Search results for: input theory
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6621

Search results for: input theory

6291 Induction Motor Analysis Using LabVIEW

Authors: E. Ramprasath, P. Manojkumar, P. Veena

Abstract:

Proposed paper dealt with the modelling and analysis of induction motor based on the mathematical expression using the graphical programming environment of Laboratory Virtual Instrument Engineering Workbench (LabVIEW). Induction motor modelling with the mathematical expression enables the motor to be simulated with the various required parameters. Owing to the invention of variable speed drives study about the induction motor characteristics became complex.In this simulation motor internal parameter such as stator resistance and reactance, rotor resistance and reactance, phase voltage, frequency and losses will be given as input. By varying the speed of motor corresponding parameters can be obtained they are input power, output power, efficiency, torque induced, slip and current.

Keywords: induction motor, LabVIEW software, modelling and analysi, electrical and mechanical characteristics of motor

Procedia PDF Downloads 545
6290 An Encapsulation of a Navigable Tree Position: Theory, Specification, and Verification

Authors: Nicodemus M. J. Mbwambo, Yu-Shan Sun, Murali Sitaraman, Joan Krone

Abstract:

This paper presents a generic data abstraction that captures a navigable tree position. The mathematical modeling of the abstraction encapsulates the current tree position, which can be used to navigate and modify the tree. The encapsulation of the tree position in the data abstraction specification avoids the use of explicit references and aliasing, thereby simplifying verification of (imperative) client code that uses the data abstraction. To ease the tasks of such specification and verification, a general tree theory, rich with mathematical notations and results, has been developed. The paper contains an example to illustrate automated verification ramifications. With sufficient tree theory development, automated proving seems plausible even in the absence of a special-purpose tree solver.

Keywords: automation, data abstraction, maps, specification, tree, verification

Procedia PDF Downloads 148
6289 Cognitive Theory and the Design of Integrate Curriculum

Authors: Bijan Gillani, Roya Gillani

Abstract:

The purpose of this paper is to propose a pedagogical model where engineering provides the interconnection to integrate the other topics of science, technology, engineering, and mathematics. The author(s) will first present a brief discussion of cognitive theory and then derive an integrated pedagogy to use engineering and technology, such as drones, sensors, camera, iPhone, radio waves as the nexus to an integrated curriculum development for the other topics of STEM. Based on this pedagogy, one example developed by the author(s) called “Drones and Environmental Science,” will be presented that uses a drone and related technology as an appropriate instructional delivery medium to apply Piaget’s cognitive theory to create environments that promote the integration of different STEM subjects that relate to environmental science.

Keywords: cogntive theories, drone, environmental science, pedagogy

Procedia PDF Downloads 561
6288 Design of an Augmented Automatic Choosing Control with Constrained Input by Lyapunov Functions Using Gradient Optimization Automatic Choosing Functions

Authors: Toshinori Nawata

Abstract:

In this paper a nonlinear feedback control called augmented automatic choosing control (AACC) for a class of nonlinear systems with constrained input is presented. When designing the control, a constant term which arises from linearization of a given nonlinear system is treated as a coefficient of a stable zero dynamics. Parameters of the control are suboptimally selected by maximizing the stable region in the sense of Lyapunov with the aid of a genetic algorithm. This approach is applied to a field excitation control problem of power system to demonstrate the splendidness of the AACC. Simulation results show that the new controller can improve performance remarkably well.

Keywords: augmented automatic choosing control, nonlinear control, genetic algorithm, zero dynamics

Procedia PDF Downloads 463
6287 Conflation Methodology Applied to Flood Recovery

Authors: Eva L. Suarez, Daniel E. Meeroff, Yan Yong

Abstract:

Current flooding risk modeling focuses on resilience, defined as the probability of recovery from a severe flooding event. However, the long-term damage to property and well-being by nuisance flooding and its long-term effects on communities are not typically included in risk assessments. An approach was developed to address the probability of recovering from a severe flooding event combined with the probability of community performance during a nuisance event. A consolidated model, namely the conflation flooding recovery (&FR) model, evaluates risk-coping mitigation strategies for communities based on the recovery time from catastrophic events, such as hurricanes or extreme surges, and from everyday nuisance flooding events. The &FR model assesses the variation contribution of each independent input and generates a weighted output that favors the distribution with minimum variation. This approach is especially useful if the input distributions have dissimilar variances. The &FR is defined as a single distribution resulting from the product of the individual probability density functions. The resulting conflated distribution resides between the parent distributions, and it infers the recovery time required by a community to return to basic functions, such as power, utilities, transportation, and civil order, after a flooding event. The &FR model is more accurate than averaging individual observations before calculating the mean and variance or averaging the probabilities evaluated at the input values, which assigns the same weighted variation to each input distribution. The main disadvantage of these traditional methods is that the resulting measure of central tendency is exactly equal to the average of the input distribution’s means without the additional information provided by each individual distribution variance. When dealing with exponential distributions, such as resilience from severe flooding events and from nuisance flooding events, conflation results are equivalent to the weighted least squares method or best linear unbiased estimation. The combination of severe flooding risk with nuisance flooding improves flood risk management for highly populated coastal communities, such as in South Florida, USA, and provides a method to estimate community flood recovery time more accurately from two different sources, severe flooding events and nuisance flooding events.

Keywords: community resilience, conflation, flood risk, nuisance flooding

Procedia PDF Downloads 88
6286 A Theory of Aftercare for Human Trafficking Survivors: A Grounded Theory Analysis of Survivors and Aftercare Providers in South Africa

Authors: Robyn L. Curran, Joanne R. Naidoo, Gugu Mchunu

Abstract:

Along with the increasing awareness of human trafficking, is the acknowledgement that it is no longer just a social problem but also a significant public health problem that requires both increased knowledge and the specialist equipping of aftercare providers such as nurses who care for human trafficking survivors. Current discourse regarding aftercare of human trafficking survivors, is that approaches do not clearly explain the function or content of aftercare and what aftercare entails. Although psychological and medical aftercare are emphasized as important components, little practical attention is devoted to what these components actually involve and the effectiveness of current practice in aftercare. Review of the literature on the processes that take place from aftercare to empowerment, revealed the need for emphasis to be placed on the voices of survivors concerning their liberation from oppression. The aim of the study was to develop a theory for aftercare of human trafficking survivors, through analyzing the experiences of survivors and aftercare providers in shelters in three provinces in South Africa. Through using a Straussian grounded theory approach, the researcher developed a theory to inform care of human trafficking survivors in low resource settings using the voice of the survivors and those experienced in direct care of human trafficking survivors. Four human trafficking survivors and three aftercare providers from three shelters in three provinces in South Africa were individually interviewed in order for the theory to emerge. The findings of the study elicited a theoretical model of the renewed self, and the conditions that facilitate this process in care of human trafficking survivors. The process that human trafficking survivors navigate to empowerment require mutual collaboration of the aftercare provider and survivor as the survivor awakens vision, confronts reality, re-salvages autonomy and liberates self. Psychological resilience of the survivor facilitates the transition to renewed self. The recommendations of this study may improve the nursing care provided to human trafficking survivors and equip professionals with knowledge and skills to promote the process of renewing self for survivors.

Keywords: aftercare, aftercare providers, grounded theory, human trafficking survivors

Procedia PDF Downloads 252
6285 A Grounded Theory on Marist Spirituality/Charism from the Perspective of the Lay Marists in the Philippines

Authors: Nino M. Pizarro

Abstract:

To the author’s knowledge, despite the written documents about Marist spirituality/charism, nothing has been done concerning a clear theoretical framework that highlights Marist spirituality/charism from the perspective or lived experience of the lay Marists of St. Marcellin Champagnat. The participants of the study are the lay Marist - educators who are from Marist Schools in the Philippines. Since the study would like to find out the respondents’ own concepts and meanings about Marist spirituality/charism, qualitative methodology is considered the approach to be used in the study. In particular, the study will use the qualitative methods of Barney Glaser. The theory will be generated systematically from data collection, coding and analyzing through memoing, theoretical sampling, sorting and writing and using the constant comparative method. The data collection method that will be employed in this grounded theory research is the in-depth interview that is semi-structured and participant driven. Data collection will be done through snowball sampling that is purposive. The study is considering to come up with a theoretical framework that will help the lay Marists to deepen their understanding of the Marist spirituality/charism and their vocation as lay partners of the Marist Brothers of the Schools.

Keywords: grounded theory, Lay Marists, lived experience, Marist spirituality/charism

Procedia PDF Downloads 292
6284 Improved Color-Based K-Mean Algorithm for Clustering of Satellite Image

Authors: Sangeeta Yadav, Mantosh Biswas

Abstract:

In this paper, we proposed an improved color based K-mean algorithm for clustering of satellite Image (SAR). Our method comprises of two stages. The first step is an interactive selection process where users are required to input the number of colors (ncolor), number of clusters, and then they are prompted to select the points in each color cluster. In the second step these points are given as input to K-mean clustering algorithm that clusters the image based on color and Minimum Square Euclidean distance. The proposed method reduces the mixed pixel problem to a great extent.

