Search results for: intelligent computational techniques
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 8878

Search results for: intelligent computational techniques

4648 Contribution of Culture on Divorce Prevention in Indonesia on "New Normal" Era: Study at Batak, Malay and Minangkabau Tribes

Authors: Ikhwanuddin Harahap

Abstract:

This paper investigates the contribution of culture to divorce prevention in Indonesia in the "new normal" era, especially in Batak, Malay and Minangkabau tribes. This research is qualitative with an anthropological approach. Data were collected by interview and observation techniques. Checking the validity of the data is done by triangulation technique, and the data is analyzed by content analysis. The results of the research showed that culture has a strategic role in preventing divorce. In Batak, Malay and Minangkabau-as, major ethnic groups in Indonesian cultures, have a set of norms and dogmas conveyed at the wedding party, namely “marriage must be eternal and if divorced by death.” In addition, cultural figures actively become arbiters in resolving family conflicts, such as Harajaon in Batak, Datuk in Malay and Mamak in Minangkabau. Cultural dogmas and cultural figures play a very important role in preventing divorce.

Keywords: culture, divorce, prevention, contribution, new normal, era

Procedia PDF Downloads 161
4647 Micro-Texture Effect on Fracture Location in Carbon Steel during Forming

Authors: Sarra Khelifi, Youcef Guerabli, Ahcene Boumaiza

Abstract:

Advances in techniques for measuring individual crystallographic orientations have made it possible to investigate the role of local crystallography during the plastic deformation of materials. In this study, the change in crystallographic orientation distribution during deformation by deep drawing in carbon steel has been investigated in order to understand their role in propagation and arrest of crack. The results show that the change of grain orientation from initial recrystallization texture components of {111}<112> to deformation orientation {111}<110> incites the initiation and propagation of cracks in the region of {111}<112> small grains. Moreover, the misorientation profile and local orientation are analyzed in detail to discuss the change from {111}<112> to {111}<110>. The deformation of the grain with {111}<110> orientation is discussed in terms of stops of the crack in carbon steel during drawing. The SEM-EBSD technique was used to reveal the change of orientation; XRD was performed for the characterization of the global evolution of texture for deformed samples.

Keywords: fracture, heterogeneity, misorientation profile, stored energy

Procedia PDF Downloads 183
4646 Implementation and Design of Fuzzy Controller for High Performance Dc-Dc Boost Converters

Authors: A. Mansouri, F. Krim

Abstract:

This paper discusses the implementation and design of both linear PI and fuzzy controllers for DC-DC boost converters. Design of PI controllers is based on temporal response of closed-loop converters, while fuzzy controllers design is based on heuristic knowledge of boost converters. Linear controller implementation is quite straightforward relying on mathematical models, while fuzzy controller implementation employs one or more artificial intelligences techniques. Comparison between these boost controllers is made in design aspect. Experimental results show that the proposed fuzzy controller system is robust against input voltage and load resistance changing and in respect of start-up transient. Results indicate that fuzzy controller can achieve best control performance concerning faster transient response, steady-state response good stability and accuracy under different operating conditions. Fuzzy controller is more suitable to control boost converters.

Keywords: boost DC-DC converter, fuzzy, PI controllers, power electronics and control system

Procedia PDF Downloads 465
4645 Numerical Study on the Performance of Upgraded Victorian Brown Coal in an Ironmaking Blast Furnace

Authors: Junhai Liao, Yansong Shen, Aibing Yu

Abstract:

A 3D numerical model is developed to simulate the complicated in-furnace combustion phenomena in the lower part of an ironmaking blast furnace (BF) while using pulverized coal injection (PCI) technology to reduce the consumption of relatively expensive coke. The computational domain covers blowpipe-tuyere-raceway-coke bed in the BF. The model is validated against experimental data in terms of gaseous compositions and coal burnout. Parameters, such as coal properties and some key operational variables, play an important role on the performance of coal combustion. Their diverse effects on different combustion characteristics are examined in the domain, in terms of gas compositions, temperature, and burnout. The heat generated by the combustion of upgraded Victorian brown coal is able to meet the heating requirement of a BF, hence making upgraded brown coal injected into BF possible. It is evidenced that the model is suitable to investigate the mechanism of the PCI operation in a BF. Prediction results provide scientific insights to optimize and control of the PCI operation. This model cuts the cost to investigate and understand the comprehensive combustion phenomena of upgraded Victorian brown coal in a full-scale BF.

Keywords: blast furnace, numerical study, pulverized coal injection, Victorian brown coal

Procedia PDF Downloads 233
4644 Analysis of Genomics Big Data in Cloud Computing Using Fuzzy Logic

Authors: Mohammad Vahed, Ana Sadeghitohidi, Majid Vahed, Hiroki Takahashi

Abstract:

In the genomics field, the huge amounts of data have produced by the next-generation sequencers (NGS). Data volumes are very rapidly growing, as it is postulated that more than one billion bases will be produced per year in 2020. The growth rate of produced data is much faster than Moore's law in computer technology. This makes it more difficult to deal with genomics data, such as storing data, searching information, and finding the hidden information. It is required to develop the analysis platform for genomics big data. Cloud computing newly developed enables us to deal with big data more efficiently. Hadoop is one of the frameworks distributed computing and relies upon the core of a Big Data as a Service (BDaaS). Although many services have adopted this technology, e.g. amazon, there are a few applications in the biology field. Here, we propose a new algorithm to more efficiently deal with the genomics big data, e.g. sequencing data. Our algorithm consists of two parts: First is that BDaaS is applied for handling the data more efficiently. Second is that the hybrid method of MapReduce and Fuzzy logic is applied for data processing. This step can be parallelized in implementation. Our algorithm has great potential in computational analysis of genomics big data, e.g. de novo genome assembly and sequence similarity search. We will discuss our algorithm and its feasibility.

