Search results for: embedded logic
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1702

Search results for: embedded logic

952 A Neural Network Approach to Evaluate Supplier Efficiency in a Supply Chain

Authors: Kishore K. Pochampally

Abstract:

The success of a supply chain heavily relies on the efficiency of the suppliers involved. In this paper, we propose a neural network approach to evaluate the efficiency of a supplier, which is being considered for inclusion in a supply chain, using the available linguistic (fuzzy) data of suppliers that already exist in the supply chain. The approach is carried out in three phases, as follows: In phase one, we identify criteria for evaluation of the supplier of interest. Then, in phase two, we use performance measures of already existing suppliers to construct a neural network that gives weights (importance values) of criteria identified in phase one. Finally, in phase three, we calculate the overall rating of the supplier of interest. The following are the major findings of the research conducted for this paper: (i) linguistic (fuzzy) ratings of suppliers such as 'good', 'bad', etc., can be converted (defuzzified) to numerical ratings (1 – 10 scale) using fuzzy logic so that those ratings can be used for further quantitative analysis; (ii) it is possible to construct and train a multi-level neural network in order to determine the weights of the criteria that are used to evaluate a supplier; and (iii) Borda’s rule can be used to group the weighted ratings and calculate the overall efficiency of the supplier.

Keywords: fuzzy data, neural network, supplier, supply chain

Procedia PDF Downloads 114
951 Metareasoning Image Optimization Q-Learning

Authors: Mahasa Zahirnia

Abstract:

The purpose of this paper is to explore new and effective ways of optimizing satellite images using artificial intelligence, and the process of implementing reinforcement learning to enhance the quality of data captured within the image. In our implementation of Bellman's Reinforcement Learning equations, associated state diagrams, and multi-stage image processing, we were able to enhance image quality, detect and define objects. Reinforcement learning is the differentiator in the area of artificial intelligence, and Q-Learning relies on trial and error to achieve its goals. The reward system that is embedded in Q-Learning allows the agent to self-evaluate its performance and decide on the best possible course of action based on the current and future environment. Results show that within a simulated environment, built on the images that are commercially available, the rate of detection was 40-90%. Reinforcement learning through Q-Learning algorithm is not just desired but required design criteria for image optimization and enhancements. The proposed methods presented are a cost effective method of resolving uncertainty of the data because reinforcement learning finds ideal policies to manage the process using a smaller sample of images.

Keywords: Q-learning, image optimization, reinforcement learning, Markov decision process

Procedia PDF Downloads 216
950 Approach-Avoidance and Intrinsic-Extrinsic Motivation of Adolescent Computer Games Players

Authors: Monika Paleczna, Barbara Szmigielska

Abstract:

The period of adolescence is a time when young people are becoming more and more active and conscious users of the digital world. One of the most frequently undertaken activities by them is computer games. Young players can choose from a wide range of games, including action, adventure, strategy, and logic games. The main aim of this study is to answer the question about the motivation of teenage players. The basic question is what motivates young players to play computer games and what motivates them to play a particular game. Fifty adolescents aged 15-17 participated in the study. They completed a questionnaire in which they determined what motivates them to play, how often they play computer games, and what type of computer games they play most often. It was found that entertainment and learning English are among the most important motives. The most important specific features related to a given game are the knowledge of its previous parts and the ability to play for free. The motives chosen by the players will be described in relation to the concepts of internal and external as well as approach and avoidance motivation. An additional purpose of this study is to present data concerning preferences regarding the type of games and the amount of time they spend playing.

Keywords: computer games, motivation, game preferences, adolescence

Procedia PDF Downloads 186
949 The Design Inspired by Phra Maha Chedi of King Rama I-IV at Wat Phra Chetuphon Vimolmangklaram Rajwaramahaviharn

Authors: Taechit Cheuypoung

Abstract:

The research will focus on creating pattern designs that are inspired by the pagodas, Phra Maha Chedi of King Rama I-IV, that are located in the temple, Wat Phra Chetuphon Vimolmangklararm Rajwaramahaviharn. Different aspects of the temple were studied, including the history, architecture, significance of the temple, and techniques used to decorate the pagodas, Phra Maha Chedi of King Rama I-IV. Moreover, composition of arts and the form of pattern designs which all led to the outcome of four Thai application pattern. The four patterns combine Thai traditional design with international scheme, however, maintaining the distinctiveness of the glaze mosaic tiles of each Phra Maha Chedi. The patterns consist of rounded and notched petal flowers, leaves and vine, and various square shapes, and original colors which are updated for modernity. These elements are then grouped and combined with new techniques, resulting in pattern designs with modern aspects and simultaneously reflecting the charm and the aesthetic of Thai craftsmanship which are eternally embedded in the designs.

