Search results for: robust ranking technique
7788 Environmental Decision Making Model for Assessing On-Site Performances of Building Subcontractors
Authors: Buket Metin
Abstract:
Buildings cause a variety of loads on the environment due to activities performed at each stage of the building life cycle. Construction is the first stage that affects both the natural and built environments at different steps of the process, which can be defined as transportation of materials within the construction site, formation and preparation of materials on-site and the application of materials to realize the building subsystems. All of these steps require the use of technology, which varies based on the facilities that contractors and subcontractors have. Hence, environmental consequences of the construction process should be tackled by focusing on construction technology options used in every step of the process. This paper presents an environmental decision-making model for assessing on-site performances of subcontractors based on the construction technology options which they can supply. First, construction technologies, which constitute information, tools and methods, are classified. Then, environmental performance criteria are set forth related to resource consumption, ecosystem quality, and human health issues. Finally, the model is developed based on the relationships between the construction technology components and the environmental performance criteria. The Fuzzy Analytical Hierarchy Process (FAHP) method is used for weighting the environmental performance criteria according to environmental priorities of decision-maker(s), while the Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) method is used for ranking on-site environmental performances of subcontractors using quantitative data related to the construction technology components. Thus, the model aims to provide an insight to decision-maker(s) about the environmental consequences of the construction process and to provide an opportunity to improve the overall environmental performance of construction sites.Keywords: construction process, construction technology, decision making, environmental performance, subcontractor
Procedia PDF Downloads 2477787 Numerical Simulation Using Lattice Boltzmann Technique for Mass Transfer Characteristics in Liquid Jet Ejector
Authors: K. S. Agrawal
Abstract:
The performance of jet ejector was studied in detail by different authors. Several authors have studied mass transfer characteristics like interfacial area, mass transfer coefficients etc. In this paper, we have made an attempt to develop PDE model by considering bubble properties and apply Lattice-Boltzmann technique for PDE model. We may present the results for the interfacial area which we have obtained from our numerical simulation. Later the results are compared with previous work.Keywords: jet ejector, mass transfer characteristics, numerical simulation, Lattice-Boltzmann technique
Procedia PDF Downloads 3697786 Cut-Out Animation as an Technic and Development inside History Process
Authors: Armagan Gokcearslan
Abstract:
The art of animation has developed very rapidly from the aspects of script, sound and music, motion, character design, techniques being used and technological tools being developed since the first years until today. Technical variety attracts a particular attention in the art of animation. Being perceived as a kind of illusion in the beginning; animations commonly used the Flash Sketch technique. Animations artists using the Flash Sketch technique created scenes by drawing them on a blackboard with chalk. The Flash Sketch technique was used by primary animation artists like Emile Cohl, Winsor McCay ande Blackton. And then tools like Magical Lantern, Thaumatrope, Phenakisticope, and Zeotrap were developed and started to be used intensely in the first years of the art of animation. Today, on the other hand, the art of animation is affected by developments in the computer technology. It is possible to create three-dimensional and two-dimensional animations with the help of various computer software. Cut-out technique is among the important techniques being used in the art of animation. Cut-out animation technique is based on the art of paper cutting. Examining cut-out animations; it is observed that they technically resemble the art of paper cutting. The art of paper cutting has a rooted history. It is possible to see the oldest samples of paper cutting in the People’s Republic of China in the period after the 2. century B.C. when the Chinese invented paper. The most popular artist using the cut-out animation technique is the German artist Lotte Reiniger. This study titled “Cut-out Animation as a Technic and Development Inside History Process” will embrace the art of paper cutting, the relationship between the art of paper cutting and cut-out animation, its development within the historical process, animation artists producing artworks in this field, important cut-out animations, and their technical properties.Keywords: cut-out, paper art, animation, technic
