Search results for: traditional and modern architecture
5194 Approximation of Convex Set by Compactly Semidefinite Representable Set
Authors: Anusuya Ghosh, Vishnu Narayanan
Abstract:
The approximation of convex set by semidefinite representable set plays an important role in semidefinite programming, especially in modern convex optimization. To optimize a linear function over a convex set is a hard problem. But optimizing the linear function over the semidefinite representable set which approximates the convex set is easy to solve as there exists numerous efficient algorithms to solve semidefinite programming problems. So, our approximation technique is significant in optimization. We develop a technique to approximate any closed convex set, say K by compactly semidefinite representable set. Further we prove that there exists a sequence of compactly semidefinite representable sets which give tighter approximation of the closed convex set, K gradually. We discuss about the convergence of the sequence of compactly semidefinite representable sets to closed convex set K. The recession cone of K and the recession cone of the compactly semidefinite representable set are equal. So, we say that the sequence of compactly semidefinite representable sets converge strongly to the closed convex set. Thus, this approximation technique is very useful development in semidefinite programming.Keywords: semidefinite programming, semidefinite representable set, compactly semidefinite representable set, approximation
Procedia PDF Downloads 3875193 Image Classification with Localization Using Convolutional Neural Networks
Authors: Bhuyain Mobarok Hossain
Abstract:
Image classification and localization research is currently an important strategy in the field of computer vision. The evolution and advancement of deep learning and convolutional neural networks (CNN) have greatly improved the capabilities of object detection and image-based classification. Target detection is important to research in the field of computer vision, especially in video surveillance systems. To solve this problem, we will be applying a convolutional neural network of multiple scales at multiple locations in the image in one sliding window. Most translation networks move away from the bounding box around the area of interest. In contrast to this architecture, we consider the problem to be a classification problem where each pixel of the image is a separate section. Image classification is the method of predicting an individual category or specifying by a shoal of data points. Image classification is a part of the classification problem, including any labels throughout the image. The image can be classified as a day or night shot. Or, likewise, images of cars and motorbikes will be automatically placed in their collection. The deep learning of image classification generally includes convolutional layers; the invention of it is referred to as a convolutional neural network (CNN).Keywords: image classification, object detection, localization, particle filter
Procedia PDF Downloads 3055192 Are Some Languages Harder to Learn and Teach Than Others?
Authors: David S. Rosenstein
Abstract:
The author believes that modern spoken languages should be equally difficult (or easy) to learn, since all normal children learning their native languages do so at approximately the same rate and with the same competence, progressing from easy to more complex grammar and syntax in the same way. Why then, do some languages seem more difficult than others? Perhaps people are referring to the written language, where it may be true that mastering Chinese requires more time than French, which in turn requires more time than Spanish. But this may be marginal, since Chinese and French children quickly catch up to their Spanish peers in reading comprehension. Rather, the real differences in difficulty derive from two sources: hardened L1 language habits trying to cope with contrasting L2 habits; and unfamiliarity with unique L2 characteristics causing faulty expectations. It would seem that effective L2 teaching and learning must take these two sources of difficulty into consideration. The author feels that the latter (faulty expectations) causes the greatest difficulty, making effective teaching and learning somewhat different for each given foreign language. Examples from Chinese and other languages are presented.Keywords: learning different languages, language learning difficulties, faulty language expectations
Procedia PDF Downloads 5335191 Design and Development of Real-Time Optimal Energy Management System for Hybrid Electric Vehicles
Authors: Masood Roohi, Amir Taghavipour
Abstract:
This paper describes a strategy to develop an energy management system (EMS) for a charge-sustaining power-split hybrid electric vehicle. This kind of hybrid electric vehicles (HEVs) benefit from the advantages of both parallel and series architecture. However, it gets relatively more complicated to manage power flow between the battery and the engine optimally. The applied strategy in this paper is based on nonlinear model predictive control approach. First of all, an appropriate control-oriented model which was accurate enough and simple was derived. Towards utilization of this controller in real-time, the problem was solved off-line for a vast area of reference signals and initial conditions and stored the computed manipulated variables inside look-up tables. Look-up tables take a little amount of memory. Also, the computational load dramatically decreased, because to find required manipulated variables the controller just needed a simple interpolation between tables.Keywords: hybrid electric vehicles, energy management system, nonlinear model predictive control, real-time
