Search results for: risk optimization
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 9101

Search results for: risk optimization

8651 New Machine Learning Optimization Approach Based on Input Variables Disposition Applied for Time Series Prediction

Authors: Hervice Roméo Fogno Fotsoa, Germaine Djuidje Kenmoe, Claude Vidal Aloyem Kazé

Abstract:

One of the main applications of machine learning is the prediction of time series. But a more accurate prediction requires a more optimal model of machine learning. Several optimization techniques have been developed, but without considering the input variables disposition of the system. Thus, this work aims to present a new machine learning architecture optimization technique based on their optimal input variables disposition. The validations are done on the prediction of wind time series, using data collected in Cameroon. The number of possible dispositions with four input variables is determined, i.e., twenty-four. Each of the dispositions is used to perform the prediction, with the main criteria being the training and prediction performances. The results obtained from a static architecture and a dynamic architecture of neural networks have shown that these performances are a function of the input variable's disposition, and this is in a different way from the architectures. This analysis revealed that it is necessary to take into account the input variable's disposition for the development of a more optimal neural network model. Thus, a new neural network training algorithm is proposed by introducing the search for the optimal input variables disposition in the traditional back-propagation algorithm. The results of the application of this new optimization approach on the two single neural network architectures are compared with the previously obtained results step by step. Moreover, this proposed approach is validated in a collaborative optimization method with a single objective optimization technique, i.e., genetic algorithm back-propagation neural networks. From these comparisons, it is concluded that each proposed model outperforms its traditional model in terms of training and prediction performance of time series. Thus the proposed optimization approach can be useful in improving the accuracy of time series forecasts. This proves that the proposed optimization approach can be useful in improving the accuracy of time series prediction based on machine learning.

Keywords: input variable disposition, machine learning, optimization, performance, time series prediction

Procedia PDF Downloads 109
8650 Study on Optimization Design of Pressure Hull for Underwater Vehicle

Authors: Qasim Idrees, Gao Liangtian, Liu Bo, Miao Yiran

Abstract:

In order to improve the efficiency and accuracy of the pressure hull structure, optimization of underwater vehicle based on response surface methodology, a method for optimizing the design of pressure hull structure was studied. To determine the pressure shell of five dimensions as a design variable, the application of thin shell theory and the Chinese Classification Society (CCS) specification was carried on the preliminary design. In order to optimize variables of the feasible region, different methods were studied and implemented such as Opt LHD method (to determine the design test sample points in the feasible domain space), parametric ABAQUS solution for each sample point response, and the two-order polynomial response for the surface model of the limit load of structures. Based on the ultimate load of the structure and the quality of the shell, the two-generation genetic algorithm was used to solve the response surface, and the Pareto optimal solution set was obtained. The final optimization result was 41.68% higher than that of the initial design, and the shell quality was reduced by about 27.26%. The parametric method can ensure the accuracy of the test and improve the efficiency of optimization.

Keywords: parameterization, response surface, structure optimization, pressure hull

Procedia PDF Downloads 233
8649 Grid Computing for Multi-Objective Optimization Problems

Authors: Aouaouche Elmaouhab, Hassina Beggar

Abstract:

Solving multi-objective discrete optimization applications has always been limited by the resources of one machine: By computing power or by memory, most often both. To speed up the calculations, the grid computing represents a primary solution for the treatment of these applications through the parallelization of these resolution methods. In this work, we are interested in the study of some methods for solving multiple objective integer linear programming problem based on Branch-and-Bound and the study of grid computing technology. This study allowed us to propose an implementation of the method of Abbas and Al on the grid by reducing the execution time. To enhance our contribution, the main results are presented.

Keywords: multi-objective optimization, integer linear programming, grid computing, parallel computing

Procedia PDF Downloads 485
8648 Advancements in Mathematical Modeling and Optimization for Control, Signal Processing, and Energy Systems

Authors: Zahid Ullah, Atlas Khan

Abstract:

This abstract focuses on the advancements in mathematical modeling and optimization techniques that play a crucial role in enhancing the efficiency, reliability, and performance of these systems. In this era of rapidly evolving technology, mathematical modeling and optimization offer powerful tools to tackle the complex challenges faced by control, signal processing, and energy systems. This abstract presents the latest research and developments in mathematical methodologies, encompassing areas such as control theory, system identification, signal processing algorithms, and energy optimization. The abstract highlights the interdisciplinary nature of mathematical modeling and optimization, showcasing their applications in a wide range of domains, including power systems, communication networks, industrial automation, and renewable energy. It explores key mathematical techniques, such as linear and nonlinear programming, convex optimization, stochastic modeling, and numerical algorithms, that enable the design, analysis, and optimization of complex control and signal processing systems. Furthermore, the abstract emphasizes the importance of addressing real-world challenges in control, signal processing, and energy systems through innovative mathematical approaches. It discusses the integration of mathematical models with data-driven approaches, machine learning, and artificial intelligence to enhance system performance, adaptability, and decision-making capabilities. The abstract also underscores the significance of bridging the gap between theoretical advancements and practical applications. It recognizes the need for practical implementation of mathematical models and optimization algorithms in real-world systems, considering factors such as scalability, computational efficiency, and robustness. In summary, this abstract showcases the advancements in mathematical modeling and optimization techniques for control, signal processing, and energy systems. It highlights the interdisciplinary nature of these techniques, their applications across various domains, and their potential to address real-world challenges. The abstract emphasizes the importance of practical implementation and integration with emerging technologies to drive innovation and improve the performance of control, signal processing, and energy.

