Search results for: intermediate input source
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7050

Search results for: intermediate input source

6990 Exploring the Correlation between Students' Performance in Educational Statistics and Research Methods in Education: The Influence of Undergraduate Programs

Authors: Justice Dadzie, Stacy H. Surman, Ruth K. Annan-Brew, Ifesinachi J. Ezugwu, Evans Addison

Abstract:

This study aimed to explore the correlation between students' performance in educational statistics and research methods in education, as well as investigate potential differences in performance based on their undergraduate programs. A cross-sectional design was employed, and data was collected from 170 students enrolled in master of philosophy programs in the department of education and psychology. The correlation analysis revealed a strong positive correlation between students' performance in intermediate statistics in education and research methods in education. This indicates a close relationship between the two domains. The MANOVA analysis showed no significant differences in the linear combination of intermediate statistics in education and research methods in education scores across the different undergraduate programs. The tests of between-subjects effects further confirmed that the student's performance in intermediate statistics in education and research methods in education did not differ significantly across the different undergraduate programs. These findings contribute to the existing literature by providing insights into the correlation between educational statistics and research methods, and the influence of undergraduate program backgrounds on students' performance in these domains. The strong positive correlation between intermediate statistics and research methods highlights the importance of a solid foundation in statistics for understanding and applying research methods. Moreover, the consistent relationship across different academic backgrounds emphasizes the need for targeted interventions and support systems to enhance graduate students' competencies in these critical areas.

Keywords: educational statistics, research methods, undergraduate programs, students performance

Procedia PDF Downloads 31
6989 Isolation and Identification of Sarcocystis suihominis in a Slaughtered Domestic Pig (Sus scrofa) in Benue State, Nigeria

Authors: H. I. Obadiah, S. N. Wieser, E. A. Omudu, B. O. Atu, O. Byanet, L. Schnittger, M. Florin-Christensen

Abstract:

Sarcocystis sp. are Apicomplexan protozoan parasites with a life cycle that involves a predator and a prey as final and intermediate hosts, respectively. In tissues of the intermediate hosts, the parasites produce sarcocysts that vary in size and morphology according to the species. When a suitable predator ingests sarcocyst-containing meat, the parasites are released in the intestine and undergo sexual reproduction producing infective sporocysts, which are excreted with the feces into the environment. The cycle is closed when a prey ingests sporocyst-contaminated water or pasture; the parasites gain access to the circulation, and eventually invade tissues and reproduce asexually yielding sarcocysts. Pig farming is a common practice in Nigeria as well as in many countries around the world. In addition to its importance as protein source, pork is also a source of several pathogens relevant to humans. In the case of Sarcocystis, three species have been described both in domestic and wild pigs, namely, S. miescheriana, S. porcifelis and S. suihominis. Humans can act both as final and aberrant intermediate hosts of S. suihominis, after ingesting undercooked sarcocyst-infested pork. Infections are usually asymptomatic but can be associated with inappetence, nausea, vomiting and diarrhea, or with muscle pain, fever, eosinophilia and bronchospasm, in humans acting as final or intermediate hosts, respectively. Moreover, excretion of infective forms with human feces leads to further dissemination of the infection. In this study, macroscopic sarcocysts of white color, oval shape and a size range of approximately 3-5 mm were observed in the skeletal muscle of a slaughtered pig in an abattoir in Makurdi, Benue State, Nigeria, destined to human consumption. Sarcocysts were excised and washed in distilled water, and genomic DNA was extracted using a commercial kit. The near-complete length of the 18S rRNA gene was analyzed after PCR amplification of two overlapping fragments, each of which were submitted to direct sequencing. In addition, the mitochondrial cytochrome oxidase (cox-1) gene was PCR-amplified and directly sequenced. Two phylogenetic trees containing the obtained sequences along with available relevant 18S rRNA and cox-1 sequences were constructed by neighbor joining after alignment, using the corresponding sequences of Toxoplasma gondii as outgroup. The results showed in both cases that the analyzed sequences grouped with S. suihominis with high bootstrap value, confirming the identity of this macroscopic sarcocyst-forming parasite as S. suihominis. To the best of our knowledge, these results represent the first demonstration of this parasite in pigs of Nigeria and the largest sarcocysts described so far for S. suihominis. The close proximity between pigs and humans in pig farms, and the frequent poor sanitary conditions in human dwellings strongly suggest that the parasite undergoes the sexual stages of its life cycle in humans as final hosts. These findings provide an important reference for the examination and control of Sarcocystis species in pigs of Nigeria.

