Search results for: Distributed Algorithm
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5394

Search results for: Distributed Algorithm

2064 Determining Earthquake Performances of Existing Reinforced Concrete Buildings by Using ANN

Authors: Musa H. Arslan, Murat Ceylan, Tayfun Koyuncu

Abstract:

In this study, an artificial intelligence-based (ANN based) analytical method has been developed for analyzing earthquake performances of the reinforced concrete (RC) buildings. 66 RC buildings with four to ten storeys were subjected to performance analysis according to the parameters which are the existing material, loading and geometrical characteristics of the buildings. The selected parameters have been thought to be effective on the performance of RC buildings. In the performance analyses stage of the study, level of performance possible to be shown by these buildings in case of an earthquake was determined on the basis of the 4-grade performance levels specified in Turkish Earthquake Code- 2007 (TEC-2007). After obtaining the 4-grade performance level, selected 23 parameters of each building have been matched with the performance level. In this stage, ANN-based fast evaluation algorithm mentioned above made an economic and rapid evaluation of four to ten storey RC buildings. According to the study, the prediction accuracy of ANN has been found about 74%.

Keywords: artificial intelligence, earthquake, performance, reinforced concrete

Procedia PDF Downloads 458
2063 Simulation of Wave Propagation in Multiphase Medium

Authors: Edip Kemal, Sheshov Vlatko, Bojadjieva Julijana, Bogdanovic ALeksandra, Gjorgjeska Irena

Abstract:

The wave propagation phenomenon in porous domains is of great importance in the field of geotechnical earthquake engineering. In these kinds of problems, the elastic waves propagate from the interior to the exterior domain and require special treatment at the computational level since apart from displacement in the solid-state there is a p-wave that takes place in the pore water phase. In this paper, a study on the implementation of multiphase finite elements is presented. The proposed algorithm is implemented in the ANSYS finite element software and tested on one-dimensional wave propagation considering both pore pressure wave propagation and displacement fields. In the simulation of porous media such as soils, the behavior is governed largely by the interaction of the solid skeleton with water and/or air in the pores. Therefore, coupled problems of fluid flow and deformation of the solid skeleton are considered in a detailed way.

Keywords: wave propagation, multiphase model, numerical methods, finite element method

Procedia PDF Downloads 162
2062 Applying Spanning Tree Graph Theory for Automatic Database Normalization

Authors: Chetneti Srisa-an

Abstract:

In Knowledge and Data Engineering field, relational database is the best repository to store data in a real world. It has been using around the world more than eight decades. Normalization is the most important process for the analysis and design of relational databases. It aims at creating a set of relational tables with minimum data redundancy that preserve consistency and facilitate correct insertion, deletion, and modification. Normalization is a major task in the design of relational databases. Despite its importance, very few algorithms have been developed to be used in the design of commercial automatic normalization tools. It is also rare technique to do it automatically rather manually. Moreover, for a large and complex database as of now, it make even harder to do it manually. This paper presents a new complete automated relational database normalization method. It produces the directed graph and spanning tree, first. It then proceeds with generating the 2NF, 3NF and also BCNF normal forms. The benefit of this new algorithm is that it can cope with a large set of complex function dependencies.

Keywords: relational database, functional dependency, automatic normalization, primary key, spanning tree

Procedia PDF Downloads 349
2061 The Development of GPS Buoy for Ocean Surface Monitoring: Initial Results

Authors: Anuar Mohd Salleh, Mohd Effendi Daud

Abstract:

This study presents a kinematic positioning approach which is use the GPS buoy for precise ocean surface monitoring. A GPS buoy data from two experiments have been processed using a precise, medium-range differential kinematic technique. In each case the data were collected for more than 24 hours at nearby coastal site at a high rate (1 Hz), along with measurements from neighboring tidal stations, to verify the estimated sea surface heights. Kinematic coordinates of GPS buoy were estimated using the epoch-wise pre-elimination and the backward substitution algorithm. Test results show the centimeter level accuracy in sea surface height determination can be successfully achieved using proposed technique. The centimeter level agreement between two methods also suggests the possibility of using this inexpensive and more flexible GPS buoy equipment to enhance (or even replace) the current use of tidal gauge stations.

Keywords: global positioning system, kinematic GPS, sea surface height, GPS buoy, tide gauge

Procedia PDF Downloads 539
2060 Deep Well-Grounded Magnetite Anode Chains Retrieval and Installation for Raslanuf Complex Impressed Current Cathodic Protection System Rectification

Authors: Mohamed Ahmed Khalil

Abstract:

The number of deep well anode ground beds (GBs) have been retrieved due to unoperated anode chains. New identical magnetite anode chains (MAC) have been installed at Raslanuf complex impressed current Cathodic protection (ICCP) system, distributed at different plants (Utility, ethylene and polyethylene). All problems associated with retrieving and installation of MACs have been discussed, rectified and presented. All GB-associated severely corroded wellhead casings were well maintained and/or replaced by new fabricated and modified ones. The main cause of the wellhead casing's severe internal corrosion was discussed and the conducted remedy action to overcome future corrosion problems is presented. All GB-connected anode junction boxes (AJBs) and shunts were closely inspected, maintained and necessary replacement and/or modifications were carried out on shunts. All damaged GB concrete foundations (CF) have been inspected and completely replaced. All GB-associated Transformer-Rectifiers Units (TRU) were subjected to thorough inspection and necessary maintenance was performed on each individual TRU. After completion of all MACs and TRU maintenance activities, each cathodic protection station (CPS) has been re-operated, alternative current (AC), direct current (DC), voltage and structure to soil potential (S/P) measurements have been conducted, recorded and all obtained test results are presented. DC current outputs have been adjusted and DC current outputs of each MAC have been recorded for each GB AJB.

Keywords: magnetite anodes, deep well, ground beds, cathodic protection, transformer rectifier, impressed current, junction boxes

Procedia PDF Downloads 112
2059 Optimal Design of Reference Node Placement for Wireless Indoor Positioning Systems in Multi-Floor Building

Authors: Kittipob Kondee, Chutima Prommak

Abstract:

In this paper, we propose an optimization technique that can be used to optimize the placements of reference nodes and improve the location determination performance for the multi-floor building. The proposed technique is based on Simulated Annealing algorithm (SA) and is called MSMR-M. The performance study in this work is based on simulation. We compare other node-placement techniques found in the literature with the optimal node-placement solutions obtained from our optimization. The results show that using the optimal node-placement obtained by our proposed technique can improve the positioning error distances up to 20% better than those of the other techniques. The proposed technique can provide an average error distance within 1.42 meters.

Keywords: indoor positioning system, optimization system design, multi-floor building, wireless sensor networks

Procedia PDF Downloads 241
2058 FACTS Based Stabilization for Smart Grid Applications

Authors: Adel. M. Sharaf, Foad H. Gandoman

Abstract:

Nowadays, Photovoltaic-PV Farms/ Parks and large PV-Smart Grid Interface Schemes are emerging and commonly utilized in Renewable Energy distributed generation. However, PV-hybrid-Dc-Ac Schemes using interface power electronic converters usually has negative impact on power quality and stabilization of modern electrical network under load excursions and network fault conditions in smart grid. Consequently, robust FACTS based interface schemes are required to ensure efficient energy utilization and stabilization of bus voltages as well as limiting switching/fault onrush current condition. FACTS devices are also used in smart grid-Battery Interface and Storage Schemes with PV-Battery Storage hybrid systems as an elegant alternative to renewable energy utilization with backup battery storage for electric utility energy and demand side management to provide needed energy and power capacity under heavy load conditions. The paper presents a robust interface PV-Li-Ion Battery Storage Interface Scheme for Distribution/Utilization Low Voltage Interface using FACTS stabilization enhancement and dynamic maximum PV power tracking controllers. Digital simulation and validation of the proposed scheme is done using MATLAB/Simulink software environment for Low Voltage- Distribution/Utilization system feeding a hybrid Linear-Motorized inrush and nonlinear type loads from a DC-AC Interface VSC-6-pulse Inverter Fed from the PV Park/Farm with a back-up Li-Ion Storage Battery.

Keywords: AC FACTS, smart grid, stabilization, PV-battery storage, Switched Filter-Compensation (SFC)

Procedia PDF Downloads 407
2057 A Comparative Study on Occupational Fraud and Prosecution

Authors: Michelle Odudu

Abstract:

Ghana and Nigeria are known for their high levels of Occupational Fraud in public offices. The governments of both countries have emphasised their commitment to reducing the losses caused to the state by pledging their allegiance to the counter-fraud agencies to help tackle Occupational Fraud. Yet it seems that the prosecution of such cases is ineffective as high-profile fraudsters can operate with immunity and their cases remain unprosecuted. This research project was based on in-depth examinations of 50 occupational fraud cases involving high-profile individuals in both countries. In doing so, it established the characteristics of those who were prosecuted; the extent to which prosecutions were effectively managed; the barriers to effective prosecutions; and the similarities or differences between the occurrences in both countries. The aim of the project is to examine the practice of and barriers to prosecution of large-scale occupational fraud of those in senior public positions in Ghana and Nigeria. The study drew on the experiences of stakeholders such as defence and prosecution barristers, academics, and fraud analysts via semi-structured interviews and questionnaires. 13 interviews were conducted in Ghana and in Nigeria, where respondents were recruited using a snowball approach. Questionnaires were physically distributed: 20 of the staff at EOCO and 10 to NGO staff in Ghana; 6 and 5 came back, respectively. The empirical data collected suggests that there is no lack of will on the agencies’ part to at least commence proceedings. However, various impediments hamper a successful completion of prosecution. Challenges were more evident in Nigeria, where agencies are less effective at retrieving stolen assets and changing social norms. This is further compounded by several cultural and political factors, which create limitations leaving many cases ‘still pending’.

