Search results for: computational assistance
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2639

Search results for: computational assistance

1439 Artificial Intelligence Based Meme Generation Technology for Engaging Audience in Social Media

Authors: Andrew Kurochkin, Kostiantyn Bokhan

Abstract:

In this study, a new meme dataset of ~650K meme instances was created, a technology of meme generation based on the state of the art deep learning technique - GPT-2 model was researched, a comparative analysis of machine-generated memes and human-created was conducted. We justified that Amazon Mechanical Turk workers can be used for the approximate estimating of users' behavior in a social network, more precisely to measure engagement. It was shown that generated memes cause the same engagement as human memes that produced low engagement in the social network (historically). Thus, generated memes are less engaging than random memes created by humans.

Keywords: content generation, computational social science, memes generation, Reddit, social networks, social media interaction

Procedia PDF Downloads 141
1438 Traditional and Commercially Prepared Medicine: Factors That Affect Preferences among Elderly Adults in Indigenous Community

Authors: Rhaetian Bern D. Azaula

Abstract:

The Philippines' indigenous population, estimated to be 10%-20%, is protected by the Indigenous Peoples Rights Act (IPRA), passed in 1997. However, due to their isolation and limited access to basic services such as health education or needs for health assistance, the law's implementation remains a challenge. As traditional medicine continues to play a significant role in society as the prevention and treatment of some illnesses, it is still customary and widely used to use plants in both traditional and modern ways; however, commercially prepared drugs are progressively advanced as time goes by. Therefore, the purpose of this quantitative study is to investigate the indigenous community at Barangay Magsikap General Nakar, Quezon, and analyze the factors that affect the respondent’s preferences in an indigenous community and reasons for patronizing traditional and commercially prepared medicines and proposes updated health education strategies and instructional materials. Slovin's formula was utilized to reduce the total population representation, followed by stratified sampling for proportional allocation of respondents. The study selects respondents (1) from an Indigenous Community in Barangay Magsikap, General Nakar, Quezon, (2) aged 60 and above, and (3) who are willing to participate. The researcher utilized a checklist-based questionnaire with a Tagalog version, and a Likert Scale was utilized to assess the respondent's choices on selected items. The researcher obtained informed consent from the indigenous community's regional and local office, the chieftain of the tribe, and the respondents, ensuring confidentiality in the collection and retrieval of data. The study revealed that respondents aged 60-69, males with no formal education, are unemployed and have no income source. They prefer traditional medicines due to their affordability, availability, and cultural practices but lack safe preparation, dosages, and contraindications of used medicines. Commercially prepared medications are acknowledged, but respondents are not fully aware of proper administration instructions and dosage labels. Recommendations include disseminating approved herbal medicines and ensuring proper preparation, indications, and contraindications.

Keywords: traditional medicine, commercially prepared medicine, indigenous community, elderly adult

Procedia PDF Downloads 73
1437 Low-Complexity Multiplication Using Complement and Signed-Digit Recoding Methods

Authors: Te-Jen Chang, I-Hui Pan, Ping-Sheng Huang, Shan-Jen Cheng

Abstract:

In this paper, a fast multiplication computing method utilizing the complement representation method and canonical recoding technique is proposed. By performing complements and canonical recoding technique, the number of partial products can be reduced. Based on these techniques, we propose an algorithm that provides an efficient multiplication method. On average, our proposed algorithm is to reduce the number of k-bit additions from (0.25k+logk/k+2.5) to (k/6 +logk/k+2.5), where k is the bit-length of the multiplicand A and multiplier B. We can therefore efficiently speed up the overall performance of the multiplication. Moreover, if we use the new proposes to compute common-multiplicand multiplication, the computational complexity can be reduced from (0.5 k+2 logk/k+5) to (k/3+2 logk/k+5) k-bit additions.

Keywords: algorithm design, complexity analysis, canonical recoding, public key cryptography, common-multiplicand multiplication

Procedia PDF Downloads 437
1436 Effect of the Applied Bias on Mini-Band Structures in Dimer Fibonacci InAs/Ga1-XInXAs Superlattices

Authors: Z. Aziz, S. Terkhi, Y. Sefir, R. Djelti, S. Bentata

Abstract:

The effect of a uniform electric field across multi-barrier systems (InAs/InxGa1-xAs) is exhaustively explored by a computational model using exact Airy function formalism and the transfer-matrix technique. In the case of biased DFHBSL structure a strong reduction in transmission properties was observed and the width of the mini-band structure linearly decreases with the increase of the applied bias. This is due to the confinement of the states in the mini-band structure, which becomes increasingly important (Wannier-Stark Effect).