Keywords: nigeria, pork, sarcocystis suihominis, zoonotic parasite

Procedia PDF Downloads 73
6988 A Second Law Assessment of Organic Rankine Cycle Depending on Source Temperature

Authors: Kyoung Hoon Kim

Abstract:

Organic Rankine Cycle (ORC) has potential in reducing fossil fuels and relaxing environmental problems. In this work performance analysis of ORC is conducted based on the second law of thermodynamics for recovery of low temperature heat source from 100°C to 140°C using R134a as the working fluid. Effects of system parameters such as turbine inlet pressure or source temperature are theoretically investigated on the exergy destructions (anergies) at various components of the system as well as net work production or exergy efficiency. Results show that the net work or exergy efficiency has a peak with respect to the turbine inlet pressure when the source temperature is low, however, increases monotonically with increasing turbine inlet pressure when the source temperature is high.

Keywords: Organic Rankine Cycle (ORC), low temperature heat source, exergy, source temperature

Procedia PDF Downloads 440
6987 Learning Algorithms for Fuzzy Inference Systems Composed of Double- and Single-Input Rule Modules

Authors: Hirofumi Miyajima, Kazuya Kishida, Noritaka Shigei, Hiromi Miyajima

Abstract:

Most of self-tuning fuzzy systems, which are automatically constructed from learning data, are based on the steepest descent method (SDM). However, this approach often requires a large convergence time and gets stuck into a shallow local minimum. One of its solutions is to use fuzzy rule modules with a small number of inputs such as DIRMs (Double-Input Rule Modules) and SIRMs (Single-Input Rule Modules). In this paper, we consider a (generalized) DIRMs model composed of double and single-input rule modules. Further, in order to reduce the redundant modules for the (generalized) DIRMs model, pruning and generative learning algorithms for the model are suggested. In order to show the effectiveness of them, numerical simulations for function approximation, Box-Jenkins and obstacle avoidance problems are performed.

Keywords: Box-Jenkins's problem, double-input rule module, fuzzy inference model, obstacle avoidance, single-input rule module

Procedia PDF Downloads 341
6986 Optimisation of the Input Layer Structure for Feedforward Narx Neural Networks

Authors: Zongyan Li, Matt Best

Abstract:

This paper presents an optimization method for reducing the number of input channels and the complexity of the feed-forward NARX neural network (NN) without compromising the accuracy of the NN model. By utilizing the correlation analysis method, the most significant regressors are selected to form the input layer of the NN structure. An application of vehicle dynamic model identification is also presented in this paper to demonstrate the optimization technique and the optimal input layer structure and the optimal number of neurons for the neural network is investigated.

Keywords: correlation analysis, F-ratio, levenberg-marquardt, MSE, NARX, neural network, optimisation

Procedia PDF Downloads 355
6985 Sectoral Linkages and Key Sectors of the Georgian Economy

Authors: Vano Benidze, Ioseb Berikashvili

Abstract:

Since 2003, Georgia has implemented many successful reforms, however, economic growth, poverty alleviation and unemployment reduction are still major challenges facing country’s economy. This is due to the fact that most reforms during the past 2 decades were mainly geared toward improving the institutional environment, while economy’s sectoral composition and industrial policy were largely ignored. Each individual sector plays its own specific role in the functioning of the whole economy that cannot be accomplished by any other sector. However, given the unavoidable reality that one sector uses intermediate inputs from other industries to produce its output and sells part of its output to other sectors, the importance of sectors should consider these sectoral interdependencies as well. Simply put, not all industries are equally useful for economic growth and development. In this context, the aim of this paper is to identify the key economic sectors of the Georgian economy. Leontief input-output analysis has been used in deriving backward and forwards linkages for all sectors in the Georgian economy for 2020 and 2021. Sectors with both high backward and forward linkages have been identified as key sectors of the economy. The results obtained are beneficial for the success of the economic and industrial policy of Georgia. If targeted properly by thoughtful policy intervention, key sectors identified in this paper will have a high potential of spreading growth impulses throughout the economy and will possibly generate higher economic growth.

Keywords: structural change, key sectors, development strategies, input-output analysis

Procedia PDF Downloads 65
6984 Studies on Lucrative Process Layout for Medium Scale Industries

Authors: Balamurugan Baladhandapani, Ganesh Renganathan, V. R. Sanal Kumar

Abstract:

In this paper a comprehensive review on various factory layouts has been carried out for designing a lucrative process layout for medium scale industries. Industry data base reveals that the end product rejection rate is on the order of 10% amounting large profit loss. In order to avoid these rejection rates and to increase the quality product production an intermediate non-destructive testing facility (INDTF) has been recommended for increasing the overall profit. We observed through detailed case studies that while introducing INDTF to medium scale industries the expensive production process can be avoided to the defective products well before its final shape. Additionally, the defective products identified during the intermediate stage can be effectively utilized for other applications or recycling; thereby the overall wastage of the raw materials can be reduced and profit can be increased. We concluded that the prudent design of a factory layout through critical path method facilitating with INDTF will warrant profitable outcome.

