Search results for: symmetric fuzzy numbers
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2091

Search results for: symmetric fuzzy numbers

1281 Characteristics of Middle Grade Students' Solution Strategies While Reasoning the Correctness of the Statements Related to Numbers

Authors: Ayşegül Çabuk, Mine Işıksal

Abstract:

Mathematics is a sense-making activity so that it requires meaningful learning. Hence based on this idea, meaningful mathematical connections are necessary to learn mathematics. At that point, the major question has become that which educational methods can provide opportunities to provide mathematical connections and to understand mathematics. The amalgam of reasoning and proof can be the one of the methods that creates opportunities to learn mathematics in a meaningful way. However, even if reasoning and proof should be included from prekindergarten to grade 12, studies in literature generally include secondary school students and pre-service mathematics teachers. With the light of the idea that the amalgam of reasoning and proof has significant effect on middle school students' mathematical learning, this study aims to investigate middle grade students' tendencies while reasoning the correctness of statements related to numbers. The sample included 272 middle grade students, specifically 69 of them were sixth grade students (25.4%), 101 of them were seventh grade students (37.1%) and 102 of them were eighth grade students (37.5%). Data was gathered through an achievement test including 2 essay types of problems about algebra. The answers of two items were analyzed both quantitatively and qualitatively in terms of students' solutions strategies while reasoning the correctness of the statements. Similar on the findings in the literature, most of the students, in all grade levels, used numerical examples to judge the statements. Moreover the results also showed that the majority of these students appear to believe that providing one or more selected examples is sufficient to show the correctness of the statement. Hence based on the findings of the study, even students in earlier ages have proving and reasoning abilities their reasoning's generally based on the empirical evidences. Therefore, it is suggested that examples and example-based reasoning can be a fundamental role on to generate systematical reasoning and proof insight in earlier ages.

Keywords: reasoning, mathematics learning, middle grade students

Procedia PDF Downloads 416
1280 Non-Interactive XOR Quantum Oblivious Transfer: Optimal Protocols and Their Experimental Implementations

Authors: Lara Stroh, Nikola Horová, Robert Stárek, Ittoop V. Puthoor, Michal Mičuda, Miloslav Dušek, Erika Andersson

Abstract:

Oblivious transfer (OT) is an important cryptographic primitive. Any multi-party computation can be realised with OT as a building block. XOR oblivious transfer (XOT) is a variant where the sender Alice has two bits, and a receiver, Bob, obtains either the first bit, the second bit, or their XOR. Bob should not learn anything more than this, and Alice should not learn what Bob has learned. Perfect quantum OT with information-theoretic security is known to be impossible. We determine the smallest possible cheating probabilities for unrestricted dishonest parties in non-interactive quantum XOT protocols using symmetric pure states and present an optimal protocol which outperforms classical protocols. We also "reverse" this protocol so that Bob becomes the sender of a quantum state and Alice the receiver who measures it while still implementing oblivious transfer from Alice to Bob. Cheating probabilities for both parties stay the same as for the unreversed protocol. We optically implemented both the unreversed and the reversed protocols and cheating strategies, noting that the reversed protocol is easier to implement.

Keywords: oblivious transfer, quantum protocol, cryptography, XOR

Procedia PDF Downloads 113
1279 Two Quasiparticle Rotor Model for Deformed Nuclei

Authors: Alpana Goel, Kawalpreet Kalra

Abstract:

The study of level structures of deformed nuclei is the most complex topic in nuclear physics. For the description of level structure, a simple model is good enough to bring out the basic features which may then be further refined. The low lying level structures of these nuclei can, therefore, be understood in terms of Two Quasiparticle plus axially symmetric Rotor Model (TQPRM). The formulation of TQPRM for deformed nuclei has been presented. The analysis of available experimental data on two quasiparticle rotational bands of deformed nuclei present unusual features like signature dependence, odd-even staggering, signature inversion and signature reversal in two quasiparticle rotational bands of deformed nuclei. These signature effects are well discussed within the framework of TQPRM. The model is well efficient in reproducing the large odd-even staggering and anomalous features observed in even-even and odd-odd deformed nuclei. The effect of particle-particle and the Coriolis coupling is well established from the model. Detailed description of the model with implications to deformed nuclei is presented in the paper.

Keywords: deformed nuclei, signature effects, signature inversion, signature reversal

Procedia PDF Downloads 155
1278 Large Amplitude Vibration of Sandwich Beam

Authors: Youssef Abdelli, Rachid Nasri

Abstract:

The large amplitude free vibration analysis of three-layered symmetric sandwich beams is carried out using two different approaches. The governing nonlinear partial differential equations of motion in free natural vibration are derived using Hamilton's principle. The formulation leads to two nonlinear partial differential equations that are coupled both in axial and binding deformations. In the first approach, the method of multiple scales is applied directly to the governing equation that is a nonlinear partial differential equation. In the second approach, we discretize the governing equation by using Galerkin's procedure and then apply the shooting method to the obtained ordinary differential equations. In order to check the validity of the solutions obtained by the two approaches, they are compared with the solutions obtained by two approaches; they are compared with the solutions obtained numerically by the finite difference method.

