Search results for: node points
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2886

Search results for: node points

1536 Spatial Scale of Clustering of Residential Burglary and Its Dependence on Temporal Scale

Authors: Mohammed A. Alazawi, Shiguo Jiang, Steven F. Messner

Abstract:

Research has long focused on two main spatial aspects of crime: spatial patterns and spatial processes. When analyzing these patterns and processes, a key issue has been to determine the proper spatial scale. In addition, it is important to consider the possibility that these patterns and processes might differ appreciably for different temporal scales and might vary across geographic units of analysis. We examine the spatial-temporal dependence of residential burglary. This dependence is tested at varying geographical scales and temporal aggregations. The analyses are based on recorded incidents of crime in Columbus, Ohio during the 1994-2002 period. We implement point pattern analysis on the crime points using Ripley’s K function. The results indicate that spatial point patterns of residential burglary reveal spatial scales of clustering relatively larger than the average size of census tracts of the study area. Also, spatial scale is independent of temporal scale. The results of our analyses concerning the geographic scale of spatial patterns and processes can inform the development of effective policies for crime control.

Keywords: inhomogeneous K function, residential burglary, spatial point pattern, spatial scale, temporal scale

Procedia PDF Downloads 344
1535 A Unified Deep Framework for Joint 3d Pose Estimation and Action Recognition from a Single Color Camera

Authors: Huy Hieu Pham, Houssam Salmane, Louahdi Khoudour, Alain Crouzil, Pablo Zegers, Sergio Velastin

Abstract:

We present a deep learning-based multitask framework for joint 3D human pose estimation and action recognition from color video sequences. Our approach proceeds along two stages. In the first, we run a real-time 2D pose detector to determine the precise pixel location of important key points of the body. A two-stream neural network is then designed and trained to map detected 2D keypoints into 3D poses. In the second, we deploy the Efficient Neural Architecture Search (ENAS) algorithm to find an optimal network architecture that is used for modeling the Spatio-temporal evolution of the estimated 3D poses via an image-based intermediate representation and performing action recognition. Experiments on Human3.6M, Microsoft Research Redmond (MSR) Action3D, and Stony Brook University (SBU) Kinect Interaction datasets verify the effectiveness of the proposed method on the targeted tasks. Moreover, we show that our method requires a low computational budget for training and inference.

Keywords: human action recognition, pose estimation, D-CNN, deep learning

Procedia PDF Downloads 146
1534 The Underground Ecosystem of Credit Card Frauds

Authors: Abhinav Singh

Abstract:

Point Of Sale (POS) malwares have been stealing the limelight this year. They have been the elemental factor in some of the biggest breaches uncovered in past couple of years. Some of them include • Target: A Retail Giant reported close to 40 million credit card data being stolen • Home Depot : A home product Retailer reported breach of close to 50 million credit records • Kmart: A US retailer recently announced breach of 800 thousand credit card details. Alone in 2014, there have been reports of over 15 major breaches of payment systems around the globe. Memory scrapping malwares infecting the point of sale devices have been the lethal weapon used in these attacks. These malwares are capable of reading the payment information from the payment device memory before they are being encrypted. Later on these malwares send the stolen details to its parent server. These malwares are capable of recording all the critical payment information like the card number, security number, owner etc. All these information are delivered in raw format. This Talk will cover the aspects of what happens after these details have been sent to the malware authors. The entire ecosystem of credit card frauds can be broadly classified into these three steps: • Purchase of raw details and dumps • Converting them to plastic cash/cards • Shop! Shop! Shop! The focus of this talk will be on the above mentioned points and how they form an organized network of cyber-crime. The first step involves buying and selling of the stolen details. The key point to emphasize are : • How is this raw information been sold in the underground market • The buyer and seller anatomy • Building your shopping cart and preferences • The importance of reputation and vouches • Customer support and replace/refunds These are some of the key points that will be discussed. But the story doesn’t end here. As of now the buyer only has the raw card information. How will this raw information be converted to plastic cash? Now comes in picture the second part of this underground economy where-in these raw details are converted into actual cards. There are well organized services running underground that can help you in converting these details into plastic cards. We will discuss about this technique in detail. At last, the final step involves shopping with the stolen cards. The cards generated with the stolen details can be easily used to swipe-and-pay for purchased goods at different retail shops. Usually these purchases are of expensive items that have good resale value. Apart from using the cards at stores, there are underground services that lets you deliver online orders to their dummy addresses. Once the package is received it will be delivered to the original buyer. These services charge based on the value of item that is being delivered. The overall underground ecosystem of credit card fraud works in a bulletproof way and it involves people working in close groups and making heavy profits. This is a brief summary of what I plan to present at the talk. I have done an extensive research and have collected good deal of material to present as samples. Some of them include: • List of underground forums • Credit card dumps • IRC chats among these groups • Personal chat with big card sellers • Inside view of these forum owners. The talk will be concluded by throwing light on how these breaches are being tracked during investigation. How are credit card breaches tracked down and what steps can financial institutions can build an incidence response over it.