Procedia PDF Downloads 2757785 Intrusion Detection and Prevention System (IDPS) in Cloud Computing Using Anomaly-Based and Signature-Based Detection Techniques
Authors: John Onyima, Ikechukwu Ezepue
Abstract:
Virtualization and cloud computing are among the fast-growing computing innovations in recent times. Organisations all over the world are moving their computing services towards the cloud this is because of its rapid transformation of the organization’s infrastructure and improvement of efficient resource utilization and cost reduction. However, this technology brings new security threats and challenges about safety, reliability and data confidentiality. Evidently, no single security technique can guarantee security or protection against malicious attacks on a cloud computing network hence an integrated model of intrusion detection and prevention system has been proposed. Anomaly-based and signature-based detection techniques will be integrated to enable the network and its host defend themselves with some level of intelligence. The anomaly-base detection was implemented using the local deviation factor graph-based (LDFGB) algorithm while the signature-based detection was implemented using the snort algorithm. Results from this collaborative intrusion detection and prevention techniques show robust and efficient security architecture for cloud computing networks.Keywords: anomaly-based detection, cloud computing, intrusion detection, intrusion prevention, signature-based detection
Procedia PDF Downloads 3077784 Motion Capture Based Wizard of Oz Technique for Humanoid Robot
Authors: Rafal Stegierski, Krzysztof Dmitruk
Abstract:
The paper focuses on robotic tele-presence system build around humanoid robot operated with controller-less Wizard of Oz technique. Proposed solution gives possibility to quick start acting as a operator with short, if any, initial training.Keywords: robotics, motion capture, Wizard of Oz, humanoid robots, human robot interaction
Procedia PDF Downloads 4817783 Anthropomorphism and Its Impact on the Implementation and Perception of AI
Authors: Marie Oldfield
Abstract:
Anthropomorphism is a technique used by humans to make sense of their surroundings. Anthropomorphism is a widely used technique used to influence consumers to purchase goods or services. These techniques can entice consumers into buying something to fulfill a gap or desire in their life, ranging from loneliness to the desire to be exclusive. By manipulating belief systems, consumer behaviour can be exploited. This paper examines a series of studies to show how anthropomorphism can be used as a basis for exploitation. The first set of studies in this paper examines how anthropomorphism is used in marketing and the effects on humans engaging with this technique. The second set of studies examines how humans can be potentially exploited by artificial agents. We then discuss the consequences of this type of activity within the context of dehumanisation. This research has found potential serious consequences for society and humanity, which indicate an urgent need for further research in this area.Keywords: anthropomorphism, ethics, human-computer interaction, AI
Procedia PDF Downloads 897782 Comparing ITV Definitions From 4D CT-PET and Breath-Hold Technique with Abdominal Compression
Authors: R. D. Esposito, P. Dorado Rodriguez, D. Planes Meseguer
Abstract:
In this work, we compare the contour of Internal Target Volume (ITV), for Stereotactic Body Radiation Therapy (SBRT) of a patient affected by a single liver metastasis, obtained from two different patient data acquisition techniques. The first technique consists in a free breathing Computer Tomography (CT) scan acquisition, followed by exhalation breath-hold and inhalation breath-hold CT scans, all of them applying abdominal compression while the second technique consists in a free breathing 4D CT-PET (Positron Emission Tomography) scan. Results obtained with these two methods are consistent, which demonstrate that at least for this specific case, both techniques are adequate for ITV contouring in SBRT treatments.Keywords: 4D CT-PET, abdominal compression, ITV, SBRT
Procedia PDF Downloads 4437781 The Role of Vibro-Stone Column for Enhancing the Soft Soil Properties
Authors: Mohsen Ramezan Shirazi, Orod Zarrin, Komeil Valipourian
Abstract:
This study investigated the behavior of improved soft soils through the vibro replacement technique by considering their settlements and consolidation rates and the applicability of this technique in various types of soils and settlement and bearing capacity calculations.Keywords: bearing capacity, expansive clay, stone columns, vibro techniques
Procedia PDF Downloads 5857780 The Needs Programme and Poverty Reduction for National Development of Nigeria at 53
Authors: Owulo Thomas
Abstract:
Despite Nigeria’s ranking as the 6th among oil producing countries, the country faces great challenges. One of such challenges is how to reduce poverty or eradicating it in the land that promises milk and honey to enhance national development. The government of Nigeria initiated various programmes including the NEEDS programme in which it committed her to meeting these challenges. This paper is an attempt to discuss the concept of National Development, the Nigerian poverty profile and its implication for national development, the NEEDS programmes and the extent to which it has addressed the poverty problem in Nigeria at 53.Keywords: challenges, poverty, national development, NEEDS programme
Procedia PDF Downloads 3837779 Closing the Gap: Efficient Voxelization with Equidistant Scanlines and Gap Detection
Authors: S. Delgado, C. Cerrada, R. S. Gómez
Abstract:
This research introduces an approach to voxelizing the surfaces of triangular meshes with efficiency and accuracy. Our method leverages parallel equidistant scan-lines and introduces a Gap Detection technique to address the limitations of existing approaches. We present a comprehensive study showcasing the method's effectiveness, scalability, and versatility in different scenarios. Voxelization is a fundamental process in computer graphics and simulations, playing a pivotal role in applications ranging from scientific visualization to virtual reality. Our algorithm focuses on enhancing the voxelization process, especially for complex models and high resolutions. One of the major challenges in voxelization in the Graphics Processing Unit (GPU) is the high cost of discovering the same voxels multiple times. These repeated voxels incur in costly memory operations with no useful information. Our scan-line-based method ensures that each voxel is detected exactly once when processing the triangle, enhancing performance without compromising the quality of the voxelization. The heart of our approach lies in the use of parallel, equidistant scan-lines to traverse the interiors of triangles. This minimizes redundant memory operations and avoids revisiting the same voxels, resulting in a significant performance boost. Moreover, our method's computational efficiency is complemented by its simplicity and portability. Written as a single compute shader in Graphics Library Shader Language (GLSL), it is highly adaptable to various rendering pipelines and hardware configurations. To validate our method, we conducted extensive experiments on a diverse set of models from the Stanford repository. Our results demonstrate not only the algorithm's efficiency, but also its ability to produce 26 tunnel free accurate voxelizations. The Gap Detection technique successfully identifies and addresses gaps, ensuring consistent and visually pleasing voxelized surfaces. Furthermore, we introduce the Slope Consistency Value metric, quantifying the alignment of each triangle with its primary axis. This metric provides insights into the impact of triangle orientation on scan-line based voxelization methods. It also aids in understanding how the Gap Detection technique effectively improves results by targeting specific areas where simple scan-line-based methods might fail. Our research contributes to the field of voxelization by offering a robust and efficient approach that overcomes the limitations of existing methods. The Gap Detection technique fills a critical gap in the voxelization process. By addressing these gaps, our algorithm enhances the visual quality and accuracy of voxelized models, making it valuable for a wide range of applications. In conclusion, "Closing the Gap: Efficient Voxelization with Equidistant Scan-lines and Gap Detection" presents an effective solution to the challenges of voxelization. Our research combines computational efficiency, accuracy, and innovative techniques to elevate the quality of voxelized surfaces. With its adaptable nature and valuable innovations, this technique could have a positive influence on computer graphics and visualization.Keywords: voxelization, GPU acceleration, computer graphics, compute shaders
Procedia PDF Downloads 737778 A Comparative Study of Twin Delayed Deep Deterministic Policy Gradient and Soft Actor-Critic Algorithms for Robot Exploration and Navigation in Unseen Environments
Authors: Romisaa Ali
Abstract:
This paper presents a comparison between twin-delayed Deep Deterministic Policy Gradient (TD3) and Soft Actor-Critic (SAC) reinforcement learning algorithms in the context of training robust navigation policies for Jackal robots. By leveraging an open-source framework and custom motion control environments, the study evaluates the performance, robustness, and transferability of the trained policies across a range of scenarios. The primary focus of the experiments is to assess the training process, the adaptability of the algorithms, and the robot’s ability to navigate in previously unseen environments. Moreover, the paper examines the influence of varying environmental complexities on the learning process and the generalization capabilities of the resulting policies. The results of this study aim to inform and guide the development of more efficient and practical reinforcement learning-based navigation policies for Jackal robots in real-world scenarios.Keywords: Jackal robot environments, reinforcement learning, TD3, SAC, robust navigation, transferability, custom environment
