Search results for: traditional techniques
10416 Predictive Analysis of the Stock Price Market Trends with Deep Learning
Authors: Suraj Mehrotra
Abstract:
The stock market is a volatile, bustling marketplace that is a cornerstone of economics. It defines whether companies are successful or in spiral. A thorough understanding of it is important - many companies have whole divisions dedicated to analysis of both their stock and of rivaling companies. Linking the world of finance and artificial intelligence (AI), especially the stock market, has been a relatively recent development. Predicting how stocks will do considering all external factors and previous data has always been a human task. With the help of AI, however, machine learning models can help us make more complete predictions in financial trends. Taking a look at the stock market specifically, predicting the open, closing, high, and low prices for the next day is very hard to do. Machine learning makes this task a lot easier. A model that builds upon itself that takes in external factors as weights can predict trends far into the future. When used effectively, new doors can be opened up in the business and finance world, and companies can make better and more complete decisions. This paper explores the various techniques used in the prediction of stock prices, from traditional statistical methods to deep learning and neural networks based approaches, among other methods. It provides a detailed analysis of the techniques and also explores the challenges in predictive analysis. For the accuracy of the testing set, taking a look at four different models - linear regression, neural network, decision tree, and naïve Bayes - on the different stocks, Apple, Google, Tesla, Amazon, United Healthcare, Exxon Mobil, J.P. Morgan & Chase, and Johnson & Johnson, the naïve Bayes model and linear regression models worked best. For the testing set, the naïve Bayes model had the highest accuracy along with the linear regression model, followed by the neural network model and then the decision tree model. The training set had similar results except for the fact that the decision tree model was perfect with complete accuracy in its predictions, which makes sense. This means that the decision tree model likely overfitted the training set when used for the testing set.Keywords: machine learning, testing set, artificial intelligence, stock analysis
Procedia PDF Downloads 9710415 Optimization and Simulation Models Applied in Engineering Planning and Management
Authors: Abiodun Ladanu Ajala, Wuyi Oke
Abstract:
Mathematical simulation and optimization models packaged within interactive computer programs provide a common way for planners and managers to predict the behaviour of any proposed water resources system design or management policy before it is implemented. Modeling presents a principal technique of predicting the behaviour of the proposed infrastructural designs or management policies. Models can be developed and used to help identify specific alternative plans that best meet those objectives. This study discusses various types of models, their development, architecture, data requirements, and applications in the field of engineering. It also outlines the advantages and limitations of each the optimization and simulation models presented. The techniques explored in this review include; dynamic programming, linear programming, fuzzy optimization, evolutionary algorithms and finally artificial intelligence techniques. Previous studies carried out using some of the techniques mentioned above were reviewed, and most of the results from different researches showed that indeed optimization and simulation provides viable alternatives and predictions which form a basis for decision making in building engineering structures and also in engineering planning and management.Keywords: linear programming, mutation, optimization, simulation
Procedia PDF Downloads 59210414 Anomaly Detection with ANN and SVM for Telemedicine Networks
Authors: Edward Guillén, Jeisson Sánchez, Carlos Omar Ramos
Abstract:
In recent years, a wide variety of applications are developed with Support Vector Machines -SVM- methods and Artificial Neural Networks -ANN-. In general, these methods depend on intrusion knowledge databases such as KDD99, ISCX, and CAIDA among others. New classes of detectors are generated by machine learning techniques, trained and tested over network databases. Thereafter, detectors are employed to detect anomalies in network communication scenarios according to user’s connections behavior. The first detector based on training dataset is deployed in different real-world networks with mobile and non-mobile devices to analyze the performance and accuracy over static detection. The vulnerabilities are based on previous work in telemedicine apps that were developed on the research group. This paper presents the differences on detections results between some network scenarios by applying traditional detectors deployed with artificial neural networks and support vector machines.Keywords: anomaly detection, back-propagation neural networks, network intrusion detection systems, support vector machines
Procedia PDF Downloads 35910413 Advanced Data Visualization Techniques for Effective Decision-making in Oil and Gas Exploration and Production
Authors: Deepak Singh, Rail Kuliev
Abstract:
This research article explores the significance of advanced data visualization techniques in enhancing decision-making processes within the oil and gas exploration and production domain. With the oil and gas industry facing numerous challenges, effective interpretation and analysis of vast and diverse datasets are crucial for optimizing exploration strategies, production operations, and risk assessment. The article highlights the importance of data visualization in managing big data, aiding the decision-making process, and facilitating communication with stakeholders. Various advanced data visualization techniques, including 3D visualization, augmented reality (AR), virtual reality (VR), interactive dashboards, and geospatial visualization, are discussed in detail, showcasing their applications and benefits in the oil and gas sector. The article presents case studies demonstrating the successful use of these techniques in optimizing well placement, real-time operations monitoring, and virtual reality training. Additionally, the article addresses the challenges of data integration and scalability, emphasizing the need for future developments in AI-driven visualization. In conclusion, this research emphasizes the immense potential of advanced data visualization in revolutionizing decision-making processes, fostering data-driven strategies, and promoting sustainable growth and improved operational efficiency within the oil and gas exploration and production industry.Keywords: augmented reality (AR), virtual reality (VR), interactive dashboards, real-time operations monitoring
Procedia PDF Downloads 8810412 Perceived Teaching Effectiveness in Online Versus Classroom Contexts
Authors: Shona Tritt, William Cunningham
Abstract:
Our study examines whether teaching effectiveness is perceived differently in online versus traditional classroom contexts. To do so, we analyzed teaching evaluations from courses that were offered as web options and as in-person classes simultaneously at the University of [removed for blinding] (N=87). Although teaching evaluations were on average lower for larger classes, we found that learning context (traditional versus online) moderated this effect. Specifically, we found a crossover effect such that in relatively smaller classes, teaching was perceived to be more effective in-person versus online, whereas, in relatively larger classes, teaching was perceived to be more effective when engaged online versus in-person.Keywords: teaching evaluations, teaching effectiveness, e-learning, web-option
Procedia PDF Downloads 15010411 Smart Contracts: Bridging the Divide Between Code and Law
Authors: Abeeb Abiodun Bakare
Abstract:
The advent of blockchain technology has birthed a revolutionary innovation: smart contracts. These self-executing contracts, encoded within the immutable ledger of a blockchain, hold the potential to transform the landscape of traditional contractual agreements. This research paper embarks on a comprehensive exploration of the legal implications surrounding smart contracts, delving into their enforceability and their profound impact on traditional contract law. The first section of this paper delves into the foundational principles of smart contracts, elucidating their underlying mechanisms and technological intricacies. By harnessing the power of blockchain technology, smart contracts automate the execution of contractual terms, eliminating the need for intermediaries and enhancing efficiency in commercial transactions. However, this technological marvel raises fundamental questions regarding legal enforceability and compliance with traditional legal frameworks. Moving beyond the realm of technology, the paper proceeds to analyze the legal validity of smart contracts within the context of traditional contract law. Drawing upon established legal principles, such as offer, acceptance, and consideration, we examine the extent to which smart contracts satisfy the requirements for forming a legally binding agreement. Furthermore, we explore the challenges posed by jurisdictional issues as smart contracts transcend physical boundaries and operate within a decentralized network. Central to this analysis is the examination of the role of arbitration and dispute resolution mechanisms in the context of smart contracts. While smart contracts offer unparalleled efficiency and transparency in executing contractual terms, disputes inevitably arise, necessitating mechanisms for resolution. We investigate the feasibility of integrating arbitration clauses within smart contracts, exploring the potential for decentralized arbitration platforms to streamline dispute resolution processes. Moreover, this paper explores the implications of smart contracts for traditional legal intermediaries, such as lawyers and judges. As smart contracts automate the execution of contractual terms, the role of legal professionals in contract drafting and interpretation may undergo significant transformation. We assess the implications of this paradigm shift for legal practice and the broader legal profession. In conclusion, this research paper provides a comprehensive analysis of the legal implications surrounding smart contracts, illuminating the intricate interplay between code and law. While smart contracts offer unprecedented efficiency and transparency in commercial transactions, their legal validity remains subject to scrutiny within traditional legal frameworks. By navigating the complex landscape of smart contract law, we aim to provide insights into the transformative potential of this groundbreaking technology.Keywords: smart-contracts, law, blockchain, legal, technology
Procedia PDF Downloads 4910410 A Comparison between Different Segmentation Techniques Used in Medical Imaging
Authors: Ibtihal D. Mustafa, Mawia A. Hassan
Abstract:
Tumor segmentation from MRI image is important part of medical images experts. This is particularly a challenging task because of the high assorting appearance of tumor tissue among different patients. MRI images are advance of medical imaging because it is give richer information about human soft tissue. There are different segmentation techniques to detect MRI brain tumor. In this paper, different procedure segmentation methods are used to segment brain tumors and compare the result of segmentations by using correlation and structural similarity index (SSIM) to analysis and see the best technique that could be applied to MRI image.Keywords: MRI, segmentation, correlation, structural similarity
Procedia PDF Downloads 41110409 A Review of Machine Learning for Big Data
Authors: Devatha Kalyan Kumar, Aravindraj D., Sadathulla A.
