Search results for: hierarchical graph neuron
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1089

Search results for: hierarchical graph neuron

429 An Investigation on the Relationship between Taxi Company Safety Climate and Safety Performance of Taxi Drivers in Iloilo City

Authors: Jasper C. Dioco

Abstract:

The study was done to investigate the relationship of taxi company safety climate and drivers’ safety motivation and knowledge on taxi drivers’ safety performance. Data were collected from three Taxi Companies with taxi drivers as participants (N = 84). The Hiligaynon translated version of Transportation Companies’ Climate Scale (TCCS), Safety Motivation and Knowledge Scale, Occupational Safety Motivation Questionnaire and Global Safety Climate Scale were used to study the relationships among four parameters: (a) Taxi company safety climate; (b) Safety motivation; (c) Safety knowledge; and (d) Safety performance. Correlational analyses found that there is no relation between safety climate and safety performance. A Hierarchical regression demonstrated that safety motivation predicts the most variance in safety performance. The results will greatly impact how taxi company can increase safe performance through the confirmation of the proximity of variables to organizational outcome. A strong positive safety climate, in which employees perceive safety to be a priority and that managers are committed to their safety, is likely to increase motivation to be safety. Hence, to improve outcomes, providing knowledge based training and health promotion programs within the organization must be implemented. Policy change might include overtime rules and fatigue driving awareness programs.

Keywords: safety climate, safety knowledge, safety motivation, safety performance, taxi drivers

Procedia PDF Downloads 167
428 Temperature Dependence of Relative Permittivity: A Measurement Technique Using Split Ring Resonators

Authors: Sreedevi P. Chakyar, Jolly Andrews, V. P. Joseph

Abstract:

A compact method for measuring the relative permittivity of a dielectric material at different temperatures using a single circular Split Ring Resonator (SRR) metamaterial unit working as a test probe is presented in this paper. The dielectric constant of a material is dependent upon its temperature and the LC resonance of the SRR depends on its dielectric environment. Hence, the temperature of the dielectric material in contact with the resonator influences its resonant frequency. A single SRR placed between transmitting and receiving probes connected to a Vector Network Analyser (VNA) is used as a test probe. The dependence of temperature between 30 oC and 60 oC on resonant frequency of SRR is analysed. Relative permittivities ‘ε’ of test samples for different temperatures are extracted from a calibration graph drawn between the relative permittivity of samples of known dielectric constant and their corresponding resonant frequencies. This method is found to be an easy and efficient technique for analysing the temperature dependent permittivity of different materials.

Keywords: metamaterials, negative permeability, permittivity measurement techniques, split ring resonators, temperature dependent dielectric constant

Procedia PDF Downloads 385
427 Performance Analysis of Elliptic Curve Cryptography Using Onion Routing to Enhance the Privacy and Anonymity in Grid Computing

Authors: H. Parveen Begam, M. A. Maluk Mohamed

Abstract:

Grid computing is an environment that allows sharing and coordinated use of diverse resources in dynamic, heterogeneous and distributed environment using Virtual Organization (VO). Security is a critical issue due to the open nature of the wireless channels in the grid computing which requires three fundamental services: authentication, authorization, and encryption. The privacy and anonymity are considered as an important factor while communicating over publicly spanned network like web. To ensure a high level of security we explored an extension of onion routing, which has been used with dynamic token exchange along with protection of privacy and anonymity of individual identity. To improve the performance of encrypting the layers, the elliptic curve cryptography is used. Compared to traditional cryptosystems like RSA (Rivest-Shamir-Adelman), ECC (Elliptic Curve Cryptosystem) offers equivalent security with smaller key sizes which result in faster computations, lower power consumption, as well as memory and bandwidth savings. This paper presents the estimation of the performance improvements of onion routing using ECC as well as the comparison graph between performance level of RSA and ECC.

Keywords: grid computing, privacy, anonymity, onion routing, ECC, RSA

Procedia PDF Downloads 380
426 Calpoly Autonomous Transportation Experience: Software for Driverless Vehicle Operating on Campus

Authors: F. Tang, S. Boskovich, A. Raheja, Z. Aliyazicioglu, S. Bhandari, N. Tsuchiya

Abstract:

Calpoly Autonomous Transportation Experience (CATE) is a driverless vehicle that we are developing to provide safe, accessible, and efficient transportation of passengers throughout the Cal Poly Pomona campus for events such as orientation tours. Unlike the other self-driving vehicles that are usually developed to operate with other vehicles and reside only on the road networks, CATE will operate exclusively on walk-paths of the campus (potentially narrow passages) with pedestrians traveling from multiple locations. Safety becomes paramount as CATE operates within the same environment as pedestrians. As driverless vehicles assume greater roles in today’s transportation, this project will contribute to autonomous driving with pedestrian traffic in a highly dynamic environment. The CATE project requires significant interdisciplinary work. Researchers from mechanical engineering, electrical engineering and computer science are working together to attack the problem from different perspectives (hardware, software and system). In this abstract, we describe the software aspects of the project, with a focus on the requirements and the major components. CATE shall provide a GUI interface for the average user to interact with the car and access its available functionalities, such as selecting a destination from any origin on campus. We have developed an interface that provides an aerial view of the campus map, the current car location, routes, and the goal location. Users can interact with CATE through audio or manual inputs. CATE shall plan routes from the origin to the selected destination for the vehicle to travel. We will use an existing aerial map for the campus and convert it to a spatial graph configuration where the vertices represent the landmarks and edges represent paths that the car should follow with some designated behaviors (such as stay on the right side of the lane or follow an edge). Graph search algorithms such as A* will be implemented as the default path planning algorithm. D* Lite will be explored to efficiently recompute the path when there are any changes to the map. CATE shall avoid any static obstacles and walking pedestrians within some safe distance. Unlike traveling along traditional roadways, CATE’s route directly coexists with pedestrians. To ensure the safety of the pedestrians, we will use sensor fusion techniques that combine data from both lidar and stereo vision for obstacle avoidance while also allowing CATE to operate along its intended route. We will also build prediction models for pedestrian traffic patterns. CATE shall improve its location and work under a GPS-denied situation. CATE relies on its GPS to give its current location, which has a precision of a few meters. We have implemented an Unscented Kalman Filter (UKF) that allows the fusion of data from multiple sensors (such as GPS, IMU, odometry) in order to increase the confidence of localization. We also noticed that GPS signals can easily get degraded or blocked on campus due to high-rise buildings or trees. UKF can also help here to generate a better state estimate. In summary, CATE will provide on-campus transportation experience that coexists with dynamic pedestrian traffic. In future work, we will extend it to multi-vehicle scenarios.

Keywords: driverless vehicle, path planning, sensor fusion, state estimate

Procedia PDF Downloads 123
425 Social Processes and Organizational Structures for the Management of Exploration and Exploration within and across Organization Boundaries

Authors: Linda O. N. Nwabunike

Abstract:

The role of internal and external efforts in the management of exploration and exploitation has been highlighted in literature. External ties support ambidexterity at different levels with, for instance: business unit ambidexterity, individual ambidexterity, organizational ambidexterity, and alliance ambidexterity. Recently studies have highlighted the combination of organization, alliance, and acquisition strategies for ambidexterity by conceptualizing ambidexterity across modes of operation. Literature still lacks detailed understanding of how these different processes are combined in the management of ambidexterity across modes of operation. This study plans to propose a conceptual model that illustrates the social processes involved in the management of ambidexterity across modes of operation. Main arguments are integrated from social structures, organizational design, and ambidexterity literature. The framework illustrates that how social capital is promoted by hierarchical relations within the organization and business relations across the boundaries of the organization. Whereby such social relations within and outside the organization are supported by the dual structures of the organization in the coordination of multiple efforts. This paper has potential to contribute to the understanding about how ambidexterity is attained.

Keywords: ambidexterity, coordination, external-ties, social-capital

Procedia PDF Downloads 149
424 A Deep Learning-Based Pedestrian Trajectory Prediction Algorithm

Authors: Haozhe Xiang

Abstract:

With the rise of the Internet of Things era, intelligent products are gradually integrating into people's lives. Pedestrian trajectory prediction has become a key issue, which is crucial for the motion path planning of intelligent agents such as autonomous vehicles, robots, and drones. In the current technological context, deep learning technology is becoming increasingly sophisticated and gradually replacing traditional models. The pedestrian trajectory prediction algorithm combining neural networks and attention mechanisms has significantly improved prediction accuracy. Based on in-depth research on deep learning and pedestrian trajectory prediction algorithms, this article focuses on physical environment modeling and learning of historical trajectory time dependence. At the same time, social interaction between pedestrians and scene interaction between pedestrians and the environment were handled. An improved pedestrian trajectory prediction algorithm is proposed by analyzing the existing model architecture. With the help of these improvements, acceptable predicted trajectories were successfully obtained. Experiments on public datasets have demonstrated the algorithm's effectiveness and achieved acceptable results.

Keywords: deep learning, graph convolutional network, attention mechanism, LSTM

Procedia PDF Downloads 44
423 Travel Planning in Public Transport Networks Applying the Algorithm A* for Metropolitan District of Quito

Authors: M. Fernanda Salgado, Alfonso Tierra, Wilbert Aguilar

Abstract:

The present project consists in applying the informed search algorithm A star (A*) to solve traveler problems, applying it by urban public transportation routes. The digitization of the information allowed to identify 26% of the total of routes that are registered within the Metropolitan District of Quito. For the validation of this information, data were taken in field on the travel times and the difference with respect to the times estimated by the program, resulting in that the difference between them was not greater than 2:20 minutes. We validate A* algorithm with the Dijkstra algorithm, comparing nodes vectors based on the public transport stops, the validation was established through the student t-test hypothesis. Then we verified that the times estimated by the program using the A* algorithm are similar to those registered on field. Furthermore, we review the performance of the algorithm generating iterations in both algorithms. Finally, with these iterations, a hypothesis test was carried out again with student t-test where it was concluded that the iterations of the base algorithm Dijsktra are greater than those generated by the algorithm A*.

