Search results for: frame semantics
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1098

Search results for: frame semantics

708 Development of Configuration Software of Space Environment Simulator Control System Based on Linux

Authors: Zhan Haiyang, Zhang Lei, Ning Juan

Abstract:

This paper presents a configuration software solution in Linux, which is used for the control of space environment simulator. After introducing the structure and basic principle, it is said that the developing of QT software frame and the dynamic data exchanging between PLC and computer. The OPC driver in Linux is also developed. This driver realizes many-to-many communication between hardware devices and SCADA software. Moreover, an algorithm named “Scan PRI” is put forward. This algorithm is much more optimizable and efficient compared with "Scan in sequence" in Windows. This software has been used in practical project. It has a good control effect and can achieve the expected goal.

Keywords: Linux OS, configuration software, OPC Server driver, MYSQL database

Procedia PDF Downloads 282
707 Building Exoskeletons for Seismic Retrofitting

Authors: Giuliana Scuderi, Patrick Teuffel

Abstract:

The proven vulnerability of the existing social housing building heritage to natural or induced earthquakes requires the development of new design concepts and conceptual method to preserve materials and object, at the same time providing new performances. An integrate intervention between civil engineering, building physics and architecture can convert the social housing districts from a critical part of the city to a strategic resource of revitalization. Referring to bio-mimicry principles the present research proposes a taxonomy with the exoskeleton of the insect, an external, light and resistant armour whose role is to protect the internal organs from external potentially dangerous inputs. In the same way, a “building exoskeleton”, acting from the outside of the building as an enclosing cage, can restore, protect and support the existing building, assuming a complex set of roles, from the structural to the thermal, from the aesthetical to the functional. This study evaluates the structural efficiency of shape memory alloys devices (SMADs) connecting the “building exoskeleton” with the existing structure to rehabilitate, in order to prevent the out-of-plane collapse of walls and for the passive dissipation of the seismic energy, with a calibrated operability in relation to the intensity of the horizontal loads. The two case studies of a masonry structure and of a masonry structure with concrete frame are considered, and for each case, a theoretical social housing building is exposed to earthquake forces, to evaluate its structural response with or without SMADs. The two typologies are modelled with the finite element program SAP2000, and they are respectively defined through a “frame model” and a “diagonal strut model”. In the same software two types of SMADs, called the 00-10 SMAD and the 05-10 SMAD are defined, and non-linear static and dynamic analyses, namely push over analysis and time history analysis, are performed to evaluate the seismic response of the building. The effectiveness of the devices in limiting the control joint displacements resulted higher in one direction, leading to the consideration of a possible calibrated use of the devices in the different walls of the building. The results show also a higher efficiency of the 00-10 SMADs in controlling the interstory drift, but at the same time the necessity to improve the hysteretic behaviour, to maximise the passive dissipation of the seismic energy.

Keywords: adaptive structure, biomimetic design, building exoskeleton, social housing, structural envelope, structural retrofitting

Procedia PDF Downloads 416
706 Model Predictive Control of Three Phase Inverter for PV Systems

Authors: Irtaza M. Syed, Kaamran Raahemifar

Abstract:

This paper presents a model predictive control (MPC) of a utility interactive three phase inverter (TPI) for a photovoltaic (PV) system at commercial level. The proposed model uses phase locked loop (PLL) to synchronize TPI with the power electric grid (PEG) and performs MPC control in a dq reference frame. TPI model consists of boost converter (BC), maximum power point tracking (MPPT) control, and a three leg voltage source inverter (VSI). Operational model of VSI is used to synthesize sinusoidal current and track the reference. Model is validated using a 35.7 kW PV system in Matlab/Simulink. Implementation and results show simplicity and accuracy, as well as reliability of the model.

Keywords: model predictive control, three phase voltage source inverter, PV system, Matlab/simulink

Procedia PDF Downloads 586
705 Modeling Methodologies for Optimization and Decision Support on Coastal Transport Information System (Co.Tr.I.S.)

Authors: Vassilios Moussas, Dimos N. Pantazis, Panagioths Stratakis

Abstract:

The aim of this paper is to present the optimization methodology developed in the frame of a Coastal Transport Information System. The system will be used for the effective design of coastal transportation lines and incorporates subsystems that implement models, tools and techniques that may support the design of improved networks. The role of the optimization and decision subsystem is to provide the user with better and optimal scenarios that will best fulfill any constrains, goals or requirements posed. The complexity of the problem and the large number of parameters and objectives involved led to the adoption of an evolutionary method (Genetic Algorithms). The problem model and the subsystem structure are presented in detail, and, its support for simulation is also discussed.