Keywords: POS mawalre, credit card frauds, enterprise security, underground ecosystem

Procedia PDF Downloads 439
1533 A Study of Behavioral Phenomena Using an Artificial Neural Network

Authors: Yudhajit Datta

Abstract:

Will is a phenomenon that has puzzled humanity for a long time. It is a belief that Will Power of an individual affects the success achieved by an individual in life. It is thought that a person endowed with great will power can overcome even the most crippling setbacks of life while a person with a weak will cannot make the most of life even the greatest assets. Behavioral aspects of the human experience such as will are rarely subjected to quantitative study owing to the numerous uncontrollable parameters involved. This work is an attempt to subject the phenomena of will to the test of an artificial neural network. The claim being tested is that will power of an individual largely determines success achieved in life. In the study, an attempt is made to incorporate the behavioral phenomenon of will into a computational model using data pertaining to the success of individuals obtained from an experiment. A neural network is to be trained using data based upon part of the model, and subsequently used to make predictions regarding will corresponding to data points of success. If the prediction is in agreement with the model values, the model is to be retained as a candidate. Ultimately, the best-fit model from among the many different candidates is to be selected, and used for studying the correlation between success and will.

Keywords: will power, will, success, apathy factor, random factor, characteristic function, life story

Procedia PDF Downloads 379
1532 Semi-Supervised Learning Using Pseudo F Measure

Authors: Mahesh Balan U, Rohith Srinivaas Mohanakrishnan, Venkat Subramanian

Abstract:

Positive and unlabeled learning (PU) has gained more attention in both academic and industry research literature recently because of its relevance to existing business problems today. Yet, there still seems to be some existing challenges in terms of validating the performance of PU learning, as the actual truth of unlabeled data points is still unknown in contrast to a binary classification where we know the truth. In this study, we propose a novel PU learning technique based on the Pseudo-F measure, where we address this research gap. In this approach, we train the PU model to discriminate the probability distribution of the positive and unlabeled in the validation and spy data. The predicted probabilities of the PU model have a two-fold validation – (a) the predicted probabilities of reliable positives and predicted positives should be from the same distribution; (b) the predicted probabilities of predicted positives and predicted unlabeled should be from a different distribution. We experimented with this approach on a credit marketing case study in one of the world’s biggest fintech platforms and found evidence for benchmarking performance and backtested using historical data. This study contributes to the existing literature on semi-supervised learning.

Keywords: PU learning, semi-supervised learning, pseudo f measure, classification

Procedia PDF Downloads 235
1531 Investigation of Nd-Al-Fe Added Nd-Fe-B Alloy Produced by Arc Melting

Authors: Gülten Sadullahoğlu, Baki Altuncevahir

Abstract:

The scope of this study, to investigate the magnetic properties and microstructure of Nd₂Fe₁₄B₁ by alloying with Nd₃₃.₄Fe₆₂.₆Al₄, and heat treating it at different temperatures. The stoichiometric Nd₂Fe₁₄B hard magnetic alloy and Nd₃₃.₄Fe₆₂.₆Al₄ composition was produced by arc melting under argon atmosphere. The Nd₃₃.₄Fe₆₂.₆Al₄ alloy has added to the 2:14:1 hard magnetic alloy with 48% by weight, and melted again by arc melting. Then, it was heat treated at 600, 700 and 800˚C for 3h under vacuum. In AC magnetic susceptibility measurements, for the as-cast sample, the signals decreased sharply at 101 ˚C and 313 ˚C corresponding to the Curie temperatures of the two ferromagnetic phases in addition to Fe phase. For the sample annealed at 600 ˚C, two Curie points were observed at about 257˚C and at 313˚C. However, the phase corresponding to the Curie temperature of 101 ˚C was disappeared. According to the magnetization measurements, the saturation magnetization has the highest value of 99.8 emu/g for the sample annealed at 600 ˚C, and decreased to 57.66 and 28.6 emu/g for the samples annealed at 700˚ and 800 ˚C respectively. Heat treatment resulted in an evolution of the new phase that caused changes in magnetic properties of the alloys. In order to have a clear picture, the identification of these phases are being under the investigation by XRD and SEM–EDX analysis.

Keywords: NdFeB hard magnets, bulk magnetic materials, arc melting, Curie temperature, heat treatment

Procedia PDF Downloads 284
1530 Understanding Post-Displacement Earnings Losses: The Role of Wealth Inequality

Authors: M. Bartal

Abstract:

A large empirical evidence points to sizable lifetime earnings losses associated with the displacement of tenured workers. The causes of these losses are still not well-understood. Existing explanations are heavily based on human capital depreciation during non-employment spells. In this paper, a new avenue is explored. Evidence on the role of household liquidity constraints in accounting for the persistence of post-displacement earning losses is provided based on SIPP data. Then, a directed search and matching model with endogenous human capital and wealth accumulation is introduced. The model is computationally tractable thanks to its block-recursive structure and highlights a non-trivial, yet intuitive, interaction between wealth and human capital. Constrained workers tend to accept jobs with low firm-sponsored training because the latter are (endogenously) easier to find. This new channel provides a plausible explanation for why young (highly constrained) workers suffer persistent scars after displacement. Finally, the model is calibrated on US data to show that the interplay between wealth and human capital is crucial to replicate the observed lifecycle pattern of earning losses. JEL— E21, E24, J24, J63.

