Search results for: problem posing
3680 Rating and Generating Sudoku Puzzles Based on Constraint Satisfaction Problems
Authors: Bahare Fatemi, Seyed Mehran Kazemi, Nazanin Mehrasa
Abstract:
Sudoku is a logic-based combinatorial puzzle game which people in different ages enjoy playing it. The challenging and addictive nature of this game has made it a ubiquitous game. Most magazines, newspapers, puzzle books, etc. publish lots of Sudoku puzzles every day. These puzzles often come in different levels of difficulty so that all people, from beginner to expert, can play the game and enjoy it. Generating puzzles with different levels of difficulty is a major concern of Sudoku designers. There are several works in the literature which propose ways of generating puzzles having a desirable level of difficulty. In this paper, we propose a method based on constraint satisfaction problems to evaluate the difficulty of the Sudoku puzzles. Then, we propose a hill climbing method to generate puzzles with different levels of difficulty. Whereas other methods are usually capable of generating puzzles with only few number of difficulty levels, our method can be used to generate puzzles with arbitrary number of different difficulty levels. We test our method by generating puzzles with different levels of difficulty and having a group of 15 people solve all the puzzles and recording the time they spend for each puzzle.Keywords: constraint satisfaction problem, generating Sudoku puzzles, hill climbing
Procedia PDF Downloads 4033679 Flocculation on the Treatment of Olive Oil Mill Wastewater: Pre-Treatment
Authors: G. Hodaifa, J. A. Páez, C. Agabo, E. Ramos, J. C. Gutiérrez, A. Rosal
Abstract:
Currently, the continuous two-phase decanter process used for olive oil production is the more internationally widespread. The wastewaters generated from this industry (OMW) is a real environmental problem because of its high organic load. Among proposed treatments for these wastewaters, the advanced oxidation technologies (Fenton process, ozone, photoFenton, etc.) are the most favourable. The direct application of these processes is somewhat expensive. Therefore, the application of a previous stage based on a flocculation-sedimentation operation is of high importance. In this research five commercial flocculants (three cationic, and two anionic) have been used to achieve the separation of phases (liquid clarified-sludge). For each flocculant, different concentrations (0-1000 mg/L) have been studied. In these experiments, sludge volume formed over time and the final water quality were determined. The final removal percentages of total phenols (11.3-25.1%), COD (5.6-20.4%), total carbon (2.3-26.5%), total organic carbon (1.50-23.8%), total nitrogen (1.45-24.8%), and turbidity (27.9-61.4%) were obtained. Also, the variation on the electric conductivity reduction percentage (1-8%) was determined. Finally, the best flocculants with highest removal percentages have been determined (QG2001 and Flocudex CS49).Keywords: flocculants, flocculation, olive oil mill wastewater, water quality
Procedia PDF Downloads 5413678 Characterization of Vegetable Wastes and Its Potential Use for Hydrogen and Methane Production via Dark Anaerobic Fermentation
Authors: Ajay Dwivedi, M. Suresh Kumar, A. N. Vaidya
Abstract:
The problem of fruit and vegetable waste management is a grave one and with ever increasing need to feed the exponentially growing population, more and more solid waste in the form of fruit and vegetables waste are generated and its management has become one of the key issues in protection of environment. Energy generation from fruit and vegetables waste by dark anaerobic fermentation is a recent an interesting avenue effective management of solid waste as well as for generating free and cheap energy. In the present study 17 vegetables were characterized for their physical as well as chemical properties, these characteristics were used to determine the hydrogen and methane potentials of vegetable from various models, and also lab scale batch experiments were performed to determine their actual hydrogen and methane production capacity. Lab scale batch experiments proved that vegetable waste can be used as effective substrate for bio hydrogen and methane production, however the expected yield of bio hydrogen and methane was much lower than predicted by models, this was due to the fact that other vital experimental parameters such as pH, total solids content, food to microorganism ratio was not optimized.Keywords: vegetable waste, physico-chemical characteristics, hydrogen, methane
Procedia PDF Downloads 4303677 Supporting 'vulnerable' Students to Complete Their Studies During the Economic Crisis in Greece: The Umbrella Program of International Hellenic University
Authors: Rigas Kotsakis, Nikolaos Tsigilis, Vasilis Grammatikopoulos, Evridiki Zachopoulou
Abstract:
During the last decade, Greece has faced an unprecedented financial crisis, affecting various aspects and functionalities of Higher Education. Besides the restricted funding of academic institutions, the students and their families encountered economical difficulties that undoubtedly influenced the effective completion of their studies. In this context, a fairly large number of students in Alexander campus of International Hellenic University (IHU) delay, interrupt, or even abandon their studies, especially when they come from low-income families, belong to sensitive social or special needs groups, they have different cultural origins, etc. For this reason, a European project, named “Umbrella”, was initiated aiming at providing the necessary psychological support and counseling, especially to disadvantaged students, towards the completion of their studies. To this end, a network of various academic members (academic staff and students) from IHU, namely iMentor, were implicated in different roles. Specifically, experienced academic staff trained students to serve as intermediate links for the integration and educational support of students that fall into the aforementioned sensitive social groups and face