Search results for: computational vision
1883 Data Collection Techniques for Robotics to Identify the Facial Expressions of Traumatic Brain Injured Patients
Authors: Chaudhary Muhammad Aqdus Ilyas, Matthias Rehm, Kamal Nasrollahi, Thomas B. Moeslund
Abstract:
This paper presents the investigation of data collection procedures, associated with robots when placed with traumatic brain injured (TBI) patients for rehabilitation purposes through facial expression and mood analysis. Rehabilitation after TBI is very crucial due to nature of injury and variation in recovery time. It is advantageous to analyze these emotional signals in a contactless manner, due to the non-supportive behavior of patients, limited muscle movements and increase in negative emotional expressions. This work aims at the development of framework where robots can recognize TBI emotions through facial expressions to perform rehabilitation tasks by physical, cognitive or interactive activities. The result of these studies shows that with customized data collection strategies, proposed framework identify facial and emotional expressions more accurately that can be utilized in enhancing recovery treatment and social interaction in robotic context.Keywords: computer vision, convolution neural network- long short term memory network (CNN-LSTM), facial expression and mood recognition, multimodal (RGB-thermal) analysis, rehabilitation, robots, traumatic brain injured patients
Procedia PDF Downloads 1551882 On the Implementation of The Pulse Coupled Neural Network (PCNN) in the Vision of Cognitive Systems
Authors: Hala Zaghloul, Taymoor Nazmy
Abstract:
One of the great challenges of the 21st century is to build a robot that can perceive and act within its environment and communicate with people, while also exhibiting the cognitive capabilities that lead to performance like that of people. The Pulse Coupled Neural Network, PCNN, is a relative new ANN model that derived from a neural mammal model with a great potential in the area of image processing as well as target recognition, feature extraction, speech recognition, combinatorial optimization, compressed encoding. PCNN has unique feature among other types of neural network, which make it a candid to be an important approach for perceiving in cognitive systems. This work show and emphasis on the potentials of PCNN to perform different tasks related to image processing. The main drawback or the obstacle that prevent the direct implementation of such technique, is the need to find away to control the PCNN parameters toward perform a specific task. This paper will evaluate the performance of PCNN standard model for processing images with different properties, and select the important parameters that give a significant result, also, the approaches towards find a way for the adaptation of the PCNN parameters to perform a specific task.Keywords: cognitive system, image processing, segmentation, PCNN kernels
Procedia PDF Downloads 2801881 The Verification Study of Computational Fluid Dynamics Model of the Aircraft Piston Engine
Authors: Lukasz Grabowski, Konrad Pietrykowski, Michal Bialy
Abstract:
This paper presents the results of the research to verify the combustion in aircraft piston engine Asz62-IR. This engine was modernized and a type of ignition system was developed. Due to the high costs of experiments of a nine-cylinder 1,000 hp aircraft engine, a simulation technique should be applied. Therefore, computational fluid dynamics to simulate the combustion process is a reasonable solution. Accordingly, the tests for varied ignition advance angles were carried out and the optimal value to be tested on a real engine was specified. The CFD model was created with the AVL Fire software. The engine in the research had two spark plugs for each cylinder and ignition advance angles had to be set up separately for each spark. The results of the simulation were verified by comparing the pressure in the cylinder. The courses of the indicated pressure of the engine mounted on a test stand were compared. The real course of pressure was measured with an optical sensor, mounted in a specially drilled hole between the valves. It was the OPTRAND pressure sensor, which was designed especially to engine combustion process research. The indicated pressure was measured in cylinder no 3. The engine was running at take-off power. The engine was loaded by a propeller at a special test bench. The verification of the CFD simulation results was based on the results of the test bench studies. The course of the simulated pressure obtained is within the measurement error of the optical sensor. This error is 1% and reflects the hysteresis and nonlinearity of the sensor. The real indicated pressure measured in the cylinder and the pressure taken from the simulation were compared. It can be claimed that the verification of CFD simulations based on the pressure is a success. The next step was to research on the impact of changing the ignition advance timing of spark plugs 1 and 2 on a combustion process. Moving ignition timing between 1 and 2 spark plug results in a longer and uneven firing of a mixture. The most optimal point in terms of indicated power occurs when ignition is simultaneous for both spark plugs, but so severely separated ignitions are assured that ignition will occur at all speeds and loads of engine. It should be confirmed by a bench experiment of the engine. However, this simulation research enabled us to determine the optimal ignition advance angle to be implemented into the ignition control system. This knowledge allows us to set up the ignition point with two spark plugs to achieve as large power as possible.Keywords: CFD model, combustion, engine, simulation
Procedia PDF Downloads 3611880 Tabu Search Algorithm for Ship Routing and Scheduling Problem with Time Window
Authors: Khaled Moh. Alhamad
Abstract:
This paper describes a tabu search heuristic for a ship routing and scheduling problem (SRSP). The method was developed to address the problem of loading cargos for many customers using heterogeneous vessels. Constraints relate to delivery time windows imposed by customers, the time horizon by which all deliveries must be made and vessel capacities. The results of a computational investigation are presented. Solution quality and execution time are explored with respect to problem size and parameters controlling the tabu search such as tenure and neighbourhood size.Keywords: heuristic, scheduling, tabu search, transportation
Procedia PDF Downloads 5061879 Public and Private Spaces Producing Social Connectedness in Traditional Environment: A Study on Old Medina District of Casablanca
Authors: Asmaa Sokrat, Aykut Karaman
Abstract:
Public and private spaces are major components of the morphology of the city. This research aims to study the interactions between public and private domains in terms of urban space in Casablanca. The research focuses on a general vision of a socio-spatial issue. It plans to identify the public, private, and transition (semi-public, semi-private) spaces as the constituent of the urban space. Moreover, the study investigates the link between public and private spaces with the social dimensions. Additionally, the research argues that the public space is a place of social interaction; as a reflection, this interaction is the intersection between urban space and social connectedness. Besides, social interaction can be the key to distinguishing between the public and private spheres. The methodological approach of the research is based on the literature review and field study. The article is targeting a case study on the old Medina of Casablanca, from daily use of the public and private spaces, the urban tissue, and the urban space types. In conclusion, the research exhibits that a public space could influence the privacy of the residents of a local urban area; thus, this privacy is inverted on the social interaction. This social interaction is the link between the urban space and social connectedness. Hence, this equation affects the typology of the private space.Keywords: public sphere, private sphere, social connectedness, old Medina of Casablanca
Procedia PDF Downloads 1381878 Inverse Scattering of Two-Dimensional Objects Using an Enhancement Method
Authors: A.R. Eskandari, M.R. Eskandari
Abstract:
A 2D complete identification algorithm for dielectric and multiple objects immersed in air is presented. The employed technique consists of initially retrieving the shape and position of the scattering object using a linear sampling method and then determining the electric permittivity and conductivity of the scatterer using adjoint sensitivity analysis. This inversion algorithm results in high computational speed and efficiency, and it can be generalized for any scatterer structure. Also, this method is robust with respect to noise. The numerical results clearly show that this hybrid approach provides accurate reconstructions of various objects.Keywords: inverse scattering, microwave imaging, two-dimensional objects, Linear Sampling Method (LSM)
Procedia PDF Downloads 3871877 Fair Federated Learning in Wireless Communications
Authors: Shayan Mohajer Hamidi
Abstract:
Federated Learning (FL) has emerged as a promising paradigm for training machine learning models on distributed data without the need for centralized data aggregation. In the realm of wireless communications, FL has the potential to leverage the vast amounts of data generated by wireless devices to improve model performance and enable intelligent applications. However, the fairness aspect of FL in wireless communications remains largely unexplored. This abstract presents an idea for fair federated learning in wireless communications, addressing the challenges of imbalanced data distribution, privacy preservation, and resource allocation. Firstly, the proposed approach aims to tackle the issue of imbalanced data distribution in wireless networks. In typical FL scenarios, the distribution of data across wireless devices can be highly skewed, resulting in unfair model updates. To address this, we propose a weighted aggregation strategy that assigns higher importance to devices with fewer samples during the aggregation process. By incorporating fairness-aware weighting mechanisms, the proposed approach ensures that each participating device's contribution is proportional to its data distribution, thereby mitigating the impact of data imbalance on model performance. Secondly, privacy preservation is a critical concern in federated learning, especially in wireless communications where sensitive user data is involved. The proposed approach incorporates privacy-enhancing techniques, such as differential privacy, to protect user privacy during the model training process. By adding carefully calibrated noise to the gradient updates, the proposed approach ensures that the privacy of individual devices is preserved without compromising the overall model accuracy. Moreover, the approach considers the heterogeneity of devices in terms of computational capabilities and energy constraints, allowing devices to adaptively adjust the level of privacy preservation to strike a balance between privacy and utility. Thirdly, efficient resource allocation is crucial for federated learning in wireless communications, as devices operate under limited bandwidth, energy, and computational resources. The proposed approach leverages optimization techniques to allocate resources effectively among the participating devices, considering factors such as data quality, network conditions, and device capabilities. By intelligently distributing the computational load, communication bandwidth, and energy consumption, the proposed approach minimizes resource wastage and ensures a fair and efficient FL process in wireless networks. To evaluate the performance of the proposed fair federated learning approach, extensive simulations and experiments will be conducted. The experiments will involve a diverse set of wireless devices, ranging from smartphones to Internet of Things (IoT) devices, operating in various scenarios with different data distributions and network conditions. The evaluation metrics will include model accuracy, fairness measures, privacy preservation, and resource utilization. The expected outcomes of this research include improved model performance, fair allocation of resources, enhanced privacy preservation, and a better understanding of the challenges and solutions for fair federated learning in wireless communications. The proposed approach has the potential to revolutionize wireless communication systems by enabling intelligent applications while addressing fairness concerns and preserving user privacy.Keywords: federated learning, wireless communications, fairness, imbalanced data, privacy preservation, resource allocation, differential privacy, optimization
Procedia PDF Downloads 751876 Study on the Impact of Size and Position of the Shear Field in Determining the Shear Modulus of Glulam Beam Using Photogrammetry Approach
Authors: Niaz Gharavi, Hexin Zhang
Abstract:
The shear modulus of a timber beam can be determined using torsion test or shear field test method. The shear field test method is based on shear distortion measurement of the beam at the zone with the constant transverse load in the standardized four-point bending test. The current code of practice advises using two metallic arms act as an instrument to measure the diagonal displacement of the constructing square. The size and the position of the constructing square might influence the shear modulus determination. This study aimed to investigate the size and the position effect of the square in the shear field test method. A binocular stereo vision system has been employed to determine the 3D displacement of a grid of target points. Six glue laminated beams were produced and tested. Analysis of Variance (ANOVA) was performed on the acquired data to evaluate the significance of the size effect and the position effect of the square. The results have shown that the size of the square has a noticeable influence on the value of shear modulus, while, the position of the square within the area with the constant shear force does not affect the measured mean shear modulus.Keywords: shear field test method, structural-sized test, shear modulus of Glulam beam, photogrammetry approach
Procedia PDF Downloads 2911875 Advanced Eales’ Disease with Neovascular Glaucoma at First Presentation: Case Report
Authors: Mohammed A. Alfayyadh, Halla A. AlAbdulhadi, Mahdi H. Almubarak
Abstract:
Purpose: Eales’ disease is an idiopathic vasculitis that affects the peripheral retina. It is characterized by recurrent vitreous hemorrhage as a complication of retinal neovascularization. It is more prevalent in India and affects young males. Here we present a patient with neovascular glaucoma as a rare first presentation of Eales’ disease. Observations: This is a 24-year-old Indian gentleman, who complained of a sudden decrease in vision in the left eye over less than 24 hours, along with frontal headache and eye pain for the last three weeks. Ocular examination revealed peripheral retinal ischemia in the right eye, very high intraocular pressure, rubeosis iridis, vitreous hemorrhage and extensive retinal ischemia in the left eye, vascular sheathing and neovascularization in both eyes. Purified protein derivative skin test was positive. The patient was managed with anti-glaucoma, intravitreal anti-vascular endothelial growth factor and laser photocoagulation. Systemic steroids and anti-tuberculous therapy were also initiated. Conclusions: Neovascular glaucoma is an infrequent complication of Eales’ disease. However, the lack of early detection of the disease in the early stages might lead to such serious complication.Keywords: case report, Eales’ disease, mycobacterium tuberculosis, neovascular glaucoma
Procedia PDF Downloads 1271874 Nonlinear Modelling of Sloshing Waves and Solitary Waves in Shallow Basins
Authors: Mohammad R. Jalali, Mohammad M. Jalali
Abstract:
The earliest theories of sloshing waves and solitary waves based on potential theory idealisations and irrotational flow have been extended to be applicable to more realistic domains. To this end, the computational fluid dynamics (CFD) methods are widely used. Three-dimensional CFD methods such as Navier-Stokes solvers with volume of fluid treatment of the free surface and Navier-Stokes solvers with mappings of the free surface inherently impose high computational expense; therefore, considerable effort has gone into developing depth-averaged approaches. Examples of such approaches include Green–Naghdi (GN) equations. In Cartesian system, GN velocity profile depends on horizontal directions, x-direction and y-direction. The effect of vertical direction (z-direction) is also taken into consideration by applying weighting function in approximation. GN theory considers the effect of vertical acceleration and the consequent non-hydrostatic pressure. Moreover, in GN theory, the flow is rotational. The present study illustrates the application of GN equations to propagation of sloshing waves and solitary waves. For this purpose, GN equations solver is verified for the benchmark tests of Gaussian hump sloshing and solitary wave propagation in shallow basins. Analysis of the free surface sloshing of even harmonic components of an initial Gaussian hump demonstrates that the GN model gives predictions in satisfactory agreement with the linear analytical solutions. Discrepancies between the GN predictions and the linear analytical solutions arise from the effect of wave nonlinearities arising from the wave amplitude itself and wave-wave interactions. Numerically predicted solitary wave propagation indicates that the GN model produces simulations in good agreement with the analytical solution of the linearised wave theory. Comparison between the GN model numerical prediction and the result from perturbation analysis confirms that nonlinear interaction between solitary wave and a solid wall is satisfactorilly modelled. Moreover, solitary wave propagation at an angle to the x-axis and the interaction of solitary waves with each other are conducted to validate the developed model.Keywords: Green–Naghdi equations, nonlinearity, numerical prediction, sloshing waves, solitary waves
Procedia PDF Downloads 2851873 Measuring Delay Using Software Defined Networks: Limitations, Challenges, and Suggestions for Openflow
Authors: Ahmed Alutaibi, Ganti Sudhakar
Abstract:
Providing better Quality-of-Service (QoS) to end users has been a challenging problem for researchers and service providers. Building applications relying on best effort network protocols hindered the adoption of guaranteed service parameters and, ultimately, Quality of Service. The introduction of Software Defined Networking (SDN) opened the door for a new paradigm shift towards a more controlled programmable configurable behavior. Openflow has been and still is the main implementation of the SDN vision. To facilitate better QoS for applications, the network must calculate and measure certain parameters. One of those parameters is the delay between the two ends of the connection. Using the power of SDN and the knowledge of application and network behavior, SDN networks can adjust to different conditions and specifications. In this paper, we use the capabilities of SDN to implement multiple algorithms to measure delay end-to-end not only inside the SDN network. The results of applying the algorithms on an emulated environment show that we can get measurements close to the emulated delay. The results also show that depending on the algorithm, load on the network and controller can differ. In addition, the transport layer handshake algorithm performs best among the tested algorithms. Out of the results and implementation, we show the limitations of Openflow and develop suggestions to solve them.Keywords: software defined networking, quality of service, delay measurement, openflow, mininet
Procedia PDF Downloads 1651872 A Multilevel Approach for Stroke Prediction Combining Risk Factors and Retinal Images
Authors: Jeena R. S., Sukesh Kumar A.