Keywords: algorithm A*, graph, mobility, public transport, travel planning, routes

Procedia PDF Downloads 220
422 Fast Prediction Unit Partition Decision and Accelerating the Algorithm Using Cudafor Intra and Inter Prediction of HEVC

Authors: Qiang Zhang, Chun Yuan

Abstract:

Since the PU (Prediction Unit) decision process is the most time consuming part of the emerging HEVC (High Efficient Video Coding) standardin intra and inter frame coding, this paper proposes the fast PU decision algorithm and speed up the algorithm using CUDA (Compute Unified Device Architecture). In intra frame coding, the fast PU decision algorithm uses the texture features to skip intra-frame prediction or terminal the intra-frame prediction for smaller PU size. In inter frame coding of HEVC, the fast PU decision algorithm takes use of the similarity of its own two Nx2N size PU's motion vectors and the hierarchical structure of CU (Coding Unit) partition to skip some modes of PU partition, so as to reduce the motion estimation times. The accelerate algorithm using CUDA is based on the fast PU decision algorithm which uses the GPU to make the motion search and the gradient computation could be parallel computed. The proposed algorithm achieves up to 57% time saving compared to the HM 10.0 with little rate-distortion losses (0.043dB drop and 1.82% bitrate increase on average).

Keywords: HEVC, PU decision, inter prediction, intra prediction, CUDA, parallel

Procedia PDF Downloads 380
421 Protection against the Hazards of Stress on Health in Older Adults through Mindfulness

Authors: Cindy de Frias, Erum Whyne

Abstract:

Objectives: The current study examined whether the link between stress and health-related quality of life was buffered by protective factors, namely mindfulness, in a sample of middle-aged and older adults. Method: In this cross-sectional study, 134 healthy, community-dwelling adults (aged 50–85 years) were recruited from Dallas, Texas. The participants were screened for depressive symptoms and severity (using the Patient Health Questionnaire [PHQ-9]). All participants completed measures of self-reported health status (i.e., SF-36v2: mental and physical health composites), life stress (using the Elder’s Life Stress Inventory [ELSI]), and trait mindfulness (i.e., Mindful Attention Awareness Scale). Results: Hierarchical regressions (covarying for age, gender, and education) showed that life stress was inversely related to physical and mental health. Mindfulness was positively related to mental health. The negative effect of life stress on mental health was weakened for those individuals with greater trait mindfulness. Discussion: The results suggest that mindfulness is a powerful, adaptive strategy that may protect middle-aged and older adults from the well-known harmful effects of stress on healthy aging.

Keywords: health, stress, mindfulness, aging

Procedia PDF Downloads 449
420 Data and Spatial Analysis for Economy and Education of 28 E.U. Member-States for 2014

Authors: Alexiou Dimitra, Fragkaki Maria

Abstract:

The objective of the paper is the study of geographic, economic and educational variables and their contribution to determine the position of each member-state among the EU-28 countries based on the values of seven variables as given by Eurostat. The Data Analysis methods of Multiple Factorial Correspondence Analysis (MFCA) Principal Component Analysis and Factor Analysis have been used. The cross tabulation tables of data consist of the values of seven variables for the 28 countries for 2014. The data are manipulated using the CHIC Analysis V 1.1 software package. The results of this program using MFCA and Ascending Hierarchical Classification are given in arithmetic and graphical form. For comparison reasons with the same data the Factor procedure of Statistical package IBM SPSS 20 has been used. The numerical and graphical results presented with tables and graphs, demonstrate the agreement between the two methods. The most important result is the study of the relation between the 28 countries and the position of each country in groups or clouds, which are formed according to the values of the corresponding variables.

Keywords: Multiple Factorial Correspondence Analysis, Principal Component Analysis, Factor Analysis, E.U.-28 countries, Statistical package IBM SPSS 20, CHIC Analysis V 1.1 Software, Eurostat.eu Statistics

Procedia PDF Downloads 493
419 Classification of Poverty Level Data in Indonesia Using the Naïve Bayes Method

Authors: Anung Style Bukhori, Ani Dijah Rahajoe

Abstract:

Poverty poses a significant challenge in Indonesia, requiring an effective analytical approach to understand and address this issue. In this research, we applied the Naïve Bayes classification method to examine and classify poverty data in Indonesia. The main focus is on classifying data using RapidMiner, a powerful data analysis platform. The analysis process involves data splitting to train and test the classification model. First, we collected and prepared a poverty dataset that includes various factors such as education, employment, and health..The experimental results indicate that the Naïve Bayes classification model can provide accurate predictions regarding the risk of poverty. The use of RapidMiner in the analysis process offers flexibility and efficiency in evaluating the model's performance. The classification produces several values to serve as the standard for classifying poverty data in Indonesia using Naive Bayes. The accuracy result obtained is 40.26%, with a moderate recall result of 35.94%, a high recall result of 63.16%, and a low recall result of 38.03%. The precision for the moderate class is 58.97%, for the high class is 17.39%, and for the low class is 58.70%. These results can be seen from the graph below.

