Search results for: swept path analysis
27688 The Symbiotic Relation of Mythical Stories in Transforming Human Lives
Authors: Gayatri Kanwar
Abstract:
The purpose of this research paper is to explore the power of myth in changing human lives; it establishes patterns in the human psyche, affects the way of thinking, as myths unveil various subjects, ideas, and challenges. Through mythological stories one comes to understand the images behind the emotions and feelings, they influence him as it changes his thought patterns, their therapeutic sets the individual on the path of healing and transforms human lives. Every civilization in the olden times had a vast source of myths which they lived by. They were not ordinary stories of everyday life, but exemplary cases narrated through oral traditions in a sacred manner revealed the 'way to live life'. The mythical stories have a spiritual touch which brought him to the acceptance of suffering or finding a solution to his life problems. In modern times, the significance of the age old myth has lost their touch. Each one of us bears countless stories inside ourselves of our own lives and all its happenings. Therefore, each being is a natural narrator. Everybody tells stories about their lives; hence, one tends to know oneself as well as seeks understanding of others through them. When one remembers their stories they speak in narratives. As stated by Jung, these narratives grow into a personal mythology one lives by. Nonetheless, there are times when one becomes stuck in their own stories or myths. Hence, mythology can change one’s perception and can open pathways to other ways of discovering, feeling and experiencing one’s lives.Keywords: Power of Myths, Significance of myths in modern times, Transforming human lives, Benefits to Society
Procedia PDF Downloads 40227687 Investors' Ratio Analysis and the Profitability of Listed Firms: Evidence from Nigeria
Authors: Abisola Akinola, Akinsulere Femi
Abstract:
The stock market has continually been a source of economic development in most developing countries. This study examined the relationship between investors’ ratio analysis and profitability of quoted companies in Nigeria using secondary data obtained from the annual reports of forty-two (42) companies. The study employed the multiple regression technique to analyze the relationship between investors’ ratio analysis (measured by dividend per share and earning per share) and profitability (measured by the return on equity). The results from the analysis show that investors’ ratio analysis, when measured by earnings per share, have a positive and significant impact on profitability. However, the study noted that investors’ ratio analysis, when measured by dividend per share, tend to have a positive impact on profitability but it is statistically insignificant. By implication, investors and other stakeholders that are interested in investing in stocks can predict the earning capacity of listed firms in the stock market.Keywords: dividend per share, earnings per share, profitability, return on equity
Procedia PDF Downloads 13727686 Capacity Loss at Midblock Sections of Urban Arterials Due to Pedestrian Crossings
Authors: Ashish Dhamaniya, Satish Chandra
Abstract:
Pedestrian crossings at grade in India are very common and pedestrian cross the carriageway at undesignated locations where they found the path to access the residential and commercial areas. Present paper aims to determine capacity loss on 4-lane urban arterials due to such crossings. Base capacity which is defined as the capacity without any influencing factor is determined on 4-lane roads by collecting speed-flow data in the field. It is observed that base capacity is varying from 1636 pcu/hr/lane to 2043 pcu/hr/lane which is attributed to the different operating conditions at different sections. The variation in base capacity is related with the operating speed on the road sections. Free flow speed of standard car is measured in the field and 85th percentile of this speed is reported as operating speed. Capacity of the 4-lane road sections with different pedestrian cross-flow is also determined and compared with the capacity of base section. The difference in capacity values is reported as capacity loss due to the average number of pedestrian crossings in one hour. It has been observed that capacity of 4-lane road section reduces from 18 to 30 percent with pedestrian cross-flow of 800 to 1550 peds/hr. A model is proposed between capacity loss and pedestrian cross-flow from the observed data.Keywords: capacity, free flow speed, pedestrian, urban arterial, transport
Procedia PDF Downloads 44927685 Statistical Analysis of Natural Images after Applying ICA and ISA
Authors: Peyman Sheikholharam Mashhadi
Abstract:
Difficulties in analyzing real world images in classical image processing and machine vision framework have motivated researchers towards considering the biology-based vision. It is a common belief that mammalian visual cortex has been adapted to the statistics of the real world images through the evolution process. There are two well-known successful models of mammalian visual cortical cells: Independent Component Analysis (ICA) and Independent Subspace Analysis (ISA). In this paper, we statistically analyze the dependencies which remain in the components after applying these models to the natural images. Also, we investigate the response of feature detectors to gratings with various parameters in order to find optimal parameters of the feature detectors. Finally, the selectiveness of feature detectors to phase, in both models is considered.Keywords: statistics, independent component analysis, independent subspace analysis, phase, natural images