Keywords: directed search, human capital accumulation, job displacement, wealth accumulation

Procedia PDF Downloads 208
1529 Robotic Assistance in Nursing Care: Survey on Challenges and Scenarios

Authors: Pascal Gliesche, Kathrin Seibert, Christian Kowalski, Dominik Domhoff, Max Pfingsthorn, Karin Wolf-Ostermann, Andreas Hein

Abstract:

Robotic assistance in nursing care is an increasingly important area of research and development. Facing a shortage of labor and an increasing number of people in need of care, the German Nursing Care Innovation Center (Pflegeinnovationszentrum, PIZ) aims to address these challenges from the side of technology. Little is known about nurses experiences with existing robotic assistance systems. Especially nurses perspectives on starting points for the development of robotic solutions, that target recurring burdensome tasks in everyday nursing care, are of interest. This paper presents findings focusing on robotics resulting from an explanatory mixed-methods study on nurses experiences with and their expectations for innovative technologies in nursing care in stationary and ambulant care facilities and hospitals in Germany. Based on the findings, eight scenarios for robotic assistance are identified based on the real needs of practitioners. An initial system addressing a single use-case is described to show perspectives for the use of robots in nursing care.

Keywords: robotics and automation, engineering management, engineering in medicine and biology, medical services, public health-care

Procedia PDF Downloads 153
1528 Non-Parametric Regression over Its Parametric Couterparts with Large Sample Size

Authors: Jude Opara, Esemokumo Perewarebo Akpos

Abstract:

This paper is on non-parametric linear regression over its parametric counterparts with large sample size. Data set on anthropometric measurement of primary school pupils was taken for the analysis. The study used 50 randomly selected pupils for the study. The set of data was subjected to normality test, and it was discovered that the residuals are not normally distributed (i.e. they do not follow a Gaussian distribution) for the commonly used least squares regression method for fitting an equation into a set of (x,y)-data points using the Anderson-Darling technique. The algorithms for the nonparametric Theil’s regression are stated in this paper as well as its parametric OLS counterpart. The use of a programming language software known as “R Development” was used in this paper. From the analysis, the result showed that there exists a significant relationship between the response and the explanatory variable for both the parametric and non-parametric regression. To know the efficiency of one method over the other, the Akaike Information Criterion (AIC), Bayesian Information Criterion (BIC) are used, and it is discovered that the nonparametric regression performs better than its parametric regression counterparts due to their lower values in both the AIC and BIC. The study however recommends that future researchers should study a similar work by examining the presence of outliers in the data set, and probably expunge it if detected and re-analyze to compare results.

Keywords: Theil’s regression, Bayesian information criterion, Akaike information criterion, OLS

Procedia PDF Downloads 305
1527 Rationalized Haar Transforms Approach to Design of Observer for Control Systems with Unknown Inputs

Authors: Joon-Hoon Park

Abstract:

The fundamental concept of observability is important in both theoretical and practical points of modern control systems. In modern control theory, a control system has criteria for determining the design solution exists for the system parameters and design objectives. The idea of observability relates to the condition of observing or estimating the state variables from the output variables that is generally measurable. To design closed-loop control system, the practical problems of implementing the feedback of the state variables must be considered and implementing state feedback control problem has been existed in this case. All the state variables are not available, so it is requisite to design and implement an observer that will estimate the state variables form the output parameters. However sometimes unknown inputs are presented in control systems as practical cases. This paper presents a design method and algorithm for observer of control system with unknown input parameters based on Rationalized Haar transform. The proposed method is more advantageous than the other numerical method.

Keywords: orthogonal functions, rationalized Haar transforms, control system observer, algebraic method

Procedia PDF Downloads 370
1526 Monitoring of Key Indicators of Sustainable Tourism in the Jalapão State Park/Tocantins: A Case Study of Environmental Indicators

Authors: Veruska C. Dutra, Afonso R. Aquino

Abstract:

Since the 1980s, global tourism activity has consolidated worldwide to become an important economic contributor, and consequently, the sociocultural and environmental impacts are starting to become evidenced. This raises the need of discussing about actions for sustainable tourism that should be linked not only to the economy, but also to the environment and social aspects. The work that is going to be presented is part of a doctoral research project in Sciences undertaken at the Sao Paulo University, Brazil. It aims to analyze whether the monitoring of the tourism sector with a focus on sustainability is applicable or not, through those indicators, put in a case study in the Jalapão State Park (JSP) conservation unit, in the state of Tocantins, Brazil. This is a study of an interdisciplinary nature that had the deductive method as its guide. We concluded that the key points of the sustainable tourism, when analyzed with the focal point in environmental indicators, are an important evaluation and quantification tool of that activity in the study locus. It displayed itself as an adequate tool for monitoring, thus decoding, the main environmental impacts that occur in tourism regions and their intensity, which is made possible through analysis, and has the objective to trace ways to prevent and correct the presented impacts.

