Search results for: range migration algorithm
10423 A Ratio-Weighted Decision Tree Algorithm for Imbalance Dataset Classification
Authors: Doyin Afolabi, Phillip Adewole, Oladipupo Sennaike
Abstract:
Most well-known classifiers, including the decision tree algorithm, can make predictions on balanced datasets efficiently. However, the decision tree algorithm tends to be biased towards imbalanced datasets because of the skewness of the distribution of such datasets. To overcome this problem, this study proposes a weighted decision tree algorithm that aims to remove the bias toward the majority class and prevents the reduction of majority observations in imbalance datasets classification. The proposed weighted decision tree algorithm was tested on three imbalanced datasets- cancer dataset, german credit dataset, and banknote dataset. The specificity, sensitivity, and accuracy metrics were used to evaluate the performance of the proposed decision tree algorithm on the datasets. The evaluation results show that for some of the weights of our proposed decision tree, the specificity, sensitivity, and accuracy metrics gave better results compared to that of the ID3 decision tree and decision tree induced with minority entropy for all three datasets.Keywords: data mining, decision tree, classification, imbalance dataset
Procedia PDF Downloads 13610422 Flowing Online Vehicle GPS Data Clustering Using a New Parallel K-Means Algorithm
Authors: Orhun Vural, Oguz Bayat, Rustu Akay, Osman N. Ucan
Abstract:
This study presents a new parallel approach clustering of GPS data. Evaluation has been made by comparing execution time of various clustering algorithms on GPS data. This paper aims to propose a parallel based on neighborhood K-means algorithm to make it faster. The proposed parallelization approach assumes that each GPS data represents a vehicle and to communicate between vehicles close to each other after vehicles are clustered. This parallelization approach has been examined on different sized continuously changing GPS data and compared with serial K-means algorithm and other serial clustering algorithms. The results demonstrated that proposed parallel K-means algorithm has been shown to work much faster than other clustering algorithms.Keywords: parallel k-means algorithm, parallel clustering, clustering algorithms, clustering on flowing data
Procedia PDF Downloads 22110421 Designing State Feedback Multi-Target Controllers by the Use of Particle Swarm Optimization Algorithm
Authors: Seyedmahdi Mousavihashemi
Abstract:
One of the most important subjects of interest in researches is 'improving' which result in various algorithms. In so many geometrical problems we are faced with target functions which should be optimized. In group practices, all the functions’ cooperation lead to convergence. In the study, the optimization algorithm of dense particles is used. Usage of the algorithm improves the given performance norms. The results reveal that usage of swarm algorithm for reinforced particles in designing state feedback improves the given performance norm and in optimized designing of multi-target state feedback controlling, the network will maintain its bearing structure. The results also show that PSO is usable for optimization of state feedback controllers.Keywords: multi-objective, enhanced, feedback, optimization, algorithm, particle, design
Procedia PDF Downloads 49810420 Sensor Network Routing Optimization by Simulating Eurygaster Life in Wheat Farms
Authors: Fariborz Ahmadi, Hamid Salehi, Khosrow Karimi
Abstract:
A sensor network is set of sensor nodes that cooperate together to perform a predefined tasks. The important problem in this network is power consumption. So, in this paper one algorithm based on the eurygaster life is introduced to minimize power consumption by the nodes of these networks. In this method the search space of problem is divided into several partitions and each partition is investigated separately. The evaluation results show that our approach is more efficient in comparison to other evolutionary algorithm like genetic algorithm.Keywords: evolutionary computation, genetic algorithm, particle swarm optimization, sensor network optimization
Procedia PDF Downloads 42810419 A Transnational Feminist Analysis of the Experiences of Return Migrant Women to Kosova
Authors: Kaltrina Kusari
Abstract:
Displaced populations have received increasing attention, yet the experiences of return migrants remain largely hidden within social sciences. Existing research, albeit limited, suggests that policies which impact return migrants, especially those forced to return to their home countries, do not reflect their voices. Specifically, the United Nations Hight Commissioner for Refugees has adopted repatriation as a preferred policy solution, despite research which substantiates that returning to one’s home country is neither durable nor the end of the migration cycle; as many of 80% of returnees decide to remigrate. This one-size-fits-all approach to forced displacement does not recognize the impact of intersecting identity categories on return migration, thus failing to consider how ethnicity, gender, and class, among others, shape repatriation. To address this, this qualitative study examined the repatriation experiences of return migrant women from Kosovo and the role of social workers in facilitating return. In 2015, Kosovars constituted the fourth largest group of asylum seekers in the European Union, yet 96% of them were rejected. Additionally, since 1999 Kosovo has ranked among the top 10 countries of origin for return migrants. Considering that return migration trends are impacted by global power dynamics, this study relied on a postcolonial and transnational feminist framework to contextualize the mobility of displaced peoples in terms of globalization and conceptualize migration as a gendered process. Postcolonial and feminist theories suggest that power is partly operationalized through language, thus, Critical Discourse Analysis was used as a research methodology. CDA is concerned with examining how power, language, and discourses shape social processes and relationships of dominance. Data collection included interviews with 15 return migrant women (eight ethnic minorities and seven Albanian) and 18 service providers in Kosovo. The main findings illustrate that both returnee women and service providers rely on discourses which 1) challenge the voluntariness and sustainability of repatriation; 2) construct Kosovo as inferior to EU countries; and 3) highlight the impact of patriarchy and ethnic racism on return migration. A postcolonial transnational feminist analysis demonstrates that despite Kosovars’ challenges with repatriation, European Union countries use their power to impose repatriation as a preferred solution for Kosovo’s government. These findings add to the body of existing repatriation literature and provide important implications for how return migration might be carried out, not only in Kosovo but other countries as well.Keywords: migration, gender, repatriation, transnational feminism
Procedia PDF Downloads 8210418 In-door Localization Algorithm and Appropriate Implementation Using Wireless Sensor Networks
Authors: Adeniran K. Ademuwagun, Alastair Allen
Abstract:
The relationship dependence between RSS and distance in an enclosed environment is an important consideration because it is a factor that can influence the reliability of any localization algorithm founded on RSS. Several algorithms effectively reduce the variance of RSS to improve localization or accuracy performance. Our proposed algorithm essentially avoids this pitfall and consequently, its high adaptability in the face of erratic radio signal. Using 3 anchors in close proximity of each other, we are able to establish that RSS can be used as reliable indicator for localization with an acceptable degree of accuracy. Inherent in this concept, is the ability for each prospective anchor to validate (guarantee) the position or the proximity of the other 2 anchors involved in the localization and vice versa. This procedure ensures that the uncertainties of radio signals due to multipath effects in enclosed environments are minimized. A major driver of this idea is the implicit topological relationship among sensors due to raw radio signal strength. The algorithm is an area based algorithm; however, it does not trade accuracy for precision (i.e the size of the returned area).Keywords: anchor nodes, centroid algorithm, communication graph, radio signal strength
Procedia PDF Downloads 50810417 Multi-Cluster Overlapping K-Means Extension Algorithm (MCOKE)
Authors: Said Baadel, Fadi Thabtah, Joan Lu
Abstract:
Clustering involves the partitioning of n objects into k clusters. Many clustering algorithms use hard-partitioning techniques where each object is assigned to one cluster. In this paper, we propose an overlapping algorithm MCOKE which allows objects to belong to one or more clusters. The algorithm is different from fuzzy clustering techniques because objects that overlap are assigned a membership value of 1 (one) as opposed to a fuzzy membership degree. The algorithm is also different from other overlapping algorithms that require a similarity threshold to be defined as a priority which can be difficult to determine by novice users.Keywords: data mining, k-means, MCOKE, overlapping
Procedia PDF Downloads 57510416 Genetic Algorithm to Construct and Enumerate 4×4 Pan-Magic Squares
Authors: Younis R. Elhaddad, Mohamed A. Alshaari
Abstract:
Since 2700 B.C the problem of constructing magic squares attracts many researchers. Magic squares one of most difficult challenges for mathematicians. In this work, we describe how to construct and enumerate Pan- magic squares using genetic algorithm, using new chromosome encoding technique. The results were promising within reasonable time.Keywords: genetic algorithm, magic square, pan-magic square, computational intelligence
Procedia PDF Downloads 57610415 Using Hidden Markov Chain for Improving the Dependability of Safety-Critical Wireless Sensor Networks
Authors: Issam Alnader, Aboubaker Lasebae, Rand Raheem
Abstract:
Wireless sensor networks (WSNs) are distributed network systems used in a wide range of applications, including safety-critical systems. The latter provide critical services, often concerned with human life or assets. Therefore, ensuring the dependability requirements of Safety critical systems is of paramount importance. The purpose of this paper is to utilize the Hidden Markov Model (HMM) to elongate the service availability of WSNs by increasing the time it takes a node to become obsolete via optimal load balancing. We propose an HMM algorithm that, given a WSN, analyses and predicts undesirable situations, notably, nodes dying unexpectedly or prematurely. We apply this technique to improve on C. Lius’ algorithm, a scheduling-based algorithm which has served to improve the lifetime of WSNs. Our experiments show that our HMM technique improves the lifetime of the network, achieved by detecting nodes that die early and rebalancing their load. Our technique can also be used for diagnosis and provide maintenance warnings to WSN system administrators. Finally, our technique can be used to improve algorithms other than C. Liu’s.Keywords: wireless sensor networks, IoT, dependability of safety WSNs, energy conservation, sleep awake schedule
Procedia PDF Downloads 10010414 An ALM Matrix Completion Algorithm for Recovering Weather Monitoring Data
Authors: Yuqing Chen, Ying Xu, Renfa Li
Abstract:
The development of matrix completion theory provides new approaches for data gathering in Wireless Sensor Networks (WSN). The existing matrix completion algorithms for WSN mainly consider how to reduce the sampling number without considering the real-time performance when recovering the data matrix. In order to guarantee the recovery accuracy and reduce the recovery time consumed simultaneously, we propose a new ALM algorithm to recover the weather monitoring data. A lot of experiments have been carried out to investigate the performance of the proposed ALM algorithm by using different parameter settings, different sampling rates and sampling models. In addition, we compare the proposed ALM algorithm with some existing algorithms in the literature. Experimental results show that the ALM algorithm can obtain better overall recovery accuracy with less computing time, which demonstrate that the ALM algorithm is an effective and efficient approach for recovering the real world weather monitoring data in WSN.Keywords: wireless sensor network, matrix completion, singular value thresholding, augmented Lagrange multiplier
Procedia PDF Downloads 38410413 The Rise of Far-Right Political Parties: Future of Multiculturalism in Europe
Authors: Bharti Yadav
Abstract:
Global migration and the rise of far-right parties have expanded the significance of political discussions enclosing multiculturalism. This research paper will focus on the rise of far-right political parties in Europe over the last nearly two decades and how right-wing politics affect multiculturalism in a detrimental way; major European leaders have publicly stated that multiculturalism in their countries has failed. This paper also discusses the main reasons for right-wing politics is normalizing in Europe. Far-right political parties are the fastest-growing parties in Europe, and multiculturalism is an unescapable significant political issue. The rise of far-right anti-immigrant parties diminishes mainstream party support for multiculturalism. Mainstream parties are more receptive to both increasing in ethnic minorities’ electoral power and the rise of far-right parties.Keywords: political parties, far-right, migration, multiculturalism
Procedia PDF Downloads 8710412 Pruning Algorithm for the Minimum Rule Reduct Generation
Authors: Sahin Emrah Amrahov, Fatih Aybar, Serhat Dogan
Abstract:
In this paper we consider the rule reduct generation problem. Rule Reduct Generation (RG) and Modified Rule Generation (MRG) algorithms, that are used to solve this problem, are well-known. Alternative to these algorithms, we develop Pruning Rule Generation (PRG) algorithm. We compare the PRG algorithm with RG and MRG.Keywords: rough sets, decision rules, rule induction, classification
Procedia PDF Downloads 52810411 Error Estimation for the Reconstruction Algorithm with Fan Beam Geometry
Authors: Nirmal Yadav, Tanuja Srivastava
Abstract:
Shannon theory is an exact method to recover a band limited signals from its sampled values in discrete implementation, using sinc interpolators. But sinc based results are not much satisfactory for band-limited calculations so that convolution with window function, having compact support, has been introduced. Convolution Backprojection algorithm with window function is an approximation algorithm. In this paper, the error has been calculated, arises due to this approximation nature of reconstruction algorithm. This result will be defined for fan beam projection data which is more faster than parallel beam projection.Keywords: computed tomography, convolution backprojection, radon transform, fan beam
Procedia PDF Downloads 49010410 On the Use of Analytical Performance Models to Design a High-Performance Active Queue Management Scheme
Authors: Shahram Jamali, Samira Hamed
Abstract:
One of the open issues in Random Early Detection (RED) algorithm is how to set its parameters to reach high performance for the dynamic conditions of the network. Although original RED uses fixed values for its parameters, this paper follows a model-based approach to upgrade performance of the RED algorithm. It models the routers queue behavior by using the Markov model and uses this model to predict future conditions of the queue. This prediction helps the proposed algorithm to make some tunings over RED's parameters and provide efficiency and better performance. Widespread packet level simulations confirm that the proposed algorithm, called Markov-RED, outperforms RED and FARED in terms of queue stability, bottleneck utilization and dropped packets count.Keywords: active queue management, RED, Markov model, random early detection algorithm
Procedia PDF Downloads 53910409 A Game-Theory-Based Price-Optimization Algorithm for the Simulation of Markets Using Agent-Based Modelling
Authors: Juan Manuel Sanchez-Cartas, Gonzalo Leon
Abstract:
A price competition algorithm for ABMs based on game theory principles is proposed to deal with the simulation of theoretical market models. The algorithm is applied to the classical Hotelling’s model and to a two-sided market model to show it leads to the optimal behavior predicted by theoretical models. However, when theoretical models fail to predict the equilibrium, the algorithm is capable of reaching a feasible outcome. Results highlight that the algorithm can be implemented in other simulation models to guarantee rational users and endogenous optimal behaviors. Also, it can be applied as a tool of verification given that is theoretically based.Keywords: agent-based models, algorithmic game theory, multi-sided markets, price optimization
Procedia PDF Downloads 45510408 Multiple Relaxation Times in the Gibbs Ensemble Monte Carlo Simulation of Phase Separation
Authors: Bina Kumari, Subir K. Sarkar, Pradipta Bandyopadhyay
Abstract:
The autocorrelation function of the density fluctuation is studied in each of the two phases in a Gibbs Ensemble Monte Carlo (GEMC) simulation of the problem of phase separation for a square well potential with various values of its range. We find that the normalized autocorrelation function is described very well as a linear combination of an exponential function with a time scale τ₂ and a stretched exponential function with a time scale τ₁ and an exponent α. Dependence of (α, τ₁, τ₂) on the parameters of the GEMC algorithm and the range of the square well potential is investigated and interpreted. We also analyse the issue of how to choose the parameters of the GEMC simulation optimally.Keywords: autocorrelation function, density fluctuation, GEMC, simulation
Procedia PDF Downloads 18610407 Discrete State Prediction Algorithm Design with Self Performance Enhancement Capacity
Authors: Smail Tigani, Mohamed Ouzzif
Abstract:
This work presents a discrete quantitative state prediction algorithm with intelligent behavior making it able to self-improve some performance aspects. The specificity of this algorithm is the capacity of self-rectification of the prediction strategy before the final decision. The auto-rectification mechanism is based on two parallel mathematical models. In one hand, the algorithm predicts the next state based on event transition matrix updated after each observation. In the other hand, the algorithm extracts its residues trend with a linear regression representing historical residues data-points in order to rectify the first decision if needs. For a normal distribution, the interactivity between the two models allows the algorithm to self-optimize its performance and then make better prediction. Designed key performance indicator, computed during a Monte Carlo simulation, shows the advantages of the proposed approach compared with traditional one.Keywords: discrete state, Markov Chains, linear regression, auto-adaptive systems, decision making, Monte Carlo Simulation
Procedia PDF Downloads 49810406 The Effect of Expressive Therapies on Children and Youth Impacted by Refugee Trauma: A Meta-Analysis
