Search results for: wireless network security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7451

Search results for: wireless network security

2711 Attendance Management System Implementation Using Face Recognition

Authors: Zainab S. Abdullahi, Zakariyya H. Abdullahi, Sahnun Dahiru

Abstract:

Student attendance in schools is a very important aspect in school management record. In recent years, security systems have become one of the most demanding systems in school. Every institute have its own method of taking attendance, many schools in Nigeria use the old fashion way of taking attendance. That is writing the students name and registration number in a paper and submitting it to the lecturer at the end of the lecture which is time-consuming and insecure, because some students can write for their friends without the lecturer’s knowledge. In this paper, we propose a system that takes attendance using face recognition. There are many automatic methods available for this purpose i.e. biometric attendance, but they all waste time, because the students have to follow a queue to put their thumbs on a scanner which is time-consuming. This attendance is recorded by using a camera attached in front of the class room and capturing the student images, detect the faces in the image and compare the detected faces with database and mark the attendance. The principle component analysis was used to recognize the faces detected with a high accuracy rate. The paper reviews the related work in the field of attendance system, then describe the system architecture, software algorithm and result.

Keywords: attendance system, face detection, face recognition, PCA

Procedia PDF Downloads 358
2710 The Relationship between Human Pose and Intention to Fire a Handgun

Authors: Joshua van Staden, Dane Brown, Karen Bradshaw

Abstract:

Gun violence is a significant problem in modern-day society. Early detection of carried handguns through closed-circuit television (CCTV) can aid in preventing potential gun violence. However, CCTV operators have a limited attention span. Machine learning approaches to automating the detection of dangerous gun carriers provide a way to aid CCTV operators in identifying these individuals. This study provides insight into the relationship between human key points extracted using human pose estimation (HPE) and their intention to fire a weapon. We examine the feature importance of each keypoint and their correlations. We use principal component analysis (PCA) to reduce the feature space and optimize detection. Finally, we run a set of classifiers to determine what form of classifier performs well on this data. We find that hips, shoulders, and knees tend to be crucial aspects of the human pose when making these predictions. Furthermore, the horizontal position plays a larger role than the vertical position. Of the 66 key points, nine principal components could be used to make nonlinear classifications with 86% accuracy. Furthermore, linear classifications could be done with 85% accuracy, showing that there is a degree of linearity in the data.

Keywords: feature engineering, human pose, machine learning, security

Procedia PDF Downloads 88
2709 A Dynamic Ensemble Learning Approach for Online Anomaly Detection in Alibaba Datacenters

Authors: Wanyi Zhu, Xia Ming, Huafeng Wang, Junda Chen, Lu Liu, Jiangwei Jiang, Guohua Liu

Abstract:

Anomaly detection is a first and imperative step needed to respond to unexpected problems and to assure high performance and security in large data center management. This paper presents an online anomaly detection system through an innovative approach of ensemble machine learning and adaptive differentiation algorithms, and applies them to performance data collected from a continuous monitoring system for multi-tier web applications running in Alibaba data centers. We evaluate the effectiveness and efficiency of this algorithm with production traffic data and compare with the traditional anomaly detection approaches such as a static threshold and other deviation-based detection techniques. The experiment results show that our algorithm correctly identifies the unexpected performance variances of any running application, with an acceptable false positive rate. This proposed approach has already been deployed in real-time production environments to enhance the efficiency and stability in daily data center operations.

Keywords: Alibaba data centers, anomaly detection, big data computation, dynamic ensemble learning

Procedia PDF Downloads 196
2708 A Social Decision Support Mechanism for Group Purchasing

Authors: Lien-Fa Lin, Yung-Ming Li, Fu-Shun Hsieh

Abstract:

With the advancement of information technology and development of group commerce, people have obviously changed in their lifestyle. However, group commerce faces some challenging problems. The products or services provided by vendors do not satisfactorily reflect customers’ opinions, so that the sale and revenue of group commerce gradually become lower. On the other hand, the process for a formed customer group to reach group-purchasing consensus is time-consuming and the final decision is not the best choice for each group members. In this paper, we design a social decision support mechanism, by using group discussion message to recommend suitable options for group members and we consider social influence and personal preference to generate option ranking list. The proposed mechanism can enhance the group purchasing decision making efficiently and effectively and venders can provide group products or services according to the group option ranking list.

Keywords: social network, group decision, text mining, group commerce

Procedia PDF Downloads 483
2707 Load Balancing and Resource Utilization in Cloud Computing

Authors: Gagandeep Kaur

Abstract:

Cloud computing uses various computing resources such as CPU, memory, processor etc. which is used to deliver service over the network and is one of the emerging fields for large scale distributed computing. In cloud computing, execution of large number of tasks with available resources to achieve high performance, minimal total time for completion, minimum response time, effective utilization of resources etc. are the major research areas. In the proposed research, an algorithm has been proposed to achieve high performance in load balancing and resource utilization. The proposed algorithm is used to reduce the makespan, increase the resource utilization and performance cost for independent tasks. Further scheduling metrics based on algorithm in cloud computing has been proposed.