Keywords: cluster, ncolor method, K-mean method, interactive selection process

Procedia PDF Downloads 285
6283 55 dB High Gain L-Band EDFA Utilizing Single Pump Source

Authors: M. H. Al-Mansoori, W. S. Al-Ghaithi, F. N. Hasoon

Abstract:

In this paper, we experimentally investigate the performance of an efficient high gain triple-pass L-band Erbium-Doped Fiber (EDF) amplifier structure with a single pump source. The amplifier gain and noise figure variation with EDF pump power, input signal power and wavelengths have been investigated. The generated backward Amplified Spontaneous Emission (ASE) noise of the first amplifier stage is suppressed by using a tunable band-pass filter. The amplifier achieves a signal gain of 55 dB with low noise figure of 3.8 dB at -50 dBm input signal power. The amplifier gain shows significant improvement of 12.8 dB compared to amplifier structure without ASE suppression.

Keywords: optical amplifiers, EDFA, L-band, optical networks

Procedia PDF Downloads 331
6282 Rhetoric and Renarrative Structure of Digital Images in Trans-Media

Authors: Yang Geng, Anqi Zhao

Abstract:

The misreading theory of Harold Bloom provides a new diachronic perspective as an approach to the consistency between rhetoric of digital technology, dynamic movement of digital images and uncertain meaning of text. Reinterpreting the diachroneity of 'intertextuality' in the context of misreading theory extended the range of the 'intermediality' of transmedia to the intense tension between digital images and symbolic images throughout history of images. With the analogy between six categories of revisionary ratios and six steps of digital transformation, digital rhetoric might be illustrated as a linear process reflecting dynamic, intensive relations between digital moving images and original static images. Finally, it was concluded that two-way framework of the rhetoric of transformation of digital images and reversed served as a renarrative structure to revive static images by reconnecting them with digital moving images.

Keywords: rhetoric, digital art, intermediality, misreading theory

Procedia PDF Downloads 237
6281 Order vs. Justice: The Cases of Libya and Syria from the Perspective of the English School Theory

Authors: A. Gün Güneş

Abstract:

This study aims to explicate the functionality of the responsibility to protect (R2P) in terms of order and justice within the context of the main traditions of the English School theory. The conflicts in Libya and Syria and the response of the international society to these crises are analyzed in the pluralism-solidarism dichotomy of the English School. In this regard, the intervention under R2P in Libya exemplifies the solidaristic side emphasizing justice, while the non-intervention in Syria exemplifies the pluralistic side emphasizing order. This study discusses the cases of Libya and Syria on the basis of Great Powers.

Keywords: English school theory, international society, order, justice, responsibility to protect

Procedia PDF Downloads 413
6280 A Quasi Z-Source Based Full Bridge Isolated DC-DC Converter as a Power Module for PV System Connected to HVDC Grid

Authors: Xinke Huang, Huan Wang, Lidong Guo, Changbin Ju, Runbiao Liu, Guoen Cao, Yibo Wang, Honghua Xu

Abstract:

Grid connected photovoltaic (PV) power system is to be developed in the direction of large-scale, clustering. Large-scale PV generation systems connected to HVDC grid have many advantages compared to its counterpart of AC grid, and DC connection is the tendency. DC/DC converter as the most important device in the system, has become one of the hot spots recently. The paper proposes a Quasi Z-Source(QZS) based Boost Full Bridge Isolated DC/DC Converter(BFBIC) topology as a basis power module and combination through input parallel output series(IPOS) method to improve power capacity and output voltage to match with the HVDC grid. The topology has both traditional voltage source and current source advantages, it permit the H-bridge short through and open circuit, which adopt utility duty cycle control and achieved input current and output voltage balancing through input current sharing control strategy. A ±10kV/200kW system model is built in MATLAB/SIMULINK to verify the proposed topology and control strategy.