Keywords: mathematical modeling, optimization, control systems, signal processing, energy systems, interdisciplinary applications, system identification, numerical algorithms

Procedia PDF Downloads 112
8647 An Analytical Approach to Assess and Compare the Vulnerability Risk of Operating Systems

Authors: Pubudu K. Hitigala Kaluarachchilage, Champike Attanayake, Sasith Rajasooriya, Chris P. Tsokos

Abstract:

Operating system (OS) security is a key component of computer security. Assessing and improving OSs strength to resist against vulnerabilities and attacks is a mandatory requirement given the rate of new vulnerabilities discovered and attacks occurring. Frequency and the number of different kinds of vulnerabilities found in an OS can be considered an index of its information security level. In the present study five mostly used OSs, Microsoft Windows (windows 7, windows 8 and windows 10), Apple’s Mac and Linux are assessed for their discovered vulnerabilities and the risk associated with each. Each discovered and reported vulnerability has an exploitability score assigned in CVSS score of the national vulnerability database. In this study the risk from vulnerabilities in each of the five Operating Systems is compared. Risk Indexes used are developed based on the Markov model to evaluate the risk of each vulnerability. Statistical methodology and underlying mathematical approach is described. Initially, parametric procedures are conducted and measured. There were, however, violations of some statistical assumptions observed. Therefore the need for non-parametric approaches was recognized. 6838 vulnerabilities recorded were considered in the analysis. According to the risk associated with all the vulnerabilities considered, it was found that there is a statistically significant difference among average risk levels for some operating systems, indicating that according to our method some operating systems have been more risk vulnerable than others given the assumptions and limitations. Relevant test results revealing a statistically significant difference in the Risk levels of different OSs are presented.

Keywords: cybersecurity, Markov chain, non-parametric analysis, vulnerability, operating system

Procedia PDF Downloads 183
8646 Influence of Optimization Method on Parameters Identification of Hyperelastic Models

Authors: Bale Baidi Blaise, Gilles Marckmann, Liman Kaoye, Talaka Dya, Moustapha Bachirou, Gambo Betchewe, Tibi Beda

Abstract:

This work highlights the capabilities of particles swarm optimization (PSO) method to identify parameters of hyperelastic models. The study compares this method with Genetic Algorithm (GA) method, Least Squares (LS) method, Pattern Search Algorithm (PSA) method, Beda-Chevalier (BC) method and the Levenberg-Marquardt (LM) method. Four classic hyperelastic models are used to test the different methods through parameters identification. Then, the study compares the ability of these models to reproduce experimental Treloar data in simple tension, biaxial tension and pure shear.

Keywords: particle swarm optimization, identification, hyperelastic, model

Procedia PDF Downloads 171
8645 Size Reduction of Images Using Constraint Optimization Approach for Machine Communications

Authors: Chee Sun Won

Abstract:

This paper presents the size reduction of images for machine-to-machine communications. Here, the salient image regions to be preserved include the image patches of the key-points such as corners and blobs. Based on a saliency image map from the key-points and their image patches, an axis-aligned grid-size optimization is proposed for the reduction of image size. To increase the size-reduction efficiency the aspect ratio constraint is relaxed in the constraint optimization framework. The proposed method yields higher matching accuracy after the size reduction than the conventional content-aware image size-reduction methods.

Keywords: image compression, image matching, key-point detection and description, machine-to-machine communication

Procedia PDF Downloads 418
8644 Spatial Analysis for Wind Risk Index Assessment

Authors: Ljiljana Seric, Vladimir Divic, Marin Bugaric

Abstract:

This paper presents methodology for spatial analysis of GIS data that is used for assessing the microlocation risk index from potential damages of high winds. The analysis is performed on freely available GIS data comprising information about wind load, terrain cover and topography of the area. The methodology utilizes the legislation of Eurocode norms for determination of wind load of buildings and constructions. The core of the methodology is adoption of the wind load parameters related to location on geographical spatial grid. Presented work is a part of the Wind Risk Project, supported by the European Commission under the Civil Protection Financial Instrument of the European Union (ECHO). The partners involved in Wind Risk project performed Wind Risk assessment and proposed action plan for three European countries – Slovenia, Croatia and Germany. The proposed method is implemented in GRASS GIS open source GIS software and demonstrated for Case study area of wider area of Split, Croatia. Obtained Wind Risk Index is visualized and correlated with critical infrastructures like buildings, roads and power lines. The results show good correlation between high Wind Risk Index with recent incidents related to wind.