Keywords: big data, fuzzy logic, MapReduce, Hadoop, cloud computing

Procedia PDF Downloads 289
4643 In vitro Antioxidant and Antibacterial Activities of Methanol Extracts of Tamus communis L. from Algeria

Authors: F. Belkhiri, A. Baghiani, S. Boumerfeg, N. Charef, S. Khennouf, L. Arrar

Abstract:

The present study was conducted to evaluate the in vitro antioxidant and antibacterial properties of methanolic extracts from roots of Tamus communis L. (TCRE), which is a plant used in traditional medicine in Algeria. The antioxidant potential of pattern was evaluated using tow complementary techniques, inhibition of free radical DPPH and the test of β-Carotene/linoleic acid. The antioxidant test indicates that non-polar fractions of TCRE (chloroform and ethyl acetate fractions) were more active than the polar fractions. Among these fractions, the chloroform extract appear in the DPPH test an IC50 of (18.89 µg/ml) comparable to that of BHT (18.6 µg/ml). This fraction was able to inhibiting the oxidation of β-Carotene with a percentage of inhibition (89.84 %). In antibacterial test, non-polar fractions showed antibacterial activity very important compared with the polar fractions. These fractions have inhibited the growth of four from nine bacterial strains, causing zones of inhibition from 08 to 23 mm of diameter.

Keywords: antioxidant activity, antibacterial activity, Tamus communis L., polar fractions

Procedia PDF Downloads 573
4642 Investigating the Influence of Roof Fairing on Aerodynamic Drag of a Bluff Body

Authors: Kushal Kumar Chode

Abstract:

Increase in demand for fuel saving and demand for faster vehicles with decent fuel economy, researchers around the world started investigating in various passive flow control devices to improve the fuel efficiency of vehicles. In this paper, A roof fairing was investigated for reducing the aerodynamic drag of a bluff body. The bluff body considered for this work is Ahmed model with a rake angle of 25deg was and subjected to flow with a velocity of 40m/s having Reynolds number of 2.68million was analysed using a commercial Computational Fluid Dynamic (CFD) code Star CCM+. It was evident that pressure drag is the main source of drag on an Ahmed body from the initial study. Adding a roof fairing has delayed the flow separation and resulted in delaying wake formation, thus improving the pressure in near weak and reducing the wake region. Adding a roof fairing of height and length equal to 1/7H and 1/3L respectively has shown a drag reduction by 9%. However, an optimised fairing, which was obtained by changing height, length and width by 5% increase, recorded a drag reduction close 12%.

Keywords: Ahmed model, aerodynamic drag, passive flow control, roof fairing, wake formation

Procedia PDF Downloads 424
4641 Characterization of Enterotoxigenic Escherichia coli CS6 Promoter

Authors: Mondal Indranil, Bhakat Debjyoti, Mukhopadayay Asish K., Chatterjee Nabendu S.

Abstract:

CS6 is the prevalent CF in our region and deciphering its molecular regulators would play a pivotal role in reducing the burden of ETEC pathogenesis. In prokaryotes, most of the genes are under the control of one operon and the promoter present upstream of the gene regulates the transcription of that gene. Here the promoter of CS6 was characterized by computational method and further analyzed by β-galactosidase assay and sequencing. Promoter constructs and deletions were prepared as required to analyze promoter activity. The effect of different additives on the CS6 promoter was analysed by the β-galactosidase assay. Bioinformatics analysis done by Softberry/BPROM predicted fur, lrp, and crp boxes, -10 and -35 region upstream of the CS6 gene. The promoter construction in no promoter plasmid pTL61T showed that region -573 to +1 is actually the promoter region as predicted. Sequential deletion of the region upstream of CS6 revealed that promoter activity remains the same when -573bp to -350bp is deleted. But after the deletion of the upstream region -350 bp to -255bp, promoter expression decreases drastically to 26%. Further deletion also decreases promoter activity up to a little range. So the region -355bp to -255bp holds the promoter sequence for the CS6 gene. Additives like iron, NaCl, etc., modulate promoter activity in a dose-dependent manner. From the promoter analysis, it can be said that the minimum region lies between -254 and +1. Important region(s) lies between -350 bp to -255 bp upstream in the promoter, which might have important elements needed to control CS6 gene expression.