Keywords: intermediate non-destructive testing, medium scale industries, process layout design

Procedia PDF Downloads 490
6983 Emergence of Ciprofloxacin Intermediate Susceptible Salmonella Typhi in India

Authors: Meenakshi Chaudhary, V .S. Randhawa, M. Jais, R. Dutta

Abstract:

Introduction: An outbreak of Multi drug resistant S. Typhi (i.e. resistance to chloramphenicol, ampicillin, and trimethoprim-sulfamethoxazole) occurred in 1990's in India which peaked in 1992-93 and resulted in the change of drug of choice from chloramphenicol to ciprofloxacin for enteric fever. Currently an emergence of Ciprofloxacin susceptible S. Typhi isolates in the region is being reported which appears to be chromosomally mediated. Methodology: Six hundred sixty four strains were randomly selected from the time period between January 2008-December 2011 at the National Salmonella Phage Typing Centre, LHMC, New Delhi. The strains were representative of the north, central and south zones of India. All isolates were subjected to serotyping, biotyping, phage typing and then to antimicrobial susceptibility testing by CLSI disk diffusion (CLSI) technique to Ciprofloxacin, Cefotaxime, Ampicillin, Chloramphenicol, Trimethoprim-Sulfomethoxazole and Tetracycline. Subsequently MIC of the isolates was determined by E-test (AB-Biodisc). Results: More than 80% of the tested strains had intermediate susceptibility to ciprofloxacin. The E test revealed the MIC (Ciprofloxacin) of these strains to be in the range of 0.12 to 0.5 µg/ml. Sixty nine percent of ciprofloxacin intermediate susceptible strains belonged to Phage type E1 and fourteen percent of these were Vi- Negative i.e these could not be typed by the phage typing scheme of Craigie and Yen. All the strains remained susceptible to cefotaxime. Conclusion: Predominant isolation of intermediate susceptible S. Typhi strains from India would alter the recommendations of empiric treatment of enteric fever in the region. Alternative to the low cost ciprofloxacin will have to be sought or increased dosage and/or duration of ciprofloxacin will have to be recommended. The reasons for the trend of increase in percentage of intermediate susceptible S. Typhi strains are not clear but may be attributed partly to the revision of CLSI guidelines in 2013.

Keywords: salmonella typhi, decreased ciprofloxacin susceptibility, ciprofloxacin, minimum inhibitory concentration

Procedia PDF Downloads 303
6982 The Exploration Targets of the Nanpu Sag: Insight from Organic Geochemical Characteristics of Source Rocks and Oils

Authors: Lixin Pei, Zhilong Huang, Wenzhe Gang

Abstract:

Organic geochemistry of source rocks and oils in the Nanpu Sag, Bohai Bay basin was studied on the basis of the results of Rock-Eval and biomarker. The possible source rocks consist of the third member (Es₃) and the first member (Es₁) of Shahejie formation and the third member of Dongying Formation (Ed₃) in the Nanpu Sag. The Es₃, Es₁, and Ed₃ source rock intervals in the Nanpu Sag all have high organic-matter richness and are at hydrocarbon generating stage, which are regarded as effective source rocks. The three possible source rock intervals have different biomarker associations and can be differentiated by gammacerane/αβ C₃₀ hopane, ETR ([C₂₈+C₂₉]/ [C₂₈+C₂₉+Ts]), C₂₇ diasterane/sterane and C₂₇/C₂₉ steranes, which suggests they deposited in different environments. Based on the oil-source rock correlation, the shallow oils mainly originated from the Es₃ and Es₁ source rocks in the Nanpu Sag. Through hydrocarbon generation and expulsion history of the source rocks, trap development history and accumulation history, the shallow oils mainly originated from paleo-reservoirs in the Es₃ and Es₁ during the period of Neotectonism, and the residual paleo-reservoirs in the Es₃ and Es₁ would be the focus targets in the Nanpu Sag; Bohai Bay Basin.

