Search results for: intelligent late
666 Optimizing Design Works in Construction Consultant Company: A Knowledge-Based Application
Authors: Phan Nghiem Vu, Le Tuan Vu, Ta Quang Tai
Abstract:
The optimal construction design used during the execution of a construction project is a key factor in determining high productivity and customer satisfaction, however, this management process sometimes is carried out without care and the systematic method that it deserves, bringing negative consequences. This study proposes a knowledge management (KM) approach that will enable the intelligent use of experienced and acknowledged engineers to improve the management of construction design works for a project. Then a knowledge-based application to support this decision-making process is proposed and described. To define and design the system for the application, semi-structured interviews were conducted within five construction consulting organizations with the purpose of studying the way that the method’ optimizing process is implemented in practice and the knowledge supported with it. A system of an optimizing construction design works (OCDW) based on knowledge was developed then validated with construction experts. The OCDW was liked as a valuable tool for construction design works’ optimization, by supporting organizations to generate a corporate memory on this issue, reducing the reliance on individual knowledge and also the subjectivity of the decision-making process. The benefits are described as provided by the performance support system, reducing costs and time, improving product design quality, satisfying customer requirements, expanding the brand organization.Keywords: optimizing construction design work, construction consultant organization, knowledge management, knowledge-based application
Procedia PDF Downloads 129665 Rediscovery of Important Elements Contributing to Cultural Interchange Values Made during Restoration of Khanpur Gate
Authors: Poonam A. Trambadia, Ashish V. Trambadia
Abstract:
The architecture of sultanate period of Ahmedabad had evolved just before the establishment of Mughal rule in North India. After shifting the capital of the kingdom from Patan to Ahmedabad, when the buildings and structures were being built, an interesting cultural blend happened in architecture. Many sultanate buildings in Ahmedabad historic city have resemblance with Patan including the names. Outer fortification walls and Gates were built during the rule of the third ruler in the late 15th century. All the gates had sandstone slabs supported by three arched entrance in sandstone with wooden shutter. A restoration project of Khanpur Gate was initiated in 2016. The paper identifies some evidences and some hidden layers of structures as important elements of cultural interchange while some were just forgotten in the process. The recycling of pre-existing elements of structures are examined and compared. There were layers uncovered that were hidden behind later repairs using traditional brick arch, which was taken out in the process. As the gate had partially collapsed, the restoration included piece by piece dismantling and restoring in the same sequence wherever required. The recycled materials found in the process were recorded and provided the basis for this study. The gate after this discovery sets a new example of fortification Gate built in Sultanate era. The comparison excludes Maratha and British Period Gates to avoid further confusion and focuses on 15th – 16th century sultanate architecture of Ahmedabad.Keywords: Ahmedabad World Heritage, fortification, Indo-Islamic style, Sultanate architecture, cultural interchange
Procedia PDF Downloads 117664 Development of Deep Neural Network-Based Strain Values Prediction Models for Full-Scale Reinforced Concrete Frames Using Highly Flexible Sensing Sheets
Authors: Hui Zhang, Sherif Beskhyroun
Abstract:
Structural Health monitoring systems (SHM) are commonly used to identify and assess structural damage. In terms of damage detection, SHM needs to periodically collect data from sensors placed in the structure as damage-sensitive features. This includes abnormal changes caused by the strain field and abnormal symptoms of the structure, such as damage and deterioration. Currently, deploying sensors on a large scale in a building structure is a challenge. In this study, a highly stretchable strain sensors are used in this study to collect data sets of strain generated on the surface of full-size reinforced concrete (RC) frames under extreme cyclic load application. This sensing sheet can be switched freely between the test bending strain and the axial strain to achieve two different configurations. On this basis, the deep neural network prediction model of the frame beam and frame column is established. The training results show that the method can accurately predict the strain value and has good generalization ability. The two deep neural network prediction models will also be deployed in the SHM system in the future as part of the intelligent strain sensor system.Keywords: strain sensing sheets, deep neural networks, strain measurement, SHM system, RC frames
Procedia PDF Downloads 99663 Oak Gall Wasps (Hymenoptera, Cynipidae, Cynipini) and Galls Form Recorded from Georgia
Authors: Marine Nozadze, George Japoshvili, George Melika
Abstract:
In 2020-2021 we studied oaks gall wasps of different oak species in Georgia at 7 locations of their natural distribution: 1. Quercuse petrea subsp. iberica - Mtskheta municipality, village. Mukhattskaro; 2. Quercus subsp. pendunculifloria - Kvareli municipality, village. Gramy;3. Quercus robur subsp. imeretina -Baghdati Municipality, Ajameti Reserve; 4. Quercus pontica -Chokhatauri municipality, village. Tskhratskaro; 5. Quercus macranthera -Tetritskaro Municipality, Algeti National Park; 6. Quercuse petrea subsp. iberica - Shuakhevi municipality, village. Uchamba 7. Quercus hartwissiana - Baghdatis municipality, village. Dimi. Samples were collected from early spring to late autumn. As a result, 7 forms of galls were collected and described wich caused by different species of oak gall wasps: 1. Neuroterus numismalis asexual gall 2. Neuroterus quercusbaccarum asexual galls 3. Cynips korsakovi asexual gall 4. Biorhiza pallida sexual gall 5. Neuroterus quercusbaccarum asexual galls 6. Neuroterus numismalis sexual gall 7. Cynips quercusfolii. Neuroterus quercusbaccarum asexual galls form the most represented of them: In Algeti National Park; In Mtskheta municipality; In Shuakhevi municipality and Ajameti reserve. The most damaged locations by oak gall wasps were Algeti National Park and Mtskheta Municipality, whereas the most biodiversity according to galls form was represented In Algeti National Park.Keywords: gall wasps, oak, cynipidae, species
Procedia PDF Downloads 146662 Traffic Forecasting for Open Radio Access Networks Virtualized Network Functions in 5G Networks
Authors: Khalid Ali, Manar Jammal
Abstract:
