Search results for: traditional architecture
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6418

Search results for: traditional architecture

5698 Control of a Wind Energy Conversion System Works in Tow Operating Modes (Hyper Synchronous and Hypo Synchronous)

Authors: A. Moualdia, D. J. Boudana, O. Bouchhida, A. Medjber

Abstract:

Wind energy has many advantages, it does not pollute and it is an inexhaustible source. However, the cost of this energy is still too high to compete with traditional fossil fuels, especially on sites less windy. The performance of a wind turbine depends on three parameters: the power of wind, the power curve of the turbine and the generator's ability to respond to wind fluctuations. This paper presents a control chain conversion based on a double-fed asynchronous machine and flow-oriented. The supply system comprises of two identical converters, one connected to the rotor and the other one connected to the network via a filter. The architecture of the device is up by three commands are necessary for the operation of the turbine control extraction of maximum power of the wind to control itself (MPPT) control of the rotor side converter controlling the electromagnetic torque and stator reactive power and control of the grid side converter by controlling the DC bus voltage and active power and reactive power exchanged with the network. The proposed control has been validated in both modes of operation of the three-bladed wind 7.5 kW, using Matlab/Simulink. The results of simulation control technology study provide good dynamic performance and static.

Keywords: D.F.I.G, variable wind speed, hypersynchrone, energy quality, hyposynchrone

Procedia PDF Downloads 367
5697 Scalable Systolic Multiplier over Binary Extension Fields Based on Two-Level Karatsuba Decomposition

Authors: Chiou-Yng Lee, Wen-Yo Lee, Chieh-Tsai Wu, Cheng-Chen Yang

Abstract:

Shifted polynomial basis (SPB) is a variation of polynomial basis representation. SPB has potential for efficient bit-level and digit-level implementations of multiplication over binary extension fields with subquadratic space complexity. For efficient implementation of pairing computation with large finite fields, this paper presents a new SPB multiplication algorithm based on Karatsuba schemes, and used that to derive a novel scalable multiplier architecture. Analytical results show that the proposed multiplier provides a trade-off between space and time complexities. Our proposed multiplier is modular, regular, and suitable for very-large-scale integration (VLSI) implementations. It involves less area complexity compared to the multipliers based on traditional decomposition methods. It is therefore, more suitable for efficient hardware implementation of pairing based cryptography and elliptic curve cryptography (ECC) in constraint driven applications.

Keywords: digit-serial systolic multiplier, elliptic curve cryptography (ECC), Karatsuba algorithm (KA), shifted polynomial basis (SPB), pairing computation

Procedia PDF Downloads 362
5696 Isolation and Characterization of Lactic Acid Bacteria from Libyan Traditional Fermented Milk "Laban"

Authors: M. H. Nahaisi, N. M. Almaroum

Abstract:

Laban is a Libyan traditional fermented milk product. This lactic fermentation has been known in many cities of Libya long time ago as stable, nutritious, refreshing drink especially during the summer. 16 naturally fermented milk samples were collected from different cities located in North West of Libya. The average pH, titratable acidity, fat and total solids were 4.16, 0.73%, 1.54% and 8.12 % respectively. Coliform, yeast and mold counts were 21×10⁴, 39×10⁴ and 41 ×10³ cfu/ ml. respectively. The average Lactococcus, Streptococcus, Mesophilic Lactobacillus / Leuconostoc and Thermophilic Lactobacillus counts were 99 ×10⁷, 96 ×10⁷, 93 ×10⁷ and 15 ×10⁷ cfu / ml. respectively. A total of one hundred forty two lactic acid bacteria (LAB) isolates were identified to the genus level as Lactobacillus (48.59%), Lactococcus (43.66%), Streptococcus (4.93%) and Leuconostoc (2.82%). Sugar fermentation tests have revealed that the most frequently Lactobacillus species was found to be Lactobacillus delbrueckii ssp. lactis (62.32%) followed by Lactobacillus plantarum (31.88%). Furthermore, other selected LAB isolates were identified by API 50 CH test as Lactococcus lactis ssp. lactics, Lactobacillus pentosus, Lactobacillus brevis and Leuconostoc mesenteroides ssp. cremoris.

Keywords: traditional fermented milk, laban, lactococcus, streptococcus, mesophilic lactobacillus, thermophilic lactobacillus counts

Procedia PDF Downloads 374
5695 An Analytical Metric and Process for Critical Infrastructure Architecture System Availability Determination in Distributed Computing Environments under Infrastructure Attack

Authors: Vincent Andrew Cappellano

Abstract:

In the early phases of critical infrastructure system design, translating distributed computing requirements to an architecture has risk given the multitude of approaches (e.g., cloud, edge, fog). In many systems, a single requirement for system uptime / availability is used to encompass the system’s intended operations. However, when architected systems may perform to those availability requirements only during normal operations and not during component failure, or during outages caused by adversary attacks on critical infrastructure (e.g., physical, cyber). System designers lack a structured method to evaluate availability requirements against candidate system architectures through deep degradation scenarios (i.e., normal ops all the way down to significant damage of communications or physical nodes). This increases risk of poor selection of a candidate architecture due to the absence of insight into true performance for systems that must operate as a piece of critical infrastructure. This research effort proposes a process to analyze critical infrastructure system availability requirements and a candidate set of systems architectures, producing a metric assessing these architectures over a spectrum of degradations to aid in selecting appropriate resilient architectures. To accomplish this effort, a set of simulation and evaluation efforts are undertaken that will process, in an automated way, a set of sample requirements into a set of potential architectures where system functions and capabilities are distributed across nodes. Nodes and links will have specific characteristics and based on sampled requirements, contribute to the overall system functionality, such that as they are impacted/degraded, the impacted functional availability of a system can be determined. A machine learning reinforcement-based agent will structurally impact the nodes, links, and characteristics (e.g., bandwidth, latency) of a given architecture to provide an assessment of system functional uptime/availability under these scenarios. By varying the intensity of the attack and related aspects, we can create a structured method of evaluating the performance of candidate architectures against each other to create a metric rating its resilience to these attack types/strategies. Through multiple simulation iterations, sufficient data will exist to compare this availability metric, and an architectural recommendation against the baseline requirements, in comparison to existing multi-factor computing architectural selection processes. It is intended that this additional data will create an improvement in the matching of resilient critical infrastructure system requirements to the correct architectures and implementations that will support improved operation during times of system degradation due to failures and infrastructure attacks.

Keywords: architecture, resiliency, availability, cyber-attack

Procedia PDF Downloads 109
5694 Intrusion Detection in Cloud Computing Using Machine Learning

Authors: Faiza Babur Khan, Sohail Asghar

Abstract:

With an emergence of distributed environment, cloud computing is proving to be the most stimulating computing paradigm shift in computer technology, resulting in spectacular expansion in IT industry. Many companies have augmented their technical infrastructure by adopting cloud resource sharing architecture. Cloud computing has opened doors to unlimited opportunities from application to platform availability, expandable storage and provision of computing environment. However, from a security viewpoint, an added risk level is introduced from clouds, weakening the protection mechanisms, and hardening the availability of privacy, data security and on demand service. Issues of trust, confidentiality, and integrity are elevated due to multitenant resource sharing architecture of cloud. Trust or reliability of cloud refers to its capability of providing the needed services precisely and unfailingly. Confidentiality is the ability of the architecture to ensure authorization of the relevant party to access its private data. It also guarantees integrity to protect the data from being fabricated by an unauthorized user. So in order to assure provision of secured cloud, a roadmap or model is obligatory to analyze a security problem, design mitigation strategies, and evaluate solutions. The aim of the paper is twofold; first to enlighten the factors which make cloud security critical along with alleviation strategies and secondly to propose an intrusion detection model that identifies the attackers in a preventive way using machine learning Random Forest classifier with an accuracy of 99.8%. This model uses less number of features. A comparison with other classifiers is also presented.

Keywords: cloud security, threats, machine learning, random forest, classification

Procedia PDF Downloads 320
5693 Design and Study of a Hybrid Micro-CSP/Biomass Boiler System for Water and Space Heating in Traditional Hammam

Authors: Said Lamghari, Abdelkader Outzourhit, Hassan Hamdi, Mohamed Krarouch, Fatima Ait Nouh, Mickael Benhaim, Mehdi Khaldoun

Abstract:

Traditional Hammams are big consumers of water and wood-energy. Any approach to reduce this consumption will contribute to the preservation of these two resources that are more and more stressed in Morocco. In the InnoTherm/InnoBiomass 2014 project HYBRIDBATH, funded by the Research Institute for Solar Energy and New Energy (IRESEN), we will use a hybrid system consisting of a micro-CSP system and a biomass boiler for water and space heating of a Hammam. This will overcome the problem of intermittency of solar energy, and will ensure continuous supply of hot water and heat. We propose to use local agricultural residues (olive pomace, shells of walnuts, almonds, Argan ...). Underfloor heating using either copper or PEX tubing will perform the space heating. This work focuses on the description of the system and the activities carried out so far: The installation of the system, the principle operation of the system and some preliminary test results.

Keywords: biomass boiler, hot water, hybrid systems, micro-CSP, parabolic sensor, solar energy, solar fraction, traditional hammam, underfloor heating

Procedia PDF Downloads 312
5692 Mobile Cloud Application in Design Build Bridge Construction

Authors: Meng Sun, Bin Wei

Abstract:

In the past decades, design-build has become a more popular project delivery system especially for the large scaled infrastructure project in North America. It provides a one-stop shopping system for the client therefore improves the efficiency of construction, and reduces the risks and overall cost for the clients. Compared to the project with traditional delivery method, design-build project requires contractor and designer to work together efficiently to deliver the best-value solutions through the construction process. How to facilitate a solid integration and efficient interaction between contractor and designer often affects the schedule, budget and quality of the construction therefore becomes a key factor to the success of a design-build project. This paper presents a concept of using modern mobile cloud technology to provide an integrated solution during the design-build construction. It uses mobile cloud architecture to provide a platform for real-time field progress, change request approval, job progress log, and project time entry with devices integration for field information and communications. The paper uses a real filed change notice as an example to demonstrate how mobile cloud technology applies in a design-build project and how it can improve the project efficiency.

