Search results for: median problem
6664 Efficient Heuristic Algorithm to Speed Up Graphcut in Gpu for Image Stitching
Authors: Tai Nguyen, Minh Bui, Huong Ninh, Tu Nguyen, Hai Tran
Abstract:
GraphCut algorithm has been widely utilized to solve various types of computer vision problems. Its expensive computational cost encouraged many researchers to improve the speed of the algorithm. Recent works proposed schemes that work on parallel computing platforms such as CUDA. However, the problem of low convergence speed prevents the usage of GraphCut for real time applications. In this paper, we propose global suppression heuristic to boost the conver-gence process of the algorithm. A parallel implementation of GraphCut algorithm on CUDA designed for the image stitching problem is introduced. Our method achieves up to 3× time boost on the graph of size 80 × 480 compared to the best sequential GraphCut algorithm while achieving satisfactory stitched images, suitable for panorama applications. Our source code will be soon available for further research.Keywords: CUDA, graph cut, image stitching, texture synthesis, maxflow/mincut algorithm
Procedia PDF Downloads 1326663 Use of Technology to Improve Students’ Attitude in Learning Mathematics of Non- Mathematics Undergraduate Students
Authors: Asia Majeed
Abstract:
The learning of mathematics in science, engineering and social science programs can be enhanced through practical problem-solving techniques. The instructors can design their lessons with some strategies to improve students’ educational needs and accomplishments in mathematics classrooms. The use of technology in class problem solving and application sessions can enhance deep understanding of mathematics among students. As mathematician, we believe in subject specific and content-driven teaching methods. Through technology the relationship between the physical problems and the mathematical models can be analyzed. This paper is about selective use of technology in mathematics classrooms and helpful to others mathematics instructors who wishes to improve their traditional teaching techniques to improve students’ attitude in learning mathematics. These techniques corpus can be used in teaching large mathematics classes in science, technology, engineering, and social science.Keywords: attitude in learning mathematics, mathematics, non-mathematics undergraduate students, technology
Procedia PDF Downloads 2226662 A Data Driven Approach for the Degradation of a Lithium-Ion Battery Based on Accelerated Life Test
Authors: Alyaa M. Younes, Nermine Harraz, Mohammad H. Elwany
Abstract:
Lithium ion batteries are currently used for many applications including satellites, electric vehicles and mobile electronics. Their ability to store relatively large amount of energy in a limited space make them most appropriate for critical applications. Evaluation of the life of these batteries and their reliability becomes crucial to the systems they support. Reliability of Li-Ion batteries has been mainly considered based on its lifetime. However, another important factor that can be considered critical in many applications such as in electric vehicles is the cycle duration. The present work presents the results of an experimental investigation on the degradation behavior of a Laptop Li-ion battery (type TKV2V) and the effect of applied load on the battery cycle time. The reliability was evaluated using an accelerated life test. Least squares linear regression with median rank estimation was used to estimate the Weibull distribution parameters needed for the reliability functions estimation. The probability density function, failure rate and reliability function under each of the applied loads were evaluated and compared. An inverse power model is introduced that can predict cycle time at any stress level given.Keywords: accelerated life test, inverse power law, lithium-ion battery, reliability evaluation, Weibull distribution
Procedia PDF Downloads 1686661 Unusual High Origin and Superficial Course of Radial Artery: A Case Report with Embryological Explanation
Authors: Anasuya Ghosh, Subhramoy Chaudhury
Abstract:
During routine cadaveric dissection at gross anatomy lab of our institution, a radial artery was found with unusual origin and superficial course. Normally the radial artery takes its origin as one of the terminal branches of brachial artery at the level of the neck of radius. It usually lies along the lateral border of fore arm deep to the brachioradialis muscle. While dissecting a 72-year-old Caucasian female cadaver, it was found that the right sided radial artery originated from the upper part of brachial artery of arm, 2 cm below the lower border of teres major muscle, from the lateral aspect of brachial artery. Then the radial artery superficially crossed the brachial artery and median nerve from lateral to medial direction and rested superficially at the cubital fossa. Embryologically, it can be explained as a failure of disappearance, or abnormal persistence of some insignificant embryonic vessels may give rise to this kind of vascular anomalies. As radial artery is one of the most important upper limb arteries, its variation and related complications are clinically significant. This unusual origin and course of radial artery should be kept in mind by all healthcare providers including surgeons and radiologists during routine venipuncture, orthopedic and plastic surgeries of arm, coronary angiographic procedures in radial approach etc. to prevent unwanted complications.Keywords: brachial artery anomalies, brachio-radial artery, high origin radial artery, superficial radial artery
Procedia PDF Downloads 3256660 Robust Medical Image Watermarking based on Contourlet and Extraction Using ICA
Authors: S. Saju, G. Thirugnanam
Abstract:
In this paper, a medical image watermarking algorithm based on contourlet is proposed. Medical image watermarking is a special subcategory of image watermarking in the sense that images have special requirements. Watermarked medical images should not differ perceptually from their original counterparts because clinical reading of images must not be affected. Watermarking techniques based on wavelet transform are reported in many literatures but robustness and security using contourlet are better when compared to wavelet transform. The main challenge in exploring geometry in images comes from the discrete nature of the data. In this paper, original image is decomposed to two level using contourlet and the watermark is embedded in the resultant sub-bands. Sub-band selection is based on the value of Peak Signal to Noise Ratio (PSNR) that is calculated between watermarked and original image. To extract the watermark, Kernel ICA is used and it has a novel characteristic is that it does not require the transformation process to extract the watermark. Simulation results show that proposed scheme is robust against attacks such as Salt and Pepper noise, Median filtering and rotation. The performance measures like PSNR and Similarity measure are evaluated and compared with Discrete Wavelet Transform (DWT) to prove the robustness of the scheme. Simulations are carried out using Matlab Software.Keywords: digital watermarking, independent component analysis, wavelet transform, contourlet
Procedia PDF Downloads 5286659 A Contribution to the Polynomial Eigen Problem
Authors: Malika Yaici, Kamel Hariche, Tim Clarke
Abstract:
The relationship between eigenstructure (eigenvalues and eigenvectors) and latent structure (latent roots and latent vectors) is established. In control theory eigenstructure is associated with the state space description of a dynamic multi-variable system and a latent structure is associated with its matrix fraction description. Beginning with block controller and block observer state space forms and moving on to any general state space form, we develop the identities that relate eigenvectors and latent vectors in either direction. Numerical examples illustrate this result. A brief discussion of the potential of these identities in linear control system design follows. Additionally, we present a consequent result: a quick and easy method to solve the polynomial eigenvalue problem for regular matrix polynomials.Keywords: eigenvalues/eigenvectors, latent values/vectors, matrix fraction description, state space description
Procedia PDF Downloads 4706658 The Whale Optimization Algorithm and Its Implementation in MATLAB
Authors: S. Adhirai, R. P. Mahapatra, Paramjit Singh
Abstract:
Optimization is an important tool in making decisions and in analysing physical systems. In mathematical terms, an optimization problem is the problem of finding the best solution from among the set of all feasible solutions. The paper discusses the Whale Optimization Algorithm (WOA), and its applications in different fields. The algorithm is tested using MATLAB because of its unique and powerful features. The benchmark functions used in WOA algorithm are grouped as: unimodal (F1-F7), multimodal (F8-F13), and fixed-dimension multimodal (F14-F23). Out of these benchmark functions, we show the experimental results for F7, F11, and F19 for different number of iterations. The search space and objective space for the selected function are drawn, and finally, the best solution as well as the best optimal value of the objective function found by WOA is presented. The algorithmic results demonstrate that the WOA performs better than the state-of-the-art meta-heuristic and conventional algorithms.Keywords: optimization, optimal value, objective function, optimization problems, meta-heuristic optimization algorithms, Whale Optimization Algorithm, implementation, MATLAB
Procedia PDF Downloads 3716657 A User-Directed Approach to Optimization via Metaprogramming
Authors: Eashan Hatti
Abstract:
In software development, programmers often must make a choice between high-level programming and high-performance programs. High-level programming encourages the use of complex, pervasive abstractions. However, the use of these abstractions degrades performance-high performance demands that programs be low-level. In a compiler, the optimizer attempts to let the user have both. The optimizer takes high-level, abstract code as an input and produces low-level, performant code as an output. However, there is a problem with having the optimizer be a built-in part of the compiler. Domain-specific abstractions implemented as libraries are common in high-level languages. As a language’s library ecosystem grows, so does the number of abstractions that programmers will use. If these abstractions are to be performant, the optimizer must be extended with new optimizations to target them, or these abstractions must rely on existing general-purpose optimizations. The latter is often not as effective as needed. The former presents too significant of an effort for the compiler developers, as they are the only ones who can extend the language with new optimizations. Thus, the language becomes more high-level, yet the optimizer – and, in turn, program performance – falls behind. Programmers are again confronted with a choice between high-level programming and high-performance programs. To investigate a potential solution to this problem, we developed Peridot, a prototype programming language. Peridot’s main contribution is that it enables library developers to easily extend the language with new optimizations themselves. This allows the optimization workload to be taken off the compiler developers’ hands and given to a much larger set of people who can specialize in each problem domain. Because of this, optimizations can be much more effective while also being much more numerous. To enable this, Peridot supports metaprogramming designed for implementing program transformations. The language is split into two fragments or “levels”, one for metaprogramming, the other for high-level general-purpose programming. The metaprogramming level supports logic programming. Peridot’s key idea is that optimizations are simply implemented as metaprograms. The meta level supports several specific features which make it particularly suited to implementing optimizers. For instance, metaprograms can automatically deduce equalities between the programs they are optimizing via unification, deal with variable binding declaratively via higher-order abstract syntax, and avoid the phase-ordering problem via non-determinism. We have found that this design centered around logic programming makes optimizers concise and easy to write compared to their equivalents in functional or imperative languages. Overall, implementing Peridot has shown that its design is a viable solution to the problem of writing code which is both high-level and performant.Keywords: optimization, metaprogramming, logic programming, abstraction
