Search results for: mobile ad hoc network
1961 Developed CNN Model with Various Input Scale Data Evaluation for Bearing Faults Prognostics
Authors: Anas H. Aljemely, Jianping Xuan
Abstract:
Rolling bearing fault diagnosis plays a pivotal issue in the rotating machinery of modern manufacturing. In this research, a raw vibration signal and improved deep learning method for bearing fault diagnosis are proposed. The multi-dimensional scales of raw vibration signals are selected for evaluation condition monitoring system, and the deep learning process has shown its effectiveness in fault diagnosis. In the proposed method, employing an Exponential linear unit (ELU) layer in a convolutional neural network (CNN) that conducts the identical function on positive data, an exponential nonlinearity on negative inputs, and a particular convolutional operation to extract valuable features. The identification results show the improved method has achieved the highest accuracy with a 100-dimensional scale and increase the training and testing speed.Keywords: bearing fault prognostics, developed CNN model, multiple-scale evaluation, deep learning features
Procedia PDF Downloads 2131960 Neural Networks and Genetic Algorithms Approach for Word Correction and Prediction
Authors: Rodrigo S. Fonseca, Antônio C. P. Veiga
Abstract:
Aiming at helping people with some movement limitation that makes typing and communication difficult, there is a need to customize an assistive tool with a learning environment that helps the user in order to optimize text input, identifying the error and providing the correction and possibilities of choice in the Portuguese language. The work presents an Orthographic and Grammatical System that can be incorporated into writing environments, improving and facilitating the use of an alphanumeric keyboard, using a prototype built using a genetic algorithm in addition to carrying out the prediction, which can occur based on the quantity and position of the inserted letters and even placement in the sentence, ensuring the sequence of ideas using a Long Short Term Memory (LSTM) neural network. The prototype optimizes data entry, being a component of assistive technology for the textual formulation, detecting errors, seeking solutions and informing the user of accurate predictions quickly and effectively through machine learning.Keywords: genetic algorithm, neural networks, word prediction, machine learning
Procedia PDF Downloads 1961959 Application of Artificial Neural Network for Prediction of High Tensile Steel Strands in Post-Tensioned Slabs
Authors: Gaurav Sancheti
Abstract:
This study presents an impacting approach of Artificial Neural Networks (ANNs) in determining the quantity of High Tensile Steel (HTS) strands required in post-tensioned (PT) slabs. Various PT slab configurations were generated by varying the span and depth of the slab. For each of these slab configurations, quantity of required HTS strands were recorded. ANNs with backpropagation algorithm and varying architectures were developed and their performance was evaluated in terms of Mean Square Error (MSE). The recorded data for the quantity of HTS strands was used as a feeder database for training the developed ANNs. The networks were validated using various validation techniques. The results show that the proposed ANNs have a great potential with good prediction and generalization capability.Keywords: artificial neural networks, back propagation, conceptual design, high tensile steel strands, post tensioned slabs, validation techniques
Procedia PDF Downloads 2251958 Towards an Enhanced Compartmental Model for Profiling Malware Dynamics
Authors: Jessemyn Modiini, Timothy Lynar, Elena Sitnikova
Abstract:
We present a novel enhanced compartmental model for malware spread analysis in cyber security. This paper applies cyber security data features to epidemiological compartmental models to model the infectious potential of malware. Compartmental models are most efficient for calculating the infectious potential of a disease. In this paper, we discuss and profile epidemiologically relevant data features from a Domain Name System (DNS) dataset. We then apply these features to epidemiological compartmental models to network traffic features. This paper demonstrates how epidemiological principles can be applied to the novel analysis of key cybersecurity behaviours and trends and provides insight into threat modelling above that of kill-chain analysis. In applying deterministic compartmental models to a cyber security use case, the authors analyse the deficiencies and provide an enhanced stochastic model for cyber epidemiology. This enhanced compartmental model (SUEICRN model) is contrasted with the traditional SEIR model to demonstrate its efficacy.Keywords: cybersecurity, epidemiology, cyber epidemiology, malware
Procedia PDF Downloads 1111957 Low-Cost IoT System for Monitoring Ground Propagation Waves due to Construction and Traffic Activities to Nearby Construction
Authors: Lan Nguyen, Kien Le Tan, Bao Nguyen Pham Gia
Abstract:
Due to the high cost, specialized dynamic measurement devices for industrial lands are difficult for many colleges to equip for hands-on teaching. This study connects a dynamic measurement sensor and receiver utilizing an inexpensive Raspberry Pi 4 board, some 24-bit ADC circuits, a geophone vibration sensor, and embedded Python open-source programming. Gather and analyze signals for dynamic measuring, ground vibration monitoring, and structure vibration monitoring. The system may wirelessly communicate data to the computer and is set up as a communication node network, enabling real-time monitoring of background vibrations at various locations. The device can be utilized for a variety of dynamic measurement and monitoring tasks, including monitoring earthquake vibrations, ground vibrations from construction operations, traffic, and vibrations of building structures.Keywords: sensors, FFT, signal processing, real-time data monitoring, ground propagation wave, python, raspberry Pi 4