Keywords: cloud, design-build, field change notice, mobile application

Procedia PDF Downloads 248
5691 Memory Based Reinforcement Learning with Transformers for Long Horizon Timescales and Continuous Action Spaces

Authors: Shweta Singh, Sudaman Katti

Abstract:

The most well-known sequence models make use of complex recurrent neural networks in an encoder-decoder configuration. The model used in this research makes use of a transformer, which is based purely on a self-attention mechanism, without relying on recurrence at all. More specifically, encoders and decoders which make use of self-attention and operate based on a memory, are used. In this research work, results for various 3D visual and non-visual reinforcement learning tasks designed in Unity software were obtained. Convolutional neural networks, more specifically, nature CNN architecture, are used for input processing in visual tasks, and comparison with standard long short-term memory (LSTM) architecture is performed for both visual tasks based on CNNs and non-visual tasks based on coordinate inputs. This research work combines the transformer architecture with the proximal policy optimization technique used popularly in reinforcement learning for stability and better policy updates while training, especially for continuous action spaces, which are used in this research work. Certain tasks in this paper are long horizon tasks that carry on for a longer duration and require extensive use of memory-based functionalities like storage of experiences and choosing appropriate actions based on recall. The transformer, which makes use of memory and self-attention mechanism in an encoder-decoder configuration proved to have better performance when compared to LSTM in terms of exploration and rewards achieved. Such memory based architectures can be used extensively in the field of cognitive robotics and reinforcement learning.

Keywords: convolutional neural networks, reinforcement learning, self-attention, transformers, unity

Procedia PDF Downloads 136
5690 Ethnobotanical Study of Spontaneous Medicinal Plants Used in the Treatment of Viral Respiratory Diseases in the Prerif, Morocco

Authors: El Amane Salma, Rahou Abdelilah

Abstract:

Viral respiratory infections (common cold, flu, sinusitis, bronchiolitis, etc.) are among the most common infections in the world with severe symptoms. In Morocco, as everywhere in the world, especially in developing countries, the therapeutic indications of medicinal plants are very present to treat several diseases, including the respiratory system. The objective of our study is to identify and document medicinal plants used in traditional medicine to treat viral respiratory infections and alleviate their symptoms in order to generate interest for future studies in verifying the efficacy of these traditional medicines and their conservation. The information acquired from 81 questionnaires and the floristic identification allowed us to identify 19 spontaneous species belonging to 11 families, used as traditional therapies for viral respiratory diseases in the Prerif. The herbs are the most used life form. The results also showed that leaves were the most commonly used plant parts and most of the herbal medicines were prepared in the form of infusions and administered orally. Documented data was evaluated using use value (UV), family importance value (FIV) and relative frequency citation (RCF).

Keywords: medicinal plants, ethnobotanical, ethnopharmacological, viral respiratory diseases, Morocco

Procedia PDF Downloads 193
5689 Effect of Different Flours on the Physical and Sensorial Characteristics of Meatballs

Authors: Elif Aykin Dincer, Ozlem Kilic, Busra F. Bilgic, Mustafa Erbas

Abstract:

Stale breads and rusk flour are used traditionally in meatballs produced in Turkey as a structure enhancer. This study researches the possibilities of using retrograded wheat flour in the meatball production and compares the physical and sensorial characteristics of these meatballs with stale bread (traditional) and rusk (commercial) used meatballs. The cooking loss of meatballs produced with using retrograded flour was similar to that of commercial meatballs. These meatballs have an advantage with respect to cooking loss compared to traditional meatballs. Doses of retrograded flour from 5% to 20% led to a significant decrease in cooking loss, from 21.95% to 6.19%, and in the diameter of meatballs, from 18.60% to 12.74%, but to an increase in the thickness of meatballs, from 28.82% to 41.39%, respectively, compared to the control (0%). The springiness of the traditional meatballs was significantly higher than that of the other meatballs. This might have been due to the bread crumbs having a naturally springy structure. Moreover, the addition of retrograded flour in the meatballs significantly (P<0.05) affected the hardness, springiness and cohesiveness of the meatballs with respect to textural properties. In conclusion, it is considered that the use of 10% retrograded flour is ideal to improve the sensorial values of meatballs and the properties of their structure.