Procedia PDF Downloads 3525190 Remote Criminal Proceedings as Implication to Rethink the Principles of Criminal Procedure
Authors: Inga Žukovaitė
Abstract:
This paper aims to present postdoc research on remote criminal proceedings in court. In this period, when most countries have introduced the possibility of remote criminal proceedings in their procedural laws, it is not only possible to identify the weaknesses and strengths of the legal regulation but also assess the effectiveness of the instrument used and to develop an approach to the process. The example of some countries (for example, Italy) shows, on the one hand, that criminal procedure, based on orality and immediacy, does not lend itself to easy modifications that pose even a slight threat of devaluation of these principles in a society with well-established traditions of this procedure. On the other hand, such strong opposition and criticism make us ask whether we are facing the possibility of rethinking the traditional ways to understand the safeguards in order to preserve their essence without devaluing their traditional package but looking for new components to replace or compensate for the so-called “loss” of safeguards. The reflection on technological progress in the field of criminal procedural law indicates the need to rethink, on the basis of fundamental procedural principles, the safeguards that can replace or compensate for those that are in crisis as a result of the intervention of technological progress. Discussions in academic doctrine on the impact of technological interventions on the proceedings as such or on the limits of such interventions refer to the principles of criminal procedure as to a point of reference. In the context of the inferiority of technology, scholarly debate still addresses the issue of whether the court will not gradually become a mere site for the exercise of penal power with the resultant consequences – the deformation of the procedure itself as a physical ritual. In this context, this work seeks to illustrate the relationship between remote criminal proceedings in court and the principle of immediacy, the concept of which is based on the application of different models of criminal procedure (inquisitorial and adversarial), the aim is to assess the challenges posed for legal regulation by the interaction of technological progress with the principles of criminal procedure. The main hypothesis to be tested is that the adoption of remote proceedings is directly linked to the prevailing model of criminal procedure, arguing that the more principles of the inquisitorial model are applied to the criminal process, the more remote criminal trial is acceptable, and conversely, the more the criminal process is based on an adversarial model, more the remote criminal process is seen as incompatible with the principle of immediacy. In order to achieve this goal, the following tasks are set: to identify whether there is a difference in assessing remote proceedings with the immediacy principle between the adversarial model and the inquisitorial model, to analyse the main aspects of the regulation of remote criminal proceedings based on the examples of different countries (for example Lithuania, Italy, etc.).Keywords: remote criminal proceedings, principle of orality, principle of immediacy, adversarial model inquisitorial model
Procedia PDF Downloads 685189 Hedonic Motivations for Online Shopping
Authors: Pui-Lai To, E-Ping Sung
Abstract:
The purpose of this study is to investigate hedonic online shopping motivations. A qualitative analysis was conducted to explore the factors influencing online hedonic shopping motivations. The results of the study indicate that traditional hedonic values, consisting of social, role, self-gratification, learning trends, pleasure of bargaining, stimulation, diversion, status, and adventure, and dimensions of flow theory, consisting of control, curiosity, enjoyment, and telepresence, exist in the online shopping environment. Two hedonic motivations unique to Internet shopping, privacy and online shopping achievement, were found. It appears that the most important hedonic value to online shoppers is having the choice to interact or not interact with others while shopping on the Internet. This study serves as a basis for the future growth of Internet marketing.Keywords: internet shopping, shopping motivation, hedonic motivation
Procedia PDF Downloads 4765188 The Role of Hausa Oral Praise Singer in Conflict Management and Social Mobilization in Nigeria
Authors: Ladan Surajo
Abstract:
Nigeria as a third world country is full of people who cannot read and write, thereby constituting a stumbling block to the modern way of communication. It is a well known fact that Nigeria is a heterogeneous country with an estimated 450 or more ethnic groups communicating in divergent languages. Despite this scenario, English, Hausa, Igbo and Yoruba languages are predominantly used in the country. Apart from English language, Hausa has a wider coverage of usage among the indigenous languages in Nigeria, thereby using it in the area of social mobilization and conflict management cannot be overemphasized. Hausa Oral Singers are depicting their artistic and God endowed talents through singing to mobilize and sensitize the local communities about government programmes and the ills of other social problems of the society. It is the belief of this researcher that if used properly, the Hausa Oral Singers will assist immensely in reducing to the barest minimum some social ills of the society in Nigeria. More so that music is the food of the heart and has a resounding impact in changing the behaviour of individuals and groups.Keywords: oral, singers, praise, social mobilization, conflict management