Keywords: Chedi, Pagoda, pattern, Wat

Procedia PDF Downloads 389
948 A Simple and Efficient Method for Accurate Measurement and Control of Power Frequency Deviation

Authors: S. J. Arif

Abstract:

In the presented technique, a simple method is given for accurate measurement and control of power frequency deviation. The sinusoidal signal for which the frequency deviation measurement is required is transformed to a low voltage level and passed through a zero crossing detector to convert it into a pulse train. Another stable square wave signal of 10 KHz is obtained using a crystal oscillator and decade dividing assemblies (DDA). These signals are combined digitally and then passed through decade counters to give a unique combination of pulses or levels, which are further encoded to make them equally suitable for both control applications and display units. The developed circuit using discrete components has a resolution of 0.5 Hz and completes measurement within 20 ms. The realized circuit is simulated and synthesized using Verilog HDL and subsequently implemented on FPGA. The results of measurement on FPGA are observed on a very high resolution logic analyzer. These results accurately match the simulation results as well as the results of same circuit implemented with discrete components. The proposed system is suitable for accurate measurement and control of power frequency deviation.

Keywords: digital encoder for frequency measurement, frequency deviation measurement, measurement and control systems, power systems

Procedia PDF Downloads 377
947 Rating and Generating Sudoku Puzzles Based on Constraint Satisfaction Problems

Authors: Bahare Fatemi, Seyed Mehran Kazemi, Nazanin Mehrasa

Abstract:

Sudoku is a logic-based combinatorial puzzle game which people in different ages enjoy playing it. The challenging and addictive nature of this game has made it a ubiquitous game. Most magazines, newspapers, puzzle books, etc. publish lots of Sudoku puzzles every day. These puzzles often come in different levels of difficulty so that all people, from beginner to expert, can play the game and enjoy it. Generating puzzles with different levels of difficulty is a major concern of Sudoku designers. There are several works in the literature which propose ways of generating puzzles having a desirable level of difficulty. In this paper, we propose a method based on constraint satisfaction problems to evaluate the difficulty of the Sudoku puzzles. Then, we propose a hill climbing method to generate puzzles with different levels of difficulty. Whereas other methods are usually capable of generating puzzles with only few number of difficulty levels, our method can be used to generate puzzles with arbitrary number of different difficulty levels. We test our method by generating puzzles with different levels of difficulty and having a group of 15 people solve all the puzzles and recording the time they spend for each puzzle.

Keywords: constraint satisfaction problem, generating Sudoku puzzles, hill climbing

Procedia PDF Downloads 402
946 Embedded Hw-Sw Reconfigurable Techniques For Wireless Sensor Network Applications

Authors: B. Kirubakaran, C. Rajasekaran

Abstract:

Reconfigurable techniques are used in many engineering and industrial applications for the efficient data transmissions through the wireless sensor networks. Nowadays most of the industrial applications are work for try to minimize the size and cost. During runtime the reconfigurable technique avoid the unwanted hang and delay in the system performance. In recent world Field Programmable Gate Array (FPGA) as one of the most efficient reconfigurable device and widely used for most of the hardware and software reconfiguration applications. In this paper, the work deals with whatever going to make changes in the hardware and software during runtime it’s should not affect the current running process that’s the main objective of the paper our changes be done in a parallel manner at the same time concentrating the cost and power transmission problems during data trans-receiving. Analog sensor (Temperature) as an input for the controller (PIC) through that control the FPGA digital sensors in generalized manner.

Keywords: field programmable gate array, peripheral interrupt controller, runtime reconfigurable techniques, wireless sensor networks

Procedia PDF Downloads 409
945 Development of a Computer Vision System for the Blind and Visually Impaired Person

Authors: Rodrigo C. Belleza, Jr., Roselyn A. Maaño, Karl Patrick E. Camota, Darwin Kim Q. Bulawan

Abstract:

Eyes are an essential and conspicuous organ of the human body. Human eyes are outward and inward portals of the body that allows to see the outside world and provides glimpses into ones inner thoughts and feelings. Inevitable blindness and visual impairments may result from eye-related disease, trauma, or congenital or degenerative conditions that cannot be corrected by conventional means. The study emphasizes innovative tools that will serve as an aid to the blind and visually impaired (VI) individuals. The researchers fabricated a prototype that utilizes the Microsoft Kinect for Windows and Arduino microcontroller board. The prototype facilitates advanced gesture recognition, voice recognition, obstacle detection and indoor environment navigation. Open Computer Vision (OpenCV) performs image analysis, and gesture tracking to transform Kinect data to the desired output. A computer vision technology device provides greater accessibility for those with vision impairments.