Keywords: coastal transport, modeling, optimization

Procedia PDF Downloads 495
704 A Blending Analysis of Metaphors and Metonymies Used to Depict the Deal of the Century by Jordanian Cartoonists

Authors: Aseel Zibin, Abdel Rahman Altakhaineh

Abstract:

This study analyses 30 cartoons depicting THE DEAL OF THE CENTURY as envisaged by two Jordanian cartoonists, namely, EmadHajjaj and Osama Hajjaj. Conceptual Blending Theory (CBT) and Multimodal Metaphor Theory (MMT) are adopted as a theoretical framework to interpret the metaphors and metonymies used in the target cartoons. The results reveal that the target domain THE DEAL OF THE CENTURY was conceptualized mainly through layered metaphors that have metonymic basis and event metaphors\allegories. Specifically, 6 groups were identified: OBJECT or a situation involving OBJECTS, situations involving HUMANS\HYBRIDS of HUMANS and OBJECTS, an ANIMAL OR situation involving an ANIMAL, hybrids of WEAPONS and humans, and event metaphors used to build a story\allegory. The target domain was also depicted via event metaphors used to build a story; some of which are embedded in the Jordanian culture, while others could be perceivable cross-culturally. The results also demonstrate that the most widely used configurations to construe the metaphors was the pictorial source–verbal target in line with Lan and Zuo (2016); the motivation was probably the greater conceptual density and concreteness of visual representation since the target is better captured verbally because of its abstractness. The use of cross-modal mappings of this type was attributed to the abstractness of the target domain, THE DEAL OF THE CENTURY, which makes it more construable via verbal cues rather than visual ones. In contrast, the source domains used were mainly concrete and thus perceivable pictorially rather than verbally.

Keywords: semiotics, cognitive semantics, metaphor, culture, blending, cartoon

Procedia PDF Downloads 165
703 True and False Cognates of Japanese, Chinese and Philippine Languages: A Contrastive Analysis

Authors: Jose Marie E. Ocdenaria, Riceli C. Mendoza

Abstract:

Culturally, languages meet, merge, share, exchange, appropriate, donate, and divide in and to and from each other. Further, this type of recurrence manifests in East Asian cultures, where language influence diffuses across geographical proximities. Historically, China has notable impacts on Japan’s culture. For instance, Japanese borrowed words from China and their way of reading and writing. This qualitative and descriptive employing contrastive analysis study addressed the true and false cognates of Japanese-Philippine languages and Chinese-Philippine languages. It involved a rich collection of data from various sources like textual pieces of evidence or corpora to gain a deeper understanding of true and false cognates between L1 and L2. Cognates of Japanese-Philippine languages and Chinese-Philippine languages were analyzed contrastively according to orthography, phonology, and semantics. The words presented were the roots; however, derivatives, reduplications, and variants of stress were included when they shed emphases on the comparison. The basis of grouping the cognates was its phonetic-semantic resemblance. Based on the analysis, it revealed that there are words which may have several types of lexical relationship. Further, the study revealed that the Japanese language has more false cognates in the Philippine languages, particularly in Tagalog and Cebuano. On the other hand, there are more true cognates of Chinese in Tagalog. It is the hope of this study to provide a significant contribution to a diverse audience. These include the teachers and learners of foreign languages such as Japanese and Chinese, future researchers and investigators, applied linguists, curricular theorists, community, and publishers.

Keywords: Contrastive Analysis, Japanese, Chinese and Philippine languages, Qualitative and descriptive study, True and False Cognates

Procedia PDF Downloads 133
702 Low Power Consuming Electromagnetic Actuators for Pulsed Pilot Stages

Authors: M. Honarpardaz, Z. Zhang, J. Derkx, A. Trangärd, J. Larsson

Abstract:

Pilot stages are one of the most common positioners and regulators in industry. In this paper, we present two novel concepts for pilot stages with low power consumption to regulate a pneumatic device. Pilot 1, first concept, is designed based on a conventional frame core electro-magnetic actuator and a leaf spring to control the air flow and pilot 2 has an axisymmetric actuator and spring made of non-oriented electrical steel. Concepts are simulated in a system modeling tool to study their dynamic behavior. Both concepts are prototyped and tested. Experimental results are comprehensively analyzed and compared. The most promising concept that consumes less than 8 mW is highlighted and presented.

Keywords: electro-magnetic actuator, multidisciplinary system, low power consumption, pilot stage

Procedia PDF Downloads 253
701 The Gaze; Objectification of the Surrogate Mother in Cross-Border Surrogacy: An Empirical Study Applied to Surrogacy Facilitators

Authors: Yingyi Luo

Abstract:

Cross-border surrogacy is seen by many as a market in which women are bought and sold commodities at risk of trafficking. A surrogate can be framed as either a fully acknowledged subject, with whom intended parents engage in cross-border surrogacy—or as a tool utilized by intended parents and surrogacy facilitators in the furtherance of their own objectives. In order to identify which frame prevails, this paper applies subjectivity theory to an empirical study of cross-border surrogacy facilitated by facilitators in Australia analysing interviews with surrogate agents, counsellors and lawyers, and observations at trade show. The aim of the paper is to advance understanding of the dynamics of the relationship between intended parents, surrogates, and surrogacy facilitators by collecting new data and applying unique framework. As dominant players, surrogacy facilitators have a significant impact on determining the nature of cross-border surrogacy. However, little is known concerning the manner in which facilitators influence the inter-subjectivity between surrogate mothers and intended parents. Thus, this paper intends to identify how facilitators depict surrogate mothers, the degree to which their perspectives bear upon both the subjectivity of the surrogate mother and the relationship of intended parents with surrogate mothers. For the purpose of introducing and developing this framework in the context of cross-border surrogacy, this paper borrows from the work of theorists not often mentioned in bioethics, including Jacques Lacan, Marco Cavallaro, Michel Foucault, and others. It also applies the concept of 'the gaze' along with the dynamic of 'self' and 'other' to the cross-border surrogacy arrangement. Applying the concept of the gaze can provide a new way to interpret the power dynamic that plays out among surrogacy facilitators, intended parents, and surrogates within the commercial surrogacy arrangement and how the subjectivity is produced through the power. Viewing the relationships between the players in cross-border surrogacy through the lens of gaze theory, this paper finds that, in cross-border surrogacy, due to the structural power imbalance, affluent intended parents and surrogacy facilitators are possessors of the gaze, while surrogate mothers are under the thrall of the gaze. Specifically, facilitators frame surrogate mothers' reproductive abilities as commodities that intended parents can purchase to fulfil their urgent need to have children and experience full subjectivity, and they take a cut of the money that paid by intended parents. Therefore, commodification of the body results in degrading a surrogate mother (the object), reifying her as no more than a walking womb (the other), a process which is highly detrimental to the self of surrogate mothers. This relationship, formalized through contractual means, allows intended parents and facilitators to take advantage of surrogate mothers in the furtherance of their own objectives. This argument is enriched by new data from interviews and observations that provide nuance to this understanding of inter-subjectivity.

Keywords: cross-border surrogacy, facilitators, self, surrogate mothers

Procedia PDF Downloads 129
700 Video Stabilization Using Feature Point Matching

Authors: Shamsundar Kulkarni

Abstract:

Video capturing by non-professionals will lead to unanticipated effects. Such as image distortion, image blurring etc. Hence, many researchers study such drawbacks to enhance the quality of videos. In this paper, an algorithm is proposed to stabilize jittery videos .A stable output video will be attained without the effect of jitter which is caused due to shaking of handheld camera during video recording. Firstly, salient points from each frame from the input video are identified and processed followed by optimizing and stabilize the video. Optimization includes the quality of the video stabilization. This method has shown good result in terms of stabilization and it discarded distortion from the output videos recorded in different circumstances.

Keywords: video stabilization, point feature matching, salient points, image quality measurement

Procedia PDF Downloads 302
699 Model Development for Real-Time Human Sitting Posture Detection Using a Camera

Authors: Jheanel E. Estrada, Larry A. Vea

Abstract:

This study developed model to detect proper/improper sitting posture using the built in web camera which detects the upper body points’ location and distances (chin, manubrium and acromion process). It also established relationships of human body frames and proper sitting posture. The models were developed by training some well-known classifiers such as KNN, SVM, MLP, and Decision Tree using the data collected from 60 students of different body frames. Decision Tree classifier demonstrated the most promising model performance with an accuracy of 95.35% and a kappa of 0.907 for head and shoulder posture. Results also showed that there were relationships between body frame and posture through Body Mass Index.

Keywords: posture, spinal points, gyroscope, image processing, ergonomics

Procedia PDF Downloads 324
698 Secure Transfer of Medical Images Using Hybrid Encryption

Authors: Boukhatem Mohamed Belkaid, Lahdi Mourad

Abstract:

In this paper, we propose a new encryption system for security issues medical images. The hybrid encryption scheme is based on AES and RSA algorithms to validate the three security services are authentication, integrity, and confidentiality. Privacy is ensured by AES, authenticity is ensured by the RSA algorithm. Integrity is assured by the basic function of the correlation between adjacent pixels. Our system generates a unique password every new session of encryption, that will be used to encrypt each frame of the medical image basis to strengthen and ensure his safety. Several metrics have been used for various tests of our analysis. For the integrity test, we noticed the efficiencies of our system and how the imprint cryptographic changes at reception if a change affects the image in the transmission channel.