Abstract:
Big data are now rapidly expanding in all engineering and science and many other domains. The potential of large or massive data is undoubtedly significant, make sense to require new ways of thinking and learning techniques to address the various big data challenges. Machine learning is continuously unleashing its power in a wide range of applications. In this paper, the latest advances and advancements in the researches on machine learning for big data processing. First, the machine learning techniques methods in recent studies, such as deep learning, representation learning, transfer learning, active learning and distributed and parallel learning. Then focus on the challenges and possible solutions of machine learning for big data.Keywords: active learning, big data, deep learning, machine learning
Procedia PDF Downloads 44710408 Human Immunodeficiency Virus (HIV) Test Predictive Modeling and Identify Determinants of HIV Testing for People with Age above Fourteen Years in Ethiopia Using Data Mining Techniques: EDHS 2011
Authors: S. Abera, T. Gidey, W. Terefe
Abstract:
Introduction: Testing for HIV is the key entry point to HIV prevention, treatment, and care and support services. Hence, predictive data mining techniques can greatly benefit to analyze and discover new patterns from huge datasets like that of EDHS 2011 data. Objectives: The objective of this study is to build a predictive modeling for HIV testing and identify determinants of HIV testing for adults with age above fourteen years using data mining techniques. Methods: Cross-Industry Standard Process for Data Mining (CRISP-DM) was used to predict the model for HIV testing and explore association rules between HIV testing and the selected attributes among adult Ethiopians. Decision tree, Naïve-Bayes, logistic regression and artificial neural networks of data mining techniques were used to build the predictive models. Results: The target dataset contained 30,625 study participants; of which 16, 515 (53.9%) were women. Nearly two-fifth; 17,719 (58%), have never been tested for HIV while the rest 12,906 (42%) had been tested. Ethiopians with higher wealth index, higher educational level, belonging 20 to 29 years old, having no stigmatizing attitude towards HIV positive person, urban residents, having HIV related knowledge, information about family planning on mass media and knowing a place where to get testing for HIV showed an increased patterns with respect to HIV testing. Conclusion and Recommendation: Public health interventions should consider the identified determinants to promote people to get testing for HIV.Keywords: data mining, HIV, testing, ethiopia
Procedia PDF Downloads 49910407 Anomaly Detection Based Fuzzy K-Mode Clustering for Categorical Data
Authors: Murat Yazici
Abstract:
Anomalies are irregularities found in data that do not adhere to a well-defined standard of normal behavior. The identification of outliers or anomalies in data has been a subject of study within the statistics field since the 1800s. Over time, a variety of anomaly detection techniques have been developed in several research communities. The cluster analysis can be used to detect anomalies. It is the process of associating data with clusters that are as similar as possible while dissimilar clusters are associated with each other. Many of the traditional cluster algorithms have limitations in dealing with data sets containing categorical properties. To detect anomalies in categorical data, fuzzy clustering approach can be used with its advantages. The fuzzy k-Mode (FKM) clustering algorithm, which is one of the fuzzy clustering approaches, by extension to the k-means algorithm, is reported for clustering datasets with categorical values. It is a form of clustering: each point can be associated with more than one cluster. In this paper, anomaly detection is performed on two simulated data by using the FKM cluster algorithm. As a significance of the study, the FKM cluster algorithm allows to determine anomalies with their abnormality degree in contrast to numerous anomaly detection algorithms. According to the results, the FKM cluster algorithm illustrated good performance in the anomaly detection of data, including both one anomaly and more than one anomaly.Keywords: fuzzy k-mode clustering, anomaly detection, noise, categorical data
Procedia PDF Downloads 5610406 User Modeling from the Perspective of Improvement in Search Results: A Survey of the State of the Art
Authors: Samira Karimi-Mansoub, Rahem Abri
Abstract:
Currently, users expect high quality and personalized information from search results. To satisfy user’s needs, personalized approaches to web search have been proposed. These approaches can provide the most appropriate answer for user’s needs by using user context and incorporating information about query provided by combining search technologies. To carry out personalized web search, there is a need to make different techniques on whole of user search process. There are the number of possible deployment of personalized approaches such as personalized web search, personalized recommendation, personalized summarization and filtering systems and etc. but the common feature of all approaches in various domains is that user modeling is utilized to provide personalized information from the Web. So the most important work in personalized approaches is user model mining. User modeling applications and technologies can be used in various domains depending on how the user collected information may be extracted. In addition to, the used techniques to create user model is also different in each of these applications. Since in the previous studies, there was not a complete survey in this field, our purpose is to present a survey on applications and techniques of user modeling from the viewpoint of improvement in search results by considering the existing literature and researches.Keywords: filtering systems, personalized web search, user modeling, user search behavior