Keywords: PV Generation System, Cascaded DC/DC converter, HVDC, Quasi Z Source Converter

Procedia PDF Downloads 376
6279 A New Approach to the Digital Implementation of Analog Controllers for a Power System Control

Authors: G. Shabib, Esam H. Abd-Elhameed, G. Magdy

Abstract:

In this paper, a comparison of discrete time PID, PSS controllers is presented through small signal stability of power system comprising of one machine connected to infinite bus system. This comparison achieved by using a new approach of discretization which converts the S-domain model of analog controllers to a Z-domain model to enhance the damping of a single machine power system. The new method utilizes the Plant Input Mapping (PIM) algorithm. The proposed algorithm is stable for any sampling rate, as well as it takes the closed loop characteristic into consideration. On the other hand, the traditional discretization methods such as Tustin’s method is produce satisfactory results only; when the sampling period is sufficiently low.

Keywords: PSS, power system stabilizer PID, proportional-integral-derivative PIM, plant input mapping

Procedia PDF Downloads 492
6278 Myanmar Character Recognition Using Eight Direction Chain Code Frequency Features

Authors: Kyi Pyar Zaw, Zin Mar Kyu

Abstract:

Character recognition is the process of converting a text image file into editable and searchable text file. Feature Extraction is the heart of any character recognition system. The character recognition rate may be low or high depending on the extracted features. In the proposed paper, 25 features for one character are used in character recognition. Basically, there are three steps of character recognition such as character segmentation, feature extraction and classification. In segmentation step, horizontal cropping method is used for line segmentation and vertical cropping method is used for character segmentation. In the Feature extraction step, features are extracted in two ways. The first way is that the 8 features are extracted from the entire input character using eight direction chain code frequency extraction. The second way is that the input character is divided into 16 blocks. For each block, although 8 feature values are obtained through eight-direction chain code frequency extraction method, we define the sum of these 8 feature values as a feature for one block. Therefore, 16 features are extracted from that 16 blocks in the second way. We use the number of holes feature to cluster the similar characters. We can recognize the almost Myanmar common characters with various font sizes by using these features. All these 25 features are used in both training part and testing part. In the classification step, the characters are classified by matching the all features of input character with already trained features of characters.

Keywords: chain code frequency, character recognition, feature extraction, features matching, segmentation

Procedia PDF Downloads 302
6277 'Freud and Jung: Dissenting Friends'; An Analysis of the Foundations of the Psychoanalytical Theory in Theirs Letters

Authors: Laurence Doremus

Abstract:

Freud as the builder of psychoanalysis as a discipline had created the science with Carl Gustav Jung (1875-1961), a psychiatry specialist from Zurich who was very important in the Freudian theory. The knowledge about the foundation of psychoanalysis is often focused on the influence of the works from Breuer or Charcot in the Freudian praxis, at least at the beginning of his career, and Jung's influence is often under-estimated. The paper focuses on the importance of the Jungian contributions in Freud's theories at the beginning of the creation of the discipline in the 1910s. We often meet Jungian schools on the first hand and Freudian schools, on the other hand in the academic field, but the Freudian field has to admit the importance of the Jungian theories in Freudian science. And also, the dialectical energy which appears in the letters exchanged between both of the fathers of psychoanalysis is important to understand the foundations of Freud Theory. That's why the paper will analyze in detail the correspondence between them in an epistemological and historical approach. Effectively the letters were translated and published (in French but also in English and other languages) lately in history and are still not well knew by the researchers in the psychoanalytical field. We well explain how Freud was helped by Jung despite his desire to build the theory. We analyze how the second topic named 'unconscious, preconscious, and conscious', is the result of the first topic that Jung built with Freud. The paper is a contribution to the knowledge we should have about the intense friendship between the two protagonists.

Keywords: Carl Gustav Jung, correspondence, Freud's letters, psychoanalytic theory

Procedia PDF Downloads 136
6276 The Search for the Self in Psychotherapy: Findings from Relational Theory and Neuroanatomy

Authors: Harry G. Segal

Abstract:

The idea of the “self” has been essential ever since the early modern period in western culture, especially since the development of psychotherapy, but advances in neuroscience and cognitive theory challenge traditional notions of the self. More specifically, neuroanatomists have found no location of “the self” in the brain; instead, consciousness has been posited to be a rapid combination of perception, memory, anticipation of future events, and judgment. In this paper, a theoretical model is presented to address these neuroanatomical findings and to revise the historical understanding of “selfhood” in the practice of psychotherapy.