Keywords: poverty, classification, naïve bayes, Indonesia

Procedia PDF Downloads 35
418 Drinking Water Quality Assessment Using Fuzzy Inference System Method: A Case Study of Rome, Italy

Authors: Yas Barzegar, Atrin Barzegar

Abstract:

Drinking water quality assessment is a major issue today; technology and practices are continuously improving; Artificial Intelligence (AI) methods prove their efficiency in this domain. The current research seeks a hierarchical fuzzy model for predicting drinking water quality in Rome (Italy). The Mamdani fuzzy inference system (FIS) is applied with different defuzzification methods. The Proposed Model includes three fuzzy intermediate models and one fuzzy final model. Each fuzzy model consists of three input parameters and 27 fuzzy rules. The model is developed for water quality assessment with a dataset considering nine parameters (Alkalinity, Hardness, pH, Ca, Mg, Fluoride, Sulphate, Nitrates, and Iron). Fuzzy-logic-based methods have been demonstrated to be appropriate to address uncertainty and subjectivity in drinking water quality assessment; it is an effective method for managing complicated, uncertain water systems and predicting drinking water quality. The FIS method can provide an effective solution to complex systems; this method can be modified easily to improve performance.

Keywords: water quality, fuzzy logic, smart cities, water attribute, fuzzy inference system, membership function

Procedia PDF Downloads 55
417 Hydrothermal Synthesis of Carbon Sphere/Nickel Cobalt Sulfide Core/Shell Microstructure and Its Electrochemical Performance

Authors: Charmaine Lamiel, Van Hoa Nguyen, Marjorie Baynosa, Jae-Jin Shim

Abstract:

Electrochemical supercapacitors have attracted considerable attention because of their high potential as an efficient energy storage system. The combination of carbon-based material and transition metal oxides/sulfides are studied because they have long and improved cycle life as well as high energy and power densities. In this study, a hierarchical mesoporous carbon sphere/nickel cobalt sulfide (CS/Ni-Co-S) core/shell structure was synthesized using a facile hydrothermal method without any further sulfurization or post-heat treatment. The CS/Ni-Co-S core/shell microstructures exhibited a high capacitance of 724 F g−1 at 2 A g−1 in a 6 M KOH electrolyte. After 2000 charge-discharge cycles, it retained 86.1% of its original capacitance, with high Coulombic efficiency of 97.9%. The electrode exhibited a high energy density of 58.0 Wh kg−1 at an energy density of 1440 W kg−1, and high power density of 7200 W kg−1 at an energy density of 34.2 Wh kg−1. The successful synthesis was considered to be simple and cost-effective which supports the viability of this composite as an alternative activated material for high performance supercapacitors.

Keywords: carbon sphere, electrochemical, hydrothermal, nickel cobalt sulfide, supercapacitor

Procedia PDF Downloads 285
416 Solution to Riemann Hypothesis Critical Strip Zone Using Non-Linear Complex Variable Functions

Authors: Manojkumar Sabanayagam

Abstract:

The Riemann hypothesis is an unsolved millennium problem and the search for a solution to the Riemann hypothesis is to study the pattern of prime number distribution. The scope of this paper is to identify the solution for the critical strip and the critical line axis, which has the non-trivial zero solutions using complex plane functions. The Riemann graphical plot is constructed using a linear complex variable function (X+iY) and is applicable only when X>1. But the investigation shows that complex variable behavior has two zones. The first zone is the transformation zone, where the definition of the complex plane should be a non-linear variable which is the critical strip zone in the graph (X=0 to 1). The second zone is the transformed zone (X>1) defined using linear variables conventionally. This paper deals with the Non-linear function in the transformation zone derived using cosine and sinusoidal time lag w.r.t imaginary number ‘i’. The alternate complex variable (Cosθ+i Sinθ) is used to understand the variables in the critical strip zone. It is concluded that the non-trivial zeros present in the Real part 0.5 are because the linear function is not the correct approach in the critical strip. This paper provides the solution to Reimann's hypothesis.