Procedia PDF Downloads 1051956 Exploring Smartphone Applications for Enhancing Second Language Vocabulary Learning
Authors: Abdulmajeed Almansour
Abstract:
Learning a foreign language with the assistant of technological tools has become an interest of learners and educators. Increased use of smartphones among undergraduate students has made them popular for not only social communication but also for entertainment and educational purposes. Smartphones have provided remarkable advantages in language learning process. Learning vocabulary is an important part of learning a language. The use of smartphone applications for English vocabulary learning provides an opportunity for learners to improve vocabulary knowledge beyond the classroom wall anytime anywhere. Recently, various smartphone applications were created specifically for vocabulary learning. This paper aims to explore the use of smartphone application Memrise designed for vocabulary learning to enhance academic vocabulary among undergraduate students. It examines whether the use of a Memrise smartphone application designed course enhances the academic vocabulary learning among ESL learners. The research paradigm used in this paper followed a mixed research model combining quantitative and qualitative research. The study included two hundred undergraduate students randomly assigned to the experimental and controlled group during the first academic year at the Faculty of English Language, Imam University. The research instruments included an attitudinal questionnaire and an English vocabulary pre-test administered to students at the beginning of the semester whereas post-test and semi-structured interviews administered at the end of the semester. The findings of the attitudinal questionnaire revealed a positive attitude towards using smartphones in learning vocabulary. The post-test scores showed a significant difference in the experimental group performance. The results from the semi-structure interviews showed that there were positive attitudes towards Memrise smartphone application. The students found the application enjoyable, convenient and efficient learning tool. From the study, the use of the Memrise application is seen to have long-term and motivational benefits to students. For this reason, there is a need for further research to identify the long-term optimal effects of learning a language using smartphone applications.Keywords: second language vocabulary learning, academic vocabulary, mobile learning technologies, smartphone applications
Procedia PDF Downloads 1621955 Mexico's Steam Connections Across the Pacific (1867-1910)
Authors: Ruth Mandujano Lopez
Abstract:
During the second half of the 19th century, in the transition from sail to steam navigation, the transpacific space underwent major transformation. This paper examines the role that the steamship companies between Mexico, the rest of North America and Asia played in that process. Based on primary sources found in Mexico, California, London and Hong Kong, it argues that these companies actively participated in the redefining of the Pacific space as they opened new routes, transported thousands of people and had an impact on regional geopolitics. In order to prove this, the text will present the cases of a handful of companies that emerged between 1867 and 1910 and of some of their passengers. By looking at the way the Mexican ports incorporated to the transpacific steam maritime network, this work contributes to have a better understanding of the role that Latin American ports have played in the formation of a global order. From a theoretical point of view, it proposes the conceptualization of space in the form of transnational networks as a point of departure to conceive a history that is truly global.Keywords: mexico, steamships, transpacific, maritime companies
Procedia PDF Downloads 531954 Predicting Global Solar Radiation Using Recurrent Neural Networks and Climatological Parameters
Authors: Rami El-Hajj Mohamad, Mahmoud Skafi, Ali Massoud Haidar
Abstract:
Several meteorological parameters were used for the prediction of monthly average daily global solar radiation on horizontal using recurrent neural networks (RNNs). Climatological data and measures, mainly air temperature, humidity, sunshine duration, and wind speed between 1995 and 2007 were used to design and validate a feed forward and recurrent neural network based prediction systems. In this paper we present our reference system based on a feed-forward multilayer perceptron (MLP) as well as the proposed approach based on an RNN model. The obtained results were promising and comparable to those obtained by other existing empirical and neural models. The experimental results showed the advantage of RNNs over simple MLPs when we deal with time series solar radiation predictions based on daily climatological data.Keywords: recurrent neural networks, global solar radiation, multi-layer perceptron, gradient, root mean square error
Procedia PDF Downloads 4481953 A Query Optimization Strategy for Autonomous Distributed Database Systems
Authors: Dina K. Badawy, Dina M. Ibrahim, Alsayed A. Sallam
Abstract:
Distributed database is a collection of logically related databases that cooperate in a transparent manner. Query processing uses a communication network for transmitting data between sites. It refers to one of the challenges in the database world. The development of sophisticated query optimization technology is the reason for the commercial success of database systems, which complexity and cost increase with increasing number of relations in the query. Mariposa, query trading and query trading with processing task-trading strategies developed for autonomous distributed database systems, but they cause high optimization cost because of involvement of all nodes in generating an optimal plan. In this paper, we proposed a modification on the autonomous strategy K-QTPT that make the seller’s nodes with the lowest cost have gradually high priorities to reduce the optimization time. We implement our proposed strategy and present the results and analysis based on those results.Keywords: autonomous strategies, distributed database systems, high priority, query optimization
Procedia PDF Downloads 5261952 Mourning Motivations for Celebrities in Instagram: A Case Study of Mohammadreza Shajarian's Death
Authors: Zahra Afshordi
Abstract:
Instagram, as an everyday life social network, hosts from the ultrasound image of an unborn fetus to the pictures of newly placed gravestones and funerals. It is a platform that allows its users to create a second identity independently from and at the same time in relation to the real space identity. The motives behind this identification are what this article is about. This article studies the motivations of Instagram users mourning for celebrities with a focus on the death of MohammadReza Shajarian. The Shajarian’s death had a wide reflection on Instagram Persian-speaking users. The purpose of this qualitative survey is to comprehend and study the user’s motivations in posting mourning and memorializing content. The methodology of the essay is a hybrid methodology consisting of content analysis and open-ended interviews. The results highlight that users' motives are more than just simple sympathy and include political protest, gaining cultural capital, reaching social status, and escaping from solitude.Keywords: case study, celebrity, identity, Instagram, mourning, qualitative survey
Procedia PDF Downloads 1601951 Uncertainty Estimation in Neural Networks through Transfer Learning
Authors: Ashish James, Anusha James
Abstract:
The impressive predictive performance of deep learning techniques on a wide range of tasks has led to its widespread use. Estimating the confidence of these predictions is paramount for improving the safety and reliability of such systems. However, the uncertainty estimates provided by neural networks (NNs) tend to be overconfident and unreasonable. Ensemble of NNs typically produce good predictions but uncertainty estimates tend to be inconsistent. Inspired by these, this paper presents a framework that can quantitatively estimate the uncertainties by leveraging the advances in transfer learning through slight modification to the existing training pipelines. This promising algorithm is developed with an intention of deployment in real world problems which already boast a good predictive performance by reusing those pretrained models. The idea is to capture the behavior of the trained NNs for the base task by augmenting it with the uncertainty estimates from a supplementary network. A series of experiments with known and unknown distributions show that the proposed approach produces well calibrated uncertainty estimates with high quality predictions.Keywords: uncertainty estimation, neural networks, transfer learning, regression
Procedia PDF Downloads 1391950 Quantifying Stability of Online Communities and Its Impact on Disinformation
Authors: Victor Chomel, Maziyar Panahi, David Chavalarias
Abstract:
Misinformation has taken an increasingly worrying place in social media. Propagation patterns are closely linked to the structure of communities. This study proposes a method of community analysis based on a combination of centrality indicators for the network and its main communities. The objective is to establish a link between the stability of the communities over time, the social ascension of its members internally, and the propagation of information in the community. To this end, data from the debates about global warming and political communities on Twitter have been collected, and several tens of millions of tweets and retweets have helped us better understand the structure of these communities. The quantification of this stability allows for the study of the propagation of information of any kind, including disinformation. Our results indicate that the most stable communities over time are the ones that enable the establishment of nodes capturing a large part of the information and broadcasting its opinions. Conversely, communities with a high turnover and social ascendancy only stabilize themselves strongly in the face of adversity and external events but seem to offer a greater diversity of opinions most of the time.Keywords: community analysis, disinformation, misinformation, Twitter
Procedia PDF Downloads 1431949 Optimal Load Control Strategy in the Presence of Stochastically Dependent Renewable Energy Sources
Authors: Mahmoud M. Othman, Almoataz Y. Abdelaziz, Yasser G. Hegazy
Abstract:
This paper presents a load control strategy based on modification of the Big Bang Big Crunch optimization method. The proposed strategy aims to determine the optimal load to be controlled and the corresponding time of control in order to minimize the energy purchased from substation. The presented strategy helps the distribution network operator to rely on the renewable energy sources in supplying the system demand. The renewable energy sources used in the presented study are modeled using the diagonal band Copula method and sequential Monte Carlo method in order to accurately consider the multivariate stochastic dependence between wind power, photovoltaic power and the system demand. The proposed algorithms are implemented in MATLAB environment and tested on the IEEE 37-node feeder. Several case studies are done and the subsequent discussions show the effectiveness of the proposed algorithm.Keywords: big bang big crunch, distributed generation, load control, optimization, planning