Keywords: comparative, prosecution, punishment, international, whitecollar, fraud

Procedia PDF Downloads 125
2056 Efficient Ground Targets Detection Using Compressive Sensing in Ground-Based Synthetic-Aperture Radar (SAR) Images

Authors: Gherbi Nabil

Abstract:

Detection of ground targets in SAR radar images is an important area for radar information processing. In the literature, various algorithms have been discussed in this context. However, most of them are of low robustness and accuracy. To this end, we discuss target detection in SAR images based on compressive sensing. Firstly, traditional SAR image target detection algorithms are discussed, and their limitations are highlighted. Secondly, a compressive sensing method is proposed based on the sparsity of SAR images. Next, the detection problem is solved using Multiple Measurements Vector configuration. Furthermore, a robust Alternating Direction Method of Multipliers (ADMM) is developed to solve the optimization problem. Finally, the detection results obtained using raw complex data are presented. Experimental results on real SAR images have verified the effectiveness of the proposed algorithm.

Keywords: compressive sensing, raw complex data, synthetic aperture radar, ADMM

Procedia PDF Downloads 10
2055 Time to CT in Major Trauma in Coffs Harbour Health Campus - The Australian Rural Centre Experience

Authors: Thampi Rawther, Jack Cecire, Andrew Sutherland

Abstract:

Introduction: CT facilitates the diagnosis of potentially life-threatening injuries and facilitates early management. There is evidence that reduced CT acquisition time reduces mortality and length of hospital stay. Currently, there are variable recommendations for ideal timing. Indeed, the NHS standard contract for a major trauma service and STAG both recommend immediate access to CT within a maximum time of 60min and appropriate reporting within 60min of the scan. At Coffs Harbour Health Campus (CHHC), a CT radiographer is on site between 8am-11pm. Aim: To investigate the average time to CT at CHHC and assess for any significant relationship between time to CT and injury severity score (ISS) or time of triage. Method: All major trauma calls between Jan 2021-Oct 2021 were audited (N=87). Patients were excluded if they went from ED to the theatre. Time to CT is defined as the time between triage to the timestamp on the first CT image. Median and interquartile range was used as a measure of central tendency as the data was not normally distributed, and Chi-square test was used to determine association. Results: The median time to CT is 51.5min (IQR 40-74). We found no relationship between time to CT and ISS (P=0.18) and time of triage to time to CT (P=0.35). We compared this to other centres such as John Hunter Hospital and Gold Coast Hospital. We found that the median CT acquisition times were 76min (IQR 52-115) and 43min, respectively. Conclusion: This shows an avenue for improvement given 35% of CT’s were >30min. Furthermore, being proactive and aware of time to CT as an important factor to trauma management can be another avenue for improvement. Based on this, we will re-audit in 12-24months to assess if any improvement has been made.

Keywords: imaging, rural surgery, trauma surgery, improvement

Procedia PDF Downloads 100
2054 Millennials' Viewpoints about Sustainable Hotels' Practices in Egypt: Promoting Responsible Consumerism

Authors: Jailan Mohamed El Demerdash

Abstract:

Millennials are a distinctive and dominant consumer group whose behavior, preferences and purchase decisions are broadly explored but not fully understood yet. Making up the largest market segment in the world, and in Egypt, they have the power to reinvent the hospitality industry and contribute to forming prospective demand for green hotels by showing willingness to adopting their environmental-friendly practices. The current study aims to enhance better understanding of Millennials' perception about sustainable initiatives and to increase the prediction power of their intentions regarding green hotel practices in Egypt. In doing so, the study is exploring the relation among different factors; Millennials' environmental awareness, their acceptance of green practices and their willingness to pay more for them. Millennials' profile, their preferences and environmental decision-making process are brought under light to stimulate actions of hospitality decision-makers and hoteliers. Bearing in mind that responsible consumerism is depending on understanding the different influences on consumption. The study questionnaire was composed of four sections and it was distributed to random Egyptian travelers' blogs and Facebook groups, with approximately 8000 members. Analysis of variance test (ANOVA) was used to examine the study variables. The findings indicated that Millennials' environmental awareness will not be a significant factor in their acceptance of hotel green practices, as well as, their willingness to pay more for them. However, Millennials' acceptance of the level of hotel green practices will have an impact on their willingness to pay more. Millennials were found to have a noticeable level of environmental awareness but lack commitment to tolerating hotel green practices and their associated high prices.

Keywords: millennials, environment, awareness, paying more

Procedia PDF Downloads 141
2053 Solving Single Machine Total Weighted Tardiness Problem Using Gaussian Process Regression

Authors: Wanatchapong Kongkaew

Abstract:

This paper proposes an application of probabilistic technique, namely Gaussian process regression, for estimating an optimal sequence of the single machine with total weighted tardiness (SMTWT) scheduling problem. In this work, the Gaussian process regression (GPR) model is utilized to predict an optimal sequence of the SMTWT problem, and its solution is improved by using an iterated local search based on simulated annealing scheme, called GPRISA algorithm. The results show that the proposed GPRISA method achieves a very good performance and a reasonable trade-off between solution quality and time consumption. Moreover, in the comparison of deviation from the best-known solution, the proposed mechanism noticeably outperforms the recently existing approaches.