Keywords: Reimann hypothesis, critical strip, complex plane, transformation zone

Procedia PDF Downloads 190
415 Proposing an Algorithm to Cluster Ad Hoc Networks, Modulating Two Levels of Learning Automaton and Nodes Additive Weighting

Authors: Mohammad Rostami, Mohammad Reza Forghani, Elahe Neshat, Fatemeh Yaghoobi

Abstract:

An Ad Hoc network consists of wireless mobile equipment which connects to each other without any infrastructure, using connection equipment. The best way to form a hierarchical structure is clustering. Various methods of clustering can form more stable clusters according to nodes' mobility. In this research we propose an algorithm, which allocates some weight to nodes based on factors, i.e. link stability and power reduction rate. According to the allocated weight in the previous phase, the cellular learning automaton picks out in the second phase nodes which are candidates for being cluster head. In the third phase, learning automaton selects cluster head nodes, member nodes and forms the cluster. Thus, this automaton does the learning from the setting and can form optimized clusters in terms of power consumption and link stability. To simulate the proposed algorithm we have used omnet++4.2.2. Simulation results indicate that newly formed clusters have a longer lifetime than previous algorithms and decrease strongly network overload by reducing update rate.

Keywords: mobile Ad Hoc networks, clustering, learning automaton, cellular automaton, battery power

Procedia PDF Downloads 393
414 Parental Negative Emotional States, Parenting Style and Child Emotional and Behavioural Problems: Australia-Indonesia Cross-Cultural Study

Authors: Yulina E. Riany, Divna Haslam, Matthew Sanders

Abstract:

This cross-cultural study aims to compare the level of parental depression and stress, parenting style use, and child emotional and behavioural problems between parents in Australia as an example of a Western country and parents in Indonesia as an example of Asian culture. A series of hierarchical regressions were undertaken to determine two models examining the factors that predict child problems residing in Australia (Model 1) and in Indonesia (Model 2). The online survey was completed by 179 parents in Australia and 448 parents in Indonesia. Results indicated that Australian parents reported higher levels of depression, authoritative parenting and higher levels of child misbehaviours compared to Indonesian parents. In comparison, Indonesian parents reported higher authoritarian parenting. Analyses performed to examine Model 1 and 2 revealed that parental negative emotional states and parenting style predicted child emotional and behavioural problems in both countries.

Keywords: cross-cutural study, parental stress, parenting, child misbehaviour

Procedia PDF Downloads 100
413 A Mobile Application for Analyzing and Forecasting Crime Using Autoregressive Integrated Moving Average with Artificial Neural Network

Authors: Gajaanuja Megalathan, Banuka Athuraliya

Abstract:

Crime is one of our society's most intimidating and threatening challenges. With the majority of the population residing in cities, many experts and data provided by local authorities suggest a rapid increase in the number of crimes committed in these cities in recent years. There has been an increasing graph in the crime rates. People living in Sri Lanka have the right to know the exact crime rates and the crime rates in the future of the place they are living in. Due to the current economic crisis, crime rates have spiked. There have been so many thefts and murders recorded within the last 6-10 months. Although there are many sources to find out, there is no solid way of searching and finding out the safety of the place. Due to all these reasons, there is a need for the public to feel safe when they are introduced to new places. Through this research, the author aims to develop a mobile application that will be a solution to this problem. It is mainly targeted at tourists, and people who recently relocated will gain advantage of this application. Moreover, the Arima Model combined with ANN is to be used to predict crime rates. From the past researchers' works, it is evidently clear that they haven’t used the Arima model combined with Artificial Neural Networks to forecast crimes.

Keywords: arima model, ANN, crime prediction, data analysis

Procedia PDF Downloads 100
412 Intrusion Detection and Prevention System (IDPS) in Cloud Computing Using Anomaly-Based and Signature-Based Detection Techniques

Authors: John Onyima, Ikechukwu Ezepue

Abstract:

Virtualization and cloud computing are among the fast-growing computing innovations in recent times. Organisations all over the world are moving their computing services towards the cloud this is because of its rapid transformation of the organization’s infrastructure and improvement of efficient resource utilization and cost reduction. However, this technology brings new security threats and challenges about safety, reliability and data confidentiality. Evidently, no single security technique can guarantee security or protection against malicious attacks on a cloud computing network hence an integrated model of intrusion detection and prevention system has been proposed. Anomaly-based and signature-based detection techniques will be integrated to enable the network and its host defend themselves with some level of intelligence. The anomaly-base detection was implemented using the local deviation factor graph-based (LDFGB) algorithm while the signature-based detection was implemented using the snort algorithm. Results from this collaborative intrusion detection and prevention techniques show robust and efficient security architecture for cloud computing networks.

