Search results for: GPS bsed based Robotic library
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 28767

Search results for: GPS bsed based Robotic library

28377 Evaluation of the Effect of IMS on the Social Responsibility in the Oil and Gas Production Companies of National Iranian South Oil Fields Company (NISOC)

Authors: Kamran Taghizadeh

Abstract:

This study was aimed at evaluating the effect of IMS including occupational health system, environmental management system, and safety and health system on the social responsibility (case study of NISOC`s oil and gas production companies). This study`s objectives include evaluating the IMS situation and its effect on social responsibility in addition of providing appropriate solutions based on the study`s hypotheses as a basis for future. Data collection was carried out by library and field studies as well as a questionnaire. The stratified random method was the sampling method and a sample of 285 employees in addition to the collected data (from the questionnaire) were analyzed by inferential statistics methods using SPSS software. Finally, results of regression and fitted model at a significance level of 5% confirmed all hypotheses meaning that IMS and its items have a significant effect on social responsibility.

Keywords: social responsibility, integrated management, oil and gas production companies, regression

Procedia PDF Downloads 256
28376 A Machine Learning Approach for Detecting and Locating Hardware Trojans

Authors: Kaiwen Zheng, Wanting Zhou, Nan Tang, Lei Li, Yuanhang He

Abstract:

The integrated circuit industry has become a cornerstone of the information society, finding widespread application in areas such as industry, communication, medicine, and aerospace. However, with the increasing complexity of integrated circuits, Hardware Trojans (HTs) implanted by attackers have become a significant threat to their security. In this paper, we proposed a hardware trojan detection method for large-scale circuits. As HTs introduce physical characteristic changes such as structure, area, and power consumption as additional redundant circuits, we proposed a machine-learning-based hardware trojan detection method based on the physical characteristics of gate-level netlists. This method transforms the hardware trojan detection problem into a machine-learning binary classification problem based on physical characteristics, greatly improving detection speed. To address the problem of imbalanced data, where the number of pure circuit samples is far less than that of HTs circuit samples, we used the SMOTETomek algorithm to expand the dataset and further improve the performance of the classifier. We used three machine learning algorithms, K-Nearest Neighbors, Random Forest, and Support Vector Machine, to train and validate benchmark circuits on Trust-Hub, and all achieved good results. In our case studies based on AES encryption circuits provided by trust-hub, the test results showed the effectiveness of the proposed method. To further validate the method’s effectiveness for detecting variant HTs, we designed variant HTs using open-source HTs. The proposed method can guarantee robust detection accuracy in the millisecond level detection time for IC, and FPGA design flows and has good detection performance for library variant HTs.

Keywords: hardware trojans, physical properties, machine learning, hardware security

Procedia PDF Downloads 147
28375 Evaluation of the MCFLIRT Correction Algorithm in Head Motion from Resting State fMRI Data

Authors: V. Sacca, A. Sarica, F. Novellino, S. Barone, T. Tallarico, E. Filippelli, A. Granata, P. Valentino, A. Quattrone

Abstract:

In the last few years, resting-state functional MRI (rs-fMRI) was widely used to investigate the architecture of brain networks by investigating the Blood Oxygenation Level Dependent response. This technique represented an interesting, robust and reliable approach to compare pathologic and healthy subjects in order to investigate neurodegenerative diseases evolution. On the other hand, the elaboration of rs-fMRI data resulted to be very prone to noise due to confounding factors especially the head motion. Head motion has long been known to be a source of artefacts in task-based functional MRI studies, but it has become a particularly challenging problem in recent studies using rs-fMRI. The aim of this work was to evaluate in MS patients a well-known motion correction algorithm from the FMRIB's Software Library - MCFLIRT - that could be applied to minimize the head motion distortions, allowing to correctly interpret rs-fMRI results.

Keywords: head motion correction, MCFLIRT algorithm, multiple sclerosis, resting state fMRI

Procedia PDF Downloads 212
28374 Positive Bias and Length Bias in Deep Neural Networks for Premises Selection

Authors: Jiaqi Huang, Yuheng Wang

Abstract:

Premises selection, the task of selecting a set of axioms for proving a given conjecture, is a major bottleneck in automated theorem proving. An array of deep-learning-based methods has been established for premises selection, but a perfect performance remains challenging. Our study examines the inaccuracy of deep neural networks in premises selection. Through training network models using encoded conjecture and axiom pairs from the Mizar Mathematical Library, two potential biases are found: the network models classify more premises as necessary than unnecessary, referred to as the ‘positive bias’, and the network models perform better in proving conjectures that paired with more axioms, referred to as ‘length bias’. The ‘positive bias’ and ‘length bias’ discovered could inform the limitation of existing deep neural networks.

Keywords: automated theorem proving, premises selection, deep learning, interpreting deep learning

Procedia PDF Downloads 183
28373 Representations of Childcare Robots as a Controversial Issue

Authors: Raya A. Jones

Abstract:

This paper interrogates online representations of robot companions for children, including promotional material by manufacturers, media articles and technology blogs. The significance of the study lies in its contribution to understanding attitudes to robots. The prospect of childcare robots is particularly controversial ethically, and is associated with emotive arguments. The sampled material is restricted to relatively recent posts (the past three years) though the analysis identifies both continuous and changing themes across the past decade. The method extrapolates social representations theory towards examining the ways in which information about robotic products is provided for the general public. Implications for social acceptance of robot companions for the home and robot ethics are considered.