problems for the completion of their studies. The main idea of the project is held upon its person-centered character, which facilitates direct student-to-student communication without the intervention of the teaching staff. The backbone of the iMentors network are senior students that face no problem in their academic life and volunteered for this project. It should be noted that there is a provision from the Umbrella structure for substantial and ethical rewards for their engagement. In this context, a well-defined, stringent methodology was implemented for the evaluation of the extent of the problem in IHU and the detection of the profile of the “candidate” disadvantaged students. The first phase included two steps, (a) data collection and (b) data cleansing/ preprocessing. The first step involved the data collection process from the Secretary Services of all Schools in IHU, from 1980 to 2019, which resulted in 96.418 records. The data set included the School name, the semester of studies, a student enrolling criteria, the nationality, the graduation year or the current, up-to-date academic state (still studying, delayed, dropped off, etc.). The second step of the employed methodology involved the data cleansing/preprocessing because of the existence of “noisy” data, missing and erroneous values, etc. Furthermore, several assumptions and grouping actions were imposed to achieve data homogeneity and an easy-to-interpret subsequent statistical analysis. Specifically, the duration of 40 years recording was limited to the last 15 years (2004-2019). In 2004 the Greek Technological Institutions were evolved into Higher Education Universities, leading into a stable and unified frame of graduate studies. In addition, the data concerning active students were excluded from the analysis since the initial processing effort was focused on the detection of factors/variables that differentiated graduate and deleted students. The final working dataset included 21.432 records with only two categories of students, those that have a degree and those who abandoned their studies. Findings of the first phase are presented across faculties and further discussed.Keywords: higher education, students support, economic crisis, mentoring
Procedia PDF Downloads 1163676 Moral Obligation as a Governor to Skeptical Theism's Relativism
Authors: Peter J. Morgan
Abstract:
In response to evidential arguments from evil, Stephen Wykstra presents CORNEA (Condition of Reasonable Epistemic Access) as a foundational principle for Skeptical Theism which urges one to think in terms of what can be expected in a given situation. The use of CORNEA results in skepticism regarding the ability of human ken to know divine levels of knowledge in instances of intense evil. However, William Rowe presents a critique of Skeptical Theism that questions its ability to argue successfully for theism. Rowe contends that siding with Skeptical Theism is akin to boarding a trolley car that does not stop. Contra Wykstra, Rowe observes that, for all that can be known, there could be greater amounts of evils than goods, and the goods that are seen may not be the best possible goods. This amounts to a mortally challenging critique of Skeptical Theism. However, there is a brake on Rowe’s Trolley. This paper makes the argument that the ubiquitous presence of Moral Obligation (MO) serves as a braking system for Rowe’s Trolley. When the rider begins to feel lost in an epistemic stalemate of good and evil it is MO that turns the tide: MO serves as evidence towards the good on a basic human level, and it is a reminder that God’s character will result in actions towards the good.Keywords: CORNEA, moral obligation, problem of evil, skeptical theism
Procedia PDF Downloads 2053675 Modelling of Relocation and Battery Autonomy Problem on Electric Cars Sharing Dynamic by Using Discrete Event Simulation and Petri Net
Authors: Taha Benarbia, Kay W. Axhausen, Anugrah Ilahi
Abstract:
Electric car sharing system as ecologic transportation increasing in the world. The complexity of managing electric car sharing systems, especially one-way trips and battery autonomy have direct influence to on supply and demand of system. One must be able to precisely model the demand and supply of these systems to better operate electric car sharing and estimate its effect on mobility management and the accessibility that it provides in urban areas. In this context, our work focus to develop performances optimization model of the system based on discrete event simulation and stochastic Petri net. The objective is to search optimal decisions and management parameters of the system in order to fulfil at best demand while minimizing undesirable situations. In this paper, we present new model of electric cars sharing with relocation based on monitoring system. The proposed approach also help to precise the influence of battery charging level on the behaviour of system as important decision parameter of this complex and dynamical system.Keywords: electric car-sharing systems, smart mobility, Petri nets modelling, discrete event simulation
Procedia PDF Downloads 1843674 On the Use of Reliability Factors to Reduce Conflict between Information Sources in Dempster-Shafer Theory
Authors: A. Alem, Y. Dahmani, A. Hadjali, A. Boualem
Abstract:
Managing the problem of the conflict, either by using the Dempster-Shafer theory, or by the application of the fusion process to push researchers in recent years to find ways to get to make best decisions especially; for information systems, vision, robotic and wireless sensor networks. In this paper we are interested to take account of the conflict in the combination step that took the conflict into account and tries to manage such a way that it does not influence the decision step, the conflict what from reliable sources. According to [1], the conflict lead to erroneous decisions in cases where was with strong degrees between sources of information, if the conflict is more than the maximum of the functions of belief mass K > max1...n (mi (A)), then the decision becomes impossible. We will demonstrate in this paper that the multiplication of mass functions by coefficients of reliability is a decreasing function; it leads to the reduction of conflict and a good decision. The definition of reliability coefficients accurately and multiply them by the mass functions of each information source to resolve the conflict and allow deciding whether the degree of conflict. The evaluation of this technique is done by a use case; a comparison of the combination of springs with a maximum conflict without, and with reliability coefficients.Keywords: Dempster-Shafer theory, fusion process, conflict managing, reliability factors, decision