Keywords: resource utilization, response time, load balancing, performance cost

Procedia PDF Downloads 178
2706 A Light in the Road of Protection of Civilians: Responsibility to Protect

Authors: Zeynep Selin Acar

Abstract:

In the world of wars, it is aimed to find ways to protect civilians propound by political elites. Current threats may come from edges of the security concerns, meaning uncontrollable terrorist groups, unanticipated government-supported armed groups or separatists, and unimaginable merge of the previous with foreign supports or oppositions of which could flow into all groups– flaws of international state system. These threats resulted in transformation of inter-state system into a world system with distinctive actors and brought along the changes in strategic plans of political and military bodies, as well as adaptations of principles framing the strategies in terms of may-be-applicable international law constrained by ethical considerations. This paper aims to analyse the Responsibility to Protect (RtoP), being one of those, with its criteria aiming to regulate military interventions taking the protection of civilians both as the reason for intervention, jus ad bellum or right to war, and as the duties during the intervention, jus in bello or how to conduct the war. In addition it will discuss the rise of its bindingness in terms of Responsibility Not to Veto (RNtoV), Franco/Mexican Political Declaration opened in signature for UN member states on September 2015.

Keywords: civilian protection, protection as responsibility, responsibility to protect, responsibility not to veto

Procedia PDF Downloads 258
2705 Political and Economic Transition of People with Disabilities Related to Globalization

Authors: Jihye Jeon

Abstract:

This paper analyzes the political and economic issues that people with disabilities face related to globalization; how people with disabilities have been adapting globalization and surviving under worldwide competition system. It explains that economic globalization exacerbates inequality and deprivation of people with disabilities. The rising tide of neo-liberal welfare policies emphasized efficiency, downsized social expenditure for people with disabilities, excluded people with disabilities against labor market, and shifted them from welfare system to nothing. However, there have been people with disabilities' political responses to globalization, which are characterized by a global network of people with disabilities as well as participation to global governance. Their resistance can be seen as an attempt to tackle the problems that economic globalization has produced. It is necessary paradigm shift of disability policy from dependency represented by disability benefits to independency represented by labor market policies for people with disabilities.

Keywords: economic globalization, people with disability, deprivation, welfare cut, disability right movement, resistance

Procedia PDF Downloads 460
2704 The Role of Mobile Applications on Consumerism Case Study: Snappfood Application

Authors: Vajihe Fasihi

Abstract:

With the advancement of technology and the expansion of the Internet, a significant change in lifestyle and consumption can be seen in societies. The increasing number of mobile applications (such as SnappFood) has expanded the scope of using apps for wider access to services to citizens and meets the needs of a large number of citizens in the shortest time and with reasonable quality. First, this article seeks to understand the concept and function of the Internet distribution network on the Iranian society, which was investigated in a smaller sample (students of the Faculty of Social Sciences of the Tehran university ) and uses the semi-structured interview method, and then explores the concept of consumerism. The main issue of this research is the effect of mobile apps, especially SnappFood, on increasing consumption and the difference between real needs and false needs among consumers. The findings of this research show that the use of the mentioned program has been effective in increasing the false needs of the sample community and has led to the phenomenon of consumerism.

Keywords: consumerism economics, false needs, mobile applications, reel needs

Procedia PDF Downloads 51
2703 A Hybrid Distributed Algorithm for Solving Job Shop Scheduling Problem

Authors: Aydin Teymourifar, Gurkan Ozturk

Abstract:

In this paper, a distributed hybrid algorithm is proposed for solving the job shop scheduling problem. The suggested method executes different artificial neural networks, heuristics and meta-heuristics simultaneously on more than one machine. The neural networks are used to control the constraints of the problem while the meta-heuristics search the global space and the heuristics are used to prevent the premature convergence. To attain an efficient distributed intelligent method for solving big and distributed job shop scheduling problems, Apache Spark and Hadoop frameworks are used. In the algorithm implementation and design steps, new approaches are applied. Comparison between the proposed algorithm and other efficient algorithms from the literature shows its efficiency, which is able to solve large size problems in short time.