Keywords: Gaussian process regression, iterated local search, simulated annealing, single machine total weighted tardiness

Procedia PDF Downloads 304
2052 A Security Cloud Storage Scheme Based Accountable Key-Policy Attribute-Based Encryption without Key Escrow

Authors: Ming Lun Wang, Yan Wang, Ning Ruo Sun

Abstract:

With the development of cloud computing, more and more users start to utilize the cloud storage service. However, there exist some issues: 1) cloud server steals the shared data, 2) sharers collude with the cloud server to steal the shared data, 3) cloud server tampers the shared data, 4) sharers and key generation center (KGC) conspire to steal the shared data. In this paper, we use advanced encryption standard (AES), hash algorithms, and accountable key-policy attribute-based encryption without key escrow (WOKE-AKP-ABE) to build a security cloud storage scheme. Moreover, the data are encrypted to protect the privacy. We use hash algorithms to prevent the cloud server from tampering the data uploaded to the cloud. Analysis results show that this scheme can resist conspired attacks.

Keywords: cloud storage security, sharing storage, attributes, Hash algorithm

Procedia PDF Downloads 387
2051 Estimation of Structural Parameters in Time Domain Using One Dimensional Piezo Zirconium Titanium Patch Model

Authors: N. Jinesh, K. Shankar

Abstract:

This article presents a method of using the one dimensional piezo-electric patch on beam model for structural identification. A hybrid element constituted of one dimensional beam element and a PZT sensor is used with reduced material properties. This model is convenient and simple for identification of beams. Accuracy of this element is first verified against a corresponding 3D finite element model (FEM). The structural identification is carried out as an inverse problem whereby parameters are identified by minimizing the deviation between the predicted and measured voltage response of the patch, when subjected to excitation. A non-classical optimization algorithm Particle Swarm Optimization is used to minimize this objective function. The signals are polluted with 5% Gaussian noise to simulate experimental noise. The proposed method is applied on beam structure and identified parameters are stiffness and damping. The model is also validated experimentally.

Keywords: inverse problem, particle swarm optimization, PZT patches, structural identification

Procedia PDF Downloads 305
2050 Switching to the Latin Alphabet in Kazakhstan: A Brief Overview of Character Recognition Methods

Authors: Ainagul Yermekova, Liudmila Goncharenko, Ali Baghirzade, Sergey Sybachin

Abstract:

In this article, we address the problem of Kazakhstan's transition to the Latin alphabet. The transition process started in 2017 and is scheduled to be completed in 2025. In connection with these events, the problem of recognizing the characters of the new alphabet is raised. Well-known character recognition programs such as ABBYY FineReader, FormReader, MyScript Stylus did not recognize specific Kazakh letters that were used in Cyrillic. The author tries to give an assessment of the well-known method of character recognition that could be in demand as part of the country's transition to the Latin alphabet. Three methods of character recognition: template, structured, and feature-based, are considered through the algorithms of operation. At the end of the article, a general conclusion is made about the possibility of applying a certain method to a particular recognition process: for example, in the process of population census, recognition of typographic text in Latin, or recognition of photos of car numbers, store signs, etc.

Keywords: text detection, template method, recognition algorithm, structured method, feature method

Procedia PDF Downloads 182
2049 Molecular Characterization of Dirofilaria repens in Dogs from Karnataka, India

Authors: D. S. Malatesh, K. J. Ananda, C. Ansar Kamran, K. Ganesh Udupa

Abstract:

Dirofilaria repens is a mosquito-borne filarioid nematode of dogs and other carnivores and accidentally affects humans. D. repens is reported in many countries, including India. Subcutaneous dirofilariosis caused by D. repens is a zoonotic disease, widely distributed throughout Europe, Asia, and Africa, with higher prevalence reported in dogs from Sri Lanka (30-60%), Iran (61%) and Italy (21-25%). Dirofilariasis in dogs was diagnosed by detection of microfilariae in blood. Identification of different Dirofilaria species was done by using molecular methods like polymerase chain reaction (PCR). Even though many researchers reported molecular evidence of D. repens across India, to our best knowledge there is no data available on molecular diagnosis of D. repens in dogs and its zoonotic implication in Karnataka state a southern state in India. The aim of the present study was to identify the Dirofilaria species occurring in dogs from Karnataka, India. Out of 310 samples screened for the presence of microfilariae using traditional diagnostic methods, 99 (31.93%) were positive for the presence of microfilariae. Based on the morphometry, the microfilariae were identified as D. repens. For confirmation of species, the samples were subjected to PCR using pan filarial primers (DIDR-F1, DIDR-R1) for amplification of internal transcribed spacer region 2 (ITS2) of the ribosomal DNA. The PCR product of 484 base pairs on agarose gel was indicative of D. repens. Hence, a single PCR reaction using pan filarial primers can be used to differentiate filarial species found in dogs. The present study confirms that dirofilarial species occurring in dogs from Karnataka is D. repens and further sequencing studies are needed for genotypic characterization of D. repens.