Keywords: dimer fibonacci height barrier superlattices, singular extended state, exact Airy function and transfer matrix formalism, bioinformatics

Procedia PDF Downloads 290
1435 Formation of Miniband Structure in Dimer Fibonacci GaAs/Ga1-XAlXAs Superlattices

Authors: Aziz Zoubir, Sefir Yamina, Djelti Redouan, Bentata Samir

Abstract:

The effect of a uniform electric field across multibarrier systems (GaAs/AlxGa1-xAs) is exhaustively explored by a computational model using exact Airy function formalism and the transfer-matrix technique. In the case of biased Dimer Fibonacci Height Barrier superlattices (DFHBSL) structure a strong reduction in transmission properties was observed and the width of the miniband structure linearly decreases with the increase of the applied bias. This is due to the confinement of the states in the miniband structure, which becomes increasingly important (Wannier-Stark effect).

Keywords: Dimer Fibonacci Height Barrier superlattices, singular extended states, exact Airy function, transfer matrix formalism

Procedia PDF Downloads 509
1434 Size-Reduction Strategies for Iris Codes

Authors: Jutta Hämmerle-Uhl, Georg Penn, Gerhard Pötzelsberger, Andreas Uhl

Abstract:

Iris codes contain bits with different entropy. This work investigates different strategies to reduce the size of iris code templates with the aim of reducing storage requirements and computational demand in the matching process. Besides simple sub-sampling schemes, also a binary multi-resolution representation as used in the JBIG hierarchical coding mode is assessed. We find that iris code template size can be reduced significantly while maintaining recognition accuracy. Besides, we propose a two stage identification approach, using small-sized iris code templates in a pre-selection satge, and full resolution templates for final identification, which shows promising recognition behaviour.

Keywords: iris recognition, compact iris code, fast matching, best bits, pre-selection identification, two-stage identification

Procedia PDF Downloads 441
1433 University Students' Perceptions of Effective Teaching

Authors: Christine K. Ormsbee, Jeremy S. Robinson

Abstract:

Teacher quality is important for United States universities. It impacts student achievement, program and degree progress, and even retention. While course instructors are still the primary designers and deliverers of instruction in U.S. higher education classrooms, students have become better and more vocal consumers of instruction. They are capable of identifying what instructors do that facilitates their learning or, conversely, what instructors do that makes learning more difficult. Instructors can use students as resources as they design and implement their courses. Students have become more aware of their own learning preferences and processes and can articulate those. While it is not necessarily possible or likely that an instructor can address the widely varying differences in learning preferences represented by a large class of students, it is possible for them to employ general instructional supports that help students understand clearly the instructor's study expectations, identify critical content, efficiently commit content to memory, and develop new skills. Those learning supports include reading guides, test study guides, and other instructor-developed tasks that organize learning for students, hold them accountable for the content, and prepare them to use that material in simulated and real situations. When U.S. university teaching and learning support staff work with instructors to help them identify areas of their teaching to improve, a key part of that assistance includes talking to the instructor member's students. Students are asked to explain what the instructor does that helps them learn, what the instructor does that impedes their learning, and what they wish the instructor would do. Not surprisingly, students are very specific in what they see as helpful learning supports for them. Moreover, they also identify impediments to their success, viewing those as the instructor creating unnecessary barriers to learning. A qualitative survey was developed to provide undergraduate students the opportunity to identify instructor behaviors and/or practices that they thought helped students learn and those behaviors and practices that were perceived as hindrances to student success. That information is used to help instructors implement more student-focused learning supports that facilitate student achievement. In this session, data shared from the survey will focus on supportive instructor behaviors identified by undergraduate students in an institution located in the southwest United States and those behaviors that students perceive as creating unnecessary barriers to their academic success.

Keywords: effective teaching, pedagogy, student engagement, instructional design

Procedia PDF Downloads 88
1432 A Two Stage Stochastic Mathematical Model for the Tramp Ship Routing with Time Windows Problem

Authors: Amin Jamili

Abstract:

Nowadays, the majority of international trade in goods is carried by sea, and especially by ships deployed in the industrial and tramp segments. This paper addresses routing the tramp ships and determining the schedules including the arrival times to the ports, berthing times at the ports, and the departure times in an operational planning level. In the operational planning level, the weather can be almost exactly forecasted, however in some routes some uncertainties may remain. In this paper, the voyaging times between some of the ports are considered to be uncertain. To that end, a two-stage stochastic mathematical model is proposed. Moreover, a case study is tested with the presented model. The computational results show that this mathematical model is promising and can represent acceptable solutions.

Keywords: routing, scheduling, tram ships, two stage stochastic model, uncertainty

Procedia PDF Downloads 438
1431 Navigating through Organizational Change: TAM-Based Manual for Digital Skills and Safety Transitions

Authors: Margarida Porfírio Tomás, Paula Pereira, José Palma Oliveira

Abstract:

Robotic grasping is advancing rapidly, but transferring techniques from rigid to deformable objects remains a challenge. Deformable and flexible items, such as food containers, demand nuanced handling due to their changing shapes. Bridging this gap is crucial for applications in food processing, surgical robotics, and household assistance. AGILEHAND, a Horizon project, focuses on developing advanced technologies for sorting, handling, and packaging soft and deformable products autonomously. These technologies serve as strategic tools to enhance flexibility, agility, and reconfigurability within the production and logistics systems of European manufacturing companies. Key components include intelligent detection, self-adaptive handling, efficient sorting, and agile, rapid reconfiguration. The overarching goal is to optimize work environments and equipment, ensuring both efficiency and safety. As new technologies emerge in the food industry, there will be some implications, such as labour force, safety problems and acceptance of the new technologies. To overcome these implications, AGILEHAND emphasizes the integration of social sciences and humanities, for example, the application of the Technology Acceptance Model (TAM). The project aims to create a change management manual, that will outline strategies for developing digital skills and managing health and safety transitions. It will also provide best practices and models for organizational change. Additionally, AGILEHAND will design effective training programs to enhance employee skills and knowledge. This information will be obtained through a combination of case studies, structured interviews, questionnaires, and a comprehensive literature review. The project will explore how organizations adapt during periods of change and identify factors influencing employee motivation and job satisfaction. This project received funding from European Union’s Horizon 2020/Horizon Europe research and innovation program under grant agreement No101092043 (AGILEHAND).

Keywords: change management, technology acceptance model, organizational change, health and safety

Procedia PDF Downloads 46
1430 Implementing Effective Strategies to Improve Teaching and Learning in Higher Education: Balancing the Engagement Acts between Lecturers And Students

Authors: Jeffrey Siphiwe Mkhize

Abstract:

Twelve years of schooling for most South African children, particularly those children from disadvantaged past, are confronted with numerous and diverse challenges. These challenges range from infrastructural limitations, language of teaching, poor resources and varying family backgrounds. Likewise, schools are categorized to signify schools’ geographic location, poverty lines, societal class and type of students that the school are likely to enroll. Such categorization perpetuates particular lines of identities that are indirectly reinforced by the same system that seeks to redress. South African universities prefer point systems to determine students’ suitability to gain access to their programmes. Once students are admitted based on the qualifying points there is an assumed equity in the manner in which they receive tuition. They are assumed as equal; noting the widened access to South African universities as means to redress past inequalities. Given the challenges, inequalities, it is necessary to view higher education as a site for knowledge construction that is accessible to all students. Epistemological access is key to all students irrespective of their socio-economic status. This paper seeks to contribute to the discourse of student engagement using lecturer-student relationship as a lens to understand this phenomenon. Data were generated using South African Survey of Student Engagement, focus group interviews, semi-structured one-on-one-interviews as well as document analysis. The focus was on students registered for the first year of a Bachelor of Education degree as well as lecturers that teach high risk modules in this qualification at the same level. The findings suggest that lecturers are challenged by overcrowded classrooms and over-enrolled modules; this challenge hampers their good intentions to become more efficient and innovative in their teaching. Students lack confidence in approaching lecturers for assistance. Collaborative learning has stronger results and students believe in self-support to deal with their challenges based on their individual strengths. Collaborative learning is key to student academic performance.

Keywords: collaborative learning, consultations, student engagement, student performance

Procedia PDF Downloads 110
1429 An Exact Algorithm for Location–Transportation Problems in Humanitarian Relief

Authors: Chansiri Singhtaun

Abstract:

This paper proposes a mathematical model and examines the performance of an exact algorithm for a location–transportation problems in humanitarian relief. The model determines the number and location of distribution centers in a relief network, the amount of relief supplies to be stocked at each distribution center and the vehicles to take the supplies to meet the needs of disaster victims under capacity restriction, transportation and budgetary constraints. The computational experiments are conducted on the various sizes of problems that are generated. Branch and bound algorithm is applied for these problems. The results show that this algorithm can solve problem sizes of up to three candidate locations with five demand points and one candidate location with up to twenty demand points without premature termination.

Keywords: disaster response, facility location, humanitarian relief, transportation

Procedia PDF Downloads 451
1428 Influence of Intra-Yarn Permeability on Mesoscale Permeability of Plain Weave and 3D Fabrics

Authors: Debabrata Adhikari, Mikhail Matveev, Louise Brown, Andy Long, Jan Kočí

Abstract:

A good understanding of mesoscale permeability of complex architectures in fibrous porous preforms is of particular interest in order to achieve efficient and cost-effective resin impregnation of liquid composite molding (LCM). Fabrics used in structural reinforcements are typically woven or stitched. However, 3D fabric reinforcement is of particular interest because of the versatility in the weaving pattern with the binder yarn and in-plain yarn arrangements to manufacture thick composite parts, overcome the limitation in delamination, improve toughness etc. To predict the permeability based on the available pore spaces between the inter yarn spaces, unit cell-based computational fluid dynamics models have been using the Stokes Darcy model. Typically, the preform consists of an arrangement of yarns with spacing in the order of mm, wherein each yarn consists of thousands of filaments with spacing in the order of μm. The fluid flow during infusion exchanges the mass between the intra and inter yarn channels, meaning there is no dead-end of flow between the mesopore in the inter yarn space and the micropore in the yarn. Several studies have employed the Brinkman equation to take into account the flow through dual-scale porosity reinforcement to estimate their permeability. Furthermore, to reduce the computational effort of dual scale flow, scale separation criteria based on the ratio between yarn permeability to the yarn spacing was also proposed to quantify the dual scale and negligible micro-scale flow regime for the prediction of mesoscale permeability. In the present work, the key parameter to identify the influence of intra yarn permeability on the mesoscale permeability has been investigated with the systematic study of weft and warp yarn spacing on the plane weave as well as the position of binder yarn and number of in-plane yarn layers on 3D weave fabric. The permeability tensor has been estimated using an OpenFOAM-based model for the various weave pattern with idealized geometry of yarn implemented using open-source software TexGen. Additionally, scale separation criterion has been established based on the various configuration of yarn permeability for the 3D fabric with both the isotropic and anisotropic yarn from Gebart’s model. It was observed that the variation of mesoscale permeability Kxx within 30% when the isotropic porous yarn is considered for a 3D fabric with binder yarn. Furthermore, the permeability model developed in this study will be used for multi-objective optimizations of the preform mesoscale geometry in terms of yarn spacing, binder pattern, and a number of layers with an aim to obtain improved permeability and reduced void content during the LCM process.

Keywords: permeability, 3D fabric, dual-scale flow, liquid composite molding

Procedia PDF Downloads 97
1427 Mutual Authentication for Sensor-to-Sensor Communications in IoT Infrastructure

Authors: Shadi Janbabaei, Hossein Gharaee Garakani, Naser Mohammadzadeh

Abstract:

Internet of things is a new concept that its emergence has caused ubiquity of sensors in human life, so that at any time, all data are collected, processed and transmitted by these sensors. In order to establish a secure connection, the first challenge is authentication between sensors. However, this challenge also requires some features so that the authentication is done properly. Anonymity, untraceability, and being lightweight are among the issues that need to be considered. In this paper, we have evaluated the authentication protocols and have analyzed the security vulnerabilities found in them. Then an improved light weight authentication protocol for sensor-to-sensor communications is presented which uses the hash function and logical operators. The analysis of protocol shows that security requirements have been met and the protocol is resistant against various attacks. In the end, by decreasing the number of computational cost functions, it is argued that the protocol is lighter than before.

Keywords: anonymity, authentication, Internet of Things, lightweight, un-traceability

Procedia PDF Downloads 294
1426 Numerical Investigation of Natural Convection of Pine, Olive and Orange Leaves

Authors: Ali Reza Tahavvor, Saeed Hosseini, Nazli Jowkar, Behnam Amiri

Abstract:

Heat transfer of leaves is a crucial factor in optimal operation of metabolic functions in plants. In order to quantify this phenomenon in different leaves and investigate the influence of leaf shape on heat transfer, natural convection for pine, orange and olive leaves was simulated as representatives of different groups of leaf shapes. CFD techniques were used in this simulation with the purpose to calculate heat transfer of leaves in similar environmental conditions. The problem was simulated for steady state and three-dimensional conditions. From obtained results, it was concluded that heat fluxes of all three different leaves are almost identical, however, total rate of heat transfer have highest and lowest values for orange leaves and pine leaves, respectively.

Keywords: computational fluid dynamic, heat flux, heat transfer, natural convection

Procedia PDF Downloads 363
1425 Hybrid Strategies of Crisis Intervention for Sexualized Violence Using Digital Media

Authors: Katharina Kargel, Frederic Vobbe

Abstract:

Sexualized violence against children and adolescents using digital media poses particular challenges for practitioners with a focus on crisis intervention (social work, psychotherapy, law enforcement). The technical delimitation of violence increases the burden on those affected and increases the complexity of interdisciplinary cooperation. Urgently needed recommendations for practical action do not yet exist in Germany. Funded by the Federal Ministry of Education and Research, these recommendations for action are being developed in the HUMAN project together with science and practice. The presentation introduces the participatory approach of the HUMAN project. We discuss the application-oriented, casuistic approach of the project and present its results using the example of concrete case-based recommendations for Action. The participants will be presented with concrete prototypical case studies from the project, which will be used to illustrate quality criteria for crisis intervention in cases of sexualized violence using digital media. On the basis of case analyses, focus group interviews and interviews with victims of violence, we present the six central challenges of sexualized violence with the use of digital media, namely: • Diffusion (Ambiguities regarding the extent and significance of violence) , • Transcendence (Space and time independence of the dynamics of violence, omnipresence), • omnipresent anxiety (considering diffusion and transcendence), • being haunted (repeated confrontation with digital memories of violence or the perpetrator), • disparity (conflicts of interpretative power between those affected and the social environment) • simultaneity (of all other factors). We point out generalizable principles with which these challenges can be dealt with professionally. Dealing professionally with sexualized violence using digital media requires a stronger networking of professional actors. A clear distinction must be made between their own mission and the mission of the network partners. Those affected by violence must be shown options for crisis intervention in the context of the aid networks. The different competencies and the professional mission of the offers of help are to be made transparent. The necessity of technical possibilities for deleting abuse images beyond criminal prosecution will be discussed. Those affected are stabilized by multimodal strategies such as a combination of rational emotive therapy, legal support and technical assistance.

