Search results for: computer operation
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5009

Search results for: computer operation

4649 Optimizing Operation of Photovoltaic System Using Neural Network and Fuzzy Logic

Authors: N. Drir, L. Barazane, M. Loudini

Abstract:

It is well known that photovoltaic (PV) cells are an attractive source of energy. Abundant and ubiquitous, this source is one of the important renewable energy sources that have been increasing worldwide year by year. However, in the V-P characteristic curve of GPV, there is a maximum point called the maximum power point (MPP) which depends closely on the variation of atmospheric conditions and the rotation of the earth. In fact, such characteristics outputs are nonlinear and change with variations of temperature and irradiation, so we need a controller named maximum power point tracker MPPT to extract the maximum power at the terminals of photovoltaic generator. In this context, the authors propose here to study the modeling of a photovoltaic system and to find an appropriate method for optimizing the operation of the PV generator using two intelligent controllers respectively to track this point. The first one is based on artificial neural networks and the second on fuzzy logic. After the conception and the integration of each controller in the global process, the performances are examined and compared through a series of simulation. These two controller have prove by their results good tracking of the MPPT compare with the other method which are proposed up to now.

Keywords: maximum power point tracking, neural networks, photovoltaic, P&O

Procedia PDF Downloads 325
4648 A Simple and Easy-To-Use Tool for Detecting Outer Contour of Leukocytes Based on Image Processing Techniques

Authors: Retno Supriyanti, Best Leader Nababan, Yogi Ramadhani, Wahyu Siswandari

Abstract:

Blood cell morphology is an important parameter in a hematology test. Currently, in developing countries, a lot of hematology is done manually, either by physicians or laboratory staff. According to the limitation of the human eye, examination based on manual method will result in a lower precision and accuracy. In addition, the hematology test by manual will further complicate the diagnosis in some areas that do not have competent medical personnel. This research aims to develop a simple tool in the detection of blood cell morphology-based computer. In this paper, we focus on the detection of the outer contour of leukocytes. The results show that the system that we developed is promising for detecting blood cell morphology automatically. It is expected, by implementing this method, the problem of accuracy, precision and limitations of the medical staff can be solved.

Keywords: morphology operation, developing countries, hematology test, limitation of medical personnel

Procedia PDF Downloads 319
4647 AI Peer Review Challenge: Standard Model of Physics vs 4D GEM EOS

Authors: David A. Harness

Abstract:

Natural evolution of ATP cognitive systems is to meet AI peer review standards. ATP process of axiom selection from Mizar to prove a conjecture would be further refined, as in all human and machine learning, by solving the real world problem of the proposed AI peer review challenge: Determine which conjecture forms the higher confidence level constructive proof between Standard Model of Physics SU(n) lattice gauge group operation vs. present non-standard 4D GEM EOS SU(n) lattice gauge group spatially extended operation in which the photon and electron are the first two trace angular momentum invariants of a gravitoelectromagnetic (GEM) energy momentum density tensor wavetrain integration spin-stress pressure-volume equation of state (EOS), initiated via 32 lines of Mathematica code. Resulting gravitoelectromagnetic spectrum ranges from compressive through rarefactive of the central cosmological constant vacuum energy density in units of pascals. Said self-adjoint group operation exclusively operates on the stress energy momentum tensor of the Einstein field equations, introducing quantization directly on the 4D spacetime level, essentially reformulating the Yang-Mills virtual superpositioned particle compounded lattice gauge groups quantization of the vacuum—into a single hyper-complex multi-valued GEM U(1) × SU(1,3) lattice gauge group Planck spacetime mesh quantization of the vacuum. Thus the Mizar corpus already contains all of the axioms required for relevant DeepMath premise selection and unambiguous formal natural language parsing in context deep learning.

Keywords: automated theorem proving, constructive quantum field theory, information theory, neural networks

Procedia PDF Downloads 164
4646 Application of ICT in the Teaching and Learning of English Language in Nigerian Secondary Schools

Authors: Richard Ayobayowa Foyewa

Abstract:

This work examined the application of ICT in the teaching and learning of English language in Nigerian secondary schools. The definition of ICT was given briefly before areas in which the ICT could be applied in teaching and learning of English language were observed. Teachers’ attitudes towards the use of the computer and Internet facilities were also observed. The conclusion drawn was that ICT is very relevant in the teaching and learning of English language in Nigerian secondary schools. It was therefore recommended that teachers who are not computer literate should go for the training without further delay; government should always employ English language teachers who are computer literates. Government should make fund available in schools for the training and re-training of English language teachers in various computer programmes and in making internet facilities available in secondary schools.