Keywords: indicators, tourism, sustainability, Jalapão

Procedia PDF Downloads 331
1525 Conceptual and Funnel Methods Contribution to Critical Literature Review: PhD construction Management

Authors: Samuel Quashie

Abstract:

This study is aimed at demonstrating the applicability and contribution of ‘Conceptual and Funnelling Methods’ during the literature review stages, for PhD in Construction Management, which focused on the ‘Development of an Integrated Management for Post-Disaster Reconstruction’, the viability of this approach using conceptual and funnel methods are demonstrated. The ‘conceptual review method’ builds upon the strengths of relevant material, detailing major points and areas covered and evaluates lesser relevant literature. Publications are reviewed in an integrated style, challenging the scientific theory and seeking to develop new insights. The funnel method grouped reviews by commonality, regardless of the topic or thesis statement. It shows that the literature review is acquired using different kinds of information to increase the variety and diversity of the investigation. Results demonstrated conceptual and funnel methods ability to reviewed and appraised the relevant literature. It puts them into an integrated style, allows an evaluation of credentials, originality, theory base, context and significance of the quality work to emerge. Objectives of the review are met and gaps in knowledge are identified and direct further studies to answer the research questions.

Keywords: Ph.D, construction management, critical literature review, conceptual and funnel methods

Procedia PDF Downloads 415
1524 Multifractal Behavior of the Perturbed Cerbelli-Giona Map: Numerical Computation of ω-Measure

Authors: Ibrahim Alsendid, Rob Sturman, Benjamin Sharp

Abstract:

In this paper, we consider a family of 2-dimensional nonlinear area-preserving transformations on the torus. A single parameter η varies between 0 and 1, taking the transformation from a hyperbolic toral automorphism to the “Cerbelli-Giona” map, a system known to exhibit multifractal properties. Here we study the multifractal properties of the family of maps. We apply a box-counting method by defining a grid of boxes Bi(δ), where i is the index and δ is the size of the boxes, to quantify the distribution of stable and unstable manifolds of the map. When the parameter is in the range 0.51< η <0.58 and 0.68< η <1 the map is ergodic; i.e., the unstable and stable manifolds eventually cover the whole torus, although not in a uniform distribution. For accurate numerical results, we require correspondingly accurate construction of the stable and unstable manifolds. Here we use the piecewise linearity of the map to achieve this, by computing the endpoints of line segments that define the global stable and unstable manifolds. This allows the generalized fractal dimension Dq, and spectrum of dimensions f(α), to be computed with accuracy. Finally, the intersection of the unstable and stable manifold of the map will be investigated and compared with the distribution of periodic points of the system.

Keywords: Discrete-time dynamical systems, Fractal geometry, Multifractal behaviour of the Perturbed map, Multifractal of Dynamical systems

Procedia PDF Downloads 211
1523 Design of Geochemical Maps of Industrial City Using Gradient Boosting and Geographic Information System

Authors: Ruslan Safarov, Zhanat Shomanova, Yuri Nossenko, Zhandos Mussayev, Ayana Baltabek

Abstract:

Geochemical maps of distribution of polluting elements V, Cr, Mn, Co, Ni, Cu, Zn, Mo, Cd, Pb on the territory of the Pavlodar city (Kazakhstan), which is an industrial hub were designed. The samples of soil were taken from 100 locations. Elemental analysis has been performed using XRF. The obtained data was used for training of the computational model with gradient boosting algorithm. The optimal parameters of model as well as the loss function were selected. The computational model was used for prediction of polluting elements concentration for 1000 evenly distributed points. Based on predicted data geochemical maps were created. Additionally, the total pollution index Zc was calculated for every from 1000 point. The spatial distribution of the Zc index was visualized using GIS (QGIS). It was calculated that the maximum coverage area of the territory of the Pavlodar city belongs to the moderately hazardous category (89.7%). The visualization of the obtained data allowed us to conclude that the main source of contamination goes from the industrial zones where the strategic metallurgical and refining plants are placed.

Keywords: Pavlodar, geochemical map, gradient boosting, CatBoost, QGIS, spatial distribution, heavy metals

Procedia PDF Downloads 82
1522 Comparison of the Boundary Element Method and the Method of Fundamental Solutions for Analysis of Potential and Elasticity

Authors: S. Zenhari, M. R. Hematiyan, A. Khosravifard, M. R. Feizi

Abstract:

The boundary element method (BEM) and the method of fundamental solutions (MFS) are well-known fundamental solution-based methods for solving a variety of problems. Both methods are boundary-type techniques and can provide accurate results. In comparison to the finite element method (FEM), which is a domain-type method, the BEM and the MFS need less manual effort to solve a problem. The aim of this study is to compare the accuracy and reliability of the BEM and the MFS. This comparison is made for 2D potential and elasticity problems with different boundary and loading conditions. In the comparisons, both convex and concave domains are considered. Both linear and quadratic elements are employed for boundary element analysis of the examples. The discretization of the problem domain in the BEM, i.e., converting the boundary of the problem into boundary elements, is relatively simple; however, in the MFS, obtaining appropriate locations of collocation and source points needs more attention to obtain reliable solutions. The results obtained from the presented examples show that both methods lead to accurate solutions for convex domains, whereas the BEM is more suitable than the MFS for concave domains.

