Search results for: spatial information network
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 16200

Search results for: spatial information network

6330 Pilot Directional Protection Scheme Using Wireless Communication

Authors: Nitish Sharma, G. G. Karady

Abstract:

This paper presents a scheme for the protection of loop system from all type of faults using the direction of fault current. The presence of distributed generation in today’s system increases the complexity of fault detection as the power flow is bidirectional. Hence, protection scheme specific to this purpose needs to be developed. This paper shows a fast protection scheme using communication which can be fiber optic or wireless. In this paper, the possibility of wireless communication for protection is studied to exchange the information between the relays. The negative sequence and positive sequence directional elements are used to determine the direction of fault current. A PSCAD simulation is presented and validated using commercial SEL relays.

Keywords: smart grid protection, pilot protection, power system simulation, wireless communication

Procedia PDF Downloads 636
6329 Face Recognition Using Discrete Orthogonal Hahn Moments

Authors: Fatima Akhmedova, Simon Liao

Abstract:

One of the most critical decision points in the design of a face recognition system is the choice of an appropriate face representation. Effective feature descriptors are expected to convey sufficient, invariant and non-redundant facial information. In this work, we propose a set of Hahn moments as a new approach for feature description. Hahn moments have been widely used in image analysis due to their invariance, non-redundancy and the ability to extract features either globally and locally. To assess the applicability of Hahn moments to Face Recognition we conduct two experiments on the Olivetti Research Laboratory (ORL) database and University of Notre-Dame (UND) X1 biometric collection. Fusion of the global features along with the features from local facial regions are used as an input for the conventional k-NN classifier. The method reaches an accuracy of 93% of correctly recognized subjects for the ORL database and 94% for the UND database.

Keywords: face recognition, Hahn moments, recognition-by-parts, time-lapse

Procedia PDF Downloads 375
6328 Cross Carpeting in Nigerian Politics: Some Legal and Moral Issues Generated

Authors: Agbana Olaseinde Julius, Opadere Olaolu Stephen

Abstract:

The concept of cross carpeting is as old as politics itself. Basically, it entails an individual leaving a political party/group, to join another. The reasons for which cross carpeting is embarked upon are diverse: ideological differences; ethnic and/or religious differences; access to actual or perceived better political opportunities; liberty of association; rancor; etc. The current democratic dispensation in Nigeria has experienced renewed and rather alarming rate of cross carpeting, for reasons including those enumerated above and others. Right to cross carpet is inherent in a democratic setting as well as the political stakeholder; so does it also comprise of the constitutional right of ‘freedom of association’. However, the current species of cross carpeting in Nigeria requires scrutiny, in view of some potential legal and moral challenges it poses for both the present and the future. Cross carpeting is considered both legal and constitutional, but the current spate raises the question of expediency, particularly in a nascent democracy. It is considered to have a propensity of negatively impacting political stability in a polity with fragile nerves. Importantly too, cross carpeting is considered a potential damage to the psyche of posterity with regards to a warped disposition to promises, honour and integrity. The perceived peculiar dimension of cross carpeting in Nigeria raises questions on the quality of leadership presently obtainable in the country, vis-à-vis greed, self-centeredness, disregard for the concern and interest of avowed followers/fans, entrenchment of distrust, etc. Thus, the study made use of primary and secondary sources of information. The primary sources included the Constitutions of the Federal Republic of Nigeria 1999 (as amended); judicial decisions; and the Electoral Act, 2010 (as Amended). The secondary sources comprised of information from books, journals, newspapers, magazines and Internet documents. Data obtained from these sources were subjected to content analysis. Findings of this study show that though the act of cross carpeting may not be in breach of any Statute or Law, it however, in most cases, breaches the morals of expediency. The morality thereof is far from justifiable, and should be condemned in the interest of the present and posterity. There is a great and urgent need to embark on a re-entrenchment of the culture of political ideology in the Nigerian polity, as obtainable in developed democracies. In conclusion, the need to exercise the right of cross carpeting with caution cannot be overemphasized. Membership of a political group/party should be backed by commitment to well defined ideologies and values. Commitment to them should be regarded akin to that found in the family, which is not easily or flippantly jettisoned.

Keywords: cross-carpeting, Nigeria, legal, moral issues, politics

Procedia PDF Downloads 448
6327 Complicity of Religion in Legalizing Corruption: Perspective from an Emerging Economy

Authors: S. Opadere Olaolu

Abstract:

Religion, as a belief-system, has been with humanity for a long time. It has been recognised to impact the lives of individuals, groups, and communities that hold it dear. Whether the impact is regarded as positive or not depends on the assessor. Thus, for reasons of likely subjectiveness, possible irrationality, and even outright deliberate abuse, most emerging economies seek to follow the pattern of separating the State from religion; yet it is certain that the influence of religion on the State is incontrovertible. Corruption, on the other hand, though difficult to define in precise terms, is clearly perceptible. It could manifest in very diverse ways, including the abuse of a position of trust for the gain of an individual, or of a group with shared ulterior motive. Religion has been perceived, among others, as a means to societal stability, marital stability, infusion of moral rectitude, and conscience with regards to right and wrong. In time past, credible and dependable characters reposed largely and almost exclusively with those bearing deep religious conviction. Even in the political circle, it was thought that the involvement of those committed to religion would bring about positive changes, for the benefit of the society at large. On the contrary, in recent times, religion has failed in these lofty expectations. The level of corruption in most developing economies, and the increase of religion seem to be advancing pari passu. For instance, religion has encroached into political space, and vice versa, without any differentiable posture to the issue of corruption. Worse still, religion appears to be aiding and abetting corruption, overtly and/or covertly. Therefore, this discourse examined from the Nigerian perspective—as a developing economy—, and from a multidisciplinary stand-point of Law and Religion, the issue of religion; secularism; corruption; romance of religion and politics; inability of religion to exemplify moral rectitude; indulgence of corruption by religion; and the need to keep religion in private sphere, with proper checks. The study employed primary and secondary sources of information. The primary sources included the Constitutions of the Federal Republic of Nigeria 1999, as amended; judicial decisions; and the Bible. The secondary sources comprised of information from books, journals, newspapers, magazines and Internet documents. Data obtained from these sources were subjected to content analysis. Findings of this study include the breach of constitutional provisions to keep religion out of State affairs; failure of religion to curb corruption; outright indulgence of corruption by religion; and religion having become a political tool. In conclusion, it is considered apposite still to keep the State out of religion, and to seek enforcement of the constitutional provisions in this respect. The stamp of legality placed on overt and covert corruption by religion should be removed by all means.

Keywords: corruption, complicity, legalizing, religion

Procedia PDF Downloads 411
6326 Definition of a Computing Independent Model and Rules for Transformation Focused on the Model-View-Controller Architecture

Authors: Vanessa Matias Leite, Jandira Guenka Palma, Flávio Henrique de Oliveira

Abstract:

This paper presents a model-oriented development approach to software development in the Model-View-Controller (MVC) architectural standard. This approach aims to expose a process of extractions of information from the models, in which through rules and syntax defined in this work, assists in the design of the initial model and its future conversions. The proposed paper presents a syntax based on the natural language, according to the rules agreed in the classic grammar of the Portuguese language, added to the rules of conversions generating models that follow the norms of the Object Management Group (OMG) and the Meta-Object Facility MOF.

Keywords: BNF Syntax, model driven architecture, model-view-controller, transformation, UML

Procedia PDF Downloads 395
6325 Adhering to the Traditional Standard of Originality in the Era of Artificial Intelligence Copyright Protection

Authors: Xiaochen Mu

Abstract:

Whether in common law countries that adhere to the "commercial copyright theory" or in civil law countries that center around "author's rights," the standards for judging originality have undergone continuous adjustments in response to the development of information technology. The adherence to originality standards does not arbitrarily dictate that all types of works be judged according to a single standard of originality, nor does it rigidly ignore the changes in creative methods and dissemination models brought about by technology. Adjustments and interpretations should be allowed based on the different forms of expression of works. Appropriate adjustments and interpretations are our response to technological advancements. However, what should be upheld are the principles and bottom lines of these adjustments and interpretations, namely the legislative intent and purpose of copyright law, which are to encourage the creation and dissemination of outstanding cultural works and to promote the flourishing of culture.

Keywords: generative artificial intelligence, originality, works, copyright

Procedia PDF Downloads 42
6324 The Selection of the Nearest Anchor Using Received Signal Strength Indication (RSSI)

Authors: Hichem Sassi, Tawfik Najeh, Noureddine Liouane

Abstract:

The localization information is crucial for the operation of WSN. There are principally two types of localization algorithms. The Range-based localization algorithm has strict requirements on hardware; thus, it is expensive to be implemented in practice. The Range-free localization algorithm reduces the hardware cost. However, it can only achieve high accuracy in ideal scenarios. In this paper, we locate unknown nodes by incorporating the advantages of these two types of methods. The proposed algorithm makes the unknown nodes select the nearest anchor using the Received Signal Strength Indicator (RSSI) and choose two other anchors which are the most accurate to achieve the estimated location. Our algorithm improves the localization accuracy compared with previous algorithms, which has been demonstrated by the simulating results.

Keywords: WSN, localization, DV-Hop, RSSI

Procedia PDF Downloads 361
6323 Potential of Hyperion (EO-1) Hyperspectral Remote Sensing for Detection and Mapping Mine-Iron Oxide Pollution

Authors: Abderrazak Bannari

Abstract:

Acid Mine Drainage (AMD) from mine wastes and contaminations of soils and water with metals are considered as a major environmental problem in mining areas. It is produced by interactions of water, air, and sulphidic mine wastes. This environment problem results from a series of chemical and biochemical oxidation reactions of sulfide minerals e.g. pyrite and pyrrhotite. These reactions lead to acidity as well as the dissolution of toxic and heavy metals (Fe, Mn, Cu, etc.) from tailings waste rock piles, and open pits. Soil and aquatic ecosystems could be contaminated and, consequently, human health and wildlife will be affected. Furthermore, secondary minerals, typically formed during weathering of mine waste storage areas when the concentration of soluble constituents exceeds the corresponding solubility product, are also important. The most common secondary mineral compositions are hydrous iron oxide (goethite, etc.) and hydrated iron sulfate (jarosite, etc.). The objectives of this study focus on the detection and mapping of MIOP in the soil using Hyperion EO-1 (Earth Observing - 1) hyperspectral data and constrained linear spectral mixture analysis (CLSMA) algorithm. The abandoned Kettara mine, located approximately 35 km northwest of Marrakech city (Morocco) was chosen as study area. During 44 years (from 1938 to 1981) this mine was exploited for iron oxide and iron sulphide minerals. Previous studies have shown that Kettara surrounding soils are contaminated by heavy metals (Fe, Cu, etc.) as well as by secondary minerals. To achieve our objectives, several soil samples representing different MIOP classes have been resampled and located using accurate GPS ( ≤ ± 30 cm). Then, endmembers spectra were acquired over each sample using an Analytical Spectral Device (ASD) covering the spectral domain from 350 to 2500 nm. Considering each soil sample separately, the average of forty spectra was resampled and convolved using Gaussian response profiles to match the bandwidths and the band centers of the Hyperion sensor. Moreover, the MIOP content in each sample was estimated by geochemical analyses in the laboratory, and a ground truth map was generated using simple Kriging in GIS environment for validation purposes. The acquired and used Hyperion data were corrected for a spatial shift between the VNIR and SWIR detectors, striping, dead column, noise, and gain and offset errors. Then, atmospherically corrected using the MODTRAN 4.2 radiative transfer code, and transformed to surface reflectance, corrected for sensor smile (1-3 nm shift in VNIR and SWIR), and post-processed to remove residual errors. Finally, geometric distortions and relief displacement effects were corrected using a digital elevation model. The MIOP fraction map was extracted using CLSMA considering the entire spectral range (427-2355 nm), and validated by reference to the ground truth map generated by Kriging. The obtained results show the promising potential of the proposed methodology for the detection and mapping of mine iron oxide pollution in the soil.

