Search results for: institutional network
2138 ICanny: CNN Modulation Recognition Algorithm
Authors: Jingpeng Gao, Xinrui Mao, Zhibin Deng
Abstract:
Aiming at the low recognition rate on the composite signal modulation in low signal to noise ratio (SNR), this paper proposes a modulation recognition algorithm based on ICanny-CNN. Firstly, the radar signal is transformed into the time-frequency image by Choi-Williams Distribution (CWD). Secondly, we propose an image processing algorithm using the Guided Filter and the threshold selection method, which is combined with the hole filling and the mask operation. Finally, the shallow convolutional neural network (CNN) is combined with the idea of the depth-wise convolution (Dw Conv) and the point-wise convolution (Pw Conv). The proposed CNN is designed to complete image classification and realize modulation recognition of radar signal. The simulation results show that the proposed algorithm can reach 90.83% at 0dB and 71.52% at -8dB. Therefore, the proposed algorithm has a good classification and anti-noise performance in radar signal modulation recognition and other fields.Keywords: modulation recognition, image processing, composite signal, improved Canny algorithm
Procedia PDF Downloads 1942137 School Belongingness and Coping with Bullying: Greek Adolescent Students' Experiences
Authors: E. Didaskalou, C. Roussi-Vergou, E. Andreou, G. Skrzypiec, P. Slee
Abstract:
There has been growing interest lately, in the study of victimization among adolescent students in Greece and elsewhere with a view to improve school policies concerning anti-bullying practices. Researchers have recently focused on investigating the relationships between the extent of students’ victimization and the distinct mechanisms that they employ for coping with this particular problem. In particular, the emphasis has been placed on exploring the relationship between the coping strategies students use to counteract bullying, their sense of belonging at school, and extent of their victimization. Methods: Within the research framework outlined above, we set out to: a) examine the frequency of self-reported victimization among secondary school students, b) investigate the coping strategies employed by students when confronted with school bullying and c) explore any differences between bullied and non-bullied students with regard to coping strategies and school belongingness. The sample consisted of 860 from fifteen secondary public schools in central Greece. The schools were typical Greek secondary schools and the principals volunteered to participate in this study. Participants’ age ranged from 12 to 16 years. Measures: a) Exposure to Victimization: The frequency of victimization was directly located by asking students the question: ‘Over the last term, how often have you been bullied or harassed by a student or students at this high school?’ b) Coping Strategies: The ‘Living and Learning at School: Bullying at School’ was administered to students, c) School belongingness was assessed by the Psychological Sense of School Membership Scale, that students completed. Results: Regarding the frequency of self-reported victimization, 1.5% of the students reported being victimized every day, 2.8% most days of the week, 2.1% one or more days a week, 2.9% about once a week, 22.6% less than once a week and 68.1% never. The coping strategies that the participants employed for terminating their victimization included: a) adult support seeking, b) emotional coping/keep away from school, c) keeping healthy and fit, d) demonstrating a positive attitude towards the bully, d) peer support seeking, e) emotional out bursting, f) wishful thinking and self-blaming, g) pretending as if it is not happening, h) displaying assertive behaviors and i) getting away from the bullies. Bullied from non-bullied children did not differ as much in coping, as in feelings of being rejected in school. Discussion: The findings are in accordance with accumulated research evidence which points to a strong relationship between student perceptions of school belongingness and their involvement in bullying behaviors. We agree with the view that a positive school climate is likely to serve as a buffer that mitigates wider adverse societal influences and institutional attitudes which favor violence and harassment among peers.Keywords: school bullying, school belonging, student coping strategies, victimization
Procedia PDF Downloads 2502136 Development of a Decision-Making Method by Using Machine Learning Algorithms in the Early Stage of School Building Design
Authors: Pegah Eshraghi, Zahra Sadat Zomorodian, Mohammad Tahsildoost
Abstract:
Over the past decade, energy consumption in educational buildings has steadily increased. The purpose of this research is to provide a method to quickly predict the energy consumption of buildings using separate evaluation of zones and decomposing the building to eliminate the complexity of geometry at the early design stage. To produce this framework, machine learning algorithms such as Support vector regression (SVR) and Artificial neural network (ANN) are used to predict energy consumption and thermal comfort metrics in a school as a case. The database consists of more than 55000 samples in three climates of Iran. Cross-validation evaluation and unseen data have been used for validation. In a specific label, cooling energy, it can be said the accuracy of prediction is at least 84% and 89% in SVR and ANN, respectively. The results show that the SVR performed much better than the ANN.Keywords: early stage of design, energy, thermal comfort, validation, machine learning
Procedia PDF Downloads 1052135 Coalescence of Insulin and Triglyceride/High Density Lipoprotein Cholesterol Ratio for the Derivation of a Laboratory Index to Predict Metabolic Syndrome in Morbid Obese Children
Authors: Orkide Donma, Mustafa M. Donma
Abstract:
Morbid obesity is a health threatening condition particularly in children. Generally, it leads to the development of metabolic syndrome (MetS) characterized by central obesity, elevated fasting blood glucose (FBG), triglyceride (TRG), blood pressure values and suppressed high density lipoprotein cholesterol (HDL-C) levels. However, some ambiguities exist during the diagnosis of MetS in children below 10 years of age. Therefore, clinicians are in the need of some surrogate markers for the laboratory assessment of pediatric MetS. In this study, the aim is to develop an index, which will be more helpful during the evaluation of further risks detected in morbid obese (MO) children. A total of 235 children with normal body mass index (N-BMI), with varying degrees of obesity; overweight (OW), obese (OB), MO as well as MetS participated in this study. The study was approved by the Institutional Ethical Committee. Informed consent forms were obtained from the parents of the children. Obesity states of the children were classified using BMI percentiles adjusted for age and sex. For the purpose, tabulated data prepared by WHO were used. MetS criteria were defined. Systolic and diastolic blood pressure values were measured. Parameters related to glucose and lipid metabolisms were determined. FBG, insulin (INS), HDL-C, TRG concentrations were determined. Diagnostic Obesity Notation Model Assessment Laboratory (DONMALAB) Index [ln TRG/HDL-C*INS] was introduced. Commonly used insulin resistance (IR) indices such as Homeostatic Model Assessment for IR (HOMA-IR) as well as ratios such as TRG/HDL-C, TRG/HDL-C*INS, HDL-C/TRG*INS, TRG/HDL-C*INS/FBG, log, and ln versions of these ratios were calculated. Results were interpreted using statistical package program (SPSS Version 16.0) for Windows. The data were evaluated using appropriate statistical tests. The degree for statistical significance was defined as 0.05. 35 N, 20 OW, 47 OB, 97 MO children and 36 with MetS were investigated. Mean ± SD values of TRG/HDL-C were 1.27 ± 0.69, 1.86 ± 1.08, 2.15 ± 1.22, 2.48 ± 2.35 and 4.61 ± 3.92 for N, OW, OB, MO and MetS children, respectively. Corresponding values for the DONMALAB index were 2.17 ± 1.07, 3.01 ± 0.94, 3.41 ± 0.93, 3.43 ± 1.08 and 4.32 ± 1.00. TRG/HDL-C ratio significantly differed between N and MetS groups. On the other hand, DONMALAB index exhibited statistically significant differences between N and all the other groups except the OW group. This index was capable of discriminating MO children from those with MetS. Statistically significant elevations were detected in MO children with MetS (p < 0.05). Multiple parameters are commonly used during the assessment of MetS. Upon evaluation of the values obtained for N, OW, OB, MO groups and for MO children with MetS, the [ln TRG/HDL-C*INS] value was unique in discriminating children with MetS.Keywords: children, index, laboratory, metabolic syndrome, obesity
Procedia PDF Downloads 1542134 VANETs Geographic Routing Protocols: A survey
Authors: Ramin Karimi
Abstract:
One of common highly mobile wireless ad hoc networks is Vehicular Ad Hoc Networks. Hence routing in vehicular ad hoc network (VANET) has attracted much attention during the last few years. VANET is characterized by its high mobility of nodes and specific topology patterns. Moreover these networks encounter a significant loss rate and a very short duration of communication. In vehicular ad hoc networks, one of challenging is routing of data due to high speed mobility and changing topology of vehicles. Geographic routing protocols are becoming popular due to advancement and availability of GPS devices. Delay Tolerant Networks (DTNs) are a class of networks that enable communication where connectivity issues like sparse connectivity, intermittent connectivity; high latency, long delay, high error rates, asymmetric data rate, and even no end-to-end connectivity exist. In this paper, we review the existing Geographic Routing Protocols for VANETs and also provide a qualitative comparison of them.Keywords: vehicular ad hoc networks, mobility, geographic routing, delay tolerant networks
Procedia PDF Downloads 5252133 Settlement Prediction for Tehran Subway Line-3 via FLAC3D and ANFIS
Authors: S. A. Naeini, A. Khalili
Abstract:
Nowadays, tunnels with different applications are developed, and most of them are related to subway tunnels. The excavation of shallow tunnels that pass under municipal utilities is very important, and the surface settlement control is an important factor in the design. The study sought to analyze the settlement and also to find an appropriate model in order to predict the behavior of the tunnel in Tehran subway line-3. The displacement in these sections is also determined by using numerical analyses and numerical modeling. In addition, the Adaptive Neuro-Fuzzy Inference System (ANFIS) method is utilized by Hybrid training algorithm. The database pertinent to the optimum network was obtained from 46 subway tunnels in Iran and Turkey which have been constructed by the new Austrian tunneling method (NATM) with similar parameters based on type of their soil. The surface settlement was measured, and the acquired results were compared to the predicted values. The results disclosed that computing intelligence is a good substitute for numerical modeling.Keywords: settlement, Subway Line, FLAC3D, ANFIS Method
Procedia PDF Downloads 2382132 Multi-Objectives Genetic Algorithm for Optimizing Machining Process Parameters
Authors: Dylan Santos De Pinho, Nabil Ouerhani
Abstract:
Energy consumption of machine-tools is becoming critical for machine-tool builders and end-users because of economic, ecological and legislation-related reasons. Many machine-tool builders are seeking for solutions that allow the reduction of energy consumption of machine-tools while preserving the same productivity rate and the same quality of machined parts. In this paper, we present the first results of a project conducted jointly by academic and industrial partners to reduce the energy consumption of a Swiss-Type lathe. We employ genetic algorithms to find optimal machining parameters – the set of parameters that lead to the best trade-off between energy consumption, part quality and tool lifetime. Three main machining process parameters are considered in our optimization technique, namely depth of cut, spindle rotation speed and material feed rate. These machining process parameters have been identified as the most influential ones in the configuration of the Swiss-type machining process. A state-of-the-art multi-objective genetic algorithm has been used. The algorithm combines three fitness functions, which are objective functions that permit to evaluate a set of parameters against the three objectives: energy consumption, quality of the machined parts, and tool lifetime. In this paper, we focus on the investigation of the fitness function related to energy consumption. Four different energy consumption related fitness functions have been investigated and compared. The first fitness function refers to the Kienzle cutting force model. The second fitness function uses the Material Removal Rate (RMM) as an indicator of energy consumption. The two other fitness functions are non-deterministic, learning-based functions. One fitness function uses a simple Neural Network to