Keywords: anomaly-based detection, cloud computing, intrusion detection, intrusion prevention, signature-based detection

Procedia PDF Downloads 281
411 Superconductor-Insulator Transition in Disordered Spin-1/2 Systems

Authors: E. Cuevas, M. Feigel'man, L. Ioffe, M. Mezard

Abstract:

The origin of continuous energy spectrum in large disordered interacting quantum systems is one of the key unsolved problems in quantum physics. While small quantum systems with discrete energy levels are noiseless and stay coherent forever in the absence of any coupling to external world, most large-scale quantum systems are able to produce thermal bath, thermal transport and excitation decay. This intrinsic decoherence is manifested by a broadening of energy levels which acquire a finite width. The important question is: What is the driving force and mechanism of transition(s) between two different types of many-body systems - with and without decoherence and thermal transport? Here, we address this question via two complementary approaches applied to the same model of quantum spin-1/2 system with XY-type exchange interaction and random transverse field. Namely, we develop analytical theory for this spin model on a Bethe lattice and implement numerical study of exact level statistics for the same spin model on random graph. This spin model is relevant to the study of pseudogaped superconductivity and S-I transition in some amorphous materials.

Keywords: strongly correlated electrons, quantum phase transitions, superconductor, insulator

Procedia PDF Downloads 560
410 Formal Asymptotic Stability Guarantees, Analysis, and Evaluation of Nonlinear Controlled Unmanned Aerial Vehicle for Trajectory Tracking

Authors: Soheib Fergani

Abstract:

This paper concerns with the formal asymptotic stability guarantees, analysis and evaluation of a nonlinear controlled unmanned aerial vehicles (uav) for trajectory tracking purpose. As the system has been recognised as an under-actuated non linear system, the control strategy has been oriented towards a hierarchical control. The dynamics of the system and the mission purpose make it mandatory to provide an absolute proof of the vehicle stability during the maneuvers. For this sake, this work establishes the complete theoretical proof for an implementable control oriented strategy that asymptotically stabilizes (GAS and LISS) the system and has never been provided in previous works. The considered model is reorganized into two partly decoupled sub-systems. The concidered control strategy is presented into two stages: the first sub-system is controlled by a nonlinear backstepping controller that generates the desired control inputs to stabilize the second sub-system. This methodology is then applied to a harware in the loop uav simulator (SiMoDrones) that reproduces the realistic behaviour of the uav in an indoor environment has been performed to show the efficiency of the proposed strategy.

Keywords: UAV application, trajectory tracking, backstepping, sliding mode control, input to state stability, stability evaluation

Procedia PDF Downloads 28
409 Multiple Linear Regression for Rapid Estimation of Subsurface Resistivity from Apparent Resistivity Measurements

Authors: Sabiu Bala Muhammad, Rosli Saad

Abstract:

Multiple linear regression (MLR) models for fast estimation of true subsurface resistivity from apparent resistivity field measurements are developed and assessed in this study. The parameters investigated were apparent resistivity (ρₐ), horizontal location (X) and depth (Z) of measurement as the independent variables; and true resistivity (ρₜ) as the dependent variable. To achieve linearity in both resistivity variables, datasets were first transformed into logarithmic domain following diagnostic checks of normality of the dependent variable and heteroscedasticity to ensure accurate models. Four MLR models were developed based on hierarchical combination of the independent variables. The generated MLR coefficients were applied to another data set to estimate ρₜ values for validation. Contours of the estimated ρₜ values were plotted and compared to the observed data plots at the colour scale and blanking for visual assessment. The accuracy of the models was assessed using coefficient of determination (R²), standard error (SE) and weighted mean absolute percentage error (wMAPE). It is concluded that the MLR models can estimate ρₜ for with high level of accuracy.

Keywords: apparent resistivity, depth, horizontal location, multiple linear regression, true resistivity

Procedia PDF Downloads 257
408 Unbreakable Obedience of Safety Regulation: The Study of Authoritarian Leadership and Safety Performance

Authors: Hong-Yi Kuo

Abstract:

Leadership is a key factor of improving workplace safety, and there have been abundant of studies which support the positive effects of appropriate leadership on employee safety performance in the western academic. However, little safety research focus on the Chinese leadership style like paternalistic leadership. To fill this gap, the resent study aims to examine the relationship between authoritarian leadership (one of the ternary mode in paternalistic leadership) and safety outcomes. This study makes hypothesis on different levels. First, on the group level, as an authoritarian leader regards safety value as the most important tasks, there would be positive effect on group safety outcomes through strengthening safety group norms by the emphasis on etiquette. Second, on the cross level, when a leader with authoritarian style has high priority on safety, employees may more obey the safety rules because of fear due to emphasis on absolute authority over the leader. Therefore, employees may show more safety performance and then increase individual safety outcomes. Survey data would be collected from 50 manufacturing groups (each group with more than 5 members and a leader) and a hierarchical linear modeling analysis would be conducted to analyze the hypothesis. Above the predictive result, the study expects to be a cornerstone of safety leadership research in the Chinese academic and practice.