Keywords: algorithms, blind, computer vision, embedded systems, image analysis

Procedia PDF Downloads 319
944 GSM Based Smart Patient Monitoring System

Authors: Ayman M. Mansour

Abstract:

In this paper, we propose an intelligent system that is used for monitoring the health conditions of Patients. Monitoring the health condition of Patients is a complex problem that involves different medical units and requires continuous monitoring especially in rural areas because of inadequate number of available specialized physicians. The proposed system will Improve patient care and drive costs down comparing to the existing system in Jordan. The proposed system will be the start point to Faster and improve the communication between different units in the health system in Jordan. Connecting patients and their physicians beyond hospital doors regarding their geographical area is an important issue in developing the health system in Jordan. The propose system will provide an intelligent system that will generate initial diagnosing to the patient case. This will assist and advice clinicians at the point of care. The decision is based on demographic data and laboratory test results of patient data. Using such system with the ability of making medical decisions, the quality of medical care in Jordan and specifically in Tafial is expected to be improved. This will provide more accurate, effective, and reliable diagnoses and treatments especially if the physicians have insufficient knowledge.

Keywords: GSM, SMS, patient, monitoring system, fuzzy logic, multi-agent system

Procedia PDF Downloads 568
943 Design and Development of a Platform for Analyzing Spatio-Temporal Data from Wireless Sensor Networks

Authors: Walid Fantazi

Abstract:

The development of sensor technology (such as microelectromechanical systems (MEMS), wireless communications, embedded systems, distributed processing and wireless sensor applications) has contributed to a broad range of WSN applications which are capable of collecting a large amount of spatiotemporal data in real time. These systems require real-time data processing to manage storage in real time and query the data they process. In order to cover these needs, we propose in this paper a Snapshot spatiotemporal data model based on object-oriented concepts. This model allows saving storing and reducing data redundancy which makes it easier to execute spatiotemporal queries and save analyzes time. Further, to ensure the robustness of the system as well as the elimination of congestion from the main access memory we propose a spatiotemporal indexing technique in RAM called Captree *. As a result, we offer an RIA (Rich Internet Application) -based SOA application architecture which allows the remote monitoring and control.

Keywords: WSN, indexing data, SOA, RIA, geographic information system

Procedia PDF Downloads 256
942 Machine Learning Invariants to Detect Anomalies in Secure Water Treatment

Authors: Jonathan Heng, Yoong Cheah Huei

Abstract:

A strategic model that does not trigger any false alarms to detect anomalies in Secure Water Treatment (SWaT) test bed is presented. This model uses machine learning invariants formulated from streamlining the general form of Auto-Regressive models with eXogenous input. A creative generalized CUSUM algorithm to integrate the invariants and the detection strategy technique is successfully developed and tested in the SWaT Programmable Logic Controllers (PLCs). Three steps to fine-tune parameters, b and τ in the generalized algorithm are stated and an example used to demonstrate the tuning process is discussed. This approach can swiftly and effectively detect various scopes of cyber-attacks such as multiple points single stage and multiple points multiple stages in SWaT. This technique can be applied in water treatment plants and other cyber physical systems like power and gas plants too.

Keywords: machine learning invariants, generalized CUSUM algorithm with invariants and detection strategy, scope of cyber attacks, strategic model, tuning parameters

Procedia PDF Downloads 181
941 Ceramide-PLGA Nanoparticle Formation to Apply to Atopic Dermatitis

Authors: Sang-Myung Jung, Gwang Heum Yoon, Hoo Chul Lee, Hwa Sung Shin

Abstract:

Ceramide, a component of stratum corneum at epidermis, helps to construct a rigid and dense skin barrier to prevent pathogens that cause atopic dermatitis. However, ceramide was too hydrophobic to be directly absorbed into stratum corneum and has risks of side effects by excessive treatment. To overcome the obstacles, ceramide was embedded into PLGA nanoparticles coated with chitosan. PLGA and chitosan have been known as biocompatible materials. PLGA was squeezed when faced with water and pumped ceramide out of PLGA nanoparticle. In addition, the chitosan coating layer helped initial adherence of nanoparticles to skin and regulate ceramide release until removed. This coating was degraded at weakly acid state like skin surface, finally ceramide release could be controlled. Finally, the nanoparticle was demonstrated to be non-cytotoxic and regenerate stratum corneum of atopic dermatitis model. Overall the nanoparticle is suggested as a novel and effective nanodrug to apply atopic dermatitis.