Procedia PDF Downloads 33927684 Surge Analysis of Water Transmission Mains in Una, Himachal Pradesh, India
Authors: Baldev Setia, Raj Rajeshwari, Maneesh Kumar
Abstract:
Present paper is an analysis of water transmission mains failed due to surge analysis by using basic software known as Surge Analysis Program (SAP). It is a real time failure case study of a pipe laid in Una, Himachal Pradesh. The transmission main is a 13 kilometer long pipe with 7.9 kilometers as pumping main and 5.1 kilometers as gravitational main. The analysis deals with mainly pumping mains. The results are available in two text files. Besides, several files are prepared with specific view to obtain results in a graphical form. These results help to observe the pressure difference and surge occurrence at different locations along the pipe profile, which help to redesign the transmission main with different but suitable safety measures against possible surge. A technically viable and economically feasible design has been provided as per the relevant manual and standard code of practice.Keywords: surge, water hammer, transmission mains, SAP 2000
Procedia PDF Downloads 36627683 Horizontal-Vertical and Enhanced-Unicast Interconnect Testing Techniques for Network-on-Chip
Authors: Mahdiar Hosseinghadiry, Razali Ismail, F. Fotovati
Abstract:
One of the most important and challenging tasks in testing network-on-chip based system-on-chips (NoC based SoCs) is to verify the communication entity. It is important because of its usage for transferring both data packets and test patterns for intellectual properties (IPs) during normal and test mode. Hence, ensuring of NoC reliability is required for reliable IPs functionality and testing. On the other hand, it is challenging due to the required time to test it and the way of transferring test patterns from the tester to the NoC components. In this paper, two testing techniques for mesh-based NoC interconnections are proposed. The first one is based on one-by-one testing and the second one divides NoC interconnects into three parts, horizontal links of switches in even columns, horizontal links of switches in odd columns and all vertical. A design for testability (DFT) architecture is represented to send test patterns directly to each switch under test and also support the proposed testing techniques by providing a loopback path in each switch. The simulation results shows the second proposed testing mechanism outperforms in terms of test time because this method test all the interconnects in only three phases, independent to the number of existed interconnects in the network, while test time of other methods are highly dependent to the number of switches and interconnects in the NoC.Keywords: on chip, interconnection testing, horizontal-vertical testing, enhanced unicast
Procedia PDF Downloads 55327682 General Time-Dependent Sequenced Route Queries in Road Networks
Authors: Mohammad Hossein Ahmadi, Vahid Haghighatdoost
Abstract:
Spatial databases have been an active area of research over years. In this paper, we study how to answer the General Time-Dependent Sequenced Route queries. Given the origin and destination of a user over a time-dependent road network graph, an ordered list of categories of interests and a departure time interval, our goal is to find the minimum travel time path along with the best departure time that minimizes the total travel time from the source location to the given destination passing through a sequence of points of interests belonging to each of the specified categories of interest. The challenge of this problem is the added complexity to the optimal sequenced route queries, where we assume that first the road network is time dependent, and secondly the user defines a departure time interval instead of one single departure time instance. For processing general time-dependent sequenced route queries, we propose two solutions as Discrete-Time and Continuous-Time Sequenced Route approaches, finding approximate and exact solutions, respectively. Our proposed approaches traverse the road network based on A*-search paradigm equipped with an efficient heuristic function, for shrinking the search space. Extensive experiments are conducted to verify the efficiency of our proposed approaches.Keywords: trip planning, time dependent, sequenced route query, road networks
Procedia PDF Downloads 32127681 Boundary Alert System for Powered Wheelchair in Confined Area Training
Authors: Tsoi Kim Ming, Yu King Pong
Abstract:
Background: With powered wheelchair, patients can travel more easily and conveniently. However, some patients suffer from other difficulties, such as visual impairment, cognitive disorder, or psychological issues, which make them unable to control powered wheelchair safely. Purpose: Therefore, those patients are required to complete a comprehensive driving training by therapists on confined area, which simulates narrow paths in daily live. During the training, therapists will give series of driving instruction to patients, which may be unaware of patients crossing out the boundary of area. To facilitate the training, it is needed to develop a device to provide warning to patients during training Method: We adopt LIDAR for distance sensing started from center of confined area. Then, we program the LIDAR with linear geometry to remember each side of the area. The LIDAR will sense the location of wheelchair continuously. Once the wheelchair is driven out of the boundary, audio alert will be given to patient. Result: Patients can pay their attention to the particular driving situation followed by audio alert during driving training, which can learn how to avoid out of boundary in similar situation next time. Conclusion: Instead of only instructed by therapist, the LIDAR can facilitate the powered wheelchair training by patients actively pay their attention to driving situation. After training, they are able to control the powered wheelchair safely when facing difficult and narrow path in real life.Keywords: PWC, training, rehab, AT