Keywords: distributed algorithms, Apache Spark, Hadoop, job shop scheduling, neural network

Procedia PDF Downloads 383
2702 Quantitative Analysis Of Traffic Dynamics And Violation Patterns Triggered By Cruise Ship Tourism In Victoria, British Columbia

Authors: Muhammad Qasim, Laura Minet

Abstract:

Victoria (BC), Canada, is a major cruise ship destination, attracting over 600,000 tourists annually. Residents of the James Bay neighborhood, home to the Ogden Point cruise terminal, have expressed concerns about the impacts of cruise ship activity on local traffic, air pollution, and safety compliance. This study evaluates the effects of cruise ship-induced traffic in James Bay, focusing on traffic flow intensification, density surges, changes in traffic mix, and speeding violations. To achieve these objectives, traffic data was collected in James Bay during two key periods: May, before the peak cruise season, and August, during full cruise operations. Three Miovision cameras captured the vehicular traffic mix at strategic entry points, while nine traffic counters monitored traffic distribution and speeding violations across the network. Traffic data indicated an average volume of 308 vehicles per hour during peak cruise times in May, compared to 116 vehicles per hour when no ships were in port. Preliminary analyses revealed a significant intensification of traffic flow during cruise ship "hoteling hours," with a volume increase of approximately 10% per cruise ship arrival. A notable 86% surge in taxi presence was observed on days with three cruise ships in port, indicating a substantial shift in traffic composition, particularly near the cruise terminal. The number of tourist buses escalated from zero in May to 32 in August, significantly altering traffic dynamics within the neighborhood. The period between 8 pm and 11 pm saw the most significant increases in traffic volume, especially when three ships were docked. Higher vehicle volumes were associated with a rise in speed violations, although this pattern was inconsistent across all areas. Speeding violations were more frequent on roads with lower traffic density, while roads with higher traffic density experienced fewer violations, due to reduced opportunities for speeding in congested conditions. PTV VISUM software was utilized for fuzzy distribution analysis and to visualize traffic distribution across the study area, including an assessment of the Level of Service on major roads during periods before and during the cruise ship season. This analysis identified the areas most affected by cruise ship-induced traffic, providing a detailed understanding of the impact on specific parts of the transportation network. These findings underscore the significant influence of cruise ship activity on traffic dynamics in Victoria, BC, particularly during peak periods when multiple ships are in port. The study highlights the need for targeted traffic management strategies to mitigate the adverse effects of increased traffic flow, changes in traffic mix, and speed violations, thereby enhancing road safety in the James Bay neighborhood. Further research will focus on detailed emissions estimation to fully understand the environmental impacts of cruise ship activity in Victoria.

Keywords: cruise ship tourism, air quality, traffic violations, transport dynamics, pollution

Procedia PDF Downloads 15
2701 Sensitivity Analysis for 14 Bus Systems in a Distribution Network with Distributed Generators

Authors: Lakshya Bhat, Anubhav Shrivastava, Shiva Rudraswamy

Abstract:

There has been a formidable interest in the area of Distributed Generation in recent times. A wide number of loads are addressed by Distributed Generators and have better efficiency too. The major disadvantage in Distributed Generation is voltage control- is highlighted in this paper. The paper addresses voltage control at buses in IEEE 14 Bus system by regulating reactive power. An analysis is carried out by selecting the most optimum location in placing the Distributed Generators through load flow analysis and seeing where the voltage profile rises. MATLAB programming is used for simulation of voltage profile in the respective buses after introduction of DG’s. A tolerance limit of +/-5% of the base value has to be maintained. To maintain the tolerance limit, 3 methods are used. Sensitivity analysis of 3 methods for voltage control is carried out to determine the priority among the methods.

Keywords: distributed generators, distributed system, reactive power, voltage control, sensitivity analysis

Procedia PDF Downloads 697
2700 An Enhanced Connectivity Aware Routing Protocol for Vehicular Ad Hoc Networks

Authors: Ahmadu Maidorawa, Kamalrulnizam Abu Bakar

Abstract:

This paper proposed an Enhanced Connectivity Aware Routing (ECAR) protocol for Vehicular Ad hoc Network (VANET). The protocol uses a control broadcast to reduce the number of overhead packets needed in a route discovery process. It is also equipped with an alternative backup route that is used whenever a primary path to destination failed, which highly reduces the frequent launching and re-launching of the route discovery process that waste useful bandwidth and unnecessarily prolonging the average packet delay. NS2 simulation results show that the performance of ECAR protocol outperformed the original connectivity aware routing (CAR) protocol by reducing the average packet delay by 28%, control overheads by 27% and increased the packet delivery ratio by 22%.