Keywords: acceptance of robots, childcare robots, ethics, social representations

Procedia PDF Downloads 252
28372 Robot Operating System-Based SLAM for a Gazebo-Simulated Turtlebot2 in 2d Indoor Environment with Cartographer Algorithm

Authors: Wilayat Ali, Li Sheng, Waleed Ahmed

Abstract:

The ability of the robot to make simultaneously map of the environment and localize itself with respect to that environment is the most important element of mobile robots. To solve SLAM many algorithms could be utilized to build up the SLAM process and SLAM is a developing area in Robotics research. Robot Operating System (ROS) is one of the frameworks which provide multiple algorithm nodes to work with and provide a transmission layer to robots. Manyof these algorithms extensively in use are Hector SLAM, Gmapping and Cartographer SLAM. This paper describes a ROS-based Simultaneous localization and mapping (SLAM) library Google Cartographer mapping, which is open-source algorithm. The algorithm was applied to create a map using laser and pose data from 2d Lidar that was placed on a mobile robot. The model robot uses the gazebo package and simulated in Rviz. Our research work's primary goal is to obtain mapping through Cartographer SLAM algorithm in a static indoor environment. From our research, it is shown that for indoor environments cartographer is an applicable algorithm to generate 2d maps with LIDAR placed on mobile robot because it uses both odometry and poses estimation. The algorithm has been evaluated and maps are constructed against the SLAM algorithms presented by Turtlebot2 in the static indoor environment.

Keywords: SLAM, ROS, navigation, localization and mapping, gazebo, Rviz, Turtlebot2, slam algorithms, 2d indoor environment, cartographer

Procedia PDF Downloads 145
28371 Exploring Encounters with Angels in Near-Death Experiences with Reference to Islamic Religious Sources

Authors: Zahra Yaghoubi

Abstract:

One of the initial occurrences that, according to observations of those who have temporarily experienced death, arises is encountering beings or individuals possessing supernatural powers. For some, these beings are described as beautiful and radiant, while for others, they are portrayed as dark and terrifying. In some experiences, they are mentioned as young and beautiful individuals. Islamic religious sources refer to these beings as angels or celestial beings assigned by God to take and collect human souls. This research, conducted through library methods, examines and justifies the initial stage of observations from an Islamic perspective based on first and second-hand religious sources. It relies on evidence, observations, and oral narratives of near-death experiencers, as well as interviews published in television programs. The goal is to investigate Islamic sources and validate the presence of angels in near-death experiences. The use of visual interview reports direct reliance on the narrative rather than the written text by someone other than the experiencer, is among the main criteria for enhancing transparency and authenticity in conveying the individual's experiences.

Keywords: angel, angels of death, Islamic sources, near-death experiences, death, soul

Procedia PDF Downloads 55
28370 Genome-Wide Functional Analysis of Phosphatase in Cryptococcus neoformans

Authors: Jae-Hyung Jin, Kyung-Tae Lee, Yee-Seul So, Eunji Jeong, Yeonseon Lee, Dongpil Lee, Dong-Gi Lee, Yong-Sun Bahn

Abstract:

Cryptococcus neoformans causes cryptococcal meningoencephalitis mainly in immunocompromised patients as well as immunocompetent people. But therapeutic options are limited to treat cryptococcosis. Some signaling pathways including cyclic AMP pathway, MAPK pathway, and calcineurin pathway play a central role in the regulation of the growth, differentiation, and virulence of C. neoformans. To understand signaling networks regulating the virulence of C. neoformans, we selected the 114 putative phosphatase genes, one of the major components of signaling networks, in the genome of C. neoformans. We identified putative phosphatases based on annotation in C. neoformans var. grubii genome database provided by the Broad Institute and National Center for Biotechnology Information (NCBI) and performed a BLAST search of phosphatases of Saccharomyces cerevisiae, Aspergillus nidulans, Candida albicans and Fusarium graminearum to Cryptococcus neoformans. We classified putative phosphatases into 14 groups based on InterPro phosphatase domain annotation. Here, we constructed 170 signature-tagged gene-deletion strains through homologous recombination methods for 91 putative phosphatases. We examined their phenotypic traits under 30 different in vitro conditions, including growth, differentiation, stress response, antifungal resistance and virulence-factor production.

Keywords: human fungal pathogen, phosphatase, deletion library, functional genomics

Procedia PDF Downloads 364
28369 Constructing a Probabilistic Ontology from a DBLP Data

Authors: Emna Hlel, Salma Jamousi, Abdelmajid Ben Hamadou

Abstract:

Every model for knowledge representation to model real-world applications must be able to cope with the effects of uncertain phenomena. One of main defects of classical ontology is its inability to represent and reason with uncertainty. To remedy this defect, we try to propose a method to construct probabilistic ontology for integrating uncertain information in an ontology modeling a set of basic publications DBLP (Digital Bibliography & Library Project) using a probabilistic model.