Authors: Brian Kristopher Cambra
Abstract:
Millions of displaced families are seeking refuge in countries that are not their own due to war, violence, persecution, political unrest, and natural disasters. This global crisis is forcing researchers and practitioners to consider how refugees are coping with the trauma associated with their migration process. Effective therapeutic approaches are needed in a global effort to address the traumatic impact of forced migration. This meta-analytical study investigates the effectiveness of expressive therapeutic modalities, including play, art, music, sandplay, theatre, and writing therapies, in helping children and adolescents cope with refugee trauma. Seventeen pre-post and between-group comparison studies were analyzed using a random-effects model. The combined effect size for pre-post comparisons was medium (g = 0.58), whereas the combined effect size for between-group comparisons was small (g = 0.32). Overall, art therapy was found to be most effective in treating stress symptoms. Heterogeneity tests, however, suggest effect sizes cannot be interpreted as meaningful due to substantial variance. Nevertheless, findings of this meta-analysis indicate that expressive therapies may be among beneficial modalities to integrate with other trauma-informed approaches.Keywords: expressive therapies, forced migration, meta-analysis, refugees, trauma
Procedia PDF Downloads 14710405 Myths of Thangal Origin from an Anthropological Perspective
Authors: Monoranjan Maibam, Arundhati Maibam, Bojen Akoijam
Abstract:
Myths may be understood as a special kind of literature though not found in written form. Through myths, anthropologists make attempts to describe a world which members of a literate society can barely imagine. Mythical stories about origin of numerous ethnic and tribal communities have helped in tracing their route of migration and the long journey undertaken before arriving at their present places of settlement. This study intends to highlight the myths associated with the origin of the Thangal tribe of Manipur from an anthropological perspective and interpret the stories in the context of evolution, migration and relationship with other neighbouring groups. Fieldwork was conducted using an interview guide to collect primary data and published literatures were consulted for secondary data. The result show two popular versions of origin myths are found among the Thangal- first is origin from a cave at Makhel located in the Maram area and second is the belief that the Thangal, the Tangkhul and the Meitei are brothers who emerged out of a cave long ago. In conclusion, the origin myths of the Thangal may be confirmed and established through archaeological findings in the form of artefacts. Mention of erection of memorial stones in the second version is a good clue to start an archaeological survey of the sites which are believed to have been once occupied by the people.Keywords: anthropology, migration, myth, Thangal
Procedia PDF Downloads 24410404 An Algorithm of Regulation of Glucose-Insulin Concentration in the Blood
Authors: B. Selma, S. Chouraqui
Abstract:
The pancreas is an elongated organ that extends across the abdomen, below the stomach. In addition, it secretes certain enzymes that aid in food digestion. The pancreas also manufactures hormones responsible for regulating blood glucose levels. In the present paper, we propose a mathematical model to study the homeostasis of glucose and insulin in healthy human, and a simulation of this model, which depicts the physiological events after a meal, will be represented in ordinary humans. The aim of this paper is to design an algorithm which regulates the level of glucose in the blood. The algorithm applied the concept of expert system for performing an algorithm control in the form of an "active" used to prescribe the rate of insulin infusion. By decomposing the system into subsystems, we have developed parametric models of each subsystem by using a forcing function strategy. The results showed a performance of the control system.Keywords: modeling, algorithm, regulation, glucose-insulin, blood, control system
Procedia PDF Downloads 17710403 Power Allocation Algorithm for Orthogonal Frequency Division Multiplexing Based Cognitive Radio Networks
Authors: Bircan Demiral
Abstract:
Cognitive radio (CR) is the promising technology that addresses the spectrum scarcity problem for future wireless communications. Orthogonal Frequency Division Multiplexing (OFDM) technology provides more power band ratios for cognitive radio networks (CRNs). While CR is a solution to the spectrum scarcity, it also brings up the capacity problem. In this paper, a novel power allocation algorithm that aims at maximizing the sum capacity in the OFDM based cognitive radio networks is proposed. Proposed allocation algorithm is based on the previously developed water-filling algorithm. To reduce the computational complexity calculating in water filling algorithm, proposed algorithm allocates the total power according to each subcarrier. The power allocated to the subcarriers increases sum capacity. To see this increase, Matlab program was used, and the proposed power allocation was compared with average power allocation, water filling and general power allocation algorithms. The water filling algorithm performed worse than the proposed algorithm while it performed better than the other two algorithms. The proposed algorithm is better than other algorithms in terms of capacity increase. In addition the effect of the change in the number of subcarriers on capacity was discussed. Simulation results show that the increase in the number of subcarrier increases the capacity.Keywords: cognitive radio network, OFDM, power allocation, water filling
Procedia PDF Downloads 13710402 Generation & Migration Of Carbone Dioxid In The Lower Cretaceous Bahi Sandstone Reservoir Within The En-naga Sub Basin, Sirte Basin, Libya
Authors: Moaawia Abdulgader Gdara
Abstract:
En -Naga sub - basin considered to be the most southern of the concessions in the Sirte Basin operated by HOO. En Naga Sub – basin have likely been point-sourced of CO₂ accumulations during the last 7 million years from local satellite intrusives associated with the Haruj Al Aswad igneous complex. CO2 occurs in the En Naga Sub-basin as a result of the igneous activity of the Al Harouge Al Aswad complex.Igneous extrusive have been pierced in the subsurface are exposed at the surface. The lower cretaceous Bahi Sandstone facies are recognized in the En Naga Sub-basin. They result from the influence of paleotopography on the processes associated with continental deposition over the Sirt Unconformity and the Cenomanian marine transgression In the Lower Cretaceous Bahi Sandstones, the presence of trapped carbon dioxide is proven within the En Naga Sub-basin. This makes it unique in providing an abundance of CO₂ gas reservoirs with almost pure magmatic CO₂, which can be easily sampled. Huge amounts of CO2 exist in the Lower Cretaceous Bahi Sandstones in the En-Naga sub-basin, where the economic value of CO₂ is related to its use for enhanced oil recovery (EOR) Based on the production tests for the drilled wells that makes Lower Cretaceous Bahi sandstones the principle reservoir rocks for CO2 where large volumes of CO2 gas have been discovered in the Bahi Formation on and near EPSA 120/136(En -Naga sub basin). The Bahi sandstones are generally described as a good reservoir rock. Intergranular porosities and permeabilities are highly variable and can exceed 25% and 100 MD. In the (En Naga sub – basin), three main developed structures (Barrut I, En Naga A and En Naga O) are thought to be prospective for the lower Cretaceous Bahi sandstone reservoir. These structures represents a good example for the deep over pressure potential in (En Naga sub - basin). The very high pressures assumed associated with local igneous intrusives may account for the abnormally high Bahi (and Lidam) reservoir pressures. The best gas tests from this facies are at F1-72 on the (Barrut I structure) from part of a 458 feet+ section having an estimated high value of CO2 as 98% overpressured. Bahi CO) en naga sub basin, 2)al harouge al aswad igneous complex., 3) lower cretaceous bahi reservoir, 4)co) en naga sub basin, 2)al harouge al aswad igneous complex., 3) lower cretaceous bahi reservoir, 4)co) en naga sub basin, 2)al harouge al aswad igneous complex., 3) lower cretaceous bahi reservoir, 4)co) en naga sub basin, 2)al harouge al aswad igneous complex., 3) lower cretaceous bahi reservoir, 4)co₂ generation and migration to the bahi sandstone reservoir generation and migration to the bahi sandstone reservoir generation and migration to the bahi sandstone reservoir generation and migration to the bahi sandstone reservoir prospectivity is thought to be excellent in the central to western areas where At U1-72 (En Naga O structure) a significant CO2 gas kick occurred at 11,971 feet and quickly led to blowout conditions due to uncontrollable leaks in the surface equipment. Which reflects a better reservoir quality sandstones associated with Paleostructural highs. Condensate and gas prospectivity increases to the east as the CO₂) en naga sub basin, 2)al harouge al aswad igneous complex., 3) lower cretaceous bahi reservoir, 4)co) en naga sub basin, 2)al harouge al aswad igneous complex., 3) lower cretaceous bahi reservoir, 4)co₂ generation and migration to the bahi sandstone reservoir generation and migration to the bahi sandstone reservoir prospectivity decreases with distance away from the Al Haruj Al Aswad igneous complex. To date, it has not been possible to accurately determine the volume of these strategically valuable reserves although there are positive indications that they are very large.Keywords: 1) en naga sub basin, 2)al harouge al aswad igneous complex., 3) lower cretaceous bahi reservoir, 4)co2 generation and migration to the bahi sandstone reservoir