Keywords: nanoparticle, controlled release, atopic dermatitis, chitosan coating, ceramide

Procedia PDF Downloads 395
940 System Security Impact on the Dynamic Characteristics of Measurement Sensors in Smart Grids

Authors: Yiyang Su, Jörg Neumann, Jan Wetzlich, Florian Thiel

Abstract:

Smart grid is a term used to describe the next generation power grid. New challenges such as integration of renewable and decentralized energy sources, the requirement for continuous grid estimation and optimization, as well as the use of two-way flows of energy have been brought to the power gird. In order to achieve efficient, reliable, sustainable, as well as secure delivery of electric power more and more information and communication technologies are used for the monitoring and the control of power grids. Consequently, the need for cybersecurity is dramatically increased and has converged into several standards which will be presented here. These standards for the smart grid must be designed to satisfy both performance and reliability requirements. An in depth investigation of the effect of retrospectively embedded security in existing grids on it’s dynamic behavior is required. Therefore, a retrofitting plan for existing meters is offered, and it’s performance in a test low voltage microgrid is investigated. As a result of this, integration of security measures into measurement architectures of smart grids at the design phase is strongly recommended.

Keywords: cyber security, performance, protocols, security standards, smart grid

Procedia PDF Downloads 325
939 The Univalence Principle: Equivalent Mathematical Structures Are Indistinguishable

Authors: Michael Shulman, Paige North, Benedikt Ahrens, Dmitris Tsementzis

Abstract:

The Univalence Principle is the statement that equivalent mathematical structures are indistinguishable. We prove a general version of this principle that applies to all set-based, categorical, and higher-categorical structures defined in a non-algebraic and space-based style, as well as models of higher-order theories such as topological spaces. In particular, we formulate a general definition of indiscernibility for objects of any such structure, and a corresponding univalence condition that generalizes Rezk’s completeness condition for Segal spaces and ensures that all equivalences of structures are levelwise equivalences. Our work builds on Makkai’s First-Order Logic with Dependent Sorts, but is expressed in Voevodsky’s Univalent Foundations (UF), extending previous work on the Structure Identity Principle and univalent categories in UF. This enables indistinguishability to be expressed simply as identification, and yields a formal theory that is interpretable in classical homotopy theory, but also in other higher topos models. It follows that Univalent Foundations is a fully equivalence-invariant foundation for higher-categorical mathematics, as intended by Voevodsky.

Keywords: category theory, higher structures, inverse category, univalence

Procedia PDF Downloads 153
938 Predicting Machine-Down of Woodworking Industrial Machines

Authors: Matteo Calabrese, Martin Cimmino, Dimos Kapetis, Martina Manfrin, Donato Concilio, Giuseppe Toscano, Giovanni Ciandrini, Giancarlo Paccapeli, Gianluca Giarratana, Marco Siciliano, Andrea Forlani, Alberto Carrotta

Abstract:

In this paper we describe a machine learning methodology for Predictive Maintenance (PdM) applied on woodworking industrial machines. PdM is a prominent strategy consisting of all the operational techniques and actions required to ensure machine availability and to prevent a machine-down failure. One of the challenges with PdM approach is to design and develop of an embedded smart system to enable the health status of the machine. The proposed approach allows screening simultaneously multiple connected machines, thus providing real-time monitoring that can be adopted with maintenance management. This is achieved by applying temporal feature engineering techniques and training an ensemble of classification algorithms to predict Remaining Useful Lifetime of woodworking machines. The effectiveness of the methodology is demonstrated by testing an independent sample of additional woodworking machines without presenting machine down event.

Keywords: predictive maintenance, machine learning, connected machines, artificial intelligence

Procedia PDF Downloads 227
937 Managing and Leading through African Philosophies at Secondary Schools in South Africa: A Case Study of King Cetshwayo District

Authors: Alan Bhekisisa Buthelezi

Abstract:

The aim of this paper is to explore African management and leadership philosophies at secondary schools in post-apartheid South Africa. The research was conducted in the King Cetshwayo district of KwaZulu-Natal province in South Africa. Apart from the literature on participative management, the paper reports on a research in which an empirical investigation based on a quantitative research paradigm was used to collect data from secondary school principals. The literature findings revealed that secondary school principals need to rethink their management and leadership philosophies in the twenty-first century. The findings of this research further reveal that ubuntu (humanness) and lekgotla (Sesotho term for “an African participatory approach to decision-making”) should be embedded in the art of school management and leadership in the South African context. The paper concludes with the submission that ongoing capacity-building workshops should be fast-tracked on matters pertaining to management and leadership.