Keywords: Dirofilaria repens, molecular characterization, polymerase chain reaction, Karnataka, India

Procedia PDF Downloads 139
2048 Analysing the Behaviour of Local Hurst Exponent and Lyapunov Exponent for Prediction of Market Crashes

Authors: Shreemoyee Sarkar, Vikhyat Chadha

Abstract:

In this paper, the local fractal properties and chaotic properties of financial time series are investigated by calculating two exponents, the Local Hurst Exponent: LHE and Lyapunov Exponent in a moving time window of a financial series.y. For the purpose of this paper, the Dow Jones Industrial Average (DIJA) and S&P 500, two of the major indices of United States have been considered. The behaviour of the above-mentioned exponents prior to some major crashes (1998 and 2008 crashes in S&P 500 and 2002 and 2008 crashes in DIJA) is discussed. Also, the optimal length of the window for obtaining the best possible results is decided. Based on the outcomes of the above, an attempt is made to predict the crashes and accuracy of such an algorithm is decided.

Keywords: local hurst exponent, lyapunov exponent, market crash prediction, time series chaos, time series local fractal properties

Procedia PDF Downloads 145
2047 Whether Buffer Zone Community Forests’ Benefits Are Distributed Fairly to Low-Income Users: Reflection From the Buffer Zone Community Forests in Bardia National Park, Nepal

Authors: Keshav Raj Acharya, Thakur Silwal, Neelam C. Poudyal

Abstract:

Buffer zones, the peripheral areas around the national parks and wildlife reserves, are available for the purpose of benefitting the local inhabitants by providing forest products for subsistence needs of basic forest products outside the protected areas. The forest area within the buffer zone has been managed as a buffer zone community forest (BZCF) for the last 25 years after the approval of the buffer zone management regulation 1996. With a case study of select BZCF in Bardia National Park, this study aims to analyze whether the benefit provided by BZCF is equally available to poor users among other socioeconomic classes of the users. The findings are based on the analysis of cross-sectional data involving household surveys (n=305) and key informants’ interviews (n=10) as well as office records available at different 5 buffer zone community forest user groups offices. Results indicate that despite the provisions of subsidized rates for poor; poor households were more deprived due to higher forest products price particularly, the timber price in buffer zone. Evidence also indicate that due to the increased forest coverage, the incidence of wildlife damage has also increased and impacted the poor more due to lack of land ownership as well as limited alternatives. Clear community forest management guidelines with equitable benefit sharing and compensatory mechanisms to the users of poor socioeconomic class have been identified as a solution to increase the benefit to poor users in BZCFUGs.

Keywords: crop depredation, forest products, users, wellbeing ranking

Procedia PDF Downloads 43
2046 Solving Linear Systems Involved in Convex Programming Problems

Authors: Yixun Shi

Abstract:

Many interior point methods for convex programming solve an (n+m)x(n+m)linear system in each iteration. Many implementations solve this system in each iteration by considering an equivalent mXm system (4) as listed in the paper, and thus the job is reduced into solving the system (4). However, the system(4) has to be solved exactly since otherwise the error would be entirely passed onto the last m equations of the original system. Often the Cholesky factorization is computed to obtain the exact solution of (4). One Cholesky factorization is to be done in every iteration, resulting in higher computational costs. In this paper, two iterative methods for solving linear systems using vector division are combined together and embedded into interior point methods. Instead of computing one Cholesky factorization in each iteration, it requires only one Cholesky factorization in the entire procedure, thus significantly reduces the amount of computation needed for solving the problem. Based on that, a hybrid algorithm for solving convex programming problems is proposed.

Keywords: convex programming, interior point method, linear systems, vector division

Procedia PDF Downloads 397
2045 A Survey on Countermeasures of Cache-Timing Attack on AES Systems

Authors: Settana M. Abdulh, Naila A. Sadalla, Yaseen H. Taha, Howaida Elshoush

Abstract:

Side channel attacks are based on side channel information, which is information that is leaked from encryption systems. This includes timing information, power consumption as well as electromagnetic or even sound leaking which can exploited by an attacker. Implementing side channel attacks are possible if and only if an attacker has access to a cryptosystem. In this case, the attacker can exploit bad implementation in software or hardware which is not controlled by encryption implementer. Thus, he/she will represent a real threat to the security system. Several countermeasures have been proposed to eliminate side channel information vulnerability.Cache timing attack is a special type of side channel attack. Here, timing information is collected and analyzed by an attacker to guess sensitive information such as encryption key or plaintext. This paper reviews the technique applied in this attack and surveys the countermeasures against it, evaluating the feasibility and usability of each. Based on this evaluation, finally we pose several recommendations about using these countermeasures.