Keywords: ICT, Nigerian secondary schools, teaching and learning of English

Procedia PDF Downloads 304
4645 Life Cycle Assesment (LCA) Study of Shrimp Fishery in the South East Coast of Arabian Sea

Authors: Leela Edwin, Rithin Joseph, P. H. Dhiju Das, K. A. Sayana, P. S. Muhammed Sherief

Abstract:

The shrimp trawl fishery is considered one of the more valuable fisheries from the South east Coast of Arabian Sea. Inventory data for the shrimp were collected over 1 year period and used to carry out a life cycle assessment (LCA). LCA was performed to assess and compare the environmental impacts associated with the fishing operations related to shrimp fishery. This analysis included the operation of the vessels, together with major inputs related to the production of diesel, trawl nets, or anti-fouling paints. Data regarding vessel operation was obtained from the detailed questionnaires filled out by 180 trawlers. The analysis on environmental impacts linked to shrimp extraction on a temporal scale, showed that varying landings enhanced the environmental burdens mainly associated with activities related to diesel production, transport and consumption of the fishing vessels. Discard rates for trawlers were also identified as a major environmental impact in this fishery.

Keywords: shrimp trawling, life cycle assesment (LCA), Arabian sea, environmental impacts

Procedia PDF Downloads 308
4644 Classification of Computer Generated Images from Photographic Images Using Convolutional Neural Networks

Authors: Chaitanya Chawla, Divya Panwar, Gurneesh Singh Anand, M. P. S Bhatia

Abstract:

This paper presents a deep-learning mechanism for classifying computer generated images and photographic images. The proposed method accounts for a convolutional layer capable of automatically learning correlation between neighbouring pixels. In the current form, Convolutional Neural Network (CNN) will learn features based on an image's content instead of the structural features of the image. The layer is particularly designed to subdue an image's content and robustly learn the sensor pattern noise features (usually inherited from image processing in a camera) as well as the statistical properties of images. The paper was assessed on latest natural and computer generated images, and it was concluded that it performs better than the current state of the art methods.

Keywords: image forensics, computer graphics, classification, deep learning, convolutional neural networks

Procedia PDF Downloads 323
4643 Five-Phase Induction Motor Drive System Driven by Five-Phase Packed U Cell Inverter: Its Modeling and Performance Evaluation

Authors: Mohd Tariq

Abstract:

The three phase system drives produce the problem of more torque pulsations and harmonics. This issue prevents the smooth operation of the drives and it also induces the amount of heat generated thus resulting in an increase in power loss. Higher phase system offers smooth operation of the machines with greater power capacity. Five phase variable-speed induction motor drives are commonly used in various industrial and commercial applications like tractions, electrical vehicles, ship propulsions and conveyor belt drive system. In this work, a comparative analysis of the different modulation schemes applied on the five-level five-phase Packed U Cell (PUC) inverter fed induction motor drives is presented. The performance of the inverter is greatly affected with the modulation schemes applied. The system is modeled, designed, and implemented in MATLAB®/Simulink environment. Experimental validation is done for the prototype of single phase, whereas five phase experimental validation is proposed in the future works.

Keywords: Packed U-Cell (PUC) inverter, five-phase system, pulse width modulation (PWM), induction motor (IM)

Procedia PDF Downloads 172
4642 Training of Future Computer Science Teachers Based on Machine Learning Methods

Authors: Meruert Serik, Nassipzhan Duisegaliyeva, Danara Tleumagambetova

Abstract:

The article highlights and describes the characteristic features of real-time face detection in images and videos using machine learning algorithms. Students of educational programs reviewed the research work "6B01511-Computer Science", "7M01511-Computer Science", "7M01525- STEM Education," and "8D01511-Computer Science" of Eurasian National University named after L.N. Gumilyov. As a result, the advantages and disadvantages of Haar Cascade (Haar Cascade OpenCV), HoG SVM (Histogram of Oriented Gradients, Support Vector Machine), and MMOD CNN Dlib (Max-Margin Object Detection, convolutional neural network) detectors used for face detection were determined. Dlib is a general-purpose cross-platform software library written in the programming language C++. It includes detectors used for determining face detection. The Cascade OpenCV algorithm is efficient for fast face detection. The considered work forms the basis for the development of machine learning methods by future computer science teachers.

Keywords: algorithm, artificial intelligence, education, machine learning

Procedia PDF Downloads 64
4641 Between Dark and Light: The Construction and the Exclusion of Memory of Prison Heritage in Post-Soviet Period

Authors: Guo Cyuan Deng

Abstract:

This study represents how the Soviet-occupied dark memory in Baltic countries were interpreted and represented by examining the way of management of prison heritage. Based on the formulation of a dark-tourism spectrum which Philip Stone proposed, the Patarei prison in Estonia and the Karosta prison in Latvia are compared, and it is thought that both prisons, which had experienced similar colonial history, face different tourism operation in the present. The former is being run by NGO and remain the situation of “empty" by art intervening. However, the Estonia government attempt to get the operation of museum and transform it to anti-Soviet museum in order show national identity. By contrast, the latter is being managed by private company, whom transformed the prison to "dark fun factories" by entertainment activities in order to private capital accumulation. Moreover, it is not only indicated that both prisons exclude the minority's memory, but also the flaws of dark-tourism spectrum which divide the dark and light are discussed. Finally, given the nature and function of dark heritage, the concept "le métro" is used to supplement Stone's spectrum.