In order to meet the stringent latency and reliability requirements of the upcoming 5G networks, Open Radio Access Networks (O-RAN) have been proposed. The virtualization of O-RAN has allowed it to be treated as a Network Function Virtualization (NFV) architecture, while its components are considered Virtualized Network Functions (VNFs). Hence, intelligent Machine Learning (ML) based solutions can be utilized to apply different resource management and allocation techniques on O-RAN. However, intelligently allocating resources for O-RAN VNFs can prove challenging due to the dynamicity of traffic in mobile networks. Network providers need to dynamically scale the allocated resources in response to the incoming traffic. Elastically allocating resources can provide a higher level of flexibility in the network in addition to reducing the OPerational EXpenditure (OPEX) and increasing the resources utilization. Most of the existing elastic solutions are reactive in nature, despite the fact that proactive approaches are more agile since they scale instances ahead of time by predicting the incoming traffic. In this work, we propose and evaluate traffic forecasting models based on the ML algorithm. The algorithms aim at predicting future O-RAN traffic by using previous traffic data. Detailed analysis of the traffic data was carried out to validate the quality and applicability of the traffic dataset. Hence, two ML models were proposed and evaluated based on their prediction capabilities.Keywords: O-RAN, traffic forecasting, NFV, ARIMA, LSTM, elasticity
Procedia PDF Downloads 226661 Influence of Driving Strategy on Power and Fuel Consumption of Lightweight PEM Fuel Cell Vehicle Powertrain
Authors: Suhadiyana Hanapi, Alhassan Salami Tijani, W. A. N Wan Mohamed
Abstract:
In this paper, a prototype PEM fuel cell vehicle integrated with a 1 kW air-blowing proton exchange membrane fuel cell (PEMFC) stack as a main power sources has been developed for a lightweight cruising vehicle. The test vehicle is equipped with a PEM fuel cell system that provides electric power to a brushed DC motor. This vehicle was designed to compete with industrial lightweight vehicle with the target of consuming least amount of energy and high performance. Individual variations in driving style have a significant impact on vehicle energy efficiency and it is well established from the literature. The primary aim of this study was to assesses the power and fuel consumption of a hydrogen fuel cell vehicle operating at three difference driving technique (i.e. 25 km/h constant speed, 22-28 km/h speed range, 20-30 km/h speed range). The goal is to develop the best driving strategy to maximize performance and minimize fuel consumption for the vehicle system. The relationship between power demand and hydrogen consumption has also been discussed. All the techniques can be evaluated and compared on broadly similar terms. Automatic intelligent controller for driving prototype fuel cell vehicle on different obstacle while maintaining all systems at maximum efficiency was used. The result showed that 25 km/h constant speed was identified for optimal driving with less fuel consumption.Keywords: prototype fuel cell electric vehicles, energy efficient, control/driving technique, fuel economy
Procedia PDF Downloads 441660 Code Embedding for Software Vulnerability Discovery Based on Semantic Information
Authors: Joseph Gear, Yue Xu, Ernest Foo, Praveen Gauravaran, Zahra Jadidi, Leonie Simpson
Abstract:
Deep learning methods have been seeing an increasing application to the long-standing security research goal of automatic vulnerability detection for source code. Attention, however, must still be paid to the task of producing vector representations for source code (code embeddings) as input for these deep learning models. Graphical representations of code, most predominantly Abstract Syntax Trees and Code Property Graphs, have received some use in this task of late; however, for very large graphs representing very large code snip- pets, learning becomes prohibitively computationally expensive. This expense may be reduced by intelligently pruning this input to only vulnerability-relevant information; however, little research in this area has been performed. Additionally, most existing work comprehends code based solely on the structure of the graph at the expense of the information contained by the node in the graph. This paper proposes Semantic-enhanced Code Embedding for Vulnerability Discovery (SCEVD), a deep learning model which uses semantic-based feature selection for its vulnerability classification model. It uses information from the nodes as well as the structure of the code graph in order to select features which are most indicative of the presence or absence of vulnerabilities. This model is implemented and experimentally tested using the SARD Juliet vulnerability test suite to determine its efficacy. It is able to improve on existing code graph feature selection methods, as demonstrated by its improved ability to discover vulnerabilities.Keywords: code representation, deep learning, source code semantics, vulnerability discovery
Procedia PDF Downloads 158659 Automated End-to-End Pipeline Processing Solution for Autonomous Driving
Authors: Ashish Kumar, Munesh Raghuraj Varma, Nisarg Joshi, Gujjula Vishwa Teja, Srikanth Sambi, Arpit Awasthi
Abstract:
Autonomous driving vehicles are revolutionizing the transportation system of the 21st century. This has been possible due to intensive research put into making a robust, reliable, and intelligent program that can perceive and understand its environment and make decisions based on the understanding. It is a very data-intensive task with data coming from multiple sensors and the amount of data directly reflects on the performance of the system. Researchers have to design the preprocessing pipeline for different datasets with different sensor orientations and alignments before the dataset can be fed to the model. This paper proposes a solution that provides a method to unify all the data from different sources into a uniform format using the intrinsic and extrinsic parameters of the sensor used to capture the data allowing the same pipeline to use data from multiple sources at a time. This also means easy adoption of new datasets or In-house generated datasets. The solution also automates the complete deep learning pipeline from preprocessing to post-processing for various tasks allowing researchers to design multiple custom end-to-end pipelines. Thus, the solution takes care of the input and output data handling, saving the time and effort spent on it and allowing more time for model improvement.Keywords: augmentation, autonomous driving, camera, custom end-to-end pipeline, data unification, lidar, post-processing, preprocessing
Procedia PDF Downloads 123658 Global Analysis of Modern Economic Sanctions
Authors: I. L. Yakushev
Abstract:
Economic sanctions are an integral part of the foreign policy repertoire of States. Increasingly, States and international organizations are resorting to sanctions to address a variety of issues -from fighting corruption to preventing the use of nuclear weapons. Over time, the ways in which economic sanctions have been used have changed, especially over the past two decades. In the late 1990s, the recognition of the humanitarian harm of economic sanctions and the "War on Terrorism" after the events of September 11, 2001, led to serious changes in the structure and mechanisms of their application. Questions about how these coercive tools work, when they are applied, what consequences they have, and when they are successful are still being determined by research conducted in the second half of the 20th century. The conclusions drawn from past cases of sanctions may not be fully applicable to the current sanctions policy. In the second half of the 20th century, most cases of sanctions were related to the United States, and it covered restrictions on international trade. However, over the past two decades, the European Union, the United Nations, and China have also been the main initiators of sanctions. Modern sanctions include targeted and financial restrictions and are applied against individuals, organizations, and companies. Changing the senders, targets, stakeholders, and economic instruments used in the sanctions policy has serious implications for effectiveness and results. The regulatory and bureaucratic infrastructure necessary to implement and comply with modern economic sanctions has become more reliable. This evolution of sanctions has provided the scientific community with an opportunity to study new issues of coercion and return to the old ones. The economic sanctions research program should be developed to be relevant for understanding the application of modern sanctions and their consequences.Keywords: global analysis, economic sanctions, targeted sanctions, foreign policy, domestic policy, United Nations, European Union, USA, economic pressure
Procedia PDF Downloads 57657 4-DOFs Parallel Mechanism for Minimally Invasive Robotic Surgery
Authors: Khalil Ibrahim, Ahmed Ramadan, Mohamed Fanni, Yo Kobayashi, Ahmed Abo-Ismail, Masakatus G. Fujie
Abstract:
This paper deals with the design process and the dynamic control simulation of a new type of 4-DOFs parallel mechanism that can be used as an endoscopic surgical manipulator. The proposed mechanism, 2-PUU_2-PUS, is designed based on the screw theory and the parallel virtual chain type synthesis method. Based on the structure analysis of the 4-DOF parallel mechanism, the inverse position equation is studied using the inverse analysis theory of kinematics. The design and the stress analysis of the mechanism are investigated using SolidWorks software. The virtual prototype of the parallel mechanism is constructed, and the dynamic simulation is performed using ADAMS TM software. The system model utilizing PID and PI controllers has been built using MATLAB software. A more realistic simulation in accordance with a given bending angle and point to point control is implemented by the use of both ADAMS/MATLAB software. The simulation results showed that this control method has solved the coordinate control for the 4-DOF parallel manipulator so that each output is feedback to the four driving rods. From the results, the tracking performance is achieved. Other control techniques, such as intelligent ones, are recommended to improve the tracking performance and reduce the numerical truncation error.Keywords: parallel mechanisms, medical robotics, tracjectory control, virtual chain type synthesis method
Procedia PDF Downloads 468656 Induction of Cytotoxicity and Apoptosis in Ovarian Cancer Cell Line (CAOV-3) by an Isoquinoline Alkaloid Isolated from Enicosanthellum pulchrum (King) Heusden
Authors: Noraziah Nordin, Najihah Mohd Hashim, Nazia Abdul Majid, Mashitoh Abdul Rahman, Hamed Karimian, Hapipah Mohd Ali
Abstract:
Enicosanthellum pulchrum belongs to family Annonaceae is also known as family of 'mempisang' in Malaysia. Liriodenine was isolated by prep-HPLC method. This method was first technique used for the isolation of this compound. The structure of the liriodenine was elucidated by 1D and 2D spectroscopy techniques. Liriodenine was tested on ovarian cancer cells line (CAOV-3) for MTT, AO/PI and cytotoxicity 3 assays. The MTT assay was performed to determine the cytotoxicity effect of lirodenine on CAOV-3 cells. The morphological changes on CAOV-3 cells were observed by AO/PI assay for the early and late stage of apoptosis, as well as necrosis. Meanwhile, the measurement of cell loss, nuclear morphology, DNA content, cell membrane permeability, mitochondrial membrane potential changes and cytochrome c release from mitochondria were detected through cytotoxicity 3 assay. The IC50 results showed liriodenine inhibits the growth of CAOV-3 cells after 24 h of treatment at 10.25 ± 1.06 µg/mL. After 48 and 72 h of treatments, the IC50 values were decreased to 7.65 ± 0:07 and 6.35 ± 1.62 µg/mL, respectively. The morphology changes can be seen on CAOV-3 with a production of cell membrane blebbing, cromatin condensation and apoptotic bodies with increasing time of treatment from 24 to 72 h. Evaluation of cytotoxicity 3 on CAOV-3 cells after treated with liriodenine, resulting loss of mitochondrial membrane potential and release of cytochrome c from mitochondria. The results demonstrated the capability of liriodenine as a promising anticancer agent, particularly on human ovarian cancer.Keywords: Enicosanthellum pulchrum, ovarian cancer, apoptosis, cytotoxicity
Procedia PDF Downloads 444655 Development of an Indoor Drone Designed for the Needs of the Creative Industries
Authors: V. Santamarina Campos, M. de Miguel Molina, S. Kröner, B. de Miguel Molina
Abstract:
With this contribution, we want to show how the AiRT system could change the future way of working of a part of the creative industry and what new economic opportunities could arise for them. Remotely Piloted Aircraft Systems (RPAS), also more commonly known as drones, are now essential tools used by many different companies for their creative outdoor work. However, using this very flexible applicable tool indoor is almost impossible, since safe navigation cannot be guaranteed by the operator due to the lack of a reliable and affordable indoor positioning system which ensures a stable flight, among other issues. Here we present our first results of a European project, which consists of developing an indoor drone for professional footage especially designed for the creative industries. One of the main achievements of this project is the successful implication of the end-users in the overall design process from the very beginning. To ensure safe flight in confined spaces, our drone incorporates a positioning system based on ultra-wide band technology, an RGB-D (depth) camera for 3D environment reconstruction and the possibility to fully pre-program automatic flights. Since we also want to offer this tool for inexperienced pilots, we have always focused on user-friendly handling of the whole system throughout the entire process.Keywords: virtual reality, 3D reconstruction, indoor positioning system, RPAS, remotely piloted aircraft systems, aerial film, intelligent navigation, advanced safety measures, creative industries