Procedia PDF Downloads 876656 Students' Errors in Translating Algebra Word Problems to Mathematical Structure
Authors: Ledeza Jordan Babiano
Abstract:
Translating statements into mathematical notations is one of the processes in word problem-solving. However, based on the literature, students still have difficulties with this skill. The purpose of this study was to investigate the translation errors of the students when they translate algebraic word problems into mathematical structures and locate the errors via the lens of the Translation-Verification Model. Moreover, this qualitative research study employed content analysis. During the data-gathering process, the students were asked to answer a six-item algebra word problem questionnaire, and their answers were analyzed by experts through blind coding using the Translation-Verification Model to determine their translation errors. After this, a focus group discussion was conducted, and the data gathered was analyzed through thematic analysis to determine the causes of the students’ translation errors. It was found out that students’ prevalent error in translation was the interpretation error, which was situated in the Attribute construct. The emerging themes during the FGD were: (1) The procedure of translation is strategically incorrect; (2) Lack of comprehension; (3) Algebra concepts related to difficulty; (4) Lack of spatial skills; (5) Unprepared for independent learning; and (6) The content of the problem is developmentally inappropriate. These themes boiled down to the major concept of independent learning preparedness in solving mathematical problems. This concept has subcomponents, which include contextual and conceptual factors in translation. Consequently, the results provided implications for instructors and professors in Mathematics to innovate their teaching pedagogies and strategies to address translation gaps among students.Keywords: mathematical structure, algebra word problems, translation, errors
Procedia PDF Downloads 496655 Enhancing Problem Communication and Management Using Civil Information Modeling for Infrastructure Projects
Authors: Yu-Cheng Lin, Yu-Chih Su
Abstract:
Generally, there are many numerous existing problems during the construction phase special in civil engineering. The problems communication and management (PCM) of civil engineering are important and necessary to enhance the performance of construction management. The civil information modelling (CIM) approach is used to retain information with digital format and assist easy updating and transferring of information in the 3D environment for all related civil and infrastructure projects. When the application of CIM technology is adopted in infrastructure projects, all the related project participants can discuss problems and obtain feedback and responds among project participants integrated with the assistance of CIM models 3D illustration. Usually, electronic mail (e-mail) is one of the most popular communication tools among all related participants for rapid transit system (MRT), also known as a subway or metro, construction project in Taiwan. Furthermore, all interfaces should be traced and managed effectively during the process. However, there are many problems with the use of e-mail for communication of all interfaces. To solve the above problems, this study proposes a CIM-based Problem Communication and Management (CPCM) system to improve performance of problem communication and management. The CPCM system is applied to a case study of an MRT project in Taiwan to identify its CPCM effectiveness. Case study results show that the proposed CPCM system and Markup-enabled CIM Viewer are effective CIM-based communication tools in CIM-supported PCM work of civil engineering. Finally, this study identifies conclusion, suggestion, benefits, and limitations for further applications.Keywords: building information modeling, civil information modeling, infrastructure, general contractor
Procedia PDF Downloads 1526654 A Communication Signal Recognition Algorithm Based on Holder Coefficient Characteristics
Authors: Hui Zhang, Ye Tian, Fang Ye, Ziming Guo
Abstract:
Communication signal modulation recognition technology is one of the key technologies in the field of modern information warfare. At present, communication signal automatic modulation recognition methods are mainly divided into two major categories. One is the maximum likelihood hypothesis testing method based on decision theory, the other is a statistical pattern recognition method based on feature extraction. Now, the most commonly used is a statistical pattern recognition method, which includes feature extraction and classifier design. With the increasingly complex electromagnetic environment of communications, how to effectively extract the features of various signals at low signal-to-noise ratio (SNR) is a hot topic for scholars in various countries. To solve this problem, this paper proposes a feature extraction algorithm for the communication signal based on the improved Holder cloud feature. And the extreme learning machine (ELM) is used which aims at the problem of the real-time in the modern warfare to classify the extracted features. The algorithm extracts the digital features of the improved cloud model without deterministic information in a low SNR environment, and uses the improved cloud model to obtain more stable Holder cloud features and the performance of the algorithm is improved. This algorithm addresses the problem that a simple feature extraction algorithm based on Holder coefficient feature is difficult to recognize at low SNR, and it also has a better recognition accuracy. The results of simulations show that the approach in this paper still has a good classification result at low SNR, even when the SNR is -15dB, the recognition accuracy still reaches 76%.Keywords: communication signal, feature extraction, Holder coefficient, improved cloud model