Procedia PDF Downloads 3491948 Accounting Management Information System for Convenient Shop in Bangkok Thailand
Authors: Anocha Rojanapanich
Abstract:
The purpose of this research is to develop and design an accounting management information system for convenient shop in Bangkok Thailand. The study applied the System Development Life Cycle (SDLC) for development which began with study and analysis of current data, including the existing system. Then, the system was designed and developed to meet users’ requirements via the internet network by use of application software such as My SQL for database management, Product diversity, Apache HTTP Server for Web Server and PHP Hypertext Preprocessor for an interface between web server, database and users. The system was designed into two subsystems as the main system, or system for head office, and the branch system for branch shops. These consisted of three parts which are classified by user management as shop management, inventory management and Point of Sale (POS) management and importance of cost information for decision making also as well as.Keywords: accounting management information system, convenient shop, cost information for decision making system, development life cycle
Procedia PDF Downloads 4221947 Use of Information and Communication Technologies in Enhancing Health Care Delivery for Human Immunodeficiency Virus Patients in Bamenda Health District
Authors: Abanda Wilfred Chick
Abstract:
Background: According to World Health Organization (WHO), the role of Information and Communication Technologies (ICT) in health sectors of developing nations has been demonstrated to have had a great improvement of fifty percent reduction in mortality and or twenty-five-fifty percent increase in productivity. The objective of this study was to assess the use of information and communication technologies in enhancing health care delivery for Human Immunodeficiency Virus (HIV) patients in Bamenda Health District. Methods: This was a descriptive-analytical cross-sectional study in which 388 participants were consecutively selected amongst health personnel and HIV patients from public and private health institutions involved in Human Immunodeficiency Virus management. Data on socio-demographic variables, the use of information and communication technologies tools, and associated challenges were collected using structured questionnaires. Descriptive statistics with a ninety-five percent confidence interval were used to summarize findings, while Cramer’s V test, logistic regression, and Chi-square test were used to measure the association between variables, Epi info version7.2, MS Excel, and SPSS version 25.0 were utilized for data entry and statistical analysis respectively. Results: Of the participants, one-quarter were health personnel, and three-quarters were HIV patients. For both groups of participants, there was a significant relationship between the use of ICT and demographic information such as level of education, marital status, and age (p<0.05). For the impediments to using ICT tools, a greater proportion identified the high cost of airtime or internet bundles, followed by an average proportion that indicated inadequate training on ICT tools; for health personnel, the majority said inadequate training on ICT tools/applications and half said unavailability of electricity. Conclusion: Not up to half of the HIV patients effectively make use of ICT tools/applications to receive health care. Of health personnel, three quarters use ICTs, and only one quarter effectively use mobile phones and one-third of computers, respectively, to render care to HIV patients.Keywords: ICT tools, HIV patients, health personnel, health care delivery
Procedia PDF Downloads 861946 Degradation Model for UK Railway Drainage System
Authors: Yiqi Wu, Simon Tait, Andrew Nichols
Abstract:
Management of UK railway drainage assets is challenging due to the large amounts of historical assets with long asset life cycles. A major concern for asset managers is to maintain the required performance economically and efficiently while complying with the relevant regulation and legislation. As the majority of the drainage assets are buried underground and are often difficult or costly to examine, it is important for asset managers to understand and model the degradation process in order to foresee the upcoming reduction in asset performance and conduct proactive maintenance accordingly. In this research, a Markov chain approach is used to model the deterioration process of rail drainage assets. The study is based on historical condition scores and characteristics of drainage assets across the whole railway network in England, Scotland, and Wales. The model is used to examine the effect of various characteristics on the probabilities of degradation, for example, the regional difference in probabilities of degradation, and how material and shape can influence the deterioration process for chambers, channels, and pipes.Keywords: deterioration, degradation, markov models, probability, railway drainage
Procedia PDF Downloads 2281945 Assessing Livelihood Vulnerability to Climate Change and Adaptation Strategies in Rajanpur District, Pakistan
Authors: Muhammad Afzal, Shahbaz Mushtaq, Duc-Anh-An-Vo, Kathryn Reardon Smith, Thanh Ma
Abstract:
Climate change has become one of the most challenging environmental issues in the 21st century. Climate change-induced natural disasters, especially floods, are the major factors of livelihood vulnerability, impacting millions of individuals worldwide. Evaluating and mitigating the effects of floods requires an in-depth understanding of the relationship between vulnerability and livelihood capital assets. Using an integrated approach, sustainable livelihood framework, and system thinking approach, the study developed a conceptual model of a generalized livelihood system in District Rajanpur, Pakistan. The model visualizes the livelihood vulnerability system as a whole and identifies the key feedback loops likely to influence the livelihood vulnerability. The study suggests that such conceptual models provide effective communication and understanding tools to stakeholders and decision-makers to anticipate the problem and design appropriate policies. It can also serve as an evaluation technique for rural livelihood policy and identify key systematic interventions. The key finding of the study reveals that household income, health, and education are the major factors behind the livelihood vulnerability of the rural poor of District Rajanpur. The Pakistani government tried to reduce the livelihood vulnerability of the region through different income, health, and education programs, but still, many changes are required to make these programs more effective especially during the flood times. The government provided only cash to vulnerable and marginalized families through income support programs, but this study suggests that along with the cash, the government must provide seed storage facilities and access to crop insurance to the farmers. Similarly, the government should establish basic health units in villages and frequent visits of medical mobile vans should be arranged with advanced medical lab facilities during and after the flood.Keywords: livelihood vulnerability, rural communities, flood, sustainable livelihood framework, system dynamics, Pakistan
Procedia PDF Downloads 521944 A Comprehensive Study of Camouflaged Object Detection Using Deep Learning
Authors: Khalak Bin Khair, Saqib Jahir, Mohammed Ibrahim, Fahad Bin, Debajyoti Karmaker
Abstract:
Object detection is a computer technology that deals with searching through digital images and videos for occurrences of semantic elements of a particular class. It is associated with image processing and computer vision. On top of object detection, we detect camouflage objects within an image using Deep Learning techniques. Deep learning may be a subset of machine learning that's essentially a three-layer neural network Over 6500 images that possess camouflage properties are gathered from various internet sources and divided into 4 categories to compare the result. Those images are labeled and then trained and tested using vgg16 architecture on the jupyter notebook using the TensorFlow platform. The architecture is further customized using Transfer Learning. Methods for transferring information from one or more of these source tasks to increase learning in a related target task are created through transfer learning. The purpose of this transfer of learning methodologies is to aid in the evolution of machine learning to the point where it is as efficient as human learning.Keywords: deep learning, transfer learning, TensorFlow, camouflage, object detection, architecture, accuracy, model, VGG16
Procedia PDF Downloads 1561943 The Behavior of Dam Foundation Reinforced by Stone Columns: Case Study of Kissir Dam-Jijel
Authors: Toufik Karech, Abderahmen Benseghir, Tayeb Bouzid
Abstract:
This work presents a 2D numerical simulation of an earth dam to assess the behavior of its foundation after a treatment by stone columns. This treatment aims to improve the bearing capacity, to increase the mechanical properties of the soil, to accelerate the consolidation, to reduce the settlements and to eliminate the liquefaction phenomenon in case of seismic excitation. For the evaluation of the pore pressures, the position of the phreatic line and the flow network was defined, and a seepage analysis was performed with the software MIDAS Soil Works. The consolidation calculation is performed through a simulation of the actual construction stages of the dam. These analyzes were performed using the Mohr-Coulomb soil model and the results are compared with the actual measurements of settlement gauges implanted in the dam. An analysis of the bearing capacity was conducted to show the role of stone columns in improving the bearing capacity of the foundation.Keywords: earth dam, dam foundation, numerical simulation, stone columns, seepage analysis, consolidation, bearing capacity
Procedia PDF Downloads 1921942 Progress in Replacing Antibiotics in Farm Animal Production
Authors: Debabrata Biswas
Abstract:
The current trend in the development of antibiotic resistance by multiple bacterial pathogens has resulted in a troubling loss of effective antibiotic options for human. The emergence of multi-drug-resistant pathogens has necessitated higher dosages and combinations of multiple antibiotics, further exacerbating the problem of antibiotic resistance. Zoonotic bacterial pathogens, such as Salmonella, Campylobacter, Shiga toxin-producing Escherichia coli (such as enterohaemorrhagic E. coli or EHEC), and Listeria are the most common and predominant foodborne enteric infectious agents. It was observed that these pathogens gained/developed their ability to survive in the presence of antibiotics either in farm animal gut or farm environment and researchers believe that therapeutic and sub-therapeutic antibiotic use in farm animal production might play an important role in it. The mechanism of action of antimicrobial components used in farm animal production in genomic interplay in the gut and farm environment, has not been fully