Procedia PDF Downloads 196654 Intelligent Chatbot Generating Dynamic Responses Through Natural Language Processing
Authors: Aarnav Singh, Jatin Moolchandani
Abstract:
The proposed research work aims to build a query-based AI chatbot that can answer any question related to any topic. A chatbot is software that converses with users via text messages. In the proposed system, we aim to build a chatbot that generates a response based on the user’s query. For this, we use natural language processing to analyze the query and some set of texts to form a concise answer. The texts are obtained through web-scrapping and filtering all the credible sources from a web search. The objective of this project is to provide a chatbot that is able to provide simple and accurate answers without the user having to read through a large number of articles and websites. Creating an AI chatbot that can answer a variety of user questions on a variety of topics is the goal of the proposed research project. This chatbot uses natural language processing to comprehend user inquiries and provides succinct responses by examining a collection of writings that were scraped from the internet. The texts are carefully selected from reliable websites that are found via internet searches. This project aims to provide users with a chatbot that provides clear and precise responses, removing the need to go through several articles and web pages in great detail. In addition to exploring the reasons for their broad acceptance and their usefulness across many industries, this article offers an overview of the interest in chatbots throughout the world.Keywords: Chatbot, Artificial Intelligence, natural language processing, web scrapping
Procedia PDF Downloads 66653 Litho-Structural Variations and Gold Mineralization around Wonaka Schist Belt, North West Nigeria
Authors: Umar Sambo Umar, Ahmad Isah Haruna, Abubakar Sadik Maigari, Muhammad Bello Abubakar
Abstract:
Schist belts in Nigeria occur prominently west of longitude 80 E and sporadic to the east, they are upper Proterozioc low-medium grade deformed metasediments and metavolcanics that were intruded by Pan-African granitoids. The Wonaka schist belt, though reportedly distinctive in composition and metamorphism, is the least understood; the host for primary gold were not defined, structures which may control primary enrichment have not been delineated. The aim of this work is to determine the relationship between litho-structures and the gold around Wonaka schist belt through geological field mapping, petrographic studies and structural data analysis via ArcGis 10.2, Surfer 11.0 and Stereopro 2.0. The results show that the major rock types are mica schist and migmatites, muscovites detected during microstructural analysis suggests low-grade metamorphism in the metapelites. The shear zones identified were trending North Northeast – South Southwest (NNE-SSW), fractures trend mostly Northeast-Southwest (NE-SW) perpendicular to planes of gneissic foliations, these conform to the late Pan-African deformational episode. Pegmatite lodes, net self-cross cutting quartz veins as well as the quartz stringers hosted by both migmatites and schist are delineated as targets for primary gold mineralization, while major confluences of the streams serve as zones for secondary (placer) gold targets since the streams are dendritic and intermittent.Keywords: gold mineralization, Nigeria, migmatites, Wonaka schist belt
Procedia PDF Downloads 196652 Reversible Information Hitting in Encrypted JPEG Bitstream by LSB Based on Inherent Algorithm
Authors: Vaibhav Barve
Abstract:
Reversible information hiding has drawn a lot of interest as of late. Being reversible, we can restore unique computerized data totally. It is a plan where mystery data is put away in digital media like image, video, audio to maintain a strategic distance from unapproved access and security reason. By and large JPEG bit stream is utilized to store this key data, first JPEG bit stream is encrypted into all around sorted out structure and then this secret information or key data is implanted into this encrypted region by marginally changing the JPEG bit stream. Valuable pixels suitable for information implanting are computed and as indicated by this key subtle elements are implanted. In our proposed framework we are utilizing RC4 algorithm for encrypting JPEG bit stream. Encryption key is acknowledged by framework user which, likewise, will be used at the time of decryption. We are executing enhanced least significant bit supplanting steganography by utilizing genetic algorithm. At first, the quantity of bits that must be installed in a guaranteed coefficient is versatile. By utilizing proper parameters, we can get high capacity while ensuring high security. We are utilizing logistic map for shuffling of bits and utilization GA (Genetic Algorithm) to find right parameters for the logistic map. Information embedding key is utilized at the time of information embedding. By utilizing precise picture encryption and information embedding key, the beneficiary can, without much of a stretch, concentrate the incorporated secure data and totally recoup the first picture and also the original secret information. At the point when the embedding key is truant, the first picture can be recouped pretty nearly with sufficient quality without getting the embedding key of interest.Keywords: data embedding, decryption, encryption, reversible data hiding, steganography
Procedia PDF Downloads 288651 Detection of Trends and Break Points in Climatic Indices: The Case of Umbria Region in Italy
Authors: A. Flammini, R. Morbidelli, C. Saltalippi
Abstract:
The increase of air surface temperature at global scale is a fact, with values around 0.85 ºC since the late nineteen century, as well as a significant change in main features of rainfall regime. Nevertheless, the detected climatic changes are not equally distributed all over the world, but exhibit specific characteristics in different regions. Therefore, studying the evolution of climatic indices in different geographical areas with a prefixed standard approach becomes very useful in order to analyze the existence of climatic trend and compare results. In this work, a methodology to investigate the climatic change and its effects on a wide set of climatic indices is proposed and applied at regional scale in the case study of a Mediterranean area, Umbria region in Italy. From data of the available temperature stations, nine temperature indices have been obtained and the existence of trends has been checked by applying the non-parametric Mann-Kendall test, while the non-parametric Pettitt test and the parametric Standard Normal Homogeneity Test (SNHT) have been applied to detect the presence of break points. In addition, aimed to characterize the rainfall regime, data from 11 rainfall stations have been used and a trend analysis has been performed on cumulative annual rainfall depth, daily rainfall, rainy days, and dry periods length. The results show a general increase in any temperature indices, even if with a trend pattern dependent of indices and stations, and a general decrease of cumulative annual rainfall and average daily rainfall, with a time rainfall distribution over the year different from the past.Keywords: climatic change, temperature, rainfall regime, trend analysis
