Search results for: RLS identification algorithm
5129 Research on the Cognition and Actual Phenomenon of School Bullying from the Perspective of Students
Authors: Chia-Chun Wu, Yu-Hsien Sung
Abstract:
This study aims to examine the consistency between students’ predictions and their actual observations on the bullying prevalence rate among different types of high-risk victims, thereby clarifying the reliability of students’ reports on the identification of bullying. A total of 1,732 Taiwanese students (734 males and 998 females) participated in this study. A Rasch model was adopted for data analysis. The results showed that students with “personality or behavioral issues” are more likely to be bullied in schools, based on both students’ predictions and actual observations. Moreover, the results differed significantly between genders and between various educational levels in students’ predictions and their actual observations on the bullying prevalence rate of different types of high-risk victims. To summarize, this study not only suggests that students’ reports on the identification of bullying are accurate and could be a valuable reference in terms of recognizing a bullying incident, but it also argues that more attention should be paid to students’ gender and educational level when taking their perspectives into consideration when it comes to identifying bullying behaviors.Keywords: school bullying, student, bullying recognition, high-risk victims
Procedia PDF Downloads 845128 Image Enhancement Algorithm of Photoacoustic Tomography Using Active Contour Filtering
Authors: Prasannakumar Palaniappan, Dong Ho Shin, Chul Gyu Song
Abstract:
The photoacoustic images are obtained from a custom developed linear array photoacoustic tomography system. The biological specimens are imitated by conducting phantom tests in order to retrieve a fully functional photoacoustic image. The acquired image undergoes the active region based contour filtering to remove the noise and accurately segment the object area for further processing. The universal back projection method is used as the image reconstruction algorithm. The active contour filtering is analyzed by evaluating the signal to noise ratio and comparing it with the other filtering methods.Keywords: contour filtering, linear array, photoacoustic tomography, universal back projection
Procedia PDF Downloads 4005127 Recognition of Early Enterococcus Faecalis through Image Treatment by Using Octave
Authors: Laura Victoria Vigoya Morales, David Rolando Suarez Mora
Abstract:
The problem of detecting enterococcus faecalis is receiving considerable attention with the new cases of beachgoers infected with the bacteria, which can be found in fecal matter. The process detection of this kind of bacteria would be taking a long time, which waste time and money as a result of closing recreation place, like beach or pools. Hence, new methods for automating the process of detecting and recognition of this bacteria has become in a challenge. This article describes a novel approach to detect the enterococcus faecalis bacteria in water by using an octave algorithm, which embody a network neural. This document shows result of performance, quality and integrity of the algorithm.Keywords: Enterococcus faecalis, image treatment, octave and network neuronal
Procedia PDF Downloads 2305126 Relationship Quality, Value Creation Practices and Brand Loyalty in Virtual Communities: Evidence from Facebook Communities
Authors: Zoya Khan, Amina Muzaffar
Abstract:
Social media based brand communities are communities that are developed around a brand. In the highly globalized world of today, Facebook is undoubtedly being regarded and has been widely recognized as a trendy and well-accepted medium of marketing. By means of a Facebook fan page, organizations can effectually create, enhance, and sustain customer-brand relationship. In this article, we explore whether brand communities based on social media (a special type of online brand communities) have positive effects on the main community elements and value creation practices in the communities as well as on brand trust and brand loyalty. A survey was conducted and 201 valid responses were used for analysis. The results of structural equation modeling show that brand communities established on social media have positive effects on value creation practices. Brand use, impression management practices and brand identification has an impact on brand trust and this brand trust then further leads to brand loyalty.Keywords: relationship quality, impression management practices, brand identification, brand trust, brand loyalty
Procedia PDF Downloads 4745125 Application of the Discrete-Event Simulation When Optimizing of Business Processes in Trading Companies
Authors: Maxat Bokambayev, Bella Tussupova, Aisha Mamyrova, Erlan Izbasarov
Abstract:
Optimization of business processes in trading companies is reviewed in the report. There is the presentation of the “Wholesale Customer Order Handling Process” business process model applicable for small and medium businesses. It is proposed to apply the algorithm for automation of the customer order processing which will significantly reduce labor costs and time expenditures and increase the profitability of companies. An optimized business process is an element of the information system of accounting of spare parts trading network activity. The considered algorithm may find application in the trading industry as well.Keywords: business processes, discrete-event simulation, management, trading industry
