Search results for: bond graph
423 Optimized Dynamic Bayesian Networks and Neural Verifier Test Applied to On-Line Isolated Characters Recognition
Authors: Redouane Tlemsani, Redouane, Belkacem Kouninef, Abdelkader Benyettou
Abstract:
In this paper, our system is a Markovien system which we can see it like a Dynamic Bayesian Networks. One of the major interests of these systems resides in the complete training of the models (topology and parameters) starting from training data. The Bayesian Networks are representing models of dubious knowledge on complex phenomena. They are a union between the theory of probability and the graph theory in order to give effective tools to represent a joined probability distribution on a set of random variables. The representation of knowledge bases on description, by graphs, relations of causality existing between the variables defining the field of study. The theory of Dynamic Bayesian Networks is a generalization of the Bayesians networks to the dynamic processes. Our objective amounts finding the better structure which represents the relationships (dependencies) between the variables of a dynamic bayesian network. In applications in pattern recognition, one will carry out the fixing of the structure which obliges us to admit some strong assumptions (for example independence between some variables).Keywords: Arabic on line character recognition, dynamic Bayesian network, pattern recognition, networks
Procedia PDF Downloads 617422 Lowering Error Floors by Concatenation of Low-Density Parity-Check and Array Code
Authors: Cinna Soltanpur, Mohammad Ghamari, Behzad Momahed Heravi, Fatemeh Zare
Abstract:
Low-density parity-check (LDPC) codes have been shown to deliver capacity approaching performance; however, problematic graphical structures (e.g. trapping sets) in the Tanner graph of some LDPC codes can cause high error floors in bit-error-ratio (BER) performance under conventional sum-product algorithm (SPA). This paper presents a serial concatenation scheme to avoid the trapping sets and to lower the error floors of LDPC code. The outer code in the proposed concatenation is the LDPC, and the inner code is a high rate array code. This approach applies an interactive hybrid process between the BCJR decoding for the array code and the SPA for the LDPC code together with bit-pinning and bit-flipping techniques. Margulis code of size (2640, 1320) has been used for the simulation and it has been shown that the proposed concatenation and decoding scheme can considerably improve the error floor performance with minimal rate loss.Keywords: concatenated coding, low–density parity–check codes, array code, error floors
Procedia PDF Downloads 356421 A Real-Time Bayesian Decision-Support System for Predicting Suspect Vehicle’s Intended Target Using a Sparse Camera Network
Authors: Payam Mousavi, Andrew L. Stewart, Huiwen You, Aryeh F. G. Fayerman
Abstract:
We present a decision-support tool to assist an operator in the detection and tracking of a suspect vehicle traveling to an unknown target destination. Multiple data sources, such as traffic cameras, traffic information, weather, etc., are integrated and processed in real-time to infer a suspect’s intended destination chosen from a list of pre-determined high-value targets. Previously, we presented our work in the detection and tracking of vehicles using traffic and airborne cameras. Here, we focus on the fusion and processing of that information to predict a suspect’s behavior. The network of cameras is represented by a directional graph, where the edges correspond to direct road connections between the nodes and the edge weights are proportional to the average time it takes to travel from one node to another. For our experiments, we construct our graph based on the greater Los Angeles subset of the Caltrans’s “Performance Measurement System” (PeMS) dataset. We propose a Bayesian approach where a posterior probability for each target is continuously updated based on detections of the suspect in the live video feeds. Additionally, we introduce the concept of ‘soft interventions’, inspired by the field of Causal Inference. Soft interventions are herein defined as interventions that do not immediately interfere with the suspect’s movements; rather, a soft intervention may induce the suspect into making a new decision, ultimately making their intent more transparent. For example, a soft intervention could be temporarily closing a road a few blocks from the suspect’s current location, which may require the suspect to change their current course. The objective of these interventions is to gain the maximum amount of information about the suspect’s intent in the shortest possible time. Our system currently operates in a human-on-the-loop mode where at each step, a set of recommendations are presented to the operator to aid in decision-making. In principle, the system could operate autonomously, only prompting the operator for critical decisions, allowing the system to significantly scale up to larger areas and multiple suspects. Once the intended target is identified with sufficient confidence, the vehicle is reported to the authorities to take further action. Other recommendations include a selection of road closures, i.e., soft interventions, or to continue monitoring. We evaluate the performance of the proposed system using simulated scenarios where the suspect, starting at random locations, takes a noisy shortest path to their intended target. In all scenarios, the suspect’s intended target is unknown to our system. The decision thresholds are selected to maximize the chances of determining the suspect’s intended target in the minimum amount of time and with the smallest number of interventions. We conclude by discussing the limitations of our current approach to motivate a machine learning approach, based on reinforcement learning in order to relax some of the current limiting assumptions.Keywords: autonomous surveillance, Bayesian reasoning, decision support, interventions, patterns of life, predictive analytics, predictive insights
