Search results for: mathematical cognition
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2141

Search results for: mathematical cognition

1211 A Method and System for Secure Authentication Using One Time QR Code

Authors: Divyans Mahansaria

Abstract:

User authentication is an important security measure for protecting confidential data and systems. However, the vulnerability while authenticating into a system has significantly increased. Thus, necessary mechanisms must be deployed during the process of authenticating a user to safeguard him/her from the vulnerable attacks. The proposed solution implements a novel authentication mechanism to counter various forms of security breach attacks including phishing, Trojan horse, replay, key logging, Asterisk logging, shoulder surfing, brute force search and others. QR code (Quick Response Code) is a type of matrix barcode or two-dimensional barcode that can be used for storing URLs, text, images and other information. In the proposed solution, during each new authentication request, a QR code is dynamically generated and presented to the user. A piece of generic information is mapped to plurality of elements and stored within the QR code. The mapping of generic information with plurality of elements, randomizes in each new login, and thus the QR code generated for each new authentication request is for one-time use only. In order to authenticate into the system, the user needs to decode the QR code using any QR code decoding software. The QR code decoding software needs to be installed on handheld mobile devices such as smartphones, personal digital assistant (PDA), etc. On decoding the QR code, the user will be presented a mapping between the generic piece of information and plurality of elements using which the user needs to derive cipher secret information corresponding to his/her actual password. Now, in place of the actual password, the user will use this cipher secret information to authenticate into the system. The authentication terminal will receive the cipher secret information and use a validation engine that will decipher the cipher secret information. If the entered secret information is correct, the user will be provided access to the system. Usability study has been carried out on the proposed solution, and the new authentication mechanism was found to be easy to learn and adapt. Mathematical analysis of the time taken to carry out brute force attack on the proposed solution has been carried out. The result of mathematical analysis showed that the solution is almost completely resistant to brute force attack. Today’s standard methods for authentication are subject to a wide variety of software, hardware, and human attacks. The proposed scheme can be very useful in controlling the various types of authentication related attacks especially in a networked computer environment where the use of username and password for authentication is common.

Keywords: authentication, QR code, cipher / decipher text, one time password, secret information

Procedia PDF Downloads 268
1210 The Effect of Reminiscence Therapy with Ethernet-Based Videos on Cognition and Apathy in Elderly with Mild Dementia

Authors: Ayse Inel Manav, Nuray Simsek

Abstract:

The number of people with dementia and the problems that are experienced by these people are increasing along with aging world population. This study was carried out to assess the effects of reminiscence therapy using internet videos on the cognitive condition and apathy levels of elderly people who had mild dementia and lived in nursing homes. This randomly controlled experimental study was conducted between 25 May-25 August 2016 in the nursing home, elderly care and rehabilitation centers in Adana and Seyhan, Turkey. A total of 32 individuals participated in this study, 16 in the experimental group and 16 in the control group. Data were collected using a personal information form developed on the basis of the published literature, the Standardized Mini Mental Test (SMMT) and the Apathy Rating Scale (ARS). The Clinical Research Ethics Committee's approval, written institutional permission, and the written consent of the participants were obtained before data collection. The individuals in the experimental group received reminiscence therapy using internet videos for 60 minutes one day a week for three months. During the same period, 25-30 minutes of unstructured interviews on subjects unrelated to reminiscence were carried out with individuals in the control group. The SMMT and ARS were administered before the applications in the experimental group and at the end of the third month. The collected data were analyzed using descriptive statistics (means, standard deviations, and frequencies) as well as Student's t-test, the Mann-Whitney U-test, and Wilcoxon's signed ranks test. In this study, the total SMMT post-test scores of the experimental group were higher than those of the control group (p = 0.001; p < 0.01). There was a difference between experimental and control groups' total SMMT post-test scores (p = 0.001; p < 0.01). The experimental group's ARS total post-test scores were higher than those of the control group (p = 0.001; p < 0.01). This study found that group reminiscence therapy using internet videos improved the cognitive functions and apathy levels of elderly individuals with mild dementia.

Keywords: apaty, cognitive testing, dementia, elderly, reminisence threapy

Procedia PDF Downloads 197
1209 Experimental Activity on the Photovoltaic Effect

Authors: Salomão Manuel Francisco, Manuel António Salgueiro Da Silva, Bento Filipe Barreiras Pinto Cavadas, Teresa Monteiro Seixas

Abstract:

In bachelor's degrees in Physics Education framework in Angola, and to a certain extent, within the community of Portuguese language countries (CPLP), teaching methodologies rely heavily on theoretical memorization and mathematical demonstrations. This approach often discourages students, particularly the female population, as the reliance on theoretical mathematical demonstrations generates the perception of Physics as an arduous, challenging discipline. To address this challenge and recognize the value of practical application as an evaluative criterion of material truth, we propose a practical activity in Environmental Physics that will be shared with Angolan higher education teachers, who will receive full scaffolding and support from the authors. These teachers, adopting and developing similar activities in a classroom setting, will contribute to the environmental education framework as well. Additionally, this work aligns with different goals of UNESCO's 2030 agenda, namely, specifically, goals 4, 5, 7, 11, 13, and 17. The experimental activity developed in this work is centered around the demonstration of the photovoltaic effect and its application for renewable energy production. The first objective of the activity is to study the variation of electrical power supplied by a photovoltaic system (PV) to an electrical circuit as the angle of light incidence changes. Students can observe that the power supplied to the circuit is greater when light rays fall perpendicularly on the PV. However, as the angle of incidence increases, resulting in a larger area covered by the light rays, the power supplied to the circuit decreases due to lower irradiance. The second objective is to demonstrate that the power output can be maximized by adjusting the circuit load resistance at each irradiance value. In these two parts of the activity, students can analyze experimental data taking into account the irradiance law and the equivalent circuit description of a PV cell. Through detailed data analysis, students are also expected to assess the effects of temperature on PV efficiency degradation and the efficiency enhancement provided by light concentration mechanisms. As a third objective, students can explore how the color of incident light affects the PV output power, considering the quantum nature of light and its interaction with the PV system.

Keywords: experiments, irradiation law, physic teaching, photovoltaic effect

Procedia PDF Downloads 83
1208 Analyzing a Tourism System by Bifurcation Theory

Authors: Amin Behradfar

Abstract:

‎Tourism has a direct impact on the national revenue for all touristic countries. It creates work opportunities‎, ‎industries‎, ‎and several investments to serve and raise nations performance and cultures. ‎This paper is devoted to analyze dynamical behaviour of a four-dimensional non-linear tourism-based social-ecological system by using the codimension two bifurcation theory‎. ‎In fact we investigate the cusp bifurcation of that‎. ‎Implications of our mathematical results to the tourism‎ ‎industry are discussed‎. Moreover, profitability‎, ‎compatibility and sustainability of the tourism system are shown by the aid of cusp bifurcation and numerical techniques‎.

Keywords: tourism-based social-ecological dynamical systems, cusp bifurcation, center manifold theory, profitability, ‎compatibility, sustainability

Procedia PDF Downloads 502
1207 Spin Coherent States Without Squeezing

Authors: A. Dehghani, S. Shirin

Abstract:

We propose in this article a new configuration of quantum states, |α, β> := |α>×|β>. Which are composed of vector products of two different copies of spin coherent states, |α> and |β>. Some mathematical as well as physical properties of such states are discussed. For instance, it has been shown that the cross products of two coherent vectors remain coherent again. They admit a resolution of the identity through positive definite measures on the complex plane. They represent packets similar to the true coherent states, in other words we would not expect to take spin squeezing in any of the field quadratures Lˆx, Lˆy and Lˆz. Depending on the particular choice of parameters in the above scenarios, they can be converted into the so-called Dicke states which minimize the uncertainty relations of each pair of the angular momentum components.

Keywords: vector (Cross-)products, minimum uncertainty, angular momentum, measurement, Dicke states

Procedia PDF Downloads 412
1206 What Is the Matter of Identity to Leadership Behavior: Leader-Subordinate Relational Identity and Paternalistic Leadership

Authors: Sung-Chun Tsai, Li-Fang Chou, Chun-Jung Tseng

Abstract:

How relational identity of leader-subordinate relationship affects behavior of both parties is getting more and more attentions in recent years. Different from past studies on leader-subordinate relationship taking viewpoint of self-concept or interaction between categories, we took perspective of social cognitive schema with special focus on the cognition structure and category content of the vertical leader-subordinate relationship. This study firstly clarified the dimensions and contents of cognitive structure of vertical leader-subordinate relationship. By using two dimensions of “equal/unequal” and “close/distant”, the contents of the leader-subordinate relational identity (LSRI) are classified into four categories: communal affection RI (equal and close), instrumental exchange RI (equal but distant), care-repay RI (unequal but close), and authority-obedience RI (unequal and distant). Furthermore, according to the four dimensions of leader-subordinate relational identity, we explored: (1) how a leader’s LSRI leads to paternalistic leadership; and (2) how paternalistic leadership affects subordinate’s LSRI. Using 59 work group as sample (59 leaders and 251 subordinates), the results of HLM and regression analysis showed: (1) leader’s LSRI significantly affects leadership behavior: instrumental exchange RI is positively relates to authoritarian leadership behavior, but significantly has negative relationship with benevolent leadership; care-repay RI has significantly positive relationship with authoritative leadership; authority-obedience RI has significantly positive relationship with authoritarian leadership; (2) paternalistic leadership is significantly related to subordinates’ LSRI: benevolent leadership is positively related to subordinate’s communal affection and care-repay RI; authoritative leadership has significantly positive relationship with care-repay and authority-obedience RI; authoritarian leadership has significantly positive relationship with subordinate’s instrumental exchange RI. Finally, the main findings, contributions and limits, future research directions, and implications were also discussed.