Keywords: finite difference method, large amplitude vibration, multiple scales, nonlinear vibration

Procedia PDF Downloads 454
1277 A New Block Cipher for Resource-Constrained Internet of Things Devices

Authors: Muhammad Rana, Quazi Mamun, Rafiqul Islam

Abstract:

In the Internet of Things (IoT), many devices are connected and accumulate a sheer amount of data. These Internet-driven raw data need to be transferred securely to the end-users via dependable networks. Consequently, the challenges of IoT security in various IoT domains are paramount. Cryptography is being applied to secure the networks for authentication, confidentiality, data integrity and access control. However, due to the resource constraint properties of IoT devices, the conventional cipher may not be suitable in all IoT networks. This paper designs a robust and effective lightweight cipher to secure the IoT environment and meet the resource-constrained nature of IoT devices. We also propose a symmetric and block-cipher based lightweight cryptographic algorithm. The proposed algorithm increases the complexity of the block cipher, maintaining the lowest computational requirements possible. The proposed algorithm efficiently constructs the key register updating technique, reduces the number of encryption rounds, and adds a new layer between the encryption and decryption processes.

Keywords: internet of things, cryptography block cipher, S-box, key management, security, network

Procedia PDF Downloads 103
1276 Quasi-Photon Monte Carlo on Radiative Heat Transfer: An Importance Sampling and Learning Approach

Authors: Utkarsh A. Mishra, Ankit Bansal

Abstract:

At high temperature, radiative heat transfer is the dominant mode of heat transfer. It is governed by various phenomena such as photon emission, absorption, and scattering. The solution of the governing integrodifferential equation of radiative transfer is a complex process, more when the effect of participating medium and wavelength properties are taken into consideration. Although a generic formulation of such radiative transport problem can be modeled for a wide variety of problems with non-gray, non-diffusive surfaces, there is always a trade-off between simplicity and accuracy of the problem. Recently, solutions of complicated mathematical problems with statistical methods based on randomization of naturally occurring phenomena have gained significant importance. Photon bundles with discrete energy can be replicated with random numbers describing the emission, absorption, and scattering processes. Photon Monte Carlo (PMC) is a simple, yet powerful technique, to solve radiative transfer problems in complicated geometries with arbitrary participating medium. The method, on the one hand, increases the accuracy of estimation, and on the other hand, increases the computational cost. The participating media -generally a gas, such as CO₂, CO, and H₂O- present complex emission and absorption spectra. To model the emission/absorption accurately with random numbers requires a weighted sampling as different sections of the spectrum carries different importance. Importance sampling (IS) was implemented to sample random photon of arbitrary wavelength, and the sampled data provided unbiased training of MC estimators for better results. A better replacement to uniform random numbers is using deterministic, quasi-random sequences. Halton, Sobol, and Faure Low-Discrepancy Sequences are used in this study. They possess better space-filling performance than the uniform random number generator and gives rise to a low variance, stable Quasi-Monte Carlo (QMC) estimators with faster convergence. An optimal supervised learning scheme was further considered to reduce the computation costs of the PMC simulation. A one-dimensional plane-parallel slab problem with participating media was formulated. The history of some randomly sampled photon bundles is recorded to train an Artificial Neural Network (ANN), back-propagation model. The flux was calculated using the standard quasi PMC and was considered to be the training target. Results obtained with the proposed model for the one-dimensional problem are compared with the exact analytical and PMC model with the Line by Line (LBL) spectral model. The approximate variance obtained was around 3.14%. Results were analyzed with respect to time and the total flux in both cases. A significant reduction in variance as well a faster rate of convergence was observed in the case of the QMC method over the standard PMC method. However, the results obtained with the ANN method resulted in greater variance (around 25-28%) as compared to the other cases. There is a great scope of machine learning models to help in further reduction of computation cost once trained successfully. Multiple ways of selecting the input data as well as various architectures will be tried such that the concerned environment can be fully addressed to the ANN model. Better results can be achieved in this unexplored domain.

Keywords: radiative heat transfer, Monte Carlo Method, pseudo-random numbers, low discrepancy sequences, artificial neural networks

Procedia PDF Downloads 217
1275 FPGA Implementation of Novel Triangular Systolic Array Based Architecture for Determining the Eigenvalues of Matrix

Authors: Soumitr Sanjay Dubey, Shubhajit Roy Chowdhury, Rahul Shrestha

Abstract:

In this paper, we have presented a novel approach of calculating eigenvalues of any matrix for the first time on Field Programmable Gate Array (FPGA) using Triangular Systolic Arra (TSA) architecture. Conventionally, additional computation unit is required in the architecture which is compliant to the algorithm for determining the eigenvalues and this in return enhances the delay and power consumption. However, recently reported works are only dedicated for symmetric matrices or some specific case of matrix. This works presents an architecture to calculate eigenvalues of any matrix based on QR algorithm which is fully implementable on FPGA. For the implementation of QR algorithm we have used TSA architecture, which is further utilising CORDIC (CO-ordinate Rotation DIgital Computer) algorithm, to calculate various trigonometric and arithmetic functions involved in the procedure. The proposed architecture gives an error in the range of 10−4. Power consumption by the design is 0.598W. It can work at the frequency of 900 MHz.

Keywords: coordinate rotation digital computer, three angle complex rotation, triangular systolic array, QR algorithm

Procedia PDF Downloads 402
1274 Comparative Study of Water Quality Parameters in the Proximity of Various Landfills Sites in India

Authors: Abhishek N. Srivastava, Rahul Singh, Sumedha Chakma

Abstract:

The rapid urbanization in the developing countries is generating an enormous amount of waste leading to the creation of unregulated landfill sites at various places at its disposal. The liquid waste, known as leachate, produced from these landfills sites is severely affecting the surrounding water quality. The water quality in the proximity areas of the landfill is found affected by various physico-chemical parameters of leachate such as pH, alkalinity, total hardness, conductivity, chloride, total dissolved solids (TDS), total suspended solids (TSS), sulphate, nitrate, phosphate, fluoride, sodium and potassium, biological parameters such as biochemical oxygen demand (BOD), chemical oxygen demand (COD), Faecal coliform, and heavy metals such as cadmium (Cd), lead (Pb), iron (Fe), mercury (Hg), arsenic (As), cobalt (Co), manganese (Mn), zinc (Zn), copper (Cu), chromium (Cr), nickel (Ni). However, all these parameters are distributive in leachate that produced according to the nature of waste being dumped at various landfill sites, therefore, it becomes very difficult to predict the main responsible parameter of leachate for water quality contamination. The present study is endeavour the comparative analysis of the physical, chemical and biological parameters of various landfills in India viz. Okhla landfill, Ghazipur landfill, Bhalswa ladfill in NCR Delhi, Deonar landfill in Mumbai, Dhapa landfill in Kolkata and Kodungayaiyur landfill, Perungudi landfill in Chennai. The statistical analysis of the parameters was carried out using the Statistical Packages for the Social Sciences (SPSS) and LandSim 2.5 model to simulate the long term effect of various parameters on different time scale. Further, the uncertainties characterization of various input parameters has also been analysed using fuzzy alpha cut (FAC) technique to check the sensitivity of various water quality parameters at the proximity of numerous landfill sites. Finally, the study would help to suggest the best method for the prevention of pollution migration from the landfill sites on priority basis.

Keywords: landfill leachate, water quality, LandSim, fuzzy alpha cut

Procedia PDF Downloads 120
1273 The Pile Group Efficiency for Different Embedment Lengths in Dry Sand

Authors: Mohamed M. Shahin

Abstract:

This study investigated the design of the pile foundation to support heavy structures-especially bridges for highways-in the Sahara, which contains many dunes of medium dense sand in different levels, where the foundation is supposed to be piles. The base resistance of smooth model pile groups in sand under static loading is investigated experimentally in a pile soil test apparatus. Improvement were made to the sand around the piles in order to increase the shaft resistance of the single pile and the pile groups, and also base resistance especially for the central pile in pile groups. The study outlines the behaviour of a single-pile, 4-, 5-, and 9- pile groups arranged in a doubly symmetric [square] layout with different embedment lengths and pile spacing in loose dry sand [normal] and dense dry sand [compacted] around the piles. This study evaluate the variation of the magnitude and the proportion of end bearing capacity of individual piles in different pile groups. Also to investigate the magnitude of the efficiency coefficient in the case of different pile groups.

Keywords: pile group, base resistance, efficiency coefficient, pile spacing, pile-soil interaction

Procedia PDF Downloads 356
1272 An Improved OCR Algorithm on Appearance Recognition of Electronic Components Based on Self-adaptation of Multifont Template

Authors: Zhu-Qing Jia, Tao Lin, Tong Zhou

Abstract:

The recognition method of Optical Character Recognition has been expensively utilized, while it is rare to be employed specifically in recognition of electronic components. This paper suggests a high-effective algorithm on appearance identification of integrated circuit components based on the existing methods of character recognition, and analyze the pros and cons.

Keywords: optical character recognition, fuzzy page identification, mutual correlation matrix, confidence self-adaptation

Procedia PDF Downloads 531
1271 Exploring Socio-Economic Barriers of Green Entrepreneurship in Iran and Their Interactions Using Interpretive Structural Modeling

Authors: Younis Jabarzadeh, Rahim Sarvari, Negar Ahmadi Alghalandis

Abstract:

Entrepreneurship at both individual and organizational level is one of the most driving forces in economic development and leads to growth and competition, job generation and social development. Especially in developing countries, the role of entrepreneurship in economic and social prosperity is more emphasized. But the effect of global economic development on the environment is undeniable, especially in negative ways, and there is a need to rethink current business models and the way entrepreneurs act to introduce new businesses to address and embed environmental issues in order to achieve sustainable development. In this paper, green or sustainable entrepreneurship is addressed in Iran to identify challenges and barriers entrepreneurs in the economic and social sectors face in developing green business solutions. Sustainable or green entrepreneurship has been gaining interest among scholars in recent years and addressing its challenges and barriers need much more attention to fill the gap in the literature and facilitate the way those entrepreneurs are pursuing. This research comprised of two main phases: qualitative and quantitative. At qualitative phase, after a thorough literature review, fuzzy Delphi method is utilized to verify those challenges and barriers by gathering a panel of experts and surveying them. In this phase, several other contextually related factors were added to the list of identified barriers and challenges mentioned in the literature. Then, at the quantitative phase, Interpretive Structural Modeling is applied to construct a network of interactions among those barriers identified at the previous phase. Again, a panel of subject matter experts comprised of academic and industry experts was surveyed. The results of this study can be used by policymakers in both the public and industry sector, to introduce more systematic solutions to eliminate those barriers and help entrepreneurs overcome challenges of sustainable entrepreneurship. It also contributes to the literature as the first research in this type which deals with the barriers of sustainable entrepreneurship and explores their interaction.