characterized. Even the risk of promoting the exchange of mobile genetic elements between microbes specifically pathogens needs to be evaluated in depth, to ensure sustainable farm animal production, safety of our food and to mitigate/limit the enteric infection with multiple antibiotic resistant bacterial pathogens. Due to the consumer’s demand and considering the current emerging situation, many countries are in process to withdraw antibiotic use in farm animal production. Before withdrawing use of the sub-therapeutic antibiotic or restricting the use of therapeutic antibiotics in farm animal production, it is essential to find alternative natural antimicrobials for promoting the growth of farm animal and/or treating animal diseases. Further, it is also necessary to consider whether that compound(s) has the potential to trigger the acquisition or loss of genetic materials in zoonotic and any other bacterial pathogens. Development of alternative therapeutic and sub-therapeutic antimicrobials for farm animal production and food processing and preservation and their effective implementation for sustainable strategies for farm animal production as well as the possible risk for horizontal gene transfer in major enteric pathogens will be focus in the study.Keywords: food safety, natural antimicrobial, sustainable farming, antibiotic resistance
Procedia PDF Downloads 2741941 A New Block Cipher for Resource-Constrained Internet of Things Devices
Authors: Muhammad Rana, Quazi Mamun, Rafiqul Islam
Abstract:
In the Internet of Things (IoT), many devices are connected and accumulate a sheer amount of data. These Internet-driven raw data need to be transferred securely to the end-users via dependable networks. Consequently, the challenges of IoT security in various IoT domains are paramount. Cryptography is being applied to secure the networks for authentication, confidentiality, data integrity and access control. However, due to the resource constraint properties of IoT devices, the conventional cipher may not be suitable in all IoT networks. This paper designs a robust and effective lightweight cipher to secure the IoT environment and meet the resource-constrained nature of IoT devices. We also propose a symmetric and block-cipher based lightweight cryptographic algorithm. The proposed algorithm increases the complexity of the block cipher, maintaining the lowest computational requirements possible. The proposed algorithm efficiently constructs the key register updating technique, reduces the number of encryption rounds, and adds a new layer between the encryption and decryption processes.Keywords: internet of things, cryptography block cipher, S-box, key management, security, network
Procedia PDF Downloads 1151940 Optimal Reactive Power Dispatch under Various Contingency Conditions Using Whale Optimization Algorithm
Authors: Khaled Ben Oualid Medani, Samir Sayah
Abstract:
The Optimal Reactive Power Dispatch (ORPD) problem has been solved and analysed usually in the normal conditions. However, network collapses appear in contingency conditions. In this paper, ORPD under several contingencies is presented using the proposed method WOA. To ensure viability of the power system in contingency conditions, several critical cases are simulated in order to prevent and prepare the power system to face such situations. The results obtained are carried out in IEEE 30 bus test system for the solution of ORPD problem in which control of bus voltages, tap position of transformers and reactive power sources are involved. Moreover, another method, namely, Particle Swarm Optimization with Time Varying Acceleration Coefficient (PSO-TVAC) has been compared with the proposed technique. Simulation results indicate that the proposed WOA gives remarkable solution in terms of effectiveness in case of outages.Keywords: optimal reactive power dispatch, power system analysis, real power loss minimization, contingency condition, metaheuristic technique, whale optimization algorithm
Procedia PDF Downloads 1261939 Study of the Adsorptives Properties of Zeolites X Exchanged by the Cations Cu2 + and/or Zn2+
Authors: H. Hammoudi, S. Bendenia, I. Batonneau-Gener, A. Khelifa
Abstract:
Applying growing zeolites is due to their intrinsic physicochemical properties: a porous structure, regular, generating a large free volume, a high specific surface area, acidic properties of interest to the origin of their activity, selectivity energy and dimensional, leading to a screening phenomenon, hence the name of molecular sieves is generally attributed to them. Most of the special properties of zeolites have been valued as direct applications such as ion exchange, adsorption, separation and catalysis. Due to their crystalline structure stable, their large pore volume and their high content of cation X zeolites are widely used in the process of adsorption and separation. The acidic properties of zeolites X and interesting selectivity conferred on them their porous structure is also have potential catalysts. The study presented in this manuscript is devoted to the chemical modification of an X zeolite by cation exchange. Ion exchange of zeolite NaX by Zn 2 + cations and / or Cu 2 + is gradually conducted by following the evolution of some of its characteristics: crystallinity by XRD, micropore volume by nitrogen adsorption. Once characterized, the different samples will be used for the adsorption of propane and propylene. Particular attention is paid thereafter, on the modeling of adsorption isotherms. In this vein, various equations of adsorption isotherms and localized mobile, some taking into account the adsorbate-adsorbate interactions, are used to describe the experimental isotherms. We also used the Toth equation, a mathematical model