Keywords: alternative path, primary path, protocol, routing, VANET, vehicular ad hoc networks

Procedia PDF Downloads 397
2699 History and Survey on Volunteer Fire Departments in Serbia

Authors: Mirjana Đ. Laban, Dragan N. Đurica, Nemanja M. Erceg

Abstract:

Volunteer fire departments (VFD) in Serbia were established as civic associations in XIX Century. The founders and members of the first VFDs were prominent members of local communities. Today, those are volunteer organizations for preventing and extinguishing fires and rescuing people and property in various accidents. The paper presents the results of research about the number and resources of active VFDs done in Autonomous Province of Vojvodina, Serbia and about activities they perform today. The survey was done based on data provided by all registered VFDs in Vojvodina. Firefighters Association of Vojvodina includes 35 municipal firefighting associations, 230 volunteer fire departments with 5,300 active members in qualified fire units and more than 15,000 supporting members. Volunteer involvement is primarily an expression of high moral values and as such it has to be respected and stimulated. Better position of the volunteers would have a major impact on the formation of safety culture concept and general public awareness of fire safety and risk reduction, and therefore the security of the society as a whole. Volunteer fire departments make a significant contribution to educate young people and prevent catastrophic consequences of fires and natural disasters.

Keywords: education, prevention, rescue, volunteer fire departments

Procedia PDF Downloads 197
2698 Comparison of ANFIS Update Methods Using Genetic Algorithm, Particle Swarm Optimization, and Artificial Bee Colony

Authors: Michael R. Phangtriastu, Herriyandi Herriyandi, Diaz D. Santika

Abstract:

This paper presents a comparison of the implementation of metaheuristic algorithms to train the antecedent parameters and consequence parameters in the adaptive network-based fuzzy inference system (ANFIS). The algorithms compared are genetic algorithm (GA), particle swarm optimization (PSO), and artificial bee colony (ABC). The objective of this paper is to benchmark well-known metaheuristic algorithms. The algorithms are applied to several data set with different nature. The combinations of the algorithms' parameters are tested. In all algorithms, a different number of populations are tested. In PSO, combinations of velocity are tested. In ABC, a different number of limit abandonment are tested. Experiments find out that ABC is more reliable than other algorithms, ABC manages to get better mean square error (MSE) than other algorithms in all data set.

Keywords: ANFIS, artificial bee colony, genetic algorithm, metaheuristic algorithm, particle swarm optimization

Procedia PDF Downloads 348
2697 Analyzing the Effect of Remittances Transfer on the Socio-Economic Well-Being of Left behind Parents: A Study of Pakistan and Azad Jammu and Kashmir

Authors: Asia Ashfaq, Muhammad Saud

Abstract:

The present study aims to highlight the socio-economic aspect of international migration by analyzing the effect of remittances sent by adult male children on the well-being of left behind parents. Well-being of left behind parents was operationalized through two indicators as financial security and health-care facilities. For this purpose, quantitative research design was employed and a survey was conducted in three cities i.e. Gujrat, Jhelum and Mirpur. The data was collected from 94 respondents chosen--purposively--on the basis of certain characteristics including demographic profile of the respondents and their male children who must be living abroad. The findings of the study revealed that parents were getting money from their sons regularly. Parents were getting financial assistance from their children for managing their household expenditures, visiting good hospitals and the specialist doctors in case of illness. Lastly, the study concluded that the economic aspect of migration of male children has a significant impact on the health status of left behind parents with the value of correlation (r) =0.241 and level of significance as 0.019. The research study also gives some suggestions and provides future directions for research.

Keywords: international migration, left behind parents, Pakistan, remittances, well-being

Procedia PDF Downloads 253
2696 Improving Efficiency of Organizational Performance: The Role of Human Resources in Supply Chains and Job Rotation Practice

Authors: Moh'd Anwer Al-Shboul

Abstract:

Jordan Customs (JC) has been established to achieve objectives that must be consistent with the guidance of the wise leadership and its aspirations toward tomorrow. Therefore, it has developed several needed tools to provide a distinguished service to simplify work procedures and used modern technologies. A supply chain (SC) consists of all parties that are involved directly or indirectly in order to fulfill a customer request, which includes manufacturers, suppliers, shippers, retailers and even customer brokers. Within each firm, the SC includes all functions involved in receiving a filling a customers’ requests; one of the main functions include customer service. JC and global SCs are evolving into dynamic environment, which requires flexibility, effective communication, and team management. Thus, human resources (HRs) insight in these areas are critical for the effective development of global process network. The importance of HRs has increased significantly due to the role of employees depends on their knowledge, competencies, abilities, skills, and motivations. Strategic planning in JC began at the end of the 1990’s including operational strategy for Human Resource Management and Development (HRM&D). However, a huge transformation in human resources happened at the end of 2006; new employees’ regulation for customs were prepared, approved and applied at the end of 2007. Therefore, many employees lost their positions, while others were selected based on professorial recruitment and selection process (enter new blood). One of several policies that were applied by human resources in JC department is job rotation. From the researcher’s point of view, it was not based on scientific basis to achieve its goals and objectives, which at the end leads to having a significant negative impact on the Organizational Performance (OP) and weak job rotation approach. The purpose of this study is to call attention to re-review the applying process and procedure of job rotation that HRM directorate is currently applied at JC. Furthermore, it presents an overview of managing the HRs in the SC network that affects their success. The research methodology employed in this study was described as qualitative by conducting few interviews with managers, internal employee, external clients and reviewing the related literature to collect some qualitative data from secondary sources. Thus, conducting frequently and unstructured job rotation policy (i.e. monthly) will have a significant negative impact on JC performance as a whole. The results of this study show that the main impacts will affect on three main elements in JC: (1) internal employees' performance; (2) external clients, who are dealing with customs services; and finally, JC performance as a whole. In order to implement a successful and perfect job rotation technique at JC in a scientific way and to achieve its goals and objectives; JCs should be taken into consideration the proposed solutions and recommendations that will be presented in this study.