learn the relation between the process parameters and the energy consumption from experimental data. Another fitness function uses Lasso regression to determine the same relation. The goal is, then, to find out which fitness functions predict best the energy consumption of a Swiss-Type machining process for the given set of machining process parameters. Once determined, these functions may be used for optimization purposes – determine the optimal machining process parameters leading to minimum energy consumption. The performance of the four fitness functions has been evaluated. The Tornos DT13 Swiss-Type Lathe has been used to carry out the experiments. A mechanical part including various Swiss-Type machining operations has been selected for the experiments. The evaluation process starts with generating a set of CNC (Computer Numerical Control) programs for machining the part at hand. Each CNC program considers a different set of machining process parameters. During the machining process, the power consumption of the spindle is measured. All collected data are assigned to the appropriate CNC program and thus to the set of machining process parameters. The evaluation approach consists in calculating the correlation between the normalized measured power consumption and the normalized power consumption prediction for each of the four fitness functions. The evaluation shows that the Lasso and Neural Network fitness functions have the highest correlation coefficient with 97%. The fitness function “Material Removal Rate” (MRR) has a correlation coefficient of 90%, whereas the Kienzle-based fitness function has a correlation coefficient of 80%.Keywords: adaptive machining, genetic algorithms, smart manufacturing, parameters optimization
Procedia PDF Downloads 1512131 Feasibility and Energy Efficiency Analysis of Chilled Water Radiant Cooling System of Office Apartment in Nigeria’s Tropical Climate City
Authors: Rasaq Adekunle Olabomi
Abstract:
More than 30% of the global building energy consumption is attributed to heating, ventilation and air-conditioning (HVAC) due to increasing urbanization and the need for more personal comfort. While heating is predominant in the temperate regions (especially during winter), comfort cooling is constantly needed in tropical regions such as Nigeria. This makes cooling a major contributor to the peak electrical load in the tropics. Meanwhile, the high solar energy availability in the tropical climate region presents a higher application potentials for solar thermal cooling systems; more so, the need for cooling mostly coincides with the solar energy availability. In addition to huge energy consumption, conventional (compressor type) air-conditioning systems mostly use refrigerants that are regarded as environmental unfriendly because of their ozone depletion potentials; this has made the alternative cooling systems to become popular in the present time. The better thermal capacity and less pumping power requirement of chilled water than chilled air has also made chilled water a preferred option over the chilled air cooling system. Radiant floor chilled water cooling is particularly is also considered suitable for spaces such as meeting room, seminar hall, auditorium, airport arrival and departure halls among others. This study did the analysis of the feasibility and energy efficiency of solar thermal chilled water for radiant flood cooling of an office apartment in a tropical climate city in Nigeria with a view to recommend its up-scaling. The analysis considered the weather parameters including available solar irradiance (kWh/m2-day) as well as the technical details of the solar thermal cooling systems to determine the feasibility. Project cost, its energy savings, emission reduction potentials and cost-to-benefits ration are used to analyze its energy efficiency as well as the viability of the cooling system. The techno-economic analysis of the proposed system, carried out using RETScreen software shows that its viability in but SWOT analysis of policy and institutional framework to promote solar energy utilization for the cooling systems shows weakness such as poor infrastructure and inadequate local capacity for technological development as major challenges.Keywords: cooling load, absorption cooling system, coefficient of performance, radiant floor, cost saving, emission reduction
Procedia PDF Downloads 372130 Integrated Mass Rapid Transit (MRT) and Bus System in Singapore: MRT Ridership and the Provision of Feeder Bus Services
Authors: Devansh Jain, Shu Ting Goh
Abstract:
With the aim of improving the quality of life of people of Singapore with provision of better transport services, Land and Transport Authority Singapore recently published its Master Plan 2013. The major objectives mentioned in the plan were to make a comprehensive public transport network with better quality Mass Rapid Transit, bus services along with cycling and walking. MRT is the backbone of the transport system in Singapore, and to promote and increase the MRT ridership, good accessibility to access the MRT stations is a necessity. The aim of this paper is to investigate the relationship between MRT ridership and the provision of feeder bus services in Singapore planning areas and also to understand the hub and spoke model adopted by Singapore for provision of transport services. The findings of the study will lead to conclusions made from the Regression model developed by the various factors affecting MRT ridership, and hence will benefit to enhance the services provided by the system.Keywords: quality of life, public transport, mass rapid transit, ridership
Procedia PDF Downloads 2552129 Analysis and Prediction of Netflix Viewing History Using Netflixlatte as an Enriched Real Data Pool
Authors: Amir Mabhout, Toktam Ghafarian, Amirhossein Farzin, Zahra Makki, Sajjad Alizadeh, Amirhossein Ghavi
Abstract:
The high number of Netflix subscribers makes it attractive for data scientists to extract valuable knowledge from the viewers' behavioural analyses. This paper presents a set of statistical insights into viewers' viewing history. After that, a deep learning model is used to predict the future watching behaviour of the users based on previous watching history within the Netflixlatte data pool. Netflixlatte in an aggregated and anonymized data pool of 320 Netflix viewers with a length 250 000 data points recorded between 2008-2022. We observe insightful correlations between the distribution of viewing time and the COVID-19 pandemic outbreak. The presented deep learning model predicts future movie and TV series viewing habits with an average loss of 0.175.Keywords: data analysis, deep learning, LSTM neural network, netflix