Keywords: hyperion eo-1, hyperspectral, mine iron oxide pollution, environmental impact, unmixing

Procedia PDF Downloads 228
6322 Container Chaos: The Impact of a Casual Game on Learning and Behavior

Authors: Lori L. Scarlatos, Ryan Courtney

Abstract:

This paper explores the impact that playing a casual game can have on a player's learning and subsequent behavior. A casual mobile game, Container Chaos, was created to teach undergraduate students about the carbon footprint of various disposable beverage containers. Learning was tested with a short quiz, and behavior was tested by observing which beverage containers players choose when offered a drink and a snack. The game was tested multiple times, under a variety of different circumstances. Findings of these tests indicate that, with extended play over time, players can learn new information and sometimes even change their behavior as a result. This has implications for how other casual games can be used to teach concepts and possibly modify behavior.

Keywords: behavior, carbon footprint, casual games, environmental impact, material sciences

Procedia PDF Downloads 160
6321 Single Machine Scheduling Problem to Minimize the Number of Tardy Jobs

Authors: Ali Allahverdi, Harun Aydilek, Asiye Aydilek

Abstract:

Minimizing the number of tardy jobs is an important factor to consider while making scheduling decisions. This is because on-time shipments are vital for lowering cost and increasing customers’ satisfaction. This paper addresses the single machine scheduling problem with the objective of minimizing the number of tardy jobs. The only known information is the lower and upper bounds for processing times, and deterministic job due dates. A dominance relation is established, and an algorithm is proposed. Several heuristics are generated from the proposed algorithm. Computational analysis indicates that the performance of one of the heuristics is very close to the optimal solution, i.e., on average, less than 1.5 % from the optimal solution.

Keywords: single machine scheduling, number of tardy jobs, heuristi, lower and upper bounds

Procedia PDF Downloads 555
6320 The Saying of Conceptual Metaphors about Law, Righteousness, and Justice in the Old Testament: Cardinal Tendencies

Authors: Ivana Prochazkova

Abstract:

Cognitive linguistics offers biblical scholarship a specific methodological tool for analysis and interpretation of metaphorical expressions. Its methodology makes it possible to study processes involved in constructing the meaning of individual metaphorical expressions and whole conceptual metaphors; to analyze their function in the text; to follow the semantic development of concepts and conceptual domains, and to trace semantic changes and their motivation. The legal language in the Hebrew canon is extremely specific and formalized. Especially in the preambles to the collections of laws in the Pentateuch, more general considerations of the motif of keeping and breaking the law are encountered. This is also true in the psalms and wisdom literature. Legal theory and the philosophy of law deal with these motifs today. Metaphors play an important role in texts that reflect on more general issues. The purpose of this conference contribution is to write all over the central metaphorical concept, conceptual metaphor ךרד תורה (TORAH/LAW IS A JOURNEY), its function in the Torah and principal trends of the further development in the Prophets and the Writings. The conceptual metaphor תורה ךרד (TORAH/LAW IS A JOURNEY) constitutes a coherent system in conjunction with other metaphors that include e.g., conceptual metaphors נחה תורה (TORAH/LAW LEADS); its variant רעה תורה (TORAH IS A SHEPHERD/GUIDE); מקור תורה (TORAH/LAW IS A FOUNTAIN/A SOURCE OF LIFE). Some conceptual metaphors are well known, and their using are conventional (עשׁר תורה TORAH/LAW IS RICHES, שׂשׂון תורה TORAH/LAW IS DELIGHT, דבשׁ תורה TORAH/LAW IS HONEY, שׁמשׁ תורה TORAH/LAW IS SUN ). But some conceptual metaphors are by its occurrence innovative and unique (e.g., שׁריון תורה TORAH /LAW IS BODY ARMOR, כובע תורה TORAH /LAW IS A HELMET, בגד תורה TORAH/LAW IS A GARMENT, etc.). There will be given examples. Conceptual metaphors will be described by means of some 'metaphorical vehicles,' which are Hebrew expressions in the source domain that are repeatedly used in metaphorical conceptualizations of the target domain(s). Conceptual metaphors will be further described by means of 'generic narrative structures,' which are the particular aspects of a conceptual metaphor that emerge during the metaphorical structuring of concepts. They are the units of the metaphorical vehicles – the Hebrew expressions in the source domain – that structure concepts in much the same way that the conceptual metaphor in the target domain does. And finally, they will be described by means of the network of correspondences that exist between metaphorical vehicles – or generic metaphorical structures – and the Hebrew expressions in the target domain.