Keywords: efficiency, supply chain, human resources, job rotation, organizational performance, Jordan customs

Procedia PDF Downloads 206
2695 Comparison of EMG Normalization Techniques Recommended for Back Muscles Used in Ergonomics Research

Authors: Saif Al-Qaisi, Alif Saba

Abstract:

Normalization of electromyography (EMG) data in ergonomics research is a prerequisite for interpreting the data. Normalizing accounts for variability in the data due to differences in participants’ physical characteristics, electrode placement protocols, time of day, and other nuisance factors. Typically, normalized data is reported as a percentage of the muscle’s isometric maximum voluntary contraction (%MVC). Various MVC techniques have been recommended in the literature for normalizing EMG activity of back muscles. This research tests and compares the recommended MVC techniques in the literature for three back muscles commonly used in ergonomics research, which are the lumbar erector spinae (LES), latissimus dorsi (LD), and thoracic erector spinae (TES). Six healthy males from a university population participated in this research. Five different MVC exercises were compared for each muscle using the Tringo wireless EMG system (Delsys Inc.). Since the LES and TES share similar functions in controlling trunk movements, their MVC exercises were the same, which included trunk extension at -60°, trunk extension at 0°, trunk extension while standing, hip extension, and the arch test. The MVC exercises identified in the literature for the LD were chest-supported shoulder extension, prone shoulder extension, lat-pull down, internal shoulder rotation, and abducted shoulder flexion. The maximum EMG signal was recorded during each MVC trial, and then the averages were computed across participants. A one-way analysis of variance (ANOVA) was utilized to determine the effect of MVC technique on muscle activity. Post-hoc analyses were performed using the Tukey test. The MVC technique effect was statistically significant for each of the muscles (p < 0.05); however, a larger sample of participants was needed to detect significant differences in the Tukey tests. The arch test was associated with the highest EMG average at the LES, and also it resulted in the maximum EMG activity more often than the other techniques (three out of six participants). For the TES, trunk extension at 0° was associated with the largest EMG average, and it resulted in the maximum EMG activity the most often (three out of six participants). For the LD, participants obtained their maximum EMG either from chest-supported shoulder extension (three out of six participants) or prone shoulder extension (three out of six participants). Chest-supported shoulder extension, however, had a larger average than prone shoulder extension (0.263 and 0.240, respectively). Although all the aforementioned techniques were superior in their averages, they did not always result in the maximum EMG activity. If an accurate estimate of the true MVC is desired, more than one technique may have to be performed. This research provides additional MVC techniques for each muscle that may elicit the maximum EMG activity.

Keywords: electromyography, maximum voluntary contraction, normalization, physical ergonomics

Procedia PDF Downloads 189
2694 Developing Geriatric Oral Health Network is a Public Health Necessity for Older Adults

Authors: Maryam Tabrizi, Shahrzad Aarup

Abstract:

Objectives- Understanding the close association between oral health and overall health for older adults at the right time and right place, a person, focus treatment through Project ECHO telementoring. Methodology- Data from monthly ECHO telementoring sessions were provided for three years. Sessions including case presentations, overall health conditions, considering medications, organ functions limitations, including the level of cognition. Contributions- Providing the specialist level of providing care to all elderly regardless of their location and other health conditions and decreasing oral health inequity by increasing workforce via Project ECHO telementoring program worldwide. By 2030, the number of adults in the USA over the age of 65 will increase more than 60% (approx.46 million) and over 22 million (30%) of 74 million older Americans will need specialized geriatrician care. In 2025, a national shortage of medical geriatricians will be close to 27,000. Most individuals 65 and older do not receive oral health care due to lack of access, availability, or affordability. One of the main reasons is a significant shortage of Oral Health (OH) education and resources for the elderly, particularly in rural areas. Poor OH is a social stigma, a thread to quality and safety of overall health of the elderly with physical and cognitive decline. Poor OH conditions may be costly and sometimes life-threatening. Non-traumatic dental-related emergency department use in Texas alone was over $250 M in 2016. Most elderly over the age of 65 present with at least one or multiple chronic diseases such as arthritis, diabetes, heart diseases, and chronic obstructive pulmonary disease (COPD) are at higher risk to develop gum (periodontal) disease, yet they are less likely to get dental care. In addition, most older adults take both prescription and over-the-counter drugs; according to scientific studies, many of these medications cause dry mouth. Reduced saliva flow due to aging and medications may increase the risk of cavities and other oral conditions. Most dental schools have already increased geriatrics OH in their educational curriculums, but the aging population growth worldwide is faster than growing geriatrics dentists. However, without the use of advanced technology and creating a network between specialists and primary care providers, it is impossible to increase the workforce, provide equitable oral health to the elderly. Project ECHO is a guided practice model that revolutionizes health education and increases the workforce to provide best-practice specialty care and reduce health disparities. Training oral health providers for utilizing the Project ECHO model is a logical response to the shortage and increases oral health access to the elderly. Project ECHO trains general dentists & hygienists to provide specialty care services. This means more elderly can get the care they need, in the right place, at the right time, with better treatment outcomes and reduces costs.

Keywords: geriatric, oral health, project echo, chronic disease, oral health

Procedia PDF Downloads 172
2693 Comparison of DPC and FOC Vector Control Strategies on Reducing Harmonics Caused by Nonlinear Load in the DFIG Wind Turbine

Authors: Hamid Havasi, Mohamad Reza Gholami Dehbalaei, Hamed Khorami, Shahram Karimi, Hamdi Abdi

Abstract:

Doubly-fed induction generator (DFIG) equipped with a power converter is an efficient tool for converting mechanical energy of a variable speed system to a fixed-frequency electrical grid. Since electrical energy sources faces with production problems such as harmonics caused by nonlinear loads, so in this paper, compensation performance of DPC and FOC method on harmonics reduction of a DFIG wind turbine connected to a nonlinear load in MATLAB Simulink model has been simulated and effect of each method on nonlinear load harmonic elimination has been compared. Results of the two mentioned control methods shows the advantage of the FOC method on DPC method for harmonic compensation. Also, the fifth and seventh harmonic components of the network and THD greatly reduced.

Keywords: DFIG machine, energy conversion, nonlinear load, THD, DPC, FOC

Procedia PDF Downloads 586
2692 An Interpretive Phenomenological Approach to Children’s Experience of Infidelity in Iran: Consequences and Hurts

Authors: Mehravar Javid, Stacey Dershewitz, Shohreh Hashemighoochani, Artin Yousefi

Abstract:

One of the most common reasons for destroying relationships is infidelity. This study was conducted to understand children's experience of infidelity in Iran. In this qualitative research, the interpretive phenomenological approach and theoretical (purposive) sampling method were used, and the data was saturated by conducting semi-structured interviews with eight offspring of families affected by infidelity. All interviews were audio recorded and analyzed on paper after implementation. Acceptability and homogeneity of data were confirmed by different methods. Eight main themes were identified from the participants' statements: description of the family atmosphere, lack of security and distrust, emotional reactions, behavioral reactions, worry about the future, financial problems, mother's physical-psychological state, and mother's coping strategies and offspring's proposed solutions. The children's experiences showed that in addition to causing irreparable harm to the wife, infidelity affected the whole family and caused the children to suffer crucial consequences such as emotional, behavioral, educational, and economic consequences and mistrust.

Keywords: consequences and hurt, infidelity, offspring, phenomenology, qualitative research

Procedia PDF Downloads 56
2691 Management Competency in Logistical Function: The Skills That Will Master a Logistical Manager

Authors: Fatima Ibnchahid

Abstract:

Competence approach is considered, since the early 80's as one of the major development of HR policies. Many approaches to manage the professional skills were declined. Some processes are mature whereas the others have been abandoned. Competence can be defined as the set of knowledge (theoretical and practical), know-how (experience) and life skills (personality traits) mobilized by a person in the company. The skills must master a logistics manager are divided into two main categories: depending on whether technical skills, or managerial skills and human. The firsts are broken down into skills on logistical techniques and on general skills in business, seconds in social skills (self with others) and personal (with oneself). Logisticians are faced with new challenges and new constraints that are revolutionizing the way to treat the physical movement of goods and operations related to information flows that trigger, they control and guide the physical movements of these major changes, we can mention the development of information technology and communication, the emergence of strong environmental and security constraints. These changes have important effects on the skills needs of the members of the logistical function and sensitive development for training requested by logistical managers to perform better in their job changes. In this article, we will address two main points, first, a brief overview of the management skills and secondly answer the question asked in the title of the article to know what are the skills that will master a logistical manager.