Procedia PDF Downloads 2632128 Arabic Light Stemmer for Better Search Accuracy
Authors: Sahar Khedr, Dina Sayed, Ayman Hanafy
Abstract:
Arabic is one of the most ancient and critical languages in the world. It has over than 250 million Arabic native speakers and more than twenty countries having Arabic as one of its official languages. In the past decade, we have witnessed a rapid evolution in smart devices, social network and technology sector which led to the need to provide tools and libraries that properly tackle the Arabic language in different domains. Stemming is one of the most crucial linguistic fundamentals. It is used in many applications especially in information extraction and text mining fields. The motivation behind this work is to enhance the Arabic light stemmer to serve the data mining industry and leverage it in an open source community. The presented implementation works on enhancing the Arabic light stemmer by utilizing and enhancing an algorithm that provides an extension for a new set of rules and patterns accompanied by adjusted procedure. This study has proven a significant enhancement for better search accuracy with an average 10% improvement in comparison with previous works.Keywords: Arabic data mining, Arabic Information extraction, Arabic Light stemmer, Arabic stemmer
Procedia PDF Downloads 3142127 A Smart Visitors’ Notification System with Automatic Secure Door Lock Using Mobile Communication Technology
Authors: Rabail Shafique Satti, Sidra Ejaz, Madiha Arshad, Marwa Khalid, Sadia Majeed
Abstract:
The paper presents the development of an automated security system to automate the entry of visitors, providing more flexibility of managing their record and securing homes or workplaces. Face recognition is part of this system to authenticate the visitors. A cost effective and SMS based door security module has been developed and integrated with the GSM network and made part of this system to allow communication between system and owner. This system functions in real time as when the visitor’s arrived it will detect and recognizes his face and on the result of face recognition process it will open the door for authorized visitors or notifies and allows the owner’s to take further action in case of unauthorized visitor. The proposed system is developed and it is successfully ensuring security, managing records and operating gate without physical interaction of owner.Keywords: SMS, e-mail, GSM modem, authenticate, face recognition, authorized
Procedia PDF Downloads 7922126 Adversary Emulation: Implementation of Automated Countermeasure in CALDERA Framework
Authors: Yinan Cao, Francine Herrmann
Abstract:
Adversary emulation is a very effective concrete way to evaluate the defense of an information system or network. It is about building an emulator, which depending on the vulnerability of a target system, will allow to detect and execute a set of identified attacks. However, emulating an adversary is very costly in terms of time and resources. Verifying the information of each technique and building up the countermeasures in the middle of the test is also needed to be accomplished manually. In this article, a synthesis of previous MITRE research on the creation of the ATT&CK matrix will be as the knowledge base of the known techniques and a well-designed adversary emulation software CALDERA based on ATT&CK Matrix will be used as our platform. Inspired and guided by the previous study, a plugin in CALDERA called Tinker will be implemented, which is aiming to help the tester to get more information and also the mitigation of each technique used in the previous operation. Furthermore, the optional countermeasures for some techniques are also implemented and preset in Tinker in order to facilitate and fasten the process of the defense improvement of the tested system.Keywords: automation, adversary emulation, CALDERA, countermeasures, MITRE ATT&CK
Procedia PDF Downloads 2142125 Utilizing Grid Computing to Enhance Power Systems Performance
Authors: Rafid A. Al-Khannak, Fawzi M. Al-Naima
Abstract:
Power load is one of the most important controlling keys which decide power demands and illustrate power usage to shape power market. Hence, power load forecasting is the parameter which facilitates understanding and analyzing all these aspects. In this paper, power load forecasting is solved under MATLAB environment by constructing a neural network for the power load to find an accurate simulated solution with the minimum error. A developed algorithm to achieve load forecasting application with faster technique is the aim for this paper. The algorithm is used to enable MATLAB power application to be implemented by multi machines in the Grid computing system, and to accomplish it within much less time, cost and with high accuracy and quality. Grid Computing, the modern computational distributing technology, has been used to enhance the performance of power applications by utilizing idle and desired Grid contributor(s) by sharing computational power resources.Keywords: DeskGrid, Grid Server, idle contributor(s), grid computing, load forecasting
Procedia PDF Downloads 4792124 Wastewater Treatment Using Sodom Apple Tree in Arid Regions
Authors: D. Oulhaci, M. Zehah, S. Meguellati
Abstract:
Collected by the sewerage network, the wastewater contains many polluting elements, coming from the population, commercial, industrial and agricultural activities. These waters are collected and discharged into the natural environment and pollute it. Hence the need to transport them before discharge to a treatment plant to undergo several treatment phases. The objective of this study is to highlight the purification performance of the "Sodom apple tree" which is a very common shrub in the region of Djanet and Illizi in Algeria. As material, we used small buckets filled with sand with a gravel substrate. We sowed seeds that we let grow a few weeks. The water supply is under a horizontal flow regime under-ground. The urban wastewater used is preceded by preliminary treatment. The water obtained after purification is collected using a tap in a container placed under the seal. The comparison between the inlet and the outlet waters showed that the presence of the Sodom apple tree contributes to reducing their pollutant parameters with significant rates: 81% for COD, 84%, for BOD , 95% for SM , 82% for NO⁻² , and 85% for NO⁻³ and can be released into the environment without risk of pollutionKeywords: arid zone, pollution, purification, re-use, wastewater.