Keywords: microbiology, promoter, colonization factor, ETEC

Procedia PDF Downloads 154
4640 Taxonomic Classification for Living Organisms Using Convolutional Neural Networks

Authors: Saed Khawaldeh, Mohamed Elsharnouby, Alaa Eddin Alchalabi, Usama Pervaiz, Tajwar Aleef, Vu Hoang Minh

Abstract:

Taxonomic classification has a wide-range of applications such as finding out more about the evolutionary history of organisms that can be done by making a comparison between species living now and species that lived in the past. This comparison can be made using different kinds of extracted species’ data which include DNA sequences. Compared to the estimated number of the organisms that nature harbours, humanity does not have a thorough comprehension of which specific species they all belong to, in spite of the significant development of science and scientific knowledge over many years. One of the methods that can be applied to extract information out of the study of organisms in this regard is to use the DNA sequence of a living organism as a marker, thus making it available to classify it into a taxonomy. The classification of living organisms can be done in many machine learning techniques including Neural Networks (NNs). In this study, DNA sequences classification is performed using Convolutional Neural Networks (CNNs) which is a special type of NNs.

Keywords: deep networks, convolutional neural networks, taxonomic classification, DNA sequences classification

Procedia PDF Downloads 427
4639 Supervisor Controller-Based Colored Petri Nets for Deadlock Control and Machine Failures in Automated Manufacturing Systems

Authors: Husam Kaid, Abdulrahman Al-Ahmari, Zhiwu Li

Abstract:

This paper develops a robust deadlock control technique for shared and unreliable resources in automated manufacturing systems (AMSs) based on structural analysis and colored Petri nets, which consists of three steps. The first step involves using strict minimal siphon control to create a live (deadlock-free) system that does not consider resource failure. The second step uses an approach based on colored Petri net, in which all monitors designed in the first step are merged into a single monitor. The third step addresses the deadlock control problems caused by resource failures. For all resource failures in the Petri net model a common recovery subnet based on colored petri net is proposed. The common recovery subnet is added to the obtained system at the second step to make the system reliable. The proposed approach is evaluated using an AMS from the literature. The results show that the proposed approach can be applied to an unreliable complex Petri net model, has a simpler structure and less computational complexity, and can obtain one common recovery subnet to model all resource failures.

Keywords: automated manufacturing system, colored Petri net, deadlocks, siphon

Procedia PDF Downloads 118
4638 Cyber-Med: Practical Detection Methodology of Cyber-Attacks Aimed at Medical Devices Eco-Systems

Authors: Nir Nissim, Erez Shalom, Tomer Lancewiki, Yuval Elovici, Yuval Shahar

Abstract:

Background: A Medical Device (MD) is an instrument, machine, implant, or similar device that includes a component intended for the purpose of the diagnosis, cure, treatment, or prevention of disease in humans or animals. Medical devices play increasingly important roles in health services eco-systems, including: (1) Patient Diagnostics and Monitoring; Medical Treatment and Surgery; and Patient Life Support Devices and Stabilizers. MDs are part of the medical device eco-system and are connected to the network, sending vital information to the internal medical information systems of medical centers that manage this data. Wireless components (e.g. Wi-Fi) are often embedded within medical devices, enabling doctors and technicians to control and configure them remotely. All these functionalities, roles, and uses of MDs make them attractive targets of cyber-attacks launched for many malicious goals; this trend is likely to significantly increase over the next several years, with increased awareness regarding MD vulnerabilities, the enhancement of potential attackers’ skills, and expanded use of medical devices. Significance: We propose to develop and implement Cyber-Med, a unique collaborative project of Ben-Gurion University of the Negev and the Clalit Health Services Health Maintenance Organization. Cyber-Med focuses on the development of a comprehensive detection framework that relies on a critical attack repository that we aim to create. Cyber-Med will allow researchers and companies to better understand the vulnerabilities and attacks associated with medical devices as well as providing a comprehensive platform for developing detection solutions. Methodology: The Cyber-Med detection framework will consist of two independent, but complementary detection approaches: one for known attacks, and the other for unknown attacks. These modules incorporate novel ideas and algorithms inspired by our team's domains of expertise, including cyber security, biomedical informatics, and advanced machine learning, and temporal data mining techniques. The establishment and maintenance of Cyber-Med’s up-to-date attack repository will strengthen the capabilities of Cyber-Med’s detection framework. Major Findings: Based on our initial survey, we have already found more than 15 types of vulnerabilities and possible attacks aimed at MDs and their eco-system. Many of these attacks target individual patients who use devices such pacemakers and insulin pumps. In addition, such attacks are also aimed at MDs that are widely used by medical centers such as MRIs, CTs, and dialysis engines; the information systems that store patient information; protocols such as DICOM; standards such as HL7; and medical information systems such as PACS. However, current detection tools, techniques, and solutions generally fail to detect both the known and unknown attacks launched against MDs. Very little research has been conducted in order to protect these devices from cyber-attacks, since most of the development and engineering efforts are aimed at the devices’ core medical functionality, the contribution to patients’ healthcare, and the business aspects associated with the medical device.