Keywords: distributed leadership, team leadership, decentralization of power, transformational leadership

Procedia PDF Downloads 85
936 Managing and Leading Through African Philosophies at Secondary Schools in South Africa: A Case Study of King Cetshwayo District

Authors: Alan Bhekisisa Buthelezi

Abstract:

The aim of this paper is to explore African management and leadership philosophies at secondary schools in post-apartheid South Africa. The research was conducted in the King Cetshwayo district of KwaZulu-Natal province in South Africa. Apart from the literature on participative management, the paper reports on research in which an empirical investigation based on a quantitative research paradigm was used to collect data from secondary school principals. The literature findings revealed that secondary school principals need to rethink their management and leadership philosophies in the twenty-first century. The findings of this research further reveal that ubuntu (humanness) and lekgotla (Sesotho term for ‘an African participatory approach to decision-making’) should be embedded in the art of school management and leadership in the South African context. The paper concludes with the submission that ongoing capacity-building workshops should be fast-tracked on matters pertaining to management and leadership.

Keywords: transformational leadership, distributed leadership, team leadership, decentralisation of power

Procedia PDF Downloads 22
935 A Novel Meta-Heuristic Algorithm Based on Cloud Theory for Redundancy Allocation Problem under Realistic Condition

Authors: H. Mousavi, M. Sharifi, H. Pourvaziri

Abstract:

Redundancy Allocation Problem (RAP) is a well-known mathematical problem for modeling series-parallel systems. It is a combinatorial optimization problem which focuses on determining an optimal assignment of components in a system design. In this paper, to be more practical, we have considered the problem of redundancy allocation of series system with interval valued reliability of components. Therefore, during the search process, the reliabilities of the components are considered as a stochastic variable with a lower and upper bounds. In order to optimize the problem, we proposed a simulated annealing based on cloud theory (CBSAA). Also, the Monte Carlo simulation (MCS) is embedded to the CBSAA to handle the random variable components’ reliability. This novel approach has been investigated by numerical examples and the experimental results have shown that the CBSAA combining MCS is an efficient tool to solve the RAP of systems with interval-valued component reliabilities.

Keywords: redundancy allocation problem, simulated annealing, cloud theory, monte carlo simulation

Procedia PDF Downloads 413
934 Digital Encoder Based Power Frequency Deviation Measurement

Authors: Syed Javed Arif, Mohd Ayyub Khan, Saleem Anwar Khan

Abstract:

In this paper, a simple method is presented for measurement of power frequency deviations. A phase locked loop (PLL) is used to multiply the signal under test by a factor of 100. The number of pulses in this pulse train signal is counted over a stable known period, using decade driving assemblies (DDAs) and flip-flops. These signals are combined using logic gates and then passed through decade counters to give a unique combination of pulses or levels, which are further encoded. These pulses are equally suitable for both control applications and display units. The experimental circuit developed gives a resolution of 1 Hz within the measurement period of 20 ms. The proposed circuit is also simulated in Verilog Hardware Description Language (VHDL) and implemented using Field Programing Gate Arrays (FPGAs). A Mixed signal Oscilloscope (MSO) is used to observe the results of FPGA implementation. These results are compared with the results of the proposed circuit of discrete components. The proposed system is useful for frequency deviation measurement and control in power systems.

Keywords: frequency measurement, digital control, phase locked loop, encoder, Verilog HDL

Procedia PDF Downloads 178
933 The Tariffs of Water Service for Productive Users: A Model for Defining Fare Classes

Authors: M. Macchiaroli, V. Pellecchia, L. Dolores

Abstract:

The water supply for production users (craft, commercial, industrial), understood as the set of water supply and wastewater collection services becomes an increasingly felt problem in a water scarcity regime. In fact, disputes are triggered between the different social parties for the fair and efficient use of water resources. Within this aspect, the problem arises of the different pricing of services between civil users and production users. Of particular interest is the question of defining the tariff classes depending on consumption levels. If for civil users, this theme is strongly permeated by social profiles (a topic dealt with by the author in a forthcoming research contribution) connected with the inalienability of the right to have water and with the reconciliation of the needs of the weakest groups of the population, for consumers in the production sector the logic adopted by the manager may be inspired by criteria of greater corporate rationality. This work illustrates the Italian regulatory framework and shows an optimization model of tariff classes in the production sector that reconciles the public objective of sustainable use of the resource and the needs of a production system in search of recovery after the depressing effects caused by COVID-19 pandemic.