Procedia PDF Downloads 120650 Intelligent Fishers Harness Aquatic Organisms and Climate Change
Authors: Shih-Fang Lo, Tzu-Wei Guo, Chih-Hsuan Lee
Abstract:
Tropical fisheries are vulnerable to the physical and biogeochemical oceanic changes associated with climate change. Warmer temperatures and extreme weather have beendamaging the abundance and growth patterns of aquatic organisms. In recent year, the shrinking of fish stock and labor shortage have increased the threat to global aquacultural production. Thus, building a climate-resilient and sustainable mechanism becomes an urgent, important task for global citizens. To tackle the problem, Taiwanese fishermen applies the artificial intelligence (AI) technology. In brief, the AI system (1) measures real-time water quality and chemical parameters infish ponds; (2) monitors fish stock through segmentation, detection, and classification; and (3) implements fishermen’sprevious experiences, perceptions, and real-life practices. Applying this system can stabilize the aquacultural production and potentially increase the labor force. Furthermore, this AI technology can build up a more resilient and sustainable system for the fishermen so that they can mitigate the influence of extreme weather while maintaining or even increasing their aquacultural production. In the future, when the AI system collected and analyzed more and more data, it can be applied to different regions of the world or even adapt to the future technological or societal changes, continuously providing the most relevant and useful information for fishermen in the world.Keywords: aquaculture, artificial intelligence (AI), real-time system, sustainable fishery
Procedia PDF Downloads 111649 First Formaldehyde Retrieval Using the Raw Data Obtained from Pandora in Seoul: Investigation of the Temporal Characteristics and Comparison with Ozone Monitoring Instrument Measurement
Abstract:
In this present study, for the first time, we retrieved the Formaldehyde (HCHO) Vertical Column Density (HCHOVCD) using Pandora instruments in Seoul, a megacity in northeast Asia, for the period between 2012 and 2014 and investigated the temporal characteristics of HCHOVCD. HCHO Slant Column Density (HCHOSCD) was obtained using the Differential Optical Absorption Spectroscopy (DOAS) method. HCHOSCD was converted to HCHOVCD using geometric Air Mass Factor (AMFG) as Pandora is the direct-sun measurement. The HCHOVCDs is low at 12:00 Local Time (LT) and is high in the morning (10:00 LT) and late afternoon (16:00 LT) except for winter. The maximum (minimum) values of Pandora HCHOVCD are 2.68×1016 (1.63×10¹⁶), 3.19×10¹⁶ (2.23×10¹⁶), 2.00×10¹⁶ (1.26×10¹⁶), and 1.63×10¹⁶ (0.82×10¹⁶) molecules cm⁻² in spring, summer, autumn, and winter, respectively. In terms of seasonal variations, HCHOVCD was high in summer and low in winter which implies that photo-oxidation plays an important role in HCHO production in Seoul. In comparison with the Ozone Monitoring Instrument (OMI) measurements, the HCHOVCDs from the OMI are lower than those from Pandora. The correlation coefficient (R) between monthly HCHOVCDs values from Pandora and OMI is 0.61, with slop of 0.35. Furthermore, to understand HCHO mixing ratio within Planetary Boundary Layer (PBL) in Seoul, we converted Pandora HCHOVCDs to HCHO mixing ratio in the PBL using several meteorological input data from the Atmospheric InfraRed Sounder (AIRS). Seasonal HCHO mixing ratio in PBL converted from Pandora (OMI) HCHOVCDs are estimated to be 6.57 (5.17), 7.08 (6.68), 7.60 (4.70), and 5.00 (4.76) ppbv in spring, summer, autumn, and winter, respectively.Keywords: formaldehyde, OMI, Pandora, remote sensing
Procedia PDF Downloads 150648 Means of Securing Graves in the Egyptian Kingdom Era
Authors: Haitham Nabil Zaghlol Hasan
Abstract:
This research aims to study the means of securing graves in the Egyptian kingdom era, and revolves around many basic ideas used by the ancient Egyptian to protect his graves from thieves, which included architectural characteristics, which gave it importance only others. The most important of which was the choice of the place of the grave, which chose a kohl place in the desert to protect the graves, which is the valley of kings, and whether the choice of that place had an impact in protecting the grave or not, in addition to other elements followed in the architectural planning, which was in the valley of kings. The multiplicity of the tomb, the construction of the well chamber to deceive the thieves by the end of the graves suddenly, the construction of the wells of the tombs, which contained the burial chamber at the bottom of the main well and the effect of all these factors on the graves, and this shows the importance of the graves to the ancient Egyptian and his belief in resurrection and immortality. The Egyptian resorted to the elements of protection and was a religious worker by The protector gods and special texts to protect the deceased from any danger to protect the tomb. As for the human factor of securing the tomb through human guards (police) and security teams based on the guard and the words indicating the protection and the guard teams and the teams of the majai. The most important developments that arose on the cemetery from Tamit entrance, corridors, chambers, burial chamber and coffin, and the use of sand to close the well after from one cemetery to another and from time to time where it was built in the late period inside the temple campus to be under the attention of the priests and their protection, as the study dealt with an analytical study For the means of securing graves in the Egyptian kingdom period.Keywords: Egypt, archaeology, civilization, Egyptian
Procedia PDF Downloads 75647 Contribution of Foraminifers in Biostratigraphy and Paleoecology Interpretations of the Basal Eocene from the Phosphatic Sra Ouertaine Basin, in the Southern Tethys(Tunisia)
Authors: Oum Elkhir Mahmoudi, Nebiha Ben Haj Ali
Abstract:
Micropaleontological, sedimentological and statistical studies were carried out on the late Paleocene-early Eocene succession of Sra Ouertaine and Dyr El Kef in Northern open phosphatic Basin of Tunisia. Based on the abundance and stratigraphic distribution of planktic foraminiferal species, five planktic zones have been recognized from the base to the top of the phosphatic layers. The El Acarinina sibaiyaensis Zone, the E2 Pseudohastigerina wilcoxensis Zone, the E3 Morozovella marginodentata Zone, the E4 Morozovella formosa Zones and the E5 Morozovella subbotinae Zone. The placement of Paleocene-Eocene boundary (PETM) is just below the base of the phosphatic interval. The ETM-2 event may be detectable in the analyzed biotic record of Sra Ouertaine. Based on benthic assemblages, abundances, cluster and multivariate statistical analyses, two biofacies were recognized for each section. The recognized ecozones are typical of warm and shallow water inner neritic setting (dominance of epifaunal fauna Anomalinoides, Dentalina and Cibicidoides associated with Frondicularia phosphatica, Trochamminoides globigeriniformis and Eponides elevatus). The paleoenvironment is eutrophic (presence of several bolivinitids and verneuilinids). For the Dyr El Kef section and P5 and E2 of Sra Ouertaine section, our records indicate that paleoenvironment is influenced by coastal upwelling without oxygen-deficiency, the paleodepth is estimated to be around 50 m. The paleoecosystem is diversified and balanced with a general tendency to stressed condition. While the upper part of Sra Ouertaine section is more eutrophic, influenced by coastal upwelling with oxygen-deficiency, the paleodepth is estimated to be less than 50 m and the ecosystem is unsettled.Keywords: Tunisia, Sra ouertaine Dyr el kef, early Eocene, foraminifera, chronostratigraphy, paleoecology, paleoenvironment
Procedia PDF Downloads 47646 Scientific Development as Diffusion on a Social Network: An Empirical Case Study
Authors: Anna Keuchenius
Abstract:
Broadly speaking, scientific development is studied in either a qualitative manner with a focus on the behavior and interpretations of academics, such as the sociology of science and science studies or in a quantitative manner with a focus on the analysis of publications, such as scientometrics and bibliometrics. Both come with a different set of methodologies and few cross-references. This paper contributes to the bridging of this divide, by on the on hand approaching the process of scientific progress from a qualitative sociological angle and using on the other hand quantitative and computational techniques. As a case study, we analyze the diffusion of Granovetter's hypothesis from his 1973 paper 'On The Strength of Weak Ties.' A network is constructed of all scientists that have referenced this particular paper, with directed edges to all other researchers that are concurrently referenced with Granovetter's 1973 paper. Studying the structure and growth of this network over time, it is found that Granovetter's hypothesis is used by distinct communities of scientists, each with their own key-narrative into which the hypothesis is fit. The diffusion within the communities shares similarities with the diffusion of an innovation in which innovators, early adopters, and an early-late majority can clearly be distinguished. Furthermore, the network structure shows that each community is clustered around one or few hub scientists that are disproportionately often referenced and seem largely responsible for carrying the hypothesis into their scientific subfield. The larger implication of this case study is that the diffusion of scientific hypotheses and ideas are not the spreading of well-defined objects over a network. Rather, the diffusion is a process in which the object itself dynamically changes in concurrence with its spread. Therefore it is argued that the methodology presented in this paper has potential beyond the scientific domain, in the study of diffusion of other not well-defined objects, such as opinions, behavior, and ideas.Keywords: diffusion of innovations, network analysis, scientific development, sociology of science
Procedia PDF Downloads 307645 Design of a Photovoltaic Power Generation System Based on Artificial Intelligence and Internet of Things
Authors: Wei Hu, Wenguang Chen, Chong Dong
Abstract:
In order to improve the efficiency and safety of photovoltaic power generation devices, this photovoltaic power generation system combines Artificial Intelligence (AI) and the Internet of Things (IoT) to control the chasing photovoltaic power generation device to track the sun to improve power generation efficiency and then convert energy management. The system uses artificial intelligence as the control terminal, the power generation device executive end uses the Linux system, and Exynos4412 is the CPU. The power generating device collects the sun image information through Sony CCD. After several power generating devices feedback the data to the CPU for processing, several CPUs send the data to the artificial intelligence control terminal through the Internet. The control terminal integrates the executive terminal information, time information, and environmental information to decide whether to generate electricity normally and then whether to convert the converted electrical energy into the grid or store it in the battery pack. When the power generation environment is abnormal, the control terminal authorizes the protection strategy, the power generation device executive terminal stops power generation and enters a self-protection posture, and at the same time, the control terminal synchronizes the data with the cloud. At the same time, the system is more intelligent, more adaptive, and longer life.Keywords: photo-voltaic power generation, the pursuit of light, artificial intelligence, internet of things, photovoltaic array, power management
Procedia PDF Downloads 123644 Intelligent Recognition of Diabetes Disease via FCM Based Attribute Weighting
Authors: Kemal Polat
Abstract:
In this paper, an attribute weighting method called fuzzy C-means clustering based attribute weighting (FCMAW) for classification of Diabetes disease dataset has been used. The aims of this study are to reduce the variance within attributes of diabetes dataset and to improve the classification accuracy of classifier algorithm transforming from non-linear separable datasets to linearly separable datasets. Pima Indians Diabetes dataset has two classes including normal subjects (500 instances) and diabetes subjects (268 instances). Fuzzy C-means clustering is an improved version of K-means clustering method and is one of most used clustering methods in data mining and machine learning applications. In this study, as the first stage, fuzzy C-means clustering process has been used for finding the centers of attributes in Pima Indians diabetes dataset and then weighted the dataset according to the ratios of the means of attributes to centers of theirs. Secondly, after weighting process, the classifier algorithms including support vector machine (SVM) and k-NN (k- nearest neighbor) classifiers have been used for classifying weighted Pima Indians diabetes dataset. Experimental results show that the proposed attribute weighting method (FCMAW) has obtained very promising results in the classification of Pima Indians diabetes dataset.Keywords: fuzzy C-means clustering, fuzzy C-means clustering based attribute weighting, Pima Indians diabetes, SVM