Keywords: source rock, biomarker association, Nanpu Sag, Bohai Bay Basin

Procedia PDF Downloads 361
6981 Behavior of Iran Stock Exchange and Impacts of US Oil and Financial Markets

Authors: Erfan Memarian, Seyyed Fazayel Alizadeh

Abstract:

This study aims to evaluate the impacts of the oil and financial markets of the United States on Iran stock exchange and to develop an ARDL model to predict the short and long-term relationship between these markets. In this regard, all 713 weekly data between 28 July 1999 and 20 March 2013 were analyzed by using Microfit4.0 and Eviews7 econometric softwares. The independent variable of the study is the “Price and Yield Index (TEDPIX)” of Tehran Stock Exchange and the independent variables include S & P 500 Index, the US three-month treasury bill rate and West Texas Intermediate oil spot price index. The results show that the West Texas Intermediate oil spot price and the S&P 500 indices have significant positive relationships with Iran's TEDPIX. Also, there exists a significant negative relationship between Iran's TEDPIX and the US three-month Treasury bill rate.

Keywords: TEDPIX; Tehran Stock Exchange; S&P 500 index; USA three-month Treasury bill rate; West Texas Intermediate oil

Procedia PDF Downloads 313
6980 A Method for Quantitative Assessment of the Dependencies between Input Signals and Output Indicators in Production Systems

Authors: Maciej Zaręba, Sławomir Lasota

Abstract:

Knowing the degree of dependencies between the sets of input signals and selected sets of indicators that measure a production system's effectiveness is of great importance in the industry. This paper introduces the SELM method that enables the selection of sets of input signals, which affects the most the selected subset of indicators that measures the effectiveness of a production system. For defined set of output indicators, the method quantifies the impact of input signals that are gathered in the continuous monitoring production system.

Keywords: manufacturing operation management, signal relationship, continuous monitoring, production systems

Procedia PDF Downloads 100
6979 Effect of Welding Heat Input on Intergranular Corrosion of Inconel 625 Overlay Weld Metal

Authors: Joon-Suk Kim, Hae-Woo Lee

Abstract:

This study discusses the effect of welding heat input on intergranular corrosion of the weld metal of Inconel 625 alloy. A specimen of Inconel 625 with a weld metal that controlled welding heat input was manufactured, and aging heat treatment was conducted to investigate sensitization by chromium carbides. The electrochemical SL and DL EPR experiments, together with the chemical ferric sulfate-sulfuric acid and nitric acid tests, were conducted to determine intergranular corrosion susceptibility between the specimens. In the SL and DL EPR experiments, specimens were stabilized in the weld metal, and therefore intergranular corrosion susceptibility could not be determined. However, in the ferric sulfate-sulfuric acid and nitric acid tests, the corrosion speed increased as heat input increased. This was because the amount of diluted Fe increased as the welding heat input increased, leading to microsegregation between the dendrites, which had a negative effect on the corrosion resistance.

Keywords: Inconel 625, weling, overlay, heat input, intergranular corrosion

Procedia PDF Downloads 346
6978 Business Continuity Risk Review for a Large Petrochemical Complex

Authors: Michel A. Thomet

Abstract:

A discrete-event simulation model was used to perform a Reliability-Availability-Maintainability (RAM) study of a large petrochemical complex which included sixteen process units, and seven feeds and intermediate streams. All the feeds and intermediate streams have associated storage tanks, so that if a processing unit fails and shuts down, the downstream units can keep producing their outputs. This also helps the upstream units which do not have to reduce their outputs, but can store their excess production until the failed unit restart. Each process unit and each pipe section carrying the feeds and intermediate streams has a probability of failure with an associated distribution and a Mean Time Between Failure (MTBF), as well as a distribution of the time to restore and a Mean Time To Restore (MTTR). The utilities supporting the process units can also fail and have their own distributions with specific MTBF and MTTR. The model runs are for ten years or more and the runs are repeated several times to obtain statistically relevant results. One of the main results is the On-Stream factor (OSF) of each process unit (percent of hours in a year when the unit is running in nominal conditions). One of the objectives of the study was to investigate if the storage capacity of each of the feeds and the intermediate stream was adequate. This was done by increasing the storage capacities in several steps and through running the simulation to see if the OSF were improved and by how much. Other objectives were to see if the failure of the utilities were an important factor in the overall OSF, and what could be done to reduce their failure rates through redundant equipment.

Keywords: business continuity, on-stream factor, petrochemical, RAM study, simulation, MTBF

Procedia PDF Downloads 204
6977 Economic Analysis of Endogenous Growth Model with ICT Capital

Authors: Shoji Katagiri, Hugang Han

Abstract:

This paper clarifies the role of ICT capital in Economic Growth. Albeit ICT remarkably contributes to economic growth, there are few studies on ICT capital in ICT sector from theoretical point of view. In this paper, production function of ICT which is used as input of intermediate good in final good and ICT sectors is incorporated into our model. In this setting, we analyze the role of ICT on balance growth path and show the possibility of general equilibrium solutions for this model. Through the simulation of the equilibrium solutions, we find that when ICT impacts on economy and economic growth increases, it is necessary that increases of efficiency at ICT sector and of accumulation of non-ICT and ICT capitals occur simultaneously.