Keywords: dark tourism, prison heritage, Post-Soviet, Baltic countries, national identities

Procedia PDF Downloads 295
4640 Analyzing the Attitudes of Prep-Class Students at Higher Education towards Computer-Based Foreign Language Education

Authors: Sakine Sincer

Abstract:

In today’s world, the borders between countries and globalization are getting faster. It is an undeniable fact that this trend mostly results from the developments and improvements in technology. Technology, which dominates our lives to a great extent, has turned out to be one of the most important resources to be used in building an effective and fruitful educational atmosphere. Nowadays, technology is a significant means of arranging educational activities at all levels of education such as primary, secondary or tertiary education. This study aims at analyzing the attitudes of prep-class students towards computer-based foreign language education. Within the scope of this study, prep-class students at a university in Ankara, Turkey in 2013-2014 Academic Year participated in this study. The participants were asked to fill in 'Computer-Based Educational Attitude Scale.' The data gathered in this study were analyzed by means of using statistical devices such as means, standard deviation, percentage as well as t-test and ANOVA. At the end of the analysis, it was found out that the participants had a highly positive attitude towards computer-based language education.

Keywords: computer-based education, foreign language education, higher education, prep-class

Procedia PDF Downloads 424
4639 Unraveling Biostimulation of Decolorized Mediators for Microbial Fuel Cell-Aided Textile Dye Decontamination

Authors: Pei-Lin Yueh, Bor-Yann Chen, Chuan-Chung Hsueh

Abstract:

This first-attempt study revealed that decolorized intermediates of azo dyes could act as redox mediators to assist wastewater (WW) decolorization due to enhancement of electron-transport phenomena. Electrochemical impedance spectra indicated that hydroxyl and amino-substituent(s) were functional group(s) as redox-mediator(s). As azo dyes are usually multiple benzene rings structured, their derived decolorized intermediates are likely to play roles of electron shuttles due to lower barrier of energy gap for electron shuttling. According to cyclic voltammetric profiles, redox-mediating characteristics of decolorized intermediates of azo dyes (e.g., RBu171, RR198, RR141, and RBk5) were clearly disclosed. With supplementation of biodecolorized metabolites of RR141 and 198, decolorization performance of could be evidently augmented. This study also suggested the optimal modes of microbial fuel cell (MFC)-assisted WW decolorization would be plug-flow or batch mode of operation with no mix. Single chamber-MFCs would be more favourable than double chamber MFCs due to non-mixing contacting reactor scheme for operation.

Keywords: redox mediators, dye decolorization, bioelectricity generation, microbial fuel cells

Procedia PDF Downloads 314
4638 Augmentation of Automatic Selective Door Operation systems with UWB positioning

Authors: John Chan, Jake Linnenbank, Gavin Caird

Abstract:

Automatic Selective Door Operation (ASDO) systems are increasingly used in railways to provide Correct Side Door Enable (CSDE) protection as well as to protect passenger doors opening off the platform where the train is longer than the platform, or in overshoot or undershoot scenarios. Such ASDO systems typically utilise trackside-installed RFID beacons, such as Eurobalises for odometry positioning purposes. Installing such trackside infrastructure may not be desirable or possible due to various factors such as conflict with existing infrastructure, potential damage from track tamping and jurisdiction constraints. Ultra-wideband (UWB) positioning technology could enable ASDO positioning requirements to be met without requiring installation of equipment directly on track since UWB technology can be installed on adjacent infrastructure such as on platforms. This paper will explore the feasibility of upgrading existing ASDO systems with UWB positioning technology, the feasibility of retrofitting UWB-enabled ASDO systems onto unfitted trains, and any other considerations relating to the use of UWB positioning for ASDO applications.

Keywords: UWB, ASDO, automatic selective door operations, CSDE, correct side door enable

Procedia PDF Downloads 64
4637 Study on Measuring Method and Experiment of Arc Fault Detection Device

Authors: Yang Jian-Hong, Zhang Ren-Cheng, Huang Li

Abstract:

Arc fault is one of the main inducements of electric fires. Arc Fault Detection Device (AFDD) can detect arc fault effectively. Arc fault detections and unhooking standards are the keys to AFDD practical application. First, an arc fault continuous production system was developed, which could count the arc half wave number. Then, Combining with the UL1699 standard, ignition probability curve of cotton and unhooking time of various currents intensity were obtained by experiments. The combustion degree of arc fault could be expressed effectively by arc area. Experiments proved that electric fires would be misjudged or missed only using arc half wave number as AFDD unhooking basis. At last, Practical tests were carried out on the self-developed AFDD system. The result showed that actual AFDD unhooking time was the sum of arc half wave cycling number, Arc wave identification time and unhooking mechanical operation time And the first two shared shorter time. Unhooking time standard depended on the shortest mechanical operation time.

