Search results for: active distribution network (ADN)
12079 Coevaluations Software among Students in Active Learning Methodology
Authors: Adriano Pinargote, Josue Mosquera, Eduardo Montero, Dalton Noboa, Jenny Venegas, Genesis Vasquez Escuela
Abstract:
In the framework of Pre University learning of the Polytechnic School of the Litoral, Guayaquil, Ecuador, the methodology of Active Learning (Flipped Classroom) has been implemented for applicants who wish to obtain a quota within the university. To complement the Active Learning cycle, it has been proposed that the respective students influence the qualification of their work groups, for which a web platform has been created that allows them to evaluate the performance of their peers through a digital coevaluation that measures through statistical methods, the group and individual performance score that can reflect in numbers a weighting score corresponding to the grade of each student. Their feedback provided by the group help to improve the performance of the activities carried out in classes because the note reflects the commitment with their classmates shown in the class, within this analysis we will determine if this implementation directly influences the performance of the grades obtained by the student.Keywords: active learning, coevaluation, flipped classroom, pre university
Procedia PDF Downloads 13912078 Mechanism for Network Security via Routing Protocols Estimated with Network Simulator 2 (NS-2)
Authors: Rashid Mahmood, Muhammad Sufyan, Nasir Ahmed
Abstract:
The MANETs have lessened transportation and decentralized network. There are numerous basis of routing protocols. We derived the MANETs protocol into three major categories like Reactive, Proactive and hybrid. In these protocols, we discussed only some protocols like Distance Sequenced Distance Vector (DSDV), Ad hoc on Demand Distance Vector (AODV) and Dynamic Source Routing (DSR). The AODV and DSR are both reactive type of protocols. On the other hand, DSDV is proactive type protocol here. We compare these routing protocols for network security estimated by network simulator (NS-2). In this dissertation some parameters discussed such as simulation time, packet size, number of node, packet delivery fraction, push time and speed etc. We will construct all these parameters on routing protocols under suitable conditions for network security measures.Keywords: DSDV, AODV, DSR NS-2, PDF, push time
Procedia PDF Downloads 43312077 A Two Phase VNS Algorithm for the Combined Production Routing Problem
Authors: Nejah Ben Mabrouk, Bassem Jarboui, Habib Chabchoub
Abstract:
Production and distribution planning is the most important part in supply chain management. In this paper, a NP-hard production-distribution problem for one product over a multi-period horizon is investigated. The aim is to minimize the sum of costs of three items: production setups, inventories and distribution, while determining, for each period, the amount produced, the inventory levels and the delivery trips. To solve this difficult problem, we propose a bi-phase approach based on a Variable Neighbourhood Search (VNS). This heuristic is tested on 90 randomly generated instances from the literature, with 20 periods and 50, 100, 200 customers. Computational results show that our approach outperforms existing solution procedures available in the literatureKeywords: logistic, production, distribution, variable neighbourhood search
Procedia PDF Downloads 33612076 Active Power Filters and their Smart Grid Integration - Applications for Smart Cities
Authors: Pedro Esteban
Abstract:
Most installations nowadays are exposed to many power quality problems, and they also face numerous challenges to comply with grid code and energy efficiency requirements. The reason behind this is that they are not designed to support nonlinear, non-balanced, and variable loads and generators that make up a large percentage of modern electric power systems. These problems and challenges become especially critical when designing green buildings and smart cities. These problems and challenges are caused by equipment that can be typically found in these installations like variable speed drives (VSD), transformers, lighting, battery chargers, double-conversion UPS (uninterruptible power supply) systems, highly dynamic loads, single-phase loads, fossil fuel generators and renewable generation sources, to name a few. Moreover, events like capacitor switching (from existing capacitor banks or passive harmonic filters), auto-reclose operations of transmission and distribution lines, or the starting of large motors also contribute to these problems and challenges. Active power filters (APF) are one of the fastest-growing power electronics technologies for solving power quality problems and meeting grid code and energy efficiency requirements for a wide range of segments and applications. They are a high performance, flexible, compact, modular, and cost-effective type of power electronics solutions that provide an instantaneous and effective response in low or high voltage electric power systems. They enable longer equipment lifetime, higher process reliability, improved power system capacity and stability, and reduced energy losses, complying with most demanding power quality and energy efficiency standards and grid codes. There can be found several types of active power filters, including active harmonic filters (AHF), static var generators (SVG), active load balancers (ALB), hybrid var compensators (HVC), and low harmonic drives (LHD) nowadays. All these devices can be used in applications in Smart Cities bringing several technical and economic benefits.Keywords: power quality improvement, energy efficiency, grid code compliance, green buildings, smart cities