Keywords: cooking loss, flour, hardness, meatball, sensorial characteristics

Procedia PDF Downloads 291
5688 Process Driven Architecture For The ‘Lessons Learnt’ Knowledge Sharing Framework: The Case Of A ‘Lessons Learnt’ Framework For KOC

Authors: Rima Al-Awadhi, Abdul Jaleel Tharayil

Abstract:

On a regular basis, KOC engages into various types of Projects. However, due to very nature and complexity involved, each project experience generates a lot of ‘learnings’ that need to be factored into while drafting a new contract and thus avoid repeating the same mistakes. But, many a time these learnings are localized and remain as tacit leading to scope re-work, larger cycle time, schedule overrun, adjustment orders and claims. Also, these experiences are not readily available to new employees leading to steep learning curve and longer time to competency. This is to share our experience in designing and implementing a process driven architecture for the ‘lessons learnt’ knowledge sharing framework in KOC. It high-lights the ‘lessons learnt’ sharing process adopted, integration with the organizational processes, governance framework, the challenges faced and learning from our experience in implementing a ‘lessons learnt’ framework.

Keywords: lessons learnt, knowledge transfer, knowledge sharing, successful practices, Lessons Learnt Workshop, governance framework

Procedia PDF Downloads 577
5687 Adopting Cloud-Based Techniques to Reduce Energy Consumption: Toward a Greener Cloud

Authors: Sandesh Achar

Abstract:

The cloud computing industry has set new goals for better service delivery and deployment, so anyone can access services such as computation, application, and storage anytime. Cloud computing promises new possibilities for approaching sustainable solutions to deploy and advance their services in this distributed environment. This work explores energy-efficient approaches and how cloud-based architecture can reduce energy consumption levels amongst enterprises leveraging cloud computing services. Adopting cloud-based networking, database, and server machines provide a comprehensive means of achieving the potential gains in energy efficiency that cloud computing offers. In energy-efficient cloud computing, virtualization is one aspect that can integrate several technologies to achieve consolidation and better resource utilization. Moreover, the Green Cloud Architecture for cloud data centers is discussed in terms of cost, performance, and energy consumption, and appropriate solutions for various application areas are provided.

Keywords: greener cloud, cloud computing, energy efficiency, energy consumption, metadata tags, green cloud advisor

Procedia PDF Downloads 85
5686 The Identity of the Cairene Public Space: Manifestations of Social and Architectural Heritage in the City Square of Medieval Cairo

Authors: Muhammad Emad Feteha

Abstract:

Cairo has been famous for the unique identity of its medieval architecture, which was formed by multiple dynasties that ruled Egypt. However, only a few researches were done on the identity of its public space. This paper links both the architectural and the socio-political aspects of the Cairene public space and studies how they affected each other. The subject of the study is Maydan Salah al-Din, the main city square of medieval Cairo, which reveals a quite useful information, not only about the architectural identity of the Cairene public space but also about the socio-political patterns that operated within. The analytical framework is based on Lefebvre’s theory, the ‘production of space’, in which he applied 'the Hegelian dialectic' in order to understand how the social practice forms the space, and how, in turn, the space forms the social practice. This framework offers a comprehensive understanding of the identity of the Cairene public space, which does not separate architecture from the social practice.

Keywords: architectural identity, Cairene public space, Islamic architectural history, production of space

Procedia PDF Downloads 363
5685 Developing a Multiagent-Based Decision Support System for Realtime Multi-Risk Disaster Management

Authors: D. Moser, D. Pinto, A. Cipriano

Abstract:

A Disaster Management System (DMS) for countries with different disasters is very important. In the world different disasters like earthquakes, tsunamis, volcanic eruption, fire or other natural or man-made disasters occurs and have an effect on the population. It is also possible that two or more disasters arisen at the same time, this means to handle multi-risk situations. To handle such a situation a Decision Support System (DSS) based on multiagents is a suitable architecture. The most known DMSs deal with one (in the case of an earthquake-tsunami combination with two) disaster and often with one particular disaster. Nevertheless, a DSS helps for a better realtime response. Analyze the existing systems in the literature and expand them for multi-risk disasters to construct a well-organized system is the proposal of our work. The here shown work is an approach of a multi-risk system, which needs an architecture, and well-defined aims. In this moment our study is a kind of case study to analyze the way we have to follow to create our proposed system in the future.

Keywords: decision support system, disaster management system, multi-risk, multiagent system

Procedia PDF Downloads 431
5684 Comparative Analysis of Polish Traditional Bread and Teff Injera: Culinary Heritage and Nutritional Perspectives

Authors: Temesgen Minase Woldegebriel

Abstract:

This study undertakes a comparative analysis of two distinct staples from diverse culinary heritages: Polish traditional bread and Teff Injera. Despite originating from disparate cultural contexts, both these foods hold significant roles in their respective societies, serving as dietary staples rich in cultural symbolism and nutritional value. Our investigation delves into the historical, cultural, and nutritional dimensions of Polish bread and Teff Injera, shedding light on their ingredients, preparation methods, and consumption patterns. Firstly, we explore the rich history and cultural significance embedded within Polish traditional bread, tracing its evolution through centuries of tradition and craftsmanship. From the ubiquitous Polish Rye bread to the intricate regional variations, we unravel the socio-cultural narratives intertwined with each loaf, reflecting Polish identity and culinary heritage. In contrast, our analysis extends to Teff Injera, a staple of Ethiopian and Eritrean cuisine known for its spongy texture and tangy flavor. We delve into the ancient origins of Teff cultivation, highlighting its pivotal role in Ethiopian culture and its symbolic significance in communal dining practices, such as the traditional Ethiopian coffee ceremony. Furthermore, we undertake a comparative examination of the nutritional profiles of Polish bread and Teff Injera, assessing their respective contributions to dietary health and well-being. Through comprehensive nutritional analysis, we elucidate the unique attributes of each staple, considering factors such as gluten content, fiber composition, and micronutrient density. Moreover, our study investigates the contemporary relevance of these traditional staples in the context of shifting dietary preferences and global culinary trends. We analyze consumer perceptions and market dynamics surrounding Polish bread and Teff Injera, discerning patterns of consumption and avenues for innovation in a rapidly evolving food landscape. In conclusion, our comparative analysis illuminates the multifaceted dimensions of Polish traditional bread and Teff Injera, transcending mere culinary discourse to encompass broader themes of cultural heritage, nutrition, and gastronomic diversity.

Keywords: bread, culinary, injera, teff

Procedia PDF Downloads 17
5683 A Predictive Model for Turbulence Evolution and Mixing Using Machine Learning

Authors: Yuhang Wang, Jorg Schluter, Sergiy Shelyag

Abstract:

The high cost associated with high-resolution computational fluid dynamics (CFD) is one of the main challenges that inhibit the design, development, and optimisation of new combustion systems adapted for renewable fuels. In this study, we propose a physics-guided CNN-based model to predict turbulence evolution and mixing without requiring a traditional CFD solver. The model architecture is built upon U-Net and the inception module, while a physics-guided loss function is designed by introducing two additional physical constraints to allow for the conservation of both mass and pressure over the entire predicted flow fields. Then, the model is trained on the Large Eddy Simulation (LES) results of a natural turbulent mixing layer with two different Reynolds number cases (Re = 3000 and 30000). As a result, the model prediction shows an excellent agreement with the corresponding CFD solutions in terms of both spatial distributions and temporal evolution of turbulent mixing. Such promising model prediction performance opens up the possibilities of doing accurate high-resolution manifold-based combustion simulations at a low computational cost for accelerating the iterative design process of new combustion systems.

Keywords: computational fluid dynamics, turbulence, machine learning, combustion modelling

Procedia PDF Downloads 91
5682 A Distinct Method Based on Mamba-Unet for Brain Tumor Image Segmentation

Authors: Djallel Bouamama, Yasser R. Haddadi

Abstract:

Accurate brain tumor segmentation is crucial for diagnosis and treatment planning, yet it remains a challenging task due to the variability in tumor shapes and intensities. This paper introduces a distinct approach to brain tumor image segmentation by leveraging an advanced architecture known as Mamba-Unet. Building on the well-established U-Net framework, Mamba-Unet incorporates distinct design enhancements to improve segmentation performance. Our proposed method integrates a multi-scale attention mechanism and a hybrid loss function to effectively capture fine-grained details and contextual information in brain MRI scans. We demonstrate that Mamba-Unet significantly enhances segmentation accuracy compared to conventional U-Net models by utilizing a comprehensive dataset of annotated brain MRI scans. Quantitative evaluations reveal that Mamba-Unet surpasses traditional U-Net architectures and other contemporary segmentation models regarding Dice coefficient, sensitivity, and specificity. The improvements are attributed to the method's ability to manage class imbalance better and resolve complex tumor boundaries. This work advances the state-of-the-art in brain tumor segmentation and holds promise for improving clinical workflows and patient outcomes through more precise and reliable tumor detection.

Keywords: brain tumor classification, image segmentation, CNN, U-NET

Procedia PDF Downloads 34
5681 Superiority of High Frequency Based Volatility Models: Empirical Evidence from an Emerging Market

Authors: Sibel Celik, Hüseyin Ergin

Abstract:

The paper aims to find the best volatility forecasting model for stock markets in Turkey. For this purpose, we compare performance of different volatility models-both traditional GARCH model and high frequency based volatility models- and conclude that both in pre-crisis and crisis period, the performance of high frequency based volatility models are better than traditional GARCH model. The findings of paper are important for policy makers, financial institutions and investors.

Keywords: volatility, GARCH model, realized volatility, high frequency data

Procedia PDF Downloads 486
5680 Shaping Traditional Chinese Culture in Contemporary Fashion: ‘Guochao’ as a Rising Aesthetic and the Case Study of the Designer Brand Angel Chen

Authors: Zhe Ginnie Wang

Abstract:

Recent cultural design studies have begun to shed light on the discussion of Western-Eastern cultural and aesthetic hybridization, especially in the field of fashion. With the unprecedented spread of cultural Chinese fashion design in the global fashion system, the under-identified ‘Guochao’ aesthetic that has emerged in the global market needs to be academically emphasized with a methodological approach looking at the Western-Eastern cultural hybridization present in fashion visualization. Through an in-depth and comprehensive investigation of a representative international-based Chinese designer, Angel Chen's fashion show 'Madam Qing', this paper provides a methodological approach on how a form of traditional culture can be effectively extracted and applied to modern design using the most effective techniques. The central approach examined in this study involves creating aesthetic revolutions by addressing Chinese cultural identity through re-creating and modernizing traditional Chinese culture in design.