Keywords: arc fault detection device, arc area, arc half wave, unhooking time, arc fault

Procedia PDF Downloads 493
4636 Frequency Recognition Models for Steady State Visual Evoked Potential Based Brain Computer Interfaces (BCIs)

Authors: Zeki Oralhan, Mahmut Tokmakçı

Abstract:

SSVEP based brain computer interface (BCI) systems have been preferred, because of high information transfer rate (ITR) and practical use. ITR is the parameter of BCI overall performance. For high ITR value, one of specification BCI system is that has high accuracy. In this study, we investigated to recognize SSVEP with shorter time and lower error rate. In the experiment, there were 8 flickers on light crystal display (LCD). Participants gazed to flicker which had 12 Hz frequency and 50% duty cycle ratio on the LCD during 10 seconds. During the experiment, EEG signals were acquired via EEG device. The EEG data was filtered in preprocessing session. After that Canonical Correlation Analysis (CCA), Multiset CCA (MsetCCA), phase constrained CCA (PCCA), and Multiway CCA (MwayCCA) methods were applied on data. The highest average accuracy value was reached when MsetCCA was applied.

Keywords: brain computer interface, canonical correlation analysis, human computer interaction, SSVEP

Procedia PDF Downloads 255
4635 Design and Realization of Computer Network Security Perception Control System

Authors: El Miloudi Djelloul

Abstract:

Based on analysis on applications by perception control technology in computer network security status and security protection measures, from the angles of network physical environment and network software system environmental security, this paper provides network security system perception control solution using Internet of Things (IOT), telecom and other perception technologies. Security Perception Control System is in the computer network environment, utilizing Radio Frequency Identification (RFID) of IOT and telecom integration technology to carry out integration design for systems. In the network physical security environment, RFID temperature, humidity, gas and perception technologies are used to do surveillance on environmental data, dynamic perception technology is used for network system security environment, user-defined security parameters, security log are used for quick data analysis, extends control on I/O interface, by development of API and AT command, Computer Network Security Perception Control based on Internet and GSM/GPRS is achieved, which enables users to carry out interactive perception and control for network security environment by WEB, E-MAIL as well as PDA, mobile phone short message and Internet. In the system testing, through middle ware server, security information data perception in real time with deviation of 3-5% was achieved; it proves the feasibility of Computer Network Security Perception Control System.

Keywords: computer network, perception control system security strategy, Radio Frequency Identification (RFID)

Procedia PDF Downloads 429
4634 Theory of Gyrotron Amplifier in a Vane-Loaded Waveguide with Inner Dielectric Material

Authors: Reyhaneh Hashemi, Shahrooz Saviz

Abstract:

In his study, we have survey the theory of gyrotron amplifier in a vane-loaded waveguide with inner dielectric material. Dispersion relation for electromagnetic waves emitted by a cylindrical waveguide that provided with wedge-shaped metal vanes projecting radially inward from the wall of the guide and exited in the transverse-electric mode was analysed. From numerical analysis of this dispersion relation, it is shown that the stability behavior of the fast-wave mode is dependent of the dielectric constant. With a small axial momentum spreed, a super bandwidth is shown to be attainable by a mixed mode operation. Also, with the utilization from the numeric analysis of relation dispersion. We show that in the –speed mode, the constant is independent de-electric. With the ratio of dispersion of smell, high –bandwith was obtained for the combined mode. And at the end, we were comparing the result of our work (vane-loaded) by the waveguide with a smooth wall.

Keywords: gyrotron amplifier, waveguide, vane-loaded waveguide, dielectric material, dispersion relation, cylindrical waveguide, fast-wave mode, mixed mode operation

Procedia PDF Downloads 86
4633 Cloud Computing in Data Mining: A Technical Survey

Authors: Ghaemi Reza, Abdollahi Hamid, Dashti Elham

Abstract:

Cloud computing poses a diversity of challenges in data mining operation arising out of the dynamic structure of data distribution as against the use of typical database scenarios in conventional architecture. Due to immense number of users seeking data on daily basis, there is a serious security concerns to cloud providers as well as data providers who put their data on the cloud computing environment. Big data analytics use compute intensive data mining algorithms (Hidden markov, MapReduce parallel programming, Mahot Project, Hadoop distributed file system, K-Means and KMediod, Apriori) that require efficient high performance processors to produce timely results. Data mining algorithms to solve or optimize the model parameters. The challenges that operation has to encounter is the successful transactions to be established with the existing virtual machine environment and the databases to be kept under the control. Several factors have led to the distributed data mining from normal or centralized mining. The approach is as a SaaS which uses multi-agent systems for implementing the different tasks of system. There are still some problems of data mining based on cloud computing, including design and selection of data mining algorithms.

Keywords: cloud computing, data mining, computing models, cloud services

Procedia PDF Downloads 463
4632 Numerical Methods versus Bjerksund and Stensland Approximations for American Options Pricing

Authors: Marasovic Branka, Aljinovic Zdravka, Poklepovic Tea

Abstract:

Numerical methods like binomial and trinomial trees and finite difference methods can be used to price a wide range of options contracts for which there are no known analytical solutions. American options are the most famous of that kind of options. Besides numerical methods, American options can be valued with the approximation formulas, like Bjerksund-Stensland formulas from 1993 and 2002. When the value of American option is approximated by Bjerksund-Stensland formulas, the computer time spent to carry out that calculation is very short. The computer time spent using numerical methods can vary from less than one second to several minutes or even hours. However to be able to conduct a comparative analysis of numerical methods and Bjerksund-Stensland formulas, we will limit computer calculation time of numerical method to less than one second. Therefore, we ask the question: Which method will be most accurate at nearly the same computer calculation time?