Procedia PDF Downloads 852123 Glossematics and Textual Structure
Authors: Abdelhadi Nadjer
Abstract:
The structure of the text to the systemic school -(glossématique-Helmslev). At the beginning of the note we have a cursory look around the concepts of general linguistics The science that studies scientific study of human language based on the description and preview the facts away from the trend of education than we gave a detailed overview the founder of systemic school and most important customers and more methods and curriculum theory and analysis they extend to all humanities, practical action each offset by a theoretical and the procedure can be analyzed through the elements that pose as another method we talked to its links with other language schools where they are based on the sharp criticism of the language before and deflected into consideration for the field of language and its erection has outside or language network and its participation in the actions (non-linguistic) and after that we started our Valglosamatik analytical structure of the text is ejected text terminal or all of the words to was put for expression. This text Negotiable divided into types in turn are divided into classes and class should not be carrying a contradiction and be inclusive. It is on the same materials as described relationships that combine language and seeks to describe their relations and identified.Keywords: text, language schools, linguistics, human language
Procedia PDF Downloads 4622122 Towards a Security Model against Denial of Service Attacks for SIP Traffic
Authors: Arellano Karina, Diego Avila-Pesántez, Leticia Vaca-Cárdenas, Alberto Arellano, Carmen Mantilla
Abstract:
Nowadays, security threats in Voice over IP (VoIP) systems are an essential and latent concern for people in charge of security in a corporate network, because, every day, new Denial-of-Service (DoS) attacks are developed. These affect the business continuity of an organization, regarding confidentiality, availability, and integrity of services, causing frequent losses of both information and money. The purpose of this study is to establish the necessary measures to mitigate DoS threats, which affect the availability of VoIP systems, based on the Session Initiation Protocol (SIP). A Security Model called MS-DoS-SIP is proposed, which is based on two approaches. The first one analyzes the recommendations of international security standards. The second approach takes into account weaknesses and threats. The implementation of this model in a VoIP simulated system allowed to minimize the present vulnerabilities in 92% and increase the availability time of the VoIP service into an organization.Keywords: Denial-of-Service SIP attacks, MS-DoS-SIP, security model, VoIP-SIP vulnerabilities
Procedia PDF Downloads 2062121 Developing a Maturity Model of Digital Twin Application for Infrastructure Asset Management
Authors: Qingqing Feng, S. Thomas Ng, Frank J. Xu, Jiduo Xing
Abstract:
Faced with unprecedented challenges including aging assets, lack of maintenance budget, overtaxed and inefficient usage, and outcry for better service quality from the society, today’s infrastructure systems has become the main focus of many metropolises to pursue sustainable urban development and improve resilience. Digital twin, being one of the most innovative enabling technologies nowadays, may open up new ways for tackling various infrastructure asset management (IAM) problems. Digital twin application for IAM, as its name indicated, represents an evolving digital model of intended infrastructure that possesses functions including real-time monitoring; what-if events simulation; and scheduling, maintenance, and management optimization based on technologies like IoT, big data and AI. Up to now, there are already vast quantities of global initiatives of digital twin applications like 'Virtual Singapore' and 'Digital Built Britain'. With digital twin technology permeating the IAM field progressively, it is necessary to consider the maturity of the application and how those institutional or industrial digital twin application processes will evolve in future. In order to deal with the gap of lacking such kind of benchmark, a draft maturity model is developed for digital twin application in the IAM field. Firstly, an overview of current smart cities maturity models is given, based on which the draft Maturity Model of Digital Twin Application for Infrastructure Asset Management (MM-DTIAM) is developed for multi-stakeholders to evaluate and derive informed decision. The process of development follows a systematic approach with four major procedures, namely scoping, designing, populating and testing. Through in-depth literature review, interview and focus group meeting, the key domain areas are populated, defined and iteratively tuned. Finally, the case study of several digital twin projects is conducted for self-verification. The findings of the research reveal that: (i) the developed maturity model outlines five maturing levels leading to an optimised digital twin application from the aspects of strategic intent, data, technology, governance, and stakeholders’ engagement; (ii) based on the case study, levels 1 to 3 are already partially implemented in some initiatives while level 4 is on the way; and (iii) more practices are still needed to refine the draft to be mutually exclusive and collectively exhaustive in key domain areas.Keywords: digital twin, infrastructure asset management, maturity model, smart city
Procedia PDF Downloads 1632120 Particle Dust Layer Density and the Optical Wavelength Absorption Relationship in Photovoltaic Module
Authors: M. Mesrouk, A. Hadj Arab
Abstract:
This work allows highlight the effect of dust on the absorption of the optical spectrum on the photovoltaic module, the effect of the particles dust presence on the photovoltaic modules have been a microscopic scale studied with COMSOL Multi-physic software simulation. In this paper, we have supposed the dust layer as a diffraction network repetitive optical structure characterized by the spacing between particle which represented by 'd' and the simulated structure (air-dust particle-glass). In this study we can observe the relationship between the wavelength and the particle spacing, the simulation shows us that the maximum wavelength transmission value corresponding, λ0 = 400nm, which represent the spacing value between the particles dust, d = 400 nm. In fact, we can observe that while increase dust layer density the wavelength transmission value decrease, there is a relationship between the density and wavelength value which can be absorbed in a dusty photovoltaic panel.Keywords: dust effect, photovoltaic module, spectral absorption, wavelength transmission