Keywords: cognitive theology, conceptual metaphor in the Old Testament, conceptual metaphors of the Torah, conceptual domain of law, righteousness, and justice

Procedia PDF Downloads 201
6319 Management Pattern for Service Sector in Samut Songkram by Sufficient Economy Approach

Authors: Krisada Sungkhamanee

Abstract:

The objectives of this research are to search the management pattern of one district lodging entrepreneurs by sufficient economy ways, to know the constrains that affects this sector and design fit arrangement shape to sustain their business with Samut Songkram style. What will happen if they do not use this approach? Will they have a monetary crisis? The data and information are collected by informal discussions with 8 managers and 400 questionnaires. A mixed methods of both qualitative research and quantitative research are used and Bent Flyvbjerg’s phronesis is utilized for this analysis. Our paper will prove that sufficient economy can help small business firms to solve their problems. We think that the results of our research will be a financial pattern to solve many problems of the entrepreneurs and this way will can be a super model for other provinces of Thailand.

Keywords: Samut Songkram, service sector, sufficient economy, management pattern

Procedia PDF Downloads 365
6318 Preliminary Study of Human Reliability of Control in Case of Fire Based on the Decision Processes and Stress Model of Human in a Fire

Authors: Seung-Un Chae, Heung-Yul Kim, Sa-Kil Kim

Abstract:

This paper presents the findings of preliminary study on human control performance in case of fire. The relationship between human control and human decision is studied in decision processes and stress model of human in a fire. Human behavior aspects involved in the decision process during a fire incident. The decision processes appear that six of individual perceptual processes: recognition, validation, definition, evaluation, commitment, and reassessment. Then, human may be stressed in order to get an optimal decision for their activity. This paper explores problems in human control processes and stresses in a catastrophic situation. Thus, the future approach will be concerned to reduce stresses and ambiguous irrelevant information.

Keywords: human reliability, decision processes, stress model, fire

Procedia PDF Downloads 986
6317 Sorghum Resilience and Sustainability under Limiting and Non-limiting Conditions of Water and Nitrogen

Authors: Muhammad Tanveer Altaf, Mehmet Bedir, Waqas Liaqat, Gönül Cömertpay, Volkan Çatalkaya, Celaluddin Barutçular, Nergiz Çoban, Ibrahim Cerit, Muhammad Azhar Nadeem, Tolga Karaköy, Faheem Shehzad Baloch

Abstract:

Food production needs to be almost double by 2050 in order to feed around 9 billion people around the Globe. Plant production mostly relies on fertilizers, which also have one of the main roles in environmental pollution. In addition to this, climatic conditions are unpredictable, and the earth is expected to face severe drought conditions in the future. Therefore, water and fertilizers, especially nitrogen are considered as main constraints for future food security. To face these challenges, developing integrative approaches for germplasm characterization and selecting the resilient genotypes performing under limiting conditions is very crucial for effective breeding to meet the food requirement under climatic change scenarios. This study is part of the European Research Area Network (ERANET) project for the characterization of the diversity panel of 172 sorghum accessions and six hybrids as control cultivars under limiting (+N/-H2O, -N/+H2O) and non-limiting conditions (+N+H2O). This study was planned to characterize the sorghum diversity in relation to resource Use Efficiency (RUE), with special attention on harnessing the interaction between genotype and environment (GxE) from a physiological and agronomic perspective. Experiments were conducted at Adana, a Mediterranean climate, with augmented design, and data on various agronomic and physiological parameters were recorded. Plentiful diversity was observed in the sorghum diversity panel and significant variations were seen among the limiting water and nitrogen conditions in comparison with the control experiment. Potential genotypes with the best performance are identified under limiting conditions. Whole genome resequencing was performed for whole germplasm under investigation for diversity analysis. GWAS analysis will be performed using genotypic and phenotypic data and linked markers will be identified. The results of this study will show the adaptation and improvement of sorghum under climate change conditions for future food security.

Keywords: germplasm, sorghum, drought, nitrogen, resources use efficiency, sequencing

Procedia PDF Downloads 77
6316 Corruption and Income: Case of Independent Turkish Republic

Authors: Rahime Hülya Öztürk

Abstract:

Along with the development of globalization, the relationship between economic, politic and commercial behaviors became unlimited. The liberalization of capital has many advantages for countries, but it also has some disadvantages. In these disadvantages the most important one is corruption. Especially in Developing Countries and Underdeveloped countries, corruption is very extensive. Corruption causes inefficient use of resources and promotes income inequality. Especially in the transition period of economies corruption increases and sometimes governments don’t interfere. To fight against corruption domestic and international measures are taken. Corruption is an economic problem, but it also has social and moral effects. The aim of this study is to define the relationship between corruption and income in Independent Turkish State. In the first part of the study, the concept of corruption is examined. In the second part of the study, information about The Independent Turkish Republic is given. In the third part of the study, country’s relationship between corruption and income is analyzed with panel data analysis.