Keywords: decision making, economic evaluation, urban water management, water tariff

Procedia PDF Downloads 114
932 Massively-Parallel Bit-Serial Neural Networks for Fast Epilepsy Diagnosis: A Feasibility Study

Authors: Si Mon Kueh, Tom J. Kazmierski

Abstract:

There are about 1% of the world population suffering from the hidden disability known as epilepsy and major developing countries are not fully equipped to counter this problem. In order to reduce the inconvenience and danger of epilepsy, different methods have been researched by using a artificial neural network (ANN) classification to distinguish epileptic waveforms from normal brain waveforms. This paper outlines the aim of achieving massive ANN parallelization through a dedicated hardware using bit-serial processing. The design of this bit-serial Neural Processing Element (NPE) is presented which implements the functionality of a complete neuron using variable accuracy. The proposed design has been tested taking into consideration non-idealities of a hardware ANN. The NPE consists of a bit-serial multiplier which uses only 16 logic elements on an Altera Cyclone IV FPGA and a bit-serial ALU as well as a look-up table. Arrays of NPEs can be driven by a single controller which executes the neural processing algorithm. In conclusion, the proposed compact NPE design allows the construction of complex hardware ANNs that can be implemented in a portable equipment that suits the needs of a single epileptic patient in his or her daily activities to predict the occurrences of impending tonic conic seizures.

Keywords: Artificial Neural Networks (ANN), bit-serial neural processor, FPGA, Neural Processing Element (NPE)

Procedia PDF Downloads 324
931 Physico‑chemical Behavior and Microstructural Manipulation of Nanocomposites Containing Hydroxyapatite, Alumina, and Graphene Oxide

Authors: Reim A. Almotiri, Manal M. Alkhamisi

Abstract:

Ternary nanocomposites based on hydroxyapatite (HAP) and alumina (Al2O3) were embedded through graphene oxide (GO) nanosheets to be investigated for medical applications. The composition of the preparations has been confirmed by X-ray photoelectron spectroscopy, energy-dispersive X-ray analysis, and Fourier-Transform infrared spectroscopy. Scanning and transmission electron microscopy have shown the typical morphologies of the components of the nanocomposites with hydroxyapatite nanorods reaching an average diameter of 22.26±2 nm and an average length of 69.56±19.25 nm in the ternary nanocomposites. The ternary nanocomposite has a microhardness of 5.8±0.1 GPa and a higher average roughness of 6.5 nm compared to pure HAP preparation with an average roughness of 2.7 nm. All preparations have shown an acceptable cytotoxicity profile with a percent osteoblasts cell viability of 98.6±1.3% after culturing with the ternary nanocomposite. The TNC has also shown the highest antibacterial activity compared to preparations of each of its constituents and their nanocomposites, with a zone of inhibition’s diameter of 14.1±0.8 mm and 13.6±0.6 mm against Staphylococcus aureus and Escherichia coli, respectively, compared to no zone of inhibition for the pure hydroxyapatite preparation.

Keywords: hydroxypatite, cytotoxicity, nanocomposites, X-ray analysis

Procedia PDF Downloads 83
930 A Middle Way Approach for the Conflicts between Death, Impermanence and Non-Self in Buddhist Philosophy

Authors: Ruotian Wang

Abstract:

Since the birth of the Buddha himself more than 2000 years ago, Buddhism has continued to lead many people’s lives. Scholars and Buddhists have contributed to give detailed explanations to all kinds of issues within the structure of Buddhist philosophy to make Buddhism more complete. Different schools have developed, therefore leading to a lot of different branches within Buddhism. Although they all follow what the Buddha himself taught, they still have various explanations to even fundamental issues. As one of the fundamental problems regarding our lives, death is widely discussed in Buddhism. The controversy regarding death is its seemly incompatibility with the idea of non-self and impermanence, which is what I will discuss in this essay. The idea of rebirth is the basic structure of birth and death, which suggests a connection between this life and the next. Therefore, according to common logic, we should tell that there is something that connects each life, an agent that receives the process of rebirth, which is normally known as a soul. In Buddhism, non-self is also an important concept which speaks to the illusion of a self or soul. The idea of rebirth and non-self seems contradicted. Many different schools of Buddhism attempt to resolve such conflicts, but there are logical flaws within the arguments they made. Thus, I raise a better solution: Different from the annihilationist view, non-self in Buddhism speaks only to the illusion of a self in each moment. There is a self that exists as a sum of all our karmas which we can achieve after Nirvana. However, the nature of such a self is still emptiness. There are no agents needed as one rebirth since the whole cycle of rebirth is the self. Then, the contradiction between rebirth and non-self can be resolved.