Procedia PDF Downloads 4662119 The Impact of Childhood Cancer on Young Adult Survivors: A Life Course Perspective
Authors: Bridgette Merriman, Wen Fan
Abstract:
Background: Existing cancer survivorship literature explores varying physical, psychosocial, and psychological late effects experienced by survivors of childhood cancer. However, adolescent and young adult (AYA) survivors of childhood cancer are understudied compared to their adult and pediatric cancer counterparts. Furthermore, existing quality of life (QoL) research fails to account for how cancer survivorship affects survivors across the lifespan. Given that prior research suggests positive cognitive appraisals of adverse events - such as cancer - mitigate detrimental psychosocial symptomologies later in life; it is crucial to understand cancer’s impacts on AYA survivors of childhood malignancies across the life course in order to best support these individuals and prevent maladaptive psychosocial outcomes. Methods: This qualitative study adopted the life-course perspective to investigate the experiences of AYA survivors of childhood malignancies. Eligible patients included AYA 21-30 years old who were diagnosed with cancer <18 years old and off active treatment for >2 years. Participants were recruited through social media posts. Study fulfillment included taking part in one semi-structured video interview to explore areas of survivorship previously identified as being specific to AYA survivors. Interviews were transcribed, coded, and analyzed in accordance with narrative analysis and life-course theory. This study was approved by the Boston College Institutional Review Board. Results: Of 28 individuals who met inclusion criteria and expressed interest in the study, nineteen participants (12 women, 7 men, mean age 25.4 years old) completed the study. Life course theory analysis revealed that events relating to childhood cancer are interconnected throughout the life course rather than isolated events. This “trail of survivorship” includes age at diagnosis, transitioning to life after cancer, and relationships with other childhood survivors. Despite variability in objective characteristics surrounding these events, participants recalled positive experiences regarding at least one checkpoint, ultimately finding positive meaning from their cancer experience. Conclusions: These findings suggest that favorable subjective experiences at these checkpoints are critical in fostering positive conceptions of childhood malignancy for AYA survivors of childhood cancer. Ultimately, healthcare professionals and communities may use these findings to guide support resources and interventions for childhood cancer patients and AYA survivors, therein minimizing detrimental psychosocial effects and maximizing resiliency.Keywords: medical sociology, pediatric oncology, survivorship, qualitative, life course perspective
Procedia PDF Downloads 732118 An Experimental Testbed Using Virtual Containers for Distributed Systems
Authors: Parth Patel, Ying Zhu
Abstract:
Distributed systems have become ubiquitous, and they continue their growth through a range of services. With advances in resource virtualization technology such as Virtual Machines (VM) and software containers, developers no longer require high-end servers to test and develop distributed software. Even in commercial production, virtualization has streamlined the process of rapid deployment and service management. This paper introduces a distributed systems testbed that utilizes virtualization to enable distributed systems development on commodity computers. The testbed can be used to develop new services, implement theoretical distributed systems concepts for understanding, and experiment with virtual network topologies. We show its versatility through two case studies that utilize the testbed for implementing a theoretical algorithm and developing our own methodology to find high-risk edges. The results of using the testbed for these use cases have proven the effectiveness and versatility of this testbed across a range of scenarios.Keywords: distributed systems, experimental testbed, peer-to-peer networks, virtual container technology
Procedia PDF Downloads 1502117 Care at the Intersection of Biomedicine and Traditional Chinese Medicine: Narratives of Integration, Negotiation, and Provision
Authors: Jessica Ding
Abstract:
The field of global health is currently advocating for a resurgence in the use of traditional medicines to improve people-centered care. Healthcare policies are rapidly changing in response; in China, the increasing presence of TCM in the same spaces as biomedicine has led to a new term: integrative medicine. However, the existence of TCM as a part of integrative medicine creates a pressing paradoxical tension where TCM is both seen as a marginalized system within ‘modern’ hospitals and as a modality worth integrating. Additionally, the impact of such shifts has not been fully explored: the World Health Organization for one focuses only on three angles —practices, products, and practitioners— with regards to traditional medicines. Through ten weeks of fieldwork conducted at an urban hospital in Shanghai, China, this research expands the perspective of existing strategies by looking at integrative care through a fourth lens: patients and families. The understanding of self-care, health-seeking behavior, and non-professional caregiving structures are critical to grasping the significance of traditional medicine for people-centered care. Indeed, those individual and informal health care expectations align with the very spaces and needs that traditional medicine has filled before such ideas of integration. It specifically looks at this issue via three processes that operationalize experiences of care: (1) how aspects of TCM are valued within integrative medicine, (2) how negotiations of care occur between patients and doctors, and (3) how 'good quality' caregiving presents in integrative clinical