Keywords: AES, RSA, integrity, confidentiality, authentication, medical images, encryption, decryption, key, correlation

Procedia PDF Downloads 437
697 Advances on the Understanding of Sequence Convergence Seen from the Perspective of Mathematical Working Spaces

Authors: Paula Verdugo-Hernandez, Patricio Cumsille

Abstract:

We analyze a first-class on the convergence of real number sequences, named hereafter sequences, to foster exploration and discovery of concepts through graphical representations before engaging students in proving. The main goal was to differentiate between sequences and continuous functions-of-a-real-variable and better understand concepts at an initial stage. We applied the analytic frame of mathematical working spaces, which we expect to contribute to extending to sequences since, as far as we know, it has only developed for other objects, and which is relevant to analyze how mathematical work is built systematically by connecting the epistemological and cognitive perspectives, and involving the semiotic, instrumental, and discursive dimensions.

Keywords: convergence, graphical representations, mathematical working spaces, paradigms of real analysis, real number sequences

Procedia PDF Downloads 139
696 Offering a Model for Selecting the Most Suitable Type of Thinking for Managers

Authors: H. Emari, Z. Emari

Abstract:

The purpose of this paper is to design an applied framework for strategic thinking which can be applied in all managerial levels and all types of organizational environments. No special applied frame has been presented for this thinking. This paper presents a theoretical framework for the thinking type of a manager by making a historical research and studying the scientific documents about thinking of a strategist. In the new theoretical framework it has been tried to suggest the best type of thinking for a strategist after analyzing the environment of his decisions. So, in this framework, the traditional viewpoint about strategic thinking, which has considered it as a special type of right-brain thinking against other types of right-brain thinking and suggested it for a strategist, was put aside and suggests that the strategist should use a suitable type of thinking under different conditions.

Keywords: strategic thinking, systemic thinking, lateral thinking, intuitive thinking, hybrid thinking

Procedia PDF Downloads 326
695 An Event-Related Potentials Study on the Processing of English Subjunctive Mood by Chinese ESL Learners

Authors: Yan Huang

Abstract:

Event-related potentials (ERPs) technique helps researchers to make continuous measures on the whole process of language comprehension, with an excellent temporal resolution at the level of milliseconds. The research on sentence processing has developed from the behavioral level to the neuropsychological level, which brings about a variety of sentence processing theories and models. However, the applicability of these models to L2 learners is still under debate. Therefore, the present study aims to investigate the neural mechanisms underlying English subjunctive mood processing by Chinese ESL learners. To this end, English subject clauses with subjunctive moods are used as the stimuli, all of which follow the same syntactic structure, “It is + adjective + that … + (should) do + …” Besides, in order to examine the role that language proficiency plays on L2 processing, this research deals with two groups of Chinese ESL learners (18 males and 22 females, mean age=21.68), namely, high proficiency group (Group H) and low proficiency group (Group L). Finally, the behavioral and neurophysiological data analysis reveals the following findings: 1) Syntax and semantics interact with each other on the SECOND phase (300-500ms) of sentence processing, which is partially in line with the Three-phase Sentence Model; 2) Language proficiency does affect L2 processing. Specifically, for Group H, it is the syntactic processing that plays the dominant role in sentence processing while for Group L, semantic processing also affects the syntactic parsing during the THIRD phase of sentence processing (500-700ms). Besides, Group H, compared to Group L, demonstrates a richer native-like ERPs pattern, which further demonstrates the role of language proficiency in L2 processing. Based on the research findings, this paper also provides some enlightenment for the L2 pedagogy as well as the L2 proficiency assessment.

Keywords: Chinese ESL learners, English subjunctive mood, ERPs, L2 processing

Procedia PDF Downloads 127
694 Code Embedding for Software Vulnerability Discovery Based on Semantic Information

Authors: Joseph Gear, Yue Xu, Ernest Foo, Praveen Gauravaran, Zahra Jadidi, Leonie Simpson

Abstract:

Deep learning methods have been seeing an increasing application to the long-standing security research goal of automatic vulnerability detection for source code. Attention, however, must still be paid to the task of producing vector representations for source code (code embeddings) as input for these deep learning models. Graphical representations of code, most predominantly Abstract Syntax Trees and Code Property Graphs, have received some use in this task of late; however, for very large graphs representing very large code snip- pets, learning becomes prohibitively computationally expensive. This expense may be reduced by intelligently pruning this input to only vulnerability-relevant information; however, little research in this area has been performed. Additionally, most existing work comprehends code based solely on the structure of the graph at the expense of the information contained by the node in the graph. This paper proposes Semantic-enhanced Code Embedding for Vulnerability Discovery (SCEVD), a deep learning model which uses semantic-based feature selection for its vulnerability classification model. It uses information from the nodes as well as the structure of the code graph in order to select features which are most indicative of the presence or absence of vulnerabilities. This model is implemented and experimentally tested using the SARD Juliet vulnerability test suite to determine its efficacy. It is able to improve on existing code graph feature selection methods, as demonstrated by its improved ability to discover vulnerabilities.