Procedia PDF Downloads 413643 Factors Contributing to Delayed Diagnosis and Treatment of Breast Cancer and Its Outcome in Jamhoriat Hospital Kabul, Afghanistan
Authors: Ahmad Jawad Fardin
Abstract:
Over 60% of patients with breast cancer in Afghanistan present late with advanced stage III and IV, a major cause for the poor survival rate. The objectives of this study were to identify the contributing factors for the diagnosis and treatment delay and its outcome. This cross-sectional study was conducted on 318 patients with histologically confirmed breast cancer in the oncology department of Jamhoriat hospital, which is the first and only national cancer center in Afghanistan; data were collected from medical records and interviews conducted with women diagnosed with breast cancer, linear regression and logistic regression were used for analysis. Patient delay was defined as the time from first recognition of symptoms until first medical consultation and doctor form first consultation with a health care provider until histological confirmation of breast cancer. The mean age of patients was 49.2+_ 11.5years. The average time for the final diagnosis of breast cancer was 8.5 months; most patients had ductal carcinoma 260.7 (82%). Factors associated with delay were low education level 76% poor socioeconomic and cultural conditions 81% lack of cancer center 73% lack of screening 19%. The stage distribution was as follows stage IV 4 22% stage III 44.4% stage II 29.3% stage I 4.3%. Complex associated factors were identified to delayed the diagnosis of breast cancer and increased adverse outcomes consequently. Raising awareness and education in women, the establishment of cancer centers and providing accessible diagnosis service and screening, training of general practitioners; required to promote early detection, diagnosis and treatment.Keywords: delayed diagnosis and poor outcome, breast cancer in Afghanistan, poor outcome of delayed breast cancer treatment, breast cancer delayed diagnosis and treatment in Afghanistan
Procedia PDF Downloads 182642 Fruit Identification System in Sweet Orange Citrus (L.) Osbeck Using Thermal Imaging and Fuzzy
Authors: Ingrid Argote, John Archila, Marcelo Becker
Abstract:
In agriculture, intelligent systems applications have generated great advances in automating some of the processes in the production chain. In order to improve the efficiency of those systems is proposed a vision system to estimate the amount of fruits in sweet orange trees. This work presents a system proposal using capture of thermal images and fuzzy logic. A bibliographical review has been done to analyze the state-of-the-art of the different systems used in fruit recognition, and also the different applications of thermography in agricultural systems. The algorithm developed for this project uses the metrics of the fuzzines parameter to the contrast improvement and segmentation of the image, for the counting algorith m was used the Hough transform. In order to validate the proposed algorithm was created a bank of images of sweet orange Citrus (L.) Osbeck acquired in the Maringá Farm. The tests with the algorithm Indicated that the variation of the tree branch temperature and the fruit is not very high, Which makes the process of image segmentation using this differentiates, This Increases the amount of false positives in the fruit counting algorithm. Recognition of fruits isolated with the proposed algorithm present an overall accuracy of 90.5 % and grouped fruits. The accuracy was 81.3 %. The experiments show the need for a more suitable hardware to have a better recognition of small temperature changes in the image.Keywords: Agricultural systems, Citrus, Fuzzy logic, Thermal images.
Procedia PDF Downloads 229641 The Value of Dynamic Magnetic Resonance Defecography in Assessing the Severity of Defecation Disorders
Authors: Ge Sun, Monika Trzpis, Robbert J. de Haas, Paul M. A. Broens
Abstract:
Introduction: Dynamic magnetic resonance defecography is frequently used to assess defecation disorders. We aimed to investigate the usefulness of dynamic magnetic resonance defecography for assessing the severity of defecation disorder. Methods: We included patients retrospectively from our tertiary referral hospital who had undergone dynamic magnetic resonance defecography, anorectal manometry, and anal electrical sensitivity tests to assess defecation disorders between 2014 and 2020. The primary outcome was the association between the dynamic magnetic resonance defecography variables and the severity of defecation disorders. We assessed the severity of fecal incontinence and constipation with the Wexner incontinence and Agachan constipation scores. Results: Out of the 32 patients included, 24 completed the defecation questionnaire. During defecation, the M line length at magnetic resonance correlated with the Agachan score (r = 0.45, p = 0.03) and was associated with anal sphincter pressure (r=0.39, p=0.03) just before defecation. During rest and squeezing, the H line length at imaging correlated with the Wexner incontinence score (r=0.49, p=0.01 and r=0.69, p< 0.001, respectively). H line length also correlated positively with the anal electrical sensation threshold during squeezing (r=0.50, p=0.004) and during rest (r= 0.42, p=0.02). Conclusions: The M and H line lengths at dynamic magnetic resonance defecography can be used to assess the severity of constipation and fecal incontinence respectively and reflect anatomic changes of the pelvic floor. However, as these anatomic changes are generally late-stage and irreversible, anal manometry seems a better diagnostic approach to assess early and potentially reversible changes in patients with defecation disorders.Keywords: defecation disorders, dynamic magnetic resonance defecography, anorectal manometry, anal electrical sensitivity tests, H line, M line
Procedia PDF Downloads 106640 Comparative Performance of Artificial Bee Colony Based Algorithms for Wind-Thermal Unit Commitment
Authors: P. K. Singhal, R. Naresh, V. Sharma
Abstract:
This paper presents the three optimization models, namely New Binary Artificial Bee Colony (NBABC) algorithm, NBABC with Local Search (NBABC-LS), and NBABC with Genetic Crossover (NBABC-GC) for solving the Wind-Thermal Unit Commitment (WTUC) problem. The uncertain nature of the wind power is incorporated using the Weibull probability density function, which is used to calculate the overestimation and underestimation costs associated with the wind power fluctuation. The NBABC algorithm utilizes a mechanism based on the dissimilarity measure between binary strings for generating the binary solutions in WTUC problem. In NBABC algorithm, an intelligent scout bee phase is proposed that replaces the abandoned solution with the global best solution. The local search operator exploits the neighboring region of the current solutions, whereas the integration of genetic crossover with the NBABC algorithm increases the diversity in the search space and thus avoids the problem of local trappings encountered with the NBABC algorithm. These models are then used to decide the units on/off status, whereas the lambda iteration method is used to dispatch the hourly load demand among the committed units. The effectiveness of the proposed models is validated on an IEEE 10-unit thermal system combined with a wind farm over the planning period of 24 hours.Keywords: artificial bee colony algorithm, economic dispatch, unit commitment, wind power