Procedia PDF Downloads 4273673 Ontology for Cross-Site-Scripting (XSS) Attack in Cybersecurity
Authors: Jean Rosemond Dora, Karol Nemoga
Abstract:
In this work, we tackle a frequent problem that frequently occurs in the cybersecurity field which is the exploitation of websites by XSS attacks, which are nowadays considered a complicated attack. These types of attacks aim to execute malicious scripts in a web browser of the client by including code in a legitimate web page. A serious matter is when a website accepts the “user-input” option. Attackers can exploit the web application (if vulnerable), and then steal sensitive data (session cookies, passwords, credit cards, etc.) from the server and/or from the client. However, the difficulty of the exploitation varies from website to website. Our focus is on the usage of ontology in cybersecurity against XSS attacks, on the importance of the ontology, and its core meaning for cybersecurity. We explain how a vulnerable website can be exploited, and how different JavaScript payloads can be used to detect vulnerabilities. We also enumerate some tools to use for an efficient analysis. We present detailed reasoning on what can be done to improve the security of a website in order to resist attacks, and we provide supportive examples. Then, we apply an ontology model against XSS attacks to strengthen the protection of a web application. However, we note that the existence of ontology does not improve the security itself, but it has to be properly used and should require a maximum of security layers to be taken into account.Keywords: cybersecurity, web application vulnerabilities, cyber threats, ontology model
Procedia PDF Downloads 1733672 An Appraisal of Maintenance Management Practices in Federal University Dutse and Jigawa State Polytechnic Dutse, Nigeria
Authors: Aminu Mubarak Sadis
Abstract:
This study appraised the maintenance management practice in Federal University Dutse and Jigawa State Polytechnic Dutse, in Nigeria. The Physical Planning, Works and Maintenance Departments of the two Higher Institutions (Federal University Dutse and Jigawa State Polytechnic) are responsible for production and maintenance management of their physical assets. Over–enrollment problem has been a common feature in the higher institutions in Nigeria, Data were collected by the administered questionnaires and subsequent oral interview to authenticate the completed questionnaires. Random sampling techniques was used in selecting 150 respondents across the various institutions (Federal University Dutse and Jigawa State Polytechnic Dutse). Data collected was analyzed using Statistical Package for Social Science (SPSS) and t-test statistical techniques The conclusion was that maintenance management activities are yet to be given their appropriate attention on functions of the university and polytechnic which are crucial to improving teaching, learning and research. The unit responsible for maintenance and managing facilities should focus on their stated functions and effect changes were possible.Keywords: appraisal, maintenance management, university, Polytechnic, practices
Procedia PDF Downloads 2543671 African Horse Sickness a Possible Threat to Horses in Al-Baha
Authors: Ghanem Al-Ghamdi
Abstract:
African Horse Sickness causes significant challenges to horse practitioners and owners in Africa and possibly in certain locations in the Arab Pensila. The aim of this work was to observe a hot spot of epidemic in Al-Baha, Southwestern of Saudi Arabia that could be AHS. A five year-old horse farm that had eight horses with no history of clinical problems was visited in late October 2014. In August 2014, horses showed clinical signs of severe pain, congestion of mucus membranes, foam oozing of the nose, recumbency, difficult breath and ultimately death. The course of the disease averaged 2 days. The farm had no previous history of this episode. Other animals including camel, sheep reside the same farm sharing feeding and water sources however no obvious similar clinical problems were noticed among the two species. Five horses showed the clinical disease and all horses were lost. Veterinary help was not available for diagnosis or treatment. A follow up visit to the farm after one year indicated that the three remaining horses were healthy but were relocated to a different facility out the Al-Baha Region. The most likely cause of such clinical problem is African Horse Sickness, however clinical exam and sampling of other horses in the region is absolute must as well as examining arthropods.Keywords: African horse sickness, horses, Al-Baha, Saudi Arabia
Procedia PDF Downloads 3523670 Bayesian Estimation under Different Loss Functions Using Gamma Prior for the Case of Exponential Distribution
Authors: Md. Rashidul Hasan, Atikur Rahman Baizid
Abstract:
The Bayesian estimation approach is a non-classical estimation technique in statistical inference and is very useful in real world situation. The aim of this paper is to study the Bayes estimators of the parameter of exponential distribution under different loss functions and then compared among them as well as with the classical estimator named maximum likelihood estimator (MLE). In our real life, we always try to minimize the loss and we also want to gather some prior information (distribution) about the problem to solve it accurately. Here the gamma prior is used as the prior distribution of exponential distribution for finding the Bayes estimator. In our study, we also used different symmetric and asymmetric loss functions such as squared error loss function, quadratic loss function, modified linear exponential (MLINEX) loss function and non-linear exponential (NLINEX) loss function. Finally, mean square error (MSE) of the estimators are obtained and then presented graphically.Keywords: Bayes estimator, maximum likelihood estimator (MLE), modified linear exponential (MLINEX) loss function, Squared Error (SE) loss function, non-linear exponential (NLINEX) loss function