Keywords: Buddhism, impermanence, non-self, reincarnation

Procedia PDF Downloads 123
929 NUX: A Lightweight Block Cipher for Security at Wireless Sensor Node Level

Authors: Gaurav Bansod, Swapnil Sutar, Abhijit Patil, Jagdish Patil

Abstract:

This paper proposes an ultra-lightweight cipher NUX. NUX is a generalized Feistel network. It supports 128/80 bit key length and block length of 64 bit. For 128 bit key length, NUX needs only 1022 GEs which is less as compared to all existing cipher design. NUX design results into less footprint area and minimal memory size. This paper presents security analysis of NUX cipher design which shows cipher’s resistance against basic attacks like Linear and Differential Cryptanalysis. Advanced attacks like Biclique attack is also mounted on NUX cipher design. Two different F function in NUX cipher design results in high diffusion mechanism which generates large number of active S-boxes in minimum number of rounds. NUX cipher has total 31 rounds. NUX design will be best-suited design for critical application like smart grid, IoT, wireless sensor network, where memory size, footprint area and the power dissipation are the major constraints.

Keywords: lightweight cryptography, Feistel cipher, block cipher, IoT, encryption, embedded security, ubiquitous computing

Procedia PDF Downloads 378
928 Wind Farm Power Performance Verification Using Non-Parametric Statistical Inference

Authors: M. Celeska, K. Najdenkoski, V. Dimchev, V. Stoilkov

Abstract:

Accurate determination of wind turbine performance is necessary for economic operation of a wind farm. At present, the procedure to carry out the power performance verification of wind turbines is based on a standard of the International Electrotechnical Commission (IEC). In this paper, nonparametric statistical inference is applied to designing a simple, inexpensive method of verifying the power performance of a wind turbine. A statistical test is explained, examined, and the adequacy is tested over real data. The methods use the information that is collected by the SCADA system (Supervisory Control and Data Acquisition) from the sensors embedded in the wind turbines in order to carry out the power performance verification of a wind farm. The study has used data on the monthly output of wind farm in the Republic of Macedonia, and the time measuring interval was from January 1, 2016, to December 31, 2016. At the end, it is concluded whether the power performance of a wind turbine differed significantly from what would be expected. The results of the implementation of the proposed methods showed that the power performance of the specific wind farm under assessment was acceptable.

Keywords: canonical correlation analysis, power curve, power performance, wind energy

Procedia PDF Downloads 336
927 The Islamic Advertising Standardisation Revisited of Food Products

Authors: Nurzahidah Haji Jaapar, Anis Husna Abdul Halim, Mohd Faiz Mohamed Yusof, Mohd Dani Muhamad, Sharifah Fadylawaty Syed Abdullah

Abstract:

The growing size of Muslim is recognised with significant increasing of purchasing power in the market. The realm of trade and business has embedded religious values as the new market segments are emerging in offering food products to meet needs and demands of Muslim consumer. The emergence of new market in food industry, advertising is charged with all sort of negative effects includes promoting controversial unsafety and harmful products, wasteful spending and exploiting women and kids. Therefore, this research attempts to examine between previous examinations of advertising standardisation in ancient era and current practices in the market. This paper is based on content analysis of the literature. The results show that there are a bridge gap between the implementation of practices as the advent in industrial 4.0 in using digital advertising by food industry. Thus, this paper is able to recognize the differences between two era and significant in determining the best practices in advertising by following Islamic principles.