Keywords: Eurocode norms, GIS, spatial analysis, wind distribution, wind risk

Procedia PDF Downloads 316
8643 Further Development in Predicting Post-Earthquake Fire Ignition Hazard

Authors: Pegah Farshadmanesh, Jamshid Mohammadi, Mehdi Modares

Abstract:

In nearly all earthquakes of the past century that resulted in moderate to significant damage, the occurrence of postearthquake fire ignition (PEFI) has imposed a serious hazard and caused severe damage, especially in urban areas. In order to reduce the loss of life and property caused by post-earthquake fires, there is a crucial need for predictive models to estimate the PEFI risk. The parameters affecting PEFI risk can be categorized as: 1) factors influencing fire ignition in normal (non-earthquake) condition, including floor area, building category, ignitability, type of appliance, and prevention devices, and 2) earthquake related factors contributing to the PEFI risk, including building vulnerability and earthquake characteristics such as intensity, peak ground acceleration, and peak ground velocity. State-of-the-art statistical PEFI risk models are solely based on limited available earthquake data, and therefore they cannot predict the PEFI risk for areas with insufficient earthquake records since such records are needed in estimating the PEFI model parameters. In this paper, the correlation between normal condition ignition risk, peak ground acceleration, and PEFI risk is examined in an effort to offer a means for predicting post-earthquake ignition events. An illustrative example is presented to demonstrate how such correlation can be employed in a seismic area to predict PEFI hazard.

Keywords: fire risk, post-earthquake fire ignition (PEFI), risk management, seismicity

Procedia PDF Downloads 382
8642 Behavioral and Cultural Risk Factor of Cardiovascular Disease in India: Evidence from SAGE-Study

Authors: Sunita Patel

Abstract:

Cardiovascular diseases are the leading cause of morbidity as well as mortality in India. Objective of this study is to examine CVDs prevalence and identify their behavioral and cultural risk factors with the help of SAGE-2007 data conducted on 6th states in India. Findings reveal that 18.3% of people diagnosed with CVDs in India. Higher disease occurs in an increasing rate between ages of 30-39 having OR 2.45 (CI: 1.66-3.63) and 70+ age OR 7.45 (CI: 4.82-11.49) times higher compare to 18-29 age group respectively. Wealth quintile higher CVD occurs as 3rd in 60% (CI: 1.16-2.21) and in richest 5th quintile 58% (CI: 1.13-2.21) contrast to lowest quintile. Relative risk depicted that 22.4% in moderate and 44% in vigorous activity have less chance of diseases compare to who performed no work and those who consumed alcohol. Results reveal that policy prospect should be recommended and that it would be beneficial for awareness of people and their future.

Keywords: behavioral risk, cultural risk, cardio-vascular diseases, wealth quintile

Procedia PDF Downloads 399
8641 Formulation of a Rapid Earthquake Risk Ranking Criteria for National Bridges in the National Capital Region Affected by the West Valley Fault Using GIS Data Integration

Authors: George Mariano Soriano

Abstract:

In this study, a Rapid Earthquake Risk Ranking Criteria was formulated by integrating various existing maps and databases by the Department of Public Works and Highways (DPWH) and Philippine Institute of Volcanology and Seismology (PHIVOLCS). Utilizing Geographic Information System (GIS) software, the above-mentioned maps and databases were used in extracting seismic hazard parameters and bridge vulnerability characteristics in order to rank the seismic damage risk rating of bridges in the National Capital Region.

Keywords: bridge, earthquake, GIS, hazard, risk, vulnerability

Procedia PDF Downloads 409
8640 Future Optimization of the Xin’anjiang Hydropower

Authors: Muhammad Zaman, Guohua Fang, Muhammad Saifullah,

Abstract:

The presented study emphasize at an optimal model to compare past and future optimal hydropower generation. In order to get maximum benefits from the Xin’anjiang hydropower station a model is developed. A Particle Swarm Optimization (PSO) has purposed and past and future water flow is used to get the maximum benefits from future water resources in this study. The results revealed that the future hydropower generation is more than the past generation. This paper gives us idea that what could we get in the past using optimal method of electricity generation and what can we get in the future using this technique.