Keywords: AES algorithm, side channel attack, cache timing attack, cache timing countermeasure

Procedia PDF Downloads 296
2044 A Weighted Approach to Unconstrained Iris Recognition

Authors: Yao-Hong Tsai

Abstract:

This paper presents a weighted approach to unconstrained iris recognition. Nowadays, commercial systems are usually characterized by strong acquisition constraints based on the subject’s cooperation. However, it is not always achievable for real scenarios in our daily life. Researchers have been focused on reducing these constraints and maintaining the performance of the system by new techniques at the same time. With large variation in the environment, there are two main improvements to develop the proposed iris recognition system. For solving extremely uneven lighting condition, statistic based illumination normalization is first used on eye region to increase the accuracy of iris feature. The detection of the iris image is based on Adaboost algorithm. Secondly, the weighted approach is designed by Gaussian functions according to the distance to the center of the iris. Furthermore, local binary pattern (LBP) histogram is then applied to texture classification with the weight. Experiment showed that the proposed system provided users a more flexible and feasible way to interact with the verification system through iris recognition.

Keywords: authentication, iris recognition, adaboost, local binary pattern

Procedia PDF Downloads 222
2043 Printed Thai Character Recognition Using Particle Swarm Optimization Algorithm

Authors: Phawin Sangsuvan, Chutimet Srinilta

Abstract:

This Paper presents the applications of Particle Swarm Optimization (PSO) Method for Thai optical character recognition (OCR). OCR consists of the pre-processing, character recognition and post-processing. Before enter into recognition process. The Character must be “Prepped” by pre-processing process. The PSO is an optimization method that belongs to the swarm intelligence family based on the imitation of social behavior patterns of animals. Route of each particle is determined by an individual data among neighborhood particles. The interaction of the particles with neighbors is the advantage of Particle Swarm to determine the best solution. So PSO is interested by a lot of researchers in many difficult problems including character recognition. As the previous this research used a Projection Histogram to extract printed digits features and defined the simple Fitness Function for PSO. The results reveal that PSO gives 67.73% for testing dataset. So in the future there can be explored enhancement the better performance of PSO with improve the Fitness Function.

Keywords: character recognition, histogram projection, particle swarm optimization, pattern recognition techniques

Procedia PDF Downloads 469
2042 Hospitality and Migration within the Canadian Social Fabric: Guest and Host Factors in Manitoba

Authors: Nathalie Piquemal, Faiçal Zellama, Bathélemy Bolivar, Leyla Sall

Abstract:

Canada defines itself as a country of immigration and a multicultural nation, ideologically, politically and programmatically (in terms of its integration practices). As such, principles of hospitality may seem, at first glance, incontestable, given the convergence of the views of the majority of Canadian politicians on the need to welcome, each year, a significant number of immigrants and to offer them the hospitality that facilitates their transition to Canadian citizenship. However, immigrants are welcomed in a Canadian societal context in which power and resources are unevenly distributed, resulting in complex social relationships between hosts and newcomers. Qualitative data obtained from newcomers in Winnipeg, Manitoba, Canada, focuses on experiences of hospitality, with special attention to host-guest social and power dynamics, contested policies on foreign credential and micro spaces of belongingin a multicultural context. The act of welcoming a newcomer is inherently shaped by both macropolitical structures and everyday relational practices that can lead to experiences of belonging, marginalisation, empowerment and/or disempowerment depending on economic agenda, humanitarian and humanistic orientations. We first explore the extent to which immigrants experience hospitality in relation to unequal distribution of power and resources as well as cultural discontinuities. We then examine ways in which immigrants have been able to find sanctuaries of hospitality within their own ethnocultural communities. Finally, we discuss the complexity of hospitality in a multicultural context and offer critical insights on host factors that may produce, develop and nurture hospitable environments.

Keywords: migration, hospitality, diversity, culture, race

Procedia PDF Downloads 115
2041 Analysis and Rule Extraction of Coronary Artery Disease Data Using Data Mining

Authors: Rezaei Hachesu Peyman, Oliyaee Azadeh, Salahzadeh Zahra, Alizadeh Somayyeh, Safaei Naser

Abstract:

Coronary Artery Disease (CAD) is one major cause of disability in adults and one main cause of death in developed. In this study, data mining techniques including Decision Trees, Artificial neural networks (ANNs), and Support Vector Machine (SVM) analyze CAD data. Data of 4948 patients who had suffered from heart diseases were included in the analysis. CAD is the target variable, and 24 inputs or predictor variables are used for the classification. The performance of these techniques is compared in terms of sensitivity, specificity, and accuracy. The most significant factor influencing CAD is chest pain. Elderly males (age > 53) have a high probability to be diagnosed with CAD. SVM algorithm is the most useful way for evaluation and prediction of CAD patients as compared to non-CAD ones. Application of data mining techniques in analyzing coronary artery diseases is a good method for investigating the existing relationships between variables.