Procedia PDF Downloads 1027777 Design of a Controlled BHJ Solar Cell Using Modified Organic Vapor Spray Deposition Technique
Authors: F. Stephen Joe, V. Sathya Narayanan, V. R. Sanal Kumar
Abstract:
A comprehensive review of the literature on photovoltaic cells has been carried out for exploring the better options for cost efficient technologies for future solar cell applications. Literature review reveals that the Bulk Heterojunction (BHJ) Polymer Solar cells offer special opportunities as renewable energy resources. It is evident from the previous studies that the device fabricated with TiOx layer shows better power conversion efficiency than that of the device without TiOx layer. In this paper, authors designed a controlled BHJ solar cell using a modified organic vapor spray deposition technique facilitated with a vertical-moving gun named as 'Stephen Joe Technique' for getting a desirable surface pattern over the substrate to improving its efficiency over the years for industrial applications. We comprehended that the efficient processing and the interface engineering of these solar cells could increase the efficiency up to 5-10 %.Keywords: BHJ polymer solar cell, photovoltaic cell, solar cell, Stephen Joe technique
Procedia PDF Downloads 5437776 Analytical Design of Fractional-Order PI Controller for Decoupling Control System
Authors: Truong Nguyen Luan Vu, Le Hieu Giang, Le Linh
Abstract:
The FOPI controller is proposed based on the main properties of the decoupling control scheme, as well as the fractional calculus. By using the simplified decoupling technique, the transfer function of decoupled apparent process is firstly separated into a set of n equivalent independent processes in terms of a ratio of the diagonal elements of original open-loop transfer function to those of dynamic relative gain array and the fraction – order PI controller is then developed for each control loops due to the Bode’s ideal transfer function that gives the desired fractional closed-loop response in the frequency domain. The simulation studies were carried out to evaluate the proposed design approach in a fair compared with the other existing methods in accordance with the structured singular value (SSV) theory that used to measure the robust stability of control systems under multiplicative output uncertainty. The simulation results indicate that the proposed method consistently performs well with fast and well-balanced closed-loop time responses.Keywords: ideal transfer function of bode, fractional calculus, fractional order proportional integral (FOPI) controller, decoupling control system
Procedia PDF Downloads 3317775 System Identification and Quantitative Feedback Theory Design of a Lathe Spindle
Authors: M. Khairudin
Abstract:
This paper investigates the system identification and design quantitative feedback theory (QFT) for the robust control of a lathe spindle. The dynamic of the lathe spindle is uncertain and time variation due to the deepness variation on cutting process. System identification was used to obtain the dynamics model of the lathe spindle. In this work, real time system identification is used to construct a linear model of the system from the nonlinear system. These linear models and its uncertainty bound can then be used for controller synthesis. The real time nonlinear system identification process to obtain a set of linear models of the lathe spindle that represents the operating ranges of the dynamic system. With a selected input signal, the data of output and response is acquired and nonlinear system identification is performed using Matlab to obtain a linear model of the system. Practical design steps are presented in which the QFT-based conditions are formulated to obtain a compensator and pre-filter to control the lathe spindle. The performances of the proposed controller are evaluated in terms of velocity responses of the the lathe machine spindle in corporating deepness on cutting process.Keywords: lathe spindle, QFT, robust control, system identification
Procedia PDF Downloads 5437774 Non-Invasive Techniques for Management of Carious Primary Dentition Using Silver Diamine Fluoride and Moringa Extract as a Modification of the Hall Technique
Authors: Rasha F. Sharaf
Abstract:
Treatment of dental caries in young children is considered a great challenge for all dentists, especially with uncooperative children. Recently non-invasive techniques have been highlighted as they alleviate the need for local anesthesia and other painful procedures during management of carious teeth and, at the same time, increase the success rate of the treatment done. Silver Diamine Fluoride (SDF) is one of the most effective cariostatic materials that arrest the progression of carious lesions and aid in remineralizing the demineralized tooth structure. Both fluoride and silver ions proved to have an antibacterial action and aid in the precipitation of an insoluble layer that prevents further decay. At the same time, Moringa proved to have an effective antibacterial action against