Keywords: classical ontology, probabilistic ontology, uncertainty, Bayesian network

Procedia PDF Downloads 347
28368 Falling and Rising of Solid Particles in Thermally Stratified Fluid

Authors: Govind Sharma, Bahni Ray

Abstract:

Ubiquitous nature of particle settling is governed by the presence of the surrounding fluid medium. Thermally stratified fluid alters the settling phenomenon of particles as well as their interactions. Direct numerical simulation (DNS) is carried out with an open-source library Immersed Boundary Adaptive Mesh Refinement (IBAMR) to quantify the fundamental mechanism based on Distributed Lagrangian Multiplier (DLM). The presence of background density gradient due to thermal stratification replaces the drafting-kissing-tumbling in a homogeneous fluid to drafting-kissing-separation behavior. Simulations are performed with a varying range of particle-fluid density ratios, and it is shown that the stratification effect on particle interactions varies with density ratio. It is observed that the combined role of buoyancy and inertia govern the physical mechanism of particle-particle interaction.

Keywords: direct numerical simulation, distributed lagrangian multiplier, rigidity constraint, sedimentation, stratification

Procedia PDF Downloads 136
28367 A Novel Approach to Design and Implement Context Aware Mobile Phone

Authors: G. S. Thyagaraju, U. P. Kulkarni

Abstract:

Context-aware computing refers to a general class of computing systems that can sense their physical environment, and adapt their behaviour accordingly. Context aware computing makes systems aware of situations of interest, enhances services to users, automates systems and personalizes applications. Context-aware services have been introduced into mobile devices, such as PDA and mobile phones. In this paper we are presenting a novel approaches used to realize the context aware mobile. The context aware mobile phone (CAMP) proposed in this paper senses the users situation automatically and provides user context required services. The proposed system is developed by using artificial intelligence techniques like Bayesian Network, fuzzy logic and rough sets theory based decision table. Bayesian Network to classify the incoming call (high priority call, low priority call and unknown calls), fuzzy linguistic variables and membership degrees to define the context situations, the decision table based rules for service recommendation. To exemplify and demonstrate the effectiveness of the proposed methods, the context aware mobile phone is tested for college campus scenario including different locations like library, class room, meeting room, administrative building and college canteen.

Keywords: context aware mobile, fuzzy logic, decision table, Bayesian probability

Procedia PDF Downloads 365
28366 China and the Middle East in the 21st Century: From Political Mediation to Economic Expansionism

Authors: Ali Asghar Sotoudeh

Abstract:

Mediation Diplomacy has emerged as one of the main pillars of China's foreign policy goals and practices, and Beijing has established itself as a peacekeeping force in regional conflicts and crises such as Afghanistan, Syria, Sudan, Yemen, and the Arab-Israeli peace process. China is deepening and intensifying its diplomatic interventions in the Middle East and trying to shape the security and political developments in the Middle East. On the other hand, economically, China has become one of the most important trading partners with Middle Eastern governments. China is also seeking to expand its foreign policy and economic interests in the Middle East through the New Silk Road initiative and has signed cooperation agreements with 17 Arab countries. In this regard, due to the importance of the subject, this research focuses on answering this question; what is the basis of China's political mediation and economic expansionism in the Middle East? In parallel with this question, this study follows the hypothesis that the mediating role of peace is a legitimate way for China to intervene in Middle East political crises, Without causing China to deviate from its traditional guiding principles based on non-interference in the internal affairs of other actors in the international system. This policy also promotes the security of economic interests and increases the country's political influence in the Middle East. The research method is descriptive-analytical based on the qualitative method, and the data collection method is library and internet resources.

Keywords: China, middle east, political mediation, economic expansionism

Procedia PDF Downloads 144
28365 A Designing 3D Model: Castle of the Mall-Dern

Authors: Nanadcha Sinjindawong

Abstract:

This article discusses the design process of a community mall called Castle of The Mall-dern. The concept behind this mall is to combine elements of a medieval castle with modern architecture. The author aims to create a building that fits into the surroundings while also providing users with the vibes of the ancient era. The total area used for the mall is 4,000 square meters, with three floors. The first floor is 1,500 square meters, the second floor is 1,750 square meters, and the third floor is 750 square meters. Research Aim: The aim of this research is to design a community mall that sells ancient clothes and accessories, and to combine sustainable architectural design with the ideas of ancient architecture in an urban area with convenient transportation. Methodology: The research utilizes qualitative research methods in architectural design. The process begins with calculating the given area and dividing it into different zones. The author then sketches and draws the plan of each floor, adding the necessary rooms based on the floor areas mentioned earlier. The program "SketchUp" is used to create an online 3D model of the community mall, and a physical model is built for presentation purposes on A1 paper, explaining all the details. Findings: The result of this research is a community mall with various amenities. The first floor includes retail shops, clothing stores, a food center, and a service zone. Additionally, there is an indoor garden with a fountain and a tree for relaxation. The second and third floors feature a void in the middle, with a few stores, cafes, restaurants, and studios on the second floor. The third floor is home to the administration and security control room, as well as a community gathering area designed as a public library with a café inside. Theoretical Importance: This research contributes to the field of sustainable architectural design by combining ancient architectural ideas with modern elements. It showcases the potential for creating buildings that blend historical aesthetics with contemporary functionality. Data Collection and Analysis Procedures: The data for this research is collected through a combination of area calculation, sketching, and building a 3D model. The analysis involves evaluating the design based on the allocated area, zoning, and functional requirements for a community mall. Question Addressed: The research addresses the question of how to design a community mall with a theme of ancient Medieval and Victorian eras. It explores how to combine sustainable architectural design principles with historical aesthetics to create a functional and visually appealing space. Conclusion: In conclusion, this research successfully designs a community mall called “Castle of The Mall-dern” that incorporates elements of Medieval and Victorian architecture. The building encompasses various zones, including retail shops, restaurants, community gathering areas, and service zones. It also features an interior garden and a public library within the mall. The research contributes to the field of sustainable architectural design by showcasing the potential for combining ancient architectural ideas with modern elements in an urban setting.