Keywords: Bjerksund and Stensland approximations, computational analysis, finance, options pricing, numerical methods

Procedia PDF Downloads 442
4631 Impact of Gold Mining on Crop Production, Livelihood and Environmental Sustainability in West Africa in the Context of Water-Energy-Food Nexus

Authors: Yusif Habib

Abstract:

The Volta River Basin (VRB) is a transboundary resource shared by Six (6) the West African States. It’s utilization spans across irrigation, hydropower generation, domestic/household water use, transportation, industrial processing, among others. Simultaneously, mineral resources such as gold are mined within the VRB catchment. Typically, the extraction/mining operation is earth-surface excavation; known as Artisanal and Small-scale mining. We developed a conceptual framework in the context of Water-Energy-Food (WEF) Nexus to delineate the trade-offs and synergies between the mineral extractive operation’s impact on Agricultural systems, specifically, cereal crops (e.g. Maize, Millet, and Rice) and the environment (water and soil quality, deforestation, etc.) on the VRB. Thus, the study examined the trade-offs and synergies through the WEF nexus lens to explore the extent of an eventual overarching mining preference for gold exploration with high economic returns as opposed to the presumably low yearly harvest and household income from food crops production to inform intervention prioritization. Field survey (household, expert, and stakeholder consultation), bibliometric analysis/literature review, scenario, and simulation models, including land-use land cover (LULC) analyses, were conducted. The selected study area(s) in Ghana was the location where the mineral extractive operation’s presence and impact are widespread co-exist with the Agricultural systems. Overall, the study proposes mechanisms of the virtuous cycle through FEW Nexus instead of the presumably existing vicious cycle to inform decision making and policy implementation.

Keywords: agriculture, environmental sustainability, gold Mining, synergies, trade-off, water-energy-food nexus

Procedia PDF Downloads 144
4630 Education Quality Assurance Administration of Suan Sunandha Rajabhat University

Authors: Nopadol Burananuth, Tawatpupisit Pattaradapa

Abstract:

The objective of this research is to study opinion of staff responsible for Quality Assurance. Research sample is 50 staff at Suan Sunandha Rajabhat University related to Quality Assurance works from each faculty and organization within the university. Data were analyzed using the computer program. The statistics used in data analysis were frequency, percentage, mean and standard deviation. The results reveal that most of the respondents were female, 92%, aged between 31-40 years, 44%. Most of them have been working on Quality Assurance for 1-3 years, 44%. The staff opinion survey showed that the operation received the highest score. In terms of Planning, committee appointment and job descriptions received the highest mean score. For Checking, acknowledging the results and reviewing quality in education received the highest mean score. For Acting, participating in the meeting in order to revise approach to Quality Assurance received the highest mean score. For Doing, planning an internal quality assurance by assigning period, budget and responsibilities received the highest mean score.

Keywords: education quality assurance, administration, staff, Suan Sunandha Rajabhat University

Procedia PDF Downloads 383
4629 Input-Output Analysis in Laptop Computer Manufacturing

Authors: H. Z. Ulukan, E. Demircioğlu, M. Erol Genevois

Abstract:

The scope of this paper and the aim of proposed model were to apply monetary Input –Output (I-O) analysis to point out the importance of reusing know-how and other requirements in order to reduce the production costs in a manufacturing process for a laptop computer. I-O approach using the monetary input-output model is employed to demonstrate the impacts of different factors in a manufacturing process. A sensitivity analysis showing the correlation between these different factors is also presented. It is expected that the recommended model would have an advantageous effect in the cost minimization process.

Keywords: input-output analysis, monetary input-output model, manufacturing process, laptop computer

Procedia PDF Downloads 379
4628 Proprietary Blend Synthetic Rubber as Loss Circulation Material in Drilling Operation

Authors: Zatil Afifah Omar, Siti Nur Izati Azmi, Kathi Swaran, Navin Kumar

Abstract:

Lost circulation has always been one of the greatest problems faced by drilling companies during drilling operations due to excessive drilling Fluids losses. Loss of circulation leads to Huge cost and non-productive time. The objective of this study is to evaluate the sealing efficiency of a proprietary blend of synthetic rubber as loss circulation material in comparison with a conventional product such as calcium carbonate, graphite, cellulosic, and nutshells. Sand Bed Tester with a different proprietary blend of synthetic rubber compositions has been used to determine the effectiveness of the LCM in preventing drilling fluids losses in a lab scale. Test results show the proprietary blend of synthetic rubber have good bridging properties and sealing Off fractures of various sizes. The finish product is environmentally friendly with lower production lead time and lower production cost compared to current conventional loss circulation materials used in current drilling operations.