Procedia PDF Downloads 3445124 Transmission Line Congestion Management Using Hybrid Fish-Bee Algorithm with Unified Power Flow Controller
Authors: P. Valsalal, S. Thangalakshmi
Abstract:
There is a widespread changeover in the electrical power industry universally from old-style monopolistic outline towards a horizontally distributed competitive structure to come across the demand of rising consumption. When the transmission lines of derestricted system are incapable to oblige the entire service needs, the lines are overloaded or congested. The governor between customer and power producer is nominated as Independent System Operator (ISO) to lessen the congestion without obstructing transmission line restrictions. Among the existing approaches for congestion management, the frequently used approaches are reorganizing the generation and load curbing. There is a boundary for reorganizing the generators, and further loads may not be supplemented with the prevailing resources unless more private power producers are added in the system by considerably raising the cost. Hence, congestion is relaxed by appropriate Flexible AC Transmission Systems (FACTS) devices which boost the existing transfer capacity of transmission lines. The FACTs device, namely, Unified Power Flow Controller (UPFC) is preferred, and the correct placement of UPFC is more vital and should be positioned in the highly congested line. Hence, the weak line is identified by using power flow performance index with the new objective function with proposed hybrid Fish – Bee algorithm. Further, the location of UPFC at appropriate line reduces the branch loading and minimizes the voltage deviation. The power transfer capacity of lines is determined with and without UPFC in the identified congested line of IEEE 30 bus structure and the simulated results are compared with prevailing algorithms. It is observed that the transfer capacity of existing line is increased with the presented algorithm and thus alleviating the congestion.Keywords: available line transfer capability, congestion management, FACTS device, Hybrid Fish-Bee Algorithm, ISO, UPFC
Procedia PDF Downloads 3835123 Tourist’s Perception and Identification of Landscape Elements of Traditional Village
Authors: Mengxin Feng, Feng Xu, Zhiyong Lai
Abstract:
As a typical representative of the countryside, traditional Chinese villages are rich in cultural landscape resources and historical information, but they are still in continuous decline. The problems of people's weak protection awareness and low cultural recognition are still serious, and the protection of cultural heritage is imminent. At the same time, with the rapid development of rural tourism, its cultural value has been explored and paid attention to again. From the perspective of tourists, this study aimed to explore people's perception and identity of cultural landscape resources under the current cultural tourism development background. We selected eleven typical landscape elements of Lingshui Village, a traditional village in Beijing, as research objects and conducted a questionnaire survey with two scales of perception and identity to explore the characteristics of people's perception and identification of landscape elements. We found that there was a strong positive correlation between the perception and identity of each element and that geographical location influenced visitors' overall perception. The perception dimensions scored the highest in location, and the lowest in history and culture, and the identity dimensions scored the highest in meaning and lowest in emotion. We analyzed the impact of visitors' backgrounds on people's perception and identity characteristics and found that age and education were two important factors. The elderly had a higher degree of perceived identity, as the familiarity effect increased their attention. Highly educated tourists had more stringent criteria for perception and identification. The above findings suggest strategies for conserving and optimizing landscape elements in the traditional village to improve the acceptance and recognition of cultural information in traditional villages, which will inject new vitality into the development of traditional villages.Keywords: traditional village, tourist perception, landscape elements, perception and identity
Procedia PDF Downloads 1465122 The First Fungal Identification from Mini-BAL of Critical COVID-19 Patients
Authors: Fatemeh Fallah, Ensieh Lotfali, Leila Azimi, Hannan Khodaei, Maryam Rajabnejad, Nafiseh Abdollahi, Hossein Tayebi, Saham Ansari, Saeedeh Yaghoubi, Abdollah Karimi
Abstract:
Background: Coronavirus disease 2019 (COVID-19) has become a worldwide issue due to its high prevalence and rapid transmission. Fungal infections have been detected in COVID-19 patients, leading to increased morbidity and mortality. Objectives: This study aimed to isolate Aspergillus fumigatus and Mucor spp. on mini-bronchoalveolar lavage samples obtained from children with COVID-19 hospitalized in an Iranian children’s hospital. Methods: A cross-sectional descriptive study was performed on mini-bronchoalveolar lavage samples from children confirmed positive for COVID-19 admitted to ICU with a ventilator from April 2021 to February 2022. Demographic characteristics were recorded, and fungal DNA was extracted from mini-BAL samples taken from children. Nested PCR was made with two primers for Aspergillus fumigatus and Mucor spp. Results: Out of 100 children with COVID-19, all samples were negative for Aspergillus fumigatus; however, 12 cases were positive for BAL PCR for Mucor spp. Among the 12 patients, fever, shortness of breath, cough, and decreased level of consciousness were reported in 8.3% (n: 1), 16.6% (n: 2), 25% (n: 3), and 25% (n: 3), respectively. Most cases (41.7%; n: 5) suffered from heart disease, followed by underlying malignancy (33.4%; n: 4). All positive BAL PCR for Mucor spp. cases had significantly higher chest CT scan scores and spent more time under a ventilator. Conclusions: The identification of COVID-19 with Mucor spp. was observed among 12% (n: 12) of children hospitalized in a COVID-19 ICU. When dealing with pediatric COVID-19 patients, clinicians should consider the differential diagnosis of fungal co-infections and have a low threshold to begin treatment. Moreover, it is highly advisable to take prophylactic measures, such as properly using corticosteroids and shortening the intubation time.Keywords: aspergillosis, COVID-19 identification, mucormycosis, paediatrics
Procedia PDF Downloads 75121 Polymerase Chain Reaction Analysis and Random Amplified Polymorphic DNA of Agrobacterium Tumefaciens
Authors: Abeer M. Algeblawi
Abstract:
Fifteen isolates of Agrobacterium tumefaciens were obtained from crown gall samples collected from six locations (Tripoli, Alzahra, Ain-Zara, Alzawia, Alazezia in Libya) from Grape (Vitis vinifera L.), Pear (Pyrus communis L.), Peach (Prunus persica L.) and Alexandria in Egypt from Guava (Psidium guajava L.) trees, Artichoke (Cynara cardunculus L.) and Sugar beet (Beta vulgaris L.). Total DNA was extracted from the eight isolates as well as the identification of six isolates used into Polymerase Chain Reaction (PCR) analysis and Random Amplified Polymorphic DNA (RAPD) technique were used. High similarity (55.5%) was observed among the eight A. tumefaciens isolates (Agro1, Agro2, Agro3, Agro4, Agro5, Agro6, Agro7, and Agro8). The PCR amplification products were resulting from the use of two specific primers (virD2A-virD2C). Analysis induction six isolates of A. tumefaciens obtained from different hosts. A visible band was specific to A. tumefaciens of (220 bp, 224 bp) and 338 bp produced with total DNA extracted from bacterial cells.Keywords: Agrobacterium tumefaciens, crown gall, identification, molecular characterization, PCR, RAPD
Procedia PDF Downloads 1445120 Design of Identification Based Adaptive Control for Fermentation Process in Bioreactor
Authors: J. Ritonja
Abstract:
The biochemical technology has been developing extremely fast since the middle of the last century. The main reason for such development represents a requirement for large production of high-quality biologically manufactured products such as pharmaceuticals, foods, and beverages. The impact of the biochemical industry on the world economy is enormous. The great importance of this industry also results in intensive development in scientific disciplines relevant to the development of biochemical technology. In addition to developments in the fields of biology and chemistry, which enable to understand complex biochemical processes, development in the field of control theory and applications is also very important. In the paper, the control for the biochemical reactor for the milk fermentation was studied. During the fermentation process, the biophysical quantities must be precisely controlled to obtain the high-quality product. To control these quantities, the bioreactor’s stirring drive and/or heating system can be used. Available commercial biochemical reactors are equipped with open loop or conventional linear closed loop control system. Due to the outstanding parameters variations and the partial nonlinearity of the biochemical process, the results obtained with these control systems are not satisfactory. To improve the fermentation process, the self-tuning adaptive control system was proposed. The use of the self-tuning adaptive control is suggested because the parameters’ variations of the studied biochemical process are very slow in most cases. To determine the linearized mathematical model of the fermentation process, the recursive least square identification method was used. Based on the obtained mathematical model the linear quadratic regulator was tuned. The parameters’ identification and the controller’s synthesis are executed on-line and adapt the controller’s parameters to the fermentation process’ dynamics during the operation. The use of the proposed combination represents the original solution for the control of the milk fermentation process. The purpose of the paper is to contribute to the progress of the control systems for the biochemical reactors. The proposed adaptive control system was tested thoroughly. From the obtained results it is obvious that the proposed adaptive control system assures much better following of the reference signal as a conventional linear control system with fixed control parameters.Keywords: adaptive control, biochemical reactor, linear quadratic regulator, recursive least square identification
Procedia PDF Downloads 1255119 Aerodynamic Design an UAV and Stability Analysis with Method of Genetic Algorithm Optimization
Authors: Saul A. Torres Z., Eduardo Liceaga C., Alfredo Arias M.