Procedia PDF Downloads 28110405 Body Fat Assessment Between Inbody 770 and Skinfold Measurement Techniques in Older Males and Females
Authors: Rafael F. Escamilla, Kyle Yamashiro, Robert Asuncion, Daniel Maclean, Irwin S. Thompson, Michael McKeough
Abstract:
The purpose was to compare two body fat (BF) measurement techniques, Inbody 770 (IB770) and skinfold (SF), in healthy older (60-88 years old) males and females. Fifty healthy males (n = 25) and females (n = 25) had their BF assessed using two different measurement techniques: 1)Bioelectrical impedance Inbody 770 (IB770); and 2) Skinfold (SF). Paired t-tests (p < 0.05) were employed to assess differences between IB770 and SF for males and females, while an unpaired t-test was employed (p < 0.05) to assess differences in %BF between IB770 and SF for males compared to differences in %BF between IB770 and SF for females. In older males, the mean (±SD) percent BF was significantly less (p < 0.001) in SF (19.8% ± 4.1%) compared to IB770 (25.3% ± 6.4%). Similarly, in older females, the mean (±SD) percent BF was significantly less (p < 0.001) in SF (26.1% ± 4.0%) compared to IB770 (35.7% ± 5.5%). The difference in %BF between IB770 and SF was significantly greater (p < 0.001) in females (9.5%±3.9%) compared to men (5.5%±3.7%). While both IB770 and SF can easily and quickly assess %BF in clinical settings, %BF was underestimated using SF in both older males and older females. These findings help identify older males and females who may be at risk of cardiometabolic disease secondary to having excessive %BF.Keywords: percent body fat, chronic diseases, cardiometabolic disease, Geriatrics
Procedia PDF Downloads 510404 Development of Polymeric Fluorescence Sensor for the Determination of Bisphenol-A
Authors: Neşe Taşci, Soner Çubuk, Ece Kök Yetimoğlu, M. Vezir Kahraman
Abstract:
Bisphenol-A (BPA), 2,2-bis(4-hydroxyphenly)propane, is one of the highest usage volume chemicals in the world. Studies showed that BPA maybe has negative effects on the central nervous system, immune and endocrine systems. Several of analytical methods for the analysis of BPA have been reported including electrochemical processes, chemical oxidation, ozonization, spectrophotometric, chromatographic techniques. Compared with other conventional analytical techniques, optic sensors are reliable, providing quick results, low cost, easy to use, stands out as a much more advantageous method because of the high precision and sensitivity. In this work, a new photocured polymeric fluorescence sensor was prepared and characterized for Bisphenol-A (BPA) analysis. Characterization of the membrane was carried out by Attenuated Total Reflectance Fourier Transform Infrared Spectroscopy (ATR-FTIR) and Scanning Electron Microscope (SEM) techniques. The response characteristics of the sensor including dynamic range, pH effect and response time were systematically investigated. Acknowledgment: This work was supported by the Scientific and Technological Research Council of Turkey (TUBITAK) under Grant 115Y469.Keywords: bisphenol-a, fluorescence, photopolymerization, polymeric sensor
Procedia PDF Downloads 23710403 In Vitro and in Vivo Biological Investigations of Philodendron Bipinnatifidum Schott Ex Endl (Araceae) and Its Bioactive Phenolic Constituents
Authors: Alia Ragheb
Abstract:
Philodendron species were reported in traditional medicine for the treatment of several diseases. From the 70% methanol extract of the aerial parts of Philodendron bipinnatifidum Schott ex Endl, nine flavonoid compounds were isolated and identified for the first time; saponarin, genkwanin 8-C-(2′′-O-β-glucopyranosyl)-β-glucopyranoside, apigenin 6-C-(2′′-O-β-glucopyranosyl)-β-glucopyranoside, schaftoside, swertisin, swertiajaponin, isoswertisin, isorhamnetin 3-O-(2′′-acetyl)-β-glucopyranoside and apigenin. Characterization of the plant was achieved using chromatographic, physical, chemical, spectroscopic, and spectrometric techniques. The 70% methanol aerial parts extract and the methanol fraction of the plant were in vivo screened for their acute anti-inflammatory, antipyretic and analgesic effects where significant effects were exhibited compared to that of reference drugs. From the reported literature, these biological activities could be attributed to its phenolic constituent. The 70% methanol aerial parts and successive extracts, as well as some pure isolated flavonoid compounds, were in vitro investigated for their antioxidant, antimicrobial and cytotoxic activities.Keywords: antioxidant, araceae, cytotoxicity, flavonoids
Procedia PDF Downloads 18510402 Analysis of Space Requirements of Chinese Square-Dancing Space through Newspaper Reports
Authors: Xiaobing Liu, Bo Zhang, Xiaolong Zhao
Abstract:
The square-dancing is one of the most popular new physical activities in China in recent years, which has become a hotspot of Chinese landscape research. This paper collects 749 news reports from four authoritative newspapers in Harbin for 3 years, and probes into the space use needs of participants and non-participants of square-dancing. In this paper, the research results are compared with the contents of three related planning and design codes in China, and some modification or supplementary suggestions are proposed from three aspects, such as decision-making process, total-quantity control, and site design. Different from the traditional research, this research does not use the data from interviews and the questionnaires, but uses the traditional media report content for analyzing. To some extent, it avoids the research result being excessively subjective, enhances objectivity and the authority.Keywords: China, landscape, space design, square-dancing
Procedia PDF Downloads 26810401 Improving Cost and Time Control of Construction Projects Management Practices in Nigeria
Authors: Mustapha Yakubu, Ahmed Usman, Hashim Ambursa
Abstract:
This paper presents the findings of a research which sought to investigate techniques used to improve cost and time control of construction projects management practice in Nigeria. However, there is limited research on issues surrounding the practical usage of these techniques. Data were collected through a questionnaire distributed to construction experts through a survey conducted on the 100 construction organisations and 50 construction consultancy firms in the Nigeria aimed at identifying common project cost and time control practices and factors inhibiting effective project control in practice. The study reveals that despite the vast application of control techniques a high proportion of respondents still experienced cost and time overruns on a significant proportion of their projects. Analysis of the survey results concluded that more effort should be geared at the management of the identified top project control inhibiting factors. This paper has outlined some measures for mitigating these inhibiting factors so that the outcome of project time and cost control can be improved in practice.Keywords: construction project, cost control, Nigeria, time control
Procedia PDF Downloads 31510400 Effect of Hybrid Learning in Higher Education
Authors: A. Meydanlioglu, F. Arikan
Abstract:
In recent years, thanks to the development of information and communication technologies, the computer and internet have been used widely in higher education. Internet-based education is impacting traditional higher education as online components increasingly become integrated into face-to-face (FTF) courses. The goal of combined internet-based and traditional education is to take full advantage of the benefits of each platform in order to provide an educational opportunity that can promote student learning better than can either platform alone. Research results show that the use of hybrid learning is more effective than online or FTF models in higher education. Due to the potential benefits, an increasing number of institutions are interested in developing hybrid courses, programs, and degrees. Future research should evaluate the effectiveness of hybrid learning. This paper is designed to determine the impact of hybrid learning on higher education.Keywords: e-learning, higher education, hybrid learning, online education
Procedia PDF Downloads 91110399 Passenger Preferences on Airline Check-In Methods: Traditional Counter Check-In Versus Common-Use Self-Service Kiosk
Authors: Cruz Queen Allysa Rose, Bautista Joymeeh Anne, Lantoria Kaye, Barretto Katya Louise
Abstract:
The study presents the preferences of passengers on the quality of service provided by the two airline check-in methods currently present in airports-traditional counter check-in and common-use self-service kiosks. Since a study has shown that airlines perceive self-service kiosks alone are sufficient enough to ensure adequate services and customer satisfaction, and in contrast, agents and passengers stated that it alone is not enough and that human interaction is essential. In reference with former studies that established opposing ideas about the choice of the more favorable airline check-in method to employ, it is the purpose of this study to present a recommendation that shall somehow fill-in the gap between the conflicting ideas by means of comparing the perceived quality of service through the RATER model. Furthermore, this study discusses the major competencies present in each method which are supported by the theories–FIRO Theory of Needs upholding the importance of inclusion, control and affection, and the Queueing Theory which points out the discipline of passengers and the length of the queue line as important factors affecting quality service. The findings of the study were based on the data gathered by the researchers from selected Thomasian third year and fourth year college students currently enrolled in the first semester of the academic year 2014-2015, who have already experienced both airline check-in methods through the implication of a stratified probability sampling. The statistical treatments applied in order to interpret the data were mean, frequency, standard deviation, t-test, logistic regression and chi-square test. The final point of the study revealed that there is a greater effect in passenger preference concerning the satisfaction experienced in common-use self-service kiosks in comparison with the application of the traditional counter check-in.Keywords: traditional counter check-in, common-use self-service Kiosks, airline check-in methods
Procedia PDF Downloads 40910398 Movement Optimization of Robotic Arm Movement Using Soft Computing
Authors: V. K. Banga
Abstract:
Robots are now playing a very promising role in industries. Robots are commonly used in applications in repeated operations or where operation by human is either risky or not feasible. In most of the industrial applications, robotic arm manipulators are widely used. Robotic arm manipulator with two link or three link structures is commonly used due to their low degrees-of-freedom (DOF) movement. As the DOF of robotic arm increased, complexity increases. Instrumentation involved with robotics plays very important role in order to interact with outer environment. In this work, optimal control for movement of various DOFs of robotic arm using various soft computing techniques has been presented. We have discussed about different robotic structures having various DOF robotics arm movement. Further stress is on kinematics of the arm structures i.e. forward kinematics and inverse kinematics. Trajectory planning of robotic arms using soft computing techniques is demonstrating the flexibility of this technique. The performance is optimized for all possible input values and results in optimized movement as resultant output. In conclusion, soft computing has been playing very important role for achieving optimized movement of robotic arm. It also requires very limited knowledge of the system to implement soft computing techniques.Keywords: artificial intelligence, kinematics, robotic arm, neural networks, fuzzy logic