Procedia PDF Downloads 1566653 Optimization of Personnel Selection Problems via Unconstrained Geometric Programming
Authors: Vildan Kistik, Tuncay Can
Abstract:
From a business perspective, cost and profit are two key factors for businesses. The intent of most businesses is to minimize the cost to maximize or equalize the profit, so as to provide the greatest benefit to itself. However, the physical system is very complicated because of technological constructions, rapid increase of competitive environments and similar factors. In such a system it is not easy to maximize profits or to minimize costs. Businesses must decide on the competence and competence of the personnel to be recruited, taking into consideration many criteria in selecting personnel. There are many criteria to determine the competence and competence of a staff member. Factors such as the level of education, experience, psychological and sociological position, and human relationships that exist in the field are just some of the important factors in selecting a staff for a firm. Personnel selection is a very important and costly process in terms of businesses in today's competitive market. Although there are many mathematical methods developed for the selection of personnel, unfortunately the use of these mathematical methods is rarely encountered in real life. In this study, unlike other methods, an exponential programming model was established based on the possibilities of failing in case the selected personnel was started to work. With the necessary transformations, the problem has been transformed into unconstrained Geometrical Programming problem and personnel selection problem is approached with geometric programming technique. Personnel selection scenarios for a classroom were established with the help of normal distribution and optimum solutions were obtained. In the most appropriate solutions, the personnel selection process for the classroom has been achieved with minimum cost.Keywords: geometric programming, personnel selection, non-linear programming, operations research
Procedia PDF Downloads 2716652 Application of Double Side Approach Method on Super Elliptical Winkler Plate
Authors: Hsiang-Wen Tang, Cheng-Ying Lo
Abstract:
In this study, the static behavior of super elliptical Winkler plate is analyzed by applying the double side approach method. The lack of information about super elliptical Winkler plates is the motivation of this study and we use the double side approach method to solve this problem because of its superior ability on efficiently treating problems with complex boundary shape. The double side approach method has the advantages of high accuracy, easy calculation procedure and less calculation load required. Most important of all, it can give the error bound of the approximate solution. The numerical results not only show that the double side approach method works well on this problem but also provide us the knowledge of static behavior of super elliptical Winkler plate in practical use.Keywords: super elliptical winkler plate, double side approach method, error bound, mechanic
Procedia PDF Downloads 3566651 Modeling Core Flooding Experiments for Co₂ Geological Storage Applications
Authors: Avinoam Rabinovich
Abstract:
CO₂ geological storage is a proven technology for reducing anthropogenic carbon emissions, which is paramount for achieving the ambitious net zero emissions goal. Core flooding experiments are an important step in any CO₂ storage project, allowing us to gain information on the flow of CO₂ and brine in the porous rock extracted from the reservoir. This information is important for understanding basic mechanisms related to CO₂ geological storage as well as for reservoir modeling, which is an integral part of a field project. In this work, a different method for constructing accurate models of CO₂-brine core flooding will be presented. Results for synthetic cases and real experiments will be shown and compared with numerical models to exhibit their predictive capabilities. Furthermore, the various mechanisms which impact the CO₂ distribution and trapping in the rock samples will be discussed, and examples from models and experiments will be provided. The new method entails solving an inverse problem to obtain a three-dimensional permeability distribution which, along with the relative permeability and capillary pressure functions, constitutes a model of the flow experiments. The model is more accurate when data from a number of experiments are combined to solve the inverse problem. This model can then be used to test various other injection flow rates and fluid fractions which have not been tested in experiments. The models can also be used to bridge the gap between small-scale capillary heterogeneity effects (sub-core and core scale) and large-scale (reservoir scale) effects, known as the upscaling problem.Keywords: CO₂ geological storage, residual trapping, capillary heterogeneity, core flooding, CO₂-brine flow
Procedia PDF Downloads 706650 Function Approximation with Radial Basis Function Neural Networks via FIR Filter
Authors: Kyu Chul Lee, Sung Hyun Yoo, Choon Ki Ahn, Myo Taeg Lim
Abstract:
Recent experimental evidences have shown that because of a fast convergence and a nice accuracy, neural networks training via extended Kalman filter (EKF) method is widely applied. However, as to an uncertainty of the system dynamics or modeling error, the performance of the method is unreliable. In order to overcome this problem in this paper, a new finite impulse response (FIR) filter based learning algorithm is proposed to train radial basis function neural networks (RBFN) for nonlinear function approximation. Compared to the EKF training method, the proposed FIR filter training method is more robust to those environmental conditions. Furthermore, the number of centers will be considered since it affects the performance of approximation.Keywords: extended Kalman filter, classification problem, radial basis function networks (RBFN), finite impulse response (FIR) filter
Procedia PDF Downloads 4566649 Toxicity of Biopesticide Metarhizium anisopliae var acridium "Green Muscle" on the Cuticle of the Desert Locust Schistocerca gegaria (Forskål, 1775)
Authors: F. Haddadj, F. Acheuk, S. Hamdi, S. Zenia, A. Smai, H. Saadi, B. Doumandji-Mitiche
Abstract:
Locust is causing significant losses in agricultural production in the countries concerned by the invasion. Up to the present control strategy has consisted only of the spreaders chemicals; they have proven harmful to the environment and. For this, a new control method appeared it comes to the biological control based mostly by using microorganism. It is in that sense is we've made our contribution by the use of a biopesticide which is entomopathogenic fungus Metarhizium anisopliae var acridium "Green Muscle" on part of the cuticule the larval of fifth instar locust Schistocerca gregaria (Forskål, 1775). Preliminary test on the study of the pathogenicity of M. anisopliae var acridium biocontrol agent, was conducted in the laboratory on L5 S. gregaria, on which we inoculated treatment in the digestive tract and it administrant 20μl of entomopathogenic solution orally at a dose DL50 = 3.25 x107 sp./ ml (median lethal dose estimated at earlier), 5 days after treatment individuals are sacrificed. After dissection cuticles are recovered and then subjected to histological sections. The histological technique followed is that of Martoja Martoja-Pierson (1967). Microscopic observation revealed alterations in the architecture of the cuticule which leads to disorganization of cell layers.Keywords: biopesticide, cuticle, desert locust, toxicity
Procedia PDF Downloads 4796648 Attitudes toward Programming Languages Based on Characteristics
Authors: Mohammad Shokoohi-Yekta, Hamid Mirebrahim
Abstract:
A body of research has been devoted to investigating the preferences of computer programmers. These researches used various questionnaires to find out what programming language is most popular among programmers. The problem with such research is that the programmers are usually familiar with only a few languages; therefore, disregarding a number of other languages which might have characteristics that match their preferences more closely. To overcome such a problem, we decided to investigate the preferences of programmers in regards to the characteristics of languages, which help us to discover the languages that include the most characteristics preferred by the users. We conducted a user study to measure the preferences of programmers on different characteristics of programming languages and then tried to compare existing languages in the areas of application, Web and system programming. Overall, the results of our study indicated that the Ruby programming language has the highest preference score in the two areas of application and Web, and C++ has the highest score in the system area. The results of our study can also help programming language designers know the characteristics they should consider when developing new programming languages in order to attract more programmers.Keywords: object orientation, programming language design, programmers' preferences, characteristic
Procedia PDF Downloads 4986647 Vulnerability Assessment for Protection of Ghardaia City to the Inundation of M’zabWadi
Authors: Mustapha Kamel Mihoubi, Reda Madi
Abstract:
The problem of natural disasters in general and flooding in particular is a topic which marks a memorable action in the world and specifically in cities and large urban areas. Torrential floods and faster flows pose a major problem in urban area. Indeed, a better management of risks of floods becomes a growing necessity that must mobilize technical and scientific means to curb the adverse consequences of this phenomenon, especially in the Saharan cities in arid climate. The aim of this study is to deploy a basic calculation approach based on a hydrologic and hydraulic quantification for locating the black spots in urban areas generated by the flooding and to locate the areas that are vulnerable to flooding. The principle of flooding method is applied to the city of Ghardaia to identify vulnerable areas to inundation and to establish maps management and prevention against the risks of flooding.Keywords: Alea, Beni Mzab, cartography, HEC-RAS, inundation, torrential, vulnerability, wadi
Procedia PDF Downloads 3116646 Investigating Problems and Social Support for Mothers of Poor Households
Authors: Niken Hartati
Abstract:
This study provides a description of the problem and sources of social support that given to 90 mothers from poor households. Data were collected using structured interviews with the three main questions: 1) what kind of problem in mothers daily life, 2) to whom mothers ask for help to overcome it and 3) the form of the assistances that provided. Furthermore, the data were analyzed using content analysis techniques were then coded and categorized. The results of the study illustrate the problems experienced by mothers of poor households in the form of: subsistence (37%), child care (27%), management of money and time (20%), housework (5%), bad place of living (5%), the main breadwinner (3%), and extra costs (3%). While the sources of social support that obtained by mothers were; neighbors (10%), extended family (8%), children (8%), husband (7%), parents (7%), and siblings (5%). Unfortunately, more mothers who admitted not getting any social support when having problems (55%). The form of social support that given to mother from poor household were: instrumental support (91%), emotional support (5%) and informational support (2%). Implications for further intervention also discussed in this study.Keywords: household problems, social support, mothers, poor households