Keywords: code representation, deep learning, source code semantics, vulnerability discovery

Procedia PDF Downloads 151
693 On Musical Information Geometry with Applications to Sonified Image Analysis

Authors: Shannon Steinmetz, Ellen Gethner

Abstract:

In this paper, a theoretical foundation is developed for patterned segmentation of audio using the geometry of music and statistical manifold. We demonstrate image content clustering using conic space sonification. The algorithm takes a geodesic curve as a model estimator of the three-parameter Gamma distribution. The random variable is parameterized by musical centricity and centric velocity. Model parameters predict audio segmentation in the form of duration and frame count based on the likelihood of musical geometry transition. We provide an example using a database of randomly selected images, resulting in statistically significant clusters of similar image content.

Keywords: sonification, musical information geometry, image, content extraction, automated quantification, audio segmentation, pattern recognition

Procedia PDF Downloads 222
692 Value Relevance of Accounting Information: A Study of Steel Sector in India

Authors: Pradyumna Mohanty

Abstract:

The paper aims to explore whether accounting information of Indian companies in the Steel sector are value relevant or not. Ohlson’s model which usually takes into consideration book value per share (BV) and earnings per share (EARN) has been used and the same has been expanded to include two more variables such as cash flow from operations (CFO) and return on equity (ROE). The data were collected from CMIE-Prowess data base in respect of BSE-listed steel companies and the time frame spans from 2010 to 2014. OLS regression has been used to test the value relevance of these accounting numbers. Results indicate that both CFO and BV are having significant influence on the stock price in two out of five years of study. But, BV is emerging as the most significant and highly value relevant of all the four variables during the entire period of study.

Keywords: value relevance, accounting information, book value per share, earnings per share

Procedia PDF Downloads 156
691 Newspaper Framing of President Buhari’s Handling of Insecurity in Nigeria, January 2016 - December 2017

Authors: Onyekwere Okpara, Kingsley C. Izuogu

Abstract:

This paper examined newspaper framing of President Buhari's handling of insecurity in Nigeria between January 2016-December 2017. The objectives were to examine the tone and sources of news frames used in reporting President Buhari's handling of insecurity in Nigeria. This paper did a content analysis of three newspapers-Daily Sun, The Nation, and the Leadership. Using a systematic random sampling, the study sampled a total of 732 editions of the selected newspapers and found out that the newspapers used neutral tone and government frame. The study, therefore, recommended that newspapers should improve their investigative reporting efforts.

Keywords: insecurity, newspapers, framing, media

Procedia PDF Downloads 86
690 Incorporating Lexical-Semantic Knowledge into Convolutional Neural Network Framework for Pediatric Disease Diagnosis

Authors: Xiaocong Liu, Huazhen Wang, Ting He, Xiaozheng Li, Weihan Zhang, Jian Chen

Abstract:

The utilization of electronic medical record (EMR) data to establish the disease diagnosis model has become an important research content of biomedical informatics. Deep learning can automatically extract features from the massive data, which brings about breakthroughs in the study of EMR data. The challenge is that deep learning lacks semantic knowledge, which leads to impracticability in medical science. This research proposes a method of incorporating lexical-semantic knowledge from abundant entities into a convolutional neural network (CNN) framework for pediatric disease diagnosis. Firstly, medical terms are vectorized into Lexical Semantic Vectors (LSV), which are concatenated with the embedded word vectors of word2vec to enrich the feature representation. Secondly, the semantic distribution of medical terms serves as Semantic Decision Guide (SDG) for the optimization of deep learning models. The study evaluate the performance of LSV-SDG-CNN model on four kinds of Chinese EMR datasets. Additionally, CNN, LSV-CNN, and SDG-CNN are designed as baseline models for comparison. The experimental results show that LSV-SDG-CNN model outperforms baseline models on four kinds of Chinese EMR datasets. The best configuration of the model yielded an F1 score of 86.20%. The results clearly demonstrate that CNN has been effectively guided and optimized by lexical-semantic knowledge, and LSV-SDG-CNN model improves the disease classification accuracy with a clear margin.

Keywords: convolutional neural network, electronic medical record, feature representation, lexical semantics, semantic decision

Procedia PDF Downloads 122
689 A Method to Saturation Modeling of Synchronous Machines in d-q Axes

Authors: Mohamed Arbi Khlifi, Badr M. Alshammari

Abstract:

This paper discusses the general methods to saturation in the steady-state, two axis (d & q) frame models of synchronous machines. In particular, the important role of the magnetic coupling between the d-q axes (cross-magnetizing phenomenon), is demonstrated. For that purpose, distinct methods of saturation modeling of dumper synchronous machine with cross-saturation are identified, and detailed models synthesis in d-q axes. A number of models are given in the final developed form. The procedure and the novel models are verified by a critical application to prove the validity of the method and the equivalence between all developed models is reported. Advantages of some of the models over the existing ones and their applicability are discussed.