Keywords: loss circulation materials, drilling operation, sealing efficiency, LCM

Procedia PDF Downloads 174
4627 Improving Lane Detection for Autonomous Vehicles Using Deep Transfer Learning

Authors: Richard O’Riordan, Saritha Unnikrishnan

Abstract:

Autonomous Vehicles (AVs) are incorporating an increasing number of ADAS features, including automated lane-keeping systems. In recent years, many research papers into lane detection algorithms have been published, varying from computer vision techniques to deep learning methods. The transition from lower levels of autonomy defined in the SAE framework and the progression to higher autonomy levels requires increasingly complex models and algorithms that must be highly reliable in their operation and functionality capacities. Furthermore, these algorithms have no room for error when operating at high levels of autonomy. Although the current research details existing computer vision and deep learning algorithms and their methodologies and individual results, the research also details challenges faced by the algorithms and the resources needed to operate, along with shortcomings experienced during their detection of lanes in certain weather and lighting conditions. This paper will explore these shortcomings and attempt to implement a lane detection algorithm that could be used to achieve improvements in AV lane detection systems. This paper uses a pre-trained LaneNet model to detect lane or non-lane pixels using binary segmentation as the base detection method using an existing dataset BDD100k followed by a custom dataset generated locally. The selected roads will be modern well-laid roads with up-to-date infrastructure and lane markings, while the second road network will be an older road with infrastructure and lane markings reflecting the road network's age. The performance of the proposed method will be evaluated on the custom dataset to compare its performance to the BDD100k dataset. In summary, this paper will use Transfer Learning to provide a fast and robust lane detection algorithm that can handle various road conditions and provide accurate lane detection.

Keywords: ADAS, autonomous vehicles, deep learning, LaneNet, lane detection

Procedia PDF Downloads 87
4626 Design, Control and Implementation of 3.5 kW Bi-Directional Energy Harvester for Intelligent Green Energy Management System

Authors: P. Ramesh, Aby Joseph, Arya G. Lal, U. S. Aji

Abstract:

Integration of distributed green renewable energy sources in addition with battery energy storage is an inevitable requirement in a smart grid environment. To achieve this, an Intelligent Green Energy Management System (i-GEMS) needs to be incorporated to ensure coordinated operation between supply and load demand based on the hierarchy of Renewable Energy Sources (RES), battery energy storage and distribution grid. A bi-directional energy harvester is an integral component facilitating Intelligent Green Energy Management System (i-GEMS) and it is required to meet the technical challenges mentioned as follows: (1) capability for bi-directional mode of operation (buck/boost) (2) reduction of circuit parasitic to suppress voltage spikes (3) converter startup problem (4) high frequency magnetics (5) higher power density (6) mode transition issues during battery charging and discharging. This paper is focused to address the above mentioned issues and targeted to design, develop and implement a bi-directional energy harvester with galvanic isolation. In this work, the hardware architecture for bi-directional energy harvester rated 3.5 kW is developed with Isolated Full Bridge Boost Converter (IFBBC) as well as Dual Active Bridge (DAB) Converter configuration using modular power electronics hardware which is identical for both solar PV array and battery energy storage. In IFBBC converter, the current fed full bridge circuit is enabled and voltage fed full bridge circuit is disabled through Pulse Width Modulation (PWM) pulses for boost mode of operation and vice-versa for buck mode of operation. In DAB converter, all the switches are in active state so as to adjust the phase shift angle between primary full bridge and secondary full bridge which in turn decides the power flow directions depending on modes (boost/buck) of operation. Here, the control algorithm is developed to ensure the regulation of the common DC link voltage and maximum power extraction from the renewable energy sources depending on the selected mode (buck/boost) of operation. The circuit analysis and simulation study are conducted using PSIM 9.0 in three scenarios which are - 1.IFBBC with passive clamp, 2. IFBBC with active clamp, 3. DAB converter. In this work, a common hardware prototype for bi-directional energy harvester with 3.5 kW rating is built for IFBBC and DAB converter configurations. The power circuit is equipped with right choice of MOSFETs, gate drivers with galvanic isolation, high frequency transformer, filter capacitors, and filter boost inductor. The experiment was conducted for IFBBC converter with passive clamp under boost mode and the prototype confirmed the simulation results showing the measured efficiency as 88% at 2.5 kW output power. The digital controller hardware platform is developed using floating point microcontroller TMS320F2806x from Texas Instruments. The firmware governing the operation of the bi-directional energy harvester is written in C language and developed using code composer studio. The comprehensive analyses of the power circuit design, control strategy for battery charging/discharging under buck/boost modes and comparative performance evaluation using simulation and experimental results will be presented.