Keywords: 3D model, community mall, modern architecture, medieval architecture

Procedia PDF Downloads 107
28364 Data Confidentiality in Public Cloud: A Method for Inclusion of ID-PKC Schemes in OpenStack Cloud

Authors: N. Nalini, Bhanu Prakash Gopularam

Abstract:

The term data security refers to the degree of resistance or protection given to information from unintended or unauthorized access. The core principles of information security are the confidentiality, integrity and availability, also referred as CIA triad. Cloud computing services are classified as SaaS, IaaS and PaaS services. With cloud adoption the confidential enterprise data are moved from organization premises to untrusted public network and due to this the attack surface has increased manifold. Several cloud computing platforms like OpenStack, Eucalyptus, Amazon EC2 offer users to build and configure public, hybrid and private clouds. While the traditional encryption based on PKI infrastructure still works in cloud scenario, the management of public-private keys and trust certificates is difficult. The Identity based Public Key Cryptography (also referred as ID-PKC) overcomes this problem by using publicly identifiable information for generating the keys and works well with decentralized systems. The users can exchange information securely without having to manage any trust information. Another advantage is that access control (role based access control policy) information can be embedded into data unlike in PKI where it is handled by separate component or system. In OpenStack cloud platform the keystone service acts as identity service for authentication and authorization and has support for public key infrastructure for auto services. In this paper, we explain OpenStack security architecture and evaluate the PKI infrastructure piece for data confidentiality. We provide method to integrate ID-PKC schemes for securing data while in transit and stored and explain the key measures for safe guarding data against security attacks. The proposed approach uses JPBC crypto library for key-pair generation based on IEEE P1636.3 standard and secure communication to other cloud services.

Keywords: data confidentiality, identity based cryptography, secure communication, open stack key stone, token scoping

Procedia PDF Downloads 384
28363 Natural Language News Generation from Big Data

Authors: Bastian Haarmann, Likas Sikorski

Abstract:

In this paper, we introduce an NLG application for the automatic creation of ready-to-publish texts from big data. The fully automatic generated stories have a high resemblance to the style in which the human writer would draw up a news story. Topics may include soccer games, stock exchange market reports, weather forecasts and many more. The generation of the texts runs according to the human language production. Each generated text is unique. Ready-to-publish stories written by a computer application can help humans to quickly grasp the outcomes of big data analyses, save time-consuming pre-formulations for journalists and cater to rather small audiences by offering stories that would otherwise not exist.

Keywords: big data, natural language generation, publishing, robotic journalism

Procedia PDF Downloads 431
28362 Open-Source YOLO CV For Detection of Dust on Solar PV Surface

Authors: Jeewan Rai, Kinzang, Yeshi Jigme Choden

Abstract:

Accumulation of dust on solar panels impacts the overall efficiency and the amount of energy they produce. While various techniques exist for detecting dust to schedule cleaning, many of these methods use MATLAB image processing tools and other licensed software, which can be financially burdensome. This study will investigate the efficiency of a free open-source computer vision library using the YOLO algorithm. The proposed approach has been tested on images of solar panels with varying dust levels through an experiment setup. The experimental findings illustrated the effectiveness of using the YOLO-based image classification method and the overall dust detection approach with an accuracy of 90% in distinguishing between clean and dusty panels. This open-source solution provides a cost effective and accessible alternative to commercial image processing tools, offering solutions for optimizing solar panel maintenance and enhancing energy production.

Keywords: YOLO, openCV, dust detection, solar panels, computer vision, image processing

Procedia PDF Downloads 32
28361 Synthesis of a Library of Substituted Isoquinolines Based on a Triazolization Strategy, and Their Anti-HIV and C-X-C Chemokine Receptor Type 4 Antagonist Activity

Authors: Mastaneh Safarnejad Shad, Wim Dehaen, Steven De Jonghe

Abstract:

Since CXCR4 is the main coreceptor of HIV-1 and plays an important role in human immunodeficiency virus (HIV) entry, numerous efforts were directed towards the discovery of new classes of small molecules that act as CXCR4 antagonists. In addition, CXCR4 antagonists are potentially useful in the treatment of several other disorders, such as cancer cell metastasis, leukemia cell proliferation, rheumatoid arthritis, and pulmonary fibrosis. Since AMD3100 (plerixafor) is the only CXCR4 antagonist which obtained approval by the Food and Drug Administration (FDA), we were motivated to investigate a new category of molecules as CXCR4 antagonists. Most of the scaffolds which have been studied so far as CXCR4 antagonists are based on the tetrahydroquinoline (THQ) moiety in which AMD11070 (mavorixafor), GSK-812394, and TIQ15 displayed the most potent CXCR4 antagonism. Due to the high potency of these scaffolds, two different series of compounds were prepared in this work. In the first set, the THQ moiety is coupled to an amine chain and various isoquinoline derivatives (prepared by an in-house developed triazolization strategy), of which the upper part of molecules is identical to AMD11070 and TIQ15. In the second category of compounds, the THQ moiety was simplified by the synthesis of a substituted pyridine moiety. In order to investigate if CXCR4 antagonism requires the presence of an isoquinoline moiety, the corresponding pyridine analogues were also prepared. In both series of compounds, potent CXCR4 antagonism was noticed.

Keywords: CXCR4 coreceptor, CXCR4 antagonists, HIV inhibitor, tetrahydroquinoline

Procedia PDF Downloads 193
28360 Development of Regional Cooperation to Sustainable Implementation of Customary Refugee Solutions in International Arena

Authors: Md. Reduanul Haque

Abstract:

In recent time, more and more refugees are emerging in the international arena than the times ever that has come into the notice of world scholars. The prevailing customary solutions such as voluntary repatriation, local integration, and resettlement of refugee problem have been reflected unsustainable one for the lack of regional cooperation. In the international arena, the protraction of refugee problems is seen, and refugees are suffering due to the outrageous process of customary refugee solutions. If the regional cooperation can be developed, then the suffering of the refugees can be mitigated by the contribution of neighboring country and international and regional organizations. Data collected from the various secondary sources have been used throughout the research. It has been discussing in the refugee academia for a long time to develop regional cooperation mechanisms to ensure the sustainability of this solution and to make the environment of the country of origin for suitable voluntary repatriation as well as a durable solution. It is mainly qualitative research based on primary and secondary data will be studied on library-based project. Data collected by such methodology on this study indicates to make a bridge between the gaps of the cooperation mechanism and to make a more regional approach to share the burden and to strengthen the customary refugee solution. Hence, the importance of questing for a regional mechanism is to ensure the responsible countries to be more responsible towards refugees, their human rights, and durable solution under the mandate of the UNHCR. To implement effectively all the customary durable solutions, country to country or regional organization to organization based regional cooperation can be developed where the countries and regional organizations will work together to draw a sustainable solution to this problem in international context.

Keywords: refugee, regional cooperation, sustainable implementation, customary solutions, international arena

Procedia PDF Downloads 144
28359 A Molecular Dynamic Simulation Study to Explore Role of Chain Length in Predicting Useful Characteristic Properties of Commodity and Engineering Polymers

Authors: Lokesh Soni, Sushanta Kumar Sethi, Gaurav Manik

Abstract:

This work attempts to use molecular simulations to create equilibrated structures of a range of commercially used polymers. Generated equilibrated structures for polyvinyl acetate (isotactic), polyvinyl alcohol (atactic), polystyrene, polyethylene, polyamide 66, poly dimethyl siloxane, poly carbonate, poly ethylene oxide, poly amide 12, natural rubber, poly urethane, and polycarbonate (bisphenol-A) and poly ethylene terephthalate are employed to estimate the correct chain length that will correctly predict the chain parameters and properties. Further, the equilibrated structures are used to predict some properties like density, solubility parameter, cohesive energy density, surface energy, and Flory-Huggins interaction parameter. The simulated densities for polyvinyl acetate, polyvinyl alcohol, polystyrene, polypropylene, and polycarbonate are 1.15 g/cm3, 1.125 g/cm3, 1.02 g/cm3, 0.84 g/cm3 and 1.223 g/cm3 respectively are found to be in good agreement with the available literature estimates. However, the critical repeating units or the degree of polymerization after which the solubility parameter showed saturation were 15, 20, 25, 10 and 20 respectively. This also indicates that such properties that dictate the miscibility of two or more polymers in their blends are strongly dependent on the chosen polymer or its characteristic properties. An attempt has been made to correlate such properties with polymer properties like Kuhn length, free volume and the energy term which plays a vital role in predicting the mentioned properties. These results help us to screen and propose a useful library which may be used by the research groups in estimating the polymer properties using the molecular simulations of chains with the predicted critical lengths. The library shall help to obviate the need for researchers to spend efforts in finding the critical chain length needed for simulating the mentioned polymer properties.

Keywords: Kuhn length, Flory Huggins interaction parameter, cohesive energy density, free volume

Procedia PDF Downloads 193
28358 Scrum Challenges and Mitigation Practices in Global Software Development of an Integrated Learning Environment: Case Study of Science, Technology, Innovation, Mathematics, Engineering for the Young

Authors: Evgeniia Surkova, Manal Assaad, Hleb Makeyeu, Juho Makio

Abstract:

The main objective of STIMEY (Science, Technology, Innovation, Mathematics, Engineering for the Young) project is the delivery of a hybrid learning environment that combines multi-level components such as social media concepts, robotic artefacts, and radio, among others. It is based on a well-researched pedagogical framework to attract European youths to STEM (science, technology, engineering, and mathematics) education and careers. To develop and integrate these various components, STIMEY is executed in iterative research cycles leading to progressive improvements. Scrum was the development methodology of choice in the project, as studies indicated its benefits as an agile methodology in global software development, especially of e-learning and integrated learning projects. This paper describes the project partners’ experience with the Scrum framework, discussing the challenges faced in its implementation and the mitigation practices employed. The authors conclude with exploring user experience tools and principles for future research, as a novel direction in supporting the Scrum development team.