Keywords: medical device, cyber security, attack, detection, machine learning

Procedia PDF Downloads 351
4637 Computational Determination of the Magneto Electronic Properties of Ce₁₋ₓCuₓO₂ (x=12.5%): Emerging Material for Spintronic Devices

Authors: Aicha Bouhlala, Sabah Chettibi

Abstract:

Doping CeO₂ with transition metals is an effective way of tuning its properties. In the present work, we have performed self-consistent ab-initio calculation using the full-potential linearized augmented plane-wave method (FP-LAPW), based on the density functional theory (DFT) as implemented in the Wien2k simulation code to study the structural, electronic, and magnetic properties of the compound Ce₁₋ₓCuₓO₂ (x=12.5%) fluorite type oxide and to explore the effects of dopant Cu in ceria. The exchange correlation potential has been treated using the Perdew-Burke-Eenzerhof revised of solid (PBEsol). In structural properties, the equilibrium lattice constant is observed for the compound, which exists within the value of 5.382 A°. In electronic properties, the spin-polarized electronic bandstructure elucidates the semiconductor nature of the material in both spin channels, with the compound was observed to have a narrow bandgap on the spin-down configuration (0.162 EV) and bandgap on the spin-up (2.067 EV). Hence, the doped atom Cu plays a vital role in increasing the magnetic moments of the supercell, and the value of the total magnetic moment is found to be 2.99438 μB. Therefore, the compound Cu-doped CeO₂ shows a strong ferromagnetic behavior. The predicted results propose the compound could be a good candidate for spintronics applications.

Keywords: Cu-doped CeO₂, DFT, Wien2k, properties

Procedia PDF Downloads 244
4636 Multivariate Statistical Process Monitoring of Base Metal Flotation Plant Using Dissimilarity Scale-Based Singular Spectrum Analysis

Authors: Syamala Krishnannair

Abstract:

A multivariate statistical process monitoring methodology using dissimilarity scale-based singular spectrum analysis (SSA) is proposed for the detection and diagnosis of process faults in the base metal flotation plant. Process faults are detected based on the multi-level decomposition of process signals by SSA using the dissimilarity structure of the process data and the subsequent monitoring of the multiscale signals using the unified monitoring index which combines T² with SPE. Contribution plots are used to identify the root causes of the process faults. The overall results indicated that the proposed technique outperformed the conventional multivariate techniques in the detection and diagnosis of the process faults in the flotation plant.

Keywords: fault detection, fault diagnosis, process monitoring, dissimilarity scale

Procedia PDF Downloads 199
4635 Whale Optimization Algorithm for Optimal Reactive Power Dispatch Solution Under Various Contingency Conditions

Authors: Medani Khaled Ben Oualid

Abstract:

Most of researchers solved and analyzed the ORPD problem in the normal conditions. However, network collapses appear in contingency conditions. In this paper, ORPD under several contingencies is presented using the proposed method WOA. To ensure viability of the power system in contingency conditions, several critical cases are simulated in order to prevent and prepare the power system to face such situations. The results obtained are carried out in IEEE 30 bus test system for the solution of ORPD problem in which control of bus voltages, tap position of transformers and reactive power sources are involved. Moreover, another method, namely, Particle Swarm Optimization with Time Varying Acceleration Coefficient (PSO-TVAC) has been compared with the proposed technique. Simulation results indicate that the proposed WOA gives remarkable solution in terms of effectiveness in case of outages.

Keywords: optimal reactive power dispatch, metaheuristic techniques, whale optimization algorithm, real power loss minimization, contingency conditions

Procedia PDF Downloads 84
4634 Structural and Magnetic Properties of Mn-Doped 6H-SiC

Authors: M. Al Azri, M. Elzain, K. Bouziane, S. M. Chérif

Abstract:

n-Type 6H-SiC(0001) substrates were implanted with three fluencies of Mn+ 5x1015 Mn/cm2 (Mn content: 0.7%), 1x1016 (~2 %), and 5x1016 cm–2 (7%) with implantation energy of 80 keV and substrate temperature of 365ºC. The samples were characterized using Rutherford Backscattering and Channeling Spectroscopy (RBS/C), High-Resolution X-Ray Diffraction technique (HRXRD), micro-Raman Spectroscopy (μRS), and Superconducting Quantum Interference Device (SQUID) techniques. The aim of our work is to investigate implantation induced defects with dose and to study any correlation between disorder-composition and magnetic properties. In addition, ab-initio calculations were used to investigate the structural and magnetic properties of Mn-doped 6H-SiC. Various configurations of Mn sites and vacancy types were considered. The calculations showed that a substitutional Mn atom at Si site possesses larger magnetic moment than Mn atom at C site. A model is introduced to explain the dependence of the magnetic structure on site occupation. The magnetic properties of ferromagnetically (FM) and antiferromagnetically (AFM) coupled pairs of Mn atoms with and without neighboring vacancies have also been explored.

Keywords: ab-initio calculations, diluted magnetic semiconductors, magnetic properties, silicon carbide

Procedia PDF Downloads 311
4633 Bidirectional Long Short-Term Memory-Based Signal Detection for Orthogonal Frequency Division Multiplexing With All Index Modulation

Authors: Mahmut Yildirim

Abstract:

This paper proposed the bidirectional long short-term memory (Bi-LSTM) network-aided deep learning (DL)-based signal detection for Orthogonal frequency division multiplexing with all index modulation (OFDM-AIM), namely Bi-DeepAIM. OFDM-AIM is developed to increase the spectral efficiency of OFDM with index modulation (OFDM-IM), a promising multi-carrier technique for communication systems beyond 5G. In this paper, due to its strong classification ability, Bi-LSTM is considered an alternative to the maximum likelihood (ML) algorithm, which is used for signal detection in the classical OFDM-AIM scheme. The performance of the Bi-DeepAIM is compared with LSTM network-aided DL-based OFDM-AIM (DeepAIM) and classic OFDM-AIM that uses (ML)-based signal detection via BER performance and computational time criteria. Simulation results show that Bi-DeepAIM obtains better bit error rate (BER) performance than DeepAIM and lower computation time in signal detection than ML-AIM.