with three parameters whose adjustment requires nonlinear regression. The last part is dedicated to the study of acid properties of Cu (x) X, Zn (x) X and CuZn (x) X, with the adsorption-desorption of pyridine followed by IR. The effect of substitution at different rates of Na + by Cu2 + cations and / or Zn 2 +, on the crystallinity and on the textural properties was treated. Some results on the morphology of the crystallites and the thermal effects during a temperature rise, obtained by scanning electron microscopy and DTA-TGA thermal analyzer, respectively, are also reported. The acidity of our different samples was also studied. Thus, the nature and strength of each type of acidity are estimated. The evaluation of these various features will provide a comparison between Cu (x) X, Zn (x) X and CuZn (x) X. One study on adsorption of C3H8 and C3H6 in NaX, Cu (x) X , Zn (x) x and CuZn (x) x has been undertaken.Keywords: adsorption, acidity, ion exchange, zeolite
Procedia PDF Downloads 1981938 Social Discussion Networks during the Covid-19 Pandemic: A Study of College Students Core Discussion Groups
Authors: Regan Harper, Song Yang, Douglas Adams
Abstract:
During the historically unprecedent time of Covid-19 pandemic, we survey college students with social issue generators to measure their core discussion groups. For the total 191 students, we elicit 847 conversation partners (alters) with our five social issue generators such as school closing, facemasks, collegiate sports, race and policing, and social inequality, producing an average of 4.43 alters per respondent. The core discussion groups of our sample are very gender balanced, with female alters slightly outnumbering male alters. However, the core discussion groups are racially homogenous, consisting of mostly white students (around or above 80 percent). Explanatory analyses reveal that gender and race of respondents significantly impact the size, gender composition, and racial composition of their core discussion networks. We discuss those major findings and implications of future studies in our conclusion section.Keywords: core discussion groups, social issue generators, ego-centric network, Covid-19 pandemic
Procedia PDF Downloads 931937 Prosodic Characteristics of Post Traumatic Stress Disorder Induced Speech Changes
Authors: Jarek Krajewski, Andre Wittenborn, Martin Sauerland
Abstract:
This abstract describes a promising approach for estimating post-traumatic stress disorder (PTSD) based on prosodic speech characteristics. It illustrates the validity of this method by briefly discussing results from an Arabic refugee sample (N= 47, 32 m, 15 f). A well-established standardized self-report scale “Reaction of Adolescents to Traumatic Stress” (RATS) was used to determine the ground truth level of PTSD. The speech material was prompted by telling about autobiographical related sadness inducing experiences (sampling rate 16 kHz, 8 bit resolution). In order to investigate PTSD-induced speech changes, a self-developed set of 136 prosodic speech features was extracted from the .wav files. This set was adapted to capture traumatization related speech phenomena. An artificial neural network (ANN) machine learning model was applied to determine the PTSD level and reached a correlation of r = .37. These results indicate that our classifiers can achieve similar results to those seen in speech-based stress research.Keywords: speech prosody, PTSD, machine learning, feature extraction
Procedia PDF Downloads 931936 Reproduction of New Media Art Village around NTUT: Heterotopia of Visual Culture Art Education
Authors: Yu Cheng-Yu
Abstract:
‘Heterotopia’, ‘Visual Cultural Art Education’ and ‘New Media’ of these three subjects seemingly are irrelevant. In fact, there are synchronicity and intertextuality inside. In addition to visual culture, art education inspires students the ability to reflect on popular culture image through visual culture teaching strategies in school. We should get involved in the community to construct the learning environment that conveys visual culture art. This thesis attempts to probe the heterogeneity of space and value from Michel Foucault and to research sustainable development strategy in ‘New Media Art Village’ heterogeneity from Jean Baudrillard, Marshall McLuhan's media culture theory and social construction ideology. It is possible to find a new media group that can convey ‘Visual Culture Art Education’ around the National Taipei University of Technology in this commercial district that combines intelligent technology, fashion, media, entertainment, art education, and marketing network. Let the imagination and innovation of ‘New Media Art Village’ become ‘implementable’ and new media Heterotopia of inter-subjectivity with the engagement of big data and digital media. Visual culture art education will also bring aesthetics into the community by New Media Art Village.Keywords: social construction, heterogeneity, new media, big data, visual culture art education
Procedia PDF Downloads 2491935 SCANet: A Workflow for Single-Cell Co-Expression Based Analysis
Authors: Mhaned Oubounyt, Jan Baumbach
Abstract:
Differences in co-expression networks between two or multiple cells (sub)types across conditions is a pressing problem in single-cell RNA sequencing (scRNA-seq). A key challenge is to define those co-variations that differ between or among cell types and/or conditions and phenotypes to examine small regulatory networks that can explain mechanistic differences. To this end, we developed SCANet, an all-in-one Python package that uses state-of-the-art algorithms to facilitate the workflow of a combined single-cell GCN (Gene Correlation Network) and GRN (Gene Regulatory Networks) pipeline, including inference of gene co-expression modules from scRNA-seq, followed by trait and cell type associations, hub gene detection, co-regulatory networks, and drug-gene interactions. In an example case, we illustrate how SCANet can be applied to identify regulatory drivers behind a cytokine storm associated with mortality in patients with acute respiratory illness. SCANet is available as a free, open-source, and user-friendly Python package that can be easily integrated into systems biology pipelines.Keywords: single-cell, co-expression networks, drug-gene interactions, co-regulatory networks