Keywords: safety leadership, authoritarian leadership, group norms, safety behavior, supervisor safety priority

Procedia PDF Downloads 208
407 On Figuring the City Characteristics and Landscape in Overall Urban Design: A Case Study in Xiangyang Central City, China

Authors: Guyue Zhu, Liangping Hong

Abstract:

Chinese overall urban design faces a large number of problems such as the neglect of urban characteristics, generalization of content, and difficulty in implementation. Focusing on these issues, this paper proposes the main points of shaping urban characteristics in overall urban design: focuses on core problems in city function and scale, landscape pattern, historical culture, social resources and modern city style and digs the urban characteristic genes. Then, we put forward “core problem location and characteristic gene enhancement” as a kind of overall urban design technical method. Firstly, based on the main problems in urban space as a whole, for the operability goal, the method extracts the key genes and integrates into the multi-dimension system in a targeted manner. Secondly, hierarchical management and guidance system is established which may be in line with administrative management. Finally, by converting the results, action plan is drawn up that can be dynamically implemented. Based on the above idea and method, a practical exploration has been performed in the case of Xiangyang central city.

Keywords: city characteristics, overall urban design, planning implementation, Xiangyang central city

Procedia PDF Downloads 122
406 Model Based Design of Fly-by-Wire Flight Controls System of a Fighter Aircraft

Authors: Nauman Idrees

Abstract:

Modeling and simulation during the conceptual design phase are the most effective means of system testing resulting in time and cost savings as compared to the testing of hardware prototypes, which are mostly not available during the conceptual design phase. This paper uses the model-based design (MBD) method in designing the fly-by-wire flight controls system of a fighter aircraft using Simulink. The process begins with system definition and layout where modeling requirements and system components were identified, followed by hierarchical system layout to identify the sequence of operation and interfaces of system with external environment as well as the internal interface between the components. In the second step, each component within the system architecture was modeled along with its physical and functional behavior. Finally, all modeled components were combined to form the fly-by-wire flight controls system of a fighter aircraft as per system architecture developed. The system model developed using this method can be simulated using any simulation software to ensure that desired requirements are met even without the development of a physical prototype resulting in time and cost savings.

Keywords: fly-by-wire, flight controls system, model based design, Simulink

Procedia PDF Downloads 99
405 To Be Freed from Conformists for Better Shared Leadership

Authors: Lyne Chantal Boudreau, Claudine Auger, Arline Laforest

Abstract:

In order to meet the challenges of learning in a minority Francophone environment, three organizers created a space where a group of stakeholders from the school system and from the post-secondary and community sectors could contribute to reflections on specific educational topics by sharing winning practices. The success of this provincial congress rest on shared leadership which was intuitively used by the organizers who planned and conducted both editions. This leadership style requires leaders to transition from a hierarchical to a horizontal approach, that is, to an approach where each individual is at the same level. In this exploratory research, it has been demonstrated that this shared leadership’s success depends on the capacity of the leaders to free themselves from conformists who are found at all levels of the education system. This ability best fosters the mobilization of all education stakeholders in advancing in-depth knowledge in a particular field while simultaneously creating a sense of collective efficacy among these partners and developing the learners’ full potential. This session will present ways in which it is possible to be freed from conformists through knowing how to recognize conformism, through taking risks and through opening genuine discussions. Shared leadership revolves around a collective power derived from the leadership of each and everyone in a space where all are rallied to promote the ultimate advancement of society.

Keywords: conformists, education, minority context, shared leadership

Procedia PDF Downloads 291
404 Clustering of Association Rules of ISIS & Al-Qaeda Based on Similarity Measures

Authors: Tamanna Goyal, Divya Bansal, Sanjeev Sofat

Abstract:

In world-threatening terrorist attacks, where early detection, distinction, and prediction are effective diagnosis techniques and for functionally accurate and precise analysis of terrorism data, there are so many data mining & statistical approaches to assure accuracy. The computational extraction of derived patterns is a non-trivial task which comprises specific domain discovery by means of sophisticated algorithm design and analysis. This paper proposes an approach for similarity extraction by obtaining the useful attributes from the available datasets of terrorist attacks and then applying feature selection technique based on the statistical impurity measures followed by clustering techniques on the basis of similarity measures. On the basis of degree of participation of attributes in the rules, the associative dependencies between the attacks are analyzed. Consequently, to compute the similarity among the discovered rules, we applied a weighted similarity measure. Finally, the rules are grouped by applying using hierarchical clustering. We have applied it to an open source dataset to determine the usability and efficiency of our technique, and a literature search is also accomplished to support the efficiency and accuracy of our results.