Procedia PDF Downloads 7110401 Multi-Objective Variable Neighborhood Search Algorithm to Solving Scheduling Problem with Transportation Times
Authors: Majid Khalili
Abstract:
This paper deals with a bi-objective hybrid no-wait flowshop scheduling problem minimizing the makespan and total weighted tardiness, in which we consider transportation times between stages. Obtaining an optimal solution for this type of complex, large-sized problem in reasonable computational time by using traditional approaches and optimization tools is extremely difficult. This paper presents a new multi-objective variable neighborhood algorithm (MOVNS). A set of experimental instances are carried out to evaluate the algorithm by advanced multi-objective performance measures. The algorithm is carefully evaluated for its performance against available algorithm by means of multi-objective performance measures and statistical tools. The related results show that a variant of our proposed MOVNS provides sound performance comparing with other algorithms. Procedia PDF Downloads 41810400 Development and Range Testing of a LoRaWAN System in an Urban Environment
Authors: N. R. Harris, J. Curry
Abstract:
This paper describes the construction and operation of an experimental LoRaWAN network surrounding the University of Southampton in the United Kingdom. Following successful installation, an experimental node design is built and characterised, with particular emphasis on radio range. Several configurations are investigated, including different data rates, and varying heights of node. It is concluded that although range can be great (over 8 km in this case), environmental topology is critical. However, shorter range implementations, up to about 2 km in an urban environment, are relatively insensitive although care is still needed. The example node and the relatively simple base station reported demonstrate that LoraWan can be a very low cost and practical solution to Internet of Things type applications for distributed monitoring systems with sensors spread over distances of several km.Keywords: long-range, wireless, sensor, network
Procedia PDF Downloads 13710399 A Migration Policy Gone Wrong: A Study on How the Encampment Policy Undermines Refugees’ Potentials and Fails Local Economy: A Case of East Africa
Authors: John Bosco Ngendakurio
Abstract:
The key question this paper asks is, ‘how does the refugee encampment policy undermine refugees’ potentials and fail local economy in East African countries?’ It is important to develop a full understanding of the legacies of the encampment policy for refugees’ performances economically, socially, and politically. The negative impacts of the encampment policy include the lack of participation or access to opportunities outside the refugee camps such as employment, education, and local integration, unfair imprisonments and constant alienation of refugees, mental and physical health issues, just to name a few. Evidence suggests that refugee camps in East Africa have progressively become open detention centres due to their designs, their locations, and movement restrictions imposed on refugees. Such restrictions in a region that hosts millions of refugees do not only undermine refugees’ potentials, but it also hurts the local economy- host countries miss out in many ways. Outlining the negative impacts of the encampment policy will enable governments and relevant non-governmental actors, including policymakers, to re-consider this policy with the aim to improve refugees’ participation and contributions in the broader society, promote socially cohesive practices, and help millions of refugees gain independence and reach their potentials financially, socially and politically, finally and truly giving the voice to the voiceless. The encampment policy undermines the general human security in East Africa, and it is one of the migration practices showcasing East African governments’ lack of will to protect human rights, especially within the most vulnerable population groups such as refugees.Keywords: migration policy, immigration, refugees, encampment, migration, integration, social cohesion
Procedia PDF Downloads 13210398 Optimal Energy Management System for Electrical Vehicles to Further Extend the Range
Authors: M. R. Rouhi, S. Shafiei, A. Taghavipour, H. Adibi-Asl, A. Doosthoseini
Abstract:
This research targets at alleviating the problem of range anxiety associated with the battery electric vehicles (BEVs) by considering mechanical and control aspects of the powertrain. In this way, all the energy consuming components and their effect on reducing the range of the BEV and battery life index are identified. On the other hand, an appropriate control strategy is designed to guarantee the performance of the BEV and the extended electric range which is evaluated by an extensive simulation procedure and a real-world driving schedule.Keywords: battery, electric vehicles, ultra-capacitor, model predictive control