Keywords: the self, psychotherapy, the self and the brain

Procedia PDF Downloads 89
6275 Investigating Gender Differences in M-Learning Gameplay Adoption

Authors: Chih-Ping Chen

Abstract:

Despite the increasing popularity of and interest in mobile games, there has been little research that evaluates gender differences in users’ actual preferences for mobile game content, and the factors that influence entertainment and mobile-learning habits. To fill this void, this study examines different gender users’ experience of mobile English learning game adoption in order to identify the areas of development in Taiwan, using Uses and Gratification Theory, Expectation Confirmation Theory and experiential value. The integration of these theories forms the basis of an extended research concept. Users’ responses to questions about cognitive perceptions, confirmation, gratifications and continuous use were collected and analyzed with various factors derived from the theories.

Keywords: expectation confirmation theory, experiential value, gender difference, mobile game, uses and gratification

Procedia PDF Downloads 314
6274 Design of Fuzzy Logic Based Global Power System Stabilizer for Dynamic Stability Enhancement in Multi-Machine Power System

Authors: N. P. Patidar, J. Earnest, Laxmikant Nagar, Akshay Sharma

Abstract:

This paper describes the diligence of a new input signal based fuzzy power system stabilizer in multi-machine power system. Instead of conventional input pairs like speed deviation (∆ω) and derivative of speed deviation i.e. acceleration (∆ω ̇) or speed deviation and accelerating power deviation of each machine, in this paper, deviation of active power through the tie line colligating two areas is used as one of the inputs to the fuzzy logic controller in concurrence with the speed deviation. Fuzzy Logic has the features of simple concept, easy effectuation, and computationally efficient. The advantage of this input is that, the same signal can be fed to each of the fuzzy logic controller connected with each machine. The simulated system comprises of two fully symmetrical areas coupled together by two 230 kV lines. Each area is equipped with two superposable generators rated 20 kV/900MVA and area-1 is exporting 413 MW to area-2. The effectiveness of the proposed control scheme has been assessed by performing small signal stability assessment and transient stability assessment. The proposed control scheme has been compared with a conventional PSS. Digital simulation is used to demonstrate the performance of fuzzy logic controller.

Keywords: Power System Stabilizer (PSS), small signal stability, inter-area oscillation, fuzzy logic controller, membership function, rule base

Procedia PDF Downloads 511
6273 Learning from Dendrites: Improving the Point Neuron Model

Authors: Alexander Vandesompele, Joni Dambre

Abstract:

The diversity in dendritic arborization, as first illustrated by Santiago Ramon y Cajal, has always suggested a role for dendrites in the functionality of neurons. In the past decades, thanks to new recording techniques and optical stimulation methods, it has become clear that dendrites are not merely passive electrical components. They are observed to integrate inputs in a non-linear fashion and actively participate in computations. Regardless, in simulations of neural networks dendritic structure and functionality are often overlooked. Especially in a machine learning context, when designing artificial neural networks, point neuron models such as the leaky-integrate-and-fire (LIF) model are dominant. These models mimic the integration of inputs at the neuron soma, and ignore the existence of dendrites. In this work, the LIF point neuron model is extended with a simple form of dendritic computation. This gives the LIF neuron increased capacity to discriminate spatiotemporal input sequences, a dendritic functionality as observed in another study. Simulations of the spiking neurons are performed using the Bindsnet framework. In the common LIF model, incoming synapses are independent. Here, we introduce a dependency between incoming synapses such that the post-synaptic impact of a spike is not only determined by the weight of the synapse, but also by the activity of other synapses. This is a form of short term plasticity where synapses are potentiated or depressed by the preceding activity of neighbouring synapses. This is a straightforward way to prevent inputs from simply summing linearly at the soma. To implement this, each pair of synapses on a neuron is assigned a variable,representing the synaptic relation. This variable determines the magnitude ofthe short term plasticity. These variables can be chosen randomly or, more interestingly, can be learned using a form of Hebbian learning. We use Spike-Time-Dependent-Plasticity (STDP), commonly used to learn synaptic strength magnitudes. If all neurons in a layer receive the same input, they tend to learn the same through STDP. Adding inhibitory connections between the neurons creates a winner-take-all (WTA) network. This causes the different neurons to learn different input sequences. To illustrate the impact of the proposed dendritic mechanism, even without learning, we attach five input neurons to two output neurons. One output neuron isa regular LIF neuron, the other output neuron is a LIF neuron with dendritic relationships. Then, the five input neurons are allowed to fire in a particular order. The membrane potentials are reset and subsequently the five input neurons are fired in the reversed order. As the regular LIF neuron linearly integrates its inputs at the soma, the membrane potential response to both sequences is similar in magnitude. In the other output neuron, due to the dendritic mechanism, the membrane potential response is different for both sequences. Hence, the dendritic mechanism improves the neuron’s capacity for discriminating spa-tiotemporal sequences. Dendritic computations improve LIF neurons even if the relationships between synapses are established randomly. Ideally however, a learning rule is used to improve the dendritic relationships based on input data. It is possible to learn synaptic strength with STDP, to make a neuron more sensitive to its input. Similarly, it is possible to learn dendritic relationships with STDP, to make the neuron more sensitive to spatiotemporal input sequences. Feeding structured data to a WTA network with dendritic computation leads to a significantly higher number of discriminated input patterns. Without the dendritic computation, output neurons are less specific and may, for instance, be activated by a sequence in reverse order.