Procedia PDF Downloads 29910397 Improved Feature Extraction Technique for Handling Occlusion in Automatic Facial Expression Recognition
Authors: Khadijat T. Bamigbade, Olufade F. W. Onifade
Abstract:
The field of automatic facial expression analysis has been an active research area in the last two decades. Its vast applicability in various domains has drawn so much attention into developing techniques and dataset that mirror real life scenarios. Many techniques such as Local Binary Patterns and its variants (CLBP, LBP-TOP) and lately, deep learning techniques, have been used for facial expression recognition. However, the problem of occlusion has not been sufficiently handled, making their results not applicable in real life situations. This paper develops a simple, yet highly efficient method tagged Local Binary Pattern-Histogram of Gradient (LBP-HOG) with occlusion detection in face image, using a multi-class SVM for Action Unit and in turn expression recognition. Our method was evaluated on three publicly available datasets which are JAFFE, CK, SFEW. Experimental results showed that our approach performed considerably well when compared with state-of-the-art algorithms and gave insight to occlusion detection as a key step to handling expression in wild.Keywords: automatic facial expression analysis, local binary pattern, LBP-HOG, occlusion detection
Procedia PDF Downloads 17210396 Off-Line Parameter Estimation for the Induction Motor Drive System
Authors: Han-Woong Ahn, In-Gun Kim, Hyun-Seok Hong, Dong-Woo Kang, Ju Lee
Abstract:
It is important to accurately identify machine parameters for direct vector control. To obtain the parameter values, traditional methods can be used such as no-load and rotor locked tests. However, there are many differences between values obtained from the traditional tests and actual values. In addition, there are drawbacks that additional equipment and cost are required for the experiment. Therefore, it is hard to temporary operation to estimate induction motor parameters. Therefore, this paper deals with the estimation algorithm of induction motor parameters without a motor operation and the measurement from additional equipment such as sensors and dynamometer. The validity and usefulness of the estimation algorithm considering inverter nonlinearity is verified by comparing the conventional method with the proposed method.Keywords: induction motor, parameter, off-line estimation, inverter nonlinearity
Procedia PDF Downloads 53210395 Podcasting: A Tool for an Enhanced Learning Experience of Introductory Courses to Science and Engineering Students
Authors: Yaser E. Greish, Emad F. Hindawy, Maryam S. Al Nehayan
Abstract:
Introductory courses such as General Chemistry I, General Physics I and General Biology need special attention as students taking these courses are usually at their first year of the university. In addition to the language barrier for most of them, they also face other difficulties if these elementary courses are taught in the traditional way. Changing the routine method of teaching of these courses is therefore mandated. In this regard, podcasting of chemistry lectures was used as an add-on to the traditional and non-traditional methods of teaching chemistry to science and non-science students. Podcasts refer to video files that are distributed in a digital format through the Internet using personal computers or mobile devices. Pedagogical strategy is another way of identifying podcasts. Three distinct teaching approaches are evident in the current literature and include receptive viewing, problem-solving, and created video podcasts. The digital format and dispensing of video podcasts have stabilized over the past eight years, the type of podcasts vary considerably according to their purpose, degree of segmentation, pedagogical strategy, and academic focus. In this regard, the whole syllabus of 'General Chemistry I' course was developed as podcasts and were delivered to students throughout the semester. Students used the podcasted files extensively during their studies, especially as part of their preparations for exams. Feedback of students strongly supported the idea of using podcasting as it reflected its effect on the overall understanding of the subject, and a consequent improvement of their grades.Keywords: podcasting, introductory course, interactivity, flipped classroom
Procedia PDF Downloads 26710394 Preserving Heritage in the Face of Natural Disasters: Lessons from the Bam Experience in Iran
Authors: Mohammad Javad Seddighi, Avar Almukhtar
Abstract:
The occurrence of natural disasters, such as floods and earthquakes, can cause significant damage to heritage sites and surrounding areas. In Iran, the city of Bam was devastated by an earthquake in 2003, which had a major impact on the rivers and watercourses around the city. This study aims to investigate the environmental design techniques and sustainable hazard mitigation strategies that can be employed to preserve heritage sites in the face of natural disasters, using the Bam experience as a case study. The research employs a mixed-methods approach, combining both qualitative and quantitative data collection and analysis methods. The study begins with a comprehensive literature review of recent publications on environmental design techniques and sustainable hazard mitigation strategies in heritage conservation. This is followed by a field study of the rivers and watercourses around Bam, including the Adoori River (Talangoo) and other watercourses, to assess the current conditions and identify potential hazards. The data collected from the field study is analysed using statistical methods and GIS mapping techniques. The findings of this study reveal the importance of sustainable hazard mitigation strategies and environmental design techniques in preserving heritage sites during natural disasters. The study suggests that these techniques can be used to prevent the outbreak of another natural disaster in Bam and the surrounding areas. Specifically, the study recommends the establishment of a comprehensive early warning system, the creation of flood-resistant landscapes, and the use of eco-friendly building materials in the reconstruction of heritage sites. These findings contribute to the current knowledge of sustainable hazard mitigation and environmental design in heritage conservation.Keywords: natural disasters, heritage conservation, sustainable hazard mitigation, environmental design, landscape architecture, flood management, disaster resilience