Keywords: corruption, income, independent Turkish Republic, distribution of income

Procedia PDF Downloads 315
6315 Image Steganography Using Least Significant Bit Technique

Authors: Preeti Kumari, Ridhi Kapoor

Abstract:

 In any communication, security is the most important issue in today’s world. In this paper, steganography is the process of hiding the important data into other data, such as text, audio, video, and image. The interest in this topic is to provide availability, confidentiality, integrity, and authenticity of data. The steganographic technique that embeds hides content with unremarkable cover media so as not to provoke eavesdropper’s suspicion or third party and hackers. In which many applications of compression, encryption, decryption, and embedding methods are used for digital image steganography. Due to compression, the nose produces in the image. To sustain noise in the image, the LSB insertion technique is used. The performance of the proposed embedding system with respect to providing security to secret message and robustness is discussed. We also demonstrate the maximum steganography capacity and visual distortion.

Keywords: steganography, LSB, encoding, information hiding, color image

Procedia PDF Downloads 474
6314 Who Am I at Work: Work Identity Formation

Authors: Carol Belle-Hallsworth

Abstract:

Human interaction at work evolves over time and, with it, work identity. The social identity is built upon the development of its underpinning and preceding stages. Work identity can be viewed in the same way and will shift based on changes in the work environment and challenges to the work identity (threats to the four stages). This paper provides an analysis of how the stages of trust, autonomy, industry and initiative are related to the employee identity at work. Describing how they are related to each other and the development of identity. It has become common to notice changes in employee behavior during and after major operational changes in an organization. Previous studies suggest that there are emotional triggers that result in the new behaviors displayed. This study seeks to test a theoretical model by testing the relationship between the first four Erikson stages as constructs. A randomized sample of participants undertook a self-administered survey to capture information on trust, autonomy, initiative, and industry.

Keywords: work identity, change management, organizational management, technology implementation

Procedia PDF Downloads 306
6313 Modelling of Hydric Behaviour of Textiles

Authors: A. Marolleau, F. Salaun, D. Dupont, H. Gidik, S. Ducept.

Abstract:

The goal of this study is to analyze the hydric behaviour of textiles which can impact significantly the comfort of the wearer. Indeed, fabrics can be adapted for different climate if hydric and thermal behaviors are known. In this study, fabrics are only submitted to hydric variations. Sorption and desorption isotherms obtained from the dynamic vapour sorption apparatus (DVS) are fitted with the parallel exponential kinetics (PEK), the Hailwood-Horrobin (HH) and the Brunauer-Emmett-Teller (BET) models. One of the major finding is the relationship existing between PEK and HH models. During slow and fast processes, the sorption of water molecules on the polymer can be in monolayer and multilayer form. According to the BET model, moisture regain, a physical property of textiles, show a linear correlation with the total amount of water taken in monolayer. This study provides potential information of the end uses of these fabrics according to the selected activity level.

Keywords: comfort, hydric properties, modelling, underwears

Procedia PDF Downloads 149
6312 Flexible Integration of Airbag Weakening Lines in Interior Components: Airbag Weakening with Jenoptik Laser Technology

Authors: Markus Remm, Sebastian Dienert

Abstract:

Vehicle interiors are not only changing in terms of design and functionality but also due to new driving situations in which, for example, autonomous operating modes are possible. Flexible seating positions are changing the requirements for passive safety system behavior and location in the interior of a vehicle. With fully autonomous driving, the driver can, for example, leave the position behind the steering wheel and take a seated position facing backward. Since autonomous and non-autonomous vehicles will share the same road network for the foreseeable future, accidents cannot be avoided, which makes the use of passive safety systems indispensable. With JENOPTIK-VOTAN® A technology, the trend towards flexible predetermined airbag weakening lines is enabled. With the help of laser beams, the predetermined weakening lines are introduced from the backside of the components so that they are absolutely invisible. This machining process is sensor-controlled and guarantees that a small residual wall thickness remains for the best quality and reliability for airbag weakening lines. Due to the wide processing range of the laser, the processing of almost all materials is possible. A CO₂ laser is used for many plastics, natural fiber materials, foams, foils and material composites. A femtosecond laser is used for natural materials and textiles that are very heat-sensitive. This laser type has extremely short laser pulses with very high energy densities. Supported by a high-precision and fast movement of the laser beam by a laser scanner system, the so-called cold ablation is enabled to predetermine weakening lines layer by layer until the desired residual wall thickness remains. In that way, for example, genuine leather can be processed in a material-friendly and process-reliable manner without design implications to the components A-Side. Passive safety in the vehicle is increased through the interaction of modern airbag technology and high-precision laser airbag weakening. The JENOPTIK-VOTAN® A product family has been representing this for more than 25 years and is pointing the way to the future with new and innovative technologies.

Keywords: design freedom, interior material processing, laser technology, passive safety

Procedia PDF Downloads 121
6311 Developing A Third Degree Of Freedom For Opinion Dynamics Models Using Scales

Authors: Dino Carpentras, Alejandro Dinkelberg, Michael Quayle

Abstract:

Opinion dynamics models use an agent-based modeling approach to model people’s opinions. Model's properties are usually explored by testing the two 'degrees of freedom': the interaction rule and the network topology. The latter defines the connection, and thus the possible interaction, among agents. The interaction rule, instead, determines how agents select each other and update their own opinion. Here we show the existence of the third degree of freedom. This can be used for turning one model into each other or to change the model’s output up to 100% of its initial value. Opinion dynamics models represent the evolution of real-world opinions parsimoniously. Thus, it is fundamental to know how real-world opinion (e.g., supporting a candidate) could be turned into a number. Specifically, we want to know if, by choosing a different opinion-to-number transformation, the model’s dynamics would be preserved. This transformation is typically not addressed in opinion dynamics literature. However, it has already been studied in psychometrics, a branch of psychology. In this field, real-world opinions are converted into numbers using abstract objects called 'scales.' These scales can be converted one into the other, in the same way as we convert meters to feet. Thus, in our work, we analyze how this scale transformation may affect opinion dynamics models. We perform our analysis both using mathematical modeling and validating it via agent-based simulations. To distinguish between scale transformation and measurement error, we first analyze the case of perfect scales (i.e., no error or noise). Here we show that a scale transformation may change the model’s dynamics up to a qualitative level. Meaning that a researcher may reach a totally different conclusion, even using the same dataset just by slightly changing the way data are pre-processed. Indeed, we quantify that this effect may alter the model’s output by 100%. By using two models from the standard literature, we show that a scale transformation can transform one model into the other. This transformation is exact, and it holds for every result. Lastly, we also test the case of using real-world data (i.e., finite precision). We perform this test using a 7-points Likert scale, showing how even a small scale change may result in different predictions or a number of opinion clusters. Because of this, we think that scale transformation should be considered as a third-degree of freedom for opinion dynamics. Indeed, its properties have a strong impact both on theoretical models and for their application to real-world data.

Keywords: degrees of freedom, empirical validation, opinion scale, opinion dynamics

Procedia PDF Downloads 155
6310 Topology-Based Character Recognition Method for Coin Date Detection

Authors: Xingyu Pan, Laure Tougne

Abstract:

For recognizing coins, the graved release date is important information to identify precisely its monetary type. However, reading characters in coins meets much more obstacles than traditional character recognition tasks in the other fields, such as reading scanned documents or license plates. To address this challenging issue in a numismatic context, we propose a training-free approach dedicated to detection and recognition of the release date of the coin. In the first step, the date zone is detected by comparing histogram features; in the second step, a topology-based algorithm is introduced to recognize coin numbers with various font types represented by binary gradient map. Our method obtained a recognition rate of 92% on synthetic data and of 44% on real noised data.

Keywords: coin, detection, character recognition, topology

Procedia PDF Downloads 253
6309 Association of Social Data as a Tool to Support Government Decision Making

Authors: Diego Rodrigues, Marcelo Lisboa, Elismar Batista, Marcos Dias

Abstract:

Based on data on child labor, this work arises questions about how to understand and locate the factors that make up the child labor rates, and which properties are important to analyze these cases. Using data mining techniques to discover valid patterns on Brazilian social databases were evaluated data of child labor in the State of Tocantins (located north of Brazil with a territory of 277000 km2 and comprises 139 counties). This work aims to detect factors that are deterministic for the practice of child labor and their relationships with financial indicators, educational, regional and social, generating information that is not explicit in the government database, thus enabling better monitoring and updating policies for this purpose.

Keywords: social data, government decision making, association of social data, data mining

Procedia PDF Downloads 369
6308 Empowering Women Entrepreneurs in Rural India through Developing Online Communities of Purpose Using Social Technologies

Authors: Jayanta Basak, Somprakash Bandyopadhyay, Parama Bhaumik, Siuli Roy

Abstract:

To solve the life and livelihood related problems of socially and economically backward rural women in India, several Women Self-Help Groups (WSHG) are formed in Indian villages. WSHGs are micro-communities (with 10-to 15 members) within a village community. WSHGs have been conceived not just to promote savings and provide credit, but also to act as a vehicle of change through the creation of women micro-entrepreneurs at the village level. However, in spite of huge investment and volume of people involved in the whole process, the success is still limited. Most of these entrepreneurial activities happen in small household workspaces where sales are limited to the inconsistent and unpredictable local markets. As a result, these entrepreneurs are perennially trapped in the vicious cycle of low risk taking ability, low investment capacity, low productivity, weak market linkages and low revenue. Market separation including customer-producer separation is one of the key problems in this domain. Researchers suggest that there are four types of market separation: (i) spatial, (ii) financial, (iii) temporal, and (iv) informational, which in turn impacts the nature of markets and marketing. In this context, a large group of intermediaries (the 'middleman') plays important role in effectively reducing the factors that separate markets by utilizing the resource of rural entrepreneurs, their products and thus, accelerate market development. The rural entrepreneurs are heavily dependent on these middlemen for marketing of their products and these middlemen exploit rural entrepreneurs by creating a huge informational separation between the rural producers and end-consumers in the market and thus hiding the profit margins. The objective of this study is to develop a transparent, online communities of purpose among rural and urban entrepreneurs using internet and web 2.0 technologies in order to decrease market separation and improve mutual awareness of available and potential products and market demands. Communities of purpose are groups of people who have an ability to influence, can share knowledge and learn from others, and be committed to achieving a common purpose. In this study, a cluster of SHG women located in a village 'Kandi' of West Bengal, India has been studied closely for six months. These women are primarily engaged in producing garments, soft toys, fabric painting on clothes, etc. These women were equipped with internet-enabled smart-phones where they can use chat applications in local language and common social networking websites like Facebook, Instagram, etc. A few handicraft experts and micro-entrepreneurs from the city (the 'seed') were included in their mobile messaging app group that enables the creation of a 'community of purpose' in order to share thoughts and ideas on product designs, market trends, and practices, and thus decrease the rural-urban market separation. After six months of regular group interaction in mobile messaging app among these rural-urban community members, it is observed that SHG women are empowered now to share their product images, design ideas, showcase, and promote their products in global marketplace using some common social networking websites through which they can also enhance and augment their community of purpose.