Procedia PDF Downloads 3656645 Effects of National Policy on Montana Medicaid Coverage and Enrollment
Authors: Ryan J. Trefethen, Vincent H. Smith
Abstract:
This study explores the relationship between national spending on the Medicaid program, and total Medicaid spending and enrollment in Montana, a state that ranks thirty-third in per capita income and thirty-seventh in median household income in the United States. The purpose of the research is to estimate the potential effects that specific changes to national healthcare policy would likely have on funding for the Montana Medicaid Program and enrollees in the program, members of families in poverty whose incomes are low, even though in many cases they have steady jobs. A particular concern is the effect on access to care for children in poverty who tend to be food insecure and, therefore, especially in need of access to health care. The research uses data collected from a variety of government publications, including the Medicaid Financial Management Report, the Medicaid Managed Care Enrollment Report, and the Centers for Medicare and Medicaid Services MSIS State Summaries for fiscal years 2000-2015. These data were examined using econometric analysis, to assess these impacts. The evidence indicates that the changes included in recent congressional legislative initiatives would potentially leave an additional 50,000 to 60,000 Montana residents, five to six percent of the state’s population, in poverty without access to health care. Impacts on children in poverty would potentially be substantial.Keywords: children, healthcare, medicaid, montana, poverty
Procedia PDF Downloads 2546644 A Problem on Homogeneous Isotropic Microstretch Thermoelastic Half Space with Mass Diffusion Medium under Different Theories
Authors: Devinder Singh, Rajneesh Kumar, Arvind Kumar
Abstract:
The present investigation deals with generalized model of the equations for a homogeneous isotropic microstretch thermoelastic half space with mass diffusion medium. Theories of generalized thermoelasticity Lord-Shulman (LS) Green-Lindsay (GL) and Coupled Theory (CT) theories are applied to investigate the problem. The stresses in the considered medium have been studied due to normal force and tangential force. The normal mode analysis technique is used to calculate the normal stress, shear stress, couple stresses and microstress. A numerical computation has been performed on the resulting quantity. The computed numerical results are shown graphically.Keywords: microstretch, thermoelastic, normal mode analysis, normal and tangential force, microstress force
Procedia PDF Downloads 5356643 A Robust PID Load Frequency Controller of Interconnected Power System Using SDO Software
Authors: Pasala Gopi, P. Linga Reddy
Abstract:
The response of the load frequency control problem in an multi-area interconnected electrical power system is much more complex with increasing size, changing structure and increasing load. This paper deals with Load Frequency Control of three area interconnected Power system incorporating Reheat, Non-reheat and Reheat turbines in all areas respectively. The response of the load frequency control problem in an multi-area interconnected power system is improved by designing PID controller using different tuning techniques and proved that the PID controller which was designed by Simulink Design Optimization (SDO) Software gives the superior performance than other controllers for step perturbations. Finally the robustness of controller was checked against system parameter variationsKeywords: load frequency control, pid controller tuning, step load perturbations, inter connected power system
Procedia PDF Downloads 6446642 Winning the “Culture War”: Greater Hungary and the American Confederacy as Sites of Nostalgia, Mythology, and Problem-Making for the Far Right in the US and Hungary
Authors: Grace Rademacher
Abstract:
Trauma” of the Kingdom of Hungary and the “Lost Cause” of the American Confederacy. Applying Nicole Maurantonio’s articulation of “confederate exceptionalism” and Svetlana Boym’s definition of “restorative nostalgia”, this article argues that, via memorialization and public discourse, both far right bodies flood their constituencies with narratives of nostalgia and martyrdom to sow existential anxieties about past and prophetic victimhood, all under the guise of protecting or restoring heritage. Linking this practice to gamification and conspiracy theorizing and following the work of Patrick Jagoda, this article identifies such industries of nostalgia as means by which the far right in both nations can partake in the “immanent and improvisational process of problem making.” Reified through monuments and references to the Trianon Trauma and the American confederacy, political actors “problem make” by alleging that they are victims of the West or the Left, subject to the cruel whims of liberalism and denial of historical legitimacy. In both nations, relying on their victimhood, pundits and politicians can appeal to white supremacists and distract citizens from legitimate active conflicts, such as wars or democratic rollbacks, redirecting them to fictional, mythical attacks on Hungarian or American society and civilization. This article will examine memorials and monuments as “lieux de memoire” and identify the purposeful similarities between the discourse of public figures and politicians such as María Schmidt, János Lázár, and Viktor Orbán, with that of Donald Trump and pundits such as Tucker Carlson.Keywords: nationalism, political memory, white supremacy, trianon
Procedia PDF Downloads 766641 Use of Linear Programming for Optimal Production in a Production Line in Saudi Food Co.