Procedia PDF Downloads 375639 Mathematical Study for Traffic Flow and Traffic Density in Kigali Roads
Authors: Kayijuka Idrissa
Abstract:
This work investigates a mathematical study for traffic flow and traffic density in Kigali city roads and the data collected from the national police of Rwanda in 2012. While working on this topic, some mathematical models were used in order to analyze and compare traffic variables. This work has been carried out on Kigali roads specifically at roundabouts from Kigali Business Center (KBC) to Prince House as our study sites. In this project, we used some mathematical tools to analyze the data collected and to understand the relationship between traffic variables. We applied the Poisson distribution method to analyze and to know the number of accidents occurred in this section of the road which is from KBC to Prince House. The results show that the accidents that occurred in 2012 were at very high rates due to the fact that this section has a very narrow single lane on each side which leads to high congestion of vehicles, and consequently, accidents occur very frequently. Using the data of speeds and densities collected from this section of road, we found that the increment of the density results in a decrement of the speed of the vehicle. At the point where the density is equal to the jam density the speed becomes zero. The approach is promising in capturing sudden changes on flow patterns and is open to be utilized in a series of intelligent management strategies and especially in noncurrent congestion effect detection and control.Keywords: statistical methods, traffic flow, Poisson distribution, car moving technics
Procedia PDF Downloads 282638 Natural Law in the Mu’Tazilite Theology
Authors: Samaneh Khalili
Abstract:
Natural law theory, in moral philosophy, refers to a system of unchanging values held to be mutual to all humans and can be discovered through reason. The natural law theory is commonly associated with western Philosophers. In contrast, discussions on notions of natural law in Islamic intellectual history were relatively rare. This paper aims to show that the moral theory developed by the Mu'tazilite thinkers can be classified in the ideas of natural law. In doing so, this study will demonstrate that the objective and unchanging values, according to Mu'tazilite theologians, provide the guidelines for assessing the Islamic law rules in the field of human coexistence. The focus of the paper lies on ʿAbd al-Ğabbār, who was the most influential thinker in the late epoch of the Muʿtazila. Although ʿAbd al-Ǧabbār did not leave a text with a systematic discussion of natural law, his teaching of nature, human reason, and the moral values of actions are all scattered throughout his work -'al-Muġnī fī abwāb at-tawḥīd wa-l-'adl'. It is necessary to focus on ʿAbd al-Ǧabbār's theories on reason, nature, and ethics since natural law revolves around the basic concepts of nature, reason, and moral value. While analyzing the concept of the Nature, it will attempt to answer how he explains the world's physical structure and God's relationship to natural events. Moreover, from ʿAbd al-Ǧabbār's point of view, is nature a self-determined system that follows its inner principle in every kind of change, or is nature guided by an external power? Does causality govern natural events? About the concept of reason, an attempt is made to examine how human reason, according to ʿAbd al-Ǧabbār, conceives moral attributes. Finally, the Autor will discuss the concepts of objective values and the place of rights and duties derived from Islamic law in ʿAbd al-Ǧabbār's thought.Keywords: Islamic law, Mu'tazilite theology, natural law in Islamic theology, objective and unchanging values.
Procedia PDF Downloads 97637 Cigarette Smoking and Alcohol Use among Mauritian Adolescents: Analysis of 2017 WHO Global School-Based Student Health Survey
Authors: Iyanujesu Adereti, Tajudeen Basiru, Ayodamola Olanipekun
Abstract:
Background: Substance abuse among adolescents is of public health concern globally. Despite being the most abused by adolescents, there are limited studies on the prevalence of alcohol use and cigarette smoking among adolescents in Mauritius. Objectives: To determine the prevalence of cigarette smoking, alcohol use and associated correlates among school-going adolescents in Mauritius. Methodology: Data obtained from 2017 WHO Global School-based Student Health Survey (GSHS) survey of 3,012 school-going adolescents in Mauritius was analyzed using STATA. Descriptive statistics were used to obtain prevalence. Bivariate and multivariate logistic regression analysis was used to evaluate predictors of cigarette smoking and alcohol use. Results: Prevalence of alcohol consumption and cigarette smoking were 26.0% and 17.1%, respectively. Smoking and alcohol use was more prevalent among males, younger adolescents, and those in higher school grades (p-value <.000). In multivariable logistic regression, male gender was associated with a higher risk of cigarette smoking (adjusted Odds Ratio (aOR) [95%Confidence Interval (CI)]= 1.51[1.06-2.14]) but lower risk of alcohol use (aOR[95%CI]= 0.69[0.53-0.90]) while older age (mid and late adolescence) and parental smoking were found to be associated with increased risk of alcohol use (aOR[95%CI]= 1.94[1.34-2.99] and 1.36[1.05-1.78] respectively). Marijuana use, truancy, being in a fight and suicide ideation were associated with increased odds of alcohol use (aOR[95%CI]= 3.82[3.39-6.09]; 2.15[1.62-2.87]; 1.83[1.34-2.49] and 1.93[1.38-2.69] respectively) and cigarette smoking (aOR[95%CI]= 17.28[10.4 - 28.51]; 1.73[1.21-2. 49]; 1.67[1.14-2.45] and 2.17[1.43-3.28] respectively) while involvement in sexual activity was associated with reduced risk of alcohol use (aOR[95%CI]= 0.50[0.37-0.68]) and cigarette smoking (aOR[95%CI]= 0.47[0.33-0.69]). Parental support and parental monitoring were uniquely associated with lower risk of cigarette smoking (aOR[95%CI]= 0.69[0.47-0.99] and 0.62[0.43-0.91] respectively). Conclusion: The high prevalence of alcohol use and cigarette smoking in this study shows the need for the government of Mauritius to enhance policies that will help address this issue putting into accounts the various risk and protective factors.Keywords: adolescent health, alcohol use, cigarette smoking, global school-based student health survey
Procedia PDF Downloads 252