Procedia PDF Downloads 4625187 Investigating Cultural Identities in Contemporary Greek Art: the Case of Greek Artists in Paris in 1980s
Authors: Sapfo Mortaki
Abstract:
Over the years, Greeks were leaving their homeland looking for better luck, including artists - painters and sculptors. Until mid-1940's, few were the ones who lived, worked, studied and were distinguished abroad. After the end of the Second World War, the group exit towards the cultural centers of the West commences. Since the mid-1970s, and especially in the early 1980s, Modern Greek Diaspora has undergone a new period. The creation of the European Community affects both the character of the immigration of artists as well as the creation of their identity within cultural pluralism. Since 1980 the situation in Greece changed significantly, and the contacts of artists with their homeland became greatly enhanced. Based on the above, this paper examines the cultural identity of the Greek artists in Paris during the 1980s, in comparison to the creation of the identity of the artists of the previous migratory movements, since this decade constitutes a critical point. Their cultural presence in Paris, as reflected in French and Greek daily press and journals of the period, is also investigated. At the same time, their connection with Greece and their contribution to the development and evolution of Contemporary Greek Art is discussed.Keywords: artistic migration in Paris, cultural identity, cultural interaction, greek artists, greek contemporary art
Procedia PDF Downloads 3335186 Tracing Economic Policies to Ancient Indian Economic Thought
Authors: Satish Y. Deodhar
Abstract:
Science without history is like a man without memory. The colossal history of India stores many ideas on economic ethics and public policy, which have been forgotten in the course of time. This paper is an attempt to bring to the fore contributions from ancient Indian treatises. In this context, the paper briefly summarizes alternative economic ideas such as communism, capitalism, and the holistic approach of ancient Indian writings. Thereafter, the idea of a welfare brick for an individual consisting of three dimensions -Purusharthas, Ashramas, and Varnas is discussed. Given the contours of the welfare brick, the concept of the state, its economic policies, markets, prices, interest rates, and credit are covered next. This is followed by delving into the treatment of land, property rights, guilds, and labour relations. The penultimate section summarises the economic advice offered to the head of a household in the treatise Shukranitisara. Finally, in concluding comments, the relevance of ancient Indian writings for modern times is discussed -both for pedagogy and economic policies.Keywords: ancient Indian treatises, history of economic thought, science of political economy, Sanskrit
Procedia PDF Downloads 975185 Fuelwood Heating, Felling, Energy Renewing in Total Fueling of Fuelwood, Renewable Technologies
Authors: Adeiza Matthew, Oluwamishola Abubakar
Abstract:
In conclusion, Fuelwood is a traditional and renewable source of energy that can have both positive and negative impacts. Adopting sustainable practices for its collection, transportation, and use and investing in renewable technologies can help mitigate the negative effects and provide a clean and reliable source of energy, improve living standards and support economic development. For example, solar energy can be used to generate electricity, heat homes and water, and can even be used for cooking. Wind energy can be used to generate electricity, and geothermal energy can be used for heating and cooling. Biogas can be produced from waste products such as animal manure, sewage, and organic kitchen waste and can be used for cooking and lighting.Keywords: calorific, BTU, wood moisture content, density of wood
Procedia PDF Downloads 1075184 Semantic Features of Turkish and Spanish Phraseological Units with a Somatic Component ‘Hand’
Authors: Narmina Mammadova
Abstract:
In modern linguistics, the comparative study of languages is becoming increasingly popular, the typology and comparison of languages that have different structures is expanding and deepening. Of particular interest is the study of phraseological units, which makes it possible to identify the specific features of the compared languages in all their national identity. This paper gives a brief analysis of the comparative study of somatic phraseological units (SFU) of the Spanish and Turkish languages with the component "hand" in the semantic aspect; identification of equivalents, analogs and non-equivalent units, as well as a description of methods of translation of non-equivalent somatic phraseological units. Comparative study of the phraseology of unrelated languages is of particular relevance since it allows us to identify both general, universal features and differential and specific features characteristic of a particular language. Based on the results of the generalization of the study, it can be assumed that phraseological units containing a somatic component have a high interlingual phraseological activity, which contributes to an increase in the degree of interlingual equivalence.Keywords: Linguoculturology, Turkish, Spanish, language picture of the world, phraseological units, semantic microfield
Procedia PDF Downloads 1965183 Developed CNN Model with Various Input Scale Data Evaluation for Bearing Faults Prognostics
Authors: Anas H. Aljemely, Jianping Xuan
Abstract:
Rolling bearing fault diagnosis plays a pivotal issue in the rotating machinery of modern manufacturing. In this research, a raw vibration signal and improved deep learning method for bearing fault diagnosis are proposed. The multi-dimensional scales of raw vibration signals are selected for evaluation condition monitoring system, and the deep learning process has shown its effectiveness in fault diagnosis. In the proposed method, employing an Exponential linear unit (ELU) layer in a convolutional neural network (CNN) that conducts the identical function on positive data, an exponential nonlinearity on negative inputs, and a particular convolutional operation to extract valuable features. The identification results show the improved method has achieved the highest accuracy with a 100-dimensional scale and increase the training and testing speed.Keywords: bearing fault prognostics, developed CNN model, multiple-scale evaluation, deep learning features
Procedia PDF Downloads 2105182 The Golden Ratio as a Common ‘Topos’ of Architectural, Musical and Stochastic Research of Iannis Xenakis
Authors: Nikolaos Mamalis
Abstract:
The work of the eminent architect and composer has undoubtedly been influenced both by his architecture and collaboration with Le Corbusier and by the conquests of the musical avant-garde of the 20th century (Schoenberg, Messian, Bartock, electroacoustic music). It is known that the golden mean and the Fibonacci sequence played a momentous role in the Architectural Avant-garde (Modulor) and expanded on musical pursuits. Especially in the 50s (serialism), it was a structural tool for composition. Xenakis' architectural and musical work (Sacrifice, Metastasis, Rebonds, etc.) received the influence of the Golden Section, as has been repeatedly demonstrated. However, the idea of this retrospective sequence and the reflection raised by the search for new proportions, both in the architectural and the musical work of Xenakis, was not limited to constituting a step, a workable formula that acted unifyingly with regard to the other parameters of the musical work, or as an aesthetic model that makes sense - philosophically and poetically - an anthropocentric dimension as in other composers (see Luigi Nono) ̇ triggered a qualitative leap, an opening of the composer to the assimilation of mathematical concepts and scientific types in music and the consolidation of new sound horizons of stochastic music.Keywords: golden ratio, music, space, stochastic music
Procedia PDF Downloads 525181 Factors Influencing the Adoption of Interpersonal Communication Media to Maximize Business Competitiveness among Small and Medium Enterprises in Hong Kong: Industry Types and Entrepreneur Characteristics
Authors: Olivine Lo
Abstract:
Small- and Medium-Sized Enterprises (SMEs) consist of a broad variety of businesses, ranging from small grocery shops to manufacturing concerns. Some are dynamic and innovative, while others are more traditional. The definition of SMEs varies by country but is most determined by the number of employees, though business assets and sales revenues are alternative measures. There are eight main types of SME industries in Hong Kong: garment, electronics, plastics, metal and machinery, trading and logistics, building, manufacturing, and service industries. Information exchange is a key goal of human communication, and communicators have used a variety of media to maintain relationships through traditional face-to-face interactions and written forms like letters and faxes. With the advancement of mediated-interpersonal communication media from telephone to synchronic online tools like email, instant messaging, voice messaging, and video conferencing for sustaining relationships, particularly enabling geographically distanced relationships. Although these synchronous tools are gaining popularity, they are facilitating relationship maintenance in everyday life and complementing rather than replacing the more conventional face-to-face interactions. This study will test if there are any variances in effects by industry type among Hong Kong SMEs. The competitiveness of the business environment refers to the competition faced by a business within its particular industry. The more intense the competition in a given sector, the greater the potential for strategic uses of specific needs in a business. Both internal organization characteristics and external environments may affect firm performance and financial resources. The level of competitiveness within an industry will be a more reliable indicator to show how Hong Kong SMEs are striving to achieve their business goals using different techniques in their communication media preferences, rather than mere classification by industry type. This study thus divides the competitiveness of the business environment into internal and external: (1) the internal environment competition is the inherent competitiveness of the products or services provided by the SMEs, whereas (2) the external environment competition includes the economic and political realities and competitors joining the market. This study will test various organizational characteristics and competitiveness of the business environment to predict entrepreneurs’ communication media preferences.Keywords: competitiveness of business environment, small- and medium-sized enterprises, organizational characteristics, communication media preference
Procedia PDF Downloads 315180 The Mental Health of Indigenous People During the COVID-19 Pandemic: A Scoping Review
Authors: Suzanne L. Stewart, Sarah J. Ponton, Mikaela D. Gabriel, Roy Strebel, Xinyi Lu
Abstract:
Indigenous Peoples have faced unique barriers to accessing and receiving culturally safe and appropriate mental health care while also facing daunting rates of mental health diagnoses and comorbidities. Indigenous researchers and clinicians have well established the connection of the current mental health issues in Indigenous communities as a direct result of colonization by way of intergenerational trauma throughout Canada’s colonial history. Such mental health barriers and challenges have become exacerbated during the COVID-19 pandemic. Throughout the pandemic, access to mental health, cultural, ceremonial, and community services were severely impacted and restricted; however, it is these same cultural activities and community resources that are key to supporting Indigenous mental health from a traditional and community-based perspective. This research employed a unique combination of a thorough, analytical scoping review of the existent mental health literature of Indigenous mental health in the COVID-19 pandemic, alongside narrative interviews employing an oral storytelling tradition methodology with key community informants that provide comprehensive cultural services to the Indigenous community of Toronto, as well as across Canada. These key informant interviews provided a wealth of insights into virtual transitions of Indigenous care and mental health support; intersections of historical underfunding and current financial navigation in technology infrastructure; accessibility and connection with Indigenous youth in remote locations; as well as maintaining community involvement and traditional practices in a current pandemic. Both the scoping review and narrative interviews were meticulously analyzed for overarching narrative themes to best explore the extent of the literature on Indigenous mental health and services during COVID-19; identify gaps in this literature; identify barriers and supports for the Indigenous community, and explore the intersection of community and cultural impacts to mental health. Themes of the scoping review included: Historical Context; Challenges in Culturally-Based Services; and Strengths in Culturally-Based Services. Meta themes across narrative interviews included: Virtual Transitions; Financial Support for Indigenous Services; Health Service Delivery & Wellbeing; and Culture & Community Connection. The results of this scoping review and narrative interviews provide wide application and contribution to the mental health literature, as well as recommendations for policy, service provision, autonomy in Indigenous health and wellbeing, and crucial insights into the present and enduring mental health needs of Indigenous Peoples throughout the COVID-19 pandemic.Keywords: indigenous community services, indigenous mental health, indigenous scoping review, indigenous peoples and Covid-19
Procedia PDF Downloads 2415179 Evaluations of 3D Concrete Printing Produced in the Environment of United Arab Emirates
Authors: Adil K. Tamimi, Tarig Ali, Rawan Anoohi, Ahmed Rajput, Kaltham Alkamali
Abstract:
3D concrete printing is one of the most innovative and modern techniques in the field of construction that achieved several milestones in that field for the following advantages: saving project’s time, ability to execute complicated shapes, reduce waste and low cost. However, the concept of 3D printing in UAE is relatively new where construction teams, including clients, consultants, and contractors, do not have the required knowledge and experience in the field. This is the most significant obstacle for the construction parties, which make them refrained from using 3D concrete printing compared to conventional concreting methods. This study shows the historical development of the 3D concrete printing, its advantages, and the challenges facing this innovation. Concrete mixes and materials have been proposed and evaluated to select the best combination for successful 3D concrete printing. The main characteristics of the 3D concrete printing in the fresh and hardened states are considered, such as slump test, flow table, compressive strength, tensile, and flexural strengths. There is need to assess the structural stability of the 3D concrete by testing the bond between interlayers of the concrete.Keywords: 3D printing, workability, compressive strength, robots, dimensions
Procedia PDF Downloads 1465178 Performance Comparison of ADTree and Naive Bayes Algorithms for Spam Filtering
Authors: Thanh Nguyen, Andrei Doncescu, Pierre Siegel
Abstract:
Classification is an important data mining technique and could be used as data filtering in artificial intelligence. The broad application of classification for all kind of data leads to be used in nearly every field of our modern life. Classification helps us to put together different items according to the feature items decided as interesting and useful. In this paper, we compare two classification methods Naïve Bayes and ADTree use to detect spam e-mail. This choice is motivated by the fact that Naive Bayes algorithm is based on probability calculus while ADTree algorithm is based on decision tree. The parameter settings of the above classifiers use the maximization of true positive rate and minimization of false positive rate. The experiment results present classification accuracy and cost analysis in view of optimal classifier choice for Spam Detection. It is point out the number of attributes to obtain a tradeoff between number of them and the classification accuracy.Keywords: classification, data mining, spam filtering, naive bayes, decision tree
Procedia PDF Downloads 4115177 Consumer Complicity toward Luxury in Developing Countries
Authors: Marisa Hakim
Abstract:
After all, collectivism moderate is one of the biggest issues that drive complicit behavior toward luxury in Indonesia and Thailand. The nature of collectivism that we find on this research would probably break the problems of the gap about the nature of complicit behavior. Precisely, we could probably drive to the further research about: 'Is there any pattern to describe consumer behavior toward counterfeit luxury goods among market in developing countries? Furthermore, is there any possibility to manipulate that pattern and bring the new concept of local/traditional luxury teste toward consumers in developing countries?'Keywords: complicity, consumer complicity, counterfeit, consumer behavior, luxury goods, marketing, Indonesia, Thailand
Procedia PDF Downloads 2695176 Socioeconomic Values and Administration in Northern Nigeria: An Examination of the Impacts of Dearth of Values
Authors: Hassan Alhaji Hassan, Inuwa Abdu Ibrahim
Abstract:
The research looks at the decaying socioeconomic values in northern Nigeria, which is directly affecting the administration of service at different levels. The aim is to establish the consequence of a valueless society on individual and public life at different levels. The result of governments’ continued neglect of education, societal values, which have negatively affected societal development and indeed development in general. Therefore, focus is on governments’ poor performance in Nigeria, using secondary sources of data. In conclusion, the research asserts the need for the application of the values of some traditional values as personal principles and good governance as the way out of the present deteriorating conditions.Keywords: socioeconomic, values, education, Northern Nigeria, good governance
Procedia PDF Downloads 3905175 Toward Automatic Chest CT Image Segmentation
Authors: Angely Sim Jia Wun, Sasa Arsovski
Abstract:
Numerous studies have been conducted on the segmentation of medical images. Segmenting the lungs is one of the common research topics in those studies. Our research stemmed from the lack of solutions for automatic bone, airway, and vessel segmentation, despite the existence of multiple lung segmentation techniques. Consequently, currently, available software tools used for medical image segmentation do not provide automatic lung, bone, airway, and vessel segmentation. This paper presents segmentation techniques along with an interactive software tool architecture for segmenting bone, lung, airway, and vessel tissues. Additionally, we propose a method for creating binary masks from automatically generated segments. The key contribution of our approach is the technique for automatic image thresholding using adjustable Hounsfield values and binary mask extraction. Generated binary masks can be successfully used as a training dataset for deep-learning solutions in medical image segmentation. In this paper, we also examine the current software tools used for medical image segmentation, discuss our approach, and identify its advantages.Keywords: lung segmentation, binary masks, U-Net, medical software tools
Procedia PDF Downloads 985174 Knowledge Reactor: A Contextual Computing Work in Progress for Eldercare
Authors: Scott N. Gerard, Aliza Heching, Susann M. Keohane, Samuel S. Adams
Abstract:
The world-wide population of people over 60 years of age is growing rapidly. The explosion is placing increasingly onerous demands on individual families, multiple industries and entire countries. Current, human-intensive approaches to eldercare are not sustainable, but IoT and AI technologies can help. The Knowledge Reactor (KR) is a contextual, data fusion engine built to address this and other similar problems. It fuses and centralizes IoT and System of Record/Engagement data into a reactive knowledge graph. Cognitive applications and services are constructed with its multiagent architecture. The KR can scale-up and scaledown, because it exploits container-based, horizontally scalable services for graph store (JanusGraph) and pub-sub (Kafka) technologies. While the KR can be applied to many domains that require IoT and AI technologies, this paper describes how the KR specifically supports the challenging domain of cognitive eldercare. Rule- and machine learning-based analytics infer activities of daily living from IoT sensor readings. KR scalability, adaptability, flexibility and usability are demonstrated.Keywords: ambient sensing, AI, artificial intelligence, eldercare, IoT, internet of things, knowledge graph
Procedia PDF Downloads 1755173 Modern Technologies and Equipment for Modular-Aggregate Installation of Shipborne Equipment
Authors: A. O. Mikhailov, N. I. Gerasimov, K. N. Morozov, I. V. Grachev
Abstract:
The most advanced method of onboard equipment installation on the world shipbuilding practice is modular method, or modularization. The main idea of this is assembly of equipment, pipelines and hull structures in so called assembly units yet at the shopfloor. Those assembly units are thereafter loaded and installed inside the ship's hull. This allows to reduce labour intensiveness and significantly improve assembly quality, due to the fact that a good part of installation work is performed in the shops, instead of restricted onboard premises. Also, this method allows performing equipment installation at very early stages of hull erection. This practice is widely spread in naval submarines building. However, in merchant shipbuilding, equipment is installed mostly individually. To implement modular principles of equipment installation in designing and construction of civil ships and marine rigs, some new technologies are being developed in the following areas. The paper contains main principles and already achieved results in the above mentioned areas.Keywords: assembly and installation technology, onboard equipment installation, large-scale assembly units, modular method