Keywords: boundary element method, method of fundamental solutions, elasticity, potential problem, convex domain, concave domain

Procedia PDF Downloads 90
1521 Life Cycle Analysis (LCA) for Transportation of Cross-Laminated Timber (CLT) Panels Comparing Two Origin Points of Supply

Authors: Mahboobeh Hemmati, Tahar Messadi, Hongmei Gu

Abstract:

This overall research is targeted at the assessment of the new CLT-built Adohi Hall residential building located on the campus of the University of Arkansas in Fayetteville, Arkansas. The purpose of the Life Cycle Assessment (LCA) study is to analyze the environmental impacts resulting from the transportation route of the Austrian imported CLT to the construction site with those of the CLT assumed to be originating from Conway, Arkansas. The Global Warming Potential (GWP) of CLT from Europe (Styria-Graz in Austria) to the site was first investigated. The results were then compared with the GWP of the CLT produced in Conway, Arkansas. The impacts of each scenario, using the Ecoinvent database, are then calculated and compared against each other to find the most environmentally efficient scenario in terms of global warming impacts. The quantification of GWP is associated with different transportation systems, water, road, and rail. Obtained through comparison, the findings reveal that the use of local materials is more efficient. In addition, transportation by water produces less Greenhouse Gas (GHG) emission in comparison to freight transportation by rail and road. Thus, besides the travel distance, the utilized transportation system is still a significant factor and should be seriously considered in making decisions for moving materials.

Keywords: comparative analysis, GWP, LCA, transportation

Procedia PDF Downloads 241
1520 Modeling Dynamics and Control of Transversal Vibration of an Underactuated Flexible Plate Using Controlled Lagrangian Method

Authors: Mahmood Khalghollah, Mohammad Tavallaeinejad, Mohammad Eghtesad

Abstract:

The method of Controlled Lagrangian is an energy shaping control technique for under actuated Lagrangian systems. Energy shaping control design methods are appealing as they retain the underlying nonlinear dynamics and can provide stability results that hold over larger domain than can be obtained using linear design and analysis. In the present study, controlled lagrangian is employed for designing a controller in an under actuated rotating flexible plate system. In the system of rotating flexible plate, due to its nonlinear characteristics and coupled dynamics of rigid and flexible components, controller design is a known challenge. In this paper, controller objectives are considered to be vibration reduction of flexible component and position control of the tip of the plate. To achieve the goals, a method based on both kinetic and potential energy shaping is introduced. The stability of the closed-loop system is investigated and proved around its equilibrium points. Moreover, the proposed controller is shown to be robust against disturbance and plant uncertainties.

Keywords: controlled lagrangian, underactuated system, flexible rotating plate, disturbance

Procedia PDF Downloads 446
1519 Environmental Science: A Proposal for Constructing New Knowledge for Ecotourism Itineraries

Authors: Veruska C. Dutra, Mary L. G. S. Senna

Abstract:

The principle of sustainability has been studied by different sciences with the purpose of formulating clear and concrete models. Much has been discussed about sustainability, and several points of view have been used to try to explain it; environmental science emerges from various environmental discourses that are willing to establish a new concept for understanding this complexity. This way, we focus on the activity of ecotourism as a way to integrate sustainable practices proposed by environmental science, and thus, make it possible to create a new perspective for eco-tourists and the managers of tourist destinations towards nature. The aim of this study was to suggest a direction for environmental awareness, based on environmental science, to change the eco-tourist's view of nature in ecotourism tours. The methodology used was based on a case study concerning the Jalapão State Park - JSP, located in the State of Tocantins, Northern Brazil. The study was based on discussions, theoretical studies, bibliographical research and on-site research. We have identified that to incite the tourists’ awareness, they need to visit nature to understand the environmental problems and promote actions for its preservation. We highlight in this study actions to drive their human perception through environmental science, so that the ecotourism itinerary tours to the JSP, promote a balance between the natural environment and the tourist, making them, in this way, environmental tourists.

Keywords: science, environmental, ecoturism, Jalapão

Procedia PDF Downloads 338
1518 Mountain Photo Sphere: An Android Application of Mountain Hiking Street View

Authors: Yanto Budisusanto, Aulia Rachmawati

Abstract:

Land navigation technology that is being developed is Google Street View to provide 360° street views, enabling the user to know the road conditions physically with the photo display. For climbers, especially beginners, detail information of climbing terrain is needed so climbers can prepare supplies and strategies before climbing. Therefore, we built a mountaineer guide application named Mountain Photo Sphere. This application displays a 360̊ panoramic view of mountain hiking trail and important points along the hiking path and its surrounding conditions. By combining panoramic photos 360̊ and tracking paths from coordinate data, a virtual tour will be formed. It is built using Java language and Android Studio. The hiking trail map composed by Google Maps API (Gaining access to google maps), Google GEO API (Gaining access to google maps), and OpenStreetMap API (Getting map files to be accessed offline on the Application). This application can be accessed offline so that climbers can use the application during climbing activities.