Keywords: green entrepreneurship, barriers, fuzzy Delphi method, interpretive structural modeling

Procedia PDF Downloads 158
1270 Changes in Temperature and Precipitation Extremes in Northern Thailand

Authors: Chakrit Chotamonsak

Abstract:

This study was analyzed changes in temperature and precipitation extremes in northern Thailand for the period 1981-2011.The study includes an analysis of the average and trends of changes in temperature and precipitation using 22 climate indices, related to the intensity, frequency and duration of extreme climate events. The results showed that the averaged trend of maximum, minimum and mean temperature is likely to increase over the study area in rate of 0.5, 0.9 and 0.7 °C in last 30 years. Changes in temperature at nighttime, then rising at a rate higher daytime is resulting to decline of diurnal temperature range throughout the area. Trend of changes in average precipitation during the year 1981-2011 is expected to increase at an average rate of 21%. The intensity of extreme temperature events is increasing almost all station. In particular, the changes of the night were unusually hot has intensified throughout the region. In some provinces such as Chiang Mai and Lampang are likely be faced with the severity of hot days and hot nights in increasing rate. Frequency of extreme temperature events are likely to increase each station, especially hot days, and hot nights are increasing at a rate of 2.38 and 3.58 days per decade. Changes in the cold days and cold nights are declining at a rate of 0.82 and 3.03 days per decade. The duration of extreme temperature events is expected to increase the events hot in every station. An average of 17.8 days per decade for the number of consecutive cold winter nights likely shortens the rate of 2.90 days per decade. The analysis of the precipitation indices reveals the intensity of extreme precipitation is increasing almost across the region. The intensify expressed the heavy rain in one day (Rx1day) and very heavy rain accumulated in 5 days (RX5day) which is likely to increase, and very heavy rainfall is likely to increase in intensity. Frequency of extreme precipitation events is likely to increase over the station. The average frequency of heavy precipitation events increased xxx days per decade. The duration of extreme precipitation events, such as the consecutive dry days are likely to reduce the numbers almost all station while the consecutive wet days tends to increase and decrease at different numbers in different areas.

Keywords: climate extreme, temperature extreme, precipitation extreme, Northern Thailand

Procedia PDF Downloads 276
1269 A Comparative Assessment of Information Value, Fuzzy Expert System Models for Landslide Susceptibility Mapping of Dharamshala and Surrounding, Himachal Pradesh, India

Authors: Kumari Sweta, Ajanta Goswami, Abhilasha Dixit

Abstract:

Landslide is a geomorphic process that plays an essential role in the evolution of the hill-slope and long-term landscape evolution. But its abrupt nature and the associated catastrophic forces of the process can have undesirable socio-economic impacts, like substantial economic losses, fatalities, ecosystem, geomorphologic and infrastructure disturbances. The estimated fatality rate is approximately 1person /100 sq. Km and the average economic loss is more than 550 crores/year in the Himalayan belt due to landslides. This study presents a comparative performance of a statistical bivariate method and a machine learning technique for landslide susceptibility mapping in and around Dharamshala, Himachal Pradesh. The final produced landslide susceptibility maps (LSMs) with better accuracy could be used for land-use planning to prevent future losses. Dharamshala, a part of North-western Himalaya, is one of the fastest-growing tourism hubs with a total population of 30,764 according to the 2011 census and is amongst one of the hundred Indian cities to be developed as a smart city under PM’s Smart Cities Mission. A total of 209 landslide locations were identified in using high-resolution linear imaging self-scanning (LISS IV) data. The thematic maps of parameters influencing landslide occurrence were generated using remote sensing and other ancillary data in the GIS environment. The landslide causative parameters used in the study are slope angle, slope aspect, elevation, curvature, topographic wetness index, relative relief, distance from lineaments, land use land cover, and geology. LSMs were prepared using information value (Info Val), and Fuzzy Expert System (FES) models. Info Val is a statistical bivariate method, in which information values were calculated as the ratio of the landslide pixels per factor class (Si/Ni) to the total landslide pixel per parameter (S/N). Using this information values all parameters were reclassified and then summed in GIS to obtain the landslide susceptibility index (LSI) map. The FES method is a machine learning technique based on ‘mean and neighbour’ strategy for the construction of fuzzifier (input) and defuzzifier (output) membership function (MF) structure, and the FR method is used for formulating if-then rules. Two types of membership structures were utilized for membership function Bell-Gaussian (BG) and Trapezoidal-Triangular (TT). LSI for BG and TT were obtained applying membership function and if-then rules in MATLAB. The final LSMs were spatially and statistically validated. The validation results showed that in terms of accuracy, Info Val (83.4%) is better than BG (83.0%) and TT (82.6%), whereas, in terms of spatial distribution, BG is best. Hence, considering both statistical and spatial accuracy, BG is the most accurate one.

Keywords: bivariate statistical techniques, BG and TT membership structure, fuzzy expert system, information value method, machine learning technique

Procedia PDF Downloads 121
1268 SA-SPKC: Secure and Efficient Aggregation Scheme for Wireless Sensor Networks Using Stateful Public Key Cryptography

Authors: Merad Boudia Omar Rafik, Feham Mohammed

Abstract:

Data aggregation in wireless sensor networks (WSNs) provides a great reduction of energy consumption. The limited resources of sensor nodes make the choice of an encryption algorithm very important for providing security for data aggregation. Asymmetric cryptography involves large ciphertexts and heavy computations but solves, on the other hand, the problem of key distribution of symmetric one. The latter provides smaller ciphertexts and speed computations. Also, the recent researches have shown that achieving the end-to-end confidentiality and the end-to-end integrity at the same is a challenging task. In this paper, we propose (SA-SPKC), a novel security protocol which addresses both security services for WSNs, and where only the base station can verify the individual data and identify the malicious node. Our scheme is based on stateful public key encryption (StPKE). The latter combines the best features of both kinds of encryption along with state in order to reduce the computation overhead. Our analysis

Keywords: secure data aggregation, wireless sensor networks, elliptic curve cryptography, homomorphic encryption

Procedia PDF Downloads 289
1267 Volatility Spillover Among the Stock Markets of South Asian Countries

Authors: Tariq Aziz, Suresh Kumar, Vikesh Kumar, Sheraz Mustafa, Jhanzeb Marwat

Abstract:

The paper provides an updated version of volatility spillover among the equity markets of South Asian countries, including Pakistan, India, Srilanka, and Bangladesh. The analysis uses both symmetric and asymmetric Generalized Autoregressive Conditional Heteroscedasticity models to investigate volatility persistence and leverage effect. The bivariate EGARCH model is used to test for volatility transmission between two equity markets. Weekly data for the period February 2013 to August 2019 is used for empirical analysis. The findings indicate that the leverage effect exists in the equity markets of all the countries except Bangladesh. The volatility spillover from the equity market of Bangladesh to all other countries is negative and significant whereas the volatility of the equity market of Sri-Lanka does influence the volatility of any other country’s equity market. Indian equity market influence only the volatility of the Sri-Lankan equity market; and there is bidirectional volatility spillover between the equity markets of Pakistan and Bangladesh. The findings are important for policy-makers and international investors.