Procedia PDF Downloads 25910397 In a Situation of Great Distress: Cross Border Migration and the Quest for Enduring Security in North-East Nigeria
Authors: Nuhu Bitrus Mailabari
Abstract:
Nigeria is a highly multifarious nation trapped between affluence and affliction. On one hand, the state has vast territorial size, economic strength, relative internal cohesion, and good external linkages. On the other, it is bedeviled with enormous challenges. It is common knowledge that the North-East geo-political zone has suffered colossal destruction for the most part of the last ten years due to the activities of the insurgent group Boko Haram. Several factors (political, economic, religious, socio-cultural) have been credited with the heightened insecurity in the region. Without a doubt, the security crisis in the region has rekindled several discussions critical to Nigeria’s security architecture. However, the debate on finding an enduring solution to the devastation in the North East continually neglects the nexus between cross border migration and national security. Using content analysis, this paper debates two main issues that continue to affect security in the North East. One, the cumulative impact of the Economic Community of West African States (ECOWAS) protocol on the free movement of people and goods. Two, the porous nature of Nigeria’s borders. Theoretically, the paper will rely on the systems theory because of its broad focus on structure, linkage, and process. The work concludes in twofold. First, that cross border migration and poor border management processes further worsened the political and socio-economic conditions of a region that is already in a bad state. Secondly, in addition to the existing strategies, Nigeria must develop a holistic approach including new methods of handling cross border movements in solving the security issues.Keywords: border, cross border, migration, Nigeria, northeast region, security
Procedia PDF Downloads 16410396 Part of Speech Tagging Using Statistical Approach for Nepali Text
Authors: Archit Yajnik
Abstract:
Part of Speech Tagging has always been a challenging task in the era of Natural Language Processing. This article presents POS tagging for Nepali text using Hidden Markov Model and Viterbi algorithm. From the Nepali text, annotated corpus training and testing data set are randomly separated. Both methods are employed on the data sets. Viterbi algorithm is found to be computationally faster and accurate as compared to HMM. The accuracy of 95.43% is achieved using Viterbi algorithm. Error analysis where the mismatches took place is elaborately discussed.Keywords: hidden markov model, natural language processing, POS tagging, viterbi algorithm
Procedia PDF Downloads 32610395 Implementation of Iterative Algorithm for Earthquake Location
Authors: Hussain K. Chaiel
Abstract:
The development in the field of the digital signal processing (DSP) and the microelectronics technology reduces the complexity of the iterative algorithms that need large number of arithmetic operations. Virtex-Field Programmable Gate Arrays (FPGAs) are programmable silicon foundations which offer an important solution for addressing the needs of high performance DSP designer. In this work, Virtex-7 FPGA technology is used to implement an iterative algorithm to estimate the earthquake location. Simulation results show that an implementation based on block RAMB36E1 and DSP48E1 slices of Virtex-7 type reduces the number of cycles of the clock frequency. This enables the algorithm to be used for earthquake prediction.Keywords: DSP, earthquake, FPGA, iterative algorithm
Procedia PDF Downloads 38910394 Alternative Key Exchange Algorithm Based on Elliptic Curve Digital Signature Algorithm Certificate and Usage in Applications
Authors: A. Andreasyan, C. Connors
Abstract:
The Elliptic Curve Digital Signature algorithm-based X509v3 certificates are becoming more popular due to their short public and private key sizes. Moreover, these certificates can be stored in Internet of Things (IoT) devices, with limited resources, using less memory and transmitted in network security protocols, such as Internet Key Exchange (IKE), Transport Layer Security (TLS) and Secure Shell (SSH) with less bandwidth. The proposed method gives another advantage, in that it increases the performance of the above-mentioned protocols in terms of key exchange by saving one scalar multiplication operation.Keywords: cryptography, elliptic curve digital signature algorithm, key exchange, network security protocol
Procedia PDF Downloads 146