Keywords: google street view, panoramic photo 360°, mountain hiking, mountain photo sphere

Procedia PDF Downloads 166
1517 A Lightweight Blockchain: Enhancing Internet of Things Driven Smart Buildings Scalability and Access Control Using Intelligent Direct Acyclic Graph Architecture and Smart Contracts

Authors: Syed Irfan Raza Naqvi, Zheng Jiangbin, Ahmad Moshin, Pervez Akhter

Abstract:

Currently, the IoT system depends on a centralized client-servant architecture that causes various scalability and privacy vulnerabilities. Distributed ledger technology (DLT) introduces a set of opportunities for the IoT, which leads to practical ideas for existing components at all levels of existing architectures. Blockchain Technology (BCT) appears to be one approach to solving several IoT problems, like Bitcoin (BTC) and Ethereum, which offer multiple possibilities. Besides, IoTs are resource-constrained devices with insufficient capacity and computational overhead to process blockchain consensus mechanisms; the traditional BCT existing challenge for IoTs is poor scalability, energy efficiency, and transaction fees. IOTA is a distributed ledger based on Direct Acyclic Graph (DAG) that ensures M2M micro-transactions are free of charge. IOTA has the potential to address existing IoT-related difficulties such as infrastructure scalability, privacy and access control mechanisms. We proposed an architecture, SLDBI: A Scalable, lightweight DAG-based Blockchain Design for Intelligent IoT Systems, which adapts the DAG base Tangle and implements a lightweight message data model to address the IoT limitations. It enables the smooth integration of new IoT devices into a variety of apps. SLDBI enables comprehensive access control, energy efficiency, and scalability in IoT ecosystems by utilizing the Masked Authentication Message (MAM) protocol and the IOTA Smart Contract Protocol (ISCP). Furthermore, we suggest proof-of-work (PoW) computation on the full node in an energy-efficient way. Experiments have been carried out to show the capability of a tangle to achieve better scalability while maintaining energy efficiency. The findings show user access control management at granularity levels and ensure scale up to massive networks with thousands of IoT nodes, such as Smart Connected Buildings (SCBDs).

Keywords: blockchain, IOT, direct acyclic graphy, scalability, access control, architecture, smart contract, smart connected buildings

Procedia PDF Downloads 122
1516 Harmonics and Flicker Levels at Substation

Authors: Ali Borhani Manesh, Sirus Mohammadi

Abstract:

Harmonic distortion is caused by nonlinear devices in the power system. A nonlinear device is one in which the current is not proportional to the applied voltage. Harmonic distortion is present to some degree on all power systems. Proactive monitoring of power quality disturbance levels by electricity utilities is vital to allow cost-effective mitigation when disturbances are perceived to be approaching planning levels and also to protect the security of customer installations. Ensuring that disturbance levels are within limits at the HV and EHV points of supply of the network is essential if satisfactory levels downstream are to be maintained. This paper presents discussion on a power quality monitoring campaign performed at the sub-transmission point of supply of a distribution network with the objective of benchmarking background disturbance levels prior to modifications to the substation and to ensure emissions from HV customers and the downstream MV networks are within acceptable levels. Some discussion on the difficulties involved in such a study is presented. This paper presents a survey of voltage and current harmonic distortion levels at transmission system in Kohgiloye and Boyrahmad. The effects of harmonics on capacitors and power transformers are discussed.

Keywords: power quality, harmonics, flicker, measurement, substation

Procedia PDF Downloads 696
1515 Experimental and Computational Investigation of Flow Field and Thermal Behavior of a Mechanical Seal

Authors: Hossein Shokouhmand, Masoomeh Shadab, Rohallah Torabi

Abstract:

Turbulent flow inside the seal chamber of a pump operating at nearly high Reynolds number is investigated. A comparison of a 3-D computational model for flow and thermal analysis of a mechanical seal with experimental thermal results is presented. The computational model adequately predicts the flow field in the seal chamber and thermal characteristics with the rotating and stationary rings and the twister flow around the seal parts by solving N-S and energy equations in ANSYS-CFX software. The Reynolds stress model (RSM) is applied as a turbulence model for this purpose. Experimental work is discussed which quantifies the temperature of five different points of the working fluid in chamber, mass flow at inlet and the fluid pressure at inlet and outlet. Experimental measurements are combined with computational modeling to obtain local and average heat transfer characteristics. Numerical results of three cases including different flush rates are reported.