different types of bacteria, therefore, it can be used as a non-invasive technique for the management of caries in children. One of the important theories for the control of caries is by depriving the cariogenic bacteria from nutrients causing their starvation and death, which can be achieved by applying stainless steel crown on primary molars with carious lesions which are not involving the pulp, and this technique is known as Hall technique. The success rate of the Hall technique can be increased by arresting the carious lesion using either SDF or Moringa and gaining the benefit of their antibacterial action. Multiple clinical cases with 1 year follow up will be presented, comparing different treatment options, and using various materials and techniques for non-invasive and non-painful management of carious primary teeth.Keywords: SDF, hall technique, carious primary teeth, moringa extract
Procedia PDF Downloads 967773 Content Based Video Retrieval System Using Principal Object Analysis
Authors: Van Thinh Bui, Anh Tuan Tran, Quoc Viet Ngo, The Bao Pham
Abstract:
Video retrieval is a searching problem on videos or clips based on content in which they are relatively close to an input image or video. The application of this retrieval consists of selecting video in a folder or recognizing a human in security camera. However, some recent approaches have been in challenging problem due to the diversity of video types, frame transitions and camera positions. Besides, that an appropriate measures is selected for the problem is a question. In order to overcome all obstacles, we propose a content-based video retrieval system in some main steps resulting in a good performance. From a main video, we process extracting keyframes and principal objects using Segmentation of Aggregating Superpixels (SAS) algorithm. After that, Speeded Up Robust Features (SURF) are selected from those principal objects. Then, the model “Bag-of-words” in accompanied by SVM classification are applied to obtain the retrieval result. Our system is performed on over 300 videos in diversity from music, history, movie, sports, and natural scene to TV program show. The performance is evaluated in promising comparison to the other approaches.Keywords: video retrieval, principal objects, keyframe, segmentation of aggregating superpixels, speeded up robust features, bag-of-words, SVM
Procedia PDF Downloads 3017772 Modeling Dynamics and Control of Transversal Vibration of an Underactuated Flexible Plate Using Controlled Lagrangian Method
Authors: Mahmood Khalghollah, Mohammad Tavallaeinejad, Mohammad Eghtesad
Abstract:
The method of Controlled Lagrangian is an energy shaping control technique for under actuated Lagrangian systems. Energy shaping control design methods are appealing as they retain the underlying nonlinear dynamics and can provide stability results that hold over larger domain than can be obtained using linear design and analysis. In the present study, controlled lagrangian is employed for designing a controller in an under actuated rotating flexible plate system. In the system of rotating flexible plate, due to its nonlinear characteristics and coupled dynamics of rigid and flexible components, controller design is a known challenge. In this paper, controller objectives are considered to be vibration reduction of flexible component and position control of the tip of the plate. To achieve the goals, a method based on both kinetic and potential energy shaping is introduced. The stability of the closed-loop system is investigated and proved around its equilibrium points. Moreover, the proposed controller is shown to be robust against disturbance and plant uncertainties.Keywords: controlled lagrangian, underactuated system, flexible rotating plate, disturbance
Procedia PDF Downloads 4467771 Maximum Power Point Tracking Using Fuzzy Logic Control for a Stand-Alone PV System with PI Controller for Battery Charging Based on Evolutionary Technique
Authors: Mohamed A. Moustafa Hassan, Omnia S .S. Hussian, Hany M. Elsaved
Abstract:
This paper introduces the application of Fuzzy Logic Controller (FLC) to extract the Maximum Power Point Tracking (MPPT) from the PV panel. In addition, the proportional integral (PI) controller is used to be the strategy for battery charge control according to acceptable performance criteria. The parameters of the PI controller have been tuned via Modified Adaptive Accelerated Coefficient Particle Swarm Optimization (MAACPSO) technique. The simulation results, using MATLAB/Simulink tools, show that the FLC technique has advantages for use in the MPPT problem, as it provides a fast response under changes in environmental conditions such as radiation and temperature. In addition, the use of PI controller based on MAACPSO results in a good performance in terms of controlling battery charging with constant voltage and current to execute rapid charging.Keywords: battery charging, fuzzy logic control, maximum power point tracking, PV system, PI controller, evolutionary technique