Procedia PDF Downloads 3853669 Bringing Design Science Research Methodology into Real World Applications
Authors: Maya Jaber
Abstract:
In today's ever-changing world, organizational leaders will need to transform their organizations to meet the demands they face from employees, consumers, local and federal governments, and the global market. Change agents and leaders will need a new paradigm of thinking for creative problem solving and innovation in a time of uncertainty. A new framework that is developed from Design Science Research foundations with holistic design thinking methodologies (HTDM) and action research approaches has been developed through Dr. Jaber’s research. It combines these philosophies into a three-step process that can be utilized in practice for any sustainability, change, or project management applications. This framework was developed to assist in the pedagogy for the implementation of her holistic strategy formalized framework Integral Design Thinking (IDT). Her work focuses on real world application for the streamlining and adoption of initiatives into organizational culture transformation. This paper will discuss the foundations of this philosophy and the methods for utilization in practice developed in Dr. Jaber's research.Keywords: design science research, action research, critical thinking, design thinking, organizational transformation, sustainability management, organizational culture change
Procedia PDF Downloads 1823668 Potential of Hyperion (EO-1) Hyperspectral Remote Sensing for Detection and Mapping Mine-Iron Oxide Pollution
Authors: Abderrazak Bannari
Abstract:
Acid Mine Drainage (AMD) from mine wastes and contaminations of soils and water with metals are considered as a major environmental problem in mining areas. It is produced by interactions of water, air, and sulphidic mine wastes. This environment problem results from a series of chemical and biochemical oxidation reactions of sulfide minerals e.g. pyrite and pyrrhotite. These reactions lead to acidity as well as the dissolution of toxic and heavy metals (Fe, Mn, Cu, etc.) from tailings waste rock piles, and open pits. Soil and aquatic ecosystems could be contaminated and, consequently, human health and wildlife will be affected. Furthermore, secondary minerals, typically formed during weathering of mine waste storage areas when the concentration of soluble constituents exceeds the corresponding solubility product, are also important. The most common secondary mineral compositions are hydrous iron oxide (goethite, etc.) and hydrated iron sulfate (jarosite, etc.). The objectives of this study focus on the detection and mapping of MIOP in the soil using Hyperion EO-1 (Earth Observing - 1) hyperspectral data and constrained linear spectral mixture analysis (CLSMA) algorithm. The abandoned Kettara mine, located approximately 35 km northwest of Marrakech city (Morocco) was chosen as study area. During 44 years (from 1938 to 1981) this mine was exploited for iron oxide and iron sulphide minerals. Previous studies have shown that Kettara surrounding soils are contaminated by heavy metals (Fe, Cu, etc.) as well as by secondary minerals. To achieve our objectives, several soil samples representing different MIOP classes have been resampled and located using accurate GPS ( ≤ ± 30 cm). Then, endmembers spectra were acquired over each sample using an Analytical Spectral Device (ASD) covering the spectral domain from 350 to 2500 nm. Considering each soil sample separately, the average of forty spectra was resampled and convolved using Gaussian response profiles to match the bandwidths and the band centers of the Hyperion sensor. Moreover, the MIOP content in each sample was estimated by geochemical analyses in the laboratory, and a ground truth map was generated using simple Kriging in GIS environment for validation purposes. The acquired and used Hyperion data were corrected for a spatial shift between the VNIR and SWIR detectors, striping, dead column, noise, and gain and offset errors. Then, atmospherically corrected using the MODTRAN 4.2 radiative transfer code, and transformed to surface reflectance, corrected for sensor smile (1-3 nm shift in VNIR and SWIR), and post-processed to remove residual errors. Finally, geometric distortions and relief displacement effects were corrected using a digital elevation model. The MIOP fraction map was extracted using CLSMA considering the entire spectral range (427-2355 nm), and validated by reference to the ground truth map generated by Kriging. The obtained results show the promising potential of the proposed methodology for the detection and mapping of mine iron oxide pollution in the soil.Keywords: hyperion eo-1, hyperspectral, mine iron oxide pollution, environmental impact, unmixing
Procedia PDF Downloads 2293667 Experimental Study of Local Scour Downstream of Cylindrical Bridge Piers
Authors: Mohammed Traeq Shukri
Abstract:
Scour is a natural phenomenon caused by the erosive action of flowing stream on alluvial beds, which removes the sediment around or near structures located in flowing water. It means the lowering of the riverbed level by water erosions such that there is a tendency to expose the foundations of a structure. It is the result of the erosive action of flowing water, excavating and carrying away material from the bed and banks of streams and from around the piers of bridges. The failure of bridges due to excessive local scour during floods poses a challenging problem to hydraulic engineers. The failure of bridges piers is due to many reasons such as localized scour combined with general riverbed degradation. In this paper, we try to estimate the temporal variation of scour depth at non-uniform cylindrical bridge pier, by experimental work in civil engineering hydraulic laboratories of Gaziantep University on a channel have dimensions of 8.3m length, 0.8m width and 0.9m depth. The experiments will be carried on 20 cm depth of sediment layer having d50=0.4 mm. Three bridge pier shapes having different scaled models will be constructed in a 1.5m of test section in the channel.Keywords: scour, local scour, bridge piers, scour depth, vortex, horseshoe vortex