Keywords: communities of purpose, market separation, self-help group, social technologies

Procedia PDF Downloads 256
6307 Thermal Properties of the Ground in Cyprus and Their Correlations and Effect on the Efficiency of Ground Heat Exchangers

Authors: G. A. Florides, E. Theofanous, I. Iosif-Stylianou, P. Christodoulides, S. Kalogirou, V. Messarites, Z. Zomeni, E. Tsiolakis, P. D. Pouloupatis, G. P. Panayiotou

Abstract:

Ground Coupled Heat Pumps (GCHPs) exploit effectively the heat capacity of the ground, with the use of Ground Heat Exchangers (GHE). Depending on the mode of operation of the GCHPs, GHEs dissipate or absorb heat from the ground. For sizing the GHE the thermal properties of the ground need to be known. This paper gives information about the density, thermal conductivity, specific heat and thermal diffusivity of various lithologies encountered in Cyprus with various relations between these properties being examined through comparison and modeling. The results show that the most important correlation is the one encountered between thermal conductivity and thermal diffusivity with both properties showing similar response to the inlet and outlet flow temperature of vertical and horizontal heat exchangers.

Keywords: ground heat exchangers, ground thermal conductivity, ground thermal diffusivity, ground thermal properties

Procedia PDF Downloads 380
6306 Algorithms Inspired from Human Behavior Applied to Optimization of a Complex Process

Authors: S. Curteanu, F. Leon, M. Gavrilescu, S. A. Floria

Abstract:

Optimization algorithms inspired from human behavior were applied in this approach, associated with neural networks models. The algorithms belong to human behaviors of learning and cooperation and human competitive behavior classes. For the first class, the main strategies include: random learning, individual learning, and social learning, and the selected algorithms are: simplified human learning optimization (SHLO), social learning optimization (SLO), and teaching-learning based optimization (TLBO). For the second class, the concept of learning is associated with competitiveness, and the selected algorithms are sports-inspired algorithms (with Football Game Algorithm, FGA and Volleyball Premier League, VPL) and Imperialist Competitive Algorithm (ICA). A real process, the synthesis of polyacrylamide-based multicomponent hydrogels, where some parameters are difficult to obtain experimentally, is considered as a case study. Reaction yield and swelling degree are predicted as a function of reaction conditions (acrylamide concentration, initiator concentration, crosslinking agent concentration, temperature, reaction time, and amount of inclusion polymer, which could be starch, poly(vinyl alcohol) or gelatin). The experimental results contain 175 data. Artificial neural networks are obtained in optimal form with biologically inspired algorithm; the optimization being perform at two level: structural and parametric. Feedforward neural networks with one or two hidden layers and no more than 25 neurons in intermediate layers were obtained with values of correlation coefficient in the validation phase over 0.90. The best results were obtained with TLBO algorithm, correlation coefficient being 0.94 for an MLP(6:9:20:2) – a feedforward neural network with two hidden layers and 9 and 20, respectively, intermediate neurons. Good results obtained prove the efficiency of the optimization algorithms. More than the good results, what is important in this approach is the simulation methodology, including neural networks and optimization biologically inspired algorithms, which provide satisfactory results. In addition, the methodology developed in this approach is general and has flexibility so that it can be easily adapted to other processes in association with different types of models.

Keywords: artificial neural networks, human behaviors of learning and cooperation, human competitive behavior, optimization algorithms

Procedia PDF Downloads 108
6305 Inversely Designed Chipless Radio Frequency Identification (RFID) Tags Using Deep Learning

Authors: Madhawa Basnayaka, Jouni Paltakari

Abstract:

Fully passive backscattering chipless RFID tags are an emerging wireless technology with low cost, higher reading distance, and fast automatic identification without human interference, unlike already available technologies like optical barcodes. The design optimization of chipless RFID tags is crucial as it requires replacing integrated chips found in conventional RFID tags with printed geometric designs. These designs enable data encoding and decoding through backscattered electromagnetic (EM) signatures. The applications of chipless RFID tags have been limited due to the constraints of data encoding capacity and the ability to design accurate yet efficient configurations. The traditional approach to accomplishing design parameters for a desired EM response involves iterative adjustment of design parameters and simulating until the desired EM spectrum is achieved. However, traditional numerical simulation methods encounter limitations in optimizing design parameters efficiently due to the speed and resource consumption. In this work, a deep learning neural network (DNN) is utilized to establish a correlation between the EM spectrum and the dimensional parameters of nested centric rings, specifically square and octagonal. The proposed bi-directional DNN has two simultaneously running neural networks, namely spectrum prediction and design parameters prediction. First, spectrum prediction DNN was trained to minimize mean square error (MSE). After the training process was completed, the spectrum prediction DNN was able to accurately predict the EM spectrum according to the input design parameters within a few seconds. Then, the trained spectrum prediction DNN was connected to the design parameters prediction DNN and trained two networks simultaneously. For the first time in chipless tag design, design parameters were predicted accurately after training bi-directional DNN for a desired EM spectrum. The model was evaluated using a randomly generated spectrum and the tag was manufactured using the predicted geometrical parameters. The manufactured tags were successfully tested in the laboratory. The amount of iterative computer simulations has been significantly decreased by this approach. Therefore, highly efficient but ultrafast bi-directional DNN models allow rapid and complicated chipless RFID tag designs.