Keywords: Islamic advertising, unethical advertising, ethical advertising, Islamic principles

Procedia PDF Downloads 151
926 Identifying the Factors affecting on the Success of Energy Usage Saving in Municipality of Tehran

Authors: Rojin Bana Derakhshan, Abbas Toloie

Abstract:

For the purpose of optimizing and developing energy efficiency in building, it is required to recognize key elements of success in optimization of energy consumption before performing any actions. Surveying Principal Components is one of the most valuable result of Linear Algebra because the simple and non-parametric methods are become confusing. So that energy management system implemented according to energy management system international standard ISO50001:2011 and all energy parameters in building to be measured through performing energy auditing. In this essay by simulating used of data mining, the key impressive elements on energy saving in buildings to be determined. This approach is based on data mining statistical techniques using feature selection method and fuzzy logic and convert data from massive to compressed type and used to increase the selected feature. On the other side, influence portion and amount of each energy consumption elements in energy dissipation in percent are recognized as separated norm while using obtained results from energy auditing and after measurement of all energy consuming parameters and identified variables. Accordingly, energy saving solution divided into 3 categories, low, medium and high expense solutions.

Keywords: energy saving, key elements of success, optimization of energy consumption, data mining

Procedia PDF Downloads 471
925 RFID Laptop Monitoring and Management System

Authors: Francis E. Idachaba, Sarah Uyimeh Tommy

Abstract:

This paper describes the design of an RFID laptop monitoring and management system. Laptops embedded with RFID chips are monitored and tracked to provide a monitoring system for the purpose of tracking as well as monitoring movement of the laptops in and out of a building. The proposed system is implemented with both hardware and software components. The hardware architecture consists of RFID passive tag, RFID module (reader), and a server hosting the application and database. The RFID readers are distributed at major exits of a building or premises. The tags are programmed with owner laptop details are concealed in the laptops. The software architecture consists of application software that has the APIs (Applications Programming Interface) necessary to interface the RFID system with the PC, to achieve automated laptop monitoring system. A friendly graphic user interface (GUI) and a database that saves all readings and owners details. The system is capable of reducing laptop theft especially in students’ hostels as laptops can be monitored as they are taken either in or out of the building.

Keywords: asset tracking, GUI, laptop monitoring, radio frequency identification, passive tags

Procedia PDF Downloads 390
924 Norm Evolution through Contestation: Role of Legality from Humanitarian Intervention to Responsibility to Protect

Authors: Nazlı Üstünes Demirhan

Abstract:

International norms are subject to pressures of change through contestation during the course of their lifetimes. The nature of the contestation is one of the factors that are likely to have a determinative role in the direction of this change towards a stronger or weaker norm. This paper aims to understand the relation between the legality of contestation and the direction of change in norm strength. Based on a multidimensional norm strength conceptualization, it is hypothesized that use of legal logic and rhetoric of argumentation would have a positive influence for norm strength, whereas non-legal nature of contestation would lack this and weaken the norm. In order to show this, the evolution of the human protection norm between 1999 and 2018 will be examined with reference to two major contestation periods; Kosovo intervention of 1999, which led to the development of R2P doctrine, and Libya intervention of 2011, which is followed by the demise of the norm. The comparative analysis will be conducted through process tracing method with a document analysis on the Security Council meeting minutes, resolutions, and press releases. This study aims to contribute to the norm contestation literature with the introduction of legal process analysis. It also relates to further questions in IR/IL nexus, relating to the value added of norm legality as well as the politics of legalization.

Keywords: humanitarian intervention, legality, norm contestation, norm dynamics, norm strength, responsibility to protect

Procedia PDF Downloads 160
923 The Mediatization of Political Communication in Sub-Saharan Africa: The Cases of Cameroon and Ghana in a Comparative Perspective

Authors: Christian Nounkeu Tatchou

Abstract:

The concept of mediatization of politics describes changes with regards to media and politics, as the political sphere is increasingly shaped by the media and conforms to its logic. The mediatization of politics in established democracies of the West has been the object of several researches. However, there is an overwhelming paucity of literature on this reconfiguration of the political life around the media in the emerging democracies of the Sub-Saharan Africa. A majority of Sub-Saharan countries have been progressively experiencing the modernization of their societies and significant developments with respect to political communication since the early 1990s. This has been facilitated by factors such as the adoption of democratic reforms, the development of mass media, the advent of social media and the rapid spread of new information and communication technologies. Thus, this paper investigates the extent to which political communication in Sub-Saharan Africa is mediatized, especially with regards to the social media. Through in-depths interviews with twenty political leaders and political observers in Cameroon and Ghana, this article argues that the social media has become the main arena of voters’ mobilization and political participation in Sub-Saharan Africa. However, a greater extent of freedom for political activism on social media is observed in the new democracy of Ghana, unlike in the enduring authoritarian political system of Cameroon where the government attempts to control the use and content of political discourse on social media.

Keywords: mediatization, political communication, social media, sub-saharan africa

Procedia PDF Downloads 354