Keywords: relational identity, leader-subordinate relational identity (LSRI), relational schema, paternalistic leadership

Procedia PDF Downloads 552
1205 Nyaya, Buddhist School Controversy regarding the Laksana of Pratyaksa: Causal versus Conceptual Analysis

Authors: Maitreyee Datta

Abstract:

Buddhist lakṣaņa of pratyakṣa pramā is not the result of the causal analysis of the genesis of it. Naiyāyikas, on the other hand, has provided the lakṣaņa of pratyakṣa in terms of the causal analysis of it. Thus, though in these two philosophical systems philosophers have discussed in detail the nature of pratyakṣa pramā (perception), yet their treatments and understanding of it vary according to their respective understanding of pramā and prmāņa and their relationship. In Nyāya school, the definition (lakṣņa) of perception (pratyakṣa) has been given in terms of the process by virtue of which it has been generated. Thus, Naiyāyikas were found to provide a causal account of perception (pratyakṣa) by virtue of their lakṣaņa of it. But in Buddhist epistemology perception has been defined by virtue of the nature of perceptual knowledge (pratyakṣa pramā) which is devoid of any vikalpa or cognition. These two schools differed due to their different metaphysical presuppositions which determine their epistemological pursuits. The Naiyāyikas admitted pramā and pramāņa as separate events and they have taken pramāņa to be the cause of pramā. These presuppositions enabled them to provide a lakṣaņa of pratyakṣa pramā in terms of the causes by which it is generated. Why did the Buddhist epistemologists define perception by the unique nature of perceptual knowledge instead of the process by which it is generated? This question will be addressed and dealt with in the present paper. In doing so, the unique purpose of Buddhist philosophy will be identified which will enable us to find out an answer to the above question. This enterprise will also reveal the close relationship among some basic Buddhist presuppositions like pratityasamutpādavāda and kṣaņikavāda with Buddhist epistemological positions. In other words, their distinctive notion of pramā (knowledge) indicates their unique epistemological position which is found to comply with their basic philosophical presuppositions. The first section of the paper will present the Buddhist epistemologists’ lakṣaņa of pratyakṣa. The analysis of the lakṣaņa will be given in clear terms to reveal the nature of pratyakṣa as an instance of pramā. In the second section, an effort will be made to identify the uniqueness of such a definition. Here an articulation will be made in which the relationship among basic Buddhist presuppositions and their unique epistemological positions are determined. In the third section of the paper, an effort will be made to compare Nyāya epistemologist’s position regarding pratyakṣa with that of the Buddhist epistemologist.

Keywords: laksana, prama, pramana, pratyksa

Procedia PDF Downloads 149
1204 SVM-DTC Using for PMSM Speed Tracking Control

Authors: Kendouci Khedidja, Mazari Benyounes, Benhadria Mohamed Rachid, Dadi Rachida

Abstract:

In recent years, direct torque control (DTC) has become an alternative to the well-known vector control especially for permanent magnet synchronous motor (PMSM). However, it presents a problem of field linkage and torque ripple. In order to solve this problem, the conventional DTC is combined with space vector pulse width modulation (SVPWM). This control theory has achieved great success in the control of PMSM. That has become a hotspot for resolving. The main objective of this paper gives us an introduction of the DTC and SVPWM-DTC control theory of PMSM which has been simulating on each part of the system via Matlab/Simulink based on the mathematical modeling. Moreover, the outcome of the simulation proved that the improved SVPWM- DTC of PMSM has a good dynamic and static performance.

Keywords: PMSM, DTC, SVM, speed control

Procedia PDF Downloads 389
1203 On the Fractional Integration of Generalized Mittag-Leffler Type Functions

Authors: Christian Lavault

Abstract:

In this paper, the generalized fractional integral operators of two generalized Mittag-Leffler type functions are investigated. The special cases of interest involve the generalized M-series and K-function, both introduced by Sharma. The two pairs of theorems established herein generalize recent results about left- and right-sided generalized fractional integration operators applied here to the M-series and the K-function. The note also results in important applications in physics and mathematical engineering.

Keywords: Fox–Wright Psi function, generalized hypergeometric function, generalized Riemann– Liouville and Erdélyi–Kober fractional integral operators, Saigo's generalized fractional calculus, Sharma's M-series and K-function

Procedia PDF Downloads 440
1202 Effect of Classroom Acoustic Factors on Language and Cognition in Bilinguals and Children with Mild to Moderate Hearing Loss

Authors: Douglas MacCutcheon, Florian Pausch, Robert Ljung, Lorna Halliday, Stuart Rosen

Abstract:

Contemporary classrooms are increasingly inclusive of children with mild to moderate disabilities and children from different language backgrounds (bilinguals, multilinguals), but classroom environments and standards have not yet been adapted adequately to meet these challenges brought about by this inclusivity. Additionally, classrooms are becoming noisier as a learner-centered as opposed to teacher-centered teaching paradigm is adopted, which prioritizes group work and peer-to-peer learning. Challenging listening conditions with distracting sound sources and background noise are known to have potentially negative effects on children, particularly those that are prone to struggle with speech perception in noise. Therefore, this research investigates two groups vulnerable to these environmental effects, namely children with a mild to moderate hearing loss (MMHLs) and sequential bilinguals learning in their second language. In the MMHL study, this group was assessed on speech-in-noise perception, and a number of receptive language and cognitive measures (auditory working memory, auditory attention) and correlations were evaluated. Speech reception thresholds were found to be predictive of language and cognitive ability, and the nature of correlations is discussed. In the bilinguals study, sequential bilingual children’s listening comprehension, speech-in-noise perception, listening effort and release from masking was evaluated under a number of different ecologically valid acoustic scenarios in order to pinpoint the extent of the ‘native language benefit’ for Swedish children learning in English, their second language. Scene manipulations included target-to-distractor ratios and introducing spatially separated noise. This research will contribute to the body of findings from which educational institutions can draw when designing or adapting educational environments in inclusive schools.

Keywords: sequential bilinguals, classroom acoustics, mild to moderate hearing loss, speech-in-noise, release from masking

Procedia PDF Downloads 326
1201 Allocation of Mobile Units in an Urban Emergency Service System

Authors: Dimitra Alexiou

Abstract:

In an urban area the allocation placement of an emergency service mobile units, such as ambulances, police patrol must be designed so as to achieve a prompt response to demand locations. In this paper, a partition of a given urban network into distinct sub-networks is performed such that; the vertices in each component are close and simultaneously the difference of the sums of the corresponding population in the sub-networks is almost uniform. The objective here is to position appropriately in each sub-network a mobile emergency unit in order to reduce the response time to the demands. A mathematical model in the framework of graph theory is developed. In order to clarify the corresponding method a relevant numerical example is presented on a small network.

Keywords: graph partition, emergency service, distances, location

Procedia PDF Downloads 499
1200 Research on the Application of Flexible and Programmable Systems in Electronic Systems

Authors: Yang Xiaodong

Abstract:

This article explores the application and structural characteristics of flexible and programmable systems in electronic systems, with a focus on analyzing their advantages and architectural differences in dealing with complex environments. By introducing mathematical models and simulation experiments, the performance of dynamic module combination in flexible systems and fixed path selection in programmable systems in resource utilization and performance optimization was demonstrated. This article also discusses the mutual transformation between the two in practical applications and proposes a solution to improve system flexibility and performance through dynamic reconfiguration technology. This study provides theoretical reference for the design and optimization of flexible and programmable systems.

Keywords: flexibility, programmable, electronic systems, system architecture

Procedia PDF Downloads 9
1199 Exploration of the Protection Theory of Chinese Scenic Heritage Based on Local Chronicles

Authors: Mao Huasong, Tang Siqi, Cheng Yu

Abstract:

The cognition and practice of Chinese landscapes have distinct uniqueness. The intergenerational inheritance of urban and rural landscapes is a common objective fact which has created a unique type of heritage in China - scenic heritage. The current generalization of the concept of scenic heritage has affected the lack of innovation in corresponding protection practices. Therefore, clarifying the concepts and connotations of scenery and scenic heritage, clarifying the protection objects of scenic heritage and the methods and approaches in intergenerational inheritance can provide theoretical support for the practice of Chinese scenic heritage and contribute Chinese wisdom to the transformation of world heritage sites. Taking ancient Shaoxing, which has a long time span and rich descriptions of scenic types and quantities, as the research object and using local chronicles as the basic research material, based on text analysis, word frequency analysis, case statistics, and historical, geographical spatial annotation methods, this study traces back to ancient scenic practices and conducts in-depth descriptions in both text and space. it have constructed a scenic heritage identification method based on the basic connotation characteristics and morphological representation characteristics of natural and cultural correlations, combined with the intergenerational and representative characteristics of scenic heritage; Summarized the bidirectional integration of "scenic spots" and "form scenic spots", "outstanding people" and "local spirits" in the formation process of scenic heritage; In inheritance, guided by Confucian values of education; In communication, the cultural interpretation constructed by scenery and the way of landscape life are used to strengthen the intergenerational inheritance of natural, artificial material elements, and intangible spirits. As a unique type of heritage in China, scenic heritage should improve its standards, values, and connotations in current protection practices and actively absorb historical experience.

Keywords: scenic heritage, heritage protection, cultural landscape, shaoxing, chinese landscape

Procedia PDF Downloads 68
1198 Reverse Logistics Network Optimization for E-Commerce

Authors: Albert W. K. Tan

Abstract:

This research consolidates a comprehensive array of publications from peer-reviewed journals, case studies, and seminar reports focused on reverse logistics and network design. By synthesizing this secondary knowledge, our objective is to identify and articulate key decision factors crucial to reverse logistics network design for e-commerce. Through this exploration, we aim to present a refined mathematical model that offers valuable insights for companies seeking to optimize their reverse logistics operations. The primary goal of this research endeavor is to develop a comprehensive framework tailored to advising organizations and companies on crafting effective networks for their reverse logistics operations, thereby facilitating the achievement of their organizational goals. This involves a thorough examination of various network configurations, weighing their advantages and disadvantages to ensure alignment with specific business objectives. The key objectives of this research include: (i) Identifying pivotal factors pertinent to network design decisions within the realm of reverse logistics across diverse supply chains. (ii) Formulating a structured framework designed to offer informed recommendations for sound network design decisions applicable to relevant industries and scenarios. (iii) Propose a mathematical model to optimize its reverse logistics network. A conceptual framework for designing a reverse logistics network has been developed through a combination of insights from the literature review and information gathered from company websites. This framework encompasses four key stages in the selection of reverse logistics operations modes: (1) Collection, (2) Sorting and testing, (3) Processing, and (4) Storage. Key factors to consider in reverse logistics network design: I) Centralized vs. decentralized processing: Centralized processing, a long-standing practice in reverse logistics, has recently gained greater attention from manufacturing companies. In this system, all products within the reverse logistics pipeline are brought to a central facility for sorting, processing, and subsequent shipment to their next destinations. Centralization offers the advantage of efficiently managing the reverse logistics flow, potentially leading to increased revenues from returned items. Moreover, it aids in determining the most appropriate reverse channel for handling returns. On the contrary, a decentralized system is more suitable when products are returned directly from consumers to retailers. In this scenario, individual sales outlets serve as gatekeepers for processing returns. Considerations encompass the product lifecycle, product value and cost, return volume, and the geographic distribution of returns. II) In-house vs. third-party logistics providers: The decision between insourcing and outsourcing in reverse logistics network design is pivotal. In insourcing, a company handles the entire reverse logistics process, including material reuse. In contrast, outsourcing involves third-party providers taking on various aspects of reverse logistics. Companies may choose outsourcing due to resource constraints or lack of expertise, with the extent of outsourcing varying based on factors such as personnel skills and cost considerations. Based on the conceptual framework, the authors have constructed a mathematical model that optimizes reverse logistics network design decisions. The model will consider key factors identified in the framework, such as transportation costs, facility capacities, and lead times. The authors have employed mixed LP to find the optimal solutions that minimize costs while meeting organizational objectives.

Keywords: reverse logistics, supply chain management, optimization, e-commerce

Procedia PDF Downloads 38
1197 Deep Learning to Enhance Mathematics Education for Secondary Students in Sri Lanka

Authors: Selvavinayagan Babiharan

Abstract:

This research aims to develop a deep learning platform to enhance mathematics education for secondary students in Sri Lanka. The platform will be designed to incorporate interactive and user-friendly features to engage students in active learning and promote their mathematical skills. The proposed platform will be developed using TensorFlow and Keras, two widely used deep learning frameworks. The system will be trained on a large dataset of math problems, which will be collected from Sri Lankan school curricula. The results of this research will contribute to the improvement of mathematics education in Sri Lanka and provide a valuable tool for teachers to enhance the learning experience of their students.

Keywords: information technology, education, machine learning, mathematics

Procedia PDF Downloads 83
1196 Integrated Formulation of Project Scheduling and Material Procurement Considering Different Discount Options

Authors: Babak H. Tabrizi, Seyed Farid Ghaderi

Abstract:

On-time availability of materials in the construction sites plays an outstanding role in successful achievement of project’s deliverables. Thus, this paper has investigated formulation of project scheduling and material procurement at the same time, by a mixed-integer programming model, aiming to minimize/maximize penalty/reward to deliver the project and minimize material holding, ordering, and procurement costs, respectively. We have taken both all-units and incremental discount possibilities into consideration to address more flexibility from the procurement side with regard to real world conditions. Finally, the applicability and efficiency of the mathematical model is tested by different numerical examples.

Keywords: discount strategies, material purchasing, project planning, project scheduling

Procedia PDF Downloads 261
1195 Spectral Efficiency Improvement in 5G Systems by Polyphase Decomposition

Authors: Wilson Enríquez, Daniel Cardenas

Abstract:

This article proposes a filter bank format combined with the mathematical tool called polyphase decomposition and the discrete Fourier transform (DFT) with the purpose of improving the performance of the fifth-generation communication systems (5G). We started with a review of the literature and the study of the filter bank theory and its combination with DFT in order to improve the performance of wireless communications since it reduces the computational complexity of these communication systems. With the proposed technique, several experiments were carried out in order to evaluate the structures in 5G systems. Finally, the results are presented in graphical form in terms of bit error rate against the ratio bit energy/noise power spectral density (BER vs. Eb / No).