Keywords: e-learning, global software development, scrum, STEM education

Procedia PDF Downloads 179
28357 Geometrical Analysis of Tiling Patterns in Azari Style: The Case of Tabriz Kaboud Mosque

Authors: Seyyedeh Faezeh Miralami, Sahar Sayyadchapari, Mona Laleh, Zahra Poursafar

Abstract:

Tiling patterns are magnificent display of decoration in Islamic period. They transform the dusty and dreary facades to splendid and ornate ones. Due to ideological factors and elements of Azari style decorations, geometrical patterns and vegetative designs became prevalent and pervasive in religious sites like mosques. Objectives: The objective of this research is a study of tiling patterns in Tabriz Kaboud mosque, as a splendid work of architecture in Azari style. In this study, the geometrical designs and tiling patterns employed in the mosque decorations are examined and analyzed. Method: The research is based on a descriptive analysis method. Data and information are collected based on documents library and field study. Then, polished and brushed, the study resulted in an illustrative conclusion. Findings: In religious sites such as mosques, geometry represents ‘divination’ in Christian theology and ‘Unity with God’ or ‘Tawhid’ in Islamic terminology. In other words, science, literature, architecture, and all forms of human expression and representation are pointed towards one cause, unity or divination. Tiling patterns of Kaboud Mosque, mostly hexagonal, circular, square and triangle, form outstanding architectonic features which recount a story, a narration of divination or unification with the One.

Keywords: tiling, Azari style, Tabriz Kaboud Mosque, Islamic architecture

Procedia PDF Downloads 324
28356 Spectral Anomaly Detection and Clustering in Radiological Search

Authors: Thomas L. McCullough, John D. Hague, Marylesa M. Howard, Matthew K. Kiser, Michael A. Mazur, Lance K. McLean, Johanna L. Turk

Abstract:

Radiological search and mapping depends on the successful recognition of anomalies in large data sets which contain varied and dynamic backgrounds. We present a new algorithmic approach for real-time anomaly detection which is resistant to common detector imperfections, avoids the limitations of a source template library and provides immediate, and easily interpretable, user feedback. This algorithm is based on a continuous wavelet transform for variance reduction and evaluates the deviation between a foreground measurement and a local background expectation using methods from linear algebra. We also present a technique for recognizing and visualizing spectrally similar clusters of data. This technique uses Laplacian Eigenmap Manifold Learning to perform dimensional reduction which preserves the geometric "closeness" of the data while maintaining sensitivity to outlying data. We illustrate the utility of both techniques on real-world data sets.

Keywords: radiological search, radiological mapping, radioactivity, radiation protection

Procedia PDF Downloads 695
28355 Annotation Ontology for Semantic Web Development

Authors: Hadeel Al Obaidy, Amani Al Heela

Abstract:

The main purpose of this paper is to examine the concept of semantic web and the role that ontology and semantic annotation plays in the development of semantic web services. The paper focuses on semantic web infrastructure illustrating how ontology and annotation work to provide the learning capabilities for building content semantically. To improve productivity and quality of software, the paper applies approaches, notations and techniques offered by software engineering. It proposes a conceptual model to develop semantic web services for the infrastructure of web information retrieval system of digital libraries. The developed system uses ontology and annotation to build a knowledge based system to define and link the meaning of a web content to retrieve information for users’ queries. The results are more relevant through keywords and ontology rule expansion that will be more accurate to satisfy the requested information. The level of results accuracy would be enhanced since the query semantically analyzed work with the conceptual architecture of the proposed system.

Keywords: semantic web services, software engineering, semantic library, knowledge representation, ontology

Procedia PDF Downloads 173
28354 Two Spherical Three Degrees of Freedom Parallel Robots 3-RCC and 3-RRS Static Analysis

Authors: Alireza Abbasi Moshaii, Shaghayegh Nasiri, Mehdi Tale Masouleh

Abstract:

The main purpose of this study is static analysis of two three-degree of freedom parallel mechanisms: 3-RCC and 3-RRS. Geometry of these mechanisms is expressed and static equilibrium equations are derived for the whole chains. For these mechanisms due to the equal number of equations and unknowns, the solution is as same as 3-RCC mechanism. Mathematical software is used to solve the equations. In order to prove the results obtained from solving the equations of mechanisms, their CAD model has been simulated and their static is analysed in ADAMS software. Due to symmetrical geometry of the mechanisms, the force and external torque acting on the end-effecter have been considered asymmetric to prove the generality of the solution method. Finally, the results of both softwares, for both mechanisms are extracted and compared as graphs. The good achieved comparison between the results indicates the accuracy of the analysis.