Keywords: volatility spillover, volatility persistence, garch, egarch

Procedia PDF Downloads 130
1266 Biocarbon for High-Performance Supercapacitors Derived from the Wastewater Treatment of Sewage Sludge

Authors: Santhosh Ravichandran, F. J. Rodríguez-Varela

Abstract:

In this study, a biocarbon (BC) was made from sewage sludge from the water treatment plant (PTAR) in Saltillo, Coahuila, Mexico. The sludge was carbonized in water and then chemically activated by pyrolysis. The biocarbon was evaluated physicochemically using XRD, SEM-EDS, and FESEM. A broad (002) peak attributable to graphitic structures indicates that the material is amorphous. The resultant biocarbon has a high specific surface area (412 m2 g-1), a large pore volume (0.39 cm3 g-1), interconnected hierarchical porosity, and outstanding electrochemical performance. It is appropriate for high-performance supercapacitor electrode materials due to its high specific capacitance of 358 F g-1, great rate capability, and outstanding cycling stability (around 87% capacitance retention after 10,000 cycles, even at a high current density of 19 A g-1). In an aqueous solution, the constructed BC/BC symmetric supercapacitor exhibits increased super capacitor behavior with a high energy density of 29.5 Whkg-1. The concept provides an efficient method for producing high-performance electrode materials for supercapacitors from conventional water treatment biomass wastes.

Keywords: supercapacitors, carbon, material science, batteries

Procedia PDF Downloads 76
1265 Thermal Buckling of Functionally Graded Panel Based on Mori-Tanaka Scheme

Authors: Seok-In Bae, Young-Hoon Lee, Ji-Hwan Kim

Abstract:

Due to the asymmetry of the material properties of the Functionally Graded Materials(FGMs) in the thickness direction, neutral surface of the model is not the same as the mid-plane of the symmetric structure. In order to investigate the thermal bucking behavior of FGMs, neutral surface is chosen as a reference plane. In the model, material properties are assumed to be temperature dependent, and varied continuously in the thickness direction of the plate. Further, the effective material properties such as Young’s modulus and Poisson’s ratio are homogenized using Mori-Tanaka scheme which considers the interaction among adjacent inclusions. In this work, the finite element methods are used, and the first-order shear deformation theory of plate are accounted. The thermal loads are assumed to be uniform, linear and non-linear distribution through the thickness directions, respectively. Also, the effects of various parameters for thermal buckling behavior of FGM panel are discussed in detail.

Keywords: functionally graded plate, thermal buckling analysis, neutral surface

Procedia PDF Downloads 397
1264 An Authentication Protocol for Quantum Enabled Mobile Devices

Authors: Natarajan Venkatachalam, Subrahmanya V. R. K. Rao, Vijay Karthikeyan Dhandapani, Swaminathan Saravanavel

Abstract:

The quantum communication technology is an evolving design which connects multiple quantum enabled devices to internet for secret communication or sensitive information exchange. In future, the number of these compact quantum enabled devices will increase immensely making them an integral part of present communication systems. Therefore, safety and security of such devices is also a major concern for us. To ensure the customer sensitive information will not be eavesdropped or deciphered, we need a strong authentications and encryption mechanism. In this paper, we propose a mutual authentication scheme between these smart quantum devices and server based on the secure exchange of information through quantum channel which gives better solutions for symmetric key exchange issues. An important part of this work is to propose a secure mutual authentication protocol over the quantum channel. We show that our approach offers robust authentication protocol and further our solution is lightweight, scalable, cost-effective with optimized computational processing overheads.

Keywords: quantum cryptography, quantum key distribution, wireless quantum communication, authentication protocol, quantum enabled device, trusted third party

Procedia PDF Downloads 165
1263 Effect of the Initial Billet Shape Parameters on the Final Product in a Backward Extrusion Process for Pressure Vessels

Authors: Archana Thangavelu, Han-Ik Park, Young-Chul Park, Joon-Hong Park

Abstract:

In this numerical study, we have proposed a method for evaluation of backward extrusion process of pressure vessel made up of steel. Demand for lighter and stiffer products have been increasing in the last years especially in automobile engineering. Through detailed finite element analysis, effective stress, strain and velocity profile have been obtained with optimal range. The process design of a forward and backward extrusion axe-symmetric part has been studied. Forging is mainly carried out because forged products are highly reliable and possess superior mechanical properties when compared to normal products. Performing computational simulations of 3D hot forging with various dimensions of billet and optimization of weight is carried out using Taguchi Orthogonal Array (OA) Optimization technique. The technique used in this study can be used for newly developed materials to investigate its forgeability for much complicated shapes in closed hot die forging process.