Procedia PDF Downloads 10527680 Surge Analysis of Water Transmission Mains in Una, Himachal Pradesh (India)
Authors: Baldev Setia, Raj Rajeshwari, Maneesh Kumar
Abstract:
Present paper is an analysis of water transmission mains failed due to surge analysis by using basic software known as Surge Analysis Program (SAP). It is a real time failure case study of a pipe laid in Una, Himachal Pradesh. The transmission main is a 13 kilometres long pipe with 7.9 kilometres as pumping main and 5.1 kilometres as gravitational main. The analysis deals with mainly pumping mains. The results are available in two text files. Besides, several files are prepared with specific view to obtain results in a graphical form. These results help to observe the pressure difference and surge occurrence at different locations along the pipe profile, which help to redesign the transmission main with different but suitable safety measures against possible surge. A technically viable and economically feasible design has been provided as per the relevant manual and standard code of practice.Keywords: surge, water hammer, transmission mains, SAP 2000
Procedia PDF Downloads 40327679 Using Structured Analysis and Design Technique Method for Unmanned Aerial Vehicle Components
Authors: Najeh Lakhoua
Abstract:
Introduction: Scientific developments and techniques for the systemic approach generate several names to the systemic approach: systems analysis, systems analysis, structural analysis. The main purpose of these reflections is to find a multi-disciplinary approach which organizes knowledge, creates universal language design and controls complex sets. In fact, system analysis is structured sequentially by steps: the observation of the system by various observers in various aspects, the analysis of interactions and regulatory chains, the modeling that takes into account the evolution of the system, the simulation and the real tests in order to obtain the consensus. Thus the system approach allows two types of analysis according to the structure and the function of the system. The purpose of this paper is to present an application of system analysis of Unmanned Aerial Vehicle (UAV) components in order to represent the architecture of this system. Method: There are various analysis methods which are proposed, in the literature, in to carry out actions of global analysis and different points of view as SADT method (Structured Analysis and Design Technique), Petri Network. The methodology adopted in order to contribute to the system analysis of an Unmanned Aerial Vehicle has been proposed in this paper and it is based on the use of SADT. In fact, we present a functional analysis based on the SADT method of UAV components Body, power supply and platform, computing, sensors, actuators, software, loop principles, flight controls and communications). Results: In this part, we present the application of SADT method for the functional analysis of the UAV components. This SADT model will be composed exclusively of actigrams. It starts with the main function ‘To analysis of the UAV components’. Then, this function is broken into sub-functions and this process is developed until the last decomposition level has been reached (levels A1, A2, A3 and A4). Recall that SADT techniques are semi-formal; however, for the same subject, different correct models can be built without having to know with certitude which model is the good or, at least, the best. In fact, this kind of model allows users a sufficient freedom in its construction and so the subjective factor introduces a supplementary dimension for its validation. That is why the validation step on the whole necessitates the confrontation of different points of views. Conclusion: In this paper, we presented an application of system analysis of Unmanned Aerial Vehicle components. In fact, this application of system analysis is based on SADT method (Structured Analysis Design Technique). This functional analysis proved the useful use of SADT method and its ability of describing complex dynamic systems.Keywords: system analysis, unmanned aerial vehicle, functional analysis, architecture
Procedia PDF Downloads 20427678 Applications for Additive Manufacturing Technology for Reducing the Weight of Body Parts of Gas Turbine Engines
Authors: Liubov Magerramova, Mikhail Petrov, Vladimir Isakov, Liana Shcherbinina, Suren Gukasyan, Daniil Povalyukhin, Olga Klimova-Korsmik, Darya Volosevich
Abstract:
Aircraft engines are developing along the path of increasing resource, strength, reliability, and safety. The building of gas turbine engine body parts is a complex design and technological task. Particularly complex in the design and manufacturing are the casings of the input stages of helicopter gearboxes and central drives of aircraft engines. Traditional technologies, such as precision casting or isothermal forging, are characterized by significant limitations in parts production. For parts like housing, additive technologies guarantee spatial freedom and limitless or flexible design. This article presents the results of computational and experimental studies. These investigations justify the applicability of additive technologies (AT) to reduce the weight of aircraft housing gearbox parts by up to 32%. This is possible due to geometrical optimization compared to the classical, less flexible manufacturing methods and as-casted aircraft parts with over-insured values of safety factors. Using an example of the body of the input stage of an aircraft gearbox, visualization of the layer-by-layer manufacturing of a part based on thermal deformation was demonstrated.Keywords: additive technologies, gas turbine engines, topological optimization, synthesis process