Keywords: bidirectional long short-term memory, deep learning, maximum likelihood, OFDM with all index modulation, signal detection

Procedia PDF Downloads 55
4632 Conceptual and Preliminary Design of Landmine Searching UAS at Extreme Environmental Condition

Authors: Gopalasingam Daisan

Abstract:

Landmines and ammunitions have been creating a significant threat to the people and animals, after the war, the landmines remain in the land and it plays a vital role in civilian’s security. Especially the Children are at the highest risk because they are curious. After all, an unexploded bomb can look like a tempting toy to an inquisitive child. The initial step of designing the UAS (Unmanned Aircraft Systems) for landmine detection is to choose an appropriate and effective sensor to locate the landmines and other unexploded ammunitions. The sensor weight and other components related to the sensor supporting device’s weight are taken as a payload weight. The mission requirement is to find the landmines in a particular area by making a proper path that will cover all the vicinity in the desired area. The weight estimation of the UAV (Unmanned Aerial Vehicle) can be estimated by various techniques discovered previously with good accuracy at the first phase of the design. The next crucial part of the design is to calculate the power requirement and the wing loading calculations. The matching plot techniques are used to determine the thrust-to-weight ratio, and this technique makes this process not only easiest but also precisely. The wing loading can be calculated easily from the stall equation. After these calculations, the wing area is determined from the wing loading equation and the required power is calculated from the thrust to weight ratio calculations. According to the power requirement, an appropriate engine can be selected from the available engine from the market. And the wing geometric parameter is chosen based on the conceptual sketch. The important steps in the wing design to choose proper aerofoil and which will ensure to create sufficient lift coefficient to satisfy the requirements. The next component is the tail; the tail area and other related parameters can be estimated or calculated to counteract the effect of the wing pitching moment. As the vertical tail design depends on many parameters, the initial sizing only can be done in this phase. The fuselage is another major component, which is selected based on the slenderness ratio, and also the shape is determined on the sensor size to fit it under the fuselage. The landing gear is one of the important components which is selected based on the controllability and stability requirements. The minimum and maximum wheel track and wheelbase can be determined based on the crosswind and overturn angle requirements. The minor components of the landing gear design and estimation are not the focus of this project. Another important task is to calculate the weight of the major components and it is going to be estimated using empirical relations and also the mass is added to each such component. The CG and moment of inertia are also determined to each component separately. The sensitivity of the weight calculation is taken into consideration to avoid extra material requirements and also reduce the cost of the design. Finally, the aircraft performance is calculated, especially the V-n (velocity and load factor) diagram for different flight conditions such as not disturbed and with gust velocity.

Keywords: landmine, UAS, matching plot, optimization

Procedia PDF Downloads 165
4631 Security Issues in Long Term Evolution-Based Vehicle-To-Everything Communication Networks

Authors: Mujahid Muhammad, Paul Kearney, Adel Aneiba

Abstract:

The ability for vehicles to communicate with other vehicles (V2V), the physical (V2I) and network (V2N) infrastructures, pedestrians (V2P), etc. – collectively known as V2X (Vehicle to Everything) – will enable a broad and growing set of applications and services within the intelligent transport domain for improving road safety, alleviate traffic congestion and support autonomous driving. The telecommunication research and industry communities and standardization bodies (notably 3GPP) has finally approved in Release 14, cellular communications connectivity to support V2X communication (known as LTE – V2X). LTE – V2X system will combine simultaneous connectivity across existing LTE network infrastructures via LTE-Uu interface and direct device-to-device (D2D) communications. In order for V2X services to function effectively, a robust security mechanism is needed to ensure legal and safe interaction among authenticated V2X entities in the LTE-based V2X architecture. The characteristics of vehicular networks, and the nature of most V2X applications, which involve human safety makes it significant to protect V2X messages from attacks that can result in catastrophically wrong decisions/actions include ones affecting road safety. Attack vectors include impersonation attacks, modification, masquerading, replay, MiM attacks, and Sybil attacks. In this paper, we focus our attention on LTE-based V2X security and access control mechanisms. The current LTE-A security framework provides its own access authentication scheme, the AKA protocol for mutual authentication and other essential cryptographic operations between UEs and the network. V2N systems can leverage this protocol to achieve mutual authentication between vehicles and the mobile core network. However, this protocol experiences technical challenges, such as high signaling overhead, lack of synchronization, handover delay and potential control plane signaling overloads, as well as privacy preservation issues, which cannot satisfy the adequate security requirements for majority of LTE-based V2X services. This paper examines these challenges and points to possible ways by which they can be addressed. One possible solution, is the implementation of the distributed peer-to-peer LTE security mechanism based on the Bitcoin/Namecoin framework, to allow for security operations with minimal overhead cost, which is desirable for V2X services. The proposed architecture can ensure fast, secure and robust V2X services under LTE network while meeting V2X security requirements.