Keywords: PSO, future water resources, optimization, Xin’anjiang,

Procedia PDF Downloads 443
8639 Optimization of Process Parameters in Wire Electrical Discharge Machining of Inconel X-750 for Dimensional Deviation Using Taguchi Technique

Authors: Mandeep Kumar, Hari Singh

Abstract:

The effective optimization of machining process parameters affects dramatically the cost and production time of machined components as well as the quality of the final products. This paper presents the optimization aspects of a Wire Electrical Discharge Machining operation using Inconel X-750 as work material. The objective considered in this study is minimization of the dimensional deviation. Six input process parameters of WEDM namely spark gap voltage, pulse-on time, pulse-off time, wire feed rate, peak current and wire tension, were chosen as variables to study the process performance. Taguchi's design of experiments methodology has been used for planning and designing the experiments. The analysis of variance was carried out for raw data as well as for signal to noise ratio. Four input parameters and one two-factor interaction have been found to be statistically significant for their effects on the response of interest. The confirmation experiments were also performed for validating the predicted results.

Keywords: ANOVA, DOE, inconel, machining, optimization

Procedia PDF Downloads 204
8638 Optimization of Hybrid off Grid Energy Station

Authors: Yehya Abdellatif, Iyad M. Muslih, Azzah Alkhalailah, Abdallah Muslih

Abstract:

Hybrid Optimization Model for Electric Renewable (HOMER) software was utilized to find the optimum design of a hybrid off-Grid system, by choosing the optimal solution depending on the cost analysis of energy based on different capacity shortage percentages. A complete study for the site conditions and load profile was done to optimize the design and implementation of a hybrid off-grid power station. In addition, the solution takes into consecration the ambient temperature effect on the efficiency of the power generation and the economical aspects of selection depending on real market price. From the analysis of the HOMER model results, the optimum hybrid power station was suggested, based on wind speed, and solar conditions. The optimization function objective is to minimize the Net Price Cost (NPC) and the Cost of Energy (COE) with zero and 10 percentage of capacity shortage.

Keywords: energy modeling, HOMER, off-grid system, optimization

Procedia PDF Downloads 563
8637 Applying Risk Taking in Islamic Finance: A Fiqhī Viewpoint

Authors: Mohamed Fairooz Abdul Khir

Abstract:

The linkage between liability for risk and legitimacy of reward is a governing principle that must be fully observed in financial transactions. It is the cornerstone of any Islamic business or financial deal. The absence of risk taking principle may give rise to numerous prohibited elements such as ribā, gharar and gambling that violate the objectives of financial transactions. However, fiqhī domains from which it emanates have not been clearly spelled out by the scholars. In addition, the concept of risk taking in relation to contemporary risks associated with financial contracts, such as credit risk, liquidity risk, reputational risk and market risk, needs further scrutiny as regard their Sharīʿah bases. Hence, this study is imperatively significant to prove that absence of risk taking concept in Islamic financial instruments give rise to prohibited elements particularly ribā. This study is primarily intended to clarify the concept of risk in Islamic financial transactions from the fiqhī perspective and evaluate analytically the selected issues involving risk taking based on the established concept of risk taking from fiqhī viewpoint. The selected issues are amongst others charging cost of fund on defaulting customers, holding the lessee liable for total loss of leased asset under ijārah thumma al-bayʿ and capital guarantee under mushārakah based instruments. This is a library research in which data has been collected from various materials such as classical fiqh books, regulators’ policy guidelines and journal articles. This study employed deductive and inductive methods to analyze the data critically in search for conclusive findings. It suggests that business risks have to be evaluated based on their subjects namely (i) property (māl) and (ii) work (ʿamal) to ensure that Islamic financial instruments structured based on certain Sharīʿah principles are not diverted from the risk taking concept embedded in them. Analysis of the above selected cases substantiates that when risk taking principle is breached, the prohibited elements such as ribā, gharar and maysir do arise and that they impede the realization of the maqāṣid al-Sharīʿah intended from Islamic financial contracts.

Keywords: Islamic finance, ownership risk, ribā, risk taking

Procedia PDF Downloads 326
8636 Disruption Coordination of Supply Chain with Loss-Averse Retailer Under Buy-Back Contract

Authors: Yuan Tian, Benhe Gao

Abstract:

This paper aims to investigate a two stage supply chain of one leading supplier and one following retailer that experiences two factors perturbation out of supplier's production cost, retailer's marginal cost and retail price in stochastic demand environment. Granted that risk neutral condition has long been discussed, little attention has been given to disruptions under the premise of risk neutral supplier and risk aversion retailer. We establish the optimal order quantity and revealed the profit distribution coefficient in risk-neutral static model, make adjustment under disruption scenario, and then select utility function method for risk aversion model. Using buy-back contract policy, the improvement of parameters can achieve channel coordination where Pareto optimal is realized.