Keywords: skills, competence, management, logistical function

Procedia PDF Downloads 274
2690 Diagnosis of the Lubrification System of a Gas Turbine Using the Adaptive Neuro-Fuzzy Inference System

Authors: H. Mahdjoub, B. Hamaidi, B. Zerouali, S. Rouabhia

Abstract:

The issue of fault detection and diagnosis (FDD) has gained widespread industrial interest in process condition monitoring applications. Accordingly, the use of neuro-fuzzy technic seems very promising. This paper treats a diagnosis modeling a strategic equipment of an industrial installation. We propose a diagnostic tool based on adaptive neuro-fuzzy inference system (ANFIS). The neuro-fuzzy network provides an abductive diagnosis. Moreover, it takes into account the uncertainties on the maintenance knowledge by giving a fuzzy characterization of each cause. This work was carried out with real data of a lubrication circuit from the gas turbine. The machine of interest is a gas turbine placed in a gas compressor station at South Industrial Centre (SIC Hassi Messaoud Ouargla, Algeria). We have defined the zones of good and bad functioning, and the results are presented to demonstrate the advantages of the proposed method.

Keywords: fault detection and diagnosis, lubrication system, turbine, ANFIS, training, pattern recognition

Procedia PDF Downloads 484
2689 Countering Violent Extremism: Challenges and Possibilities for Muslim Ummah

Authors: Altaf Ahmed

Abstract:

Unhindered progress and advancement of life are directly associated with peace and development. Unfortunately, many modern states are prone to the perilous of social challenges; Violent Extremism is the most ubiquitous adversary among all. Islam in its origin fully supports peace and security; the charter of Madina, the treaty of Hudabia and conquer of Mecca are the biggest examples in this reference. The holy Prophet Muhammad ﷺ always gave priority to peace in these cases. Today, the majority of the Muslim World faces VE and terrorism due to multiple reasons ranging from religious interpretations to political, social and economic conditions. This research will try to explore challenges for Muslim Ummah in maintaining peace and what steps have been taken by it to resolve conflicts among states. In this context, Sustainable development goals (SDGs) will be particularly analysed. SDGs were adopted by all United Nations Member States in 2015. It is an undeniable fact that these are the best peace-building tools. Although there are 17 SDGs, the paper will mainly focus on quality education, zero hunger, end of poverty (social protection), women empowerment, reduced inequalities and economic growth as the best peace-building approaches for eradication of violent extremism.

Keywords: violent extremism, Muslim Ummah, peace, modern world, education

Procedia PDF Downloads 112
2688 An Exhaustive All-Subsets Examination of Trade Theory on WTO Data

Authors: Masoud Charkhabi

Abstract:

We examine trade theory with this motivation. The full set of World Trade Organization data are organized into country-year pairs, each treated as a different entity. Topological Data Analysis reveals that among the 16 region and 240 region-year pairs there exists in fact a distinguishable group of region-period pairs. The generally accepted periods of shifts from dissimilar-dissimilar to similar-similar trade in goods among regions are examined from this new perspective. The period breaks are treated as cumulative and are flexible. This type of all-subsets analysis is motivated from computer science and is made possible with Lossy Compression and Graph Theory. The results question many patterns in similar-similar to dissimilar-dissimilar trade. They also show indications of economic shifts that only later become evident in other economic metrics.

Keywords: econometrics, globalization, network science, topological data, analysis, trade theory, visualization, world trade

Procedia PDF Downloads 368
2687 Fault Diagnosis of Squirrel-Cage Induction Motor by a Neural Network Multi-Models

Authors: Yahia. Kourd, N. Guersi D. Lefebvre

Abstract:

In this paper we propose to study the faults diagnosis in squirrel-cage induction motor using MLP neural networks. We use neural healthy and faulty models of the behavior in order to detect and isolate some faults in machine. In the first part of this work, we have created a neural model for the healthy state using Matlab and a motor located in LGEB by acquirins data inputs and outputs of this engine. Then we detected the faults in the machine by residual generation. These residuals are not sufficient to isolate the existing faults. For this reason, we proposed additive neural networks to represent the faulty behaviors. From the analysis of these residuals and the choice of a threshold we propose a method capable of performing the detection and diagnosis of some faults in asynchronous machines with squirrel cage rotor.

Keywords: faults diagnosis, neural networks, multi-models, squirrel-cage induction motor

Procedia PDF Downloads 631
2686 Design of Active Power Filters for Harmonics on Power System and Reducing Harmonic Currents

Authors: Düzgün Akmaz, Hüseyin Erişti

Abstract:

In the last few years, harmonics have been occurred with the increasing use of nonlinear loads, and these harmonics have been an ever increasing problem for the line systems. This situation importantly affects the quality of power and gives large losses to the network. An efficient way to solve these problems is providing harmonic compensation through parallel active power filters. Many methods can be used in the control systems of the parallel active power filters which provide the compensation. These methods efficiently affect the performance of the active power filters. For this reason, the chosen control method is significant. In this study, Fourier analysis (FA) control method and synchronous reference frame (SRF) control method are discussed. These control methods are designed for both eliminate harmonics and perform reactive power compensation in MATLAB/Simulink pack program and are tested. The results have been compared for each two methods.