Keywords: sexualized violence, intervention, digital media, children and youth

Procedia PDF Downloads 237
1424 A Numerical Simulation of Arterial Mass Transport in Presence of Magnetic Field-Links to Atherosclerosis

Authors: H. Aminfar, M. Mohammadpourfard, K. Khajeh

Abstract:

This paper has focused on the most important parameters in the LSC uptake; inlet Re number and Sc number in the presence of non-uniform magnetic field. The magnetic field is arising from the thin wire with electric current placed vertically to the arterial blood vessel. According to the results of this study, applying magnetic field can be a treatment for atherosclerosis by reducing LSC along the vessel wall. Homogeneous porous layer as a arterial wall has been regarded. Blood flow has been considered laminar and incompressible containing Ferro fluid (blood and 4 % vol. Fe₃O₄) under steady state conditions. Numerical solution of governing equations was obtained by using the single-phase model and control volume technique for flow field.

Keywords: LDL surface concentration (LSC), magnetic field, computational fluid dynamics, porous wall

Procedia PDF Downloads 408
1423 Secure Bio Semantic Computing Scheme

Authors: Hiroshi Yamaguchi, Phillip C. Y. Sheu, Ryo Fujita, Shigeo Tsujii

Abstract:

In this paper, the secure BioSemantic Scheme is presented to bridge biological/biomedical research problems and computational solutions via semantic computing. Due to the diversity of problems in various research fields, the semantic capability description language (SCDL) plays and important role as a common language and generic form for problem formalization. SCDL is expected the essential for future semantic and logical computing in Biosemantic field. We show several example to Biomedical problems in this paper. Moreover, in the coming age of cloud computing, the security problem is considered to be crucial issue and we presented a practical scheme to cope with this problem.

Keywords: biomedical applications, private information retrieval (PIR), semantic capability description language (SCDL), semantic computing

Procedia PDF Downloads 391
1422 The Impact of Artificial Intelligence on Digital Factory

Authors: Mona Awad Wanis Gad

Abstract:

The method of factory making plans has changed loads, in particular, whilst it's miles approximately making plans the factory building itself. Factory making plans have the venture of designing merchandise, plants, tactics, organization, regions, and the construction of a factory. Ordinary restructuring is turning into greater essential for you to preserve the competitiveness of a manufacturing unit. Regulations in new regions, shorter lifestyle cycles of product and manufacturing era, in addition to a VUCA global (Volatility, Uncertainty, Complexity and Ambiguity) cause extra common restructuring measures inside a factory. A digital factory model is the planning foundation for rebuilding measures and turns into a critical device. Furthermore, digital building fashions are increasingly being utilized in factories to help facility management and manufacturing processes. First, exclusive styles of digital manufacturing unit fashions are investigated, and their residences and usabilities to be used instances are analyzed. Within the scope of research are point cloud fashions, building statistics fashions, photogrammetry fashions, and those enriched with sensor information are tested. It investigated which digital fashions permit a simple integration of sensor facts and in which the variations are. In the end, viable application areas of virtual manufacturing unit models are determined by a survey, and the respective digital manufacturing facility fashions are assigned to the application areas. Ultimately, an application case from upkeep is selected and implemented with the assistance of the best virtual factory version. It is shown how a completely digitalized preservation process can be supported by a digital manufacturing facility version by offering facts. Among different functions, the virtual manufacturing facility version is used for indoor navigation, facts provision, and display of sensor statistics. In summary, the paper suggests a structuring of virtual factory fashions that concentrates on the geometric representation of a manufacturing facility building and its technical facilities. A practical application case is proven and implemented. For that reason, the systematic selection of virtual manufacturing facility models with the corresponding utility cases is evaluated.

Keywords: augmented reality, digital factory model, factory planning, restructuring digital factory model, photogrammetry, factory planning, restructuring building information modeling, digital factory model, factory planning, maintenance

Procedia PDF Downloads 40
1421 Web Development in Information Technology with Javascript, Machine Learning and Artificial Intelligence

Authors: Abdul Basit Kiani, Maryam Kiani

Abstract:

Online developers now have the tools necessary to create online apps that are not only reliable but also highly interactive, thanks to the introduction of JavaScript frameworks and APIs. The objective is to give a broad overview of the recent advances in the area. The fusion of machine learning (ML) and artificial intelligence (AI) has expanded the possibilities for web development. Modern websites now include chatbots, clever recommendation systems, and customization algorithms built in. In the rapidly evolving landscape of modern websites, it has become increasingly apparent that user engagement and personalization are key factors for success. To meet these demands, websites now incorporate a range of innovative technologies. One such technology is chatbots, which provide users with instant assistance and support, enhancing their overall browsing experience. These intelligent bots are capable of understanding natural language and can answer frequently asked questions, offer product recommendations, and even help with troubleshooting. Moreover, clever recommendation systems have emerged as a powerful tool on modern websites. By analyzing user behavior, preferences, and historical data, these systems can intelligently suggest relevant products, articles, or services tailored to each user's unique interests. This not only saves users valuable time but also increases the chances of conversions and customer satisfaction. Additionally, customization algorithms have revolutionized the way websites interact with users. By leveraging user preferences, browsing history, and demographic information, these algorithms can dynamically adjust the website's layout, content, and functionalities to suit individual user needs. This level of personalization enhances user engagement, boosts conversion rates, and ultimately leads to a more satisfying online experience. In summary, the integration of chatbots, clever recommendation systems, and customization algorithms into modern websites is transforming the way users interact with online platforms. These advanced technologies not only streamline user experiences but also contribute to increased customer satisfaction, improved conversions, and overall website success.