Procedia PDF Downloads 11212075 Sensitivity Analysis for 14 Bus Systems in a Distribution Network with Distribution Generators
Authors: Lakshya Bhat, Anubhav Shrivastava, Shivarudraswamy
Abstract:
There has been a formidable interest in the area of Distributed Generation in recent times. A wide number of loads are addressed by Distributed Generators and have better efficiency too. The major disadvantage in Distributed Generation is voltage control- is highlighted in this paper. The paper addresses voltage control at buses in IEEE 14 Bus system by regulating reactive power. An analysis is carried out by selecting the most optimum location in placing the Distributed Generators through load flow analysis and seeing where the voltage profile rises. Matlab programming is used for simulation of voltage profile in the respective buses after introduction of DG’s. A tolerance limit of +/-5% of the base value has to be maintained.To maintain the tolerance limit , 3 methods are used. Sensitivity analysis of 3 methods for voltage control is carried out to determine the priority among the methods.Keywords: distributed generators, distributed system, reactive power, voltage control, sensitivity analysis
Procedia PDF Downloads 58712074 Dynamic Active Earth Pressure on Flexible Cantilever Retaining Wall
Authors: Snehal R. Pathak, Sachin S. Munnoli
Abstract:
Evaluation of dynamic earth pressure on retaining wall is a topic of primary importance. In present paper, dynamic active earth pressure and displacement of flexible cantilever retaining wall has been evaluated analytically using 2-DOF mass-spring-dashpot model by incorporating both wall and backfill properties. The effect of wall flexibility on dynamic active earth pressure and wall displacement are studied and presented in graphical form. The obtained results are then compared with the various conventional methods, experimental analysis and also with PLAXIS analysis. It is observed that the dynamic active earth pressure decreases with increase in the wall flexibility while wall displacement increases linearly with flexibility of the wall. The results obtained by proposed 2-DOF analytical model are found to be more realistic and economical.Keywords: earth pressure, earthquake, 2-DOF model, Plaxis, retaining walls, wall movement
Procedia PDF Downloads 53912073 Antioxidant, Hypoglycemic and Hypotensive Effects Affected by Various Molecular Weights of Cold Water Extract from Pleurotus Citrinopileatus
Authors: Pao-Huei Chen, Shu-Mei Lin, Yih-Ming Weng, Zer-Ran Yu, Be-Jen Wang
Abstract:
Pancreatic α-amylase and intestinal α-glucosidase are the critical enzymes for the breakdown of complex carbohydrates into di- or mono-saccharide, which play an important role in modulating postprandial blood sugars. Angiotensin converting enzyme (ACE) converts inactive angiotensin-I into active angiotensin-II, which subsequently increase blood pressure through triggering vasoconstriction and aldosterone secretion. Thus, inhibition of carbohydrate-digestion enzymes and ACE will help the management of blood glucose and blood pressure, respectively. Studies showed Pleurotus citrinopileatus (PC), an edible mushroom and commonly cultured in oriental countries, exerted anticancer, immune improving, antioxidative, hypoglycemic and hypolipidemic effects. Previous studies also showed various molecular weights (MW) fractioned from extracts may affect biological activities due to varying contents of bioactive components. Thus, the objective of this study is to investigate the in vitro antioxidant, hypoglycemic and hypotenstive effects and distribution of active compounds of various MWs of cold water extract from P. citrinopileatus (CWEPC). CWEPC was fractioned into four various MW fractions, PC-I (<1 kDa), PC-II (1-3.5 kDa), PC-III (3.5-10 kDa), and PC-IV (>10 kDa), using an ultrafiltration system. The physiological activities, including antioxidant activities, the inhibition capabilities of pancreatic α-amylase, intestinal α-glucosidase, and hypertension-linked ACE, and the active components, including polysaccharides, protein, and phenolic contents, of CWEPC and four fractions were determined. The results showed that fractions with lower MW exerted a higher antioxidant activity (p<0.05), which was positively correlated to the levels of total phenols. In contrast, the inhibition effects on the activities of α-amylase, α-glucosidase, and ACE of PC-IV fraction were significantly higher than CWEPC and the other three low MW fractions (< 10 kDa), which was more related to protein contents. The inhibition capability of CWEPC and PC-IV on α-amylase activity was 1/13.4 to 1/2.7 relative to that of acarbose (positive control), respectively. However, the inhibitory ability of PC-IV on α-glucosidase (IC50 = 0.5 mg/mL) was significantly higher than acarbose (IC50 = 1.7 mg/mL). Kinetic data revealed that PC-IV fraction followed a non-competitive inhibition on α-glucosidase activity. In conclusion, the distribution of various bioactive components contribute to the functions of different MW fractions on oxidative stress prevention, and blood pressure and glucose modulation.Keywords: α-Amylase, angiotensin converting enzyme, α-Glucosidase, Pleurotus citrinopileatus