Keywords: cross-magnetizing, models synthesis, synchronous machine, saturated modeling, state-space vectors

Procedia PDF Downloads 448
688 A Review of Gas Hydrate Rock Physics Models

Authors: Hemin Yuan, Yun Wang, Xiangchun Wang

Abstract:

Gas hydrate is drawing attention due to the fact that it has an enormous amount all over the world, which is almost twice the conventional hydrocarbon reserves, making it a potential alternative source of energy. It is widely distributed in permafrost and continental ocean shelves, and many countries have launched national programs for investigating the gas hydrate. Gas hydrate is mainly explored through seismic methods, which include bottom simulating reflectors (BSR), amplitude blanking, and polarity reverse. These seismic methods are effective at finding the gas hydrate formations but usually contain large uncertainties when applying to invert the micro-scale petrophysical properties of the formations due to lack of constraints. Rock physics modeling links the micro-scale structures of the rocks to the macro-scale elastic properties and can work as effective constraints for the seismic methods. A number of rock physics models have been proposed for gas hydrate modeling, which addresses different mechanisms and applications. However, these models are generally not well classified, and it is confusing to determine the appropriate model for a specific study. Moreover, since the modeling usually involves multiple models and steps, it is difficult to determine the source of uncertainties. To solve these problems, we summarize the developed models/methods and make four classifications of the models according to the hydrate micro-scale morphology in sediments, the purpose of reservoir characterization, the stage of gas hydrate generation, and the lithology type of hosting sediments. Some sub-categories may overlap each other, but they have different priorities. Besides, we also analyze the priorities of different models, bring up the shortcomings, and explain the appropriate application scenarios. Moreover, by comparing the models, we summarize a general workflow of the modeling procedure, which includes rock matrix forming, dry rock frame generating, pore fluids mixing, and final fluid substitution in the rock frame. These procedures have been widely used in various gas hydrate modeling and have been confirmed to be effective. We also analyze the potential sources of uncertainties in each modeling step, which enables us to clearly recognize the potential uncertainties in the modeling. In the end, we explicate the general problems of the current models, including the influences of pressure and temperature, pore geometry, hydrate morphology, and rock structure change during gas hydrate dissociation and re-generation. We also point out that attenuation is also severely affected by gas hydrate in sediments and may work as an indicator to map gas hydrate concentration. Our work classifies rock physics models of gas hydrate into different categories, generalizes the modeling workflow, analyzes the modeling uncertainties and potential problems, which can facilitate the rock physics characterization of gas hydrate bearding sediments and provide hints for future studies.

Keywords: gas hydrate, rock physics model, modeling classification, hydrate morphology

Procedia PDF Downloads 150
687 Secure Transfer of Medical Images Using Hybrid Encryption Authentication, Confidentiality, Integrity

Authors: Boukhatem Mohammed Belkaid, Lahdir Mourad

Abstract:

In this paper, we propose a new encryption system for security issues medical images. The hybrid encryption scheme is based on AES and RSA algorithms to validate the three security services are authentication, integrity, and confidentiality. Privacy is ensured by AES, authenticity is ensured by the RSA algorithm. Integrity is assured by the basic function of the correlation between adjacent pixels. Our system generates a unique password every new session of encryption, that will be used to encrypt each frame of the medical image basis to strengthen and ensure his safety. Several metrics have been used for various tests of our analysis. For the integrity test, we noticed the efficiencies of our system and how the imprint cryptographic changes at reception if a change affects the image in the transmission channel.

Keywords: AES, RSA, integrity, confidentiality, authentication, medical images, encryption, decryption, key, correlation

Procedia PDF Downloads 536
686 Investigation of Overstrength of Dual System by Non-Linear Static and Dynamic Analyses

Authors: Nina Øystad-Larsen, Miran Cemalovic, Amir M. Kaynia

Abstract:

The nonlinear static and dynamic analysis procedures presented in EN 1998-1 for the structural response of a RC wall-frame building are assessed. The structure is designed according to the guidelines for high ductility (DCH) in 1998-1. The finite element packages SeismoStruct and OpenSees are utilized and evaluated. The structural response remains nearly in the elastic range even though the building was designed for high ductility. The overstrength is a result of oversized and heavily reinforced members, with emphasis on the lower storey walls. Nonlinear response history analysis in the software packages give virtually identical results for displacements.

Keywords: behaviour factor, dual system, OpenSEES, overstrength, seismostruct

Procedia PDF Downloads 399
685 Vision Based People Tracking System

Authors: Boukerch Haroun, Luo Qing Sheng, Li Hua Shi, Boukraa Sebti

Abstract:

In this paper we present the design and the implementation of a target tracking system where the target is set to be a moving person in a video sequence. The system can be applied easily as a vision system for mobile robot. The system is composed of two major parts the first is the detection of the person in the video frame using the SVM learning machine based on the “HOG” descriptors. The second part is the tracking of a moving person it’s done by using a combination of the Kalman filter and a modified version of the Camshift tracking algorithm by adding the target motion feature to the color feature, the experimental results had shown that the new algorithm had overcame the traditional Camshift algorithm in robustness and in case of occlusion.