Keywords: mechanical seal, CFD_CFX, reynolds stress model, flow field, heat transfer analysis, stream line, heat transfer coefficient, heat flux, nusselt

Procedia PDF Downloads 440
1514 Online Yoga Asana Trainer Using Deep Learning

Authors: Venkata Narayana Chejarla, Nafisa Parvez Shaik, Gopi Vara Prasad Marabathula, Deva Kumar Bejjam

Abstract:

Yoga is an advanced, well-recognized method with roots in Indian philosophy. Yoga benefits both the body and the psyche. Yoga is a regular exercise that helps people relax and sleep better while also enhancing their balance, endurance, and concentration. Yoga can be learned in a variety of settings, including at home with the aid of books and the internet as well as in yoga studios with the guidance of an instructor. Self-learning does not teach the proper yoga poses, and doing them without the right instruction could result in significant injuries. We developed "Online Yoga Asana Trainer using Deep Learning" so that people could practice yoga without a teacher. Our project is developed using Tensorflow, Movenet, and Keras models. The system makes use of data from Kaggle that includes 25 different yoga poses. The first part of the process involves applying the movement model for extracting the 17 key points of the body from the dataset, and the next part involves preprocessing, which includes building a pose classification model using neural networks. The system scores a 98.3% accuracy rate. The system is developed to work with live videos.

Keywords: yoga, deep learning, movenet, tensorflow, keras, CNN

Procedia PDF Downloads 240
1513 Management Competency in Logistical Function: The Skills That Will Master a Logistical Manager

Authors: Fatima Ibnchahid

Abstract:

Competence approach is considered, since the early 80's as one of the major development of HR policies. Many approaches to manage the professional skills were declined. Some processes are mature whereas the others have been abandoned. Competence can be defined as the set of knowledge (theoretical and practical), know-how (experience) and life skills (personality traits) mobilized by a person in the company. The skills must master a logistics manager are divided into two main categories: depending on whether technical skills, or managerial skills and human. The firsts are broken down into skills on logistical techniques and on general skills in business, seconds in social skills (self with others) and personal (with oneself). Logisticians are faced with new challenges and new constraints that are revolutionizing the way to treat the physical movement of goods and operations related to information flows that trigger, they control and guide the physical movements of these major changes, we can mention the development of information technology and communication, the emergence of strong environmental and security constraints. These changes have important effects on the skills needs of the members of the logistical function and sensitive development for training requested by logistical managers to perform better in their job changes. In this article, we will address two main points, first, a brief overview of the management skills and secondly answer the question asked in the title of the article to know what are the skills that will master a logistical manager.

Keywords: skills, competence, management, logistical function

Procedia PDF Downloads 281
1512 Towards an Adversary-Aware ML-Based Detector of Spam on Twitter Hashtags

Authors: Niddal Imam, Vassilios G. Vassilakis

Abstract:

After analysing messages posted by health-related spam campaigns in Twitter Arabic hashtags, we found that these campaigns use unique hijacked accounts (we call them adversarial hijacked accounts) as adversarial examples to fool deployed ML-based spam detectors. Existing ML-based models build a behaviour profile for each user to detect hijacked accounts. This approach is not applicable for detecting spam in Twitter hashtags since they are computationally expensive. Hence, we propose an adversary-aware ML-based detector, which includes a newly designed feature (avg posts) to improve the detection of spam tweets posted by the adversarial hijacked accounts at a tweet-level in trending hashtags. The proposed detector was designed considering three key points: robustness, adaptability, and interpretability. The new feature leverages the account’s temporal patterns (i.e., account age and number of posts). It is faster to compute compared to features discussed in the literature and improves the accuracy of detecting the identified hijacked accounts by 73%.

Keywords: Twitter spam detection, adversarial examples, evasion attack, adversarial concept drift, account hijacking, trending hashtag

Procedia PDF Downloads 78
1511 Analogical Reasoning on Preschoolers’ Linguistic Performance

Authors: Yenie Norambuena

Abstract:

Analogical reasoning is a cognitive process that consists of structured comparisons of mental representations and scheme construction. Because of its heuristic function, it is ubiquitous in cognition and could play an important role in language development. The use of analogies is expressed early in children and this behavior is also reflected in language, suggesting a possible way to understand the complex links between thought and language. The current research examines factors of verbal and non-verbal reasoning that should be taken into consideration in the study of language development for their relations and predictive value. The study was conducted with 48 Chilean preschoolers (Spanish speakers) from 4 to 6-year-old. We assessed children’s verbal analogical reasoning, non-verbal analogical reasoning and linguistics skills (Listening Comprehension, Phonemic awareness, Alphabetic principle, Syllabification, Lexical repetition and Lexical decision). The results evidenced significant correlations between analogical reasoning factors and linguistic skills and they can predict linguistic performance mainly on oral comprehension, lexical decision and phonological skills. These findings suggest a fundamental interrelationship between analogical reasoning and linguistic performance on children’s and points to the need to consider this cognitive process in comprehensive theories of children's language development.