Keywords: multi-carrier system (5G), filter bank, polyphase decomposition, FIR equalizer

Procedia PDF Downloads 201
1194 Improving the Technology of Assembly by Use of Computer Calculations

Authors: Mariya V. Yanyukina, Michael A. Bolotov

Abstract:

Assembling accuracy is the degree of accordance between the actual values of the parameters obtained during assembly, and the values specified in the assembly drawings and technical specifications. However, the assembling accuracy depends not only on the quality of the production process but also on the correctness of the assembly process. Therefore, preliminary calculations of assembly stages are carried out to verify the correspondence of real geometric parameters to their acceptable values. In the aviation industry, most calculations involve interacting dimensional chains. This greatly complicates the task. Solving such problems requires a special approach. The purpose of this article is to carry out the problem of improving the technology of assembly of aviation units by use of computer calculations. One of the actual examples of the assembly unit, in which there is an interacting dimensional chain, is the turbine wheel of gas turbine engine. Dimensional chain of turbine wheel is formed by geometric parameters of disk and set of blades. The interaction of the dimensional chain consists in the formation of two chains. The first chain is formed by the dimensions that determine the location of the grooves for the installation of the blades, and the dimensions of the blade roots. The second dimensional chain is formed by the dimensions of the airfoil shroud platform. The interaction of the dimensional chain of the turbine wheel is the interdependence of the first and second chains by means of power circuits formed by a plurality of middle parts of the turbine blades. The timeliness of the calculation of the dimensional chain of the turbine wheel is the need to improve the technology of assembly of this unit. The task at hand contains geometric and mathematical components; therefore, its solution can be implemented following the algorithm: 1) research and analysis of production errors by geometric parameters; 2) development of a parametric model in the CAD system; 3) creation of set of CAD-models of details taking into account actual or generalized distributions of errors of geometrical parameters; 4) calculation model in the CAE-system, loading of various combinations of models of parts; 5) the accumulation of statistics and analysis. The main task is to pre-simulate the assembly process by calculating the interacting dimensional chains. The article describes the approach to the solution from the point of view of mathematical statistics, implemented in the software package Matlab. Within the framework of the study, there are data on the measurement of the components of the turbine wheel-blades and disks, as a result of which it is expected that the assembly process of the unit will be optimized by solving dimensional chains.

Keywords: accuracy, assembly, interacting dimension chains, turbine

Procedia PDF Downloads 373
1193 A Physical Theory of Information vs. a Mathematical Theory of Communication

Authors: Manouchehr Amiri

Abstract:

This article introduces a general notion of physical bit information that is compatible with the basics of quantum mechanics and incorporates the Shannon entropy as a special case. This notion of physical information leads to the Binary data matrix model (BDM), which predicts the basic results of quantum mechanics, general relativity, and black hole thermodynamics. The compatibility of the model with holographic, information conservation, and Landauer’s principles are investigated. After deriving the “Bit Information principle” as a consequence of BDM, the fundamental equations of Planck, De Broglie, Beckenstein, and mass-energy equivalence are derived.

Keywords: physical theory of information, binary data matrix model, Shannon information theory, bit information principle

Procedia PDF Downloads 171
1192 Employing Operations Research at Universities to Build Management Systems

Authors: Abdallah A. Hlayel

Abstract:

Operations research science (OR) deals with good success in developing and applying scientific methods for problem solving and decision-making. However, by using OR techniques, we can enhance the use of computer decision support systems to achieve optimal management for institutions. OR applies comprehensive analysis including all factors that affect on it and builds mathematical modeling to solve business or organizational problems. In addition, it improves decision-making and uses available resources efficiently. The adoption of OR by universities would definitely contributes to the development and enhancement of the performance of OR techniques. This paper provides an understanding of the structures, approaches and models of OR in problem solving and decision-making.

Keywords: best candidates' method, decision making, decision support system, operations research

Procedia PDF Downloads 445
1191 Lifetime Improvement of IEEE.802.15.6 Sensors in Scheduled Access Mode

Authors: Latif Adnane, C. E. Ait Zaouiat, M. Eddabbah

Abstract:

In Wireless Body Area Networks, the issue of systems lifetime is a big challenge to complete. In this paper, we have tackled this subject to suggest some solutions. For this aim, we have studied some batteries characteristics related to human body temperature. Moreover, we have analyzed a mathematical model which defines sensors lifetime (battery lifetime). Based on this model, we note that the random access increases the energy consumption, because nodes are waking up during the whole superframe period. Results show that using scheduled mode access of IEEE 802.15.6 maximizes the lifetime function, by setting nodes in the sleep mode in the inactive period of transmission.

Keywords: battery, energy consumption, IEEE 802.15.6, lifetime, polling

Procedia PDF Downloads 345
1190 Commutativity of Fractional Order Linear Time-Varying Systems

Authors: Salisu Ibrahim

Abstract:

The paper studies the commutativity associated with fractional order linear time-varying systems (LTVSs), which is an important area of study in control systems engineering. In this paper, we explore the properties of these systems and their ability to commute. We proposed the necessary and sufficient condition for commutativity for fractional order LTVSs. Through a simulation and mathematical analysis, we demonstrate that these systems exhibit commutativity under certain conditions. Our findings have implications for the design and control of fractional order systems in practical applications, science, and engineering. An example is given to show the effectiveness of the proposed method which is been computed by Mathematica and validated by the use of MATLAB (Simulink).