Authors: Qasim M. Kriri
Abstract:
Few Saudi Arabia production companies face financial profit issues until this moment. This work presents a linear integer programming model that solves a production problem of a Saudi Food Company in Saudi Arabia. An optimal solution to the above-mentioned problem is a Linear Programming solution. In this regard, the main purpose of this project is to maximize profit. Linear Programming Technique has been used to derive the maximum profit from production of natural juice at Saudi Food Co. The operations of production of the company were formulated and optimal results are found out by using Lindo Software that employed Sensitivity Analysis and Parametric linear programming in order develop Linear Programming. In addition, the parameter values are increased, then the values of the objective function will be increased.Keywords: parameter linear programming, objective function, sensitivity analysis, optimize profit
Procedia PDF Downloads 2056640 An Amphibious House for Flood Prone Areas in Godavari River Basin
Authors: Gangadhara Rao K.
Abstract:
In Andhra Pradesh traditionally, the flood problem had been confined to the flooding of smaller rivers. But the drainage problem in the coastal delta zones has worsened, multiplying the destructive potential of cyclones and increasing flood hazards. As a result of floods, the people living around these areas are forced to move out of their traditions in search of higher altitude places. This paper will be discussing about suitability of techniques used in Bangladesh in context of Godavari river basin in Andhra Pradesh. The study considers social, physical and environmental conditions of the region. The methods for achieving this objective includes the study of both cases from Bangladesh and Andhra Pradesh. Comparison with the existing techniques and suit to our requirements and context. If successful, we can adopt those techniques and this might help the people living in riverfront areas to stay safe during the floods without losing their traditional lands.Keywords: amphibious, bouyancy, floating, architecture, flood resistent
Procedia PDF Downloads 1726639 Ideation, Plans, and Attempts for Suicide among Adolescents with Disability
Authors: Nyla Anjum, Humaira Bano
Abstract:
Disability, regardless of its type and nature limits one or two significant life activities. These limitations constitute risk factors for suicide. Rate and intensity of problem upsurges in critical age of adolescence. Researches in the field of mental health over look problem of suicide among persons with disability. Aim of the study was to investigate prevalence and risk factors for suicide among adolescents with disability. The study constitutes purposive sample of 106 elements of both gender with four major categories of disability: hearing impairment, physical impairment, visual impairment and intellectual disabilities. Face to face interview technique was opted for data collection. Other variable are: socio-economic status, social and family support, provision of services for persons with disability, education and employment opportunities. For data analysis independent sample t-test was applied to find out significant differences in gender and One Way Analysis of variance was run to find out differences among four types of disability. Major predictors of suicide were identified with multiple regression analysis. It is concluded that ideation, plans and attempts of suicide among adolescents with disability is a multifaceted and imperative concern in the area of mental health. Urgent research recommendations contains valid measurement of suicide rate and identification of more risk factors for suicide among persons with disability. Study will also guide towards prevention of this pressing problem and will bring message of happy and healthy life not only for persons with disability but also for their families. It will also help to reduce suicide rate in society.Keywords: suicide, risk factors, adolescent, disability, mental health
Procedia PDF Downloads 3826638 Low-Level Modeling for Optimal Train Routing and Scheduling in Busy Railway Stations
Authors: Quoc Khanh Dang, Thomas Bourdeaud’huy, Khaled Mesghouni, Armand Toguy´eni
Abstract:
This paper studies a train routing and scheduling problem for busy railway stations. Our objective is to allow trains to be routed in dense areas that are reaching saturation. Unlike traditional methods that allocate all resources to setup a route for a train and until the route is freed, our work focuses on the use of resources as trains progress through the railway node. This technique allows a larger number of trains to be routed simultaneously in a railway node and thus reduces their current saturation. To deal with this problem, this study proposes an abstract model and a mixed-integer linear programming formulation to solve it. The applicability of our method is illustrated on a didactic example.Keywords: busy railway stations, mixed-integer linear programming, offline railway station management, train platforming, train routing, train scheduling