Procedia PDF Downloads 11727677 The Sinful Pig: Social Construction of Hogs through Corpus Analysis in Czech
Authors: Zdeněk Joukl
Abstract:
The word for pig in Czech (prase) seems to be one of the most negatively connotated words denoting animals. This paper represents an analysis of the largest Czech corpora, including a diachronic corpus. Besides corpus-analytical tools, sentiment analysis methods and tools such as LIWC and word clouds are used to better capture the usage of the words for pigs in Czech. The most frequent collocations across domains are identified and extracted with context to be used for sentiment analysis, which reveals an almost exclusive negative sentiment or culinary context. The animal is burdened with a disproportionately high number of meanings representing negatively viewed human characteristics or behaviors (dirtiness, fatness, sweating, inebriation, aggressive driving, greediness or chauvinism are among the most frequent ones). The diachronic view helps us understand how this extreme bias came to existence both through institutional construction and human-animal relations.Keywords: corpus analysis, pig, sentiment, social construction
Procedia PDF Downloads 627676 Design of Reinforced Concrete (RC) Walls Considering Shear Amplification by Nonlinear Dynamic Behavior
Authors: Sunghyun Kim, Hong-Gun Park
Abstract:
In the performance-based design (PBD), by using the nonlinear dynamic analysis (NDA), the actual performance of the structure is evaluated. Unlike frame structures, in the wall structures, base shear force which is resulted from the NDA, is greatly amplified than that from the elastic analysis. This shear amplifying effect causes repeated designs which make designer difficult to apply the PBD. Therefore, in this paper, factors which affect shear amplification were studied. For the 20-story wall model, the NDA was performed. From the analysis results, the base shear amplification factor was proposed.Keywords: performance based design, shear amplification factor, nonlinear dynamic analysis, RC shear wall
Procedia PDF Downloads 37927675 On the Path of Radicalization: Policing of Muslim Americans Post 9/11
Authors: Hagar Elsayed
Abstract:
This case study examines the framing of the diverse populations of Arab, Muslim and South Asian immigrants and their descendants in local communities by both federal and local law enforcement agencies. It explores how urban spaces and policing are constructed as necessary components of national security in the context of the war on terror by focusing on practices employed in local spaces such as Dearborn, Michigan and training methods adopted on a national level. The proliferation of American Arabs as ‘terrorist’ works to legitimize not only increasing state surveillance, but also military strategies which infringe on ‘inside’ spaces. Sustaining these progressively militarized civil policing operations, which demand intense mobilization of state power, requires that whole neighborhoods and districts are reimagined to portray these geographies in a certain light. This case study is central in understanding how Arab, South Asian, and Muslim civilians’ transformation into a “national security” issue have created militarized police enforcement agencies that employ military tactics to map the terrain of Otherness. This study looks at how race factors into key recent incidents, and asks whether this militarization builds from past forms of racist policing, and whether these specific incidents are reflective of larger patterns or whether they are just isolated incidents.Keywords: American-Muslims, Arabs, militarization, policing
Procedia PDF Downloads 13627674 Double Layer Security Authentication Model for Automatic Dependent Surveillance-Broadcast
Authors: Buse T. Aydin, Enver Ozdemir
Abstract:
An automatic dependent surveillance-broadcast (ADS-B) system has serious security problems. In this study, a double layer authentication scheme between the aircraft and ground station, aircraft to aircraft, ground station to ATC tower is designed to prevent any unauthorized aircrafts from introducing themselves as friends. This method can be used as a solution to the problem of authentication. The method is a combination of classical cryptographic methods and new generation physical layers. The first layer has employed the embedded key of the aircraft. The embedded key is assumed to installed during the construction of the utility. The other layer is a physical attribute (flight path, distance, etc.) between the aircraft and the ATC tower. We create a mathematical model so that two layers’ information is employed and an aircraft is authenticated as a friend or unknown according to the accuracy of the results of the model. The results of the aircraft are compared with the results of the ATC tower and if the values found by the aircraft and ATC tower match within a certain error margin, we mark the aircraft as friend. As a result, the ADS-B messages coming from this authenticated friendly aircraft will be processed. In this method, even if the embedded key is captured by the unknown aircraft, without the information of the second layer, the unknown aircraft can easily be determined. Overall, in this work, we present a reliable system by adding physical layer in the authentication process.Keywords: ADS-B, authentication, communication with physical layer security, cryptography, identification friend or foe