Keywords: fractional differential equation, physical systems, equivalent circuit, analog control

Procedia PDF Downloads 114
1189 Cognitive Dissonance in Robots: A Computational Architecture for Emotional Influence on the Belief System

Authors: Nicolas M. Beleski, Gustavo A. G. Lugo

Abstract:

Robotic agents are taking more and increasingly important roles in society. In order to make these robots and agents more autonomous and efficient, their systems have grown to be considerably complex and convoluted. This growth in complexity has led recent researchers to investigate forms to explain the AI behavior behind these systems in search for more trustworthy interactions. A current problem in explainable AI is the inner workings with the logic inference process and how to conduct a sensibility analysis of the process of valuation and alteration of beliefs. In a social HRI (human-robot interaction) setup, theory of mind is crucial to ease the intentionality gap and to achieve that we should be able to infer over observed human behaviors, such as cases of cognitive dissonance. One specific case inspired in human cognition is the role emotions play on our belief system and the effects caused when observed behavior does not match the expected outcome. In such scenarios emotions can make a person wrongly assume the antecedent P for an observed consequent Q, and as a result, incorrectly assert that P is true. This form of cognitive dissonance where an unproven cause is taken as truth induces changes in the belief base which can directly affect future decisions and actions. If we aim to be inspired by human thoughts in order to apply levels of theory of mind to these artificial agents, we must find the conditions to replicate these observable cognitive mechanisms. To achieve this, a computational architecture is proposed to model the modulation effect emotions have on the belief system and how it affects logic inference process and consequently the decision making of an agent. To validate the model, an experiment based on the prisoner's dilemma is currently under development. The hypothesis to be tested involves two main points: how emotions, modeled as internal argument strength modulators, can alter inference outcomes, and how can explainable outcomes be produced under specific forms of cognitive dissonance.

Keywords: cognitive architecture, cognitive dissonance, explainable ai, sensitivity analysis, theory of mind

Procedia PDF Downloads 132
1188 The Creep Analysis of a Varying Thickness on a Rotating Composite Disk with Different Particle Size by Using Sherby’s Law

Authors: Rupinder Kaur, Harjot Kaur

Abstract:

The objective of this paper is to present the study of the effect of varying thickness on rotating composite disks made from Al-SiC_P having different particle sizes. Mathematical modeling is used to calculate the effect of varying thickness with different particle sizes on rotating composite disks in radial as well as tangential directions with thermal gradients. In comparison to various particle sizes with varied thicknesses, long-term deformation occurs. The results are displayed visually, demonstrating how creep deformation decreases with changing particle size and thickness.

Keywords: creep, varying thickness, particle size, stresses and strain rates

Procedia PDF Downloads 86
1187 Investigating the Invalidity of the Law of Energy Conservation Based on Waves Interference Phenomenon Inside a Ringed Waveguide

Authors: M. Yusefzad

Abstract:

Law of energy conservation is one of the fundamental laws of physics. Energy is conserved, and the total amount of energy is constant. It can be transferred from one object to another and changed from one state to another. However, in the case of wave interference, this law faces important contradictions. Based on the presented mathematical relationship in this paper, it seems that validity of this law depends on the path of energy wave, like light, in which it is located. In this paper, by using some fundamental concepts in physics like the constancy of the electromagnetic wave speed in a specific media and wave theory of light, it will be shown that law of energy conservation is not valid in every condition and in some circumstances, it is possible to increase energy of a system with a determined amount of energy without any input.

Keywords: power, law of energy conservation, electromagnetic wave, interference, Maxwell’s equations

Procedia PDF Downloads 264
1186 Modeling and Simulation of Standalone Photovoltaic Charging Stations for Electric Vehicles

Authors: R. Mkahl, A. Nait-Sidi-Moh, M. Wack

Abstract:

Batteries of electric vehicles (BEV) are becoming more attractive with the advancement of new battery technologies and promotion of electric vehicles. BEV batteries are recharged on board vehicles using either the grid (G2V for Grid to Vehicle) or renewable energies in a stand-alone application (H2V for Home to Vehicle). This paper deals with the modeling, sizing and control of a photo voltaic stand-alone application that can charge the BEV at home. The modeling approach and developed mathematical models describing the system components are detailed. Simulation and experimental results are presented and commented.

Keywords: electric vehicles, photovoltaic energy, lead-acid batteries, charging process, modeling, simulation, experimental tests

Procedia PDF Downloads 444
1185 Commutativity of Fractional Order Linear Time-Varying System

Authors: Salisu Ibrahim

Abstract:

The paper studies the commutativity associated with fractional order linear time-varying systems (LTVSs), which is an important area of study in control systems engineering. In this paper, we explore the properties of these systems and their ability to commute. We proposed the necessary and sufficient condition for commutativity for fractional order LTVSs. Through a simulation and mathematical analysis, we demonstrate that these systems exhibit commutativity under certain conditions. Our findings have implications for the design and control of fractional order systems in practical applications, science, and engineering. An example is given to show the effectiveness of the proposed method which is been computed by Mathematica and validated by the use of Matlab (Simulink).

