Search results for: adaptive envelope protection control
13096 Aerobic Bioprocess Control Using Artificial Intelligence Techniques
Authors: M. Caramihai, Irina Severin
Abstract:
This paper deals with the design of an intelligent control structure for a bioprocess of Hansenula polymorpha yeast cultivation. The objective of the process control is to produce biomass in a desired physiological state. The work demonstrates that the designed Hybrid Control Techniques (HCT) are able to recognize specific evolution bioprocess trajectories using neural networks trained specifically for this purpose, in order to estimate the model parameters and to adjust the overall bioprocess evolution through an expert system and a fuzzy structure. The design of the control algorithm as well as its tuning through realistic simulations is presented. Taking into consideration the synergism of different paradigms like fuzzy logic, neural network, and symbolic artificial intelligence (AI), in this paper we present a real and fulfilled intelligent control architecture with application in bioprocess control.Keywords: bioprocess, intelligent control, neural nets, fuzzy structure, hybrid techniques
Procedia PDF Downloads 42413095 Cross-Layer Design of Event-Triggered Adaptive OFDMA Resource Allocation Protocols with Application to Vehicle Clusters
Authors: Shaban Guma, Naim Bajcinca
Abstract:
We propose an event-triggered algorithm for the solution of a distributed optimization problem by means of the projected subgradient method. Thereby, we invoke an OFDMA resource allocation scheme by applying an event-triggered sensitivity analysis at the access point. The optimal resource assignment of the subcarriers to the involved wireless nodes is carried out by considering the sensitivity analysis of the overall objective function as defined by the control of vehicle clusters with respect to the information exchange between the nodes.Keywords: consensus, cross-layer, distributed, event-triggered, multi-vehicle, protocol, resource, OFDMA, wireless
Procedia PDF Downloads 33213094 Adaptive Dehazing Using Fusion Strategy
Authors: M. Ramesh Kanthan, S. Naga Nandini Sujatha
Abstract:
The goal of haze removal algorithms is to enhance and recover details of scene from foggy image. In enhancement the proposed method focus into two main categories: (i) image enhancement based on Adaptive contrast Histogram equalization, and (ii) image edge strengthened Gradient model. Many circumstances accurate haze removal algorithms are needed. The de-fog feature works through a complex algorithm which first determines the fog destiny of the scene, then analyses the obscured image before applying contrast and sharpness adjustments to the video in real-time to produce image the fusion strategy is driven by the intrinsic properties of the original image and is highly dependent on the choice of the inputs and the weights. Then the output haze free image has reconstructed using fusion methodology. In order to increase the accuracy, interpolation method has used in the output reconstruction. A promising retrieval performance is achieved especially in particular examples.Keywords: single image, fusion, dehazing, multi-scale fusion, per-pixel, weight map
Procedia PDF Downloads 46513093 Temperature Control Improvement of Membrane Reactor
Authors: Pornsiri Kaewpradit, Chalisa Pourneaw
Abstract:
Temperature control improvement of a membrane reactor with exothermic and reversible esterification reaction is studied in this work. It is well known that a batch membrane reactor requires different control strategies from a continuous one due to the fact that it is operated dynamically. Due to the effect of the operating temperature, the suitable control scheme has to be designed based reliable predictive model to achieve a desired objective. In the study, the optimization framework has been preliminary formulated in order to determine an optimal temperature trajectory for maximizing a desired product. In model predictive control scheme, a set of predictive models have been initially developed corresponding to the possible operating points of the system. The multiple predictive control moves have been further calculated on-line using the developed models corresponding to current operating point. It is obviously seen in the simulation results that the temperature control has been improved compared to the performance obtained by the conventional predictive controller. Further robustness tests have also been investigated in this study.Keywords: model predictive control, batch reactor, temperature control, membrane reactor
Procedia PDF Downloads 46913092 Control Algorithm for Home Automation Systems
Authors: Marek Długosz, Paweł Skruch
Abstract:
One of purposes of home automation systems is to provide appropriate comfort to the users by suitable air temperature control and stabilization inside the rooms. The control of temperature level is not a simple task and the basic difficulty results from the fact that accurate parameters of the object of control, that is a building, remain unknown. Whereas the structure of the model is known, the identification of model parameters is a difficult task. In this paper, a control algorithm allowing the present temperature to be reached inside the building within the specified time without the need to know accurate parameters of the building itself is presented.Keywords: control, home automation system, wireless networking, automation engineering
Procedia PDF Downloads 61813091 Hybrid Lateral-Directional Robust Flight Control with Propulsive Systems
Authors: Alexandra Monteiro, K. Bousson, Fernando J. O. Moreira, Ricardo Reis
Abstract:
Fixed-wing flying vehicles are usually controlled by means of control surfaces such as elevators, ailerons, and rudders. The failure of these systems may lead to severe or even fatal crashes. These failures resulted in increased popularity for research activities on propulsion control in the last decades. The present work deals with a hybrid control architecture in which the propulsion-controlled vehicle maintains its traditional control surfaces, addressing the issue of robust lateral-directional dynamics control. The challenges stem from the parameter uncertainties in the stability and control derivatives and some unknown terms in the flight dynamics model. Two approaches are implemented and tested: linear quadratic regulation with robustness characteristics and H∞ control. The problem is centered on roll-yaw controller design with full state-feedback, which is able to deal with a standalone propulsion control mode as well as a hybrid mode combining both propulsion control and conventional control surface concepts while maintaining the original flight maneuverability characteristics. The results for both controllers emphasized very good control performances; however, the H∞ controller showed higher stabilization rates and robustness albeit with a slightly higher control magnitude than using the linear quadratic regulator.Keywords: robust propulsion control, h-infinity control, lateral-directional flight dynamics, parameter uncertainties
Procedia PDF Downloads 15613090 Protection against the Hazards of Stress on Health in Older Adults through Mindfulness
Authors: Cindy de Frias, Erum Whyne
Abstract:
Objectives: The current study examined whether the link between stress and health-related quality of life was buffered by protective factors, namely mindfulness, in a sample of middle-aged and older adults. Method: In this cross-sectional study, 134 healthy, community-dwelling adults (aged 50–85 years) were recruited from Dallas, Texas. The participants were screened for depressive symptoms and severity (using the Patient Health Questionnaire [PHQ-9]). All participants completed measures of self-reported health status (i.e., SF-36v2: mental and physical health composites), life stress (using the Elder’s Life Stress Inventory [ELSI]), and trait mindfulness (i.e., Mindful Attention Awareness Scale). Results: Hierarchical regressions (covarying for age, gender, and education) showed that life stress was inversely related to physical and mental health. Mindfulness was positively related to mental health. The negative effect of life stress on mental health was weakened for those individuals with greater trait mindfulness. Discussion: The results suggest that mindfulness is a powerful, adaptive strategy that may protect middle-aged and older adults from the well-known harmful effects of stress on healthy aging.Keywords: health, stress, mindfulness, aging
Procedia PDF Downloads 46413089 The Impact of Social Protection Intervention on Alleviating Social Vulnerability (Evidence from Ethiopian Rural Households)
Authors: Tewelde Gebresslase Haile, S. P. Singh
Abstract:
To bridge the existing knowledge gap on public intervention implementations, this study estimates the impact of social protection intervention (SPI) on alleviating social vulnerability. Following a multi-stage sampling, primary information was gathered through a self-administered questionnaire, FGD, and interviews from the target households located at four systematically selected districts of Tigrai, Ethiopia. Factor analysis and Propensity Score Matching are applied to construct Social Vulnerability Index (SVI) and measuring the counterfactual impact of selected intervention. As a multidimensional challenge, social vulnerability is found as an important concept used to guide policy evaluation. Accessibility of basic services of Social Affairs, Agriculture, Health and Education sectors, and Food Security Program are commonly used as SPIs. Finally, this study discovers that the households who had access to SPI have scored 9.65% lower SVI than in the absence of the intervention. Finally, this study suggests the provision of integrated, proactive, productive, and evidence-based SPIs to alleviate social vulnerability.Keywords: social protection, livelihood assets, social vulnerability, public policy SVI
Procedia PDF Downloads 9013088 Integrated Plant Protection Activities against (Tuta absoluta Meyrik) Moth in Tomato Plantings in Azerbaijan
Authors: Nazakat Ismailzada, Carol Jones
Abstract:
Tomato drilling moth Tuta absoluta (Meyrick) (Lepidoptera: Gelechiidae) is the main pest of tomato plants in many countries. The larvae of tomato leaves, the stems inside, in the end buds, they opened the gallery in green and ripe fruit. In this way the harmful products can be fed with all parts of the tomato plant can cause damage to 80-100%. Pest harms all above ground parts of the tomato plant. After the seedlings are planted in areas and during blossoming holder traps with tomato moth’s rubber capsule inside should be placed in the area by using five-tomato moth’s feremon per ha. Then there should be carried out observations in the fields in every three days regularly. During the researches, it was showed that in field condition Carogen 20 SC besides high-level biological efficiency also has low ecological load for environment, and should be used against tomato moth in farms. Therefore it was showed that in field condition Carogen 20 SC besides high-level biological efficiency also has low ecological load for environment, and should be used against tomato moth in farms with insecticide expenditure norm 320 qr\ha. In farms should be used plant rotation, plant fields should be plowed on the 25-30 sm depth, before sowing seeds should be proceeded by insecticides. As element of integrated plant protection activities, should be used pheromones trap. In tomato plant fields as an insecticide should be used AGROSAN 240 SC and Carogen 20 SP.Keywords: lepidoptera, Tuta absoluta, chemical control, integrated pest management
Procedia PDF Downloads 16713087 Attitudes and Knowledge of Dental Patients Towards Infection Control Measures in Kuwait University Dental Center