Abstract:
Stroke is one of the major reasons of adult disability and morbidity in many of the developing countries like India. Early diagnosis of stroke is essential for timely prevention and cure. Various conventional statistical methods and computational intelligent models have been developed for predicting the risk and outcome of stroke. This research work focuses on a multilevel approach for predicting the occurrence of stroke based on various risk factors and invasive techniques like retinal imaging. This risk prediction model can aid in clinical decision making and help patients to have an improved and reliable risk prediction.Keywords: prediction, retinal imaging, risk factors, stroke
Procedia PDF Downloads 3031871 An Empirical Study on Switching Activation Functions in Shallow and Deep Neural Networks
Authors: Apoorva Vinod, Archana Mathur, Snehanshu Saha
Abstract:
Though there exists a plethora of Activation Functions (AFs) used in single and multiple hidden layer Neural Networks (NN), their behavior always raised curiosity, whether used in combination or singly. The popular AFs –Sigmoid, ReLU, and Tanh–have performed prominently well for shallow and deep architectures. Most of the time, AFs are used singly in multi-layered NN, and, to the best of our knowledge, their performance is never studied and analyzed deeply when used in combination. In this manuscript, we experiment with multi-layered NN architecture (both on shallow and deep architectures; Convolutional NN and VGG16) and investigate how well the network responds to using two different AFs (Sigmoid-Tanh, Tanh-ReLU, ReLU-Sigmoid) used alternately against a traditional, single (Sigmoid-Sigmoid, Tanh-Tanh, ReLUReLU) combination. Our results show that using two different AFs, the network achieves better accuracy, substantially lower loss, and faster convergence on 4 computer vision (CV) and 15 Non-CV (NCV) datasets. When using different AFs, not only was the accuracy greater by 6-7%, but we also accomplished convergence twice as fast. We present a case study to investigate the probability of networks suffering vanishing and exploding gradients when using two different AFs. Additionally, we theoretically showed that a composition of two or more AFs satisfies Universal Approximation Theorem (UAT).Keywords: activation function, universal approximation function, neural networks, convergence
Procedia PDF Downloads 1581870 Ocular Complications, Adverse Effects of the Procedure, Side-effects of Medications Used for Graft Survival, and Preventable Vision Loss in Live-related Renal Transplant Recipients: Experience at a Transplant Centre in Pakistan
Authors: Fatema Ali Lanewala, Akhtar Jamal Khan
Abstract:
The ocular complications in renal transplant recipients at the biggest transplant center in Pakistan were seen to be diverse, multiple, and sight-threatening. These complications could mainly be due to the primary disease causing renal failure, the process of transplantation, and/or the medications used pre and post-transplantation. A retrospective case series recently published in the Journal of Pakistan Medical Association highlights the common ocular pathologies encountered in renal transplant population. Majority of the patients suffered from cataract, which is a known side-effect of long-term steroids routinely used for graft survival. There was a unique finding in Pakistani population, never reported before from any other transplant centre world over; a large number of recipients was reported to be suffering from night blindness, which significantly improved on vitamin A supplementation. There were a variety of other ocular complications seen which emphasizes the necessity of ocular care and routine examination of transplant recipient’s eyes by an ophthalmologist in order to avoid visual compromise and improve the quality of life of the transplant recipient.Keywords: cataract, night blindness, ocular complications, renal transplantation
Procedia PDF Downloads 1071869 Offline Signature Verification in Punjabi Based On SURF Features and Critical Point Matching Using HMM
Authors: Rajpal Kaur, Pooja Choudhary
Abstract:
Biometrics, which refers to identifying an individual based on his or her physiological or behavioral characteristics, has the capabilities to the reliably distinguish between an authorized person and an imposter. The Signature recognition systems can categorized as offline (static) and online (dynamic). This paper presents Surf Feature based recognition of offline signatures system that is trained with low-resolution scanned signature images. The signature of a person is an important biometric attribute of a human being which can be used to authenticate human identity. However the signatures of human can be handled as an image and recognized using computer vision and HMM techniques. With modern computers, there is need to develop fast algorithms for signature recognition. There are multiple techniques are defined to signature recognition with a lot of scope of research. In this paper, (static signature) off-line signature recognition & verification using surf feature with HMM is proposed, where the signature is captured and presented to the user in an image format. Signatures are verified depended on parameters extracted from the signature using various image processing techniques. The Off-line Signature Verification and Recognition is implemented using Mat lab platform. This work has been analyzed or tested and found suitable for its purpose or result. The proposed method performs better than the other recently proposed methods.Keywords: offline signature verification, offline signature recognition, signatures, SURF features, HMM
Procedia PDF Downloads 3841868 Human-Computer Interaction Pluriversal Framework for Ancestral Medicine App in Bogota: Asset-Based Design Case Study
Authors: Laura Niño Cáceres, Daisy Yoo, Caroline Hummels
Abstract:
COVID-19 accelerated digital healthcare technology usage in many countries, such as Colombia, whose digital healthcare vision and projects are proof of this. However, with a significant cultural indigenous and Afro-Colombian heritage, only some parts of the country are willing to follow the proposed digital Western approach to health. Our paper presents the national healthcare system’s digital narrative, which we contrast with the micro-narrative of an Afro-Colombian ethnomedicine unit in Bogota called Kilombo Yumma. This ethnomedical unit is building its mobile app to safeguard and represent its ancestral medicine practices in local and national healthcare information systems. Kilombo Yumma is keen on promoting their beliefs and practices, which have been passed on through oral traditions and currently exist in the hands of a few older women. We unraveled their ambition, core beliefs, and practices through asset-based design. These assets outlined pluriversal and decolonizing forms of digital healthcare to increase social justice and connect Western and ancestral medicine digital opportunities through HCI.Keywords: asset-based design, mobile app, decolonizing HCI, Afro-Colombian ancestral medicine
Procedia PDF Downloads 791867 Cyclostationary Analysis of Polytime Coded Signals for LPI Radars
Authors: Metuku Shyamsunder, Kakarla Subbarao, P. Prasanna
Abstract:
In radars, an electromagnetic waveform is sent, and an echo of the same signal is received by the receiver. From this received signal, by extracting various parameters such as round trip delay, Doppler frequency it is possible to find distance, speed, altitude, etc. However, nowadays as the technology increases, intruders are intercepting transmitted signal as it reaches them, and they will be extracting the characteristics and trying to modify them. So there is a need to develop a system whose signal cannot be identified by no cooperative intercept receivers. That is why LPI radars came into existence. In this paper, a brief discussion on LPI radar and its modulation (polytime code (PT1)), detection (cyclostationary (DFSM & FAM) techniques such as DFSM, FAM are presented and compared with respect to computational complexity.Keywords: LPI radar, polytime codes, cyclostationary DFSM, FAM
Procedia PDF Downloads 4761866 Giftedness Cloud Model: A Psychological and Ecological Vision of Giftedness Concept
Authors: Rimeyah H. S. Almutairi, Alaa Eldin A. Ayoub
Abstract:
The aim of this study was to identify empirical and theoretical studies that explored giftedness theories and identification. In order to assess and synthesize the mechanisms, outcomes, and impacts of gifted identification models. Thus, we sought to provide an evidence-informed answer to how does current giftedness theories work and effectiveness. In order to develop a model that incorporates the advantages of existing models and avoids their disadvantages as much as possible. We conducted a systematic literature review (SLR). The disciplined analysis resulted in a final sample consisting of 30 appropriate searches. The results indicated that: (a) there is no uniform and consistent definition of Giftedness; (b) researchers are using several non-consistent criteria to detect gifted, and (d) The detection of talent is largely limited to early ages, and there is obvious neglect of adults. This study contributes to the development of Giftedness Cloud Model (GCM) which defined as a model that attempts to interpretation giftedness within an interactive psychological and ecological framework. GCM aims to help a talented to reach giftedness core and manifestation talent in creative productivity or invention. Besides that, GCM suggests classifying giftedness into four levels of mastery, excellence, creative productivity, and manifestation. In addition, GCM presents an idea to distinguish between talent and giftedness.Keywords: giftedness cloud model, talent, systematic literature review, giftedness concept
Procedia PDF Downloads 1671865 Identification System for Grading Banana in Food Processing Industry
Authors: Ebenezer O. Olaniyi, Oyebade K. Oyedotun, Khashman Adnan
Abstract:
In the food industry high quality production is required within a limited time to meet up with the demand in the society. In this research work, we have developed a model which can be used to replace the human operator due to their low output in production and slow in making decisions as a result of an individual differences in deciding the defective and healthy banana. This model can perform the vision attributes of human operators in deciding if the banana is defective or healthy for food production based. This research work is divided into two phase, the first phase is the image processing where several image processing techniques such as colour conversion, edge detection, thresholding and morphological operation were employed to extract features for training and testing the network in the second phase. These features extracted in the first phase were used in the second phase; the classification system phase where the multilayer perceptron using backpropagation neural network was employed to train the network. After the network has learned and converges, the network was tested with feedforward neural network to determine the performance of the network. From this experiment, a recognition rate of 97% was obtained and the time taken for this experiment was limited which makes the system accurate for use in the food industry.Keywords: banana, food processing, identification system, neural network
Procedia PDF Downloads 4711864 Least Support Orthogonal Matching Pursuit (LS-OMP) Recovery Method for Invisible Watermarking Image
Authors: Israa Sh. Tawfic, Sema Koc Kayhan
Abstract:
In this paper, first, we propose least support orthogonal matching pursuit (LS-OMP) algorithm to improve the performance, of the OMP (orthogonal matching pursuit) algorithm. LS-OMP algorithm adaptively chooses optimum L (least part of support), at each iteration. This modification helps to reduce the computational complexity significantly and performs better than OMP algorithm. Second, we give the procedure for the invisible image watermarking in the presence of compressive sampling. The image reconstruction based on a set of watermarked measurements is performed using LS-OMP.Keywords: compressed sensing, orthogonal matching pursuit, restricted isometry property, signal reconstruction, least support orthogonal matching pursuit, watermark
Procedia PDF Downloads 3381863 Numerical Analysis of Charge Exchange in an Opposed-Piston Engine
Authors: Zbigniew Czyż, Adam Majczak, Lukasz Grabowski
Abstract:
The paper presents a description of geometric models, computational algorithms, and results of numerical analyses of charge exchange in a two-stroke opposed-piston engine. The research engine was a newly designed internal Diesel engine. The unit is characterized by three cylinders in which three pairs of opposed-pistons operate. The engine will generate a power output equal to 100 kW at a crankshaft rotation speed of 3800-4000 rpm. The numerical investigations were carried out using ANSYS FLUENT solver. Numerical research, in contrast to experimental research, allows us to validate project assumptions and avoid costly prototype preparation for experimental tests. This makes it possible to optimize the geometrical model in countless variants with no production costs. The geometrical model includes an intake manifold, a cylinder, and an outlet manifold. The study was conducted for a series of modifications of manifolds and intake and exhaust ports to optimize the charge exchange process in the engine. The calculations specified a swirl coefficient obtained under stationary conditions for a full opening of intake and exhaust ports as well as a CA value of 280° for all cylinders. In addition, mass flow rates were identified separately in all of the intake and exhaust ports to achieve the best possible uniformity of flow in the individual cylinders. For the models under consideration, velocity, pressure and streamline contours were generated in important cross sections. The developed models are designed primarily to minimize the flow drag through the intake and exhaust ports while the mass flow rate increases. Firstly, in order to calculate the swirl ratio [-], tangential velocity v [m/s] and then angular velocity ω [rad / s] with respect to the charge as the mean of each element were calculated. The paper contains comparative analyses of all the intake and exhaust manifolds of the designed engine. Acknowledgement: This work has been realized in the cooperation with The Construction Office of WSK "PZL-KALISZ" S.A." and is part of Grant Agreement No. POIR.01.02.00-00-0002/15 financed by the Polish National Centre for Research and Development.Keywords: computational fluid dynamics, engine swirl, fluid mechanics, mass flow rates, numerical analysis, opposed-piston engine
Procedia PDF Downloads 1971862 Introduction to Two Artificial Boundary Conditions for Transient Seepage Problems and Their Application in Geotechnical Engineering
Authors: Shuang Luo, Er-Xiang Song
Abstract:
Many problems in geotechnical engineering, such as foundation deformation, groundwater seepage, seismic wave propagation and geothermal transfer problems, may involve analysis in the ground which can be seen as extending to infinity. To that end, consideration has to be given regarding how to deal with the unbounded domain to be analyzed by using numerical methods, such as finite element method (FEM), finite difference method (FDM) or finite volume method (FVM). A simple artificial boundary approach derived from the analytical solutions for transient radial seepage problems, is introduced. It should be noted, however, that the analytical solutions used to derive the artificial boundary are particular solutions under certain boundary conditions, such as constant hydraulic head at the origin or constant pumping rate of the well. When dealing with unbounded domains with unsteady boundary conditions, a more sophisticated artificial boundary approach to deal with the infinity of the domain is presented. By applying Laplace transforms and introducing some specially defined auxiliary variables, the global artificial boundary conditions (ABCs) are simplified to local ones so that the computational efficiency is enhanced significantly. The introduced two local ABCs are implemented in a finite element computer program so that various seepage problems can be calculated. The two approaches are first verified by the computation of a one-dimensional radial flow problem, and then tentatively applied to more general two-dimensional cylindrical problems and plane problems. Numerical calculations show that the local ABCs can not only give good results for one-dimensional axisymmetric transient flow, but also applicable for more general problems, such as axisymmetric two-dimensional cylindrical problems, and even more general planar two-dimensional flow problems for well doublet and well groups. An important advantage of the latter local boundary is its applicability for seepage under rapidly changing unsteady boundary conditions, and even the computational results on the truncated boundary are usually quite satisfactory. In this aspect, it is superior over the former local boundary. Simulation of relatively long operational time demonstrates to certain extents the numerical stability of the local boundary. The solutions of the two local ABCs are compared with each other and with those obtained by using large element mesh, which proves the satisfactory performance and obvious superiority over the large mesh model.Keywords: transient seepage, unbounded domain, artificial boundary condition, numerical simulation
Procedia PDF Downloads 2941861 An Ethnographic Study: Ineffective Management of a Social Enterprise
Authors: Sylvia Acquah
Abstract:
The assumption that social enterprises are empowering has strong theoretical support, but empirical verification is anecdotal at best. Social enterprises blend social goal with an enterprising idea and therefore in theory these enterprises should provide meaningful jobs that are empowering. Whether jobs created are meaningful, or whether these organizations are practicing social entrepreneurship remains unexplored key questions. This paper addresses these key questions through a comprehensive literature review and an ethnographical study of a Domiciliary Home Care Social Enterprise in the UK. The social entrepreneurs, management and 9 staff members were observed, interviewed and achieves were reviewed and analyzed. In this study, the social entrepreneur’s vision was lost in transition during management change and the organization was only identified as a social enterprise by name. The organization that was set up to tackle lack of continuity in care and create a family of independent carers, was eventually closed down overnight and subjected to investigation by social services and the local council. Also, the ineffectiveness of the organization led to staff being stressed and without the support of the management to help rectify the issues; staff started displaying symptoms of burnout. Social enterprise managers should not only focus on profit maximization or generation, but should equally live up to the core tenets of the enterprise and effectively communicate and gain buy-in of all employees for any changes. Further, there ought to be an independent organization that regulates social enterprises to ensure that they are adhering to their social goals.Keywords: ethnography, carer, social, enterprise
Procedia PDF Downloads 3171860 Mailchimp AI Application For Marketing Employees
Authors: Alia El Akhrass, Raheed Al Jifri, Sara Babalghoum, Jana Bushnag
Abstract:
This project delves into exploring the functionalities of Mailchimp, an artificial intelligence application. The objective is to comprehend its operations through the AI tools it offers. To achieve this, a survey was conducted among peers, seeking insights into Mailchimp's functionality, accessibility, efficiency, and overall benefits. The survey aimed to gather valuable feedback for analysis. Subsequently, a thorough analysis of the collected data was performed to identify trends, patterns, and areas of improvement. Visual representations were then crafted to effectively summarize the findings, aiding in conveying the research outcomes clearly. Founded in 2001, Mailchimp initially provided email marketing services but has since expanded into a comprehensive marketing platform. Its focus on simplicity and accessibility has contributed to its success among businesses of all sizes. Alternative platforms such as Constant Contact, AWeber, and GetResponse offer similar services with their own unique strengths. Mailchimp's journey exemplifies the importance of vision and adaptability in the ever-evolving digital marketing landscape. By prioritizing innovation, user-centricity, and customer service, Mailchimp has established itself as a trusted partner in the field of digital marketing, enabling businesses to effectively connect with their customers and achieve their marketing goals.Keywords: email marketing, ai tool, connect, communicate, generate
Procedia PDF Downloads 411859 Probabilistic Modeling Laser Transmitter
Authors: H. S. Kang
Abstract:
Coupled electrical and optical model for conversion of electrical energy into coherent optical energy for transmitter-receiver link by solid state device is presented. Probability distribution for travelling laser beam switching time intervals and the number of switchings in the time interval is obtained. Selector function mapping is employed to regulate optical data transmission speed. It is established that regulated laser transmission from PhotoActive Laser transmitter follows principal of invariance. This considerably simplifies design of PhotoActive Laser Transmission networks.Keywords: computational mathematics, finite difference Markov chain methods, sequence spaces, singularly perturbed differential equations
Procedia PDF Downloads 4311858 Bhumastra “Unmanned Ground Vehicle”
Authors: Vivek Krishna, Nikhil Jain, A. Mary Posonia A., Albert Mayan J
Abstract:
Terrorism and insurgency are significant global issues that require constant attention and effort from governments and scientists worldwide. To combat these threats, nations invest billions of dollars in developing new defensive technologies to protect civilians. Breakthroughs in vehicle automation have led to the use of sophisticated machines for many dangerous and critical anti-terrorist activities. Our concept of an "Unmanned Ground Vehicle" can carry out tasks such as border security, surveillance, mine detection, and active combat independently or in tandem with human control. The robot's movement can be wirelessly controlled by a person in a distant location or can travel to a pre-programmed destination autonomously in situations where personal control is not feasible. Our defence system comprises two units: the control unit that regulates mobility and the motion tracking unit. The remote operator robot uses the camera's live visual feed to manually operate both units, and the rover can automatically detect movement. The rover is operated by manpower who controls it using a joystick or mouse, and a wireless modem enables a soldier in a combat zone to control the rover via an additional controller feature.Keywords: robotics, computer vision, Machine learning, Artificial intelligence, future of AI
Procedia PDF Downloads 1241857 Evaluation of a Data Fusion Algorithm for Detecting and Locating a Radioactive Source through Monte Carlo N-Particle Code Simulation and Experimental Measurement
Authors: Hadi Ardiny, Amir Mohammad Beigzadeh
Abstract:
Through the utilization of a combination of various sensors and data fusion methods, the detection of potential nuclear threats can be significantly enhanced by extracting more information from different data. In this research, an experimental and modeling approach was employed to track a radioactive source by combining a surveillance camera and a radiation detector (NaI). To run this experiment, three mobile robots were utilized, with one of them equipped with a radioactive source. An algorithm was developed in identifying the contaminated robot through correlation between camera images and camera data. The computer vision method extracts the movements of all robots in the XY plane coordinate system, and the detector system records the gamma-ray count. The position of the robots and the corresponding count of the moving source were modeled using the MCNPX simulation code while considering the experimental geometry. The results demonstrated a high level of accuracy in finding and locating the target in both the simulation model and experimental measurement. The modeling techniques prove to be valuable in designing different scenarios and intelligent systems before initiating any experiments.Keywords: nuclear threats, radiation detector, MCNPX simulation, modeling techniques, intelligent systems
Procedia PDF Downloads 1231856 Colour Quick Response Code with High Damage Resistance Capability
Authors: Minh Nguyen
Abstract:
Today, QR or Quick Response Codes are prevalent, and mobile/smart devices can efficiently read and understand them. Therefore, we can see their appearance in many areas, such as storing web pages/websites, business phone numbers, redirecting to an app download, business location, social media. The popularity of the QR Code is mainly because of its many advantages, such as it can hold a good amount of information, is small, easy to scan and read by a general RGB camera, and it can still work with some damages on its surface. However, there are still some issues. For instance, some areas needed to be kept untouched for its successful decode (e.g., the “Finder Patterns,” the “Quiet Zone,” etc.), the capability of built-in auto-correction is not robust enough, and it is not flexible enough for many application such as Augment Reality (AR). We proposed a new Colour Quick Response Code that has several advantages over the original ones: (1) there is no untouchable area, (2) it allows up to 40% of the entire code area to be damaged, (3) it is more beneficial for Augmented Reality applications, and (4) it is back-compatible and readable by available QR Code scanners such as Pyzbar. From our experience, our Colour Quick Response Code is significantly more flexible on damage compared to the original QR Code. Our code is believed to be suitable in situations where standard 2D Barcodes fail to work, such as curved and shiny surfaces, for instance, medical blood test sample tubes and syringes.Keywords: QR code, computer vision, image processing, 2D barcode
Procedia PDF Downloads 1181855 Closed-Loop Audit of the Degree of the Management of Thrombocytosis in Accordance with Nice Guidance at Roseneath General Practice
Authors: Georgia Mills, Rachel Parsonage
Abstract:
Thrombocytosis is a platelet count above the upper limit of the normal range. An urgent referral is advised for counts over 1000 x109 and if the count is between 600-1000 x109 with certain conditions/age. A non-urgent referral is warranted when the level is above 450 × 109/L (for more than 3 months) or over 600 × 109/L on at least two occasions (4–6 weeks apart) or within the range 450–600 × 109/L with other haematological abnormalities. The aim of this audit is the assess how well Roseneath's general practice has adhered to the National Institute for Health and Care Excellence (NICE) guidelines for investigations and management of high platelet counts. Through the filtering tool on Vision, all blood results in the surgery were filtered to only show those with a platelet count above 450 x 109 /L. These patients were then analyzed individually to see where they fall on the current NICE guidance pathway for management. The investigations and management of thrombocytosis were generally poor. 60% of those who needed an urgent referral did not have it done. 30% of those who needed a follow-up blood test did not have it done. 60% of those needing a routine referral from complete investigations did not have it done. To improve the knowledge of NICE guidelines within the practice, a teaching session was delivered. Percentages then reached 100% in the 2nd audit. There is a lack of awareness of guidelines and education on thrombocytosis in primary care. Teaching sessions will benefit outcomes greatlyKeywords: platelets, thrombocytosis, management, referral
Procedia PDF Downloads 631854 Potential of Visualization and Information Modeling on Productivity Improvement and Cost Saving: A Case Study of a Multi-Residential Construction Project
Authors: Sara Rankohi, Lloyd Waugh
Abstract:
Construction sites are information saturated. Digitalization is hitting construction sites to meet the incredible demand of knowledge sharing and information documentations. From flying drones, 3D Lasers scanners, pocket mobile applications, to augmented reality glasses and smart helmet, visualization technologies help real-time information imposed straight onto construction professional’s field of vision. Although these technologies are very applicable and can have the direct impact on project cost and productivity, experience shows that only a minority of construction professionals quickly adapt themselves to benefit from them in practice. The majority of construction managers still tend to apply traditional construction management methods. This paper investigates a) current applications of visualization technologies in construction projects management, b) the direct effect of these technologies on productivity improvement and cost saving of a multi-residential building project via a case study on Mac Taggart Senior Care project located in Edmonton, Alberta. The research shows the imaged based technologies have a direct impact on improving project productivity and cost savings.Keywords: image-based technologies, project management, cost, productivity improvement
Procedia PDF Downloads 361