Abstract:
We seek to develop a UAV for agricultural spraying at a maximum altitude of 5000 meters above sea level, with a payload of 100 liters of fumigant. For the developing the aerodynamic design of the aircraft is using computational tools such as the "Vortex Lattice Athena" software, "MATLAB", "ANSYS FLUENT", "XFoil" package among others. Also methods are being used structured programming, exhaustive analysis of optimization methods and search. The results have a very low margin of error, and the multi-objective problems can be helpful for future developments. Also we developed method for Stability Analysis (Lateral-Directional and Longitudinal).Keywords: aerodynamics design, optimization, algorithm genetic, multi-objective problem, longitudinal stability, lateral-directional stability
Procedia PDF Downloads 5945118 Dynamic Synthesis of a Flexible Multibody System
Authors: Mohamed Amine Ben Abdallah, Imed Khemili, Nizar Aifaoui
Abstract:
This work denotes an insight into dynamic synthesis of multibody systems. A set of mechanism parameters design variable are synthetized based on a desired mechanism response, such as, velocity, acceleration and bodies deformations. Moreover, knowing the work space, for a robot, and mechanism response allow defining optimal parameters mechanism handling with the desired target response. To this end, evolutionary genetic algorithm has been deployed. A demonstrative example for imperfect mechanism has been treated, mainly, a slider crank mechanism with a flexible connecting rod. The transversal deflection of the connecting rod has been chosen as response to identify the mechanism design parameters.Keywords: dynamic response, evolutionary genetic algorithm, flexible bodies, optimization
Procedia PDF Downloads 3205117 Frequent Item Set Mining for Big Data Using MapReduce Framework
Authors: Tamanna Jethava, Rahul Joshi
Abstract:
Frequent Item sets play an essential role in many data Mining tasks that try to find interesting patterns from the database. Typically it refers to a set of items that frequently appear together in transaction dataset. There are several mining algorithm being used for frequent item set mining, yet most do not scale to the type of data we presented with today, so called “BIG DATA”. Big Data is a collection of large data sets. Our approach is to work on the frequent item set mining over the large dataset with scalable and speedy way. Big Data basically works with Map Reduce along with HDFS is used to find out frequent item sets from Big Data on large cluster. This paper focuses on using pre-processing & mining algorithm as hybrid approach for big data over Hadoop platform.Keywords: frequent item set mining, big data, Hadoop, MapReduce
Procedia PDF Downloads 4365116 Trajectory Tracking of a Redundant Hybrid Manipulator Using a Switching Control Method
Authors: Atilla Bayram
Abstract:
This paper presents the trajectory tracking control of a spatial redundant hybrid manipulator. This manipulator consists of two parallel manipulators which are a variable geometry truss (VGT) module. In fact, each VGT module with 3-degress of freedom (DOF) is a planar parallel manipulator and their operational planes of these VGT modules are arranged to be orthogonal to each other. Also, the manipulator contains a twist motion part attached to the top of the second VGT module to supply the missing orientation of the endeffector. These three modules constitute totally 7-DOF hybrid (parallel-parallel) redundant spatial manipulator. The forward kinematics equations of this manipulator are obtained, then, according to these equations, the inverse kinematics is solved based on an optimization with the joint limit avoidance. The dynamic equations are formed by using virtual work method. In order to test the performance of the redundant manipulator and the controllers presented, two different desired trajectories are followed by using the computed force control method and a switching control method. The switching control method is combined with the computed force control method and genetic algorithm. In the switching control method, the genetic algorithm is only used for fine tuning in the compensation of the trajectory tracking errors.Keywords: computed force method, genetic algorithm, hybrid manipulator, inverse kinematics of redundant manipulators, variable geometry truss
Procedia PDF Downloads 3475115 Sparse Principal Component Analysis: A Least Squares Approximation Approach
Authors: Giovanni Merola
Abstract:
Sparse Principal Components Analysis aims to find principal components with few non-zero loadings. We derive such sparse solutions by adding a genuine sparsity requirement to the original Principal Components Analysis (PCA) objective function. This approach differs from others because it preserves PCA's original optimality: uncorrelatedness of the components and least squares approximation of the data. To identify the best subset of non-zero loadings we propose a branch-and-bound search and an iterative elimination algorithm. This last algorithm finds sparse solutions with large loadings and can be run without specifying the cardinality of the loadings and the number of components to compute in advance. We give thorough comparisons with the existing sparse PCA methods and several examples on real datasets.Keywords: SPCA, uncorrelated components, branch-and-bound, backward elimination
Procedia PDF Downloads 3815114 A Distributed Cryptographically Generated Address Computing Algorithm for Secure Neighbor Discovery Protocol in IPv6
Authors: M. Moslehpour, S. Khorsandi
Abstract:
Due to shortage in IPv4 addresses, transition to IPv6 has gained significant momentum in recent years. Like Address Resolution Protocol (ARP) in IPv4, Neighbor Discovery Protocol (NDP) provides some functions like address resolution in IPv6. Besides functionality of NDP, it is vulnerable to some attacks. To mitigate these attacks, Internet Protocol Security (IPsec) was introduced, but it was not efficient due to its limitation. Therefore, SEND protocol is proposed to automatic protection of auto-configuration process. It is secure neighbor discovery and address resolution process. To defend against threats on NDP’s integrity and identity, Cryptographically Generated Address (CGA) and asymmetric cryptography are used by SEND. Besides advantages of SEND, its disadvantages like the computation process of CGA algorithm and sequentially of CGA generation algorithm are considerable. In this paper, we parallel this process between network resources in order to improve it. In addition, we compare the CGA generation time in self-computing and distributed-computing process. We focus on the impact of the malicious nodes on the CGA generation time in the network. According to the result, although malicious nodes participate in the generation process, CGA generation time is less than when it is computed in a one-way. By Trust Management System, detecting and insulating malicious nodes is easier.Keywords: NDP, IPsec, SEND, CGA, modifier, malicious node, self-computing, distributed-computing
Procedia PDF Downloads 2785113 Considering Effect of Wind Turbines in the Distribution System
Authors: Majed Ahmadi
Abstract:
In recent years, the high penetration of different types of renewable energy sources (RESs) has affected most of the available strategies. The main motivations behind the high penetration of RESs are clean energy, modular system and easy installation. Among different types of RESs, wind turbine (WT) is an interesting choice referring to the availability of wind in almost any area. The new technologies of WT can provide energy from residential applications to wide grid connected applications. Regarding the WT, advantages such as reducing the dependence on fossil fuels and enhancing the independence and flexibility of large power grid are the most prominent. Nevertheless, the high volatile nature of wind speed injects much uncertainty in the grid that if not managed optimally can put the analyses far from the reality.the aim of this project is scrutiny and to offer proper ways for renewing distribution networks with envisage the effects of wind power plants and uncertainties related to distribution systems including wind power generating plants output rate and consumers consuming rate and also decrease the incidents of the whole network losses, amount of pollution, voltage refraction and cost extent.to solve this problem we use dual point estimate method.And algorithm used in this paper is reformed bat algorithm, which will be under exact research furthermore the results.Keywords: order renewal, wind turbines, bat algorithm, outspread production, uncertainty
Procedia PDF Downloads 2845112 Fuzzy-Genetic Algorithm Multi-Objective Optimization Methodology for Cylindrical Stiffened Tanks Conceptual Design
Authors: H. Naseh, M. Mirshams, M. Mirdamadian, H. R. Fazeley
Abstract:
This paper presents an extension of fuzzy-genetic algorithm multi-objective optimization methodology that could effectively be used to find the overall satisfaction of objective functions (selecting the design variables) in the early stages of design process. The coupling of objective functions due to design variables in an engineering design process will result in difficulties in design optimization problems. In many cases, decision making on design variables conflicts with more than one discipline in system design. In space launch system conceptual design, decision making on some design variable (e.g. oxidizer to fuel mass flow rate O/F) in early stages of the design process is related to objective of liquid propellant engine (specific impulse) and Tanks (structure weight). Then, the primary application of this methodology is the design of a liquid propellant engine with the maximum specific impulse and cylindrical stiffened tank with the minimum weight. To this end, the design problem is established the fuzzy rule set based on designer's expert knowledge with a holistic approach. The independent design variables in this model are oxidizer to fuel mass flow rate, thickness of stringers, thickness of rings, shell thickness. To handle the mentioned problems, a fuzzy-genetic algorithm multi-objective optimization methodology is developed based on Pareto optimal set. Consequently, this methodology is modeled with the one stage of space launch system to illustrate accuracy and efficiency of proposed methodology.Keywords: cylindrical stiffened tanks, multi-objective, genetic algorithm, fuzzy approach
Procedia PDF Downloads 6555111 Genomics Approach for Excavation of NAS Genes from Nutri Rich Minor Millet Crops: Transforming Perspective from Orphan Plants to Future Food Crops
Authors: Mahima Dubey, Girish Chandel
Abstract:
Minor millets are highly nutritious and climate resilient cereal crops. These features make them ideal candidates to excavate the physiology of the underlying mechanism. In an attempt to understand the basis of mineral nutrition in minor millets, a set of five Barnyard millet genotypes were analyzed for grain Fe and Zn content under contrasting Fe-Zn supply to identify genotypes proficient in tolerating mineral deficiency. This resulted in the identification of Melghat-1 genotype to be nutritionally superior with better ability to withstand deficiency. Expression analysis of several Nicotianamine synthase (NAS) genes showed that HvNAS1 and OsNAS2 genes were prominent in positively mediating mineral deficiency response in Barnyard millet. Further, strategic efforts were employed for fast-track identification of more effective orthologous NAS genes from Barnyard millet. This resulted in the identification of two genes namely EfNAS1 (orthologous to HvNAS1 of barley) and EfNAS2 (orthologous to OsNAS2 gene of rice). Sequencing and thorough characterization of these sequences revealed the presence of intact NAS domain and signature tyrosine and di-leucine motifs in their predicted proteins and thus established their candidature as functional NAS genes in Barnyard millet. Moreover, EfNAS1 showed structural superiority over previously known NAS genes and is anticipated to have role in more efficient metal transport. Findings of the study provide insight into Fe-Zn deficiency response and mineral nutrition in millets. This provides millets with a physiological edge over micronutrient deficient staple cereals such as rice in withstanding Fe-Zn deficiency and subsequently accumulating higher levels of Fe and Zn in millet grains.Keywords: gene expression, micronutrient, millet, ortholog
Procedia PDF Downloads 2325110 Toxicity Identification and Evaluation for the Effluent from Seawater Desalination Facility in Korea Using D. magna and V. fischeri
Authors: Sung Jong Lee, Hong Joo Ha, Chun Sang Hong
Abstract:
In recent years, the interests on the impacts of industrial wastewater on aquatic ecosystem have increased with concern about ecosystem protection and human health. Whole effluent toxicity tests are used to monitor toxicity by unknown toxic chemicals as well as conventional pollutants from industrial effluent discharges. This study describes the application of TIE (toxicity identification evaluation) procedures to an acutely toxic effluent from a Seawater desalination facility in industrial complex which was toxic to Daphnia magna. In TIE phase I (characterization step), the toxic effects by heavy metals, organic compounds, oxidants, volatile organic compounds, suspended solids and ammonia were screened and revealed that the source of toxicity is far from these toxicants group. Chemical analysis (TIE phase II) on TDS showed that the concentration of chloride ion (24,215 ~ 29,562 mg/L) was substantially higher than that predicted from EC50 for D. magna. In confirmation step (TIE phase III), chloride ion was demonstrated to be main toxicant in this effluent by the spiking approach, species sensitivity approach, and deletion approach. Calcium, potassium, magnesium, sodium, fluorine, sulfate ion concentration was not shown toxicity from D. magna. Finally, we concluded that chloride was the most contributing toxicant in the waste water treatment plant. Further research activities are needed for technical support of toxicity identification and evaluation on the various types of wastewater treatment plant discharge in Korea. Acknowledgement: This research was supported by a grant (16IFIP-B089911-03) from Plant Research Program funded by Ministry of Land, Infrastructure and Transport of Korean government.Keywords: TIE, D. magna, V. fischeri, seawater desalination facility
Procedia PDF Downloads 2595109 A Mini Radar System for Low Altitude Targets Detection
Authors: Kangkang Wu, Kaizhi Wang, Zhijun Yuan
Abstract:
This paper deals with a mini radar system aimed at detecting small targets at the low latitude. The radar operates at Ku-band in the frequency modulated continuous wave (FMCW) mode with two receiving channels. The radar system has the characteristics of compactness, mobility, and low power consumption. This paper focuses on the implementation of the radar system, and the Block least mean square (Block LMS) algorithm is applied to minimize the fortuitous distortion. It is validated from a series of experiments that the track of the unmanned aerial vehicle (UAV) can be easily distinguished with the radar system.Keywords: unmanned aerial vehicle (UAV), interference, Block Least Mean Square (Block LMS) Algorithm, Frequency Modulated Continuous Wave (FMCW)
Procedia PDF Downloads 3205108 Monte Carlo Pathwise Sensitivities for Barrier Options with Application to Coco-Bond Calibration
Authors: Thomas Gerstner, Bastian von Harrach, Daniel Roth
Abstract:
The Monte Carlo pathwise sensitivities approach is well established for smooth payoff functions. In this work, we present a new Monte Carlo algorithm that is able to calculate the pathwise sensitivities for discontinuous payoff functions. Our main tool is the one-step survival idea of Glasserman and Staum. Although this technique yields to new terms per observation, while differentiating, the algorithm is still efficient. As an application, we use the results for a two-dimensional calibration of a Coco-Bond, which we model with different types of discretely monitored barrier options.Keywords: Monte Carlo, discretely monitored barrier options, pathwise sensitivities, Coco-Bond
Procedia PDF Downloads 3585107 Paddy/Rice Singulation for Determination of Husking Efficiency and Damage Using Machine Vision
Authors: M. Shaker, S. Minaei, M. H. Khoshtaghaza, A. Banakar, A. Jafari
Abstract:
In this study a system of machine vision and singulation was developed to separate paddy from rice and determine paddy husking and rice breakage percentages. The machine vision system consists of three main components including an imaging chamber, a digital camera, a computer equipped with image processing software. The singulation device consists of a kernel holding surface, a motor with vacuum fan, and a dimmer. For separation of paddy from rice (in the image), it was necessary to set a threshold. Therefore, some images of paddy and rice were sampled and the RGB values of the images were extracted using MATLAB software. Then mean and standard deviation of the data were determined. An Image processing algorithm was developed using MATLAB to determine paddy/rice separation and rice breakage and paddy husking percentages, using blue to red ratio. Tests showed that, a threshold of 0.75 is suitable for separating paddy from rice kernels. Results from the evaluation of the image processing algorithm showed that the accuracies obtained with the algorithm were 98.36% and 91.81% for paddy husking and rice breakage percentage, respectively. Analysis also showed that a suction of 45 mmHg to 50 mmHg yielding 81.3% separation efficiency is appropriate for operation of the kernel singulation system.Keywords: breakage, computer vision, husking, rice kernel
Procedia PDF Downloads 3815106 Meaningfulness of Right to Life in Holy Quran
Authors: Masoud Raei, Mohammadmahdi Sadeghi
Abstract:
The right to life as the most essential right in human rights issues and in the first group has devoted a special place to itself. Attention to this right and its domain and its reflection in civil rights is one of the most important axis of the rights to life issues. Issues discussed concerning this matter in public law with regard to its status in human rights are the determination of government’s duty toward identification; application and guarantee of this right. The constitutions of countries have chosen different approaches towards the identification of this right and also its limits and boundaries, determining the territory of governments for citizens. The reason for such a difference is the question arising in this regard. It is claimed that without the determination of meaningfulness of the right to life, it is not possible to provide a clear response to this question. The goal of this paper is to justify its theoretical framework from the view of meaningfulness of right to life relying on Quranic verses with a conceptual approach towards the right to life so that the relationship between government and citizens with regard to right to life is determined. Through a comparative study, it is possible to attain significant differences between the teachings of the Holy Quran and human rights documents. The method of this paper is a descriptive-analytic approach relying on interpretation books on Holy Quran.Keywords: meaningfulness, objectivism, separatism, right to life
Procedia PDF Downloads 3075105 Parallel Gripper Modelling and Design Optimization Using Multi-Objective Grey Wolf Optimizer
Authors: Golak Bihari Mahanta, Bibhuti Bhusan Biswal, B. B. V. L. Deepak, Amruta Rout, Gunji Balamurali
Abstract:
Robots are widely used in the manufacturing industry for rapid production with higher accuracy and precision. With the help of End-of-Arm Tools (EOATs), robots are interacting with the environment. Robotic grippers are such EOATs which help to grasp the object in an automation system for improving the efficiency. As the robotic gripper directly influence the quality of the product due to the contact between the gripper surface and the object to be grasped, it is necessary to design and optimize the gripper mechanism configuration. In this study, geometric and kinematic modeling of the parallel gripper is proposed. Grey wolf optimizer algorithm is introduced for solving the proposed multiobjective gripper optimization problem. Two objective functions developed from the geometric and kinematic modeling along with several nonlinear constraints of the proposed gripper mechanism is used to optimize the design variables of the systems. Finally, the proposed methodology compared with a previously proposed method such as Teaching Learning Based Optimization (TLBO) algorithm, NSGA II, MODE and it was seen that the proposed method is more efficient compared to the earlier proposed methodology.Keywords: gripper optimization, metaheuristics, , teaching learning based algorithm, multi-objective optimization, optimal gripper design
Procedia PDF Downloads 1885104 An Enhanced Hybrid Backoff Technique for Minimizing the Occurrence of Collision in Mobile Ad Hoc Networks
Authors: N. Sabiyath Fatima, R. K. Shanmugasundaram
Abstract:
In Mobile Ad-hoc Networks (MANETS), every node performs both as transmitter and receiver. The existing backoff models do not exactly forecast the performance of the wireless network. Also, the existing models experience elevated packet collisions. Every time a collision happens, the station’s contention window (CW) is doubled till it arrives at the utmost value. The main objective of this paper is to diminish collision by means of contention window Multiplicative Increase Decrease Backoff (CWMIDB) scheme. The intention of rising CW is to shrink the collision possibility by distributing the traffic into an outsized point in time. Within wireless Ad hoc networks, the CWMIDB algorithm dynamically controls the contention window of the nodes experiencing collisions. During packet communication, the backoff counter is evenly selected from the given choice of [0, CW-1]. At this point, CW is recognized as contention window and its significance lies on the amount of unsuccessful transmission that had happened for the packet. On the initial transmission endeavour, CW is put to least amount value (C min), if transmission effort fails, subsequently the value gets doubled, and once more the value is set to least amount on victorious broadcast. CWMIDB is simulated inside NS2 environment and its performance is compared with Binary Exponential Backoff Algorithm. The simulation results show improvement in transmission probability compared to that of the existing backoff algorithm.Keywords: backoff, contention window, CWMIDB, MANET