Authors: Fatima Taqi, Abrar Alanzi
Abstract:
Objectives: The objective of this study is to determine and assess the level of knowledge and attitudes of dental patients attending Kuwait University Dental Clinics (KUDC) regarding the infection control protocols practiced in the clinic. The results would highlight the importance of conducting awareness campaigns in the community to promote good oral healthcare in Kuwait. Materials and Methods: A cross-sectional descriptive survey was carried out among dental patients attending KUDC. A structured questionnaire, in both Arabic and English languages, was used for data collection about the socio-demographic characteristics, knowledge about the dental cross-infection, and attitudes and self-reported practices regarding infection transmission and control in dentistry. Results: A response rate of 80% (202/250) was reported. 47% of respondents had poor knowledge about dental infection transmission, and only 19.8% had satisfactory knowledge. Female participants obtained a higher satisfactory score (14.3%) compared to males (5.5%). Patients with a university degree or higher education had a better level of knowledge compared to patients with a lower educational level (p < 0.05). The majority of participants agreed that the dentist should wear gloves (95.5%), masks (89.6%), safety glasses (70.3%), and gowns (84.7%). Many patients believed that the protection measures are mainly to stop the infection transmission from patient to patient via the dentist. Half of the participants would ask if the instruments are sterilized and might accept treatment from non-vaccinated dentists. Conclusions: Many dental patients attending KUDC have obtained poor knowledge scores regarding infection transmission in the dental clinic. The educational level was significantly associated with their level of knowledge. An overall positive attitude was reported regarding the infection control protocols practiced in the dental clinic. Raising awareness among dental patients about dental infection transmission and protective measures is of utmost importance.Keywords: dental infection, knowledge, dental patients, infection control
Procedia PDF Downloads 14013086 Qualitative Inquiry for Understanding Factors Associated to Intergenerational Transmission of Child Maltreatment
Authors: Marie-Claude Richard, Amelie Bolduc-Mokhtar, Mathieu Parent
Abstract:
People who have experienced maltreatment in childhood subsequently face many parenting issues of their own, in particular when it comes to distancing themselves from the abusive behaviors they were exposed and had access to positive role models. Few studies have explored the factors explaining the ability to break the generational cycle of child maltreatment. However, deeper knowledge of the factors associated with intergenerational discontinuity could facilitate the development of innovative interventions and increase the preventive potential of existing programs. This poster presentation will be about a better understanding of the intergenerational transmission of maltreatment (IGTM) from the perspective of both youth protection workers and parents receiving child protection services. The data used to meet this goal were collected from a group interview with eight youth protection workers whose caseloads involved IGTM situations and through semi-structured interviews with four parents with a history of child protection services and who were currently receiving such services for at least one of their children. In the view of the youth protection workers, the IGTM refers to everything that is transmitted and not transmitted from one generation to the next within a family. The study participants painted quite a bleak portrait of the families affected by IGTM. However, three main avenues of intervention were mentioned by the participants: working within the network, favoring long-term interventions and being empathic. The results also show that the mothers were in a trajectory of intergenerational discontinuity in child maltreatment. Support from their families and friends as well as from formal support services brought out some possible explanatory factors for intergenerational discontinuity in child maltreatment. From a prevention perspective, developing meaningful and trusting relationships seems a source of resilience for parents who were placed in the care of the child protection system as children. The small number of participants limits the generalizability of these results. The difficulty of recruiting parents is a substantial challenge regarding gaining knowledge on the intergenerational transmission of child maltreatment. Future studies should examine this question and seek to develop effective strategies to help recruit study participants.Keywords: child maltreatment, intergenerational transmission, prevention, qualitative data
Procedia PDF Downloads 19313085 Unsupervised Domain Adaptive Text Retrieval with Query Generation
Authors: Rui Yin, Haojie Wang, Xun Li
Abstract:
Recently, mainstream dense retrieval methods have obtained state-of-the-art results on some datasets and tasks. However, they require large amounts of training data, which is not available in most domains. The severe performance degradation of dense retrievers on new data domains has limited the use of dense retrieval methods to only a few domains with large training datasets. In this paper, we propose an unsupervised domain-adaptive approach based on query generation. First, a generative model is used to generate relevant queries for each passage in the target corpus, and then the generated queries are used for mining negative passages. Finally, the query-passage pairs are labeled with a cross-encoder and used to train a domain-adapted dense retriever. Experiments show that our approach is more robust than previous methods in target domains that require less unlabeled data.Keywords: dense retrieval, query generation, unsupervised training, text retrieval