Procedia PDF Downloads 1667770 Effect of Boric Acid Content on the Structural and Optical Properties of In2O3 Films Prepared by Spray Pyrolysis Technique
Authors: Mustafa Öztas, Metin Bedir, Yahya Özdemir
Abstract:
Boron doped of In2O3 films were prepared by spray pyrolysis technique at 350 °C substrate temperature, which is a low cost and large area technique to be well-suited for the manufacture of solar cells, using boric acid (H3BO3) as dopant source, and their properties were investigated as a function of doping concentration. X-ray analysis showed that the films were polycrystalline fitting well with a hexagonal structure and have preferred orientation in (220) direction. The changes observed in the energy band gap and structural properties of the films related to the boric acid concentration are discussed in detail.Keywords: spray pyrolysis, In2O3, boron, optical properties, boric acid
Procedia PDF Downloads 5877769 Pressure-Robust Approximation for the Rotational Fluid Flow Problems
Authors: Medine Demir, Volker John
Abstract:
Fluid equations in a rotating frame of reference have a broad class of important applications in meteorology and oceanography, especially in the large-scale flows considered in ocean and atmosphere, as well as many physical and industrial applications. The Coriolis and the centripetal forces, resulting from the rotation of the earth, play a crucial role in such systems. For such applications it may be required to solve the system in complex three-dimensional geometries. In recent years, the Navier--Stokes equations in a rotating frame have been investigated in a number of papers using the classical inf-sup stable mixed methods, like Taylor-Hood pairs, to contribute to the analysis and the accurate and efficient numerical simulation. Numerical analysis reveals that these classical methods introduce a pressure-dependent contribution in the velocity error bounds that is proportional to some inverse power of the viscosity. Hence, these methods are optimally convergent but small velocity errors might not be achieved for complicated pressures and small viscosity coefficients. Several approaches have been proposed for improving the pressure-robustness of pairs of finite element spaces. In this contribution, a pressure-robust space discretization of the incompressible Navier--Stokes equations in a rotating frame of reference is considered. The discretization employs divergence-free, $H^1$-conforming mixed finite element methods like Scott--Vogelius pairs. However, this approach might come with a modification of the meshes, like the use of barycentric-refined grids in case of Scott--Vogelius pairs. However, this strategy requires the finite element code to have control on the mesh generator which is not realistic in many engineering applications and might also be in conflict with the solver for the linear system. An error estimate for the velocity is derived that tracks the dependency of the error bound on the coefficients of the problem, in particular on the angular velocity. Numerical examples illustrate the theoretical results. The idea of pressure-robust method could be cast on different types of flow problems which would be considered as future studies. As another future research direction, to avoid a modification of the mesh, one may use a very simple parameter-dependent modification of the Scott-Vogelius element, the pressure-wired Stokes element, such that the inf-sup constant is independent of nearly-singular vertices.Keywords: navier-stokes equations in a rotating frame of refence, coriolis force, pressure-robust error estimate, scott-vogelius pairs of finite element spaces
Procedia PDF Downloads 677768 Burnback Analysis of Star Grain Using Level-Set Technique
Authors: Ali Yasin, Ali Kamran, Muhammad Safdar
Abstract:
In order to reduce the hefty cost involved in terms of time and project cost, the development and application of advanced numerical tools to address the burn-back analysis problem in solid rocket motor design and development is the need of time. Several advanced numerical schemes have been developed in recent times, but their usage in the design of propellant grain of solid rocket motors is very rare. In this paper, an advanced numerical technique named the Level-Set method has been utilized for the burn-back analysis of star grain to study the effect of geometrical parameters on ballistic performance indicators such as solid loading, neutrality, and sliver percentage. In the level set technique, simple finite difference methods may fail quickly and require more sophisticated non-oscillatory schemes for feasible long-time simulation. For internal ballistic calculations, a simplified equilibrium pressure method is utilized. Preliminary results of the operative conditions, for all the combustion time, of star grain burn-back using level set techniques are compared with published results using CAD technique to test the developed numerical model.Keywords: solid rocket motor, internal ballistic, level-set technique, star grain
Procedia PDF Downloads 1237767 Detection of Intentional Attacks in Images Based on Watermarking
Authors: Hazem Munawer Al-Otum