Keywords: camshift algorithm, computer vision, Kalman filter, object tracking

Procedia PDF Downloads 441
684 MSG Image Encryption Based on AES and RSA Algorithms "MSG Image Security"

Authors: Boukhatem Mohammed Belkaid, Lahdir Mourad

Abstract:

In this paper, we propose a new encryption system for security issues meteorological images from Meteosat Second Generation (MSG), which generates 12 images every 15 minutes. The hybrid encryption scheme is based on AES and RSA algorithms to validate the three security services are authentication, integrity and confidentiality. Privacy is ensured by AES, authenticity is ensured by the RSA algorithm. Integrity is assured by the basic function of the correlation between adjacent pixels. Our system generates a unique password every 15 minutes that will be used to encrypt each frame of the MSG meteorological basis to strengthen and ensure his safety. Several metrics have been used for various tests of our analysis. For the integrity test, we noticed the efficiencies of our system and how the imprint cryptographic changes at reception if a change affects the image in the transmission channel.

Keywords: AES, RSA, integrity, confidentiality, authentication, satellite MSG, encryption, decryption, key, correlation

Procedia PDF Downloads 378
683 Self-Supervised Attributed Graph Clustering with Dual Contrastive Loss Constraints

Authors: Lijuan Zhou, Mengqi Wu, Changyong Niu

Abstract:

Attributed graph clustering can utilize the graph topology and node attributes to uncover hidden community structures and patterns in complex networks, aiding in the understanding and analysis of complex systems. Utilizing contrastive learning for attributed graph clustering can effectively exploit meaningful implicit relationships between data. However, existing attributed graph clustering methods based on contrastive learning suffer from the following drawbacks: 1) Complex data augmentation increases computational cost, and inappropriate data augmentation may lead to semantic drift. 2) The selection of positive and negative samples neglects the intrinsic cluster structure learned from graph topology and node attributes. Therefore, this paper proposes a method called self-supervised Attributed Graph Clustering with Dual Contrastive Loss constraints (AGC-DCL). Firstly, Siamese Multilayer Perceptron (MLP) encoders are employed to generate two views separately to avoid complex data augmentation. Secondly, the neighborhood contrastive loss is introduced to constrain node representation using local topological structure while effectively embedding attribute information through attribute reconstruction. Additionally, clustering-oriented contrastive loss is applied to fully utilize clustering information in global semantics for discriminative node representations, regarding the cluster centers from two views as negative samples to fully leverage effective clustering information from different views. Comparative clustering results with existing attributed graph clustering algorithms on six datasets demonstrate the superiority of the proposed method.

Keywords: attributed graph clustering, contrastive learning, clustering-oriented, self-supervised learning

Procedia PDF Downloads 43
682 Representation of the Disabled in Turkish Cinema from a Dramatological Frame

Authors: Esra Ince

Abstract:

As an important means of cultural transmission, cinema is an important resource for seeing cultural and social definitions, meanings and descriptions of people with disabilities. This study is aimed to reveal how disabled people are represented in the films selected from Turkish cinema. For this purpose, the films were examined with qualitative content analysis. The Goffmanian perspective was adopted in the study. The relationship between disability and stigma has been tried to be explained. How the disabled, which Goffman defines as a stigmatized group due to their differences, are represented in the cinema has been examined within the dramaturgy model. In the research, it was seen that the disabled characters took place in similar representations in different regions of dramaturgy. It has been seen that the films reinforce the negative discourse and behaviors by reflecting the prejudices, attitudes and behaviors in the society and continue to stigmatize disability.

Keywords: disability, Turkish cinema, Goffman, stigma

Procedia PDF Downloads 69
681 The Use of Simulation Programs of Leakage of Harmful Substances for Crisis Management

Authors: Jiří Barta

Abstract:

The paper deals with simulation programs of spread of harmful substances. Air pollution has a direct impact on the quality of human life and environmental protection is currently a very hot topic. Therefore, the paper focuses on the simulation of release of harmful substances. The first part of article deals with perspectives and possibilities of implementation outputs of simulations programs into the system which is education and of practical training of the management staff during emergency events in the frame of critical infrastructure. The last part shows the practical testing and evaluation of simulation programs. Of the tested simulations software been selected Symos97. The tool offers advanced features for setting leakage. Gradually allows the user to model the terrain, location, and method of escape of harmful substances.