Keywords: authentication, long term evolution, security, vehicle-to-everything

Procedia PDF Downloads 159
4630 Exploring the Landscape of Information Visualization through a Mark Lombardi Lens

Authors: Alon Friedman, Antonio Sanchez Chinchon

Abstract:

This bibliometric study takes an artistic and storytelling approach to explore the term ”information visualization.” Analyzing over 1008 titles collected from databases that specialize in data visualization research, we examine the titles of these publications to report on the characteristics and development trends in the field. Employing a qualitative methodology, we delve into the titles of these publications, extracting leading terms and exploring the cooccurrence of these terms to gain deeper insights. By systematically analyzing the leading terms and their relationships within the titles, we shed light on the prevailing themes that shape the landscape of ”information visualization” by employing the artist Mark Lombardi’s techniques to visualize our findings. By doing so, this study provides valuable insights into bibliometrics visualization while also opening new avenues for leveraging art and storytelling to enhance data representation.

Keywords: bibliometrics analysis, Mark Lombardi design, information visualization, qualitative methodology

Procedia PDF Downloads 72
4629 The Effect of Nylon and Kevlar Stitching on the Mode I Fracture of Carbon/Epoxy Composites

Authors: Nisrin R. Abdelal, Steven L. Donaldson

Abstract:

Composite materials are widely used in aviation industry due to their superior properties; however, they are susceptible to delamination. Through-thickness stitching is one of the techniques to alleviate delamination. Kevlar is one of the most common stitching materials; in contrast, it is expensive and presents stitching fabrication challenges. Therefore, this study compares the performance of Kevlar with an inexpensive and easy-to-use nylon fiber in stitching to alleviate delamination. Three laminates of unidirectional carbon fiber-epoxy composites were manufactured using vacuum assisted resin transfer molding process. One panel was stitched with Kevlar, one with nylon, and one unstitched. Mode I interlaminar fracture tests were carried out on specimens from the three composite laminates, and the results were compared. Fractographic analysis using optical and scanning electron microscope were conducted to reveal the differences between stitching with Kevlar and nylon on the internal microstructure of the composite with respect to the interlaminar fracture toughness values.

Keywords: carbon, delamination, Kevlar, mode I, nylon, stitching

Procedia PDF Downloads 281
4628 Cultural Knowledge Transfer of the Inherited Karen Backstrap Weaving for the 4th Generation of a Pwo Karen Community

Authors: Suphitcha Charoen-Amornkitt, Chokeanand Bussracumpakorn

Abstract:

The tendency of the Karen backstrap weaving succession has gradually decreased due to the difficulty of weaving techniques and the relocation of the young generation. The Yang Nam Klat Nuea community, Nong Ya Plong District, Phetchaburi, is a Pwo Karen community that is seriously confronted with a lack of cultural heritage. Thus, a group of weavers was formed to revive the knowledge of weaving. However, they have been gradually confronted with culture assimilation to mainstream culture from the desire for marketing acceptance and imperative and forced the extinction of culture due to the disappearance of weaving details and techniques. Although there are practical solutions, i.e., product development, community improvement, knowledge improvement, and knowledge transfer, to inherit the Karen weaving culture, people in the community cannot fulfill their deep intention about the weaving inheritance as most solutions have focused on developing the commercial products and making the income instead of inheriting their knowledge. This research employed qualitative user research with an in-depth user interview to study communal knowledge transfer succession based on the internal involved parties, i.e., four expert weavers, three young weavers, and three 4th generation villagers. The purpose is to explore the correlation and mindset of villagers towards the culture with specific issues, including the psychology of culture, core knowledge and learning methods, cultural inheritance, and cultural engagement. As a result, the existing models of knowledge management mostly focused on tangible strategies, which can notice progress in short terms, such as direct teaching and consistent practicing. At the same time, the motivation and passion of inheritors were abolished while the research found that the young generation who profoundly connected with the textile culture will have a more significant intention to continue the culture. Therefore, this research suggests both internal and external solutions to treat the community. Regarding the internal solutions, family, weaving group, and school have an important role to participate with young villagers by encouraging activities to support the cultivating of Karen’s history, understanding their identities, and adapting the culture as a part of daily life. At the same time, collecting all of the knowledge in the archives, e.g., recorded video, instruction, and books, can crucially prevent the culture from extinction. Regarding the external solutions, this study suggests that working with social media will enhance the intimacy of textile culture, while the community should relieve the roles in marketing competition and start to drive cultural experiences to create a new market position. In conclusion, this research intends to explore the causes and motivation to support the transfer of the culture to the 4th generation villagers and to raise awareness of the diversity of culture in society. With these suggestions and the desire to improve pride and confidence in culture, the community agrees that strengthening the relationships between the young villagers and the weaving culture can bring attention and interest back to the weaving culture.