Keywords: endogenous economic growth, ICT, intensity, capital accumulation

Procedia PDF Downloads 441
6976 A Data Envelopment Analysis Model in a Multi-Objective Optimization with Fuzzy Environment

Authors: Michael Gidey Gebru

Abstract:

Most of Data Envelopment Analysis models operate in a static environment with input and output parameters that are chosen by deterministic data. However, due to ambiguity brought on shifting market conditions, input and output data are not always precisely gathered in real-world scenarios. Fuzzy numbers can be used to address this kind of ambiguity in input and output data. Therefore, this work aims to expand crisp Data Envelopment Analysis into Data Envelopment Analysis with fuzzy environment. In this study, the input and output data are regarded as fuzzy triangular numbers. Then, the Data Envelopment Analysis model with fuzzy environment is solved using a multi-objective method to gauge the Decision Making Units' efficiency. Finally, the developed Data Envelopment Analysis model is illustrated with an application on real data 50 educational institutions.

Keywords: efficiency, Data Envelopment Analysis, fuzzy, higher education, input, output

Procedia PDF Downloads 34
6975 A Graph Theoretic Algorithm for Bandwidth Improvement in Computer Networks

Authors: Mehmet Karaata

Abstract:

Given two distinct vertices (nodes) source s and target t of a graph G = (V, E), the two node-disjoint paths problem is to identify two node-disjoint paths between s ∈ V and t ∈ V . Two paths are node-disjoint if they have no common intermediate vertices. In this paper, we present an algorithm with O(m)-time complexity for finding two node-disjoint paths between s and t in arbitrary graphs where m is the number of edges. The proposed algorithm has a wide range of applications in ensuring reliability and security of sensor, mobile and fixed communication networks.

Keywords: disjoint paths, distributed systems, fault-tolerance, network routing, security

Procedia PDF Downloads 426
6974 Half Dose Tissue Plasminogen Activator for Intermediate-Risk Pulmonary Embolism

Authors: Macie Matta, Ahmad Jabri, Stephanie Jackson

Abstract:

Introduction: In the absence of hypotension, pulmonary embolism (PE) causing right ventricular dysfunction or strain, whether confirmed by imaging or cardiac biomarkers, is deemed to be an intermediate-risk category. Urgent treatment of intermediate-risk PE can prevent progression to hemodynamic instability and death. Management options include thrombolysis, thrombectomy, or systemic anticoagulation. We aim to evaluate the short-term outcomes of a half-dose tissue plasminogen activator (tPA) for the management of intermediate-risk PE. Methods: We retrospectively identified adult patients diagnosed with intermediate-risk PE between the years 2000 and 2021. Demographic data, lab values, imaging, treatment choice, and outcomes were all obtained through chart review. Primary outcomes measured include major bleeding events and in-hospital mortality. Patients on standard systemic anticoagulation without receiving thrombolysis or thrombectomy served as controls. Patient data were analyzed using SAS®️ Software (version 9.4; Cary, NC) to compare individuals that received half-dose tPA with controls, and statistical significance was set at a p-value of 0.05. Results: We included 57 patients in our final analysis, with 19 receiving tPA. Patient characteristics and comorbidities were comparable between both groups. There was a significant difference between PE location, presence of acute deep vein thrombosis, and peak troponin level between both groups. The thrombolytic cohort was more likely to demonstrate a 60/60 sign and thrombus in transit finding on echocardiography than controls. The thrombolytic group was more likely to have major bleeding (17% vs 7.9%, p= 0.4) and in-hospital mortality (5.3% vs 0%, p=0.3); however, this was not statistically significant. Patients who received half-dose tPA had non-significantly higher rates of major bleeding and in-hospital mortality. Larger scale, randomized control trials are needed to establish the benefit and safety of thrombolytics in patients with intermediate-risk PE.

Keywords: pulmonary embolism, half dose thrombolysis, tissue plasminogen activator, cardiac biomarkers, echocardiographic findings, major bleeding event

Procedia PDF Downloads 61
6973 The Complexity of Testing Cryptographic Devices on Input Faults

Authors: Alisher Ikramov, Gayrat Juraev

Abstract:

The production of logic devices faces the occurrence of faults during manufacturing. This work analyses the complexity of testing a special type of logic device on inverse, adhesion, and constant input faults. The focus of this work is on devices that implement cryptographic functions. The complexity values for the general case faults and for some frequently occurring subsets were determined and proved in this work. For a special case, when the length of the text block is equal to the length of the key block, the complexity of testing is proven to be asymptotically half the complexity of testing all logic devices on the same types of input faults.