Keywords: Computer Simulation, Symos97, Spread, Simulation Software, Harmful Substances

Procedia PDF Downloads 291
680 Implementation of the Circular Economy Concept in Greenhouse Production Systems: Microalgae and Biostimulant Production Using Soilless Crops’ Drainage Nutrient Solution

Authors: Nikolaos Katsoulas, Sofia Faliagka, George Kountrias, Eleni Dimitriou, Eleftheria Pechlivani

Abstract:

The challenges to feed the world in 2050 are becoming more and more apparent. This calls for producing more with fewer inputs (most of them under scarcity), higher resource efficiency, minimum or zero effect on the environment, and higher sustainability. Therefore, increasing the circularity of production systems is highly significant for their sustainability. Protected horticulture offers opportunities for maximum resource efficiency across various levels within and between farms and at the regional level), high-quality production, and contributes significantly to the nutrition security as part of the world food production. In greenhouses, closed soilless cultivation systems give the opportunity to increase the water and nutrient use efficiency and reduce the environmental impact of the cultivation system by the reuse of the drained water and nutrients. However, due to the low quality of the water used in the Mediterranean countries, a completely closed system is not feasible. Partial discharge of the drainage nutrient solution when the levels of electrical conductivity (EC) or of the toxic ions in the system are reached is still a necessity. Thus, in the frame of the circular economy concept, this work presents the utilisation of the drainage solution of soilless cultivation systems for microalgae and biofertilisers production. The system includes a greenhouse equipped with a soilless cultivation system, a drainage solution collection tank, a closed bioreactor for microalgae production, and a biocatalysis tank. The bioreactor tested in the frame of this work includes two closed tube loops of a capacity of 1000 L each where, after the initial inoculation, the microalgae is developed using as a growth medium the drainage solution collected from the greenhouse crops. The bioreactor includes light and temperature control while pH is still manually regulated. As soon as the microalgae culture reaches a certain density level, 20% of the culture is harvested, and the culture system is refiled by a drainage nutrient solution. The microalgae produced goes through a biocatalysis process, which leads to the production of a rich aminoacids (and nitrogen) biofertiliser. The produced biofertiliser is then used for the fertilisation of greenhouse crops. The complete production cycle along with the effects of the biofertiliser produced on crop growth and yield are presented and discussed in this manuscript. Acknowledgment: This work was carried out under the PestNu project that has received funding from the European Union’s Horizon 2020 research and innovation programme under the Green Deal grant agreement No. 101037128 — PestNu.

Keywords: soilless, water use efficiency, nutrients use efficiency, biostimulant

Procedia PDF Downloads 78
679 Investigation of a Single Feedstock Particle during Pyrolysis in Fluidized Bed Reactors via X-Ray Imaging Technique

Authors: Stefano Iannello, Massimiliano Materazzi

Abstract:

Fluidized bed reactor technologies are one of the most valuable pathways for thermochemical conversions of biogenic fuels due to their good operating flexibility. Nevertheless, there are still issues related to the mixing and separation of heterogeneous phases during operation with highly volatile feedstocks, including biomass and waste. At high temperatures, the volatile content of the feedstock is released in the form of the so-called endogenous bubbles, which generally exert a “lift” effect on the particle itself by dragging it up to the bed surface. Such phenomenon leads to high release of volatile matter into the freeboard and limited mass and heat transfer with particles of the bed inventory. The aim of this work is to get a better understanding of the behaviour of a single reacting particle in a hot fluidized bed reactor during the devolatilization stage. The analysis has been undertaken at different fluidization regimes and temperatures to closely mirror the operating conditions of waste-to-energy processes. Beechwood and polypropylene particles were used to resemble the biomass and plastic fractions present in waste materials, respectively. The non-invasive X-ray technique was coupled to particle tracking algorithms to characterize the motion of a single feedstock particle during the devolatilization with high resolution. A high-energy X-ray beam passes through the vessel where absorption occurs, depending on the distribution and amount of solids and fluids along the beam path. A high-speed video camera is synchronised to the beam and provides frame-by-frame imaging of the flow patterns of fluids and solids within the fluidized bed up to 72 fps (frames per second). A comprehensive mathematical model has been developed in order to validate the experimental results. Beech wood and polypropylene particles have shown a very different dynamic behaviour during the pyrolysis stage. When the feedstock is fed from the bottom, the plastic material tends to spend more time within the bed than the biomass. This behaviour can be attributed to the presence of the endogenous bubbles, which drag effect is more pronounced during the devolatilization of biomass, resulting in a lower residence time of the particle within the bed. At the typical operating temperatures of thermochemical conversions, the synthetic polymer softens and melts, and the bed particles attach on its outer surface, generating a wet plastic-sand agglomerate. Consequently, this additional layer of sand may hinder the rapid evolution of volatiles in the form of endogenous bubbles, and therefore the establishment of a poor drag effect acting on the feedstock itself. Information about the mixing and segregation of solid feedstock is of prime importance for the design and development of more efficient industrial-scale operations.

Keywords: fluidized bed, pyrolysis, waste feedstock, X-ray

Procedia PDF Downloads 166