Keywords: classification, coronary artery disease, data-mining, knowledge discovery, extract

Procedia PDF Downloads 655
2040 Autonomous Position Control of an Unmanned Aerial Vehicle Based on Accelerometer Response for Indoor Navigation Using Kalman Filtering

Authors: Syed Misbahuddin, Sagufta Kapadia

Abstract:

Autonomous indoor drone navigation has been posed with various challenges, including the inability to use a Global Positioning System (GPS). As of now, Unmanned Aerial Vehicles (UAVs) either rely on 3D mapping systems or utilize external camera arrays to track the UAV in an enclosed environment. The objective of this paper is to develop an algorithm that utilizes Kalman Filtering to reduce noise, allowing the UAV to be navigated indoors using only the flight controller and an onboard companion computer. In this paper, open-source libraries are used to control the UAV, which will only use the onboard accelerometer on the flight controller to estimate the position through double integration. One of the advantages of such a system is that it allows for low-cost and lightweight UAVs to autonomously navigate indoors without advanced mapping of the environment or the use of expensive high-precision-localization sensors.

Keywords: accelerometer, indoor-navigation, Kalman-filtering, position-control

Procedia PDF Downloads 348
2039 Application of the MOOD Technique to the Steady-State Euler Equations

Authors: Gaspar J. Machado, Stéphane Clain, Raphael Loubère

Abstract:

The goal of the present work is to numerically study steady-state nonlinear hyperbolic equations in the context of the finite volume framework. We will consider the unidimensional Burgers' equation as the reference case for the scalar situation and the unidimensional Euler equations for the vectorial situation. We consider two approaches to solve the nonlinear equations: a time marching algorithm and a direct steady-state approach. We first develop the necessary and sufficient conditions to obtain the existence and unicity of the solution. We treat regular examples and solutions with a steady shock and to provide very-high-order finite volume approximations we implement a method based on the MOOD technology (Multi-dimensional Optimal Order Detection). The main ingredient consists in using an 'a posteriori' limiting strategy to eliminate non physical oscillations deriving from the Gibbs phenomenon while keeping a high accuracy for the smooth part.

Keywords: Euler equations, finite volume, MOOD, steady-state

Procedia PDF Downloads 272
2038 Error Correction Method for 2D Ultra-Wideband Indoor Wireless Positioning System Using Logarithmic Error Model

Authors: Phornpat Chewasoonthorn, Surat Kwanmuang

Abstract:

Indoor positioning technologies have been evolved rapidly. They augment the Global Positioning System (GPS) which requires line-of-sight to the sky to track the location of people or objects. This study developed an error correction method for an indoor real-time location system (RTLS) based on an ultra-wideband (UWB) sensor from Decawave. Multiple stationary nodes (anchor) were installed throughout the workspace. The distance between stationary and moving nodes (tag) can be measured using a two-way-ranging (TWR) scheme. The result has shown that the uncorrected ranging error from the sensor system can be as large as 1 m. To reduce ranging error and thus increase positioning accuracy, This study purposes an online correction algorithm using the Kalman filter. The results from experiments have shown that the system can reduce ranging error down to 5 cm.

Keywords: indoor positioning, ultra-wideband, error correction, Kalman filter

Procedia PDF Downloads 156
2037 Spatial Rank-Based High-Dimensional Monitoring through Random Projection

Authors: Chen Zhang, Nan Chen

Abstract:

High-dimensional process monitoring becomes increasingly important in many application domains, where usually the process distribution is unknown and much more complicated than the normal distribution, and the between-stream correlation can not be neglected. However, since the process dimension is generally much bigger than the reference sample size, most traditional nonparametric multivariate control charts fail in high-dimensional cases due to the curse of dimensionality. Furthermore, when the process goes out of control, the influenced variables are quite sparse compared with the whole dimension, which increases the detection difficulty. Targeting at these issues, this paper proposes a new nonparametric monitoring scheme for high-dimensional processes. This scheme first projects the high-dimensional process into several subprocesses using random projections for dimension reduction. Then, for every subprocess with the dimension much smaller than the reference sample size, a local nonparametric control chart is constructed based on the spatial rank test to detect changes in this subprocess. Finally, the results of all the local charts are fused together for decision. Furthermore, after an out-of-control (OC) alarm is triggered, a diagnostic framework is proposed. using the square-root LASSO. Numerical studies demonstrate that the chart has satisfactory detection power for sparse OC changes and robust performance for non-normally distributed data, The diagnostic framework is also effective to identify truly changed variables. Finally, a real-data example is presented to demonstrate the application of the proposed method.