spaces. This research hopes to lend insight into how culturally embedded traditions, bureaucratic and institutional rationalities, and social patterns of health-seeking behavior influence care to shape illness experiences at the intersection of two medical modalities. This analysis of patients’ clinical and illness experiences serves to enrich the narratives of integrative medical care’s ability to provide patient-centered care to determine how international policies are realized at the individual level. This anthropological study of the integration of Traditional Chinese medicine in local contexts can reveal the extent to which global strategies, as promoted by the WHO and the Chinese government actually align with the expectations and perspectives of patients receiving care. Ultimately, this ethnographic analysis of a local Chinese context hopes to inform global policies regarding the future use and integration of traditional medicines.Keywords: emergent systems, global health, integrative medicine, traditional Chinese medicine, TCM
Procedia PDF Downloads 1472116 The Development of Community Leadership Strategies for Career Development of the Benjarong Pottery Products in Eight Upper Central Provinces
Authors: Thanaporn Chaimongkol
Abstract:
The objective of this research was aimed to examine the factors that influence the development of community leadership strategies to further develop the career regarding the Benjarong pottery products in eight upper central provinces, Thailand. The sample included (1) 1200 Benjarong pottery operators, (2) 30 involved representatives at both the policy level and support, and (3) OTOP network of 24 people. In this quantitative study, investigating data was conducted on individual session basis. The research instruments used included questionnaires and interview. The results showed that the components of the development of the community leadership strategies for career development of the Benjarong pottery products in eight upper central provinces were high overall; the Five Competitive Forces were of the highest average, followed by bargaining power of suppliers, and McKinsey 7's framework, respectively; where the highest average was strategy.Keywords: community leadership, strategy development, Benjarong Pottery, 8 upper central provinces
Procedia PDF Downloads 3302115 Product Modularity, Collaboration and the Impact on Innovation Performance in Intra-Organizational R&D Networks
Authors: Daniel Martinez, Tim de Leeuw, Stefan Haefliger
Abstract:
The challenges of managing a large and geographically dispersed R&D organization have been further increasing during the past years, concentrating on the leverage of a geo-graphically dispersed body of knowledge in an efficient and effective manner. In order to reduce complexity and improve performance, firms introduce product modularity as one key element for global R&D network teams to develop their products and projects in collaboration. However, empirical studies on the effects of product modularity on innovation performance are really scant. Furthermore, some researchers have suggested that product modularity promotes innovation performance, while others argue that it inhibits innovation performance. This research fills this gap by investigating the impact of product modularity on various dimensions of innovation performance, i.e. effectiveness and efficiency. By constructing the theoretical framework, this study suggests that that there is an inverted U-shaped relationship between product modularity and innovation performance. Moreover, this research work suggests that the optimum of innovation performance efficiency will be at a higher level than innovation performance effectiveness at a given product modularity level.Keywords: modularity, innovation performance, networks, R&D, collaboration
Procedia PDF Downloads 5262114 Multi-Scale Urban Spatial Evolution Analysis Based on Space Syntax: A Case Study in Modern Yangzhou, China
Authors: Dai Zhimei, Hua Chen
Abstract:
The exploration of urban spatial evolution is an important part of urban development research. Therefore, the evolutionary modern Yangzhou urban spatial texture was taken as the research object, and Spatial Syntax was used as the main research tool, this paper explored Yangzhou spatial evolution law and its driving factors from the urban street network scale, district scale and street scale. The study has concluded that at the urban scale, Yangzhou urban spatial evolution is the result of a variety of causes, including physical and geographical condition, policy and planning factors, and traffic conditions, and the evolution of space also has an impact on social, economic, environmental and cultural factors. At the district and street scales, changes in space will have a profound influence on the history of the city and the activities of people. At the end of the article, the matters needing attention during the evolution of urban space were summarized.Keywords: block, space syntax and methodology, street, urban space, Yangzhou
Procedia PDF Downloads 1862113 Determination of Frequency Relay Setting during Distributed Generators Islanding
Authors: Tarek Kandil, Ameen Ali
Abstract:
Distributed generation (DG) has recently gained a lot of momentum in power industry due to market deregulation and environmental concerns. One of the most technical challenges facing DGs is islanding of distributed generators. The current industry practice is to disconnect all distributed generators immediately after the occurrence of islands within 200 to 350 ms after loss of main supply. To achieve such goal, each DG must be equipped with an islanding detection device. Frequency relays are one of the most commonly used loss of mains detection method. However, distribution utilities may be faced with concerns related to false operation of these frequency relays due to improper settings. The commercially available frequency relays are considering standard tight setting. This paper investigates some factors related to relays internal algorithm that contribute to their different operating responses. Further, the relay operation in the presence of multiple distributed at the same network is analyzed. Finally, the relay setting can be accurately determined based on these investigation and analysis.Keywords: frequency relay, distributed generation, islanding detection, relay setting