Keywords: supply chain coordination, disruption management, buy-back contract, lose aversion

Procedia PDF Downloads 327
8635 Modeling the Risk Perception of Pedestrians Using a Nested Logit Structure

Authors: Babak Mirbaha, Mahmoud Saffarzadeh, Atieh Asgari Toorzani

Abstract:

Pedestrians are the most vulnerable road users since they do not have a protective shell. One of the most common collisions for them is pedestrian-vehicle at intersections. In order to develop appropriate countermeasures to improve safety for them, researches have to be conducted to identify the factors that affect the risk of getting involved in such collisions. More specifically, this study investigates factors such as the influence of walking alone or having a baby while crossing the street, the observable age of pedestrian, the speed of pedestrians and the speed of approaching vehicles on risk perception of pedestrians. A nested logit model was used for modeling the behavioral structure of pedestrians. The results show that the presence of more lanes at intersections and not being alone especially having a baby while crossing, decrease the probability of taking a risk among pedestrians. Also, it seems that teenagers show more risky behaviors in crossing the street in comparison to other age groups. Also, the speed of approaching vehicles was considered significant. The probability of risk taking among pedestrians decreases by increasing the speed of approaching vehicle in both the first and the second lanes of crossings.

Keywords: pedestrians, intersection, nested logit, risk

Procedia PDF Downloads 186
8634 Trajectory Optimization of Re-Entry Vehicle Using Evolutionary Algorithm

Authors: Muhammad Umar Kiani, Muhammad Shahbaz

Abstract:

Performance of any vehicle can be predicted by its design/modeling and optimization. Design optimization leads to efficient performance. Followed by horizontal launch, the air launch re-entry vehicle undergoes a launch maneuver by introducing a carefully selected angle of attack profile. This angle of attack profile is the basic element to complete a specified mission. Flight program of said vehicle is optimized under the constraints of the maximum allowed angle of attack, lateral and axial loads and with the objective of reaching maximum altitude. The main focus of this study is the endo-atmospheric phase of the ascent trajectory. A three degrees of freedom trajectory model is simulated in MATLAB. The optimization process uses evolutionary algorithm, because of its robustness and efficient capacity to explore the design space in search of the global optimum. Evolutionary Algorithm based trajectory optimization also offers the added benefit of being a generalized method that may work with continuous, discontinuous, linear, and non-linear performance matrix. It also eliminates the requirement of a starting solution. Optimization is particularly beneficial to achieve maximum advantage without increasing the computational cost and affecting the output of the system. For the case of launch vehicles we are immensely anxious to achieve maximum performance and efficiency under different constraints. In a launch vehicle, flight program means the prescribed variation of vehicle pitching angle during the flight which has substantial influence reachable altitude and accuracy of orbit insertion and aerodynamic loading. Results reveal that the angle of attack profile significantly affects the performance of the vehicle.

Keywords: endo-atmospheric, evolutionary algorithm, efficient performance, optimization process

Procedia PDF Downloads 405
8633 Suicide Risk Assessment of UM Tagum College Students: Basis for Intervention Program

Authors: Ezri Coda, Kris Justine Miparanum, Relvin Jay Sale

Abstract:

The study dealt on suicide risk level of college students in UM Tagum College. The primary goal of the study was to assess the level of suicide risk among students at the UM Tagum College in terms of perceived burdensomeness, low belongingness/social alienation and acquired ability to enact lethal self-injury utilizing quantitative non- experimental study with 380 students in UM Tagum College as respondents of the study. Mean was the statistical tools used for the data treatment. Moreover, the study aims to determine the mean of the level of the suicide risk assessment in terms of program, type of student, age, year level, civil status and gender, and lastly, to design an intervention program for those identified students with high suicide risk. Results showed a low level of suicide risk in terms of perceived burdensomeness, low belongingness/social alienation and acquired ability to enact lethal self-injury.

Keywords: suicide risk, perceived burdensomeness, low belongingness/social alienation, acquired ability to enact lethal self-injury, UM Tagum College, Philippines

Procedia PDF Downloads 139
8632 A Workable Mechanism to Support Students Who Are at Risk

Authors: Mohamed Chabi

Abstract:

The project of helping students at risk started at the Math department in the new foundation program at Qatar University in the fall 2012 semester. The purpose was to find ways to help students who were struggling with their math courses Elementary algebra or Precalculus course due to many factors. Department had formed the Committee “students at Risk” at the start of 12-13 to assist struggling students in our math courses to get their studies on track. A mechanism was developed to support students who are at risk using a developed E-Monitoring system. E-Monitoring system was developed to manage automatically all transactions relevant to the students’ attendance, Students ‘‘warning Students’’ grading, etc. E-Monitoring System produce various statistics such as, Overall course statistics, Performance, Students at Risk… to help department to develop a higher quality of education in the Foundation Program at Math department. The mechanism was studies and evaluated. Whatever the cause, the sooner we identify students who are not performing well academically, the sooner we can provide, or direct them to the resources that are available to them. In this paper, we outline the mechanism and its effect on students’ performance. The collected data from various exams shows that students had benefited from the mechanism.