Procedia PDF Downloads 2536637 Improved Active Constellation Extension for the PAPR Reduction of FBMC-OQAM Signals
Authors: Mounira Laabidi, Rafik Zayani, Ridha Bouallegue, Daniel Roviras
Abstract:
The Filter Bank multicarrier with Offset Quadrature Amplitude Modulation (FBMC-OQAM) has been introduced to overcome the poor spectral characteristics and the waste in both bandwidth and energy caused by the use of the cyclic prefix. However, the FBMC-OQAM signals suffer from the high Peak to Average Power Ratio (PAPR) problem. Due to the overlapping structure of the FBMC-OQAM signals, directly applying the PAPR reduction schemes conceived for the OFDM one turns out to be ineffective. In this paper, we address the problem of PAPR reduction for FBMC-OQAM systems by suggesting a new scheme based on an improved version of Active Constellation Extension scheme (ACE) of OFDM. The proposed scheme, named Rolling Window ACE, takes into consideration the overlapping naturally emanating from the FBMC-OQAM signals.Keywords: ACE, FBMC, OQAM, OFDM, PAPR, rolling-window
Procedia PDF Downloads 5466636 Deep Neural Network Approach for Navigation of Autonomous Vehicles
Authors: Mayank Raj, V. G. Narendra
Abstract:
Ever since the DARPA challenge on autonomous vehicles in 2005, there has been a lot of buzz about ‘Autonomous Vehicles’ amongst the major tech giants such as Google, Uber, and Tesla. Numerous approaches have been adopted to solve this problem, which can have a long-lasting impact on mankind. In this paper, we have used Deep Learning techniques and TensorFlow framework with the goal of building a neural network model to predict (speed, acceleration, steering angle, and brake) features needed for navigation of autonomous vehicles. The Deep Neural Network has been trained on images and sensor data obtained from the comma.ai dataset. A heatmap was used to check for correlation among the features, and finally, four important features were selected. This was a multivariate regression problem. The final model had five convolutional layers, followed by five dense layers. Finally, the calculated values were tested against the labeled data, where the mean squared error was used as a performance metric.Keywords: autonomous vehicles, deep learning, computer vision, artificial intelligence
Procedia PDF Downloads 1586635 Enhancing Student Learning Outcomes Using Engineering Design Process: Case Study in Physics Course
Authors: Thien Van Ngo
Abstract:
The engineering design process is a systematic approach to solving problems. It involves identifying a problem, brainstorming solutions, prototyping and testing solutions, and evaluating the results. The engineering design process can be used to teach students how to solve problems in a creative and innovative way. The research aim of this study was to investigate the effectiveness of using the engineering design process to enhance student learning outcomes in a physics course. A mixed research method was used in this study. The quantitative data were collected using a pretest-posttest control group design. The qualitative data were collected using semi-structured interviews. The sample was 150 first-year students in the Department of Mechanical Engineering Technology at Cao Thang Technical College in Vietnam in the 2022-2023 school year. The quantitative data were collected using a pretest-posttest control group design. The pretest was administered to both groups at the beginning of the study. The posttest was administered to both groups at the end of the study. The qualitative data were collected using semi-structured interviews with a sample of eight students in the experimental group. The interviews were conducted after the posttest. The quantitative data were analyzed using independent sample T-tests. The qualitative data were analyzed using thematic analysis. The quantitative data showed that students in the experimental group, who were taught using the engineering design process, had significantly higher post-test scores on physics problem-solving than students in the control group, who were taught using the conventional method. The qualitative data showed that students in the experimental group were more motivated and engaged in the learning process than students in the control group. Students in the experimental group also reported that they found the engineering design process to be a more effective way of learning physics. The findings of this study suggest that the engineering design process can be an effective way of enhancing student learning outcomes in physics courses. The engineering design process engages students in the learning process and helps them to develop problem-solving skills.Keywords: engineering design process, problem-solving, learning outcome of physics, students’ physics competencies, deep learning
Procedia PDF Downloads 65