Keywords: complexity, cryptographic devices, input faults, testing

Procedia PDF Downloads 207
6972 An Introductory Study on Optimization Algorithm for Movable Sensor Network-Based Odor Source Localization

Authors: Yossiri Ariyakul, Piyakiat Insom, Poonyawat Sangiamkulthavorn, Takamichi Nakamoto

Abstract:

In this paper, the method of optimization algorithm for sensor network comprised of movable sensor nodes which can be used for odor source localization was proposed. A sensor node is composed of an odor sensor, an anemometer, and a wireless communication module. The odor intensity measured from the sensor nodes are sent to the processor to perform the localization based on optimization algorithm by which the odor source localization map is obtained as a result. The map can represent the exact position of the odor source or show the direction toward it remotely. The proposed method was experimentally validated by creating the odor source localization map using three, four, and five sensor nodes in which the accuracy to predict the position of the odor source can be observed.

Keywords: odor sensor, odor source localization, optimization, sensor network

Procedia PDF Downloads 288
6971 Forensic Challenges in Source Device Identification for Digital Videos

Authors: Mustapha Aminu Bagiwa, Ainuddin Wahid Abdul Wahab, Mohd Yamani Idna Idris, Suleman Khan

Abstract:

Video source device identification has become a problem of concern in numerous domains especially in multimedia security and digital investigation. This is because videos are now used as evidence in legal proceedings. Source device identification aim at identifying the source of digital devices using the content they produced. However, due to affordable processing tools and the influx in digital content generating devices, source device identification is still a major problem within the digital forensic community. In this paper, we discuss source device identification for digital videos by identifying techniques that were proposed in the literature for model or specific device identification. This is aimed at identifying salient open challenges for future research.

Keywords: video forgery, source camcorder, device identification, forgery detection

Procedia PDF Downloads 615
6970 ANN Based Simulation of PWM Scheme for Seven Phase Voltage Source Inverter Using MATLAB/Simulink

Authors: Mohammad Arif Khan

Abstract:

This paper analyzes and presents the development of Artificial Neural Network based controller of space vector modulation (ANN-SVPWM) for a seven-phase voltage source inverter. At first, the conventional method of producing sinusoidal output voltage by utilizing six active and one zero space vectors are used to synthesize the input reference, is elaborated and then new PWM scheme called Artificial Neural Network Based PWM is presented. The ANN based controller has the advantage of the very fast implementation and analyzing the algorithms and avoids the direct computation of trigonometric and non-linear functions. The ANN controller uses the individual training strategy with the fixed weight and supervised models. A computer simulation program has been developed using Matlab/Simulink together with the neural network toolbox for training the ANN-controller. A comparison of the proposed scheme with the conventional scheme is presented based on various performance indices. Extensive Simulation results are provided to validate the findings.

Keywords: space vector PWM, total harmonic distortion, seven-phase, voltage source inverter, multi-phase, artificial neural network

Procedia PDF Downloads 442
6969 Calculation of Detection Efficiency of Horizontal Large Volume Source Using Exvol Code

Authors: M. Y. Kang, Euntaek Yoon, H. D. Choi

Abstract:

To calculate the full energy (FE) absorption peak efficiency for arbitrary volume sample, we developed and verified the EXVol (Efficiency calculator for EXtended Voluminous source) code which is based on effective solid angle method. EXVol is possible to describe the source area as a non-uniform three-dimensional (x, y, z) source. And decompose and set it into several sets of volume units. Users can equally divide (x, y, z) coordinate system to calculate the detection efficiency at a specific position of a cylindrical volume source. By determining the detection efficiency for differential volume units, the total radiative absolute distribution and the correction factor of the detection efficiency can be obtained from the nondestructive measurement of the source. In order to check the performance of the EXVol code, Si ingot of 20 cm in diameter and 50 cm in height were used as a source. The detector was moved at the collimation geometry to calculate the detection efficiency at a specific position and compared with the experimental values. In this study, the performance of the EXVol code was extended to obtain the detection efficiency distribution at a specific position in a large volume source.

Keywords: attenuation, EXVol, detection efficiency, volume source

Procedia PDF Downloads 171
6968 Analysis on Prediction Models of TBM Performance and Selection of Optimal Input Parameters

Authors: Hang Lo Lee, Ki Il Song, Hee Hwan Ryu

Abstract:

An accurate prediction of TBM(Tunnel Boring Machine) performance is very difficult for reliable estimation of the construction period and cost in preconstruction stage. For this purpose, the aim of this study is to analyze the evaluation process of various prediction models published since 2000 for TBM performance, and to select the optimal input parameters for the prediction model. A classification system of TBM performance prediction model and applied methodology are proposed in this research. Input and output parameters applied for prediction models are also represented. Based on these results, a statistical analysis is performed using the collected data from shield TBM tunnel in South Korea. By performing a simple regression and residual analysis utilizinFg statistical program, R, the optimal input parameters are selected. These results are expected to be used for development of prediction model of TBM performance.