Keywords: students at risk, e-monitoring system, warning students, performance

Procedia PDF Downloads 488
8631 Analysis of Risk Factors Affecting the Motor Insurance Pricing with Generalized Linear Models

Authors: Puttharapong Sakulwaropas, Uraiwan Jaroengeratikun

Abstract:

Casualty insurance business, the optimal premium pricing and adequate cost for an insurance company are important in risk management. Normally, the insurance pure premium can be determined by multiplying the claim frequency with the claim cost. The aim of this research was to study in the application of generalized linear models to select the risk factor for model of claim frequency and claim cost for estimating a pure premium. In this study, the data set was the claim of comprehensive motor insurance, which was provided by one of the insurance company in Thailand. The results of this study found that the risk factors significantly related to pure premium at the 0.05 level consisted of no claim bonus (NCB) and used of the car (Car code).

Keywords: generalized linear models, risk factor, pure premium, regression model

Procedia PDF Downloads 465
8630 Optimization of the Structural Design for an Irregular Building in High Seismicity Zone

Authors: Arias Fernando, Juan Bojórquez, Edén Bojórquez, Alfredo Reyes-Salazar, Fernando de J. Velarde, Robespierre Chávez, J. Martin Leal, Victor Baca

Abstract:

The present study focuses on the optimization of different structural systems employed in tall steel buildings, with a specific focus on the city of Acapulco, Guerrero, a region known for its high seismic activity. Using the spectral modal method, analyses were conducted to assess the ability of these buildings to withstand seismic forces and other external loads. After performing a detailed analysis of various models, the results were compared based on various engineering parameters, including maximum interstory drift, base shear, displacements, and the total weight of the structures, the latter being considered as an estimate of the cost of the proposed systems. The findings of this study indicate that steel frames stand out as a viable option for tall buildings in question. However, areas of potential improvement were identified, suggesting opportunities for further optimization of the design and seismic resistance of these structures. This study provides a deep and insightful perspective on the optimization of structural systems in tall steel buildings, offering valuable information for engineers and professionals in the field involved in similar projects.

Keywords: high seismic zone, irregular buildings, optimization design, steel buildings

Procedia PDF Downloads 24
8629 Reliability Based Topology Optimization: An Efficient Method for Material Uncertainty

Authors: Mehdi Jalalpour, Mazdak Tootkaboni

Abstract:

We present a computationally efficient method for reliability-based topology optimization under material properties uncertainty, which is assumed to be lognormally distributed and correlated within the domain. Computational efficiency is achieved through estimating the response statistics with stochastic perturbation of second order, using these statistics to fit an appropriate distribution that follows the empirical distribution of the response, and employing an efficient gradient-based optimizer. The proposed algorithm is utilized for design of new structures and the changes in the optimized topology is discussed for various levels of target reliability and correlation strength. Predictions were verified thorough comparison with results obtained using Monte Carlo simulation.

Keywords: material uncertainty, stochastic perturbation, structural reliability, topology optimization

Procedia PDF Downloads 605
8628 Experimental Investigation and Optimization of Nanoparticle Mass Concentration and Heat Input of Loop Heat Pipe

Authors: P. Gunnasegaran, M. Z. Abdullah, M. Z. Yusoff, Nur Irmawati

Abstract:

This study presents experimental and optimization of nanoparticle mass concentration and heat input based on the total thermal resistance (Rth) of loop heat pipe (LHP), employed for PC-CPU cooling. In this study, silica nanoparticles (SiO2) in water with particle mass concentration ranged from 0% (pure water) to 1% is considered as the working fluid within the LHP. The experimental design and optimization is accomplished by the design of the experimental tool, Response Surface Methodology (RSM). The results show that the nanoparticle mass concentration and the heat input have a significant effect on the Rth of LHP. For a given heat input, the Rth is found to decrease with the increase of the nanoparticle mass concentration up to 0.5% and increased thereafter. It is also found that the Rth is decreased when the heat input is increased from 20W to 60W. The results are optimized with the objective of minimizing the Rt, using Design-Expert software, and the optimized nanoparticle mass concentration and heat input are 0.48% and 59.97W, respectively, the minimum thermal resistance being 2.66(ºC/W).