Keywords: Javascript, machine learning, artificial intelligence, web development

Procedia PDF Downloads 81
1420 Single Machine Scheduling Problem to Minimize the Number of Tardy Jobs

Authors: Ali Allahverdi, Harun Aydilek, Asiye Aydilek

Abstract:

Minimizing the number of tardy jobs is an important factor to consider while making scheduling decisions. This is because on-time shipments are vital for lowering cost and increasing customers’ satisfaction. This paper addresses the single machine scheduling problem with the objective of minimizing the number of tardy jobs. The only known information is the lower and upper bounds for processing times, and deterministic job due dates. A dominance relation is established, and an algorithm is proposed. Several heuristics are generated from the proposed algorithm. Computational analysis indicates that the performance of one of the heuristics is very close to the optimal solution, i.e., on average, less than 1.5 % from the optimal solution.

Keywords: single machine scheduling, number of tardy jobs, heuristi, lower and upper bounds

Procedia PDF Downloads 555
1419 A Hybrid LES-RANS Approach to Analyse Coupled Heat Transfer and Vortex Structures in Separated and Reattached Turbulent Flows

Authors: C. D. Ellis, H. Xia, X. Chen

Abstract:

Experimental and computational studies investigating heat transfer in separated flows have been of increasing importance over the last 60 years, as efforts are being made to understand and improve the efficiency of components such as combustors, turbines, heat exchangers, nuclear reactors and cooling channels. Understanding of not only the time-mean heat transfer properties but also the unsteady properties is vital for design of these components. As computational power increases, more sophisticated methods of modelling these flows become available for use. The hybrid LES-RANS approach has been applied to a blunt leading edge flat plate, utilising a structured grid at a moderate Reynolds number of 20300 based on the plate thickness. In the region close to the wall, the RANS method is implemented for two turbulence models; the one equation Spalart-Allmaras model and Menter’s two equation SST k-ω model. The LES region occupies the flow away from the wall and is formulated without any explicit subgrid scale LES modelling. Hybridisation is achieved between the two methods by the blending of the nearest wall distance. Validation of the flow was obtained by assessing the mean velocity profiles in comparison to similar studies. Identifying the vortex structures of the flow was obtained by utilising the λ2 criterion to identify vortex cores. The qualitative structure of the flow compared with experiments of similar Reynolds number. This identified the 2D roll up of the shear layer, breaking down via the Kelvin-Helmholtz instability. Through this instability the flow progressed into hairpin like structures, elongating as they advanced downstream. Proper Orthogonal Decomposition (POD) analysis has been performed on the full flow field and upon the surface temperature of the plate. As expected, the breakdown of POD modes for the full field revealed a relatively slow decay compared to the surface temperature field. Both POD fields identified the most energetic fluctuations occurred in the separated and recirculation region of the flow. Latter modes of the surface temperature identified these levels of fluctuations to dominate the time-mean region of maximum heat transfer and flow reattachment. In addition to the current research, work will be conducted in tracking the movement of the vortex cores and the location and magnitude of temperature hot spots upon the plate. This information will support the POD and statistical analysis performed to further identify qualitative relationships between the vortex dynamics and the response of the surface heat transfer.

Keywords: heat transfer, hybrid LES-RANS, separated and reattached flow, vortex dynamics

Procedia PDF Downloads 232
1418 Solid Particles Transport and Deposition Prediction in a Turbulent Impinging Jet Using the Lattice Boltzmann Method and a Probabilistic Model on GPU

Authors: Ali Abdul Kadhim, Fue Lien

Abstract:

Solid particle distribution on an impingement surface has been simulated utilizing a graphical processing unit (GPU). In-house computational fluid dynamics (CFD) code has been developed to investigate a 3D turbulent impinging jet using the lattice Boltzmann method (LBM) in conjunction with large eddy simulation (LES) and the multiple relaxation time (MRT) models. This paper proposed an improvement in the LBM-cellular automata (LBM-CA) probabilistic method. In the current model, the fluid flow utilizes the D3Q19 lattice, while the particle model employs the D3Q27 lattice. The particle numbers are defined at the same regular LBM nodes, and transport of particles from one node to its neighboring nodes are determined in accordance with the particle bulk density and velocity by considering all the external forces. The previous models distribute particles at each time step without considering the local velocity and the number of particles at each node. The present model overcomes the deficiencies of the previous LBM-CA models and, therefore, can better capture the dynamic interaction between particles and the surrounding turbulent flow field. Despite the increasing popularity of LBM-MRT-CA model in simulating complex multiphase fluid flows, this approach is still expensive in term of memory size and computational time required to perform 3D simulations. To improve the throughput of each simulation, a single GeForce GTX TITAN X GPU is used in the present work. The CUDA parallel programming platform and the CuRAND library are utilized to form an efficient LBM-CA algorithm. The methodology was first validated against a benchmark test case involving particle deposition on a square cylinder confined in a duct. The flow was unsteady and laminar at Re=200 (Re is the Reynolds number), and simulations were conducted for different Stokes numbers. The present LBM solutions agree well with other results available in the open literature. The GPU code was then used to simulate the particle transport and deposition in a turbulent impinging jet at Re=10,000. The simulations were conducted for L/D=2,4 and 6, where L is the nozzle-to-surface distance and D is the jet diameter. The effect of changing the Stokes number on the particle deposition profile was studied at different L/D ratios. For comparative studies, another in-house serial CPU code was also developed, coupling LBM with the classical Lagrangian particle dispersion model. Agreement between results obtained with LBM-CA and LBM-Lagrangian models and the experimental data is generally good. The present GPU approach achieves a speedup ratio of about 350 against the serial code running on a single CPU.

Keywords: CUDA, GPU parallel programming, LES, lattice Boltzmann method, MRT, multi-phase flow, probabilistic model

Procedia PDF Downloads 207
1417 Numerical Study of the Dynamic Behavior of an Air Conditioning with a Muti Confined Swirling Jet

Authors: Mohamed Roudane

Abstract:

The objective of this study is to know the dynamic behavior of a multi swirling jet used for air conditioning inside a room. To conduct this study, we designed a facility to ensure proper conditions of confinement in which we placed five air blowing devices with adjustable vanes, providing multiple swirling turbulent jets. The jets were issued in the same direction and the same spacing defined between them. This study concerned the numerical simulation of the dynamic mixing of confined swirling multi-jets, and examined the influence of important parameters of a swirl diffuser system on the dynamic performance characteristics. The CFD investigations are carried out by a hybrid mesh to discretize the computational domain. In this work, the simulations have been performed using the finite volume method and FLUENT solver, in which the standard k-ε RNG turbulence model was used for turbulence computations.

Keywords: simulation, dynamic behavior, swirl, turbulent jet

Procedia PDF Downloads 399
1416 CFD Simulation of Surge Wave Generated by Flow-Like Landslides

Authors: Liu-Chao Qiu

Abstract:

The damage caused by surge waves generated in water bodies by flow-like landslides can be very high in terms of human lives and economic losses. The complicated phenomena occurred in this highly unsteady process are difficult to model because three interacting phases: air, water and sediment are involved. The problem therefore is challenging since the effects of non-Newtonian fluid describing the rheology of the flow-like landslides, multi-phase flow and free surface have to be included in the simulation. In this work, the commercial computational fluid dynamics (CFD) package FLUENT is used to model the surge waves due to flow-like landslides. The comparison between the numerical results and experimental data reported in the literature confirms the accuracy of the method.

Keywords: flow-like landslide, surge wave, VOF, non-Newtonian fluids, multi-phase flows, free surface flow

Procedia PDF Downloads 417
1415 Economized Sensor Data Processing with Vehicle Platooning

Authors: Henry Hexmoor, Kailash Yelasani

Abstract:

We present vehicular platooning as a special case of crowd-sensing framework where sharing sensory information among a crowd is used for their collective benefit. After offering an abstract policy that governs processes involving a vehicular platoon, we review several common scenarios and components surrounding vehicular platooning. We then present a simulated prototype that illustrates efficiency of road usage and vehicle travel time derived from platooning. We have argued that one of the paramount benefits of platooning that is overlooked elsewhere, is the substantial computational savings (i.e., economizing benefits) in acquisition and processing of sensory data among vehicles sharing the road. The most capable vehicle can share data gathered from its sensors with nearby vehicles grouped into a platoon.

Keywords: cloud network, collaboration, internet of things, social network

Procedia PDF Downloads 194
1414 A Simulation Modeling Approach for Optimization of Storage Space Allocation in Container Terminal

Authors: Gamal Abd El-Nasser A. Said, El-Sayed M. El-Horbaty

Abstract:

Container handling problems at container terminals are NP-hard problems. This paper presents an approach using discrete-event simulation modeling to optimize solution for storage space allocation problem, taking into account all various interrelated container terminal handling activities. The proposed approach is applied on a real case study data of container terminal at Alexandria port. The computational results show the effectiveness of the proposed model for optimization of storage space allocation in container terminal where 54% reduction in containers handling time in port is achieved.