Keywords: TBM performance prediction model, classification system, simple regression analysis, residual analysis, optimal input parameters

Procedia PDF Downloads 297
6967 Acquisition of French (L3) Direct Object by Persian (L1) Speakers of English (L2) as EFL Learners

Authors: Ali Akbar Jabbari

Abstract:

The present study assessed the acquisition of L3 French direct objects by Persian speakers who had already learned English as their L2. The ultimate goal of this paper is to extend the current knowledge about the CLI phenomenon in the realm of third language acquisition by examining the role of Persian and English as background languages and learners’ English level of proficiency in their performance on French direct object. To fulfill this, the assumptions of three L3 hypotheses, namely L1 Transfer, L2 Status Factor, and Cumulative Enhancement Model, were examined. The research sample was comprised of 40 undergraduate students in the fields of English language and literature and translation studies at Birjand University in Iran. According to the English proficiency level of learners revealed by the Quick Oxford English Placement test, the participants were grouped as upper intermediate and lower intermediate. A grammaticality judgment and a translation test were administered to gather the required data on learners' comprehension and production of the desired structure in French. It was demonstrated that the rate of positive transfer from previously learned languages was more potent than the rate of negative transfer. A Comparison of groups' performances revealed a significant difference between upper and lower intermediate groups in positing French direct objects correctly. However, the upper intermediate group did not significantly differ from the lower intermediate group in negative transfer. It can be said that by increasing the L2 proficiency of the learners, they could use their previous linguistic knowledge more efficiently. Although further examinations are needed, the current study contributed to a better characterization of cross-linguistic influence in third language acquisition. The findings help French teachers and learners to positively exploit the prior knowledge of Persian and English and apply it in in the multilingual context of French direct object's teaching and learning process.

Keywords: Cross-Linguistic Influence, Persian, French & English Direct Object, Third Language Acquisition, Language Transfer

Procedia PDF Downloads 60
6966 Feature Engineering Based Detection of Buffer Overflow Vulnerability in Source Code Using Deep Neural Networks

Authors: Mst Shapna Akter, Hossain Shahriar

Abstract:

One of the most important challenges in the field of software code audit is the presence of vulnerabilities in software source code. Every year, more and more software flaws are found, either internally in proprietary code or revealed publicly. These flaws are highly likely exploited and lead to system compromise, data leakage, or denial of service. C and C++ open-source code are now available in order to create a largescale, machine-learning system for function-level vulnerability identification. We assembled a sizable dataset of millions of opensource functions that point to potential exploits. We developed an efficient and scalable vulnerability detection method based on deep neural network models that learn features extracted from the source codes. The source code is first converted into a minimal intermediate representation to remove the pointless components and shorten the dependency. Moreover, we keep the semantic and syntactic information using state-of-the-art word embedding algorithms such as glove and fastText. The embedded vectors are subsequently fed into deep learning networks such as LSTM, BilSTM, LSTM-Autoencoder, word2vec, BERT, and GPT-2 to classify the possible vulnerabilities. Furthermore, we proposed a neural network model which can overcome issues associated with traditional neural networks. Evaluation metrics such as f1 score, precision, recall, accuracy, and total execution time have been used to measure the performance. We made a comparative analysis between results derived from features containing a minimal text representation and semantic and syntactic information. We found that all of the deep learning models provide comparatively higher accuracy when we use semantic and syntactic information as the features but require higher execution time as the word embedding the algorithm puts on a bit of complexity to the overall system.

Keywords: cyber security, vulnerability detection, neural networks, feature extraction

Procedia PDF Downloads 72
6965 An Active Rectifier with Time-Domain Delay Compensation to Enhance the Power Conversion Efficiency

Authors: Shao-Ku Kao

Abstract:

This paper presents an active rectifier with time-domain delay compensation to enhance the efficiency. A delay calibration circuit is designed to convert delay time to voltage and adaptive control on/off delay in variable input voltage. This circuit is designed in 0.18 mm CMOS process. The input voltage range is from 2 V to 3.6 V with the output voltage from 1.8 V to 3.4 V. The efficiency can maintain more than 85% when the load from 50 Ω ~ 1500 Ω for 3.6 V input voltage. The maximum efficiency is 92.4 % at output power to be 38.6 mW for 3.6 V input voltage.