Procedia PDF Downloads 17927673 Development of 3D Laser Scanner for Robot Navigation
Authors: Ali Emre Öztürk, Ergun Ercelebi
Abstract:
Autonomous robotic systems needs an equipment like a human eye for their movement. Robotic camera systems, distance sensors and 3D laser scanners have been used in the literature. In this study a 3D laser scanner has been produced for those autonomous robotic systems. In general 3D laser scanners are using 2 dimension laser range finders that are moving on one-axis (1D) to generate the model. In this study, the model has been obtained by a one-dimensional laser range finder that is moving in two –axis (2D) and because of this the laser scanner has been produced cheaper. Furthermore for the laser scanner a motor driver, an embedded system control board has been used and at the same time a user interface card has been used to make the communication between those cards and computer. Due to this laser scanner, the density of the objects, the distance between the objects and the necessary path ways for the robot can be calculated. The data collected by the laser scanner system is converted in to cartesian coordinates to be modeled in AutoCAD program. This study shows also the synchronization between the computer user interface, AutoCAD and the embedded systems. As a result it makes the solution cheaper for such systems. The scanning results are enough for an autonomous robot but the scan cycle time should be developed. This study makes also contribution for further studies between the hardware and software needs since it has a powerful performance and a low cost.Keywords: 3D laser scanner, embedded system, 1D laser range finder, 3D model
Procedia PDF Downloads 27527672 Numerical Investigation of Aerodynamic Analysis on Passenger Vehicle
Authors: Cafer Görkem Pınar, İlker Coşar, Serkan Uzun, Atahan Çelebi, Mehmet Ali Ersoy, Ali Pınarbaşı
Abstract:
In this study, it was numerically investigated that a 1:1 scale model of the Renault Clio MK4 SW brand vehicle aerodynamic analysis was performed in the commercial computational fluid dynamics (CFD) package program of ANSYS CFX 2021 R1 under steady, subsonic, and 3-D conditions. The model of vehicle used for the analysis was made independent of the number of mesh elements, and the k-epsilon turbulence model was applied during the analysis. Results were interpreted as streamlines, pressure gradient, and turbulent kinetic energy contours around the vehicle at 50 km/h and 100 km/h speeds. In addition, the validity of the analysis was decided by comparing the drag coefficient of the vehicle with the values in the literature. As a result, the pressure gradient contours of the taillight of the Renault Clio MK4 SW vehicle were examined, and the behavior of the total force at speeds of 50 km/h and 100 km/h was interpreted.Keywords: CFD, k-epsilon, aerodynamics, drag coefficient, taillight
Procedia PDF Downloads 14327671 Profiling Risky Code Using Machine Learning
Authors: Zunaira Zaman, David Bohannon
Abstract:
This study explores the application of machine learning (ML) for detecting security vulnerabilities in source code. The research aims to assist organizations with large application portfolios and limited security testing capabilities in prioritizing security activities. ML-based approaches offer benefits such as increased confidence scores, false positives and negatives tuning, and automated feedback. The initial approach using natural language processing techniques to extract features achieved 86% accuracy during the training phase but suffered from overfitting and performed poorly on unseen datasets during testing. To address these issues, the study proposes using the abstract syntax tree (AST) for Java and C++ codebases to capture code semantics and structure and generate path-context representations for each function. The Code2Vec model architecture is used to learn distributed representations of source code snippets for training a machine-learning classifier for vulnerability prediction. The study evaluates the performance of the proposed methodology using two datasets and compares the results with existing approaches. The Devign dataset yielded 60% accuracy in predicting vulnerable code snippets and helped resist overfitting, while the Juliet Test Suite predicted specific vulnerabilities such as OS-Command Injection, Cryptographic, and Cross-Site Scripting vulnerabilities. The Code2Vec model achieved 75% accuracy and a 98% recall rate in predicting OS-Command Injection vulnerabilities. The study concludes that even partial AST representations of source code can be useful for vulnerability prediction. The approach has the potential for automated intelligent analysis of source code, including vulnerability prediction on unseen source code. State-of-the-art models using natural language processing techniques and CNN models with ensemble modelling techniques did not generalize well on unseen data and faced overfitting issues. However, predicting vulnerabilities in source code using machine learning poses challenges such as high dimensionality and complexity of source code, imbalanced datasets, and identifying specific types of vulnerabilities. Future work will address these challenges and expand the scope of the research.Keywords: code embeddings, neural networks, natural language processing, OS command injection, software security, code properties
Procedia PDF Downloads 10727670 Experimental Study Damage in a Composite Structure by Vibration Analysis- Glass / Polyester