Procedia PDF Downloads 1571934 Estimating the Effect of Fluid in Pressing Process
Authors: A. Movaghar, R. A. Mahdavinejad
Abstract:
To analyze the effect of various parameters of fluid on the material properties such as surface and depth defects and/or cracks, it is possible to determine the affection of pressure field on these specifications. Stress tensor analysis is also able to determine the points in which the probability of defection creation is more. Besides, from pressure field, it is possible to analyze the affection of various fluid specifications such as viscosity and density on defect created in the material. In this research, the concerned boundary conditions are analyzed first. Then the solution network and stencil used are mentioned. With the determination of relevant equation on the fluid flow between notch and matrix and their discretion according to the governed boundary conditions, these equations can be solved. Finally, with the variation creations on fluid parameters such as density and viscosity, the affection of these variations can be determined on pressure field. In this direction, the flowchart and solution algorithm with their results as vortex and current function contours for two conditions with most applications in pressing process are introduced and discussed.Keywords: pressing, notch, matrix, flow function, vortex
Procedia PDF Downloads 2911933 The Social Justice of Movement: Undocumented Immigrant Coalitions in the United States
Authors: Libia Jiménez Chávez
Abstract:
This is a study of freedom riders and their courageous journey for civil rights, but the year was not 1961. It was 2003. This paper chronicles the emergence of a new civil rights movement for immigrant rights through an oral history of the 2003 U.S. Immigrant Workers Freedom Ride (IWFR). During the height of the post-9/11 immigrant repression, a bloc of organizations inspired by the Civil Rights Movement of the 1960s mobilized 900 multinational immigrants and their allies in the fight for legal status, labor protections, family reunification, and civil rights. The activists visited over 100 U.S. cities, met with Congressional leaders in the nation’s capital, and led a rally of over 50,000 people in New York City. This unified effort set the groundwork for the national May Day immigration protests of 2006. Movements can be characterized in two distinct ways: physical movement and social movements. In the past, historians have considered immigrants both as people and as participants in social movements. In contrast, studies of recent migrants tend to say little about their involvement in immigrant political mobilizations. The dominant literature on immigration portrays immigrants as objects of exclusion, border enforcement, detention, and deportation instead of strategic political actors. This paper aims to change this perception. It considers the Freedom Riders both as immigrants who were literally on the move and as participants in a social movement. Through interviews with participants and archival video footage housed at the University of California Los Angeles, it is possible to study this mobile protest as a movement. This contemporary immigrant struggle is an opportunity to explore the makeup and development of a heterogenous immigrant coalition and consider the relationship between population movements and social justice. In addition to oral histories and archival research, the study will utilize social movement literature, U.S. immigration and labor history, and Undocumented Critical Theory to expand the historiography of immigrant social movements in America.Keywords: civil rights, immigrant social movements, undocumented communities, undocumented critical theory
Procedia PDF Downloads 1761932 Spectrum Assignment Algorithms in Optical Networks with Protection
Authors: Qusay Alghazali, Tibor Cinkler, Abdulhalim Fayad
Abstract:
In modern optical networks, the flex grid spectrum usage is most widespread, where higher bit rate streams get larger spectrum slices while lower bit rate traffic streams get smaller spectrum slices. To our practice, under the ITU-T recommendation, G.694.1, spectrum slices of 50, 75, and 100 GHz are being used with central frequency at 193.1 THz. However, when these spectrum slices are not sufficient, multiple spectrum slices can use either one next to another or anywhere in the optical wavelength. In this paper, we propose the analysis of the wavelength assignment problem. We compare different algorithms for this spectrum assignment with and without protection. As a reference for comparisons, we concluded that the Integer Linear Programming (ILP) provides the global optimum for all cases. The most scalable algorithm is the greedy one, which yields results in subsequent ranges even for more significant network instances. The algorithms’ benchmark implemented using the LEMON C++ optimization library and simulation runs based on a minimum number of spectrum slices assigned to lightpaths and their execution time.Keywords: spectrum assignment, integer linear programming, greedy algorithm, international telecommunication union, library for efficient modeling and optimization in networks
Procedia PDF Downloads 172