Keywords: backward extrusion, hot forging, optimization, finite element analysis, Taguchi method

Procedia PDF Downloads 302
1262 Cysticidal Effect of Balanites Aegyptiaca and Moringa Oleifera on Bovine Cysticercosis with Monitoring to Dynamics of TNF-α

Authors: Omnia M.Kandil, Noha M. F. Hassan, Doaa Sedky, Hatem A. Shalaby, Heba M. Ashry, Nadia M. T. Abu El Ezz, Sahar M. Kandeel, Mohamed S. Abdelfattah Ying L, Ebtesam M. Al-Olayan

Abstract:

The cestode, Taenia saginata is a zoonotic tapeworm that it’s larval stage which known as Cysticercus bovis cause cyst formation in cattle’s organs such as heart, lung, liver, tongue, esophagus and diaphragm muscle, despite the infected cattle may show no clinical signs. In view of considerable interest in developing cysticidal drugs including those from medicinal plants, because of their consideration as eco-friendly and biodegradable as well as having multiple bioactive compounds that may translate to multiple mechanisms in killing the parasites. This study was achieved to evaluate, for the first time, the efficacy of methanolic extract of Balanites aegyptiaca fruits and Moringa oleifera seeds against metacestode larval stage of the cestode Taenia saginata in BALB/c mice compared with commonly used anthelmintic albendazole and assigning the level of tumor necrosis factor (TNF-α) to monitor immune and inflammatory response of experimentally infected animals. The results revealed a marked decrease in the numbers of cysticerci found in all treated mice groups and up to 88% reduction was achieved in the B. aegyptiaca treated group; higher than that was recorded in both M. oleifera (72.23%) and albendazole treated ones (80.56%). The cysts of the treated groups were smaller of the control one. Besides, the mean concentration of TNF-α following treatment with Balanites and Moringa extracts, was higher but not significant difference than that in the untreated infected control one (P<0.05), evidence for inflammation and cyst damage. It can be concluded that the in vivo efficacy of M. oleifera extract was comparable to a commercial anthelmintic, and the B. aegyptiaca extract was superior in the reduction of cysticerci numbers.

Keywords: Balanites aeggyptica, Moringa oleifera, cysticercosis, BALB/C mice

Procedia PDF Downloads 58
1261 Optimization of Multiplier Extraction Digital Filter On FPGA

Authors: Shiksha Jain, Ramesh Mishra

Abstract:

One of the most widely used complex signals processing operation is filtering. The most important FIR digital filter are widely used in DSP for filtering to alter the spectrum according to some given specifications. Power consumption and Area complexity in the algorithm of Finite Impulse Response (FIR) filter is mainly caused by multipliers. So we present a multiplier less technique (DA technique). In this technique, precomputed value of inner product is stored in LUT. Which are further added and shifted with number of iterations equal to the precision of input sample. But the exponential growth of LUT with the order of FIR filter, in this basic structure, makes it prohibitive for many applications. The significant area and power reduction over traditional Distributed Arithmetic (DA) structure is presented in this paper, by the use of slicing of LUT to the desired length. An architecture of 16 tap FIR filter is presented, with different length of slice of LUT. The result of FIR Filter implementation on Xilinx ISE synthesis tool (XST) vertex-4 FPGA Tool by using proposed method shows the increase of the maximum frequency, the decrease of the resources as usage saving in area with more number of slices and the reduction dynamic power.

Keywords: multiplier less technique, linear phase symmetric FIR filter, FPGA tool, look up table

Procedia PDF Downloads 385
1260 Separating Permanent and Induced Magnetic Signature: A Simple Approach

Authors: O. J. G. Somsen, G. P. M. Wagemakers

Abstract:

Magnetic signature detection provides sensitive detection of metal objects, especially in the natural environment. Our group is developing a tabletop setup for magnetic signatures of various small and model objects. A particular issue is the separation of permanent and induced magnetization. While the latter depends only on the composition and shape of the object, the former also depends on the magnetization history. With common deperming techniques, a significant permanent signature may still remain, which confuses measurements of the induced component. We investigate a basic technique of separating the two. Measurements were done by moving the object along an aluminum rail while the three field components are recorded by a detector attached near the center. This is done first with the rail parallel to the Earth magnetic field and then with anti-parallel orientation. The reversal changes the sign of the induced- but not the permanent magnetization so that the two can be separated. Our preliminary results on a small iron block show excellent reproducibility. A considerable permanent magnetization was indeed present, resulting in a complex asymmetric signature. After separation, a much more symmetric induced signature was obtained that can be studied in detail and compared with theoretical calculations.

Keywords: magnetic signature, data analysis, magnetization, deperming techniques

Procedia PDF Downloads 447
1259 Piezoelectric Actuator for Controlling Robotics Organs

Authors: Lemoussi Somia, Ouali Mohammed, Zemirline Adel

Abstract:

In precision engineering, including precision positioning, micro-manipulation, robotic systems... a majority of these applications actuated by piezo stack used the compliant amplifier mechanism to amplifying motion and guiding it as needed utilize the flexibility of their components, in this paper, we present a novel approach introducing a symmetric structure comprising three stages, featuring rectangular flexure hinges with a compact size of 77mm×42mm×10mm. This design provides the capability for rotation, translation or a combination of both movements in both directions. The system allows for a displacement of 2107.5 μm when the input displacement of PZT is 50 μm while considering the material constraints of the aluminum alloy (7075 T6) which has a maximum admissible stress of 500 MPa However, our proposed design imposes additional constraints to ensure the stress remains below 361 MPa for optimal performance. These findings were obtained through finite element simulations conducted using ANSYS Workbench. Furthermore, our module facilitates precise control of various components within robotic systems, allowing for adjustable speeds based on specific requirements or desired outcomes.