Procedia PDF Downloads 7313084 Attention-based Adaptive Convolution with Progressive Learning in Speech Enhancement
Authors: Tian Lan, Yixiang Wang, Wenxin Tai, Yilan Lyu, Zufeng Wu
Abstract:
The monaural speech enhancement task in the time-frequencydomain has a myriad of approaches, with the stacked con-volutional neural network (CNN) demonstrating superiorability in feature extraction and selection. However, usingstacked single convolutions method limits feature represen-tation capability and generalization ability. In order to solvethe aforementioned problem, we propose an attention-basedadaptive convolutional network that integrates the multi-scale convolutional operations into a operation-specific blockvia input dependent attention to adapt to complex auditoryscenes. In addition, we introduce a two-stage progressivelearning method to enlarge the receptive field without a dra-matic increase in computation burden. We conduct a series ofexperiments based on the TIMIT corpus, and the experimen-tal results prove that our proposed model is better than thestate-of-art models on all metrics.Keywords: speech enhancement, adaptive convolu-tion, progressive learning, time-frequency domain
Procedia PDF Downloads 12413083 A Research Agenda for Learner Models for Adaptive Educational Digital Learning Environments
Authors: Felix Böck
Abstract:
Nowadays, data about learners and their digital activities are collected, which could help educational institutions to better understand learning processes, improve them and be able to provide better learning assistance. In this research project, custom knowledge- and data-driven recommendation algorithms will be used to offer students in higher education integrated learning assistance. The pre-requisite for this is a learner model that is as comprehensive as possible, which should first be created and then kept up-to-date largely automatically for being able to individualize and personalize the learning experience. In order to create such a learner model, a roadmap is presented that describes the individual phases up to the creation and evaluation of the finished model. The methodological process for the research project is disclosed, and the research question of how learners can be supported in their learning with personalized, customized learning recommendations is explored.Keywords: research agenda, user model, learner model, higher education, adaptive educational digital learning environments, personalized learning paths, recommendation system, adaptation, personalization
Procedia PDF Downloads 2013082 Study of the Energy Efficiency of Buildings under Tropical Climate with a View to Sustainable Development: Choice of Material Adapted to the Protection of the Environment
Authors: Guarry Montrose, Ted Soubdhan
Abstract:
In the context of sustainable development and climate change, the adaptation of buildings to the climatic context in hot climates is a necessity if we want to improve living conditions in housing and reduce the risks to the health and productivity of occupants due to thermal discomfort in buildings. One can find a wide variety of efficient solutions but with high costs. In developing countries, especially tropical countries, we need to appreciate a technology with a very limited cost that is affordable for everyone, energy efficient and protects the environment. Biosourced insulation is a product based on plant fibers, animal products or products from recyclable paper or clothing. Their development meets the objectives of maintaining biodiversity, reducing waste and protecting the environment. In tropical or hot countries, the aim is to protect the building from solar thermal radiation, a source of discomfort. The aim of this work is in line with the logic of energy control and environmental protection, the approach is to make the occupants of buildings comfortable, reduce their carbon dioxide emissions (CO2) and decrease their energy consumption (energy efficiency). We have chosen to study the thermo-physical properties of banana leaves and sawdust, especially their thermal conductivities, direct measurements were made using the flash method and the hot plate method. We also measured the heat flow on both sides of each sample by the hot box method. The results from these different experiences show that these materials are very efficient used as insulation. We have also conducted a building thermal simulation using banana leaves as one of the materials under Design Builder software. Air-conditioning load as well as CO2 release was used as performance indicator. When the air-conditioned building cell is protected on the roof by banana leaves and integrated into the walls with solar protection of the glazing, it saves up to 64.3% of energy and avoids 57% of CO2 emissions.Keywords: plant fibers, tropical climates, sustainable development, waste reduction
Procedia PDF Downloads 18413081 Space Vector PWM and Model Predictive Control for Voltage Source Inverter Control
Authors: Irtaza M. Syed, Kaamran Raahemifar
Abstract:
In this paper, we present a comparative assessment of Space Vector Pulse Width Modulation (SVPWM) and Model Predictive Control (MPC) for two-level three phase (2L-3P) Voltage Source Inverter (VSI). VSI with associated system is subjected to both control techniques and the results are compared. Matlab/Simulink was used to model, simulate and validate the control schemes. Findings of this study show that MPC is superior to SVPWM in terms of total harmonic distortion (THD) and implementation.Keywords: voltage source inverter, space vector pulse width modulation, model predictive control, comparison
Procedia PDF Downloads 50813080 Using Passive Cooling Strategies to Reduce Thermal Cooling Load for Coastal High-Rise Buildings of Jeddah, Saudi Arabia
Authors: Ahmad Zamzam
Abstract:
With the development of the economy in recent years, Saudi Arabia has been maintaining high economic growth. Therefore, its energy consumption has increased dramatically. This economic growth reflected on the expansion of high-rise tower's construction. Jeddah coastal strip (cornice) has many high-rise buildings planned to start next few years. These projects required a massive amount of electricity that was not planned to be supplied by the old infrastructure. This research studies the effect of the building envelope on its thermal performance. It follows a parametric simulation methodology using Ecotect software to analyze the effect of the building envelope design on its cooling energy load for an office high-rise building in Jeddah, Saudi Arabia, which includes building geometrical form, massing treatments, orientation and glazing type effect. The research describes an integrated passive design approach to reduce the cooling requirement for high-rise building through an improved building envelope design. The research used Ecotect to make four simulation studies; the first simulation compares the thermal performance of five high-rise buildings, presenting the basic shape of the plan. All the buildings have the same plan area and same floor height. The goal of this simulation is to find out the best shape for the thermal performance. The second simulation studies the effect of orientation on the thermal performance by rotating the same building model to find out the best and the worst angle for the building thermal performance. The third simulation studies the effect of the massing treatment on the total cooling load. It compared five models with different massing treatment, but with the same total built up area. The last simulation studied the effect of the glazing type by comparing the total cooling load of the same building using five different glass type and also studies the feasibility of using these glass types by studying the glass cost effect. The results indicate that using the circle shape as building plan could reduce the thermal cooling load by 40%. Also, using shading devices could reduce the cooling loads by 5%. The study states that using any of the massing grooving, recess or any treatment that could increase the outer exposed surface is not preferred and will decrease the building thermal performance. Also, the result shows that the best direction for glazing and openings from thermal performance viewpoint in Jeddah is the North direction while the worst direction is the East one. The best direction angle for openings - regarding the thermal performance in Jeddah- is 15 deg West and the worst is 250 deg West (110 deg East). Regarding the glass type effect, comparing to the double glass with air fill type as a reference case, the double glass with Air-Low-E will save 14% from the required amount of the thermal cooling load annually. Argon fill and triple glass will save 16% and 17% from the total thermal cooling load respectively, but for the glass cost purpose, using the Argon fill and triple glass is not feasible.Keywords: passive cooling, reduce thermal load, Jeddah, building shape, energy
Procedia PDF Downloads 12913079 Adaptive Assemblies: A Scalable Solution for Atlanta's Affordable Housing Crisis
Authors: Claudia Aguilar, Amen Farooq
Abstract:
Among other cities in the United States, the city of Atlanta is experiencing levels of growth that surpass anything we have witnessed in the last century. With the surge of population influx, the available housing is practically bursting at the seams. Supply is low, and demand is high. In effect, the average one-bedroom apartment runs for 1,800 dollars per month. The city is desperately seeking new opportunities to provide affordable housing at an expeditious rate. This has been made evident by the recent updates to the city’s zoning. With the recent influx in the housing market, young professionals, in particular millennials, are desperately looking for alternatives to stay within the city. To remedy Atlanta’s affordable housing crisis, the city of Atlanta is planning to introduce 40 thousand of new affordable housing units by 2026. To achieve the urgent need for more affordable housing, the architectural response needs to adapt to overcome this goal. A method that has proven successful in modern housing is to practice modular means of development. A method that has been constrained to the dimensions of the max load for an eighteen-wheeler. This approach has diluted the architect’s ability to produce site-specific, informed design and rather contributes to the “cookie cutter” stigma that the method has been labeled with. This thesis explores the design methodology for modular housing by revisiting its constructability and adaptability. This research focuses on a modular housing type that could break away from the constraints of transport and deliver adaptive reconfigurable assemblies. The adaptive assemblies represent an integrated design strategy for assembling the future of affordable dwelling units. The goal is to take advantage of a component-based system and explore a scalable solution to modular housing. This proposal aims specifically to design a kit of parts that are made to be easily transported and assembled but also gives the ability to customize the use of components to benefit all unique conditions. The benefits of this concept could include decreased construction time, cost, on-site labor, and disruption while providing quality housing with affordable and flexible options.Keywords: adaptive assemblies, modular architecture, adaptability, constructibility, kit of parts
Procedia PDF Downloads 8613078 Component Lifecycle and Concurrency Model in Usage Control (UCON) System
Authors: P. Ghann, J. Shiguang, C. Zhou
Abstract:
Access control is one of the most challenging issues facing information security. Access control is defined as, the ability to permit or deny access to a particular computational resource or digital information by an unauthorized user or subject. The concept of usage control (UCON) has been introduced as a unified approach to capture a number of extensions for access control models and systems. In UCON, an access decision is determined by three factors: Authorizations, obligations and conditions. Attribute mutability and decision continuity are two distinct characteristics introduced by UCON for the first time. An observation of UCON components indicates that, the components are predefined and static. In this paper, we propose a new and flexible model of usage control for the creation and elimination of some of these components; for example new objects, subjects, attributes and integrate these with the original UCON model. We also propose a model for concurrent usage scenarios in UCON.Keywords: access control, concurrency, digital container, usage control
Procedia PDF Downloads 32113077 Power Aware Modified I-LEACH Protocol Using Fuzzy IF Then Rules
Authors: Gagandeep Singh, Navdeep Singh
Abstract:
Due to limited battery of sensor nodes, so energy efficiency found to be main constraint in WSN. Therefore the main focus of the present work is to find the ways to minimize the energy consumption problem and will results; enhancement in the network stability period and life time. Many researchers have proposed different kind of the protocols to enhance the network lifetime further. This paper has evaluated the issues which have been neglected in the field of the WSNs. WSNs are composed of multiple unattended ultra-small, limited-power sensor nodes. Sensor nodes are deployed randomly in the area of interest. Sensor nodes have limited processing, wireless communication and power resource capabilities Sensor nodes send sensed data to sink or Base Station (BS). I-LEACH gives adaptive clustering mechanism which very efficiently deals with energy conservations. This paper ends up with the shortcomings of various adaptive clustering based WSNs protocols.Keywords: WSN, I-Leach, MATLAB, sensor
Procedia PDF Downloads 27513076 Tourism and Sustainability Example Projects in the EU
Authors: Renee Yi-Mond Yuan
Abstract:
The fast development of tourism industries around the world, has largely contributed to many cities, and countries economical and social progress. Past year Taiwan in particular was ranked among one of fastest raise growth country. Thanks to the prominent importance of this phenomenon; seasonal mobility or multipurpose trips have reached more than 1 Billion tourists crossing International borders and more than 4 billion intramural travelers that have nourished the economy and employment in the service sector in most attractive regions, representing about one tenth of World GDP amount, including trade, research, cultural or journalistic purposes. Then the increased activities are giving pressure to the consumption of energy, water, resources, and Greenhouse Gas emissions. The further concentration of tourists in most beautiful sites of the World with consistent supply and reduced pollutions and means for waste control and risks management are challenging the preservation and protection of the natural original environment, including species and their ecosystems, ethnics and their cultures or languages, protection of inherited landscapes and monuments for the future generations to come. In this article, few projects will be analyzed, methods and directions in the EU sustainable development scheme giving way to economical and social activities and preserve rural areas and remote countryside as well as smarter cities development. EU ETS forecasting escalation in the next few decades for road and air, and will reconsider investments and reliance on Biobased alternatives that may turn out solutions and contributions to sustain popularization of tourism development. Study of Examples of Stakeholders practices and Governments efforts, consumer’s attitude to bring new forms of more responsible holidays models: ecotourism, eco-certification, partnerships, investment in technologies and facilities, and possibly create greener perceptions and less impacting demands for the longer term through association, organizations and awards.Keywords: tourism, sustainability, protection, risks management, change in rural/urban environment
Procedia PDF Downloads 33513075 Computational Cell Segmentation in Immunohistochemically Image of Meningioma Tumor Using Fuzzy C-Means and Adaptive Vector Directional Filter
Authors: Vahid Anari, Leila Shahmohammadi
Abstract:
Diagnosing and interpreting manually from a large cohort dataset of immunohistochemically stained tissue of tumors using an optical microscope involves subjectivity and also is tedious for pathologist specialists. Moreover, digital pathology today represents more of an evolution than a revolution in pathology. In this paper, we develop and test an unsupervised algorithm that can automatically enhance the IHC image of a meningioma tumor and classify cells into positive (proliferative) and negative (normal) cells. A dataset including 150 images is used to test the scheme. In addition, a new adaptive color image enhancement method is proposed based on a vector directional filter (VDF) and statistical properties of filtering the window. Since the cells are distinguishable by the human eye, the accuracy and stability of the algorithm are quantitatively compared through application to a wide variety of real images.Keywords: digital pathology, cell segmentation, immunohistochemically, noise reduction
Procedia PDF Downloads 6813074 Optimal Protection Coordination in Distribution Systems with Distributed Generations
Authors: Abdorreza Rabiee, Shahla Mohammad Hoseini Mirzaei
Abstract:
The advantages of distributed generations (DGs) based on renewable energy sources (RESs) leads to high penetration level of DGs in distribution network. With incorporation of DGs in distribution systems, the system reliability and security, as well as voltage profile, is improved. However, the protection of such systems is still challenging. In this paper, at first, the related papers are reviewed and then a practical scheme is proposed for coordination of OCRs in distribution system with DGs. The coordination problem is formulated as a nonlinear programming (NLP) optimization problem with the object function of minimizing total operating time of OCRs. The proposed method is studied based on a simple test system. The optimization problem is solved by General Algebraic Modeling System (GAMS) to calculate the optimal time dial setting (TDS) and also pickup current setting of OCRs. The results show the effectiveness of the proposed method and its applicability.Keywords: distributed generation, DG, distribution network, over current relay, OCR, protection coordination, pickup current, time dial setting, TDS
Procedia PDF Downloads 13913073 Interactive Shadow Play Animation System
Authors: Bo Wan, Xiu Wen, Lingling An, Xiaoling Ding
Abstract:
The paper describes a Chinese shadow play animation system based on Kinect. Users, without any professional training, can personally manipulate the shadow characters to finish a shadow play performance by their body actions and get a shadow play video through giving the record command to our system if they want. In our system, Kinect is responsible for capturing human movement and voice commands data. Gesture recognition module is used to control the change of the shadow play scenes. After packaging the data from Kinect and the recognition result from gesture recognition module, VRPN transmits them to the server-side. At last, the server-side uses the information to control the motion of shadow characters and video recording. This system not only achieves human-computer interaction, but also realizes the interaction between people. It brings an entertaining experience to users and easy to operate for all ages. Even more important is that the application background of Chinese shadow play embodies the protection of the art of shadow play animation.Keywords: hadow play animation, Kinect, gesture recognition, VRPN, HCI
Procedia PDF Downloads 40213072 Power Control of a Doubly-Fed Induction Generator Used in Wind Turbine by RST Controller
Authors: A. Boualouch, A. Frigui, T. Nasser, A. Essadki, A.Boukhriss
Abstract:
This work deals with the vector control of the active and reactive powers of a Double-Fed Induction generator DFIG used as a wind generator by the polynomial RST controller. The control of the statoric power transfer between the machine and the grid is achieved by acting on the rotor parameters and control is provided by the polynomial controller RST. The performance and robustness of the controller are compared with PI controller and evaluated by simulation results in MATLAB/simulink.Keywords: DFIG, RST, vector control, wind turbine
Procedia PDF Downloads 65913071 Overtopping Protection Systems for Overflow Earth Dams
Authors: Omid Pourabdollah, Mohsen Misaghian
Abstract:
Overtopping is known as one the most important reasons for the failure of earth dams. In some cases, it has resulted in heavy damages and losses. Therefore, enhancing the safety of earth dams against overtopping has received much attention in the past four decades. In this paper, at first, the overtopping phenomena and its destructive consequences will be introduced. Then, overtopping failure mechanism of embankments will be described. Finally, different types of protection systems for stabilization of earth dams against overtopping will be presented. These include timber cribs, riprap and gabions, reinforced earth, roller compacted concrete, and the precast concrete blocks.Keywords: embankment dam, overtopping, roller compacted concrete, wedge concrete block
Procedia PDF Downloads 16113070 The Impact of Non State Actor’s to Protect Refugees in Kurdistan Region of Iraq
Authors: Rozh Abdulrahman Kareem
Abstract:
The displacement of individuals has become a common interest for international players. Mostly occurs in Islamic states, as religion is considered the most common cause of this form of displacement. Therefore, this thesis aims to depict the reality of the situations of the refugees, particularly in KRI, illustrating how they are treated and protected and if the treatment merits the protection clause as envisaged in the 1951 Refugee Convention. Overall, the aim is to touch on the issue of protection by non-governmental organizations and government towards the refugees here. In light of this, it focused on the adequate protection of refugees in relation to the refugee law. In the Middle East, including Iraq, there have been multiple reports on violations of these refugee laws and human rights. Protection involves providing physical security to the concerned parties, functional administration with legal structures, and infrastructural setup that could help citizens exercise rights. The KRI has provided the refugees with various benefits, including education, access to residency, and employment. It also provided transitionary in various social dimensions like gender-based violence. The Convention on Status of Refugees 1951 tried to resolve this problem, whereby the principle of ‘nonrefoulement’ under Article 33 was passed. The ‘nonrefoulement’, an exceptional reference, was enacted to protect refugees from forcible return to their countries of the original. However, the convention never addressed an unusual scenario regarding the application of this principle, ‘Extradition Treaties.’ Even though some scholarly article exists regarding the problems of refugees, the topic of interplay between Nonrefoulement and Extradition Treaties has never been explained in detail in the available books on refugee laws and practices. Each year, millions of refugees seek protection from foreign countries for fear of being tortured, victimized, or executed. People seeking international protection are susceptible and insecure. The main objective of the prevention is to provide security to citizens susceptible to inhuman treatment, distress, oppression, or other human rights defilements when they arrive back in their own countries. The refugee situation may get worse in the near future. Just like several nations within the Middle East, Iraq is not a signatory to the globally acknowledged legal structure for the protection of refugees. The first law of 1971 in Iraq was issued only for military or political causes. This law also establishes benefits such as the right to education and health services and the right to acquire employment just as the Iraqi nationals. The other legislative instrument is the 21st law from the ministry of migration of Iraq widened the description of an immigrant to incorporate the definition from the refugee resolution. Nonetheless, there is a lack of overall consistency in the protection provided under these legislations regarding rights and entitlement. A Memorandum of Understanding was signed in October 2016 by the UNHCR and the Iraq government to develop the protection of refugees. Under the term of this MoU, the Iraqi Government is obligated to provide identity documents to asylum seekers beside that UNHCR provides more guidance.Keywords: law, refugee, protection, Kurdistan
Procedia PDF Downloads 6413069 A Multi-Cluster Enterprise Framework for Evolution of Knowledge System among Enterprises, Governments and Research Institutions
Authors: Sohail Ahmed, Ke Xing
Abstract:
This research theoretically explored the evolution mechanism of enterprise technological innovation capability system (ETICS) from the perspective of complex adaptive systems (CAS). Starting from CAS theory, this study proposed an analytical framework for ETICS, its concepts and theory by integrating CAS methodology into the management of technological innovation capability of enterprises and discusses how to use the principles of complexity to analyze the composition, evolution and realization of the technological innovation capabilities in complex dynamic environment. This paper introduces the concept and interaction of multi-agent, the theoretical background of CAS and summarizes the sources of technological innovation, the elements of each subject and the main clusters of adaptive interactions and innovation activities. The concept of multi-agents is applied through the linkages of enterprises, research institutions and government agencies with the leading enterprises in industrial settings. The study was exploratory based on CAS theory. Theoretical model is built by considering technological and innovation literature from foundational to state of the art projects of technological enterprises. On this basis, the theoretical model is developed to measure the evolution mechanism of enterprise technological innovation capability system. This paper concludes that the main characteristics for evolution in technological systems are based on enterprise’s research and development personal, investments in technological processes and innovation resources are responsible for the evolution of enterprise technological innovation performance. The research specifically enriched the application process of technological innovation in institutional networks related to enterprises.Keywords: complex adaptive system, echo model, enterprise knowledge system, research institutions, multi-agents.
Procedia PDF Downloads 7113068 Facial Biometric Privacy Using Visual Cryptography: A Fundamental Approach to Enhance the Security of Facial Biometric Data
Authors: Devika Tanna
Abstract:
'Biometrics' means 'life measurement' but the term is usually associated with the use of unique physiological characteristics to identify an individual. It is important to secure the privacy of digital face image that is stored in central database. To impart privacy to such biometric face images, first, the digital face image is split into two host face images such that, each of it gives no idea of existence of the original face image and, then each cover image is stored in two different databases geographically apart. When both the cover images are simultaneously available then only we can access that original image. This can be achieved by using the XM2VTS and IMM face database, an adaptive algorithm for spatial greyscale. The algorithm helps to select the appropriate host images which are most likely to be compatible with the secret image stored in the central database based on its geometry and appearance. The encryption is done using GEVCS which results in a reconstructed image identical to the original private image.Keywords: adaptive algorithm, database, host images, privacy, visual cryptography
Procedia PDF Downloads 13113067 Adaptive Multipath Mitigation Acquisition Approach for Global Positioning System Software Receivers
Authors: Animut Meseret Simachew
Abstract:
Parallel Code Phase Search Acquisition (PCSA) Algorithm has been considered as a promising method in GPS software receivers for detection and estimation of the accurate correlation peak between the received Global Positioning System (GPS) signal and locally generated replicas. GPS signal acquisition in highly dense multipath environments is the main research challenge. In this work, we proposed a robust variable step-size (RVSS) PCSA algorithm based on fast frequency transform (FFT) filtering technique to mitigate short time delay multipath signals. Simulation results reveal the effectiveness of the proposed algorithm over the conventional PCSA algorithm. The proposed RVSS-PCSA algorithm equalizes the received carrier wiped-off signal with locally generated C/A code.Keywords: adaptive PCSA, detection and estimation, GPS signal acquisition, GPS software receiver
Procedia PDF Downloads 118