Procedia PDF Downloads 46012072 A Unification and Relativistic Correction for Boltzmann’s Law
Authors: Lloyd G. Allred
Abstract:
The distribution of velocities of particles in plasma is a well understood discipline of plasma physics. Boltzmann’s law and the Maxwell-Boltzmann distribution describe the distribution of velocity of a particle in plasma as a function of mass and temperature. Particles with the same mass tend to have the same velocity. By expressing the same law in terms of energy alone, the author obtains a distribution independent of mass. In summary, for particles in plasma, the energies tend to equalize, independent of the masses of the individual particles. For high-energy plasma, the original law predicts velocities greater than the speed of light. If one uses Einstein’s formula for energy (E=mc2), then a relativistic correction is not required.Keywords: cosmology, EMP, plasma physics, relativity
Procedia PDF Downloads 21912071 Internet-Based Architecture for Machine-to-Machine Communication of a Public Security Network
Authors: Ogwueleka Francisca Nonyelum, Jiya Muhammad
Abstract:
Poor communication between the victims of the burglaries, road and fire accidents and the agencies, and lack of quick emergency response by the agencies is solved through Machine-to-Machine (M2M) communication. A distress caller is expected to make a call through a network to the respective agency for emergency response but due to some challenges, this often becomes arduous and futile. This research puts forth an Internet-based architecture for Machine-to-Machine (M2M) communication to enhance information dissemination in National Public Security Communication System (NPSCS) network. M2M enables the flow of data between machines and machines and ultimately machines and people with information flowing from a machine over a network, and then through a gateway to a system where it is reviewed and acted on. The research findings showed that Internet-based architecture for M2M communication is most suitable for deployment of a public security network which will allow machines to use Internet to talk to each other.Keywords: machine-to-machine (M2M), internet-based architecture, network, gateway
Procedia PDF Downloads 48212070 Optimal and Critical Path Analysis of State Transportation Network Using Neo4J
Authors: Pallavi Bhogaram, Xiaolong Wu, Min He, Onyedikachi Okenwa
Abstract:
A transportation network is a realization of a spatial network, describing a structure which permits either vehicular movement or flow of some commodity. Examples include road networks, railways, air routes, pipelines, and many more. The transportation network plays a vital role in maintaining the vigor of the nation’s economy. Hence, ensuring the network stays resilient all the time, especially in the face of challenges such as heavy traffic loads and large scale natural disasters, is of utmost importance. In this paper, we used the Neo4j application to develop the graph. Neo4j is the world's leading open-source, NoSQL, a native graph database that implements an ACID-compliant transactional backend to applications. The Southern California network model is developed using the Neo4j application and obtained the most critical and optimal nodes and paths in the network using centrality algorithms. The edge betweenness centrality algorithm calculates the critical or optimal paths using Yen's k-shortest paths algorithm, and the node betweenness centrality algorithm calculates the amount of influence a node has over the network. The preliminary study results confirm that the Neo4j application can be a suitable tool to study the important nodes and the critical paths for the major congested metropolitan area.Keywords: critical path, transportation network, connectivity reliability, network model, Neo4j application, edge betweenness centrality index
Procedia PDF Downloads 13312069 Social Network Analysis in Water Governance
Authors: Faribaebrahimi, Mehdi Ghorbani, Mohsen Mohsenisaravi
Abstract:
Ecosystem management is complex because of natural and human issues. To cope with this complexity water governance is recommended since it involves all stakeholders including people, governmental and non-governmental organization who related to environmental systems. Water governance emphasizes on water co-management through consideration of all the stakeholders in the form of social and organizational network. In this research, to illustrate indicators of water governance in Dorood watershed, in Shemiranat region of Iran, social network analysis had been applied. The results revealed that social cohesion among pastoralists in Dorood is medium because of trust links, while link sustainability is weak to medium. According to the results, some pastoralists have high social power and therefore are key actors in the utilization network, regarding to centrality index and trust links. The results also demonstrated that Agricultural Development Office and (Shemshak-Darbandsar Islamic) Council are key actors in rangeland co-management, based on centrality index in rangeland institutional network at regional scale in Shemiranat district.Keywords: social network analysis, water governance, organizational network, water co-management
Procedia PDF Downloads 35112068 Analysis of the Omnichannel Delivery Network with Application to Last Mile Delivery
Authors: Colette Malyack, Pius Egbelu
Abstract:
Business-to-Customer (B2C) delivery options have improved to meet increased demand in recent years. The change in end users has forced logistics networks to focus on customer service and sentiment that would have previously been the priority of the company or organization of origin. This has led to increased pressure on logistics companies to extend traditional B2B networks into a B2C solution while accommodating additional costs, roadblocks, and customer sentiment; the result has been the creation of the omnichannel delivery network encompassing a number of traditional and modern methods of package delivery. In this paper the many solutions within the omnichannel delivery network are defined and discussed. It can be seen through this analysis that the omnichannel delivery network can be applied to reduce the complexity of package delivery and provide customers with more options. Applied correctly the result is a reduction in cost to the logistics company over time, even with an initial increase in cost to obtain the technology.Keywords: network planning, last mile delivery, omnichannel delivery network, omnichannel logistics
Procedia PDF Downloads 15012067 Active Imagination: The Effective Factor in the Practice of Psychotherapy
Authors: Sonia Regina Lyra
Abstract:
The desire for unequivocal clarity is understandable, but this can make one forget that things of the soul are experiential processes, or transformations, which should never be designated unilaterally if it is not wanted to transform something that moves, a living thing, into something static. Among the so-called ‘things of the soul’ there are especially spontaneous fantasies, that emerge during the processes, as a result from the use of the active imagination technique, for when fantasy is not forced, violated, or subjugated by an illegitimate, intellectually preconceived idea, then it is a legitimate and authentic product of the unconscious mind. This is how one can gain access to unadulterated information about everything that transcends the conscious mind. However, it is vital to discern between ego and non-ego, because this principle will result in a release of energy and a renewal of life, which will come to have meaning. This study will deal with the active imagination as a knowledge that depends on the individual experience of the therapist because the patient will be taken just to reach where the unconscious of the therapist was assimilated to his own conscience. In this way, the therapist becomes the method itself, being his personality, a fundamental part of an effective factor.Keywords: active imagination, effective factor, synchronicity, symptom
Procedia PDF Downloads 19812066 Optimization of Interface Radio of Universal Mobile Telecommunication System Network
Authors: O. Mohamed Amine, A. Khireddine
Abstract:
Telecoms operators are always looking to meet their share of the other customers, they try to gain optimum utilization of the deployed equipment and network optimization has become essential. This project consists of optimizing UMTS network, and the study area is an urban area situated in the center of Algiers. It was initially questions to become familiar with the different communication systems (3G) and the optimization technique, its main components, and its fundamental characteristics radios were introduced.Keywords: UMTS, UTRAN, WCDMA, optimization
Procedia PDF Downloads 38312065 Understanding the Selectional Preferences of the Twitter Mentions Network
Authors: R. Sudhesh Solomon, P. Y. K. L. Srinivas, Abhay Narayan, Amitava Das
Abstract:
Users in social networks either unicast or broadcast their messages. At mention is the popular way of unicasting for Twitter whereas general tweeting could be considered as broadcasting method. Understanding the information flow and dynamics within a Social Network and modeling the same is a promising and an open research area called Information Diffusion. This paper seeks an answer to a fundamental question - understanding if the at-mention network or the unicasting pattern in social media is purely random in nature or is there any user specific selectional preference? To answer the question we present an empirical analysis to understand the sociological aspects of Twitter mentions network within a social network community. To understand the sociological behavior we analyze the values (Schwartz model: Achievement, Benevolence, Conformity, Hedonism, Power, Security, Self-Direction, Stimulation, Traditional and Universalism) of all the users. Empirical results suggest that values traits are indeed salient cue to understand how the mention-based communication network functions. For example, we notice that individuals possessing similar values unicast among themselves more often than with other value type people. We also observe that traditional and self-directed people do not maintain very close relationship in the network with the people of different values traits.Keywords: information diffusion, personality and values, social network analysis, twitter mentions network
Procedia PDF Downloads 37412064 Enabling UDP Multicast in Cloud IaaS: An Enterprise Use Case
Authors: Patrick J. Kerpan, Ryan C. Koop, Margaret M. Walker, Chris P. Swan
Abstract:
The User Datagram Protocol (UDP) multicast is a vital part of data center networking that is being left out of major cloud computing providers' network infrastructure. Enterprise users rely on multicast, and particularly UDP multicast to create and connect vital business operations. For example, UPD makes a variety of business functions possible from simultaneous content media updates, High-Performance Computing (HPC) grids, and video call routing for massive open online courses (MOOCs). Essentially, UDP multicast's technological slight is causing a huge effect on whether companies choose to use (or not to use) public cloud infrastructure as a service (IaaS). Allowing the ‘chatty’ UDP multicast protocol inside a cloud network could have a serious impact on the performance of the cloud as a whole. Cloud IaaS providers solve the issue by disallowing all UDP multicast. But what about enterprise use cases for multicast applications in organizations that want to move to the cloud? To re-allow multicast traffic, enterprises can build a layer 3 - 7 network over the top of a data center, private cloud, or public cloud. An overlay network simply creates a private, sealed network on top of the existing network. Overlays give complete control of the network back to enterprise cloud users the freedom to manage their network beyond the control of the cloud provider’s firewall conditions. The same logic applies if for users who wish to use IPsec or BGP network protocols inside or connected into an overlay network in cloud IaaS.Keywords: cloud computing, protocols, UDP multicast, virtualization
Procedia PDF Downloads 59012063 Comparison of the Dynamic Characteristics of Active and Passive Hybrid Bearings
Authors: Denis V. Shutin, Alexander Yu. Babin, Leonid A. Savin
Abstract:
One of the ways of reducing vibroactivity of rotor systems is to apply active hybrid bearings. Their design allows correction of the rotor’s location by means of separately controlling the supply pressure of the lubricant into the friction area. In a most simple case, the control system is based on a P-regulator. Increase of the gain coefficient allows decreasing the amplitude of rotor’s vibrations. The same effect can be achieved by means of increasing the pressure in the collector of a traditional passive hybrid bearing. However, these approaches affect the dynamic characteristics of the bearing differently. Theoretical studies show that the increase of the gain coefficient of an active bearing increases the stiffness of the bearing, as well as the increase of the pressure in the collector. Nevertheless, in case of a passive bearing, the damping properties deteriorate, whereas the active hybrid bearings obtain higher damping properties, which allow effectively providing the energy dissipation of the rotor vibrations and reducing the load on the constructional elements of a machine.Keywords: active bearings, control system, damping, hybrid bearings, stiffness
Procedia PDF Downloads 38212062 Urban Land Cover from GF-2 Satellite Images Using Object Based and Neural Network Classifications
Authors: Lamyaa Gamal El-Deen Taha, Ashraf Sharawi
Abstract:
China launched satellite GF-2 in 2014. This study deals with comparing nearest neighbor object-based classification and neural network classification methods for classification of the fused GF-2 image. Firstly, rectification of GF-2 image was performed. Secondly, a comparison between nearest neighbor object-based classification and neural network classification for classification of fused GF-2 was performed. Thirdly, the overall accuracy of classification and kappa index were calculated. Results indicate that nearest neighbor object-based classification is better than neural network classification for urban mapping.Keywords: GF-2 images, feature extraction-rectification, nearest neighbour object based classification, segmentation algorithms, neural network classification, multilayer perceptron
Procedia PDF Downloads 38912061 Data Augmentation for Automatic Graphical User Interface Generation Based on Generative Adversarial Network