Keywords: dendritic computation, spiking neural networks, point neuron model

Procedia PDF Downloads 115
6272 Understanding Personal Well-Being among Entrepreneurial Breadwinners: Bibliographic and Empirical Analyses of Relative Resource Theory

Authors: E. Fredrick Rice

Abstract:

Over the past three decades, a substantial body of academic literature has asserted that the pressure to maintain household income can negatively affect the personal well-being of breadwinners. Given that scholars have failed to thoroughly explore this phenomenon with breadwinners who are also business owners, theory has been underdeveloped in the entrepreneurial context. To identify the most appropriate theories to apply to entrepreneurs, the current paper utilized two approaches. First, a comprehensive bibliographic analysis was conducted focusing on works at the intersection of breadwinner status and well-being. Co-authorship and journal citation patterns highlighted relative resource theory as a boundary spanning approach with promising applications in the entrepreneurial space. To build upon this theory, regression analysis was performed using data from the Panel Study of Entrepreneurial Dynamics (PSED). Empirical results showed evidence for the effects of breadwinner status and household income on entrepreneurial well-being. Further, the findings suggest that it is not merely income or job status that predicts well-being, but one’s relative financial contribution compared to that of one’s non-breadwinning organizationally employed partner. This paper offers insight into how breadwinner status can be studied in relation to the entrepreneurial personality.

Keywords: breadwinner, entrepreneurship, household income, well-being.

Procedia PDF Downloads 154
6271 Modelling Operational Risk Using Extreme Value Theory and Skew t-Copulas via Bayesian Inference

Authors: Betty Johanna Garzon Rozo, Jonathan Crook, Fernando Moreira

Abstract:

Operational risk losses are heavy tailed and are likely to be asymmetric and extremely dependent among business lines/event types. We propose a new methodology to assess, in a multivariate way, the asymmetry and extreme dependence between severity distributions, and to calculate the capital for Operational Risk. This methodology simultaneously uses (i) several parametric distributions and an alternative mix distribution (the Lognormal for the body of losses and the Generalized Pareto Distribution for the tail) via extreme value theory using SAS®, (ii) the multivariate skew t-copula applied for the first time for operational losses and (iii) Bayesian theory to estimate new n-dimensional skew t-copula models via Markov chain Monte Carlo (MCMC) simulation. This paper analyses a newly operational loss data set, SAS Global Operational Risk Data [SAS OpRisk], to model operational risk at international financial institutions. All the severity models are constructed in SAS® 9.2. We implement the procedure PROC SEVERITY and PROC NLMIXED. This paper focuses in describing this implementation.

Keywords: operational risk, loss distribution approach, extreme value theory, copulas

Procedia PDF Downloads 582
6270 Extending the Theory of Planned Behaviour to Predict Intention to Commute by Bicycle: Case Study of Mexico City

Authors: Magda Cepeda, Frances Hodgson, Ann Jopson

Abstract:

There are different barriers people face when choosing to cycle for commuting purposes. This study examined the role of psycho-social factors predicting the intention to cycle to commute in Mexico City. An extended version of the theory of planned behaviour was developed and utilized with a simple random sample of 401 road users. We applied exploratory and confirmatory factor analysis and after identifying five factors, a structural equation model was estimated to find the relationships among the variables. The results indicated that cycling attributes, attitudes to cycling, social comparison and social image and prestige were the most important factors influencing intention to cycle. Although the results from this study are specific to Mexico City, they indicate areas of interest to transportation planners in other regions especially in those cities where intention to cycle its linked to its perceived image and there is political ambition to instigate positive cycling cultures. Moreover, this study contributes to the current literature developing applications of the Theory of Planned Behaviour.