Keywords: robotic, static analysis, 3-RCC, 3-RRS

Procedia PDF Downloads 384
28353 Structure-Based Virtual Screening and in Silico Toxicity Test of Compounds against Mycobacterium tuberculosis 7,8-Diaminopelargonic Acid Aminotransferase (MtbBioA)

Authors: Junie B. Billones, Maria Constancia O. Carrillo, Voltaire G. Organo, Stephani Joy Y. Macalino, Inno A. Emnacen, Jamie Bernadette A. Sy

Abstract:

One of the major interferences in the Philippines’ tuberculosis control program is the widespread prevalence of Mtb strains that are resistant to known drugs, such as the MDR-TB (Multi Drug Resistant Tuberculosis) and XDR-TB (Extensively Drug Resistant Tuberculosis). Therefore, there is a pressing need to search for novel Mtb drug targets in order to be able to combat these drug resistant strains. The enzyme 7,8-diaminopelargonic acid aminotransferase enzyme, or more commonly known as BioA, is one such ideal target, as it is known that humans do not possess this enzyme. BioA primarily plays a key role in Mtb’s lipid biosynthesis pathway; more specifically in the synthesis of the enzyme cofactor biotin. In this study, structure-based pharmacophore screening, docking, and ADMET evaluation of compounds obtained from the DrugBank chemical database were performed against the MtbBioA enzyme. Results of the screening, docking, ADMET, and TOPKAT calculations revealed that out of the 6,516 compounds in the library, only 7 compounds indicated more favorable binding energies as compared to the enzyme’s known inhibitor, amiclenomycin (ACM), as well as good solubility and toxicity properties. Moreover, out of these 7 compounds, Molecule 6 exhibited the best solubility and toxicity properties. In the future, these lead compounds may then be subjected to bioactivity assays in vitro or in vivo for further evaluation of its therapeutic efficacy.

Keywords: 7, 8-diaminopelargonic acid aminotransferase, BioA, pharmacophore, molecular docking, ADMET, TOPKAT

Procedia PDF Downloads 458
28352 Implementation of a Serializer to Represent PHP Objects in the Extensible Markup Language

Authors: Lidia N. Hernández-Piña, Carlos R. Jaimez-González

Abstract:

Interoperability in distributed systems is an important feature that refers to the communication of two applications written in different programming languages. This paper presents a serializer and a de-serializer of PHP objects to and from XML, which is an independent library written in the PHP programming language. The XML generated by this serializer is independent of the programming language, and can be used by other existing Web Objects in XML (WOX) serializers and de-serializers, which allow interoperability with other object-oriented programming languages.

Keywords: interoperability, PHP object serialization, PHP to XML, web objects in XML, WOX

Procedia PDF Downloads 237
28351 Black-Box-Optimization Approach for High Precision Multi-Axes Forward-Feed Design

Authors: Sebastian Kehne, Alexander Epple, Werner Herfs

Abstract:

A new method for optimal selection of components for multi-axes forward-feed drive systems is proposed in which the choice of motors, gear boxes and ball screw drives is optimized. Essential is here the synchronization of electrical and mechanical frequency behavior of all axes because even advanced controls (like H∞-controls) can only control a small part of the mechanical modes – namely only those of observable and controllable states whose value can be derived from the positions of extern linear length measurement systems and/or rotary encoders on the motor or gear box shafts. Further problems are the unknown processing forces like cutting forces in machine tools during normal operation which make the estimation and control via an observer even more difficult. To start with, the open source Modelica Feed Drive Library which was developed at the Laboratory for Machine Tools, and Production Engineering (WZL) is extended from one axis design to the multi axes design. It is capable to simulate the mechanical, electrical and thermal behavior of permanent magnet synchronous machines with inverters, different gear boxes and ball screw drives in a mechanical system. To keep the calculation time down analytical equations are used for field and torque producing equivalent circuit, heat dissipation and mechanical torque at the shaft. As a first step, a small machine tool with a working area of 635 x 315 x 420 mm is taken apart, and the mechanical transfer behavior is measured with an impulse hammer and acceleration sensors. With the frequency transfer functions, a mechanical finite element model is built up which is reduced with substructure coupling to a mass-damper system which models the most important modes of the axes. The model is modelled with Modelica Feed Drive Library and validated by further relative measurements between machine table and spindle holder with a piezo actor and acceleration sensors. In a next step, the choice of possible components in motor catalogues is limited by derived analytical formulas which are based on well-known metrics to gain effective power and torque of the components. The simulation in Modelica is run with different permanent magnet synchronous motors, gear boxes and ball screw drives from different suppliers. To speed up the optimization different black-box optimization methods (Surrogate-based, gradient-based and evolutionary) are tested on the case. The objective that was chosen is to minimize the integral of the deviations if a step is given on the position controls of the different axes. Small values are good measures for a high dynamic axes. In each iteration (evaluation of one set of components) the control variables are adjusted automatically to have an overshoot less than 1%. It is obtained that the order of the components in optimization problem has a deep impact on the speed of the black-box optimization. An approach to do efficient black-box optimization for multi-axes design is presented in the last part. The authors would like to thank the German Research Foundation DFG for financial support of the project “Optimierung des mechatronischen Entwurfs von mehrachsigen Antriebssystemen (HE 5386/14-1 | 6954/4-1)” (English: Optimization of the Mechatronic Design of Multi-Axes Drive Systems).