Procedia PDF Downloads 2775103 Writing a Parametric Design Algorithm Based on Recreation and Structural Analysis of Patkane Model: The Case Study of Oshtorjan Mosque
Authors: Behnoush Moghiminia, Jesus Anaya Diaz
Abstract:
The current study attempts to present the relationship between the structure development and Patkaneh as one of the Iranian geometric patterns and parametric algorithms by introducing two practical methods. While having a structural function, Patkaneh is also used as an ornamental element. It can be helpful in the scientific and practical review of Patkaneh. The current study aims to use Patkaneh as a parametric form generator based on the algorithm. The current paper attempts to express how can a more complete algorithm of this covering be obtained based on the parametric study and analysis of a sample of a Patkaneh and also investigate the relationship between the development of the geometrical pattern of Patkaneh as a structural-decorative element of Iranian architecture and digital design. In this regard, to achieve the research purposes, researchers investigated the oldest type of Patkaneh in the architecture history of Iran, such as the Northern Entrance Patkaneh of Oshtorjan Jame’ Mosque. An accurate investigation was done on the history of the background to answer the questions. Then, by investigating the structural behavior of Patkaneh, the decorative or structural-decorative role of Patkaneh was investigated to eliminate the ambiguity. Then, the geometrical structure of Patkaneh was analyzed by introducing two practical methods. The first method is based on the constituent units of Patkaneh (Square and diamond) and investigating the interactive relationships between them in 2D and 3D. This method is appropriate for cases where there are rational and regular geometrical relationships. The second method is based on the separation of the floors and the investigation of their interrelation. It is practical when the constituent units are not geometrically regular and have numerous diversity. Finally, the parametric form algorithm of these methods was codified.Keywords: geometric properties, parametric design, Patkaneh, structural analysis
Procedia PDF Downloads 1515102 DNA Barcoding of Tree Endemic Campanula Species From Artvi̇n, Türki̇ye
Authors: Hayal Akyildirim Beğen, Özgür Emi̇nağaoğlu
Abstract:
DNA barcoding is the method of description of species based on gene diversity. In current studies, registration, genetic identification and protection of especially endemic plants pecies are carried out by DNA barcoding techniques. Molecular studies are based on the amplification and sequencing of the barcode gene region by the PCR method. Endemic Campanula choruhensis Kit Tan & Sorger, Campanula troegera Damboldt and Campanula betulifolia K.Koch is widespread in Artvin, Erzurum and around Çoruh valley passing through it. Intense road and dam constructions are carried out in and around the distribution area of this species. This situation harms the habitat of the species and puts its extinction. In this study, the plastid matK barcode gene regions (650 bp) of three Campanula species were created. To make the identification of this species quickly and accurately, gene sequence compared with sequences of other Campanula L. species. As a result of phylogenetic analysis, C. choruhensis is close relative to C. betulifolia. Morphologically, these species were determined to be more similar to each other with flower and leaf characters. C. troegera formed a separate branch.Keywords: campanula, DNA barcoding, endemic, türkiye, artvin
Procedia PDF Downloads 685101 Insider Theft Detection in Organizations Using Keylogger and Machine Learning
Authors: Shamatha Shetty, Sakshi Dhabadi, Prerana M., Indushree B.
Abstract:
About 66% of firms claim that insider attacks are more likely to happen. The frequency of insider incidents has increased by 47% in the last two years. The goal of this work is to prevent dangerous employee behavior by using keyloggers and the Machine Learning (ML) model. Every keystroke that the user enters is recorded by the keylogging program, also known as keystroke logging. Keyloggers are used to stop improper use of the system. This enables us to collect all textual data, save it in a CSV file, and analyze it using an ML algorithm and the VirusTotal API. Many large companies use it to methodically monitor how their employees use computers, the internet, and email. We are utilizing the SVM algorithm and the VirusTotal API to improve overall efficiency and accuracy in identifying specific patterns and words to automate and offer the report for improved monitoring.Keywords: cyber security, machine learning, cyclic process, email notification
Procedia PDF Downloads 575100 An Automatic Method for Building Learners’ Groups in Virtual Environment
Authors: O. Bourkoukou, Essaid El Bachari
Abstract:
The group composing is one of the key issue in collaborative learning to achieve a positive educational experience. The goal of this work is to propose for teachers and tutors a method to create effective collaborative learning groups in e-learning environment based on the learner profile. For this purpose, a new function was defined to rate implicitly learning objects used by the learner during his learning experience. This paper describes the proposed algorithm to build an adequate collaborative learning group. In order to verify the performance of the proposed algorithm, several experiments were conducted in real data set in virtual environment. Results show the effectiveness of the method for which it appears that the proposed approach may be promising to produce better outcomes.Keywords: building groups, collaborative learning, e-learning, learning objects
Procedia PDF Downloads 297