Procedia PDF Downloads 6605172 Application of Directed Acyclic Graphs for Threat Identification Based on Ontologies
Authors: Arun Prabhakar
Abstract:
Threat modeling is an important activity carried out in the initial stages of the development lifecycle that helps in building proactive security measures in the product. Though there are many techniques and tools available today, one of the common challenges with the traditional methods is the lack of a systematic approach in identifying security threats. The proposed solution describes an organized model by defining ontologies that help in building patterns to enumerate threats. The concepts of graph theory are applied to build the pattern for discovering threats for any given scenario. This graph-based solution also brings in other benefits, making it a customizable and scalable model.Keywords: directed acyclic graph, ontology, patterns, threat identification, threat modeling
Procedia PDF Downloads 1395171 Innovative Handloom Design Techniques- an Experimental Study Based on Primary Colour Gradation
Authors: Akanksha Pareek
Abstract:
The Indian Handloom clusters are known for its tradition and heritage of excellent craftsmanship. The design development of Indian handloom clusters are oriented on traditionally dobby and jacquard design. This comprehensive paper proposes practises on handloom woven design based on primary colour gradation with the help of basic weaved on four shaft. The innovative design ideas are inspired from Nature and transferred into the handloom samples to achieve colour gradation with primary colours. In this paper, design methodology where in woven samples are strategically designed in such way that traditional knowledge of the weavers will be oriented to leveraged their skills.Keywords: handloom, weaving, colour gradation, shaft
Procedia PDF Downloads 6175170 Negative Sequence-Based Protection Techniques for Microgrid Connected Power Systems
Authors: Isabelle Snyder, Travis Smith
Abstract:
Microgrid protection presents challenges to conventional protection techniques due to the low-induced fault current. Protection relays present in microgrid applications require a combination of settings groups to adjust based on the architecture of the microgrid in islanded and grid-connected modes. In a radial system where the microgrid is at the other end of the feeder, directional elements can be used to identify the direction of the fault current and switch settings groups accordingly (grid-connected or microgrid-connected). However, with multiple microgrid connections, this concept becomes more challenging, and the direction of the current alone is not sufficient to identify the source of the fault current contribution. ORNL has previously developed adaptive relaying schemes through other DOE-funded research projects that will be evaluated and used as a baseline for this research. The four protection techniques in this study are labeled as follows: (1) Adaptive Current only Protection System (ACPS), Intentional (2) Unbalanced Control for Protection Control (IUCPC), (3) Adaptive Protection System with Communication Controller (APSCC) (4) Adaptive Model-Driven Protective Relay (AMDPR).Keywords: adaptive relaying, microgrid protection, sequence components, islanding detection
Procedia PDF Downloads 975169 An Industrial Scada System Remote Control Using Mobile Phones
Authors: Ahmidah Elgali
Abstract:
SCADA is the abbreviation for "Administrative Control And Data Acquisition." SCADA frameworks are generally utilized in industry for administrative control and information securing of modern cycles. Regular SCADA frameworks use PC, journal, slim client, and PDA as a client. In this paper, a Java-empowered cell phone has been utilized as a client in an example SCADA application to show and regulate the place of an example model crane. The paper presents a genuine execution of the online controlling of the model crane through a cell phone. The remote correspondence between the cell phone and the SCADA server is performed through a base station by means of general parcel radio assistance GPRS and remote application convention WAP. This application can be used in industrial sites in areas that are likely to be exposed to a security emergency (like terrorist attacks) which causes the sudden exit of the operators; however, no time to perform the shutdown procedures for the plant. Hence this application allows shutting down units and equipment remotely by mobile and so avoids damage and losses.Keywords: control, industrial, mobile, network, remote, SCADA
Procedia PDF Downloads 785168 Axiomatic Design of Laser Beam Machining Process
Authors: Nikhil Deshpande, Rahul Mahajan
Abstract:
Laser Beam Machining (LBM) is a non-traditional machining process that has inherent problems like dross, striation, and Heat Affected Zone (HAZ) which reduce the quality of machining. In the present day scenario, these problems are controlled only by iteratively adjusting a large number of process parameters. This paper applies Axiomatic Design principles to design LBM process so as to eliminate the problem of dross and striation and minimize the effect of HAZ. Process parameters and their ranges are proposed to set-up the LBM process, execute the cut and finish the workpiece so as to obtain the best quality cut.Keywords: laser beam machining, dross, striation, heat affected zone, axiomatic design
Procedia PDF Downloads 3705167 Characterization of Onboard Reliable Error Correction Code FORSDRAM Controller