Procedia PDF Downloads 1663666 The Results of Research Based-Learning for Developing the Learning and Innovation Skills of Undergraduate Students
Authors: Jatuphum Ketchatturat
Abstract:
The objective of this research was to study the learning and innovation skills of undergraduate students after Research-Based Learning had been applied. Eighty research participants were selected from undergraduate students enrolled in Educational Research Program using the Purposive Sampling Method. Research Methodology was Descriptive Research, the research took one semester to complete. The research instruments consisted of (1) Research Skill Assessment Form, (2) Research Quality Assessment Form, (3) Scale of learning and innovation skills 25 items. The quantitative data were analysed using descriptive statistics including, frequency, percentage, average and standard deviation. The qualitative data were analyzed using content analysis. The research results were (1) The students were able to conduct research that focused on educational research, which has a fair to the excellent level of standards of a research learning outcome, research skills, and research quality. The student’s learning and innovation skills have relating to research skills and research quality. (2) The findings found that the students have been developed to be learning and innovation skills such as systematic thinking, analytical thinking, critical thinking, creative problem solving, collaborative, research-creation, communication, and knowledge and experience sharing to friends, community and society.Keywords: learning and innovation skills, research based learning, research skills, undergraduate students
Procedia PDF Downloads 1803665 Colour Recognition Pen Technology in Dental Technique and Dental Laboratories
Authors: M. Dabirinezhad, M. Bayat Pour, A. Dabirinejad
Abstract:
Recognition of the color spectrum of the teeth plays a significant role in the dental laboratories to produce dentures. Since there are various types and colours of teeth for each patient, there is a need to specify the exact and the most suitable colour to produce a denture. Usually, dentists utilize pallets to identify the color that suits a patient based on the color of the adjacent teeth. Consistent with this, there can be human errors by dentists to recognize the optimum colour for the patient, and it can be annoying for the patient. According to the statistics, there are some claims from the patients that they are not satisfied by the colour of their dentures after the installation of the denture in their mouths. This problem emanates from the lack of sufficient accuracy during the colour recognition process of denture production. The colour recognition pen (CRP) is a technology to distinguish the colour spectrum of the intended teeth with the highest accuracy. CRP is equipped with a sensor that is capable to read and analyse a wide range of spectrums. It is also connected to a database that contains all the spectrum ranges, which exist in the market. The database is editable and updatable based on market requirements. Another advantage of this invention can be mentioned as saving time for the patients since there is no need to redo the denture production in case of failure on the first try.Keywords: colour recognition pen, colour spectrum, dental laboratory, denture
Procedia PDF Downloads 1993664 Study and Improvement of the Quality of a Production Line
Authors: S. Bouchami, M.N. Lakhoua
Abstract:
The automotive market is a dynamic market that continues to grow. That’s why several companies belonging to this sector adopt a quality improvement approach. Wanting to be competitive and successful in the environment in which they operate, these companies are dedicated to establishing a system of quality management to ensure the achievement of the objective quality, improving the products and process as well as the satisfaction of the customers. In this paper, the management of the quality and the improvement of a production line in an industrial company is presented. In fact, the project is divided into two essential parts: the creation of the technical line documentation and the quality assurance documentation and the resolution of defects at the line, as well as those claimed by the customer. The creation of the documents has required a deep understanding of the manufacturing process. The analysis and problem solving were done through the implementation of PDCA (Plan Do Check Act) and FTA (Fault Tree Analysis). As perspective, in order to better optimize production and improve the efficiency of the production line, a study on the problems associated with the supply of raw materials should be made to solve the problems of stock-outs which cause delays penalizing for the industrial company.Keywords: quality management, documentary system, Plan Do Check Act (PDCA), fault tree analysis (FTA) method
Procedia PDF Downloads 1443663 A Study on Using Network Coding for Packet Transmissions in Wireless Sensor Networks
Authors: Rei-Heng Cheng, Wen-Pinn Fang
Abstract:
A wireless sensor network (WSN) is composed by a large number of sensors and one or a few base stations, where the sensor is responsible for detecting specific event information, which is sent back to the base station(s). However, how to save electricity consumption to extend the network lifetime is a problem that cannot be ignored in the wireless sensor networks. Since the sensor network is used to monitor a region or specific events, how the information can be reliably sent back to the base station is surly important. Network coding technique is often used to enhance the reliability of the network transmission. When a node needs to send out M data packets, it encodes these data with redundant data and sends out totally M + R packets. If the receiver can get any M packets out from these M + R packets, it can decode and get the original M data packets. To transmit redundant packets will certainly result in the excess energy consumption. This paper will explore relationship between the quality of wireless transmission and the number of redundant packets. Hopefully, each sensor can overhear the nearby transmissions, learn the wireless transmission quality around it, and dynamically determine the number of redundant packets used in network coding.Keywords: energy consumption, network coding, transmission reliability, wireless sensor networks
Procedia PDF Downloads 3933662 Routing Protocol in Ship Dynamic Positioning Based on WSN Clustering Data Fusion System
Authors: Zhou Mo, Dennis Chow
Abstract:
In the dynamic positioning system (DPS) for vessels, the reliable information transmission between each note basically relies on the wireless protocols. From the perspective of cluster-based routing protocols for wireless sensor networks, the data fusion technology based on the sleep scheduling mechanism and remaining energy in network layer is proposed, which applies the sleep scheduling mechanism to the routing protocols, considering the remaining energy of node and location information when selecting cluster-head. The problem of uneven distribution of nodes in each cluster is solved by the Equilibrium. At the same time, Classified Forwarding Mechanism as well as Redelivery Policy strategy is adopted to avoid congestion in the transmission of huge amount of data, reduce the delay in data delivery and enhance the real-time response. In this paper, a simulation test is conducted to improve the routing protocols, which turn out to reduce the energy consumption of nodes and increase the efficiency of data delivery.Keywords: DPS for vessel, wireless sensor network, data fusion, routing protocols
Procedia PDF Downloads 5263661 Pattern of Physical Activity and Its Impact on the Quality of Life: A Structural Equation Modelling Analysis
Authors: Ali Maksum
Abstract:
In a number of countries, including Indonesia, the tendency for non-communicable diseases is increasing. As a result, health costs must be paid by the state continues to increase as well. People's lifestyles, including due to lack of physical activity, are thought to have contributed significantly to the problem. This study aims to examine the impact of participation in sports on quality of life, which is reflected in three main indicators, namely health, psychological, and social aspects. The study was conducted in the city of Surabaya and its surroundings, with a total of 490 participants, consisting of 245 men and 245 women with an average age of 45.4 years. Data on physical activity and quality of life were collected by questionnaire and analyzed using structural equation modeling. The test results of the model prove that the value of chi-square = 8,259 with p = .409, RMSEA = .008, NFI = .992, and CFI = 1. This means that the model is compatible with the data. The model explains that physical activity has a significant effect on quality of life. People who exercise regularly are better able to cope with stress, have a lower risk of illness, and have higher pro-social behavior. Therefore, it needs serious efforts from stakeholders, especially the government, to create an ecosystem that allows the growth of movement culture in the community.Keywords: participation, physical activity, quality of life, structural equation modelling
Procedia PDF Downloads 1263660 Clustering Color Space, Time Interest Points for Moving Objects
Authors: Insaf Bellamine, Hamid Tairi
Abstract:
Detecting moving objects in sequences is an essential step for video analysis. This paper mainly contributes to the Color Space-Time Interest Points (CSTIP) extraction and detection. We propose a new method for detection of moving objects. Two main steps compose the proposed method. First, we suggest to apply the algorithm of the detection of Color Space-Time Interest Points (CSTIP) on both components of the Color Structure-Texture Image Decomposition which is based on a Partial Differential Equation (PDE): a color geometric structure component and a color texture component. A descriptor is associated to each of these points. In a second stage, we address the problem of grouping the points (CSTIP) into clusters. Experiments and comparison to other motion detection methods on challenging sequences show the performance of the proposed method and its utility for video analysis. Experimental results are obtained from very different types of videos, namely sport videos and animation movies.Keywords: Color Space-Time Interest Points (CSTIP), Color Structure-Texture Image Decomposition, Motion Detection, clustering
Procedia PDF Downloads 3803659 GSM Based Smart Patient Monitoring System
Authors: Ayman M. Mansour
Abstract:
In this paper, we propose an intelligent system that is used for monitoring the health conditions of Patients. Monitoring the health condition of Patients is a complex problem that involves different medical units and requires continuous monitoring especially in rural areas because of inadequate number of available specialized physicians. The proposed system will Improve patient care and drive costs down comparing to the existing system in Jordan. The proposed system will be the start point to Faster and improve the communication between different units in the health system in Jordan. Connecting patients and their physicians beyond hospital doors regarding their geographical area is an important issue in developing the health system in Jordan. The propose system will provide an intelligent system that will generate initial diagnosing to the patient case. This will assist and advice clinicians at the point of care. The decision is based on demographic data and laboratory test results of patient data. Using such system with the ability of making medical decisions, the quality of medical care in Jordan and specifically in Tafial is expected to be improved. This will provide more accurate, effective, and reliable diagnoses and treatments especially if the physicians have insufficient knowledge.Keywords: GSM, SMS, patient, monitoring system, fuzzy logic, multi-agent system