Keywords: container terminal, discrete-event simulation, optimization, storage space allocation

Procedia PDF Downloads 326
1413 Design Optimization and Thermoacoustic Analysis of Pulse Tube Cryocooler Components

Authors: K. Aravinth, C. T. Vignesh

Abstract:

The usage of pulse tube cryocoolers is significantly increased mainly due to the advantage of the absence of moving parts. The underlying idea of this project is to optimize the design of pulse tube, regenerator, a resonator in cryocooler and analyzing the thermo-acoustic oscillations with respect to the design parameters. Computational Fluid Dynamic (CFD) model with time-dependent validation is done to predict its performance. The continuity, momentum, and energy equations are solved for various porous media regions. The effect of changing the geometries and orientation will be validated and investigated in performance. The pressure, temperature and velocity fields in the regenerator and pulse tube are evaluated. This optimized design performance results will be compared with the existing pulse tube cryocooler design. The sinusoidal behavior of cryocooler in acoustic streaming patterns in pulse tube cryocooler will also be evaluated.

Keywords: acoustics, cryogenics, design, optimization

Procedia PDF Downloads 176
1412 Regulatory Measures on Effective Nuclear Security and Safeguards System in Nigeria

Authors: Nnodi Chinweikpe Akelachi, Adebayo Oladini Kachollom Ifeoma

Abstract:

Insecurity and the possession of nuclear weapons for non-peaceful purposes constitute a major threat to global peace and security, and this undermines the capacity for sustainable development. In Nigeria, the threat of terrorism is a challenge to national stability. For over a decade, Nigeria has been faced with insecurity ranging from Boko-Haram terrorist groups, kidnapping and banditry. The threat exhibited by this non-state actor poses a huge challenge to nuclear and radiological high risks facilities in Nigeria. This challenge has resulted in the regulatory authority and International stakeholders formulating policies for a good mitigation strategy. This strategy is enshrined in formulated laws, regulations and guides like the repealed Nuclear Safety and Radiation Protection Act 19 of 1995 (Nuclear safety, Physical Security and Safeguards Bill), the Nigerian Physical Protection of Nuclear Material and Nuclear Facilities, and Nigerian Nuclear Safeguards Regulations of 2021. All this will help Nigeria’s effort to meet its national nuclear security and safeguards obligations. To further enhance the implementation of nuclear security and safeguards system, Nigeria has signed the Non-Proliferation Treaty (NPT) in 1970, the Comprehensive Safeguards Agreement (INFCIRC/358) in 1988, Additional Protocol in 2007 as well as the Convention on Physical Protection of Nuclear Material and its amendment in 2005. In view of the evolving threats by non-state actors in Nigeria, physical protection security upgrades are being implemented in nuclear and all high-risk radiological facilities through the support of the United States Department of Energy (US-DOE). Also, the IAEA has helped strengthen nuclear security and safeguard systems through the provision of technical assistance and capacity development. Efforts are being made to address some of the challenges identified in the cause of implementing the measures for effective nuclear security and safeguards systems in Nigeria. However, there are eminent challenges in the implementation of the measures within the security and systems in Nigeria. These challenges need to be addressed for an effective security and safeguard regime in Nigeria. This paper seeks to address the challenges encountered in implementing the regulatory and stakeholder measures for effective security and safeguards regime in Nigeria, amongst others.

Keywords: nuclear regulatory body, nuclear facilities and activities, international stakeholders, security and safeguards measures

Procedia PDF Downloads 115
1411 Trajectory Planning Algorithms for Autonomous Agricultural Vehicles

Authors: Caner Koc, Dilara Gerdan Koc, Mustafa Vatandas

Abstract:

The fundamental components of autonomous agricultural robot design, such as having a working understanding of coordinates, correctly constructing the desired route, and sensing environmental elements, are the most important. A variety of sensors, hardware, and software are employed by agricultural robots to find these systems.These enable the fully automated driving system of an autonomous vehicle to simulate how a human-driven vehicle would respond to changing environmental conditions. To calculate the vehicle's motion trajectory using data from the sensors, this automation system typically consists of a sophisticated software architecture based on object detection and driving decisions. In this study, the software architecture of an autonomous agricultural vehicle is compared to the trajectory planning techniques.

Keywords: agriculture 5.0, computational intelligence, motion planning, trajectory planning

Procedia PDF Downloads 78
1410 Multiscale Connected Component Labelling and Applications to Scientific Microscopy Image Processing

Authors: Yayun Hsu, Henry Horng-Shing Lu

Abstract:

In this paper, a new method is proposed to extending the method of connected component labeling from processing binary images to multi-scale modeling of images. By using the adaptive threshold of multi-scale attributes, this approach minimizes the possibility of missing those important components with weak intensities. In addition, the computational cost of this approach remains similar to that of the typical approach of component labeling. Then, this methodology is applied to grain boundary detection and Drosophila Brain-bow neuron segmentation. These demonstrate the feasibility of the proposed approach in the analysis of challenging microscopy images for scientific discovery.

Keywords: microscopic image processing, scientific data mining, multi-scale modeling, data mining

Procedia PDF Downloads 435