Keywords: parallel active power filters, harmonic compensation, power quality, harmonics

Procedia PDF Downloads 451
2685 Modifying Byzantine Fault Detection Using Disjoint Paths

Authors: Mehmet Hakan Karaata, Ali Hamdan, Omer Yusuf Adam Mohamed

Abstract:

Consider a distributed system that delivers messages from a process to another. Such a system is often required to deliver each message to its destination regardless of whether or not the system components experience arbitrary forms of faults. In addition, each message received by the destination must be a message sent by a system process. In this paper, we first identify the necessary and sufficient conditions to detect some restricted form of Byzantine faults referred to as modifying Byzantine faults. An observable form of a Byzantine fault whose effect is limited to the modification of a message metadata or content, timing and omission faults, and message replay is referred to as a modifying Byzantine fault. We then present a distributed protocol to detect modifying Byzantine faults using optimal number of messages over node-disjoint paths.

Keywords: Byzantine faults, distributed systems, fault detection, network pro- tocols, node-disjoint paths

Procedia PDF Downloads 562
2684 The Impact of Artificial Intelligence on Human Rights Priciples and Obligations

Authors: Adel Atta Youssef Rezkalla

Abstract:

Russia's invasion of Ukraine tested the international community and prompted not only states but also non-state actors to take deterrent measures in response. In fact, international sports federations, notably FIFA and UEFA, have managed to shift the power dynamic quite effectively by imposing a blanket ban on Russian national teams and clubs. The purpose of this article is to examine the human rights consequences of such actions by international sports organizations. First, the article moves away from assessing the legal status of FIFA and UEFA under international law and examines the question of how a legal connection can be established with their human rights obligations. Secondly, the human rights aspects of the controversial FIFA and UEFA measures against Russian athletes are examined and these are analyzed in more detail using the proportionality test than the principle of non-discrimination under international human rights law. Finally, the main avenues for redress for possible human rights violations related to the actions taken by these organizations are identified and the challenges of arbitration and litigation in Switzerland are highlighted.

Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security.

Procedia PDF Downloads 72
2683 Controller Design and Experimental Evaluation of a Motorized Assistance for a Patient Transfer Floor Lift

Authors: Donatien Callon, Ian Lalonde, Mathieu Nadeau, Alexandre Girard

Abstract:

Patient transfer is a challenging, critical task because it exposes caregivers to injury risks. Available transfer devices, like floor lifts, lead to improvements but are far from perfect. They do not eliminate the caregivers’ risk of musculoskeletal disorders, and they can be burdensome to use due to their poor maneuverability. This paper presents a new motorized floor lift with a single central motorized wheel connected to an instrumented handle. Admittance controllers are designed to 1) improve the device maneuverability, 2) reduce the required caregiver effort, and 3) ensure the security and comfort of patients. Two controller designs, one with a linear admittance law and a non-linear admittance law with variable damping, were developed and implemented on a prototype. Tests were performed on seven participants to evaluate the performance of the assistance system and the controllers. The experimental results show that 1) the motorized assistance with the variable damping controller improves maneuverability by 28%, 2) reduces the amount of effort required to push the lift by 66%, and 3) provides the same level of patient comfort compared to a standard unassisted floor lift.

Keywords: floor lift, human robot interaction, admittance controller, variable admittance

Procedia PDF Downloads 105
2682 Sensitivity Analysis for 14 Bus Systems in a Distribution Network with Distribution Generators

Authors: Lakshya Bhat, Anubhav Shrivastava, Shivarudraswamy

Abstract:

There has been a formidable interest in the area of Distributed Generation in recent times. A wide number of loads are addressed by Distributed Generators and have better efficiency too. The major disadvantage in Distributed Generation is voltage control- is highlighted in this paper. The paper addresses voltage control at buses in IEEE 14 Bus system by regulating reactive power. An analysis is carried out by selecting the most optimum location in placing the Distributed Generators through load flow analysis and seeing where the voltage profile rises. Matlab programming is used for simulation of voltage profile in the respective buses after introduction of DG’s. A tolerance limit of +/-5% of the base value has to be maintained.To maintain the tolerance limit , 3 methods are used. Sensitivity analysis of 3 methods for voltage control is carried out to determine the priority among the methods.

Keywords: distributed generators, distributed system, reactive power, voltage control, sensitivity analysis

Procedia PDF Downloads 585