Procedia PDF Downloads 8910393 Identifying Strategies and Techniques for the Egyptian Medium and Large Size Contractors to Respond to Economic Hardship
Authors: Michael Salib, Samer Ezeldin, Ahmed Waly
Abstract:
There are numerous challenges and problems facing the construction industry in several countries in the Middle East, as a result of numerous economic and political effects. As an example in Egypt, several construction companies have shut down and left the market since 2016. The closure of these companies occurred, as they did not respond with the suitable techniques and strategies that will enable them to survive during this economic turmoil period. A research is conducted in order to identify adequate strategies to be implemented by the Egyptian contractors that could allow them survive and keep competing during such economic hardship period. Two different techniques were used in order to identify these startegies. First, a deep research were conducted on the companies located in countries that suffered similar economic harship to identify the strategies they used in order to survive. Second, interviews were conducted with experts in the construction field in order to list the effective strategies they used that allowed them to survive. Moreover, at the end of each interview, the experts were asked to rate the applicability of the previously identified strategies used in the foreign countries, then the efficiency of each strategy if used in Egypt. A framework model is developed in order to assist the construction companies in choosing the suitable techniques to their company size, through identifying the top ranked strategies and techniques that should be adopted by the company based on the parameters given to the model. In order to verify this framework, the financial statements of two leading companies in the Egyptian construction market were studied. The first Contractor has applied nearly all the top ranked strategies identified in this paper, while the other contractor has applied only few of the identified top ranked strategies. Finally, another expert interviews were conducted in order to validate the framework. These experts were asked to test the model and rate through a questionnaire its applicability and effectiveness.Keywords: construction management, economic hardship, recession, survive
Procedia PDF Downloads 12710392 Profile of Cortisol in Bali's Crossbreed Cows for 120 Hours Shipping Using Traditional Vessel
Authors: Hindar Panguji, Nichlah Rifqiyah, Irkham Widiono, Pudji Astuti
Abstract:
Many transportations of livestock in Indonesia is still managed traditionally. Transportation involves several things that may cause stress, from a certain treatment or other factors, either externally or internally, that act as stressors. This study aimed to determine the profile of cortisol and IL-6 in female Bali breeding cattle transported for 120 hours using 100 GT traditional vessels with two floors and a capacity of 300-400 heads. Before transportation, all of the animals have got the vaccination. Blood samples from thirty cows were taken before transportation, during loading, during docking, and after transportation. ELISA method was used to analyze the concentration of cortisol and IL6. The averages of cortisol concentration before transportation, during loading, docking, and after transportation were 78.21±27.96 ng/mL, 90.78±30.91 ng/mL, 69.90±53.92 ng/mL and 69.34±32.03 ng/mL respectively. The average concentration of IL-6 before, during, docking and after transportation were 259.86±70.16 pg/mL, 315.41±64.21 pg/mL, 410.13±247.43 pg/mL dan 424.81±98.86 pg/mL. It was concluded there were no differences in cortisol concentrations and level of IL6 of each cow at different stages of transportation (p > 0.05) It would be possible that vaccination could reduce the fluctuation of cortisol.Keywords: shipping, Bali's breed cows, vessel, cortisol, IL6
Procedia PDF Downloads 22310391 Arabic Quran Search Tool Based on Ontology
Authors: Mohammad Alqahtani, Eric Atwell
Abstract:
This paper reviews and classifies most of the important types of search techniques that have been applied on the holy Quran. Then, it addresses the limitations in these techniques. Additionally, this paper surveys most existing Quranic ontologies and what are their deficiencies. Finally, it explains a new search tool called: A semantic search tool for Al Quran based on Qur’anic ontologies. This tool will overcome all limitations in the existing Quranic search applications.Keywords: holy Quran, natural language processing (NLP), semantic search, information retrieval (IR), ontology
Procedia PDF Downloads 57210390 InP/ZnS Core-Shell and InP/ZnS/ZnS Core-Multishell Quantum Dots for Improved luminescence Efficiency
Authors: Imen Harabi, Hanae Toura, Safa Jemai, Bernabe Mari Soucase
Abstract:
A promising alternative to traditional Quantum Dots QD materials, which contain toxic heavy elements such as lead and cadmium, sheds light on indium phosphide quantum dots (InP QDs) Owing to improve the quantum yields of photoluminescence and other properties. InP, InP/ZnS core/shell and InP/ZnS/ZnS core/shell/shell Quantum Dots (QDs) were synthetized by the hot injection method. The optical and structural properties of the core InP QDs, InP/ZnS QDs, and InP/ZnS/ZnS QDs have being considered by several techniques such as X-ray diffraction, transmission electron microscopy, optical spectroscopy, and photoluminescence. The average diameter of InP, InP/ZnS, and InP/ZnS/ZnS Quantum Dots (QDs) was varying between 10 nm, 5.4 nm, and 4.10 nm. This experience revealed that the surface morphology of the Quantum Dots has a more regular spherical form with color variation of the QDs in solution. The emission peak of colloidal InP Quantum Dots was around 530 nm, while in InP/ZnS, the emission peak is displayed and located at 598 nm. whilst for InP/ZnS/ZnS is placed at 610 nm. Furthermore, an enhanced PL emission due to a passivation effect in the ZnS-covered InP QDs was obtained. Add the XRD information FWHM of the principal peak of InP QDs was 63 nm, while for InP/ZnS was 41 nm and InP/ZnS/ZnS was 33 nm. The effect of the Zinc stearate precursor concentration on the optical, structural, surface chemical of InP and InP/ZnS and InP/ZnS/ZnS QDs will be discussed.Keywords: indium phosphide, quantum dot, nanoparticle, core-shell, multishell, luminescence
Procedia PDF Downloads 16810389 Recidivism in Brazil: Exploring the Case of the Association of Protection and Assistance to Convicts Methodology
Authors: Robyn Heitzman
Abstract:
The traditional method of punitive justice in Brazil has failed to prevent high levels of recidivism. Combined with overcrowding, a lack of resources, and human rights abuses, the conventional prison approach in Brazil is being questioned; one alternative approach is the association of protection and assistance to convicts (APAC) method. Justice -according to the principles of the APAC methodology- is served through education, reformation, and human development. The model has reported relatively low levels of recidivism and has been internationally recognised for its progress. Through qualitative research such as interviews and case studies, this paper explains why, applying the theory of restorative justice, the APAC methodology yields lower rates of recidivism compared to the traditional models of prisons in Brazil.Keywords: Brazil, justice, prisons, restorative
Procedia PDF Downloads 11110388 Linguistic Analysis of Holy Scriptures: A Comparative Study of Islamic Jurisprudence and the Western Hermeneutical Tradition
Authors: Sana Ammad
Abstract:
The tradition of linguistic analysis in Islam and Christianity has developed independently of each other in lieu of the social developments specific to their historical context. However, recently increasing number of Muslim academics educated in the West have tried to apply the Western tradition of linguistic interpretation to the Qur’anic text while completely disregarding the Islamic linguistic tradition used and developed by the traditional scholars over the centuries. The aim of the paper is to outline the linguistic tools and methods used by the traditional Islamic scholars for the purpose of interpretating the Holy Qur’an and shed light on how they contribute towards a better understanding of the text compared to their Western counterparts. This paper carries out a descriptive-comparative study of the linguistic tools developed and perfected by the traditional scholars in Islam for the purpose of textual analysis of the Qur’an as they have been described in the authentic works of Usul Al Fiqh (Jurisprudence) and the principles of textual analysis employed by the Western hermeneutical tradition for the study of the Bible. First, it briefly outlines the independent historical development of the two traditions emphasizing the final normative shape that they have taken. Then it draws a comparison of the two traditions highlighting the similarities and the differences existing between them. In the end, the paper demonstrates the level of academic excellence achieved by the traditional linguistic scholars in their efforts to develop appropriate tools of textual interpretation and how these tools are more suitable for interpreting the Qur’an compared to the Western principles. Since the aim of interpreters of both the traditions is to try and attain an objective understanding of the Scriptures, the emphasis of the paper shall be to highlight how well the Islamic method of linguistic interpretation contributes to an objective understanding of the Qur’anic text. The paper concludes with the following findings: The Western hermeneutical tradition of linguistic analysis developed within the Western historical context. However, the Islamic method of linguistic analysis is much more highly developed and complex and serves better the purpose of objective understanding of the Holy text.Keywords: Islamic jurisprudence, linguistic analysis, textual interpretation, western hermeneutics
Procedia PDF Downloads 33410387 Examples of Techniques and Algorithms Used in Wlan Security
Authors: Vahid Bairami Rad
Abstract:
Wireless communications offer organizations and users many benefits such as portability and flexibility, increased productivity, and lower installation costs. Wireless networks serve as the transport mechanism between devices and among devices and the traditional wired networks (enterprise networks and the internet). Wireless networks are many and diverse but are frequently categorized into three groups based on their coverage range: WWAN, WLAN, and WPAN. WWAN, representing wireless wide area networks, includes wide coverage area technologies such as 2G cellular, Cellular Digital Packet Data (CDPD), Global System for Mobile Communications (GSM), and Mobitex. WLAN, representing wireless local area networks, includes 802.11, Hyper lan, and several others. WPAN, represents wireless personal area network technologies such as Bluetooth and Infrared. The security services are provided largely by the WEP (Wired Equivalent Privacy) protocol to protect link-level data during wireless transmission between clients and access points. That is, WEP does not provide end-to-end security but only for the wireless portion of the connection.Keywords: wireless lan, wired equivalent privacy, wireless network security, wlan security
Procedia PDF Downloads 571