Keywords: robotic, piezoelectric, compliant mechanism, flexure hinge

Procedia PDF Downloads 73
1258 VANETs: Security Challenges and Future Directions

Authors: Jared Oluoch

Abstract:

Connected vehicles are equipped with wireless sensors that aid in Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I) communication. These vehicles will in the near future provide road safety, improve transport efficiency, and reduce traffic congestion. One of the challenges for connected vehicles is how to ensure that information sent across the network is secure. If security of the network is not guaranteed, several attacks can occur, thereby compromising the robustness, reliability, and efficiency of the network. This paper discusses existing security mechanisms and unique properties of connected vehicles. The methodology employed in this work is exploratory. The paper reviews existing security solutions for connected vehicles. More concretely, it discusses various cryptographic mechanisms available, and suggests areas of improvement. The study proposes a combination of symmetric key encryption and public key cryptography to improve security. The study further proposes message aggregation as a technique to overcome message redundancy. This paper offers a comprehensive overview of connected vehicles technology, its applications, its security mechanisms, open challenges, and potential areas of future research.

Keywords: VANET, connected vehicles, 802.11p, WAVE, DSRC, trust, security, cryptography

Procedia PDF Downloads 306
1257 Evaluating Forecasts Through Stochastic Loss Order

Authors: Wilmer Osvaldo Martinez, Manuel Dario Hernandez, Juan Manuel Julio

Abstract:

We propose to assess the performance of k forecast procedures by exploring the distributions of forecast errors and error losses. We argue that non systematic forecast errors minimize when their distributions are symmetric and unimodal, and that forecast accuracy should be assessed through stochastic loss order rather than expected loss order, which is the way it is customarily performed in previous work. Moreover, since forecast performance evaluation can be understood as a one way analysis of variance, we propose to explore loss distributions under two circumstances; when a strict (but unknown) joint stochastic order exists among the losses of all forecast alternatives, and when such order happens among subsets of alternative procedures. In spite of the fact that loss stochastic order is stronger than loss moment order, our proposals are at least as powerful as competing tests, and are robust to the correlation, autocorrelation and heteroskedasticity settings they consider. In addition, since our proposals do not require samples of the same size, their scope is also wider, and provided that they test the whole loss distribution instead of just loss moments, they can also be used to study forecast distributions as well. We illustrate the usefulness of our proposals by evaluating a set of real world forecasts.

Keywords: forecast evaluation, stochastic order, multiple comparison, non parametric test

Procedia PDF Downloads 84
1256 Planning the Journey of Unifying Medical Record Numbers in Five Facilities and the Expected Challenges: Case Study in Saudi Arabia

Authors: N. Al Khashan, H. Al Shammari, W. Al Bahli

Abstract:

Patients who are eligible to receive treatment at the National Guard Health Affairs (NGHA), Saudi Arabia will typically have four medical record numbers (MRN), one in each of the geographical areas. More hospitals and primary healthcare facilities in other geographical areas will launch soon which means more MRNs. When patients own four MRNs, this will cause major drawbacks in patients’ quality of care such as creating new medical files in different regions for relocated patients and using referral system among regions. Consequently, the access to a patient’s medical record from other regions and the interoperability of health information between the four hospitals’ information system would be challenging. Thus, there is a need to unify medical records among these five facilities. As part of the effort to increase the quality of care, a new Hospital Information Systems (HIS) was implemented in all NGHA facilities by the end of 2016. NGHA’s plan is put to be aligned with the Saudi Arabian national transformation program 2020; whereby 70% citizens and residents of Saudi Arabia would have a unified medical record number that enables transactions between multiple Electronic Medical Records (EMRs) vendors. The aim of the study is to explore the plan, the challenges and barriers of unifying the 4 MRNs into one Enterprise Patient Identifier (EPI) in NGHA hospitals by December 2018. A descriptive study methodology was used. A journey map and a project plan are created to be followed by the project team to ensure a smooth implementation of the EPI. It includes the following: 1) Approved project charter, 2) Project management plan, 3) Change management plan, 4) Project milestone dates. Currently, the HIS is using the regional MRN. Therefore, the HIS and all integrated health care systems in all regions will need modification to move from MRN to EPI without interfering with patient care. For now, the NGHA have successfully implemented an EPI connected with the 4 MRNs that work in the back end in the systems’ database.

Keywords: consumer health, health informatics, hospital information system, universal medical record number

Procedia PDF Downloads 189
1255 Prevalence of Gestational Diabetes Mellitus in Western Australia from 2015 until 2020

Authors: Kumaressan Ragunathan, Arisudhan Anantharachagan

Abstract:

Gestational diabetes mellitus (GDM) is the subtype of diabetes that has been rapidly increasing in numbers in Australia. The annual percentage of GDM has increased more than 50 percent in the last decade. According to Diabetes Australia, more than five hundred thousand women in Australia will be diagnosed with GDM. Globally, the prevalence of GDM ranges from single-digit to more than 45%. The prevalence of GDM has increased significantly last five years after the introduction of new diagnostic criteria. Hence, we have decided to investigate the trend in GDM prevalence in a tertiary maternity unit at Western Australia and compare it to national prevalence. Data is derived from STORK Perinatal Database which has been used by Maternity services in Western Australia to populate information on pregnancy and labour. We have selected data from 2015 until 2020, which includes 17508 women. Among 17508 women, 3850 women were diagnosed with GDM. In 2015, we had a total of 2213 deliveries with 345 of them were complicated by GDM. GDM prevalence was 15.6% compared to the Australian national prevalence of 12%. In 2016, total deliveries increased to 2759 with 590 of were with GDM. GDM prevalence was 21.4% compared to the Australian national prevalence of 12%. In 2017, total deliveries further increased to 3049 with 675 with GDM. GDM prevalence was 22.1%, with an Australian national prevalence of 13%. In 2018, total deliveries continued to increase, with numbers reaching 3231 with 749 with GDM. GDM prevalence was 23.2%, with an Australian National prevalence of 14%. In 2019, total deliveries were 3110, with 712 complicated by GDM. GDM prevalence was 22.9%, with Australian national prevalence 14%. In 2020, total deliveries 3146 with 819 complicated by GDM. GDM prevalence increased to 26% and we were unable to compare this to national standard as national prevalence has not been released. Among 3890 women with GDM, 2482 (64%) of them required insulin. Apart from that, a total 1642(42%) from the GDM group were delivered via the Caesarean section. 2121 (55%) women with GDM required induction of labour. Overall, we demonstrated an increase in the prevalence of GDM in our unit from 2015 until 2020. Our prevalence is also higher compared to national prevalence. This could be contributed by the increasing number of obesity and in addition, our unit accepts referrals of women with a body mass index (BMI) of more than 40. Hence, further studies are required to look at other risk factors like ethnicity, socio-economic status, health literacy and age, which could contribute to this high prevalence.