Authors: R. Abdeldjebar, B. Labbaci, L. Missoum, B. Moudden, M. Djermane
Abstract:
The basic components of a composite material made him very sensitive to damage, which requires techniques for detecting damage reliable and efficient. This work focuses on the detection of damage by vibration analysis, whose main objective is to exploit the dynamic response of a structure to detect understand the damage. The experimental results are compared with those predicted by numerical models to confirm the effectiveness of the approach.Keywords: experimental, composite, vibration analysis, damage
Procedia PDF Downloads 67427669 Using Power Flow Analysis for Understanding UPQC’s Behaviors
Authors: O. Abdelkhalek, A. Naimi, M. Rami, M. N. Tandjaoui, A. Kechich
Abstract:
This paper deals with the active and reactive power flow analysis inside the unified power quality conditioner (UPQC) during several cases. The UPQC is a combination of shunt and series active power filter (APF). It is one of the best solutions towards the mitigation of voltage sags and swells problems on distribution network. This analysis can provide the helpful information to well understanding the interaction between the series filter, the shunt filter, the DC bus link and electrical network. The mathematical analysis is based on active and reactive power flow through the shunt and series active power filter. Wherein series APF can absorb or deliver the active power to mitigate a swell or sage voltage where in the both cases it absorbs a small reactive power quantity whereas the shunt active power absorbs or releases the active power for stabilizing the storage capacitor’s voltage as well as the power factor correction. The voltage sag and voltage swell are usually interpreted through the DC bus voltage curves. These two phenomena are introduced in this paper with a new interpretation based on the active and reactive power flow analysis inside the UPQC. For simplifying this study, a linear load is supposed in this digital simulation. The simulation results are carried out to confirm the analysis done.Keywords: UPQC, Power flow analysis, shunt filter, series filter.
Procedia PDF Downloads 57227668 Two-Stage Launch Vehicle Trajectory Modeling for Low Earth Orbit Applications
Authors: Assem M. F. Sallam, Ah. El-S. Makled
Abstract:
This paper presents a study on the trajectory of a two stage launch vehicle. The study includes dynamic responses of motion parameters as well as the variation of angles affecting the orientation of the launch vehicle (LV). LV dynamic characteristics including state vector variation with corresponding altitude and velocity for the different LV stages separation, as well as the angle of attack and flight path angles are also discussed. A flight trajectory study for the drop zone of first stage and the jettisoning of fairing are introduced in the mathematical modeling to study their effect. To increase the accuracy of the LV model, atmospheric model is used taking into consideration geographical location and the values of solar flux related to the date and time of launch, accurate atmospheric model leads to enhancement of the calculation of Mach number, which affects the drag force over the LV. The mathematical model is implemented on MATLAB based software (Simulink). The real available experimental data are compared with results obtained from the theoretical computation model. The comparison shows good agreement, which proves the validity of the developed simulation model; the maximum error noticed was generally less than 10%, which is a result that can lead to future works and enhancement to decrease this level of error.Keywords: launch vehicle modeling, launch vehicle trajectory, mathematical modeling, Matlab- Simulink
Procedia PDF Downloads 27727667 Deep Routing Strategy: Deep Learning based Intelligent Routing in Software Defined Internet of Things.
Authors: Zabeehullah, Fahim Arif, Yawar Abbas
Abstract:
Software Defined Network (SDN) is a next genera-tion networking model which simplifies the traditional network complexities and improve the utilization of constrained resources. Currently, most of the SDN based Internet of Things(IoT) environments use traditional network routing strategies which work on the basis of max or min metric value. However, IoT network heterogeneity, dynamic traffic flow and complexity demands intelligent and self-adaptive routing algorithms because traditional routing algorithms lack the self-adaptions, intelligence and efficient utilization of resources. To some extent, SDN, due its flexibility, and centralized control has managed the IoT complexity and heterogeneity but still Software Defined IoT (SDIoT) lacks intelligence. To address this challenge, we proposed a model called Deep Routing Strategy (DRS) which uses Deep Learning algorithm to perform routing in SDIoT intelligently and efficiently. Our model uses real-time traffic for training and learning. Results demonstrate that proposed model has achieved high accuracy and low packet loss rate during path selection. Proposed model has also outperformed benchmark routing algorithm (OSPF). Moreover, proposed model provided encouraging results during high dynamic traffic flow.Keywords: SDN, IoT, DL, ML, DRS
Procedia PDF Downloads 11027666 Network and Sentiment Analysis of U.S. Congressional Tweets
Authors: Chaitanya Kanakamedala, Hansa Pradhan, Carter Gilbert
Abstract:
Social media platforms, such as Twitter, are excellent datasets for understanding human interactions and sentiments. This report explores social dynamics among US Congressional members through a network analysis applied to a dataset of tweets spanning 2008 to 2017 from the ’US Congressional Tweets Dataset’. In this report, we preform network analysis where connections between users (edges) are established based on a similarity threshold: two tweets are connected if the tweets they post are similar. By utilizing the Natural Language Toolkit (NLTK) and NetworkX, we quantified tweet similarity and constructed a graph comprising various interconnected components. Each component represents a cluster of users with closely aligned content. We then preform sentiment analysis on each cluster to explore the prevalent emotions and opinions within these groups. Our findings reveal that despite the initial expectation of distinct ideological divisions typically aligning with party lines, the analysis exposed a high degree of topical convergence across tweets from different political affiliations. The analysis preformed in this report not only highlights the potential of social media as a tool for political communication but also suggests a complex layer of interaction that transcends traditional partisan boundaries, reflecting a complicated landscape of politics in the digital age.Keywords: natural language processing, sentiment analysis, centrality analysis, topic modeling
Procedia PDF Downloads 3527665 Finite Element Analysis and Multibody Dynamics of 6-DOF Industrial Robot
Authors: Rahul Arora, S. S. Dhami
Abstract:
This paper implements the design structure of industrial robot along with the different transmission components like gear assembly and analysis of complete industrial robot. In this paper, it gives the overview on the most efficient types of modeling and different analysis results that can be obtained for an industrial robot. The investigation is executed in regards to two classifications i.e. the deformation and the stress tests. SolidWorks is utilized to design and review the 3D drawing plan while ANSYS Workbench is utilized to execute the FEA on an industrial robot and the designed component. The CAD evaluation was conducted on a disentangled model of an industrial robot. The study includes design and drafting its transmission system. In CAE study static, modal and dynamic analysis are presented. Every one of the outcomes is divided in regard with the impact of the static and dynamic analysis on the situating exactness of the robot. It gives critical data with respect to parts of the industrial robot that are inclined to harm under higher high force applications. Therefore, the mechanical structure under different operating conditions can help in optimizing the manipulator geometry and in selecting the right material for the same. The FEA analysis is conducted for four different materials on the same industrial robot and gear assembly.Keywords: CAD, CAE, FEA, robot, static, dynamic, modal, gear assembly
Procedia PDF Downloads 37727664 Comparative Study on Manet Using Soft Computing Techniques
Authors: Amarjit Singh, Tripatdeep Singh Dua, Vikas Attri
Abstract:
Mobile Ad-hoc Network is a combination of several nodes that create dynamically a specific network without using any base infrastructure. In this study all the mobile nodes can depended upon each other to send any data. Mobile host can pick up data and forwarding to their destination path. Basically MANET depend upon their Quality of Service which is highly constraints to the user. To give better services we need to improve the QOS. In these days MANET QOS requirement to use soft computing techniques. These techniques depend upon their specific requirement and which exists using MANET concepts. Using a soft computing techniques various protocol and algorithms may be considered. In this paper, we provide comparative study review of existing work done in MANET using various kind of soft computing techniques. Our review research is based on their specific protocol or algorithm which provide concern solution of QOS need. We discuss about various protocol through which routing in MANET. In Second section we clear the concepts of Soft Computing and their types. In third section we review the MANET using different kind of soft computing techniques work done before. In forth section we need to understand the concept of QoS requirement which exists in MANET and we done comparative study on different protocol used before and last we conclude the purpose of using MANET with soft computing techniques metrics.Keywords: mobile ad-hoc network, fuzzy improved genetic approach, neural network, routing protocol, wireless mesh network
Procedia PDF Downloads 34927663 Socio Economic Impact and Status of the Islamic Perspective of Veil
Authors: Shagufta Jahangir, Nadeemullah, Yaqoob, Raisa Jahangir
Abstract:
The Persian language word ‘Purdah’ and in Arabic ‘Hajab’ is used for veil. Veil has been used by women for being escaped from men. In one way or the other veil has been continuously used in ancient as well as modern civilizations by women. Developed nations have blamed the use of veil an obstacle in the process of development. Therefore, modern nations have struggled to get rid of the use of veil. They argue that it is a sign of slavery for women and it is an obstacle in the path of development. The modern secular Muslims considered veil as the biggest obstacle for social and economic development. It makes a woman helpless, as being zanjir in her feet. It has become an obstacle in the process of development for women. It is also considered as a tool for segregation among men and women. The so called Muslims of the modern era are trying to introduce changes in religion by imitation the modern nations of the world. In particular ways for Muslim woman use of veil in Islam is must. It is a right provided her by religion. It provides her strength. In the Holy Quran word ‘Hajab’ is used 5 times. Islam is against domination and forceful practice of veil, as a part of teaching of Islam it is being adopted by women as a protection. This article aims at: (1) historical background of veil (2) Its existence in civilizations, (3) Meaning and interpretation of veil in Islamic context, (4) Economic impact of it on women (5) Discussion on its practice in Islamic (eastern) and other (European) circles and conclusions followed by concerted bibliography.Keywords: veil, economic development, civilizations, obstacle, secular Muslims, segregation