Keywords: ball screw drive design, discrete optimization, forward feed drives, gear box design, linear drives, machine tools, motor design, multi-axes design

Procedia PDF Downloads 287
28350 System Identification of Building Structures with Continuous Modeling

Authors: Ruichong Zhang, Fadi Sawaged, Lotfi Gargab

Abstract:

This paper introduces a wave-based approach for system identification of high-rise building structures with a pair of seismic recordings, which can be used to evaluate structural integrity and detect damage in post-earthquake structural condition assessment. The fundamental of the approach is based on wave features of generalized impulse and frequency response functions (GIRF and GFRF), i.e., wave responses at one structural location to an impulsive motion at another reference location in time and frequency domains respectively. With a pair of seismic recordings at the two locations, GFRF is obtainable as Fourier spectral ratio of the two recordings, and GIRF is then found with the inverse Fourier transformation of GFRF. With an appropriate continuous model for the structure, a closed-form solution of GFRF, and subsequent GIRF, can also be found in terms of wave transmission and reflection coefficients, which are related to structural physical properties above the impulse location. Matching the two sets of GFRF and/or GIRF from recordings and the model helps identify structural parameters such as wave velocity or shear modulus. For illustration, this study examines ten-story Millikan Library in Pasadena, California with recordings of Yorba Linda earthquake of September 3, 2002. The building is modelled as piecewise continuous layers, with which GFRF is derived as function of such building parameters as impedance, cross-sectional area, and damping. GIRF can then be found in closed form for some special cases and numerically in general. Not only does this study reveal the influential factors of building parameters in wave features of GIRF and GRFR, it also shows some system-identification results, which are consistent with other vibration- and wave-based results. Finally, this paper discusses the effectiveness of the proposed model in system identification.

Keywords: wave-based approach, seismic responses of buildings, wave propagation in structures, construction

Procedia PDF Downloads 233
28349 Using Deep Learning Real-Time Object Detection Convolution Neural Networks for Fast Fruit Recognition in the Tree

Authors: K. Bresilla, L. Manfrini, B. Morandi, A. Boini, G. Perulli, L. C. Grappadelli

Abstract:

Image/video processing for fruit in the tree using hard-coded feature extraction algorithms have shown high accuracy during recent years. While accurate, these approaches even with high-end hardware are computationally intensive and too slow for real-time systems. This paper details the use of deep convolution neural networks (CNNs), specifically an algorithm (YOLO - You Only Look Once) with 24+2 convolution layers. Using deep-learning techniques eliminated the need for hard-code specific features for specific fruit shapes, color and/or other attributes. This CNN is trained on more than 5000 images of apple and pear fruits on 960 cores GPU (Graphical Processing Unit). Testing set showed an accuracy of 90%. After this, trained data were transferred to an embedded device (Raspberry Pi gen.3) with camera for more portability. Based on correlation between number of visible fruits or detected fruits on one frame and the real number of fruits on one tree, a model was created to accommodate this error rate. Speed of processing and detection of the whole platform was higher than 40 frames per second. This speed is fast enough for any grasping/harvesting robotic arm or other real-time applications.

Keywords: artificial intelligence, computer vision, deep learning, fruit recognition, harvesting robot, precision agriculture

Procedia PDF Downloads 420
28348 Engineering of Reagentless Fluorescence Biosensors Based on Single-Chain Antibody Fragments

Authors: Christian Fercher, Jiaul Islam, Simon R. Corrie

Abstract:

Fluorescence-based immunodiagnostics are an emerging field in biosensor development and exhibit several advantages over traditional detection methods. While various affinity biosensors have been developed to generate a fluorescence signal upon sensing varying concentrations of analytes, reagentless, reversible, and continuous monitoring of complex biological samples remains challenging. Here, we aimed to genetically engineer biosensors based on single-chain antibody fragments (scFv) that are site-specifically labeled with environmentally sensitive fluorescent unnatural amino acids (UAA). A rational design approach resulted in quantifiable analyte-dependent changes in peak fluorescence emission wavelength and enabled antigen detection in vitro. Incorporation of a polarity indicator within the topological neighborhood of the antigen-binding interface generated a titratable wavelength blueshift with nanomolar detection limits. In order to ensure continuous analyte monitoring, scFv candidates with fast binding and dissociation kinetics were selected from a genetic library employing a high-throughput phage display and affinity screening approach. Initial rankings were further refined towards rapid dissociation kinetics using bio-layer interferometry (BLI) and surface plasmon resonance (SPR). The most promising candidates were expressed, purified to homogeneity, and tested for their potential to detect biomarkers in a continuous microfluidic-based assay. Variations of dissociation kinetics within an order of magnitude were achieved without compromising the specificity of the antibody fragments. This approach is generally applicable to numerous antibody/antigen combinations and currently awaits integration in a wide range of assay platforms for one-step protein quantification.

Keywords: antibody engineering, biosensor, phage display, unnatural amino acids

Procedia PDF Downloads 146