Keywords: association rules, clustering, similarity measure, statistical approaches

Procedia PDF Downloads 299
403 Optimization of Reliability and Communicability of a Random Two-Dimensional Point Patterns Using Delaunay Triangulation

Authors: Sopheak Sorn, Kwok Yip Szeto

Abstract:

Reliability is one of the important measures of how well the system meets its design objective, and mathematically is the probability that a complex system will perform satisfactorily. When the system is described by a network of N components (nodes) and their L connection (links), the reliability of the system becomes a network design problem that is an NP-hard combinatorial optimization problem. In this paper, we address the network design problem for a random point set’s pattern in two dimensions. We make use of a Voronoi construction with each cell containing exactly one point in the point pattern and compute the reliability of the Voronoi’s dual, i.e. the Delaunay graph. We further investigate the communicability of the Delaunay network. We find that there is a positive correlation and a negative correlation between the homogeneity of a Delaunay's degree distribution with its reliability and its communicability respectively. Based on the correlations, we alter the communicability and the reliability by performing random edge flips, which preserve the number of links and nodes in the network but can increase the communicability in a Delaunay network at the cost of its reliability. This transformation is later used to optimize a Delaunay network with the optimum geometric mean between communicability and reliability. We also discuss the importance of the edge flips in the evolution of real soap froth in two dimensions.

Keywords: Communicability, Delaunay triangulation, Edge Flip, Reliability, Two dimensional network, Voronio

Procedia PDF Downloads 400
402 Antioxidant Activity of Essential Oils and Ethanolic Extracts of Four Medicinal Plants Alone and in Combination

Authors: Fatiha Bedjou, Meriem Meddas, Tadjajikt Chekkal

Abstract:

The present work aims to evaluate the antioxidant activity of ethanolic extracts and essential oils of aromatic plants of the Lamiaceae family: Thymus algeriensis and Salvia rosmarinus, and Anacardiaceae: Pistacia lentiscus, Myrtaceae: Eucalyptus polybracetea. The polyphenols were measured using the Folin-Ciocalteu method; the results showed that the essential oils studied as well as the ethanolic extracts are relatively rich in polyphenols. Their antioxidant properties were tested by the synthetic DPPH radical trapping method. The IC50 values were determined according to the graph representing the percentage of inhibition of the DPPH radical by essential oils and by ethanolic extracts, according to our results there is a correlation between the level of polyphenols present in the different essential oils and different ethanolic extracts and their ability to neutralize free radicals. Several combinations were carried out between the essential oils and also between the ethanolic extracts in order to determine the type of interactions existing between the combined substances, the results were represented in the form of isobolograms. Additive and super-additive effects were observed in combinations of essential oils, and super-additive and sub-additive effects were observed for combinations of ethanolic extracts.

Keywords: essential oils, ethanolic extracts, DPPH, combination

Procedia PDF Downloads 40
401 The Neurofunctional Dissociation between Animal and Tool Concepts: A Network-Based Model

Authors: Skiker Kaoutar, Mounir Maouene

Abstract:

Neuroimaging studies have shown that animal and tool concepts rely on distinct networks of brain areas. Animal concepts depend predominantly on temporal areas while tool concepts rely on fronto-temporo-parietal areas. However, the origin of this neurofunctional distinction for processing animal and tool concepts remains still unclear. Here, we address this question from a network perspective suggesting that the neural distinction between animals and tools might reflect the differences in their structural semantic networks. We build semantic networks for animal and tool concepts derived from McRae and colleagues’s behavioral study conducted on a large number of participants. These two networks are thus analyzed through a large number of graph theoretical measures for small-worldness: centrality, clustering coefficient, average shortest path length, as well as resistance to random and targeted attacks. The results indicate that both animal and tool networks have small-world properties. More importantly, the animal network is more vulnerable to targeted attacks compared to the tool network a result that correlates with brain lesions studies.

Keywords: animals, tools, network, semantics, small-worls, resilience to damage

Procedia PDF Downloads 520
400 International Conference on Comparative Religion and Mythology

Authors: Mara Varelaki

Abstract:

In response to the challenge of the environmental crisis the discipline of environmental ethics examines the relation of human beings towards the environment and the value of the non-human constituents of the surrounding world. In the face of this crisis, assumptions regarding human and nature relations ought to be traced and reexamined because they can cause difficulties in diagnosing problematic attitudes towards the environment and non-human animals. This paper presents the claims that European and the Judea-Christian cosmogonic myths place the human figure in the core of the creation of the cosmos, thus verifying a hierarchical structure where humans occupy the top, and they establish a perception of nature as a non-human other. By doing so, these narratives provide some justification to the notion of the human-nature dichotomy and the human domination over other life forms and ecosystems. These anthropocentric assumptions evolved into what Hilde Lindemann terms master narratives and their influence extents to ecocentric ethical theories which attempt, and often fail, to shed the anthropocentrism of the western ethical tradition. The goal of this paper is (1) to trace the anthropocentric assumptions embedded in western thought and (2) articulate how they maintain their grip on our contemporary understanding of the human relation to and position within the environment, thus showing the need for a method of detecting and bracketing anthropocentric assumptions in social narratives and ethical frameworks.

Keywords: cosmogonies, anthropocentrism, human/nature dichotomy, master narratives, ecocentrism

Procedia PDF Downloads 86