Procedia PDF Downloads 5703658 Intelligent Staff Scheduling: Optimizing the Solver with Tabu Search
Authors: Yu-Ping Chiu, Dung-Ying Lin
Abstract:
Traditional staff scheduling methods, relying on employee experience, often lead to inefficiencies and resource waste. The challenges of transferring scheduling expertise and adapting to changing labor regulations further complicate this process. Manual approaches become increasingly impractical as companies accumulate complex scheduling rules over time. This study proposes an algorithmic optimization approach to address these issues, aiming to expedite scheduling while ensuring strict compliance with labor regulations and company policies. The method focuses on generating optimal schedules that minimize weighted company objectives within a compressed timeframe. Recognizing the limitations of conventional commercial software in modeling and solving complex real-world scheduling problems efficiently, this research employs Tabu Search with both long-term and short-term memory structures. The study will present numerical results and managerial insights to demonstrate the effectiveness of this approach in achieving intelligent and efficient staff scheduling.Keywords: intelligent memory structures, mixed integer programming, meta-heuristics, staff scheduling problem, tabu search
Procedia PDF Downloads 273657 Factors Influencing the Use Intention of Unmanned Retail Stores
Authors: Yen-Ting Chiu, Chia-Ying Lin, Pei-Hsuan Ho
Abstract:
New technologies can help solve the problem of labor shortage and the decline of birthrate. Technologies can improve human’s life and reduce the burden on the staff and bring convenience to people. That’s why unmanned retail store X-Store was established in Taiwan to create more valuable services and shopping experiences based on smart retailing. The purpose of this study is to examine the impact of unmanned stores, X-Store, on customers’ behavioral intentions. It uses the Unified theory of acceptance and use of technology (UTAUT) model as a basis and adds a perceived value factor to explain customer willingness to use the X-Store. In addition, the study further divided the sample into gender and age groups to compare behavioral differences between different groups. The study collected 214 valid questionnaires through online questionnaires. Using SPSS as a statistical analysis tool, the results of the study show that effort expectancy, social influence, facilitating conditions, and perceived value have a significant impact on behavioral intention to use X-Store. However, performance expectancy is not significant. This research concludes with managerial implications and suggestions for retail practitioners.Keywords: perceived value, smart retailing, unmanned store, UTAUT, X-Store
Procedia PDF Downloads 913656 Rationalized Haar Transforms Approach to Design of Observer for Control Systems with Unknown Inputs
Authors: Joon-Hoon Park
Abstract:
The fundamental concept of observability is important in both theoretical and practical points of modern control systems. In modern control theory, a control system has criteria for determining the design solution exists for the system parameters and design objectives. The idea of observability relates to the condition of observing or estimating the state variables from the output variables that is generally measurable. To design closed-loop control system, the practical problems of implementing the feedback of the state variables must be considered and implementing state feedback control problem has been existed in this case. All the state variables are not available, so it is requisite to design and implement an observer that will estimate the state variables form the output parameters. However sometimes unknown inputs are presented in control systems as practical cases. This paper presents a design method and algorithm for observer of control system with unknown input parameters based on Rationalized Haar transform. The proposed method is more advantageous than the other numerical method.Keywords: orthogonal functions, rationalized Haar transforms, control system observer, algebraic method
Procedia PDF Downloads 3713655 Research on Traditional Rammed Earth Houses in Southern Zhejiang, China: Based on the perspective of "Geographical Embeddedness"
Abstract:
Zhejiang’s special geographical environment has created characteristic mountain dwellings with climate adaptability. Among them, the terrain of southern Zhejiang is dominated by mountainous and hilly landforms, and its traditional dwellings have distinctive characteristics. They are often adapted to local conditions and laid out in accordance with the mountains. In order to block the severe winter weather conditions, local traditional building materials such as rammed earth are mostly used. However, with the development of urbanization, traditional villages have undergone large-scale changes, gradually losing their original uniqueness. In order to solve this problem, this paper takes traditional villages around Baishanzu National Park in Zhejiang as an example and selects nine typical villages in Jingning County and Longquan, respectively. Based on field investigations, extracting the environmental adaptability of local traditional rammed earth houses from the perspective of “geographical embeddedness”. And then combined with case analysis, discussing the translation and development of its traditional architectural methods in contemporary rammed earth buildings in southern Zhejiang.Keywords: geographical embeddedness , lighting, modernization translation, rammed earth building, ventilation