Keywords: bi-directional energy harvester, dual active bridge, isolated full bridge boost converter, intelligent green energy management system, maximum power point tracking, renewable energy sources

Procedia PDF Downloads 124
4625 3D Modelling of Fluid Flow in Tunnel Kilns

Authors: Jaber H. Almutairi, Hosny Z. Abou-Ziyan, Issa F. Almesri, Mosab A. Alrahmani

Abstract:

The present work investigates the behavior of fluid flow inside tunnel kilns using 3D-CFD (Computational Fluid Dynamics) simulations. The CFD simulations are carried out with the FLUENT software and validated against experimental results on fluid flow and heat transfer in tunnel kilns. A grid dependency study is conducted in the current work to improve the accuracy of the results. Three turbulence models k–ω, standard k–ε, and RNG k–ε are tested where k–ω model gives the best results in comparison with the experiment. The numerical results reveal an intriguing phenomenon where a long flow separation zone behind the setting is observed under different geometric and operation conditions. It was found that the uniformity of flow distribution can be substantially improved by rearranging the geometrical parameters of brick setting relative to kiln/setting. This improvement of flow distribution plays a critical role to enhance the quality and quantity of the production. It can be concluded that a better design and operation of tunnel kilns in terms of productivity and energy consumption can be obtained by taking into consideration the flow uniformity inside the tunnel kilns using CFD modelling.

Keywords: tunnel kilns, flow separation, flow uniformity, computational fluid dynamics

Procedia PDF Downloads 320
4624 Passively Q-Switched 914 nm Microchip Laser for LIDAR Systems

Authors: Marco Naegele, Klaus Stoppel, Thomas Dekorsy

Abstract:

Passively Q-switched microchip lasers enable the great potential for sophisticated LiDAR systems due to their compact overall system design, excellent beam quality, and scalable pulse energies. However, many near-infrared solid-state lasers show emitting wavelengths > 1000 nm, which are not compatible with state-of-the-art silicon detectors. Here we demonstrate a passively Q-switched microchip laser operating at 914 nm. The microchip laser consists of a 3 mm long Nd:YVO₄ crystal as a gain medium, while Cr⁴⁺:YAG with an initial transmission of 98% is used as a saturable absorber. Quasi-continuous pumping enables single pulse operation, and low duty cycles ensure low overall heat generation and power consumption. Thus, thermally induced instabilities are minimized, and operation without active cooling is possible while ambient temperature changes are compensated by adjustment of the pump laser current only. Single-emitter diode pumping at 808 nm leads to a compact overall system design and robust setup. Utilization of a microchip cavity approach ensures single-longitudinal mode operation with spectral bandwidths in the picometer regime and results in short laser pulses with pulse durations below 10 ns. Beam quality measurements reveal an almost diffraction-limited beam and enable conclusions concerning the thermal lens, which is essential to stabilize the plane-plane resonator. A 7% output coupler transmissivity is used to generate pulses with energies in the microjoule regime and peak powers of more than 600 W. Long-term pulse duration, pulse energy, central wavelength, and spectral bandwidth measurements emphasize the excellent system stability and facilitate the utilization of this laser in the context of a LiDAR system.

Keywords: diode-pumping, LiDAR system, microchip laser, Nd:YVO4 laser, passively Q-switched

Procedia PDF Downloads 119
4623 Retrospective Analysis of 142 Cases of Incision Infection Complicated with Sternal Osteomyelitis after Cardiac Surgery Treated by Activated PRP Gel Filling

Authors: Daifeng Hao, Guang Feng, Jingfeng Zhao, Tao Li, Xiaoye Tuo

Abstract:

Objective: To retrospectively analyze the clinical characteristics of incision infection with sternal osteomyelitis sinus tract after cardiac surgery and the operation method and therapeutic effect of filling and repairing with activated PRP gel. Methods: From March 2011 to October 2022, 142 cases of incision infection after cardiac surgery with sternal osteomyelitis sinus were retrospectively analyzed, and the causes of poor wound healing after surgery, wound characteristics, perioperative wound management were summarized. Treatment during operation, collection and storage process of autologous PRP before debridement surgery, PRP filling repair and activation method after debridement surgery, effect of anticoagulant drugs on surgery, postoperative complications and average wound healing time, etc.. Results: Among the cases in this group, 53.3% underwent coronary artery bypass grafting, 36.8% underwent artificial heart valve replacement, 8.2% underwent aortic artificial vessel replacement, and 1.7% underwent allogeneic heart transplantation. The main causes of poor incision healing were suture reaction, fat liquefaction, osteoporosis, diabetes, and metal allergy in sequence. The wound is characterized by an infected sinus tract. Before the operation, 100-150ml of PRP with 4 times the physiological concentration was collected separately with a blood component separation device. After sinus debridement, PRP was perfused to fill the bony defect in the middle of the sternum, activated with thrombin freeze-dried powder and calcium gluconate injection to form a gel, and the outer skin and subcutaneous tissue were sutured freely. 62.9% of patients discontinued warfarin during the perioperative period, and 37.1% of patients maintained warfarin treatment. There was no significant difference in the incidence of postoperative wound hematoma. The average postoperative wound healing time was 12.9±4.7 days, and there was no obvious postoperative complication. Conclusions: Application of activated PRP gel to fill incision infection with sternal osteomyelitis sinus after cardiac surgery has a less surgical injury and satisfactory and stable curative effect. It can completely replace the previously used pectoralis major muscle flap transplantation operation scheme.