Keywords: verbal analogical reasoning, non-verbal analogical reasoning, linguistic skills, language development

Procedia PDF Downloads 266
1510 Use the Null Space to Create Starting Point for Stochastic Programming

Authors: Ghussoun Al-Jeiroudi

Abstract:

Stochastic programming is one of the powerful technique which is used to solve real-life problems. Hence, the data of real-life problems is subject to significant uncertainty. Uncertainty is well studied and modeled by stochastic programming. Each day, problems become bigger and bigger and the need for a tool, which does deal with large scale problems, increase. Interior point method is a perfect tool to solve such problems. Interior point method is widely employed to solve the programs, which arise from stochastic programming. It is an iterative technique, so it is required a starting point. Well design starting point plays an important role in improving the convergence speed. In this paper, we propose a starting point for interior point method for multistage stochastic programming. Usually, the optimal solution of stage k+1 is used as starting point for the stage k. This point has the advantage of being close to the solution of the current program. However, it has a disadvantage; it is not in the feasible region of the current program. So, we suggest to take this point and modifying it. That is by adding to it a vector in the null space of the matrix of the unchanged constraints because the solution will change only in the null space of this matrix.

Keywords: interior point methods, stochastic programming, null space, starting points

Procedia PDF Downloads 418
1509 Evaluation of Essential Oils Toxicity on Resistant and Susceptible House Fly Strains

Authors: Xing Ping Hu, Yuexun Tian, Jerome Hogsette

Abstract:

Housefly, Musca domestica L., is a serious urban nuisance and public health/food safety concern. This study evaluated the topical toxicity of 17 essential oil components and 3 plant essential oils against permethrin-resistant adult females and insecticide-susceptible house fly strains. Results show that thymol had the lowest LD₅₀ values against permethrin-resistant strain (43.77 and 41.10 ug per fly) and permethrin-susceptible strain (35.19 and 29.16 ug per fly) at both 24- and 48-hours post treatments; (+)-Pulegone had the lowest LD₉₅ values against the permethrin-resistant strain (0.15 and 0.10 mg per fly) at 24- and 48-hours post treatments, whereas plant thyme oil had the lowest LD₉₅ value of 0.17 mg per fly at post-24h and post-48h against the permethrin-susceptible strain. Additionally, the LD₅₀s was slightly but not significantly negatively correlated with the boiling points of the compounds tested; but showed no correlation with the density and LogP. These results indicate that specific essential oils and compounds have topical insecticidal properties against house flies with low dose. They may have the potential for development as botanical insecticides.

Keywords: urban pest, public health, pest management, botanical chemical

Procedia PDF Downloads 386
1508 Between Riots and Protests: A Structural Approach to Urban Environmental Uprisings in China

Authors: Zi Zhu

Abstract:

The last decade has witnessed increasing urban environmental uprisings in China, as thousands of citizens swarmed into streets to express their deep concerns about the environmental threat and public health through various collective actions. The prevalent western approaches to collective actions, which usually treat urban riots and social movements as distinct phenomenon, have plagued an adequate analysis of the urban environmental uprisings in China. The increasing urban environmental contention can neither be categorized into riots nor social movements, as they carry the features of both: at first sight, they are spontaneous, disorganized and disruptive with an absence of observable mobilization process; however, unlike riots in the west, these collective actions conveyed explicit demand in a mostly non-destructive way rather than a pure expression of frustration. This article proposes a different approach to urban environmental uprisings in China which concerns the diminishing boundaries between riots and social movements and points to the underlying structural causes to the unique forms of urban environmental contention. Taking the urban anti-PX protests as examples, this article analyzes the societal and political structural environment faced by the Chinese environmental protesters and its influence on the origin and development of their contention.

Keywords: urban environmental uprisings, China, anti-PX protests, opportunity structure

Procedia PDF Downloads 289
1507 Bonding Strength of Adhesive Scarf Joints Improved by Nano-Silica Subjected to Humidity

Authors: B. Paygozar, S.A. Dizaji, A.C. Kandemir

Abstract:

In this study, the effects of the modified adhesive including different concentrations of Nano-silica are surveyed on the bonding strength of the adhesive scarf joints. The nanoparticles are added in two different concentrations, to an epoxy-based two-component structural adhesive, Araldite 2011, to survey the influences of the nanoparticle weight percentage on the failure load of the joints compared to that of the joints manufactured by the neat adhesive. The effects of being exposure to a moist ambience on the joint strength are also investigated for the joints produced of both neat and modified adhesives. For this purpose, an ageing process was carried out on the joints of both neat and improved kinds with variable immersion periods (20, 40 and 60 days). All the specimens were tested under a quasi-static tensile loading of 2 mm/min speed so as to find the quantities of the failure loads. Outcomes indicate that the failure loads of the joints with modified adhesives are measurably higher than that of the joint with neat adhesive, even while being put for a while under a moist condition. Another result points out that humidity lessens the bonding strength of all the joints of both types as the exposure time increases, which can be attributed to the change in the failure mode.

Keywords: bonding strength, humidity, nano-silica, scarf joint

Procedia PDF Downloads 174