Keywords: gestational diabetes mellitus, prevalence, Western Australia, Australia

Procedia PDF Downloads 156
1254 Experimental Verification of On-Board Power Generation System for Vehicle Application

Authors: Manish Kumar, Krupa Shah

Abstract:

The usage of renewable energy sources is increased day by day to overcome the dependency on fossil fuels. The wind energy is considered as a prominent source of renewable energy. This paper presents an approach for utilizing wind energy obtained from moving the vehicle for cell-phone charging. The selection of wind turbine, blades, generator, etc. is done to have the most efficient system. The calculation procedure for power generated and drag force is shown to know the effectiveness of the proposal. The location of the turbine is selected such that the system remains symmetric, stable and has the maximum induced wind. The calculation of the generated power at different velocity is presented. The charging is achieved for the speed 30 km/h and the system works well till 60 km/h. The model proposed seems very useful for the people traveling long distances in the absence of mobile electricity. The model is very economical and easy to fabricate. It has very less weight and area that makes it portable and comfortable to carry along. The practical results are shown by implementing the portable wind turbine system on two-wheeler.

Keywords: cell-phone charging, on-board power generation, wind energy, vehicle

Procedia PDF Downloads 291
1253 Acute and Chronic Effect of Biopesticide on Infestation of Whitefly Bemisia tabaci (Gennadius) on the Culantro Cultivation

Authors: U. Pangnakorn, S. Chuenchooklin

Abstract:

Acute and chronic effects of biopesticide from entomopathogenic nematode (Steinernema thailandensis n. sp.), bacteria ISR (Pseudomonas fluorescens), wood vinegar and fermented organic substances from plants: (neem Azadirachta indica + citronella grass Cymbopogon nardus Rendle + bitter bush Chromolaena odorata L.) were tested on culantro (Eryngium foetidum L.). The biopesticide was investigated for infestation reduction of the major insect pest whitefly (Bemisia tabaci (Gennadius)). The experimental plots were located at a farm in Nakhon Sawan Province, Thailand. This study was undertaken during the drought season (late November to May). Effectiveness of the treatment was evaluated in terms of acute and chronic effect. The populations of whitefly were observed and recorded every hour up to 3 hours with insect nets and yellow sticky traps after the treatments were applied for the acute effect. The results showed that bacteria ISR had the highest effectiveness for controlling whitefly infestation on culantro; the whitefly numbers on insect nets were 12.5, 10.0 and 7.5 after 1 hr, 2 hr, and 3 hr, respectively while the whitefly on yellow sticky traps showed 15.0, 10.0 and 10.0 after 1 hr, 2 hr, and 3 hr, respectively. For chronic effect, the whitefly was continuously collected and recorded at weekly intervals; the result showed that treatment of bacteria ISR found the average whitefly numbers only 8.06 and 11.0 on insect nets and sticky traps respectively, followed by treatment of nematode where the average whitefly was 9.87 and 11.43 on the insect nets and sticky traps, respectively. In addition, the minor insect pests were also observed and collected. The biopesticide influenced the reduction number of minor insect pests (red spider mites, beet armyworm, short-horned grasshopper, pygmy locusts, etc.) with only a few found on the culantro cultivation.

Keywords: whitefly (Bemisia tabaci Gennadius), culantro (Eryngium foetidum L.), acute and chronic effect, entomopathogenic nematode (Steinernema thailandensis n. sp.), bacteria ISR (Pseudomonas fluorescens)

Procedia PDF Downloads 277
1252 Image Encryption Using Eureqa to Generate an Automated Mathematical Key

Authors: Halima Adel Halim Shnishah, David Mulvaney

Abstract:

Applying traditional symmetric cryptography algorithms while computing encryption and decryption provides immunity to secret keys against different attacks. One of the popular techniques generating automated secret keys is evolutionary computing by using Eureqa API tool, which got attention in 2013. In this paper, we are generating automated secret keys for image encryption and decryption using Eureqa API (tool which is used in evolutionary computing technique). Eureqa API models pseudo-random input data obtained from a suitable source to generate secret keys. The validation of generated secret keys is investigated by performing various statistical tests (histogram, chi-square, correlation of two adjacent pixels, correlation between original and encrypted images, entropy and key sensitivity). Experimental results obtained from methods including histogram analysis, correlation coefficient, entropy and key sensitivity, show that the proposed image encryption algorithms are secure and reliable, with the potential to be adapted for secure image communication applications.

Keywords: image encryption algorithms, Eureqa, statistical measurements, automated key generation

Procedia PDF Downloads 477