Procedia PDF Downloads 32827662 Understanding Health Behavior Using Social Network Analysis
Authors: Namrata Mishra
Abstract:
Health of a person plays a vital role in the collective health of his community and hence the well-being of the society as a whole. But, in today’s fast paced technology driven world, health issues are increasingly being associated with human behaviors – their lifestyle. Social networks have tremendous impact on the health behavior of individuals. Many researchers have used social network analysis to understand human behavior that implicates their social and economic environments. It would be interesting to use a similar analysis to understand human behaviors that have health implications. This paper focuses on concepts of those behavioural analyses that have health implications using social networks analysis and provides possible algorithmic approaches. The results of these approaches can be used by the governing authorities for rolling out health plans, benefits and take preventive measures, while the pharmaceutical companies can target specific markets, helping health insurance companies to better model their insurance plans.Keywords: breadth first search, directed graph, health behaviors, social network analysis
Procedia PDF Downloads 47127661 Planning for Sustainable Tourism in Chabahar Coastal Zone Using Swot Analysis
Authors: R. Karami, A. Gharaei
Abstract:
The aim of this study was to investigate ecotourism status in Chabahar coastal zone using swot analysis and strategic planning. Firstly, the current status of region was studied by literature review, field survey and statistical analysis. Then strengths and weaknesses (internal factors) were identified as well as opportunities and threats (external factors) using Delphi Method. Based on the obtained results, the total score of 2.46 in IFE matrix and 2.33 in the EFE matrix represents poor condition related to the internal and external factors respectively. This condition means both external and internal factors have not been utilized properly and the zone needs defensive plan; thus appropriate planning and organizational management practices are required to deal with these factors. Furthermore strategic goals, objectives and action plans in short, medium and long term schedule were formulated in attention to swot analysis.Keywords: tourism, SWOT analysis, strategic planning, Chabahar
Procedia PDF Downloads 51327660 Chemometric QSRR Evaluation of Behavior of s-Triazine Pesticides in Liquid Chromatography
Authors: Lidija R. Jevrić, Sanja O. Podunavac-Kuzmanović, Strahinja Z. Kovačević
Abstract:
This study considers the selection of the most suitable in silico molecular descriptors that could be used for s-triazine pesticides characterization. Suitable descriptors among topological, geometrical and physicochemical are used for quantitative structure-retention relationships (QSRR) model establishment. Established models were obtained using linear regression (LR) and multiple linear regression (MLR) analysis. In this paper, MLR models were established avoiding multicollinearity among the selected molecular descriptors. Statistical quality of established models was evaluated by standard and cross-validation statistical parameters. For detection of similarity or dissimilarity among investigated s-triazine pesticides and their classification, principal component analysis (PCA) and hierarchical cluster analysis (HCA) were used and gave similar grouping. This study is financially supported by COST action TD1305.Keywords: chemometrics, classification analysis, molecular descriptors, pesticides, regression analysis
Procedia PDF Downloads 39327659 Application of Failure Mode and Effects Analysis (FMEA) on the Virtual Process Hazard Analysis of Acetone Production Process
Authors: Princes Ann E. Prieto, Denise F. Alpuerto, John Rafael C. Unlayao, Neil Concibido, Monet Concepcion Maguyon-Detras
Abstract:
Failure Mode and Effects Analysis (FMEA) has been used in the virtual Process Hazard Analysis (PHA) of the Acetone production process through the dehydrogenation of isopropyl alcohol, for which very limited process risk assessment has been published. In this study, the potential failure modes, effects, and possible causes of selected major equipment in the process were identified. During the virtual FMEA mock sessions, the risks in the process were evaluated and recommendations to reduce and/or mitigate the process risks were formulated. The risk was estimated using the calculated risk priority number (RPN) and was classified into four (4) levels according to their effects on acetone production. Results of this study were also used to rank the criticality of equipment in the process based on the calculated criticality rating (CR). Bow tie diagrams were also created for the critical hazard scenarios identified in the study.Keywords: chemical process safety, failure mode and effects analysis (FMEA), process hazard analysis (PHA), process safety management (PSM)
Procedia PDF Downloads 137