Keywords: cycling, latent variable model, perception, theory of planned behaviour

Procedia PDF Downloads 340
6269 Methods for Solving Identification Problems

Authors: Fadi Awawdeh

Abstract:

In this work, we highlight the key concepts in using semigroup theory as a methodology used to construct efficient formulas for solving inverse problems. The proposed method depends on some results concerning integral equations. The experimental results show the potential and limitations of the method and imply directions for future work.

Keywords: identification problems, semigroup theory, methods for inverse problems, scientific computing

Procedia PDF Downloads 464
6268 A Golay Pair Based Synchronization Algorithm for Distributed Multiple-Input Multiple-Output System

Authors: Weizhi Zhong, Xiaoyi Lu, Lei Xu

Abstract:

In order to solve the problem of inaccurate synchronization for distributed multiple-input multiple-output (MIMO) system in multipath environment, a golay pair aided timing synchronization method is proposed in this paper. A new synchronous training sequence based on golay pair is designed. By utilizing the aperiodic auto-correlation complementary property of the new training sequence, the fine timing point is obtained at the receiver. Simulation results show that, compared with the tradition timing synchronization approaches, the proposed algorithm can provide high accuracy in synchronization, especially under multipath condition.

Keywords: distributed MIMO system, golay pair, multipath, synchronization

Procedia PDF Downloads 235
6267 Multimedia Data Fusion for Event Detection in Twitter by Using Dempster-Shafer Evidence Theory

Authors: Samar M. Alqhtani, Suhuai Luo, Brian Regan

Abstract:

Data fusion technology can be the best way to extract useful information from multiple sources of data. It has been widely applied in various applications. This paper presents a data fusion approach in multimedia data for event detection in twitter by using Dempster-Shafer evidence theory. The methodology applies a mining algorithm to detect the event. There are two types of data in the fusion. The first is features extracted from text by using the bag-ofwords method which is calculated using the term frequency-inverse document frequency (TF-IDF). The second is the visual features extracted by applying scale-invariant feature transform (SIFT). The Dempster - Shafer theory of evidence is applied in order to fuse the information from these two sources. Our experiments have indicated that comparing to the approaches using individual data source, the proposed data fusion approach can increase the prediction accuracy for event detection. The experimental result showed that the proposed method achieved a high accuracy of 0.97, comparing with 0.93 with texts only, and 0.86 with images only.

Keywords: data fusion, Dempster-Shafer theory, data mining, event detection

Procedia PDF Downloads 394
6266 Investigation of the Stability and Spintronic Properties of NbrhgeX (X= Cr, Co, Mn, Fe, Ni) Using Density Functional Theory

Authors: Shittu Akinpelu, Issac Popoola

Abstract:

The compound NbRhGe has been predicted to be a semiconductor with excellent mechanical properties. It is an indirect band gap material. The potential of NbRhGe for non-volatile data storage via element addition is being studied using the Density Functional Theory (DFT). Preliminary results on the electronic and magnetic properties are suggestive for their application in spintronic.

Keywords: half-metals, Heusler compound, semiconductor, spintronic

Procedia PDF Downloads 152
6265 Appraisal of the Impact Strength on Mild Steel Cladding Weld Metal Geometry

Authors: Chukwuemeka Daniel Ezeliora, Chukwuebuka Lawrence Ezeliora

Abstract:

The research focused on the appraisal of impact strength on mild steel cladding weld metal geometry. Over the years, poor welding has resulted in failures in engineering components, poor material quality, the collapse of welded materials, and failures in material strength. This is as a result of poor selection and combination of welding input process parameters. The application of the Tungsten Inert Gas (TIG) welding method with weld specimen of length 60; width 40, and thickness of 10 was used for the experiment. A butt joint method was prepared for the welding, and tungsten inert gas welding process was used to perform the twenty (20) experimental runs. A response surface methodology was used to model and to analyze the system. For an adequate polynomial approximation, the experimental design was used to collect the data. The key parameters considered in this work are welding current, gas flow rate, welding speed, and voltage. The range of the input process parameters was selected from the literature and the design. The steps followed to achieve the experimental design and results is the use of response surface method (RSM) implemented in central composite design (CCD) to generate the design matrix, to obtain quadratic model, and evaluate the interactions in the factors as well as optimizing the factors and the response. The result expresses that the best impact strength of the mild steel cladding weld metal geometry is 115.419 Joules. However, it was observed that the result of the input factors is; current 180.4 amp, voltage 23.99 volt, welding speed 142.7 mm.s and gas flow rate 10.8 lit/min as the optimum of the input process parameters. The optimal solution gives a guide for optimal impact strength of the weldment when welding with tungsten inert gas (TIG) under study.