Procedia PDF Downloads 5362112 Drone Classification Using Classification Methods Using Conventional Model With Embedded Audio-Visual Features
Authors: Hrishi Rakshit, Pooneh Bagheri Zadeh
Abstract:
This paper investigates the performance of drone classification methods using conventional DCNN with different hyperparameters, when additional drone audio data is embedded in the dataset for training and further classification. In this paper, first a custom dataset is created using different images of drones from University of South California (USC) datasets and Leeds Beckett university datasets with embedded drone audio signal. The three well-known DCNN architectures namely, Resnet50, Darknet53 and Shufflenet are employed over the created dataset tuning their hyperparameters such as, learning rates, maximum epochs, Mini Batch size with different optimizers. Precision-Recall curves and F1 Scores-Threshold curves are used to evaluate the performance of the named classification algorithms. Experimental results show that Resnet50 has the highest efficiency compared to other DCNN methods.Keywords: drone classifications, deep convolutional neural network, hyperparameters, drone audio signal
Procedia PDF Downloads 1072111 Whale Optimization Algorithm for Optimal Reactive Power Dispatch Solution Under Various Contingency Conditions
Authors: Medani Khaled Ben Oualid
Abstract:
Most of researchers solved and analyzed the ORPD problem in the normal conditions. However, network collapses appear in contingency conditions. In this paper, ORPD under several contingencies is presented using the proposed method WOA. To ensure viability of the power system in contingency conditions, several critical cases are simulated in order to prevent and prepare the power system to face such situations. The results obtained are carried out in IEEE 30 bus test system for the solution of ORPD problem in which control of bus voltages, tap position of transformers and reactive power sources are involved. Moreover, another method, namely, Particle Swarm Optimization with Time Varying Acceleration Coefficient (PSO-TVAC) has been compared with the proposed technique. Simulation results indicate that the proposed WOA gives remarkable solution in terms of effectiveness in case of outages.Keywords: optimal reactive power dispatch, metaheuristic techniques, whale optimization algorithm, real power loss minimization, contingency conditions
Procedia PDF Downloads 942110 Insights on the Social-Economic Implications of the Blue Economy Concept on Coastal Tourism in Tonga
Authors: Amelia Faotusia
Abstract:
The blue economy concept was coined by Pacific nations in recognition of the importance of sustainably managing their extensive marine territories. This is especially important for major ocean-based economic sectors of Pacific economies, such as coastal tourism. There is an absence of research, however, on the key ways in which the blue economy concept has emerged in discourse and public policy in Pacific countries, as well as how it articulates with coastal tourism. This research helps to fill such a gap with a specific focus on Tonga through the application of a post-positivist research approach to conduct a desktop study of relevant national documents and qualitative interviews with relevant government staff, civil society organizations, and tourism operators. The findings of the research reflect the importance of institutional integration and partnerships for a successful blue economy transition and are presented in the form of two case studies corresponding to two sub-sectors of Tonga’s coastal tourism sector: (i) the whale-watching and swimming industry, and (ii) beach resorts and restaurants. A thematic analysis applied to the interview data of both cases then enabled the identification of key areas and issues for socio-economic policy intervention and recommendations in support of blue economy transitions in Tonga’s coastal tourism sector. Examples of the relevant areas and issues that emerged included the importance of foreign direct investment, local market access, community-based special management areas, as well as the need to address the anthropogenic impacts of tropical cyclones, whale tourism, plastic litter on coastal assets, and ecosystems. Policy and practical interventions in support of addressing such issues include a proposed restructuring of the whale-watching and swimming licensing system; integration of climate resilience, adaptation, and capacity building as priorities of local blue economy interventions; as well as strengthening of the economic sustainability dimension of blue economy policies. Finally, this research also revealed the need for further specificity and research on the influence and value of local Tongan culture and traditional knowledge, particularly within existing customary marine tenure systems, on Tonga’s national and sectoral blue economy policies and transitions.Keywords: blue economy, coastal tourism, integrated ocean management, ecosystem resilience
Procedia PDF Downloads 992109 Chaos Cryptography in Cloud Architectures with Lower Latency
Authors: Mohammad A. Alia
Abstract:
With the rapid evolution of the internet applications, cloud computing becomes one of today’s hottest research areas due to its ability to reduce costs associated with computing. Cloud is, therefore, increasing flexibility and scalability for computing services in the internet. Cloud computing is Internet based computing due to shared resources and information which are dynamically delivered to consumers. As cloud computing share resources via the open network, hence cloud outsourcing is vulnerable to attack. Therefore, this paper will explore data security of cloud computing by implementing chaotic cryptography. The proposal scenario develops a problem transformation technique that enables customers to secretly transform their information. This work proposes the chaotic cryptographic algorithms have been applied to enhance the security of the cloud computing accessibility. However, the proposed scenario is secure, easy and straightforward process. The chaotic encryption and digital signature systems ensure the security of the proposed scenario. Though, the choice of the key size becomes crucial to prevent a brute force attack.Keywords: chaos, cloud computing, security, cryptography
Procedia PDF Downloads 348