Authors: Xulu Yao, Moi Hoon Yap, Yanlong Zhang
Abstract:
As a branch of artificial neural network, deep learning is widely used in the field of image recognition, but the lack of its dataset leads to imperfect model learning. By analysing the data scale requirements of deep learning and aiming at the application in GUI generation, it is found that the collection of GUI dataset is a time-consuming and labor-consuming project, which is difficult to meet the needs of current deep learning network. To solve this problem, this paper proposes a semi-supervised deep learning model that relies on the original small-scale datasets to produce a large number of reliable data sets. By combining the cyclic neural network with the generated countermeasure network, the cyclic neural network can learn the sequence relationship and characteristics of data, make the generated countermeasure network generate reasonable data, and then expand the Rico dataset. Relying on the network structure, the characteristics of collected data can be well analysed, and a large number of reasonable data can be generated according to these characteristics. After data processing, a reliable dataset for model training can be formed, which alleviates the problem of dataset shortage in deep learning.Keywords: GUI, deep learning, GAN, data augmentation
Procedia PDF Downloads 18412060 Student-Created Videos to Foster Active Learning in Heat Transfer Course
Authors: W.Appamana, S. Jantasee, P. Siwarasak, T. Mueansichai, C. Kaewbuddee
Abstract:
Heat transfer is important in chemical engineering field. We have to know how to predict rates of heat transfer in a variety of process situations. Therefore, heat transfer learning is one of the greatest challenges for undergraduate students in chemical engineering. To enhance student learning in classroom, active-learning method was proposed in a single classroom, using problems based on videos and creating video, think-pair-share and jigsaw technique. The result shows that active learning method can prevent copying of the solutions manual for students and improve average examination scores about 5% when comparing with students in traditional section. Overall, this project represents an effective type of class that motivates student-centric learning while enhancing self-motivation, creative thinking and critical analysis among students.Keywords: active learning, student-created video, self-motivation, creative thinking
Procedia PDF Downloads 23512059 Multiple Query Optimization in Wireless Sensor Networks Using Data Correlation
Authors: Elaheh Vaezpour
Abstract:
Data sensing in wireless sensor networks is done by query deceleration the network by the users. In many applications of the wireless sensor networks, many users send queries to the network simultaneously. If the queries are processed separately, the network’s energy consumption will increase significantly. Therefore, it is very important to aggregate the queries before sending them to the network. In this paper, we propose a multiple query optimization framework based on sensors physical and temporal correlation. In the proposed method, queries are merged and sent to network by considering correlation among the sensors in order to reduce the communication cost between the sensors and the base station.Keywords: wireless sensor networks, multiple query optimization, data correlation, reducing energy consumption
Procedia PDF Downloads 33412058 Spatial Distribution and Time Series Analysis of COVID-19 Pandemic in Italy: A Geospatial Perspective
Authors: Muhammad Farhan Ul Moazzam, Tamkeen Urooj Paracha, Ghani Rahman, Byung Gul Lee, Nasir Farid, Adnan Arshad
Abstract:
The novel coronavirus pandemic disease (COVID-19) affected the whole globe, though there is a lack of clinical studies and its epidemiological features. But as per the observation, it has been seen that most of the COVID-19 infected patients show mild to moderate symptoms, and they get better without any medical assistance due to a better immune system to generate antibodies against the novel coronavirus. In this study, the active cases, serious cases, recovered cases, deaths and total confirmed cases had been analyzed using the geospatial inverse distance weightage technique (IDW) within the time span of 2nd March to 3rd June 2020. As of 3rd June, the total number of COVID-19 cases in Italy were 231,238, total deaths 33,310, serious cases 350, recovered cases 158,951, and active cases were 39,177, which has been reported by the Ministry of Health, Italy. March 2nd-June 3rd, 2020 a sum of 231,238 cases has been reported in Italy out of which 38.68% cases reported in the Lombardia region with a death rate of 18%, which is high from its national mortality rate followed by Emilia-Romagna (14.89% deaths), Piemonte (12.68% deaths), and Vento (10% deaths). As per the total cases in the region, the highest number of recoveries has been observed in Umbria (92.52%), followed by Basilicata (87%), Valle d'Aosta (86.85%), and Trento (84.54%). The COVID-19 evolution in Italy has been particularly found in the major urban area, i.e., Rome, Milan, Naples, Bologna, and Florence. Geospatial technology played a vital role in this pandemic by tracking infected patient, active cases, and recovered cases. Geospatial techniques are very important in terms of monitoring and planning to control the pandemic spread in the country.Keywords: COVID-19, public health, geospatial analysis, IDW, Italy