Abstract:
In this work, an efficient watermarking technique is proposed and can be used for detecting intentional attacks in RGB color images. The proposed technique can be implemented for image authentication and exhibits high robustness against unintentional common image processing attacks. It deploys two measures to discern between intentional and unintentional attacks based on using a quantization-based technique in a modified 2D multi-pyramidal DWT transform. Simulations have shown high accuracy in detecting intentionally attacked regions while exhibiting high robustness under moderate to severe common image processing attacks.Keywords: image authentication, copyright protection, semi-fragile watermarking, tamper detection
Procedia PDF Downloads 2557766 The Review for Repair of Masonry Structures Using the Crack Stitching Technique
Authors: Sandile Daniel Ngidi
Abstract:
Masonry structures often crack due to different factors, which include differential movement of structures, thermal expansion, and seismic waves. Retrofitting is introduced to ensure that these cracks do not expand to a point of making the wall fail. Crack stitching is one of many repairing methods used to repair cracked masonry walls. It is done by stitching helical stainless steel reinforcement bars to reconnect and stabilize the wall. The basic element of this reinforcing system is the mechanical interlink between the helical stainless-steel bar and the grout, which makes it such a flexible and well-known masonry repair system. The objective of this review was to use previous experimental work done by different authors to check the efficiency and effectiveness of using the crack stitching technique to repair and stabilize masonry walls. The technique was found to be effective to rejuvenate the strength of a masonry structure to be stronger than initial strength. Different factors were investigated, which include economic features, sustainability, buildability, and suitability of this technique for application in developing communities.Keywords: brickforce, crack-stitching, masonry concrete, reinforcement, wall panels
Procedia PDF Downloads 1777765 Wrapping–Decorative Movement of Time
Authors: Rudranil Das
Abstract:
Wrapping is a basic textile technique; it is having a great quality of decorative view. Since long back it has been embellishing life of people and their culture in different forms. It links cultures, beliefs, thoughts, technology, and above all, people. Through etymology we can study the movement of the word power of wrapping undoubtedly but in depth analyze it could provide many concepts of structural ability. Only in India, more than 105 different processes exist in the way of saree [a type of women attire] wrapping. Then many more other clothing we found in allover world which connects this technique and construction too. One of the main objectives of this study is to enrich wrapping explanation and come up with surfaces by this technique. The deliberate more fragile and stretchable structural framework makes it more appropriate in different users according to their necessity. Developments of design and technology could create new industry segment and generate a marginalized employment for the people too.Keywords: concept, existence, philosophical attachment, technological advancement
Procedia PDF Downloads 2317764 Accuracy Improvement of Traffic Participant Classification Using Millimeter-Wave Radar by Leveraging Simulator Based on Domain Adaptation
Authors: Tokihiko Akita, Seiichi Mita
Abstract:
A millimeter-wave radar is the most robust against adverse environments, making it an essential environment recognition sensor for automated driving. However, the reflection signal is sparse and unstable, so it is difficult to obtain the high recognition accuracy. Deep learning provides high accuracy even for them in recognition, but requires large scale datasets with ground truth. Specially, it takes a lot of cost to annotate for a millimeter-wave radar. For the solution, utilizing a simulator that can generate an annotated huge dataset is effective. Simulation of the radar is more difficult to match with real world data than camera image, and recognition by deep learning with higher-order features using the simulator causes further deviation. We have challenged to improve the accuracy of traffic participant classification by fusing simulator and real-world data with domain adaptation technique. Experimental results with the domain adaptation network created by us show that classification accuracy can be improved even with a few real-world data.Keywords: millimeter-wave radar, object classification, deep learning, simulation, domain adaptation
Procedia PDF Downloads 937763 High Secure Data Hiding Using Cropping Image and Least Significant Bit Steganography
Authors: Khalid A. Al-Afandy, El-Sayyed El-Rabaie, Osama Salah, Ahmed El-Mhalaway
Abstract:
This paper presents a high secure data hiding technique using image cropping and Least Significant Bit (LSB) steganography. The predefined certain secret coordinate crops will be extracted from the cover image. The secret text message will be divided into sections. These sections quantity is equal the image crops quantity. Each section from the secret text message will embed into an image crop with a secret sequence using LSB technique. The embedding is done using the cover image color channels. Stego image is given by reassembling the image and the stego crops. The results of the technique will be compared to the other state of art techniques. Evaluation is based on visualization to detect any degradation of stego image, the difficulty of extracting the embedded data by any unauthorized viewer, Peak Signal-to-Noise Ratio of stego image (PSNR), and the embedding algorithm CPU time. Experimental results ensure that the proposed technique is more secure compared with the other traditional techniques.Keywords: steganography, stego, LSB, crop
Procedia PDF Downloads 2697762 Energy Management System
Authors: S. Periyadharshini, K. Ramkumar, S. Jayalalitha, M. GuruPrasath, R. Manikandan
Abstract:
This paper presents a formulation and solution for industrial load management and product grade problem. The formulation is created using linear programming technique thereby optimizing the electricity cost by scheduling the loads satisfying the process, storage, time zone and production constraints which will create an impact of reducing maximum demand and thereby reducing the electricity cost. Product grade problem is formulated using integer linear programming technique of optimization using lingo software and the results show that overall increase in profit margin. In this paper, time of use tariff is utilized and this technique will provide significant reductions in peak electricity consumption.Keywords: cement industries, integer programming, optimal formulation, objective function, constraints
Procedia PDF Downloads 5937761 Case-Based Reasoning for Build Order in Real-Time Strategy Games
Authors: Ben G. Weber, Michael Mateas
Abstract:
We present a case-based reasoning technique for selecting build orders in a real-time strategy game. The case retrieval process generalizes features of the game state and selects cases using domain-specific recall methods, which perform exact matching on a subset of the case features. We demonstrate the performance of the technique by implementing it as a component of the integrated agent framework of McCoy and Mateas. Our results demonstrate that the technique outperforms nearest-neighbor retrieval when imperfect information is enforced in a real-time strategy game.Keywords: case based reasoning, real time strategy systems, requirements elicitation, requirement analyst, artificial intelligence
Procedia PDF Downloads 4417760 Medical Knowledge Management since the Integration of Heterogeneous Data until the Knowledge Exploitation in a Decision-Making System
Authors: Nadjat Zerf Boudjettou, Fahima Nader, Rachid Chalal
Abstract:
Knowledge management is to acquire and represent knowledge relevant to a domain, a task or a specific organization in order to facilitate access, reuse and evolution. This usually means building, maintaining and evolving an explicit representation of knowledge. The next step is to provide access to that knowledge, that is to say, the spread in order to enable effective use. Knowledge management in the medical field aims to improve the performance of the medical organization by allowing individuals in the care facility (doctors, nurses, paramedics, etc.) to capture, share and apply collective knowledge in order to make optimal decisions in real time. In this paper, we propose a knowledge management approach based on integration technique of heterogeneous data in the medical field by creating a data warehouse, a technique of extracting knowledge from medical data by choosing a technique of data mining, and finally an exploitation technique of that knowledge in a case-based reasoning system.Keywords: data warehouse, data mining, knowledge discovery in database, KDD, medical knowledge management, Bayesian networks
Procedia PDF Downloads 3957759 Study of Stability of a Slope by the Soil Nailed Technique
Authors: Abdelhak Soudani
Abstract:
Using the limit equilibrium method in geotechnical field is very important for large projects. This work contributes to the understanding and analysis of the building unstable slopes by the technique of soil nailed with the used of software called GEO-SLOPE calculation based on limit equilibrium method. To achieve our objective, we began a review of the literature on landslides, and techniques of slope stability. Then, we presented a real case slope likely to slip through the realization of the EastWest Highway (M5 stretch between Khemis Miliana and Hoceinia). We also process the application of reinforcement technique nailed soil. The analysis is followed by a parametric study, which shows the impact of parameters given or chosen on various outcomes. Another method of reinforcement (use of micro-piles) has been suggested for improving the stability of the slopeKeywords: slope stability, strengthening, slip, soil nail, GEO-SLOPE
Procedia PDF Downloads 466