Procedia PDF Downloads 115420 Indexing and Incremental Approach Using Map Reduce Bipartite Graph (MRBG) for Mining Evolving Big Data
Authors: Adarsh Shroff
Abstract:
Big data is a collection of dataset so large and complex that it becomes difficult to process using data base management tools. To perform operations like search, analysis, visualization on big data by using data mining; which is the process of extraction of patterns or knowledge from large data set. In recent years, the data mining applications become stale and obsolete over time. Incremental processing is a promising approach to refreshing mining results. It utilizes previously saved states to avoid the expense of re-computation from scratch. This project uses i2MapReduce, an incremental processing extension to Map Reduce, the most widely used framework for mining big data. I2MapReduce performs key-value pair level incremental processing rather than task level re-computation, supports not only one-step computation but also more sophisticated iterative computation, which is widely used in data mining applications, and incorporates a set of novel techniques to reduce I/O overhead for accessing preserved fine-grain computation states. To optimize the mining results, evaluate i2MapReduce using a one-step algorithm and three iterative algorithms with diverse computation characteristics for efficient mining.Keywords: big data, map reduce, incremental processing, iterative computation
Procedia PDF Downloads 350419 Indoor Localization by Pattern Matching Method Based on Extended Database
Authors: Gyumin Hwang, Jihong Lee
Abstract:
This paper studied the CSS-based indoor localization system which is easy to implement, inexpensive to compose the systems, additionally CSS-based indoor localization system covers larger area than other system. However, this system has problem which is affected by reflected distance data. This problem in localization is caused by the multi-path effect. Error caused by multi-path is difficult to be corrected because the indoor environment cannot be described. In this paper, in order to solve the problem by multi-path, we have supplemented the localization system by using pattern matching method based on extended database. Thereby, this method improves precision of estimated. Also this method is verified by experiments in gymnasium. Database was constructed by 1 m intervals, and 16 sample data were collected from random position inside the region of DB points. As a result, this paper shows higher accuracy than existing method through graph and table.Keywords: chirp spread spectrum, indoor localization, pattern-matching, time of arrival, multi-path, mahalanobis distance, reception rate, simultaneous localization and mapping, laser range finder
Procedia PDF Downloads 244418 Data Collection with Bounded-Sized Messages in Wireless Sensor Networks
Authors: Min Kyung An
Abstract:
In this paper, we study the data collection problem in Wireless Sensor Networks (WSNs) adopting the two interference models: The graph model and the more realistic physical interference model known as Signal-to-Interference-Noise-Ratio (SINR). The main issue of the problem is to compute schedules with the minimum number of timeslots, that is, to compute the minimum latency schedules, such that data from every node can be collected without any collision or interference to a sink node. While existing works studied the problem with unit-sized and unbounded-sized message models, we investigate the problem with the bounded-sized message model, and introduce a constant factor approximation algorithm. To the best known of our knowledge, our result is the first result of the data collection problem with bounded-sized model in both interference models.Keywords: data collection, collision-free, interference-free, physical interference model, SINR, approximation, bounded-sized message model, wireless sensor networks
Procedia PDF Downloads 221417 Optimization of Bio-Based Mixture of Canarium Luzonicum and Calcium Oxide as Coating Material for Reinforcing Steel Bars
Authors: Charizza D. Montarin, Daryl Jae S. Sigue, Gilford Estores
Abstract:
Philippines was moderately vulnerable to corrosion and to prevent this problem, surface coating should be applied. The main objective of this research was to develop and optimize a bio-based mixture of Pili Resin and Lime as Coating Materials. There are three (3) factors to be considered in choosing the best coating material such as chemical adhesion, friction, and the bearing/shear against the steel bar-concrete interface. Fortunately, both proportions of the Bio-based coating materials (50:50 and 65:35) do not have red rust formation complying with ASTM B117 but failed in terms of ASTM D 3359. Splitting failures of concrete were observed in the Unconfined Reinforced Concrete Samples. All of the steel bars (uncoated and coated) surpassed the Minimum Bond strength (NSCP 2015) about 203% to 285%. The experiments were about 1% to 3% of the results from the ANSYS Simulations with and without Salt Spray Test. Using the bio-based and epoxy coatings, normal splitting strengths were declined. However, there has no significant difference between the results. Thus, the bio-based coating materials can be used as an alternative for the epoxy coating materials and it was highly recommended for Low – Rise Building only.Keywords: Canarium luzonicum, calcium oxide, corrosion, finite element simulations
Procedia PDF Downloads 322416 Simulation of Pedestrian Service Time at Different Delay Times
Authors: Imran Badshah
Abstract:
Pedestrian service time reflects the performance of the facility, and it’s a key parameter to analyze the capability of facilities provided to serve pedestrians. The level of service of pedestrians (LOS) mainly depends on pedestrian time and safety. The pedestrian time utilized by taking a service is mainly influenced by the number of available services and the time utilized by each pedestrian in receiving a service; that is called a delay time. In this paper, we analyzed the simulated pedestrian service time with different delay times. A simulation is performed in AnyLogic by developing a model that reflects the real scenario of pedestrian services such as ticket machine gates at rail stations, airports, shopping malls, and cinema halls. The simulated pedestrian time is determined for various delay values. The simulated result shows how pedestrian time changes with the delay pattern. The histogram and time plot graph of a model gives the mean, maximum and minimum values of the pedestrian time. This study helps us to check the behavior of pedestrian time at various services such as subway stations, airports, shopping malls, and cinema halls.Keywords: agent-based simulation, anylogic model, pedestrian behavior, time delay
Procedia PDF Downloads 210415 From Vertigo to Verticality: An Example of Phenomenological Design in Architecture
Authors: E. Osorio Schmied
Abstract:
Architects commonly attempt a depiction of organic forms when their works are inspired by nature, regardless of the building site. Nevertheless it is also possible to try matching structures with natural scenery, by applying a phenomenological approach in terms of spatial operations, regarding perceptions from nature through architectural aspects such as protection, views, and orientation. This method acknowledges a relationship between place and space, where intentions towards tangible facts then become design statements. Although spaces resulting from such a process may present an effective response to the environment, they can also offer further outcomes beyond the realm of form. The hypothesis is that, in addition to recognising a bond between architecture and nature, it is also plausible to associate such perceptions with the inner ambient of buildings, by analysing features such as daylight. The case study of a single-family house in a rainforest near Valdivia, Chilean Patagonia is presented, with the intention of addressing the above notions through a discussion of the actual effects of inhabiting a place by way of a series of insights, including a revision of diagrams and photographs that assist in understanding the implications of this design practice. In addition, figures based on post-occupancy behaviour and daylighting performance relate both architectural and environmental issues to a decision-making process motivated by the observation of nature.Keywords: architecture, design statements, nature, perception
Procedia PDF Downloads 342414 The Prostitute’s Body in Diasporic Space: Sexualized China and Chineseness in Yu Dafu’s Sinking and Yan Geling’s The Lost Daughter of Happiness
Authors: Haizhi Wu
Abstract:
Sexualization brings together the interdependent experiences of prostitution and diaspora, establishing a masculine structure where a female’s body mediates the hegemony and sexuality of men from different races. Between eroticism and homesickness, writers of the Chinese diaspora develop sensual approaches to reflect on the diasporic experience and sexual frustration. Noticeably, Yu Dafu in Sinking and Yan Geling in The Lost Daughter of Happiness both take an interest in sexual encounters between an immature teen client and an erotically powerful prostitute in Japan or America, both countries considered colonizers in Chinese history. Both are utilizing the metaphor of body-space interplay to hint at the out-of-text transnational interactions, two writers, however, present distinct understandings of their bond with history and memory of the semi-colonial, semi-feudal China. Examining prostitutes’ bodies in multi-layer diasporic spaces, the central analysis of this essay works on the sexual, colonial, and historical representations of this bodily symbol and the prostitution’s engagement in negotiating with diaspora and “Chineseness”.Keywords: Chineseness, diasporic spaces, prostitutes’ bodies, sexualization
Procedia PDF Downloads 108413 Temperature Dependence of Relative Permittivity: A Measurement Technique Using Split Ring Resonators
Authors: Sreedevi P. Chakyar, Jolly Andrews, V. P. Joseph
Abstract:
A compact method for measuring the relative permittivity of a dielectric material at different temperatures using a single circular Split Ring Resonator (SRR) metamaterial unit working as a test probe is presented in this paper. The dielectric constant of a material is dependent upon its temperature and the LC resonance of the SRR depends on its dielectric environment. Hence, the temperature of the dielectric material in contact with the resonator influences its resonant frequency. A single SRR placed between transmitting and receiving probes connected to a Vector Network Analyser (VNA) is used as a test probe. The dependence of temperature between 30 oC and 60 oC on resonant frequency of SRR is analysed. Relative permittivities ‘ε’ of test samples for different temperatures are extracted from a calibration graph drawn between the relative permittivity of samples of known dielectric constant and their corresponding resonant frequencies. This method is found to be an easy and efficient technique for analysing the temperature dependent permittivity of different materials.Keywords: metamaterials, negative permeability, permittivity measurement techniques, split ring resonators, temperature dependent dielectric constant
Procedia PDF Downloads 412412 Performance Analysis of Elliptic Curve Cryptography Using Onion Routing to Enhance the Privacy and Anonymity in Grid Computing
Authors: H. Parveen Begam, M. A. Maluk Mohamed
Abstract:
Grid computing is an environment that allows sharing and coordinated use of diverse resources in dynamic, heterogeneous and distributed environment using Virtual Organization (VO). Security is a critical issue due to the open nature of the wireless channels in the grid computing which requires three fundamental services: authentication, authorization, and encryption. The privacy and anonymity are considered as an important factor while communicating over publicly spanned network like web. To ensure a high level of security we explored an extension of onion routing, which has been used with dynamic token exchange along with protection of privacy and anonymity of individual identity. To improve the performance of encrypting the layers, the elliptic curve cryptography is used. Compared to traditional cryptosystems like RSA (Rivest-Shamir-Adelman), ECC (Elliptic Curve Cryptosystem) offers equivalent security with smaller key sizes which result in faster computations, lower power consumption, as well as memory and bandwidth savings. This paper presents the estimation of the performance improvements of onion routing using ECC as well as the comparison graph between performance level of RSA and ECC.Keywords: grid computing, privacy, anonymity, onion routing, ECC, RSA
Procedia PDF Downloads 398411 Calpoly Autonomous Transportation Experience: Software for Driverless Vehicle Operating on Campus
Authors: F. Tang, S. Boskovich, A. Raheja, Z. Aliyazicioglu, S. Bhandari, N. Tsuchiya
Abstract:
Calpoly Autonomous Transportation Experience (CATE) is a driverless vehicle that we are developing to provide safe, accessible, and efficient transportation of passengers throughout the Cal Poly Pomona campus for events such as orientation tours. Unlike the other self-driving vehicles that are usually developed to operate with other vehicles and reside only on the road networks, CATE will operate exclusively on walk-paths of the campus (potentially narrow passages) with pedestrians traveling from multiple locations. Safety becomes paramount as CATE operates within the same environment as pedestrians. As driverless vehicles assume greater roles in today’s transportation, this project will contribute to autonomous driving with pedestrian traffic in a highly dynamic environment. The CATE project requires significant interdisciplinary work. Researchers from mechanical engineering, electrical engineering and computer science are working together to attack the problem from different perspectives (hardware, software and system). In this abstract, we describe the software aspects of the project, with a focus on the requirements and the major components. CATE shall provide a GUI interface for the average user to interact with the car and access its available functionalities, such as selecting a destination from any origin on campus. We have developed an interface that provides an aerial view of the campus map, the current car location, routes, and the goal location. Users can interact with CATE through audio or manual inputs. CATE shall plan routes from the origin to the selected destination for the vehicle to travel. We will use an existing aerial map for the campus and convert it to a spatial graph configuration where the vertices represent the landmarks and edges represent paths that the car should follow with some designated behaviors (such as stay on the right side of the lane or follow an edge). Graph search algorithms such as A* will be implemented as the default path planning algorithm. D* Lite will be explored to efficiently recompute the path when there are any changes to the map. CATE shall avoid any static obstacles and walking pedestrians within some safe distance. Unlike traveling along traditional roadways, CATE’s route directly coexists with pedestrians. To ensure the safety of the pedestrians, we will use sensor fusion techniques that combine data from both lidar and stereo vision for obstacle avoidance while also allowing CATE to operate along its intended route. We will also build prediction models for pedestrian traffic patterns. CATE shall improve its location and work under a GPS-denied situation. CATE relies on its GPS to give its current location, which has a precision of a few meters. We have implemented an Unscented Kalman Filter (UKF) that allows the fusion of data from multiple sensors (such as GPS, IMU, odometry) in order to increase the confidence of localization. We also noticed that GPS signals can easily get degraded or blocked on campus due to high-rise buildings or trees. UKF can also help here to generate a better state estimate. In summary, CATE will provide on-campus transportation experience that coexists with dynamic pedestrian traffic. In future work, we will extend it to multi-vehicle scenarios.Keywords: driverless vehicle, path planning, sensor fusion, state estimate
Procedia PDF Downloads 144410 Getting Out: A Framework for Exiting/Escaping Sex Trafficking
Authors: Amanda Noble
Abstract:
The process of exiting/escaping situations of sex trafficking can be arduous and fraught with numerous barriers. In this paper the results of a national Canadian study on escaping situations of sex trafficking is discussed. Surveys and focus groups were conducted with 201 stakeholders in 8 cities, including 50 survivors of sex trafficking, service providers, health care providers and police. The results show that survivors are both vulnerable to being exploited and experience barriers to exiting as a result of structural factors such as colonialism, poverty, and discrimination based on race and gender. Survivors also face numerous barriers within various systems such as child welfare and the legal system. In addition, survivors contend with multiple psychological and psychosocial factors when exiting including the trauma bond, complex trauma and mental health concerns, substance use, isolation, and adjusting to ‘mainstream’ life. In light of these factors, the service needs of survivors escaping sex trafficking are discussed, and promising practices, such as trauma-informed practice and working from a stages of change model are outlined. This paper is useful for service providers that work with survivors, policy makers, or anyone who has ever wondered why survivors that are not being physically detained don’t ‘just leave’ or escape their exploitative situations.Keywords: Barriers, Exiting, Promising Practices, Sex Trafficking