Keywords: loop heat pipe, nanofluid, optimization, thermal resistance

Procedia PDF Downloads 459
8627 Revealing the Risks of Obstructive Sleep Apnea

Authors: Oyuntsetseg Sandag, Lkhagvadorj Khosbayar, Naidansuren Tsendeekhuu, Densenbal Dansran, Bandi Solongo

Abstract:

Introduction: Obstructive sleep apnea (OSA) is a common disorder affecting at least 2% to 4% of the adult population. It is estimated that nearly 80% of men and 93% of women with moderate to severe sleep apnea are undiagnosed. A number of screening questionnaires and clinical screening models have been developed to help identify patients with OSA, also it’s indeed to clinical practice. Purpose of study: Determine dependence of obstructive sleep apnea between for severe risk and risk factor. Material and Methods: A cross-sectional study included 114 patients presenting from theCentral state 3th hospital and Central state 1th hospital. Patients who had obstructive sleep apnea (OSA)selected in this study. Standard StopBang questionnaire was obtained from all patients.According to the patients’ response to the StopBang questionnaire was divided into low risk, intermediate risk, and high risk.Descriptive statistics were presented mean ± standard deviation (SD). Each questionnaire was compared on the likelihood ratio for a positive result, the likelihood ratio for a negative test result of regression. Statistical analyses were performed utilizing SPSS 16. Results: 114 patients were obtained (mean age 48 ± 16, male 57)that divided to low risk 54 (47.4%), intermediate risk 33 (28.9%), high risk 27 (23.7%). Result of risk factor showed significantly increasing that mean age (38 ± 13vs. 54 ± 14 vs. 59 ± 10, p<0.05), blood pressure (115 ± 18vs. 133 ± 19vs. 142 ± 21, p<0.05), BMI(24 IQR 22; 26 vs. 24 IQR 22; 29 vs. 28 IQR 25; 34, p<0.001), neck circumference (35 ± 3.4 vs. 38 ± 4.7 vs. 41 ± 4.4, p<0.05)were increased. Results from multiple logistic regressions showed that age is significantly independently factor for OSA (odds ratio 1.07, 95% CI 1.02-1.23, p<0.01). Predictive value of age was significantly higher factor for OSA (AUC=0.833, 95% CI 0.758-0.909, p<0.001). Our study showing that risk of OSA is beginning 47 years old (sensitivity 78.3%, specifity74.1%). Conclusions: According to most of all patients’ response had intermediate risk and high risk. Also, age, blood pressure, neck circumference and BMI were increased such as risk factor was increased for OSA. Especially age is independently factor and highest significance for OSA. Patients’ age one year is increased likelihood risk factor 1.1 times is increased.

Keywords: obstructive sleep apnea, Stop-Bang, BMI (Body Mass Index), blood pressure

Procedia PDF Downloads 310
8626 Financial Instrument with High Investment Risk on the Warsaw Stock Exchange

Authors: Piotr Prewysz-Kwinto

Abstract:

The market of financial instruments with high risk is developing very dynamically in recent years and attracts more and more interest of investors. It consists essentially of two groups of instruments, i.e. derivatives and exchange traded product (ETP), and each year new types are introduced and offered to investors. The aim of this paper is to present the principles concerning financial instruments with high investment risk available on the Warsaw Stock Exchange (WSE), because they have quite complex constructions, and to evaluate the development of this market. In order to achieve this aim, statistical data from 2014-2016 was analyzed. The results confirm that the financial instruments with high investment risk available on the WSE constitute a diversified and the most numerous group of financial instruments and attract the most interest of investors. Responsible investing requires, however, a good knowledge of how they work and how they can generate profit to not expose oneself to unexpected losses.

Keywords: derivatives, exchange traded products (ETP), financial instruments, financial market, risk, stock exchange

Procedia PDF Downloads 380
8625 Women Students’ Management of Alcohol- Related Sexual Risk at a South African University

Authors: Shakila Singh

Abstract:

This research was conducted at a selected South African university campus with women students who drink alcohol. The purpose of the study was to examine their perspectives on the role of alcohol in their lives, their understandings about women’s vulnerability to alcohol-related sexual risk and their strategies against these. The study draws on feminist principles and practices to challenge gendered inequalities that legitimate and facilitate violence against women. Recognising the danger of focusing on risk management in ways that place the burden of responsibility entirely on young women to prevent their violation, this article focuses on women students’ agency in managing risk while taking up opportunities for self-discovery. Participation was voluntary, and a student-researcher administered an open-ended questionnaire to 55 participants. The findings suggest that young women position alcohol- use as a common activity at university, and that it gives them much pleasure. They recognise that it is riskier for women and articulate valuable strategies to manage the risk to their sexual safety when drinking. These include drinking within supportive networks, avoiding financial dependence, and managing their alcohol intake. This article argues that alcohol at university is an integral part of expressions of gender and sexuality and that risk-taking is a normal part of university students’ lives. Consequently, arguments about equality need to consider risk-taking as part of young people’s lives and promote ways of managing alcohol-related risks, rather than imagining that alcohol can be avoided entirely.