Keywords: random projection, high-dimensional process control, spatial rank, sequential change detection

Procedia PDF Downloads 295
2036 Development of an Automatic Control System for ex vivo Heart Perfusion

Authors: Pengzhou Lu, Liming Xin, Payam Tavakoli, Zhonghua Lin, Roberto V. P. Ribeiro, Mitesh V. Badiwala

Abstract:

Ex vivo Heart Perfusion (EVHP) has been developed as an alternative strategy to expand cardiac donation by enabling resuscitation and functional assessment of hearts donated from marginal donors, which were previously not accepted. EVHP parameters, such as perfusion flow (PF) and perfusion pressure (PP) are crucial for optimal organ preservation. However, with the heart’s constant physiological changes during EVHP, such as coronary vascular resistance, manual control of these parameters is rendered imprecise and cumbersome for the operator. Additionally, low control precision and the long adjusting time may lead to irreversible damage to the myocardial tissue. To solve this problem, an automatic heart perfusion system was developed by applying a Human-Machine Interface (HMI) and a Programmable-Logic-Controller (PLC)-based circuit to control PF and PP. The PLC-based control system collects the data of PF and PP through flow probes and pressure transducers. It has two control modes: the RPM-flow mode and the pressure mode. The RPM-flow control mode is an open-loop system. It influences PF through providing and maintaining the desired speed inputted through the HMI to the centrifugal pump with a maximum error of 20 rpm. The pressure control mode is a closed-loop system where the operator selects a target Mean Arterial Pressure (MAP) to control PP. The inputs of the pressure control mode are the target MAP, received through the HMI, and the real MAP, received from the pressure transducer. A PID algorithm is applied to maintain the real MAP at the target value with a maximum error of 1mmHg. The precision and control speed of the RPM-flow control mode were examined by comparing the PLC-based system to an experienced operator (EO) across seven RPM adjustment ranges (500, 1000, 2000 and random RPM changes; 8 trials per range) tested in a random order. System’s PID algorithm performance in pressure control was assessed during 10 EVHP experiments using porcine hearts. Precision was examined through monitoring the steady-state pressure error throughout perfusion period, and stabilizing speed was tested by performing two MAP adjustment changes (4 trials per change) of 15 and 20mmHg. A total of 56 trials were performed to validate the RPM-flow control mode. Overall, the PLC-based system demonstrated the significantly faster speed than the EO in all trials (PLC 1.21±0.03, EO 3.69±0.23 seconds; p < 0.001) and greater precision to reach the desired RPM (PLC 10±0.7, EO 33±2.7 mean RPM error; p < 0.001). Regarding pressure control, the PLC-based system has the median precision of ±1mmHg error and the median stabilizing times in changing 15 and 20mmHg of MAP are 15 and 19.5 seconds respectively. The novel PLC-based control system was 3 times faster with 60% less error than the EO for RPM-flow control. In pressure control mode, it demonstrates a high precision and fast stabilizing speed. In summary, this novel system successfully controlled perfusion flow and pressure with high precision, stability and a fast response time through a user-friendly interface. This design may provide a viable technique for future development of novel heart preservation and assessment strategies during EVHP.

Keywords: automatic control system, biomedical engineering, ex-vivo heart perfusion, human-machine interface, programmable logic controller

Procedia PDF Downloads 171
2035 Assessment of Patient Cooperation and Compliance in Three Stages of Orthodontic Treatment in Adult Patients: A Cross-Sectional Study

Authors: Hafsa Qabool, Rashna Sukhia, Mubassar Fida

Abstract:

Introduction: Success of orthodontic mechanotherapy is highly dependent upon patient cooperation and compliance throughout the duration of treatment. This study was conducted to assess the cooperation and compliance of adult orthodontic patients during the leveling and alignment, space closure/molar correction, and finishing stages of tooth movement. Materials and Methods: Patient cooperation and compliance among three stages of orthodontic treatment were assessed using the Orthodontic Patient Cooperation Scale (OPCS) and Clinical Compliance Evaluation (CCE) form. A sample size of 38 was calculated for each stage of treatment; therefore, 114 subjects were included in the study. Shapiro-Wilk test identified that the data were normally distributed. One way ANOVA was used to evaluate the percentage cooperation and compliance among the three stages. Pair-wise comparisons between the three stages were performed using Post-hoc Tukey. Results: Statistically significant difference was seen for scores of patient compliance using CCE (p = 0.01); however, the results of the OPCS showed a non-significant difference for patient cooperation (p = 0.16) among the three stages of treatment. Post-hoc analysis showed significant differences (p = 0.01) in patient cooperation and compliance between space closure and the finishing stage. Highly significant (p < 0.001) decline in oral hygiene was found with the progression of orthodontic treatment. Conclusions: Improvement in the cooperation and compliance levels for adult orthodontic patients was observed during space closure & molar correction stage, which then showed a decline as treatment progressed. Oral hygiene was progressively compromised as orthodontic treatment progressed.

Keywords: patient compliance, adult orthodontics, orthodontic motivation, orthodontic patient adherence

Procedia PDF Downloads 160