorithm based on block-matching technique is presented. Initially, an energy matrix is calculated for every disparity obtained using modified Sum of Absolute Difference (SAD). Higher energy matrix errors are removed by using threshold value in order to reduce the mismatch errors. A smoothening filter is applied to eliminate unreliable disparity estimate across the object boundaries. The purpose is to improve the reliability of calculation of disparity map. The experimental results obtained shows that the final depth map produce better results and can be used to all the applications using stereo cameras.

Keywords: stereo matching, filters, energy matrix, disparity

Procedia PDF Downloads 215