Authors: N. Pitcheswara Rao
Abstract:
In the process of conveying the information there may be a chance of signal being corrupted which leads to the erroneous bits in the message. The message may consist of single, double and multiple bit errors. In high-reliability applications, memory can sustain multiple soft errors due to single or multiple event upsets caused by environmental factors. The traditional hamming code with SEC-DED capability cannot be address these types of errors. It is possible to use powerful non-binary BCH code such as Reed-Solomon code to address multiple errors. However, it could take at least a couple dozen cycles of latency to complete first correction and run at a relatively slow speed. In order to overcome this drawback i.e., to increase speed and latency we are using reed-Muller code.Keywords: SEC-DED, BCH code, Reed-Solomon code, Reed-Muller code
Procedia PDF Downloads 4285166 Distributed Energy System - Microgrid Integration of Hybrid Power Systems
Authors: Pedro Esteban
Abstract:
Planning a hybrid power system (HPS) that integrates renewable generation sources, non-renewable generation sources and energy storage, involves determining the capacity and size of various components to be used in the system to be able to supply reliable electricity to the connected load as required. Nowadays it is very common to integrate solar photovoltaic (PV) power plants for renewable generation as part of HPS. The solar PV system is usually balanced via a second form of generation (renewable such as wind power or using fossil fuels such as a diesel generator) or an energy storage system (such as a battery bank). Hybrid power systems can also provide other forms of power such as heat for some applications. Modern hybrid power systems combine power generation and energy storage technologies together with real-time energy management and innovative power quality and energy efficiency improvement functionalities. These systems help customers achieve targets for clean energy generation, they add flexibility to the electrical grid, and they optimize the installation by improving its power quality and energy efficiency.Keywords: microgrids, hybrid power systems, energy storage, grid code compliance
Procedia PDF Downloads 1465165 The Protection of Artificial Intelligence (AI)-Generated Creative Works Through Authorship: A Comparative Analysis Between the UK and Nigerian Copyright Experience to Determine Lessons to Be Learnt from the UK
Authors: Esther Ekundayo
Abstract:
The nature of AI-generated works makes it difficult to identify an author. Although, some scholars have suggested that all the players involved in its creation should be allocated authorship according to their respective contribution. From the programmer who creates and designs the AI to the investor who finances the AI and to the user of the AI who most likely ends up creating the work in question. While others suggested that this issue may be resolved by the UK computer-generated works (CGW) provision under Section 9(3) of the Copyright Designs and Patents Act 1988. However, under the UK and Nigerian copyright law, only human-created works are recognised. This is usually assessed based on their originality. This simply means that the work must have been created as a result of its author’s creative and intellectual abilities and not copied. Such works are literary, dramatic, musical and artistic works and are those that have recently been a topic of discussion with regards to generative artificial intelligence (Generative AI). Unlike Nigeria, the UK CDPA recognises computer-generated works and vests its authorship with the human who made the necessary arrangement for its creation . However, making necessary arrangement in the case of Nova Productions Ltd v Mazooma Games Ltd was interpreted similarly to the traditional authorship principle, which requires the skills of the creator to prove originality. Although, some recommend that computer-generated works complicates this issue, and AI-generated works should enter the public domain as authorship cannot be allocated to AI itself. Additionally, the UKIPO recognising these issues in line with the growing AI trend in a public consultation launched in the year 2022, considered whether computer-generated works should be protected at all and why. If not, whether a new right with a different scope and term of protection should be introduced. However, it concluded that the issue of computer-generated works would be revisited as AI was still in its early stages. Conversely, due to the recent developments in this area with regards to Generative AI systems such as ChatGPT, Midjourney, DALL-E and AIVA, amongst others, which can produce human-like copyright creations, it is therefore important to examine the relevant issues which have the possibility of altering traditional copyright principles as we know it. Considering that the UK and Nigeria are both common law jurisdictions but with slightly differing approaches to this area, this research, therefore, seeks to answer the following questions by comparative analysis: 1)Who is the author of an AI-generated work? 2)Is the UK’s CGW provision worthy of emulation by the Nigerian law? 3) Would a sui generis law be capable of protecting AI-generated works and its author under both jurisdictions? This research further examines the possible barriers to the implementation of the new law in Nigeria, such as limited technical expertise and lack of awareness by the policymakers, amongst others.Keywords: authorship, artificial intelligence (AI), generative ai, computer-generated works, copyright, technology
Procedia PDF Downloads 97