Keywords: artificial intelligence, chipless RFID, deep learning, machine learning

Procedia PDF Downloads 50
6304 Contribution for Rural Development Trough Training in Organic Farming

Authors: Raquel P. F. Guiné, Daniela V. T. A. Costa, Paula M. R. Correia, Moisés Castro, Luis T. Guerra, Cristina A. Costa

Abstract:

The aim of this work was to characterize a potential target group of people interested in participating into a training program in organic farming in the context of mobile-learning. The information sought addressed in particular, but not exclusively, possible contents, formats and forms of evaluation that will contribute to define the course objectives and curriculum, as well as to ensure that the course meets the needs of the learners and their preferences. The sample was selected among different European countries. The questionnaires were delivered electronically for answering online and in the end 135 consented valid questionnaires were obtained. The results allowed characterizing the target group and identifying their training needs and preferences towards m-learning formats, giving valuable tools to design the training offer.

Keywords: mobile-learning, organic farming, rural development, survey

Procedia PDF Downloads 502
6303 Smart Sensor Data to Predict Machine Performance with IoT-Based Machine Learning and Artificial Intelligence

Authors: C. J. Rossouw, T. I. van Niekerk

Abstract:

The global manufacturing industry is utilizing the internet and cloud-based services to further explore the anatomy and optimize manufacturing processes in support of the movement into the Fourth Industrial Revolution (4IR). The 4IR from a third world and African perspective is hindered by the fact that many manufacturing systems that were developed in the third industrial revolution are not inherently equipped to utilize the internet and services of the 4IR, hindering the progression of third world manufacturing industries into the 4IR. This research focuses on the development of a non-invasive and cost-effective cyber-physical IoT system that will exploit a machine’s vibration to expose semantic characteristics in the manufacturing process and utilize these results through a real-time cloud-based machine condition monitoring system with the intention to optimize the system. A microcontroller-based IoT sensor was designed to acquire a machine’s mechanical vibration data, process it in real-time, and transmit it to a cloud-based platform via Wi-Fi and the internet. Time-frequency Fourier analysis was applied to the vibration data to form an image representation of the machine’s behaviour. This data was used to train a Convolutional Neural Network (CNN) to learn semantic characteristics in the machine’s behaviour and relate them to a state of operation. The same data was also used to train a Convolutional Autoencoder (CAE) to detect anomalies in the data. Real-time edge-based artificial intelligence was achieved by deploying the CNN and CAE on the sensor to analyse the vibration. A cloud platform was deployed to visualize the vibration data and the results of the CNN and CAE in real-time. The cyber-physical IoT system was deployed on a semi-automated metal granulation machine with a set of trained machine learning models. Using a single sensor, the system was able to accurately visualize three states of the machine’s operation in real-time. The system was also able to detect a variance in the material being granulated. The research demonstrates how non-IoT manufacturing systems can be equipped with edge-based artificial intelligence to establish a remote machine condition monitoring system.

Keywords: IoT, cyber-physical systems, artificial intelligence, manufacturing, vibration analytics, continuous machine condition monitoring

Procedia PDF Downloads 88
6302 Developed Text-Independent Speaker Verification System

Authors: Mohammed Arif, Abdessalam Kifouche

Abstract:

Speech is a very convenient way of communication between people and machines. It conveys information about the identity of the talker. Since speaker recognition technology is increasingly securing our everyday lives, the objective of this paper is to develop two automatic text-independent speaker verification systems (TI SV) using low-level spectral features and machine learning methods. (i) The first system is based on a support vector machine (SVM), which was widely used in voice signal processing with the aim of speaker recognition involving verifying the identity of the speaker based on its voice characteristics, and (ii) the second is based on Gaussian Mixture Model (GMM) and Universal Background Model (UBM) to combine different functions from different resources to implement the SVM based.

Keywords: speaker verification, text-independent, support vector machine, Gaussian mixture model, cepstral analysis

Procedia PDF Downloads 58
6301 Fostering Organizational Learning across the Canadian Sport System through Leadership and Mentorship Development of Sport Science Leaders

Authors: Jennifer Walinga, Samantha Heron

Abstract:

The goal of the study was to inform the design of effective leadership and mentorship development programming for sport science leaders within the network of Canadian sport institutes and centers. The LEAD (Learn, Engage, Accelerate, Develop) program was implemented to equip sport science leaders with the leadership knowledge, skills, and practice to foster a high - performance culture, enhance the daily training environment, and contribute to optimal performance in sport. After two years of delivery, this analysis of LEAD’s effect on individual and organizational health and performance factors informs the quality of future deliveries and identifies best practice for leadership development across the Canadian sport system and beyond. A larger goal for this project was to inform the public sector more broadly and position sport as a source of best practice for human and social health, development, and performance. The objectives of this study were to review and refine the LEAD program in collaboration with Canadian Sport Institute and Centre leaders, 40-50 participants from three cohorts, and the LEAD program advisory committee, and to trace the effects of the LEAD leadership development program on key leadership mentorship and organizational health indicators across the Canadian sport institutes and centers so as to capture best practice. The study followed a participatory action research framework (PAR) using semi structured interviews with sport scientist participants, program and institute leaders inquiring into impact on specific individual and organizational health and performance factors. Findings included a strong increase in self-reported leadership knowledge, skill, language and confidence, enhancement of human and organizational health factors, and the opportunity to explore more deeply issues of diversity and inclusion, psychological safety, team dynamics, and performance management. The study was significant in building sport leadership and mentorship development strategies for managing change efforts, addressing inequalities, and building personal and operational resilience amidst challenges of uncertainty, pressure, and constraint in real time.

Keywords: sport leadership, sport science leader, leadership development, professional development, sport education, mentorship

Procedia PDF Downloads 23