Keywords: alcohol-related sexual risk, drinking at university, managing risk, women students

Procedia PDF Downloads 104
8624 Analyzing the Risk Based Approach in General Data Protection Regulation: Basic Challenges Connected with Adapting the Regulation

Authors: Natalia Kalinowska

Abstract:

The adoption of the General Data Protection Regulation, (GDPR) finished the four-year work of the European Commission in this area in the European Union. Considering far-reaching changes, which will be applied by GDPR, the European legislator envisaged two-year transitional period. Member states and companies have to prepare for a new regulation until 25 of May 2018. The idea, which becomes a new look at an attitude to data protection in the European Union is risk-based approach. So far, as a result of implementation of Directive 95/46/WE, in many European countries (including Poland) there have been adopted very particular regulations, specifying technical and organisational security measures e.g. Polish implementing rules indicate even how long password should be. According to the new approach from May 2018, controllers and processors will be obliged to apply security measures adequate to level of risk associated with specific data processing. The risk in GDPR should be interpreted as the likelihood of a breach of the rights and freedoms of the data subject. According to Recital 76, the likelihood and severity of the risk to the rights and freedoms of the data subject should be determined by reference to the nature, scope, context and purposes of the processing. GDPR does not indicate security measures which should be applied – in recitals there are only examples such as anonymization or encryption. It depends on a controller’s decision what type of security measures controller considered as sufficient and he will be responsible if these measures are not sufficient or if his identification of risk level is incorrect. Data protection regulation indicates few levels of risk. Recital 76 indicates risk and high risk, but some lawyers think, that there is one more category – low risk/now risk. Low risk/now risk data processing is a situation when it is unlikely to result in a risk to the rights and freedoms of natural persons. GDPR mentions types of data processing when a controller does not have to evaluate level of risk because it has been classified as „high risk” processing e.g. processing on a large scale of special categories of data, processing with using new technologies. The methodology will include analysis of legal regulations e.g. GDPR, the Polish Act on the Protection of personal data. Moreover: ICO Guidelines and articles concerning risk based approach in GDPR. The main conclusion is that an appropriate risk assessment is a key to keeping data safe and avoiding financial penalties. On the one hand, this approach seems to be more equitable, not only for controllers or processors but also for data subjects, but on the other hand, it increases controllers’ uncertainties in the assessment which could have a direct impact on incorrect data protection and potential responsibility for infringement of regulation.

Keywords: general data protection regulation, personal data protection, privacy protection, risk based approach

Procedia PDF Downloads 252
8623 Bayesian Value at Risk Forecast Using Realized Conditional Autoregressive Expectiel Mdodel with an Application of Cryptocurrency

Authors: Niya Chen, Jennifer Chan

Abstract:

In the financial market, risk management helps to minimize potential loss and maximize profit. There are two ways to assess risks; the first way is to calculate the risk directly based on the volatility. The most common risk measurements are Value at Risk (VaR), sharp ratio, and beta. Alternatively, we could look at the quantile of the return to assess the risk. Popular return models such as GARCH and stochastic volatility (SV) focus on modeling the mean of the return distribution via capturing the volatility dynamics; however, the quantile/expectile method will give us an idea of the distribution with the extreme return value. It will allow us to forecast VaR using return which is direct information. The advantage of using these non-parametric methods is that it is not bounded by the distribution assumptions from the parametric method. But the difference between them is that expectile uses a second-order loss function while quantile regression uses a first-order loss function. We consider several quantile functions, different volatility measures, and estimates from some volatility models. To estimate the expectile of the model, we use Realized Conditional Autoregressive Expectile (CARE) model with the bayesian method to achieve this. We would like to see if our proposed models outperform existing models in cryptocurrency, and we will test it by using Bitcoin mainly as well as Ethereum.

Keywords: expectile, CARE Model, CARR Model, quantile, cryptocurrency, Value at Risk

Procedia PDF Downloads 109
8622 Transformer Design Optimization Using Artificial Intelligence Techniques

Authors: Zakir Husain

Abstract:

Main objective of a power transformer design optimization problem requires minimizing the total overall cost and/or mass of the winding and core material by satisfying all possible constraints obligatory by the standards and transformer user requirement. The constraints include appropriate limits on winding fill factor, temperature rise, efficiency, no-load current and voltage regulation. The design optimizations tasks are a constrained minimum cost and/or mass solution by optimally setting the parameters, geometry and require magnetic properties of the transformer. In this paper, present the above design problems have been formulated by using genetic algorithm (GA) and simulated annealing (SA) on the MATLAB platform. The importance of the presented approach is stems for two main features. First, proposed technique provides reliable and efficient solution for the problem of design optimization with several variables. Second, it guaranteed to obtained solution is global optimum. This paper includes a demonstration of the application of the genetic programming GP technique to transformer design.

Keywords: optimization, power transformer, genetic algorithm (GA), simulated annealing technique (SA)

Procedia PDF Downloads 583