Procedia PDF Downloads 1103654 Shakespeare’s Sister and the Crisis of Women’s Autonomy: A Critical Analysis of a Room of One’s Own
Authors: Ali Mohammadi
Abstract:
This study explored the root causes of women's lack of writing in literature by digging into Virginia Woolf's A Room of One’s Own. Virginia Woolf was the pioneer of feminist literary criticism in the 20th century. She was hugely preoccupied, throughout her writing life, with the role of women in history and with the relationship between women and fiction. Besides, she wrote continuously about the difficulties of women's writing and of writing as a woman. This research aims to mirror a number of key arguments concerning women’s issues: the social and economic conditions necessary for writing; the problem of a tradition of women's writing; the concept of a 'female sentence' articulating women's voices and values and the idea of the androgynous aesthetic in which an author would be able to write free from an awareness of their sex as male or female. Woolf was very wary of making any definitive assertions about women's writing, or at least in terms of its style or form. Indeed, much of the essay is taken up with her reflections on the lack of women's writing over the history of English literature. It was concluded that the reason for this absence of female writing does not just spring from the deficiency of genius, but of material circumstances and facilities. Additionally, the demands of the domestic household, the poverty of education available to women, and the laws that denied married women’s ownership of funds or property made it virtually impossible for women to take up writing as a profession.Keywords: autonomy, facilities, genius, literature, women
Procedia PDF Downloads 1973653 The Relationship between Human Pose and Intention to Fire a Handgun
Authors: Joshua van Staden, Dane Brown, Karen Bradshaw
Abstract:
Gun violence is a significant problem in modern-day society. Early detection of carried handguns through closed-circuit television (CCTV) can aid in preventing potential gun violence. However, CCTV operators have a limited attention span. Machine learning approaches to automating the detection of dangerous gun carriers provide a way to aid CCTV operators in identifying these individuals. This study provides insight into the relationship between human key points extracted using human pose estimation (HPE) and their intention to fire a weapon. We examine the feature importance of each keypoint and their correlations. We use principal component analysis (PCA) to reduce the feature space and optimize detection. Finally, we run a set of classifiers to determine what form of classifier performs well on this data. We find that hips, shoulders, and knees tend to be crucial aspects of the human pose when making these predictions. Furthermore, the horizontal position plays a larger role than the vertical position. Of the 66 key points, nine principal components could be used to make nonlinear classifications with 86% accuracy. Furthermore, linear classifications could be done with 85% accuracy, showing that there is a degree of linearity in the data.Keywords: feature engineering, human pose, machine learning, security
Procedia PDF Downloads 943652 Theoretical Appraisal of Satisfactory Decision: Uncertainty, Evolutionary Ideas and Beliefs, Satisfactory Time Use
Authors: Okay Gunes
Abstract:
Unsatisfactory experiences due to an information shortage regarding the future pay-offs of actual choices, yield satisficing decision-making. This research will examine, for the first time in the literature, the motivation behind suboptimal decisions due to uncertainty by subjecting Adam Smith’s and Jeremy Bentham’s assumptions about the nature of the actions that lead to satisficing behavior, in order to clarify the theoretical background of a “consumption-based satisfactory time” concept. The contribution of this paper with respect to the existing literature is threefold: Firstly, it is showed in this paper that Adam Smith’s uncertainty is related to the problem of the constancy of ideas and not related directly to beliefs. Secondly, possessions, as in Jeremy Bentham’s oeuvre, are assumed to be just as pleasing, as protecting and improving the actual or expected quality of life, so long as they reduce any displeasure due to the undesired outcomes of uncertainty. Finally, each consumption decision incurs its own satisfactory time period, owed to not feeling hungry, being healthy, not having transportation…etc. This reveals that the level of satisfaction is indeed a behavioral phenomenon where its value would depend on the simultaneous satisfaction derived from all activities.Keywords: decision-making, idea and belief, satisficing, uncertainty
Procedia PDF Downloads 2883651 Hypercomplex Dynamics and Turbulent Flows in Sobolev and Besov Functional Spaces
Authors: Romulo Damasclin Chaves dos Santos, Jorge Henrique de Oliveira Sales
Abstract:
This paper presents a rigorous study of advanced functional spaces, with a focus on Sobolev and Besov spaces, to investigate key aspects of fluid dynamics, including the regularity of solutions to the Navier-Stokes equations, hypercomplex bifurcations, and turbulence. We offer a comprehensive analysis of Sobolev embedding theorems in fractional spaces and apply bifurcation theory within quaternionic dynamical systems to better understand the complex behaviors in fluid systems. Additionally, the research delves into energy dissipation mechanisms in turbulent flows through the framework of Besov spaces. Key mathematical tools, such as interpolation theory, Littlewood-Paley decomposition, and energy cascade models, are integrated to develop a robust theoretical approach to these problems. By addressing challenges related to the existence and smoothness of solutions, this work contributes to the ongoing exploration of the open Navier-Stokes problem, providing new insights into the intricate relationship between fluid dynamics and functional spaces.Keywords: navier-stokes equations, hypercomplex bifurcations, turbulence, sobolev and besov space
Procedia PDF Downloads 21