Keywords: Pwo Karen textile culture, backstrap weaving succession, cultural inheritance, knowledge transfer, knowledge management

Procedia PDF Downloads 78
4627 A Weighted Approach to Unconstrained Iris Recognition

Authors: Yao-Hong Tsai

Abstract:

This paper presents a weighted approach to unconstrained iris recognition. Nowadays, commercial systems are usually characterized by strong acquisition constraints based on the subject’s cooperation. However, it is not always achievable for real scenarios in our daily life. Researchers have been focused on reducing these constraints and maintaining the performance of the system by new techniques at the same time. With large variation in the environment, there are two main improvements to develop the proposed iris recognition system. For solving extremely uneven lighting condition, statistic based illumination normalization is first used on eye region to increase the accuracy of iris feature. The detection of the iris image is based on Adaboost algorithm. Secondly, the weighted approach is designed by Gaussian functions according to the distance to the center of the iris. Furthermore, local binary pattern (LBP) histogram is then applied to texture classification with the weight. Experiment showed that the proposed system provided users a more flexible and feasible way to interact with the verification system through iris recognition.

Keywords: authentication, iris recognition, adaboost, local binary pattern

Procedia PDF Downloads 212
4626 Printed Thai Character Recognition Using Particle Swarm Optimization Algorithm

Authors: Phawin Sangsuvan, Chutimet Srinilta

Abstract:

This Paper presents the applications of Particle Swarm Optimization (PSO) Method for Thai optical character recognition (OCR). OCR consists of the pre-processing, character recognition and post-processing. Before enter into recognition process. The Character must be “Prepped” by pre-processing process. The PSO is an optimization method that belongs to the swarm intelligence family based on the imitation of social behavior patterns of animals. Route of each particle is determined by an individual data among neighborhood particles. The interaction of the particles with neighbors is the advantage of Particle Swarm to determine the best solution. So PSO is interested by a lot of researchers in many difficult problems including character recognition. As the previous this research used a Projection Histogram to extract printed digits features and defined the simple Fitness Function for PSO. The results reveal that PSO gives 67.73% for testing dataset. So in the future there can be explored enhancement the better performance of PSO with improve the Fitness Function.

Keywords: character recognition, histogram projection, particle swarm optimization, pattern recognition techniques

Procedia PDF Downloads 464
4625 The Transformation of Architecture through the Technological Developments in History: Future Architecture Scenario

Authors: Adel Gurel, Ozge Ceylin Yildirim

Abstract:

Nowadays, design and architecture are being affected and underwent change with the rapid advancements in technology, economics, politics, society and culture. Architecture has been transforming with the latest developments after the inclusion of computers into design. Integration of design into the computational environment has revolutionized the architecture and new perspectives in architecture have been gained. The history of architecture shows the various technological developments and changes in which the architecture has transformed with time. Therefore, the analysis of integration between technology and the history of the architectural process makes it possible to build a consensus on the idea of how architecture is to proceed. In this study, each period that occurs with the integration of technology into architecture is addressed within historical process. At the same time, changes in architecture via technology are identified as important milestones and predictions with regards to the future of architecture have been determined. Developments and changes in technology and the use of technology in architecture within years are analyzed in charts and graphs comparatively. The historical process of architecture and its transformation via technology are supported with detailed literature review and they are consolidated with the examination of focal points of 20th-century architecture under the titles; parametric design, genetic architecture, simulation, and biomimicry. It is concluded that with the historical research between past and present; the developments in architecture cannot keep up with the advancements in technology and recent developments in technology overshadow the architecture, even the technology decides the direction of architecture. As a result, a scenario is presented with regards to the reach of technology in the future of architecture and the role of the architect.

Keywords: computer technologies, future architecture, scientific developments, transformation

Procedia PDF Downloads 178
4624 An in vitro Study on Synergetic Antifungal Activity of Garlic Extract with Honey and Lemon Juice against Candida sp.

Authors: P. Karpagam, Babu Joseph, P. Ashok Kumar

Abstract:

The incidence of Candida infections is increasing worldwide. The serious nature of these infections is compounded by increasing levels of drug resistance. Pure cultures of the Candida sp. were obtained from clinical isolates and fresh garlic extracts were obtained by extraction techniques. The antifungal activity of garlic extract was investigated in an in vitro system. The extract (100%, 75% and 50%) showed significant antifungal activity against Candida, whereas, low concentration (25%) of the extract showed less antifungal activity against the test organism. Antifungal activities of honey and lemon juice were tested against the Candida; however, the growth was not inhibited by these extracts. On the other hand honey and lemon when combined with garlic exhibited a good antifungal activity. The study thus confirms the antifungal properties of garlic extract along with additives like honey and lemon have significant antifungal activity against isolates of Candida species.

Keywords: Candida, garlic extract, lemon, synergitic antifungal activity

Procedia PDF Downloads 237
4623 Hybrid Algorithm for Non-Negative Matrix Factorization Based on Symmetric Kullback-Leibler Divergence for Signal Dependent Noise: A Case Study

Authors: Ana Serafimovic, Karthik Devarajan

Abstract:

Non-negative matrix factorization approximates a high dimensional non-negative matrix V as the product of two non-negative matrices, W and H, and allows only additive linear combinations of data, enabling it to learn parts with representations in reality. It has been successfully applied in the analysis and interpretation of high dimensional data arising in neuroscience, computational biology, and natural language processing, to name a few. The objective of this paper is to assess a hybrid algorithm for non-negative matrix factorization with multiplicative updates. The method aims to minimize the symmetric version of Kullback-Leibler divergence known as intrinsic information and assumes that the noise is signal-dependent and that it originates from an arbitrary distribution from the exponential family. It is a generalization of currently available algorithms for Gaussian, Poisson, gamma and inverse Gaussian noise. We demonstrate the potential usefulness of the new generalized algorithm by comparing its performance to the baseline methods which also aim to minimize symmetric divergence measures.