Procedia PDF Downloads 96409 Investigating Methanol Interaction on Hexagonal Ceria-BTC Microrods
Authors: Jamshid Hussain, Kuen Song Lin
Abstract:
For prospective applications, chemists and materials scientists are particularly interested in creating 3D-micro/nanocomposite structures with shapes and unique characteristics. Ceria has recently been produced with a variety of morphologies, including one-dimensional structures (nanoparticles, nanorods, nanowires, and nanotubes). It is anticipated that this material can be used in different fields, such as catalysis, methanol decomposition, carbon monoxide oxidation, optical materials, and environmental protection. Distinct three-dimensional hydrated ceria-BTC (CeO₂-1,3,5-Benzenetricarboxylic-acid) microstructures were successfully synthesized via a hydrothermal route in an aqueous solution. FE-SEM and XRD patterns reveal that a ceria-BTC framework diameter and length are approximately 1.45–2.4 and 5.5–6.5 µm, respectively, at 130 oC and with pH 2 for 72 h. It was demonstrated that the reaction conditions affected the 3D ceria-BTC architecture. The hexagonal ceria-BTC microrod comprises organic linkers, which are transformed into hierarchical ceria microrod in the presences of air at 400 oC was confirmed by Fourier transform infrared spectroscopy. The Ce-O bonding of the hierarchical ceria microrod (HCMs) species has a bond distance and coordination number of 2.44 and 6.89, respectively, which attenuates the EXAFS spectra. Compared to the ceria powder, the HCMs produced more oxygen vacancies and Ce3+ as shown by the XPS and XANES/EXAFS analyses.Keywords: hierarchical ceria microrod, three-dimensional ceria, methanol decomposition, reaction mechanism, XANES/EXAFS
Procedia PDF Downloads 8408 First-Principles Study of Inter-Cage Interactions in Inorganic Molecular Crystals
Authors: Abdul Majid, Alia Jabeen, Nimra Zulifqar
Abstract:
The inorganic molecular crystal (IMCs) due to their unusual structure has grabbed a lot of attention due to anisotropy in crystal structure. The IMCs consist of the molecular structures joined together via weak forces. Therefore, a difference between the bonding between the inter-cage and intra-cage interactions exists. To look closely at the bonding and interactions, we investigated interactions between two cages of Sb2O3 structure. The interactions were characterized via Extended Transition State-Natural Orbital for Chemical Valence-method (ETS-NOCV), Natural Bond Orbitals (NBO) and Quantum Theory of Atoms in Molecules (QTAIM). The results revealed strong intra-cage covalent bonding while weak van der Waals (vdWs) interactions along inter-cages exits. This structure cannot be termed as layered material although they have anisotropy in bonding and presence of weak vdWs interactions but its bulk is termed as inorganic layered clusters. This is due to the fact that the free standing sheet/films with these materials are not possible. This type of structures may be the most feasible to be used for the system to deal with high pressures and stress bearing materials.Keywords: inorganic molecular crystals, density functional theory, cages, interactions
Procedia PDF Downloads 93407 Dynamics of the Coupled Fitzhugh-Rinzel Neurons
Authors: Sanjeev Kumar Sharma, Arnab Mondal, Ranjit Kumar Upadhyay
Abstract:
Excitable cells often produce different oscillatory activities that help us to understand the transmitting and processing of signals in the neural system. We consider a FitzHugh-Rinzel (FH-R) model and studied the different dynamics of the model by considering the parameter c as the predominant parameter. The model exhibits different types of neuronal responses such as regular spiking, mixed-mode bursting oscillations (MMBOs), elliptic bursting, etc. Based on the bifurcation diagram, we consider the three regimes (MMBOs, elliptic bursting, and quiescent state). An analytical treatment for the occurrence of the supercritical Hopf bifurcation is studied. Further, we extend our study to a network of a hundred neurons by considering the bi-directional synaptic coupling between them. In this article, we investigate the alternation of spiking propagation and bursting phenomena of an uncoupled and coupled FH-R neurons. We explore that the complete graph of heterogenous desynchronized neurons can exhibit different types of bursting oscillations for certain coupling strength. For higher coupling strength, all the neurons in the network show complete synchronization.Keywords: excitable neuron model, spiking-bursting, stability and bifurcation, synchronization networks
Procedia PDF Downloads 127406 A Deep Learning-Based Pedestrian Trajectory Prediction Algorithm
Authors: Haozhe Xiang
Abstract:
With the rise of the Internet of Things era, intelligent products are gradually integrating into people's lives. Pedestrian trajectory prediction has become a key issue, which is crucial for the motion path planning of intelligent agents such as autonomous vehicles, robots, and drones. In the current technological context, deep learning technology is becoming increasingly sophisticated and gradually replacing traditional models. The pedestrian trajectory prediction algorithm combining neural networks and attention mechanisms has significantly improved prediction accuracy. Based on in-depth research on deep learning and pedestrian trajectory prediction algorithms, this article focuses on physical environment modeling and learning of historical trajectory time dependence. At the same time, social interaction between pedestrians and scene interaction between pedestrians and the environment were handled. An improved pedestrian trajectory prediction algorithm is proposed by analyzing the existing model architecture. With the help of these improvements, acceptable predicted trajectories were successfully obtained. Experiments on public datasets have demonstrated the algorithm's effectiveness and achieved acceptable results.Keywords: deep learning, graph convolutional network, attention mechanism, LSTM