Keywords: fractional differential equation, physical systems, equivalent circuit, and analog control

Procedia PDF Downloads 77
1184 Predicting Photovoltaic Energy Profile of Birzeit University Campus Based on Weather Forecast

Authors: Muhammad Abu-Khaizaran, Ahmad Faza’, Tariq Othman, Yahia Yousef

Abstract:

This paper presents a study to provide sufficient and reliable information about constructing a Photovoltaic energy profile of the Birzeit University campus (BZU) based on the weather forecast. The developed Photovoltaic energy profile helps to predict the energy yield of the Photovoltaic systems based on the weather forecast and hence helps planning energy production and consumption. Two models will be developed in this paper; a Clear Sky Irradiance model and a Cloud-Cover Radiation model to predict the irradiance for a clear sky day and a cloudy day, respectively. The adopted procedure for developing such models takes into consideration two levels of abstraction. First, irradiance and weather data were acquired by a sensory (measurement) system installed on the rooftop of the Information Technology College building at Birzeit University campus. Second, power readings of a fully operational 51kW commercial Photovoltaic system installed in the University at the rooftop of the adjacent College of Pharmacy-Nursing and Health Professions building are used to validate the output of a simulation model and to help refine its structure. Based on a comparison between a mathematical model, which calculates Clear Sky Irradiance for the University location and two sets of accumulated measured data, it is found that the simulation system offers an accurate resemblance to the installed PV power station on clear sky days. However, these comparisons show a divergence between the expected energy yield and actual energy yield in extreme weather conditions, including clouding and soiling effects. Therefore, a more accurate prediction model for irradiance that takes into consideration weather factors, such as relative humidity and cloudiness, which affect irradiance, was developed; Cloud-Cover Radiation Model (CRM). The equivalent mathematical formulas implement corrections to provide more accurate inputs to the simulation system. The results of the CRM show a very good match with the actual measured irradiance during a cloudy day. The developed Photovoltaic profile helps in predicting the output energy yield of the Photovoltaic system installed at the University campus based on the predicted weather conditions. The simulation and practical results for both models are in a very good match.

Keywords: clear-sky irradiance model, cloud-cover radiation model, photovoltaic, weather forecast

Procedia PDF Downloads 132
1183 The Modelling of Real Time Series Data

Authors: Valeria Bondarenko

Abstract:

We proposed algorithms for: estimation of parameters fBm (volatility and Hurst exponent) and for the approximation of random time series by functional of fBm. We proved the consistency of the estimators, which constitute the above algorithms, and proved the optimal forecast of approximated time series. The adequacy of estimation algorithms, approximation, and forecasting is proved by numerical experiment. During the process of creating software, the system has been created, which is displayed by the hierarchical structure. The comparative analysis of proposed algorithms with the other methods gives evidence of the advantage of approximation method. The results can be used to develop methods for the analysis and modeling of time series describing the economic, physical, biological and other processes.

Keywords: mathematical model, random process, Wiener process, fractional Brownian motion

Procedia PDF Downloads 358
1182 Three Issues for Integrating Artificial Intelligence into Legal Reasoning

Authors: Fausto Morais

Abstract:

Artificial intelligence has been widely used in law. Programs are able to classify suits, to identify decision-making patterns, to predict outcomes, and to formalize legal arguments as well. In Brazil, the artificial intelligence victor has been classifying cases to supreme court’s standards. When those programs act doing those tasks, they simulate some kind of legal decision and legal arguments, raising doubts about how artificial intelligence can be integrated into legal reasoning. Taking this into account, the following three issues are identified; the problem of hypernormatization, the argument of legal anthropocentrism, and the artificial legal principles. Hypernormatization can be seen in the Brazilian legal context in the Supreme Court’s usage of the Victor program. This program generated efficiency and consistency. On the other hand, there is a feasible risk of over standardizing factual and normative legal features. Then legal clerks and programmers should work together to develop an adequate way to model legal language into computational code. If this is possible, intelligent programs may enact legal decisions in easy cases automatically cases, and, in this picture, the legal anthropocentrism argument takes place. Such an argument argues that just humans beings should enact legal decisions. This is so because human beings have a conscience, free will, and self unity. In spite of that, it is possible to argue against the anthropocentrism argument and to show how intelligent programs may work overcoming human beings' problems like misleading cognition, emotions, and lack of memory. In this way, intelligent machines could be able to pass legal decisions automatically by classification, as Victor in Brazil does, because they are binding by legal patterns and should not deviate from them. Notwithstanding, artificial intelligent programs can be helpful beyond easy cases. In hard cases, they are able to identify legal standards and legal arguments by using machine learning. For that, a dataset of legal decisions regarding a particular matter must be available, which is a reality in Brazilian Judiciary. Doing such procedure, artificial intelligent programs can support a human decision in hard cases, providing legal standards and arguments based on empirical evidence. Those legal features claim an argumentative weight in legal reasoning and should serve as references for judges when they must decide to maintain or overcome a legal standard.

Keywords: artificial intelligence, artificial legal principles, hypernormatization, legal anthropocentrism argument, legal reasoning

Procedia PDF Downloads 145