Keywords: style modernization, Chinese culture, guochao, design identity, fashion show, Angel Chen

Procedia PDF Downloads 356
5679 Horizontal Circular Curve Computations Using a Developed Calculator

Authors: Adil Hassabo

Abstract:

In this paper, a horizontal circular curve computations calculator is developed in Microsoft Windows. The developed calculator can be used for determining the necessary information required for setting out horizontal curves. Three methods are applied in the developed program namely: incremental chord method, total chord method, and the coordinates method. Computations of horizontal curves by the developed calculator is faster, easier, accurate, and less subject to errors comparable to the traditional method of calculations. Finally, the results obtained by the traditional method and by the developed calculator are presented for checking the behavior of the developed calculator.

Keywords: calculator, circular, computations, curve

Procedia PDF Downloads 162
5678 Multi-Modal Feature Fusion Network for Speaker Recognition Task

Authors: Xiang Shijie, Zhou Dong, Tian Dan

Abstract:

Speaker recognition is a crucial task in the field of speech processing, aimed at identifying individuals based on their vocal characteristics. However, existing speaker recognition methods face numerous challenges. Traditional methods primarily rely on audio signals, which often suffer from limitations in noisy environments, variations in speaking style, and insufficient sample sizes. Additionally, relying solely on audio features can sometimes fail to capture the unique identity of the speaker comprehensively, impacting recognition accuracy. To address these issues, we propose a multi-modal network architecture that simultaneously processes both audio and text signals. By gradually integrating audio and text features, we leverage the strengths of both modalities to enhance the robustness and accuracy of speaker recognition. Our experiments demonstrate significant improvements with this multi-modal approach, particularly in complex environments, where recognition performance has been notably enhanced. Our research not only highlights the limitations of current speaker recognition methods but also showcases the effectiveness of multi-modal fusion techniques in overcoming these limitations, providing valuable insights for future research.

Keywords: feature fusion, memory network, multimodal input, speaker recognition

Procedia PDF Downloads 32
5677 The Acoustic Performance of Double-skin Wind Energy Facade

Authors: Sara Mota Carmo

Abstract:

Wind energy applied in architecture has been largely abandoned due to the uncomfortable noise it causes. This study aims to investigate the acoustical performance in the urban environment and indoor environment of a double-skin wind energy facade. Measurements for sound transmission were recorded by using a hand-held sound meter device on a reduced-scale prototype of a wind energy façade. The applied wind intensities ranged between 2m/s and 8m/s, and the increase sound produced were proportional to the wind intensity.The study validates the acoustic performance of wind energy façade using a double skin façade system, showing that noise reduction indoor by approximately 30 to 35 dB. However, the results found that above 6m/s win intensity, in urban environment, the wind energy system applied to the façade exceeds the maximum 50dB recommended by world health organization and needs some adjustments.

Keywords: double-skin wind energy facade, acoustic energy facade, wind energy in architecture, wind energy prototype

Procedia PDF Downloads 101
5676 Bridging the Gap between Problem and Solution Space with Domain-Driven Design

Authors: Anil Kumar, Lavisha Gupta

Abstract:

Domain-driven design (DDD) is a pivotal methodology in software development, emphasizing the understanding and modeling of core business domains to create effective solutions. This paper explores the significance of DDD in aligning software architecture with real-world domains, with a focus on its application within Siemens. We delve into the challenges faced by development teams in understanding domains and propose DDD as a solution to bridge the gap between problem and solution spaces. Key concepts of DDD, such as Ubiquitous Language, Bounded Contexts, Entities, Value Objects, and Aggregates, are discussed, along with their practical implications in software development. Through a real project example in the automatic generation of hardware and software plant engineering, we illustrate how DDD principles can transform complex domains into coherent and adaptable software solutions, echoing Siemens' commitment to excellence and innovation.

Keywords: domain-driven design, software architecture, ubiquitous language, bounded contexts, entities, value objects, aggregates

Procedia PDF Downloads 35
5675 An Empirical Study on Switching Activation Functions in Shallow and Deep Neural Networks

Authors: Apoorva Vinod, Archana Mathur, Snehanshu Saha

Abstract:

Though there exists a plethora of Activation Functions (AFs) used in single and multiple hidden layer Neural Networks (NN), their behavior always raised curiosity, whether used in combination or singly. The popular AFs –Sigmoid, ReLU, and Tanh–have performed prominently well for shallow and deep architectures. Most of the time, AFs are used singly in multi-layered NN, and, to the best of our knowledge, their performance is never studied and analyzed deeply when used in combination. In this manuscript, we experiment with multi-layered NN architecture (both on shallow and deep architectures; Convolutional NN and VGG16) and investigate how well the network responds to using two different AFs (Sigmoid-Tanh, Tanh-ReLU, ReLU-Sigmoid) used alternately against a traditional, single (Sigmoid-Sigmoid, Tanh-Tanh, ReLUReLU) combination. Our results show that using two different AFs, the network achieves better accuracy, substantially lower loss, and faster convergence on 4 computer vision (CV) and 15 Non-CV (NCV) datasets. When using different AFs, not only was the accuracy greater by 6-7%, but we also accomplished convergence twice as fast. We present a case study to investigate the probability of networks suffering vanishing and exploding gradients when using two different AFs. Additionally, we theoretically showed that a composition of two or more AFs satisfies Universal Approximation Theorem (UAT).

Keywords: activation function, universal approximation function, neural networks, convergence

Procedia PDF Downloads 158
5674 The Role of Community Beliefs and Practices on the Spread of Ebola in Uganda, September 2022

Authors: Helen Nelly Naiga, Jane Frances Zalwango, Saudah N. Kizito, Brian Agaba, Brenda N Simbwa, Maria Goretti Zalwango, Richard Migisha, Benon Kwesiga, Daniel Kadobera, Alex Ario Riolexus, Sarah Paige, Julie R. Harris

Abstract:

Background: Traditional community beliefs and practices can facilitate the spread of Ebola virus during outbreaks. On September 20, 2022, Uganda declared a Sudan Virus Disease (SVD) outbreak after a case was confirmed in Mubende District. During September–November 2022, the outbreak spread to eight additional districts. We investigated the role of community beliefs and practices in the spread of SUDV in Uganda in 2022. Methods: A qualitative study was conducted in Mubende, Kassanda, and Kyegegwa districts in February 2023. We conducted nine focus group discussions (FGDs) and six key informant interviews (KIIs). FGDs included SVD survivors, household members of SVD patients, traditional healers, religious leaders, and community leaders. Key informants included community, political, and religious leaders, traditional healers, and health workers. We asked about community beliefs and practices to understand if and how they contributed to the spread of SUDV. Interviews were recorded, translated, transcribed, and analyzed thematically. Results: Frequently-reported themes included beliefs that the community deaths, later found to be due to SVD, were the result of witchcraft or poisoning. Key informants reported that SVD patients frequently first consulted traditional healers or spiritual leaders before seeking formal healthcare, and noted that traditional healers treated patients with signs and symptoms of SVD without protective measures. Additional themes included religious leaders conducting laying-on-of-hands prayers for SVD patients and symptomatic contacts, SVD patients and their symptomatic contacts hiding in friends’ homes, and exhumation of SVD patients originally buried in safe and dignified burials, to enable traditional burials. Conclusion: Multiple community beliefs and practices likely promoted SVD outbreak spread during the 2022 outbreak in Uganda. Engaging traditional and spiritual healers early during similar outbreaks through risk communication and community engagement efforts could facilitate outbreak control. Targeted community messaging, including clear biological explanations for clusters of deaths and information on the dangers of exhuming bodies of SVD patients, could similarly facilitate improved control in future outbreaks in Uganda.

Keywords: Ebola, Sudan virus, outbreak, beliefs, traditional

Procedia PDF Downloads 55
5673 Students’ learning Effects in Physical Education between Sport Education Model with TPSR and Traditional Teaching Model with TPSR

Authors: Yi-Hsiang Pan, Chen-Hui Huang, Ching-Hsiang Chen, Wei-Ting Hsu

Abstract:

The purposes of the study were to explore the students' learning effect of physical education curriculum between merging Teaching Personal and Social Responsibility (TPSR) with sport education model and TPSR with traditional teaching model, which these learning effects included sport self-efficacy, sport enthusiastic, group cohesion, responsibility and game performance. The participants include 3 high school physical education teachers and 6 physical education classes, 133 participants with experience group 75 students and control group 58 students, and each teacher taught an experimental group and a control group for 16 weeks. The research methods used questionnaire investigation, interview, focus group meeting. The research instruments included personal and social responsibility questionnaire, sport enthusiastic scale, group cohesion scale, sport self-efficacy scale and game performance assessment instrument. Multivariate Analysis of covariance and Repeated measure ANOVA were used to test difference of students' learning effects between merging TPSR with sport education model and TPSR with traditional teaching model. The findings of research were: 1) The sport education model with TPSR could improve students' learning effects, including sport self-efficacy, game performance, sport enthusiastic, group cohesion and responsibility. 2) The traditional teaching model with TPSR could improve students' learning effect, including sport self-efficacy, responsibility and game performance. 3) the sport education model with TPSR could improve more learning effects than traditional teaching model with TPSR, including sport self-efficacy, sport enthusiastic,responsibility and game performance. 4) Based on qualitative data about learning experience of teachers and students, sport education model with TPSR significant improve learning motivation, group interaction and game sense. The conclusions indicated sport education model with TPSR could improve more learning effects in physical education curriculum. On other hand, the curricular projects of hybrid TPSR-Sport Education model and TPSR-Traditional Teaching model are both good curricular projects of moral character education, which may be applied in school physical education.