Procedia PDF Downloads 15312057 Smart Trust Management for Vehicular Networks
Authors: Amel Ltifi, Ahmed Zouinkhi, Med Salim Bouhlel
Abstract:
Spontaneous networks such as VANET are in general deployed in an open and thus easily accessible environment. Therefore, they are vulnerable to attacks. Trust management is one of a set of security solutions dedicated to this type of networks. Moreover, the strong mobility of the nodes (in the case of VANET) makes the establishment of a trust management system complex. In this paper, we present a concept of ‘Active Vehicle’ which means an autonomous vehicle that is able to make decision about trustworthiness of alert messages transmitted about road accidents. The behavior of an “Active Vehicle” is modeled using Petri Nets.Keywords: active vehicle, cooperation, petri nets, trust management, VANET
Procedia PDF Downloads 40512056 Development of Surface-Enhanced Raman Spectroscopy-Active Gelatin Based Hydrogels for Label Free Detection of Bio-Analytes
Authors: Zahra Khan
Abstract:
Hydrogels are a macromolecular network of hydrophilic copolymers with physical or chemical cross-linking structures with significant water uptake capabilities. They are a promising substrate for surface-enhanced Raman spectroscopy (SERS) as they are both flexible and biocompatible materials. Conventional SERS-active substrates suffer from limitations such as instability and inflexibility, which restricts their use in broader applications. Gelatin-based hydrogels have been synthesised in a facile and relatively quick method without the use of any toxic cross-linking agents. Composite gel material was formed by combining the gelatin with simple polymers to enhance the functional properties of the gel. Gold nanoparticles prepared by a reproducible seed-mediated growth method were combined into the bulk material during gel synthesis. After gel formation, the gel was submerged in the analyte solution overnight. SERS spectra were then collected from the gel using a standard Raman spectrometer. A wide range of analytes was successfully detected on these hydrogels showing potential for further optimization and use as SERS substrates for biomedical applications.Keywords: gelatin, hydrogels, flexible materials, SERS
Procedia PDF Downloads 11212055 DMBR-Net: Deep Multiple-Resolution Bilateral Networks for Real-Time and Accurate Semantic Segmentation
Authors: Pengfei Meng, Shuangcheng Jia, Qian Li
Abstract:
We proposed a real-time high-precision semantic segmentation network based on a multi-resolution feature fusion module, the auxiliary feature extracting module, upsampling module, and atrous spatial pyramid pooling (ASPP) module. We designed a feature fusion structure, which is integrated with sufficient features of different resolutions. We also studied the effect of side-branch structure on the network and made discoveries. Based on the discoveries about the side-branch of the network structure, we used a side-branch auxiliary feature extraction layer in the network to improve the effectiveness of the network. We also designed upsampling module, which has better results than the original upsampling module. In addition, we also re-considered the locations and number of atrous spatial pyramid pooling (ASPP) modules and modified the network structure according to the experimental results to further improve the effectiveness of the network. The network presented in this paper takes the backbone network of Bisenetv2 as a basic network, based on which we constructed a network structure on which we made improvements. We named this network deep multiple-resolution bilateral networks for real-time, referred to as DMBR-Net. After experimental testing, our proposed DMBR-Net network achieved 81.2% mIoU at 119FPS on the Cityscapes validation dataset, 80.7% mIoU at 109FPS on the CamVid test dataset, 29.9% mIoU at 78FPS on the COCOStuff test dataset. Compared with all lightweight real-time semantic segmentation networks, our network achieves the highest accuracy at an appropriate speed.Keywords: multi-resolution feature fusion, atrous convolutional, bilateral networks, pyramid pooling
Procedia PDF Downloads 14912054 Plasticity in Matrix Dominated Metal-Matrix Composite with One Active Slip Based Dislocation
Authors: Temesgen Takele Kasa
Abstract:
The main aim of this paper is to suggest one active slip based continuum dislocation approach to matrix dominated MMC plasticity analysis. The approach centered the free energy principles through the continuum behavior of dislocations combined with small strain continuum kinematics. The analytical derivation of this method includes the formulation of one active slip system, the thermodynamic approach of dislocations, determination of free energy, and evolution of dislocations. In addition zero and non-zero energy dissipation analysis of dislocation evolution is also formulated by using varational energy minimization method. In general, this work shows its capability to analyze the plasticity of matrix dominated MMC with inclusions. The proposed method is also found to be capable of handling plasticity of MMC.Keywords: active slip, continuum dislocation, distortion, dominated, energy dissipation, matrix dominated, plasticity
Procedia PDF Downloads 38812053 'The Network' - Cradle to Cradle Engagement Framework for Women in STEM
Authors: Jessica Liqin Kong
Abstract:
Female engineers and scientists face unique challenges in their careers that make the development of professional networks crucial, but also more difficult. Working to overcome these challenges, ‘The Network’ was established in 2013 at the Queensland University of Technology (QUT) in Australia as an alumni chapter with the purpose of evoking continuous positive change for female participation and retention in science, technology, engineering and mathematics (STEM). ‘The Network’ adopts an innovative model for a Women in STEM alumni chapter which was inspired by the cradle to cradle approach to engagement, and the concept of growing and harvesting individual and collective social capital through a variety of initiatives. ‘The Network’ fosters an environment where the values exchanged in social and professional relationships can be capitalized for both current and future women in STEM. The model of ‘The Network’ acts as a simulation and opportunity for participants to further develop their leadership and other soft skills through learning, building and experimenting with ‘The Network’.Keywords: women in STEM, engagement, Cradle-to-Cradle, social capital
Procedia PDF Downloads 28412052 Governance Token Distributions of Layer-One.X
Authors: P. Wongthongtham, K. Coutinho, A. MacCarthy
Abstract:
Layer-One.X (L1X) blockchain provides the infrastructure layer, and decentralised applications can be created on the L1X infrastructure. L1X tokenomics are important and require a proportional balance between token distribution, nurturing user activity and engagement, and financial incentives. In this paper, we present research in progress on L1X tokenomics describing key concepts and implementations, including token velocity and value, incentive scheme, and broad distribution. Particularly the economic design of the native token of the L1X blockchain, called HeartBit (HB), is presented.Keywords: tokenisation, layer one blockchain, interoperability, token distribution, L1X blockchain
Procedia PDF Downloads 11312051 Research on Dynamic Practical Byzantine Fault Tolerance Consensus Algorithm
Authors: Cao Xiaopeng, Shi Linkai
Abstract:
The practical Byzantine fault-tolerant algorithm does not add nodes dynamically. It is limited in practical application. In order to add nodes dynamically, Dynamic Practical Byzantine Fault Tolerance Algorithm (DPBFT) was proposed. Firstly, a new node sends request information to other nodes in the network. The nodes in the network decide their identities and requests. Then the nodes in the network reverse connect to the new node and send block information of the current network. The new node updates information. Finally, the new node participates in the next round of consensus, changes the view and selects the master node. This paper abstracts the decision of nodes into the undirected connected graph. The final consistency of the graph is used to prove that the proposed algorithm can adapt to the network dynamically. Compared with the PBFT algorithm, DPBFT has better fault tolerance and lower network bandwidth.Keywords: practical byzantine, fault tolerance, blockchain, consensus algorithm, consistency analysis
Procedia PDF Downloads 13012050 Improved Network Construction Methods Based on Virtual Rails for Mobile Sensor Network
Authors: Noritaka Shigei, Kazuto Matsumoto, Yoshiki Nakashima, Hiromi Miyajima
Abstract:
Although Mobile Wireless Sensor Networks (MWSNs), which consist of mobile sensor nodes (MSNs), can cover a wide range of observation region by using a small number of sensor nodes, they need to construct a network to collect the sensing data on the base station by moving the MSNs. As an effective method, the network construction method based on Virtual Rails (VRs), which is referred to as VR method, has been proposed. In this paper, we propose two types of effective techniques for the VR method. They can prolong the operation time of the network, which is limited by the battery capabilities of MSNs and the energy consumption of MSNs. The first technique, an effective arrangement of VRs, almost equalizes the number of MSNs belonging to each VR. The second technique, an adaptive movement method of MSNs, takes into account the residual energy of battery. In the simulation, we demonstrate that each technique can improve the network lifetime and the combination of both techniques is the most effective.Keywords: mobile sensor node, relay of sensing data, residual energy, virtual rail, wireless sensor network
Procedia PDF Downloads 330