Keywords: platelet-rich plasma, negative-pressure wound therapy, sternal osteomyelitis, cardiac surgery

Procedia PDF Downloads 69
4622 Effectiveness of Computer-Based Cognitive Training in Improving Attention-Deficit/Hyperactivity Disorder Rehabilitation

Authors: Marjan Ghazisaeedi, Azadeh Bashiri

Abstract:

Background: Attention-Deficit/Hyperactivity Disorder(ADHD), is one of the most common psychiatric disorders in early childhood that in addition to its main symptoms provide significant deficits in the areas of educational, social and individual relationship. Considering the importance of rehabilitation in ADHD patients to control these problems, this study investigated the advantages of computer-based cognitive training in these patients. Methods: This review article has been conducted by searching articles since 2005 in scientific databases and e-Journals and by using keywords including computerized cognitive rehabilitation, computer-based training and ADHD. Results: Since drugs have short term effects and also they have many side effects in the rehabilitation of ADHD patients, using supplementary methods such as computer-based cognitive training is one of the best solutions. This approach has quick feedback and also has no side effects. So, it provides promising results in cognitive rehabilitation of ADHD especially on the working memory and attention. Conclusion: Considering different cognitive dysfunctions in ADHD patients, application of the computerized cognitive training has the potential to improve cognitive functions and consequently social, academic and behavioral performances in patients with this disorder.

Keywords: ADHD, computer-based cognitive training, cognitive functions, rehabilitation

Procedia PDF Downloads 264
4621 Lexical Semantic Analysis to Support Ontology Modeling of Maintenance Activities– Case Study of Offshore Riser Integrity

Authors: Vahid Ebrahimipour

Abstract:

Word representation and context meaning of text-based documents play an essential role in knowledge modeling. Business procedures written in natural language are meant to store technical and engineering information, management decision and operation experience during the production system life cycle. Context meaning representation is highly dependent upon word sense, lexical relativity, and sematic features of the argument. This paper proposes a method for lexical semantic analysis and context meaning representation of maintenance activity in a mass production system. Our approach constructs a straightforward lexical semantic approach to analyze facilitates semantic and syntactic features of context structure of maintenance report to facilitate translation, interpretation, and conversion of human-readable interpretation into computer-readable representation and understandable with less heterogeneity and ambiguity. The methodology will enable users to obtain a representation format that maximizes shareability and accessibility for multi-purpose usage. It provides a contextualized structure to obtain a generic context model that can be utilized during the system life cycle. At first, it employs a co-occurrence-based clustering framework to recognize a group of highly frequent contextual features that correspond to a maintenance report text. Then the keywords are identified for syntactic and semantic extraction analysis. The analysis exercises causality-driven logic of keywords’ senses to divulge the structural and meaning dependency relationships between the words in a context. The output is a word contextualized representation of maintenance activity accommodating computer-based representation and inference using OWL/RDF.

Keywords: lexical semantic analysis, metadata modeling, contextual meaning extraction, ontology modeling, knowledge representation

Procedia PDF Downloads 96
4620 A Rare Case of Endometriosis Lesion in Caecum Causing Acute Small Bowel Obstruction

Authors: Freda Halim

Abstract:

Endometriosis in bowel is rare condition, about 3-37% of endometriosis cases. Most of bowel endometriosis rising in the rectosigmoid (90% of bowel endometriosis). The incidence of caecal endometriosis is very low ( < 5% of bowel endometriosis) and almost never causing acute small bowel obstruction. The aim of this paper is to show that although bowel obstruction caused by caecal endometriosis is difficult to diagnose as it is rare, and may require laparotomy to make definite diagnosis, but it should be considered in infertile female patient. The case is 37 years old woman infertile woman with intestinal obstruction with pre-operative diagnosis total acute small bowel obstruction caused by right colonic mass, with sepsis as the complication. Before the acute small bowel obstruction, she complained of chronic right lower quadrant pain with chronic constipation alternate with chronic diarrhea, symptoms that happened both in bowel endometriosis and colorectal malignancy. She also complained of chronic pelvic pain and dysmenorrhea. She was married for 10 years with no child. The patient was never diagnosed with endometriosis and never seek medical attention for infertility and the chronic pelvic pain. The patient underwent Abdominal CT Scan, with results: massive small bowel obstruction, and caecal mass that causing acute small bowel obstruction. Diagnosis of acute small bowel obstruction due to right colonic mass was made, and exploratory laparotomy was performed in the patient. During the laparotomy, mass at caecum and ileocaecal that causing massive small bowel obstruction was found and standard right hemicolectomy and temporary ileostomy were performed. The pathology examination showed ectopic endometriosis lesions in caecum and ileocaecal valve. The histopathology also confirmed with the immunohistochemistry, in which positive ER, PR, CD 10 and CD7 was found the ileocaecal and caecal mass. In the second operation, reanastomosis of the ileum was done 3 months after the first operation. The chronic pelvic pain is decreasing dramatically after the first and second operation. In conclusion, although bowel obstruction caused by caecal endometriosis is a rare cause of intestinal obstruction, but it can be considered as a cause in infertile female patient

Keywords: acute, bowel obstruction, caecum, endometriosis

Procedia PDF Downloads 137