Keywords: character education, sport season, game performance, sport competence

Procedia PDF Downloads 452
5672 A Study on the Impacts of Computer Aided Design on the Architectural Design Process

Authors: Halleh Nejadriahi, Kamyar Arab

Abstract:

Computer-aided design (CAD) tools have been extensively used by the architects for the several decades. It has evolved from being a simple drafting tool to being an intelligent architectural software and a powerful means of communication for architects. CAD plays an essential role in the profession of architecture and is a basic tool for any architectural firm. It is not possible for an architectural firm to compete without taking the advantage of computer software, due to the high demand and competition in the architectural industry. The aim of this study is to evaluate the impacts of CAD on the architectural design process from conceptual level to final product, particularly in architectural practice. It examines the range of benefits of integrating CAD into the industry and discusses the possible defects limiting the architects. Method of this study is qualitatively based on data collected from the professionals’ perspective. The identified benefits and limitations of CAD on the architectural design process will raise the awareness of professionals on the potentials of CAD and proper utilization of that in the industry, which would result in a higher productivity along with a better quality in the architectural offices.

Keywords: architecture, architectural practice, computer aided design (CAD), design process

Procedia PDF Downloads 360
5671 Traffic Light Detection Using Image Segmentation

Authors: Vaishnavi Shivde, Shrishti Sinha, Trapti Mishra

Abstract:

Traffic light detection from a moving vehicle is an important technology both for driver safety assistance functions as well as for autonomous driving in the city. This paper proposed a deep-learning-based traffic light recognition method that consists of a pixel-wise image segmentation technique and a fully convolutional network i.e., UNET architecture. This paper has used a method for detecting the position and recognizing the state of the traffic lights in video sequences is presented and evaluated using Traffic Light Dataset which contains masked traffic light image data. The first stage is the detection, which is accomplished through image processing (image segmentation) techniques such as image cropping, color transformation, segmentation of possible traffic lights. The second stage is the recognition, which means identifying the color of the traffic light or knowing the state of traffic light which is achieved by using a Convolutional Neural Network (UNET architecture).

Keywords: traffic light detection, image segmentation, machine learning, classification, convolutional neural networks

Procedia PDF Downloads 173
5670 Android Graphics System: Study of Dual-Software VSync Synchronization Architecture and Optimization

Authors: Prafulla Kumar Choubey, Krishna Kishor Jha, S. B. Vaisakh Punnekkattu Chirayil

Abstract:

In Graphics-display subsystem, frame buffers are shared between producer i.e. content rendering and consumer i.e. display. If a common buffer is operated by both producer and consumer simultaneously, their processing rates mismatch can cause tearing effect in displayed content. Therefore, Android OS employs triple buffered system, taking in to account an additional composition stage. Three stages-rendering, composition and display refresh, operate synchronously on three different buffers, which is achieved by using vsync pulses. This synchronization, however, brings in to the pipeline an additional latency of up to 26ms. The present study details about the existing synchronization mechanism of android graphics-display pipeline and discusses a new adaptive architecture which reduces the wait time to 5ms-16ms in all the use-cases. The proposed method uses two adaptive software vsyncs (PLL) for achieving the same result.

Keywords: Android graphics system, vertical synchronization, atrace, adaptive system

Procedia PDF Downloads 314
5669 Lime Based Products as a Maintainable Option for Repair And Restoration of Historic Buildings in India

Authors: Adedayo Jeremiah Adeyekun, Samuel Oluwagbemiga Ishola

Abstract:

This research aims to study the use of traditional building materials for the repair and refurbishment of historic buildings in India and to provide an authentic treatment of historical buildings that will be highly considered by taking into consideration the new standards of rehabilitating process. This can be proven to be an effective solution over modern impervious material due to its compatibility with traditional building methods and materials. For example, their elastoplastic properties allow accommodating movement due to settlement or moisture/temperature changes without cracking. The use of lime also enhances workability, water retention and bond characteristics. Lime is considered to be a natural, traditional material, but it is also sustainable and energy-efficient, with production powered by biomass and emissions up to 25% less than cementitious materials. However, there is a lack of comprehensive data on the impact of lime‐based materials on the energy efficiency and thermal properties of traditional buildings and structures. Although lime mortars, renders and plasters were largely superseded by cement-based products in the first half of the 20th century, lime has a long and proven track record dating back to ancient times. This was used by the Egyptians in 4000BC to construct the pyramids. This doesn't mean that lime is an outdated technology, nor is it difficult to be used as a material. In fact, lime has a growing place in modern construction, with increasing numbers of designers choosing to use lime-based products because of their special properties. To carry out this research, some historic buildings will be surveyed and information will be derived from the textbooks and journals related to Architectural restoration.

Keywords: lime, materials, historic, buildings, sustainability

Procedia PDF Downloads 166