Keywords: mild steel, impact strength, response surface, bead geometry, welding

Procedia PDF Downloads 108
6264 Illuminating Regional Identity: An Interdisciplinary Exploration in Saskatchewan

Authors: Anne Gibbons

Abstract:

Both inside and outside of academia, people have sought to understand the “sense of place” of various regions, many times over and for many different reasons. The concept of regional identity is highly complex and surrounded by considerable contention. There are multiple bodies of research on regional identity theory in many different disciplines and even across sub-disciplinary classifications. Each discipline takes a slightly different angle or perspective on regional identity, resulting in a fragmented body of work on this topic overall. There is a need to consolidate this body of increasingly fragmented theory through interdisciplinary integration. For the purpose of this study, the province of Saskatchewan will serve as an exemplar for exploring regional identity in a concrete context. Saskatchewan can be thought of as a ‘functional region,’ with clear boundaries and clear residency, from which regional identity can be studied. This thesis shares the outcomes of a qualitative study grounded in a series of group interviews with askatchewan residents, from which it is concluded that the use of interdisciplinary theory is an appropriate approach to the study of regional identity. Regional identity cannot be compartmentalized; it is a web of characteristics, attributes, and feelings that are inextricably linked. The thesis thus concludes by offering lessons learned about how we might better understand regional identity, as illuminated through both interdisciplinary theory and the lived experiences and imaginations of people living in the region of Saskatchewan.

Keywords: interdisciplinary, regional identity, Saskatchewan, tourism studies

Procedia PDF Downloads 514
6263 The Mechanisms of Peer-Effects in Education: A Frame-Factor Analysis of Instruction

Authors: Pontus Backstrom

Abstract:

In the educational literature on peer effects, attention has been brought to the fact that the mechanisms creating peer effects are still to a large extent hidden in obscurity. The hypothesis in this study is that the Frame Factor Theory can be used to explain these mechanisms. At heart of the theory is the concept of “time needed” for students to learn a certain curricula unit. The relations between class-aggregated time needed and the actual time available, steers and hinders the actions possible for the teacher. Further, the theory predicts that the timing and pacing of the teachers’ instruction is governed by a “criterion steering group” (CSG), namely the pupils in the 10th-25th percentile of the aptitude distribution in class. The class composition hereby set the possibilities and limitations for instruction, creating peer effects on individual outcomes. To test if the theory can be applied to the issue of peer effects, the study employs multilevel structural equation modelling (M-SEM) on Swedish TIMSS 2015-data (Trends in International Mathematics and Science Study; students N=4090, teachers N=200). Using confirmatory factor analysis (CFA) in the SEM-framework in MPLUS, latent variables are specified according to the theory, such as “limitations of instruction” from TIMSS survey items. The results indicate a good model fit to data of the measurement model. Research is still in progress, but preliminary results from initial M-SEM-models verify a strong relation between the mean level of the CSG and the latent variable of limitations on instruction, a variable which in turn have a great impact on individual students’ test results. Further analysis is required, but so far the analysis indicates a confirmation of the predictions derived from the frame factor theory and reveals that one of the important mechanisms creating peer effects in student outcomes is the effect the class composition has upon the teachers’ instruction in class.

Keywords: compositional effects, frame factor theory, peer effects, structural equation modelling

Procedia PDF Downloads 122
6262 Leadership Process Model: A Way to Provide Guidance in Dealing with the Key Challenges Within the Organisation

Authors: Rawaa El Ayoubi

Abstract:

Many researchers, academics and practitioners have developed leadership theories during the 20th century. This substantial effort has built more leadership theories, generating considerable organisational research on leadership models in contemporary literature. This paper explores the stages and drivers of leadership theory evolution based on the researcher’s personal conclusions and review of leadership theories. The purpose of this paper is to create a Leadership Process Model (LPM) that can provide guidance in dealing with the key challenges within the organisation. This integrative model of organisational leadership is based on inner meaning, leader values and vision. It further addresses the relationships between leadership theory, practice and development, exploring why challenges exist within the field of leadership theory and how these challenges can be mitigated.

Keywords: leadership challenges, leadership process model, leadership |theories, organisational leadership, paradigm development

Procedia PDF Downloads 62