Keywords: wireless power transfer, active diode, delay compensation, time to voltage converter, PCE

Procedia PDF Downloads 264
6964 Using Classifiers to Predict Student Outcome at Higher Institute of Telecommunication

Authors: Fuad M. Alkoot

Abstract:

We aim at highlighting the benefits of classifier systems especially in supporting educational management decisions. The paper aims at using classifiers in an educational application where an outcome is predicted based on given input parameters that represent various conditions at the institute. We present a classifier system that is designed using a limited training set with data for only one semester. The achieved system is able to reach at previously known outcomes accurately. It is also tested on new input parameters representing variations of input conditions to see its prediction on the possible outcome value. Given the supervised expectation of the outcome for the new input we find the system is able to predict the correct outcome. Experiments were conducted on one semester data from two departments only, Switching and Mathematics. Future work on other departments with larger training sets and wider input variations will show additional benefits of classifier systems in supporting the management decisions at an educational institute.

Keywords: machine learning, pattern recognition, classifier design, educational management, outcome estimation

Procedia PDF Downloads 265
6963 Analysis of Joint Source Channel LDPC Coding for Correlated Sources Transmission over Noisy Channels

Authors: Marwa Ben Abdessalem, Amin Zribi, Ammar Bouallègue

Abstract:

In this paper, a Joint Source Channel coding scheme based on LDPC codes is investigated. We consider two concatenated LDPC codes, one allows to compress a correlated source and the second to protect it against channel degradations. The original information can be reconstructed at the receiver by a joint decoder, where the source decoder and the channel decoder run in parallel by transferring extrinsic information. We investigate the performance of the JSC LDPC code in terms of Bit-Error Rate (BER) in the case of transmission over an Additive White Gaussian Noise (AWGN) channel, and for different source and channel rate parameters. We emphasize how JSC LDPC presents a performance tradeoff depending on the channel state and on the source correlation. We show that, the JSC LDPC is an efficient solution for a relatively low Signal-to-Noise Ratio (SNR) channel, especially with highly correlated sources. Finally, a source-channel rate optimization has to be applied to guarantee the best JSC LDPC system performance for a given channel.

Keywords: AWGN channel, belief propagation, joint source channel coding, LDPC codes

Procedia PDF Downloads 348
6962 Topological Sensitivity Analysis for Reconstruction of the Inverse Source Problem from Boundary Measurement

Authors: Maatoug Hassine, Mourad Hrizi

Abstract:

In this paper, we consider a geometric inverse source problem for the heat equation with Dirichlet and Neumann boundary data. We will reconstruct the exact form of the unknown source term from additional boundary conditions. Our motivation is to detect the location, the size and the shape of source support. We present a one-shot algorithm based on the Kohn-Vogelius formulation and the topological gradient method. The geometric inverse source problem is formulated as a topology optimization one. A topological sensitivity analysis is derived from a source function. Then, we present a non-iterative numerical method for the geometric reconstruction of the source term with unknown support using a level curve of the topological gradient. Finally, we give several examples to show the viability of our presented method.

Keywords: geometric inverse source problem, heat equation, topological optimization, topological sensitivity, Kohn-Vogelius formulation

Procedia PDF Downloads 289
6961 The Effect of Using Mobile Listening Applications on Listening Skills of Iranian Intermediate EFL Learners

Authors: Mahmoud Nabilu

Abstract:

The present study explored the effect of using Mobile listening applications on developing listening skills by Iranian intermediate EFL learners. Fifty male intermediate English learners whose age range was between 15 and 20, participated in the study. The participants were placed in two groups on the basis of their scores on a placement test. Therefore, the participants of the study were homogenized in terms of general proficiency, and groups were assigned as one experimental group and one control group. The experimental group was instructed by the treatment which was using mobile applications to develop their listening skills while the control group received traditional methods. The research data were obtained from the 40-item multiple-choice tests as a pre-test and a post-test. The results of the t-test clearly revealed that the learners in the experimental group performed better in the post-test than the pre-test. This implies that using a mobile application for developing listening skills as a treatment was effective in helping the language learners perform better on post-test. However, a statistically significant difference was found between the post-tests scores of the two groups. The mean of the experimental group was greater compared to the control group. The participants were Iranian and from an Iranian Language Institute, so care should be taken while generalizing the results to the learners of other nationalities. However, in the researcher's view, the findings of this study have valuable implications for teachers and learners, methodologists and syllabus designers, linguists and MALL/CALL (mobile/computer-assisted language learning) experts. Using the result of the present paper is an aim of raising the consciousness of a better technique of developing listening skills in order to make language learning more efficient for the learners.

Keywords: Mobile listening applications, intermediate EFL learners, MALL, CALL

Procedia PDF Downloads 181