Procedia PDF Downloads 70405 Travel Planning in Public Transport Networks Applying the Algorithm A* for Metropolitan District of Quito
Authors: M. Fernanda Salgado, Alfonso Tierra, Wilbert Aguilar
Abstract:
The present project consists in applying the informed search algorithm A star (A*) to solve traveler problems, applying it by urban public transportation routes. The digitization of the information allowed to identify 26% of the total of routes that are registered within the Metropolitan District of Quito. For the validation of this information, data were taken in field on the travel times and the difference with respect to the times estimated by the program, resulting in that the difference between them was not greater than 2:20 minutes. We validate A* algorithm with the Dijkstra algorithm, comparing nodes vectors based on the public transport stops, the validation was established through the student t-test hypothesis. Then we verified that the times estimated by the program using the A* algorithm are similar to those registered on field. Furthermore, we review the performance of the algorithm generating iterations in both algorithms. Finally, with these iterations, a hypothesis test was carried out again with student t-test where it was concluded that the iterations of the base algorithm Dijsktra are greater than those generated by the algorithm A*.Keywords: algorithm A*, graph, mobility, public transport, travel planning, routes
Procedia PDF Downloads 239404 Classification of Poverty Level Data in Indonesia Using the Naïve Bayes Method
Authors: Anung Style Bukhori, Ani Dijah Rahajoe
Abstract:
Poverty poses a significant challenge in Indonesia, requiring an effective analytical approach to understand and address this issue. In this research, we applied the Naïve Bayes classification method to examine and classify poverty data in Indonesia. The main focus is on classifying data using RapidMiner, a powerful data analysis platform. The analysis process involves data splitting to train and test the classification model. First, we collected and prepared a poverty dataset that includes various factors such as education, employment, and health..The experimental results indicate that the Naïve Bayes classification model can provide accurate predictions regarding the risk of poverty. The use of RapidMiner in the analysis process offers flexibility and efficiency in evaluating the model's performance. The classification produces several values to serve as the standard for classifying poverty data in Indonesia using Naive Bayes. The accuracy result obtained is 40.26%, with a moderate recall result of 35.94%, a high recall result of 63.16%, and a low recall result of 38.03%. The precision for the moderate class is 58.97%, for the high class is 17.39%, and for the low class is 58.70%. These results can be seen from the graph below.Keywords: poverty, classification, naïve bayes, Indonesia
Procedia PDF Downloads 55403 Benzoxaboralone: A Boronic Acid with High Oxidative Stability and Utility in Biological Contexts
Authors: Brian J. Graham, Ronald T. Raines
Abstract:
The presence of a nearly vacant p orbital on boron endows boronic acids with unique abilities as a catalyst and ligand. An organocatalytic process has been developed for the conversion of biomass-derived sugars to 5-hydroxymethylfurfural, which is a platform chemical. Specifically, 2-carboxyphenylboronic acid (2-CPBA) has been shown to be an optimal catalyst for this process, promoting the desired transformation in the absence of metals. The attributes of 2-CPBA as a catalyst led to additional investigations of its structure and reactivity. 2-CPBA was found to exist as a cyclized benzoxaborolone adduct rather than a free carboxylic acid. This cyclization has profound consequences for the oxidative stability of the boronic acid. Stereoelectronic effects within the oxaborolone ring destabilize the oxidation transition state by reducing electron donation from the cyclic oxygen to the developing p orbital on boron. That leads to a 10,000-fold increase in oxidative stability while maintaining the normal reactivity of boronic acids toward diols (e.g., carbohydrates) and nucleophiles in proteins while also presenting numerous hydrogen-bond accepting and donating groups. Thus, benzoxaborolones are useful in catalysis, chemical biology, medicinal chemistry, and allied fields.Keywords: bioisosteres, boronic acid, catalysis, oxidative stability, pharmacophore, stereoelectronic effects
Procedia PDF Downloads 189402 Effect of Rubber Treatment on Compressive Strength and Modulus of Elasticity of Self-Compacting Rubberized Concrete
Authors: I. Miličević, M. Hadzima Nyarko, R. Bušić, J. Simonović Radosavljević, M. Prokopijević, K. Vojisavljević
Abstract:
This paper investigates the effects of different treatment methods of rubber aggregates for self-compacting concrete (SCC) on compressive strength and modulus of elasticity. SCC mixtures with 10% replacement of fine aggregate with crumb rubber by total aggregate volume and with different aggregate treatment methods were investigated. The rubber aggregate was treated in three different methods: dry process, water-soaking, and NaOH treatment plus water soaking. Properties of SCC in a fresh and hardened state were tested and evaluated. Scanning electron microscope (SEM) analysis of three different SCC patches were made and discussed. It was observed that applying the proposed NaOH plus water soaking method resulted in the improvement of fresh and hardened concrete properties. It resulted in a more uniform distribution of rubber particles in the cement matrix, a better bond between rubber particles and the cement matrix, and higher compressive strength of SCC rubberized concrete.Keywords: compressive strength, modulus of elasticity, NaOH treatment, rubber aggregate, self-compacting rubberized concrete, scanning electron microscope analysis
Procedia PDF Downloads 108401 Dilution Effect in Islamic Finance: The Case of Convertible Sukuk
Authors: Mahfoud Djebbar
Abstract:
Stock dilution is a financial phenomenon resulting from the issue of additional shares by a company, or when holders convert their convertibles into new shares (capital increase). This issue and/or conversion enlarge the company’s share base that will result in marginal dilution (loss) for existing shareholders, and a benefit to new ones. Dilution issues have already been addressed in mainstream finance, particularly as far as information disclosure is concerned. However, in Islamic finance, stock dilution problems have not been deeply studied and the subject has not received sufficient attention from shariah-compatible firms, investors, and scholars. In this regard, this paper emphasises the forms, the effects of capital dilution on current shareholders as well as the ways and techniques of compensating them. And since the research in this field, in its Islamic perspective, is still in its infancy, the paper tries to analyse the phenomenon theoretically in detail using numerical examples, and expose some case studies of Shariah-compliant issuers of convertible Sukuk and how they compensate their existing shareholders. Finally, this study shows that the Sukuk issuers compensate old shareholders using the right of shuf’ah as a well known and practiced pre-emptive right in Islamic transactions centuries ago, as well as the ways conventional bond issuers use.Keywords: compensating shareholders, convertible Sukuk, Islamic financial innovation, Shuf’ah
Procedia PDF Downloads 338400 Energy-Dense and High-Power Li-Cl₂/I₂ Batteries by Reversible Chemical Bonds
Authors: Pei Li, Chunyi Zhi
Abstract:
Conversion-type lithium-ion batteries show great potential as high-energy-density, low-cost and sustainable alternatives to current transition-metal-based intercalation cells. Li-Cl₂/Li⁻I₂ conversion batteries, based on anionic redox reactions of Cl⁻/Cl⁰ or I⁻/I⁰, are highly attractive due to their superior voltage and capacity. However, a redox-active and reversible chlorine cathode has not been developed in organic electrolytes. And thermodynamic instability and shuttling issues of iodine cathodes have plagued the active iodine loading, capacity retention and cyclability. By reversible chemical bonds, we develop reversible chlorine redox reactions in organic electrolytes with interhalogen bonds between I and Cl for Li-I₂ batteries and develop a highly thermally stable I/I₃--bonded organic salts with iodine content up to 80% as cathode materials for the rechargeable Li-I₂ batteries. The demonstration of reversible chemical bonds enabled rechargeable Li-halogen batteries opens a new avenue to develop halogen compound cathodes.Keywords: conversion-type, chlorine, halogen cathode, high energy density, iodine, interhalogen bond, lithium-ion batteries
Procedia PDF Downloads 84399 Atmospheric Oxidation of Carbonyls: Insight to Mechanism, Kinetic and Thermodynamic Parameters
Authors: Olumayede Emmanuel Gbenga, Adeniyi Azeez Adebayo
Abstract:
Carbonyls are the first-generation products from tropospheric degradation reactions of volatile organic compounds (VOCs). This computational study examined the mechanism of removal of carbonyls from the atmosphere via hydroxyl radical. The kinetics of the reactions were computed from the activation energy (using enthalpy (ΔH**) and Gibbs free energy (ΔG**). The minimum energy path (MEP) analysis reveals that in all the molecules, the products have more stable energy than the reactants, which implies that the forward reaction is more thermodynamically favorable. The hydrogen abstraction of the aromatic aldehyde, especially without methyl substituents, is more kinetically favorable compared with the other aldehydes in the order of aromatic (without methyl or meta methyl) > alkene (short chain) > diene > long-chain aldehydes. The activation energy is much lower for the forward reaction than the backward, indicating that the forward reactions are more kinetically stable than their backward reaction. In terms of thermodynamic stability, the aromatic compounds are found to be less favorable in comparison to the aliphatic. The study concludes that the chemistry of the carbonyl bond of the aldehyde changed significantly from the reactants to the products.Keywords: atmospheric carbonyls, oxidation, mechanism, kinetic, thermodynamic
Procedia PDF Downloads 50398 Solution to Riemann Hypothesis Critical Strip Zone Using Non-Linear Complex Variable Functions
Authors: Manojkumar Sabanayagam
Abstract:
The Riemann hypothesis is an unsolved millennium problem and the search for a solution to the Riemann hypothesis is to study the pattern of prime number distribution. The scope of this paper is to identify the solution for the critical strip and the critical line axis, which has the non-trivial zero solutions using complex plane functions. The Riemann graphical plot is constructed using a linear complex variable function (X+iY) and is applicable only when X>1. But the investigation shows that complex variable behavior has two zones. The first zone is the transformation zone, where the definition of the complex plane should be a non-linear variable which is the critical strip zone in the graph (X=0 to 1). The second zone is the transformed zone (X>1) defined using linear variables conventionally. This paper deals with the Non-linear function in the transformation zone derived using cosine and sinusoidal time lag w.r.t imaginary number ‘i’. The alternate complex variable (Cosθ+i Sinθ) is used to understand the variables in the critical strip zone. It is concluded that the non-trivial zeros present in the Real part 0.5 are because the linear function is not the correct approach in the critical strip. This paper provides the solution to Reimann's hypothesis.Keywords: Reimann hypothesis, critical strip, complex plane, transformation zone
Procedia PDF Downloads 208397 Behavior of Reinforced Soil by Polypropylene Fibers
Authors: M. Kamal Elbokl
Abstract:
The beneficial effects of reinforcing the subgrade soil in pavement system with randomly distributed polypropylene fibers were investigated. For this issue, two types of soils and one type of fiber were selected. Proctor, CBR and unconfined compression tests were conducted on unreinforced samples as well as reinforced ones at different concentrations and aspect ratio of fibers. OMC, CBR and modulus of elasticity were investigated and thereby, the optimum value of aspect ratio and fiber content were determined. The static and repeated triaxial tests were also conducted to study the behaviour of fiber reinforced soils under both static and repeated loading. The results indicated that CBR values of reinforced sand and clay were 3.1 and 4.2 times of their unreinforced values respectively. The modulus of elasticity of fiber reinforced soils has increased by 100% for silty sandy soil and 60.20% for silty clay soil due to fiber reinforcement. The reinforced soils exhibited higher failure stresses in the static triaxial tests than the unreinforced ones due to the apparent bond developed between soil particle and the fiber. Fiber reinforcement of subgrade soils can play an important role in control the rut formation in the pavement system.Keywords: polypropylene fibers, CBR, static triaxial, cyclic triaxial, resilient strain, permanent strain
Procedia PDF Downloads 623396 Synthesis of 2-Aminoisocoumarinoselenazoles via Transition Metal-Free Alkylation and Ru(II)-Catalyzed [4+2] Alkyne Annulation
Authors: Sunil Kumar, Sandip Dhole, Deepak Salunke, Chung-ming Sun
Abstract:
Heterocycles bearing nitrogen, oxygen, and selenium are present in innumerable biologically active compounds. For instance, coumarin containing dicoumarol acts as naturally occurring anticoagulant. 2-Acylamido selenazole works as Store-Operated Calcium (SOC) channel regulator. Therefore, due to biologically significance of selenazole and coumarin and our quest to develop efficient methodologies for the synthesis of complex heterocycles, the trisubstituted angular isocoumarinoselenazole synthesis was proposed and achieved by starting from nitrobenzoic acid derivative, available commercially. Synthetic procedure involves three steps: i) the construction of 2-aminobenzoselenazoles, ii) their regioselective N-alkylation at position-2 and iii) alkyne insertion via Ru catalyzed C-H activation. Transition metal free synthesis of benzoselenazoles was successfully brought about by the addition/elimination reaction via intramolecular C-Se bond formation. In the next step, N-alkylation of selenazole furnished two regioisomers. Both the isomers exhibited different reactivity towards [4+2] alkyne annulation reaction. The fusion of α-pyrone ring on the benzo[1,3-d]selenazole skeleton was achieved via Ru(II)-catalyzed C-H activation and alkyne insertion. As evident from mechanism, the selenazole 'N' plays an important role for the experiential selectivity.Keywords: alkylation, alkyne insertion, coumarin, selenazole
Procedia PDF Downloads 125395 A Mobile Application for Analyzing and Forecasting Crime Using Autoregressive Integrated Moving Average with Artificial Neural Network
Authors: Gajaanuja Megalathan, Banuka Athuraliya
Abstract:
Crime is one of our society's most intimidating and threatening challenges. With the majority of the population residing in cities, many experts and data provided by local authorities suggest a rapid increase in the number of crimes committed in these cities in recent years. There has been an increasing graph in the crime rates. People living in Sri Lanka have the right to know the exact crime rates and the crime rates in the future of the place they are living in. Due to the current economic crisis, crime rates have spiked. There have been so many thefts and murders recorded within the last 6-10 months. Although there are many sources to find out, there is no solid way of searching and finding out the safety of the place. Due to all these reasons, there is a need for the public to feel safe when they are introduced to new places. Through this research, the author aims to develop a mobile application that will be a solution to this problem. It is mainly targeted at tourists, and people who recently relocated will gain advantage of this application. Moreover, the Arima Model combined with ANN is to be used to predict crime rates. From the past researchers' works, it is evidently clear that they haven’t used the Arima model combined with Artificial Neural Networks to forecast crimes.Keywords: arima model, ANN, crime prediction, data analysis
Procedia PDF Downloads 131394 Intrusion Detection and Prevention System (IDPS) in Cloud Computing Using Anomaly-Based and Signature-Based Detection Techniques
Authors: John Onyima, Ikechukwu Ezepue
Abstract:
Virtualization and cloud computing are among the fast-growing computing innovations in recent times. Organisations all over the world are moving their computing services towards the cloud this is because of its rapid transformation of the organization’s infrastructure and improvement of efficient resource utilization and cost reduction. However, this technology brings new security threats and challenges about safety, reliability and data confidentiality. Evidently, no single security technique can guarantee security or protection against malicious attacks on a cloud computing network hence an integrated model of intrusion detection and prevention system has been proposed. Anomaly-based and signature-based detection techniques will be integrated to enable the network and its host defend themselves with some level of intelligence. The anomaly-base detection was implemented using the local deviation factor graph-based (LDFGB) algorithm while the signature-based detection was implemented using the snort algorithm. Results from this collaborative intrusion detection and prevention techniques show robust and efficient security architecture for cloud computing networks.Keywords: anomaly-based detection, cloud computing, intrusion detection, intrusion prevention, signature-based detection
Procedia PDF Downloads 305