Keywords: non-negative matrix factorization, dimension reduction, clustering, intrinsic information, symmetric information divergence, signal-dependent noise, exponential family, generalized Kullback-Leibler divergence, dual divergence

Procedia PDF Downloads 240
4622 Migration and Policy Dedication in Ethiopia: A Study of Migration of Hadiya People

Authors: Solomon Tagesse

Abstract:

This study has been conducted on “Migration and Policy Dedication in Ethiopia: A Study of Migration of Hadiya People,” which was aimed at scrutinizing the reason for Hadiya people's migration from Ethiopia to the Republic of South Africa. Basically, a qualitative research approach has been employed to address the justified problem and to achieve the objectives stated accordingly. The purposive and snowball sampling techniques were employed to identify the study sites and respondents for the study. Field observations, interviews, focus group discussions and recording of data were used as instruments to collect data. It has been observed that lack of jobs and peer pressure, lack of interest to learn and work, scarcity and low wages were push factors; whereas job opportunity and better income; the existence of families, relatives and friends pull factors. Communication, transportation, the existence of brokers, etc., were also found to be intermediary factors. Based on the findings, recommendations and policy suggestions have been made in specific areas of the study.

Keywords: migration, reason, migrant, households

Procedia PDF Downloads 171
4621 Impact of Entrepreneurial Education on Entrepreneurial Success through Entrepreneurial Mindset, Professional Growth, and Innovation

Authors: Hummaira Qudsia Yousaf, Sidra Munawar

Abstract:

The study aims to examine in which way entrepreneurial education and attitude affect the entrepreneur’s success with the help of an entrepreneurial mindset, professional growth, and innovation. The target population was the entrepreneurs of successful startups in Pakistan. Data was gathered through an e-questionnaire, and 230 responses were analyzed using the partial least square structural equation modeling (PLS-SEM). Resultantly, entrepreneurial education is an essential component for the development of an entrepreneurial mindset. Also, an entrepreneurial attitude is responsible for the entrepreneurial mindset, which enhances professional growth. Moreover, the study highlighted that innovation is as necessary as mindset and education are for entrepreneurs. Furthermore, the findings confirmed that professional growth brings innovation to the success of entrepreneurs. This study provides proof of how entrepreneurial education and attitude influence pupils’ success in making entrepreneurs. This study extends the scope of education by incorporating predictors, such as professional growth, innovation, and entrepreneurial success. The study is unique due to the usage of innovative techniques for professional growth that ultimately bring career success.

Keywords: entrepreneurial education, entrepreneurial attitude, entrepreneurial mindset, professional growth, entrepreneurial success, innovation

Procedia PDF Downloads 105
4620 1 kW Power Factor Correction Soft Switching Boost Converter with an Active Snubber Cell

Authors: Yakup Sahin, Naim Suleyman Ting, Ismail Aksoy

Abstract:

A 1 kW power factor correction boost converter with an active snubber cell is presented in this paper. In the converter, the main switch turns on under zero voltage transition (ZVT) and turns off under zero current transition (ZCT) without any additional voltage or current stress. The auxiliary switch turns on and off under zero current switching (ZCS). Besides, the main diode turns on under ZVS and turns off under ZCS. The output current and voltage are controlled by the PFC converter in wide line and load range. The simulation results of converter are obtained for 1 kW and 100 kHz. One of the most important feature of the given converter is that it has direct power transfer as well as excellent soft switching techniques. Also, the converter has 0.99 power factor with the sinusoidal input current shape.

Keywords: power factor correction, direct power transfer, zero-voltage transition, zero-current transition, soft switching

Procedia PDF Downloads 949
4619 Diagnostic Evaluation of Micro Rna (miRNA-21, miRNA-215 and miRNA-378) in Patients with Colorectal Cancer

Authors: Ossama Abdelmotaal, Olfat Shaker, Tarek Salman, Lamiaa Nabeel, Mostafa Shabayek

Abstract:

Colorectal Cancer (CRC) is an important worldwide health problem. Colonoscopy is used in detecting CRC suffer from drawbacks where colonoscopy is an invasive method. This study validates easier and less time-consuming techniques to evaluate the usefulness of detecting miRNA-21, miRNA-215 and miRNA-378 in the sera of colorectal cancer patients as new diagnostic tools. This study includes malignant (Colo Rectal Cancer patients, n= 64)) and healthy (n=27) groups. The studied groups were subjected to colonoscopic examination and estimation of miRNA-21, miRNA-215 and miRNA-378 in sera by RT-PCR. miRNA-21 showed the statistically significantly highest median fold change. miRNA-378 showed statistically significantly lower value (Both showed over-expression). miRNA-215 showed the statistically significantly lowest median fold change (It showed down-regulation). Overall the miRNA (21-215 and 378) appear to be promising method of detecting CRC and evaluating its stages.

Keywords: colorectal cancer, miRNA-21, miRNA-215, miRNA-378

Procedia PDF Downloads 291