Search results for: vision substitution systems
9234 An Enhanced SAR-Based Tsunami Detection System
Authors: Jean-Pierre Dubois, Jihad S. Daba, H. Karam, J. Abdallah
Abstract:
Tsunami early detection and warning systems have proved to be of ultimate importance, especially after the destructive tsunami that hit Japan in March 2012. Such systems are crucial to inform the authorities of any risk of a tsunami and of the degree of its danger in order to make the right decision and notify the public of the actions they need to take to save their lives. The purpose of this research is to enhance existing tsunami detection and warning systems. We first propose an automated and miniaturized model of an early tsunami detection and warning system. The model for the operation of a tsunami warning system is simulated using the data acquisition toolbox of Matlab and measurements acquired from specified internet pages due to the lack of the required real-life sensors, both seismic and hydrologic, and building a graphical user interface for the system. In the second phase of this work, we implement various satellite image filtering schemes to enhance the acquired synthetic aperture radar images of the tsunami affected region that are masked by speckle noise. This enables us to conduct a post-tsunami damage extent study and calculate the percentage damage. We conclude by proposing improvements to the existing telecommunication infrastructure of existing warning tsunami systems using a migration to IP-based networks and fiber optics links.Keywords: detection, GIS, GSN, GTS, GPS, speckle noise, synthetic aperture radar, tsunami, wiener filter
Procedia PDF Downloads 3929233 An Intrusion Detection Systems Based on K-Means, K-Medoids and Support Vector Clustering Using Ensemble
Authors: A. Mohammadpour, Ebrahim Najafi Kajabad, Ghazale Ipakchi
Abstract:
Presently, computer networks’ security rise in importance and many studies have also been conducted in this field. By the penetration of the internet networks in different fields, many things need to be done to provide a secure industrial and non-industrial network. Fire walls, appropriate Intrusion Detection Systems (IDS), encryption protocols for information sending and receiving, and use of authentication certificated are among things, which should be considered for system security. The aim of the present study is to use the outcome of several algorithms, which cause decline in IDS errors, in the way that improves system security and prevents additional overload to the system. Finally, regarding the obtained result we can also detect the amount and percentage of more sub attacks. By running the proposed system, which is based on the use of multi-algorithmic outcome and comparing that by the proposed single algorithmic methods, we observed a 78.64% result in attack detection that is improved by 3.14% than the proposed algorithms.Keywords: intrusion detection systems, clustering, k-means, k-medoids, SV clustering, ensemble
Procedia PDF Downloads 2219232 Plantation Forests Height Mapping Using Unmanned Aerial System
Authors: Shiming Li, Qingwang Liu, Honggan Wu, Jianbing Zhang
Abstract:
Plantation forests are useful for timber production, recreation, environmental protection and social development. Stands height is an important parameter for the estimation of forest volume and carbon stocks. Although lidar is suitable technology for the vertical parameters extraction of forests, but high costs make it not suitable for operational inventory. With the development of computer vision and photogrammetry, aerial photos from unmanned aerial system can be used as an alternative solution for height mapping. Structure-from-motion (SfM) photogrammetry technique can be used to extract DSM and DEM information. Canopy height model (CHM) can be achieved by subtraction DEM from DSM. Our result shows that overlapping aerial photos is a potential solution for plantation forests height mapping.Keywords: forest height mapping, plantation forests, structure-from-motion photogrammetry, UAS
Procedia PDF Downloads 2789231 Comparison of Acetylcholinesterase Reactivators Cytotoxicity with Their Structure
Authors: Lubica Muckova, Petr Jost, Jaroslav Pejchal, Daniel Jun
Abstract:
The development of acetylcholinesterase reactivators, i.e. antidotes against organophosphorus poisoning, is an important goal of defence research. The aim of this study was to compare cytotoxicity and chemical structure of 5 currently available (pralidoxime, trimedoxime, obidoxime, methoxime, and asoxime) and 4 newly developed compounds (K027, K074, K075, and K203). In oximes, there could be at least four important structural factors affecting their toxicity, including the number of oxime groups in the molecule, the position of oxime group(s) on pyridinium ring, the length of carbon linker, and the substitution by oxygen or insertion of the double bond into the connection chain. The cytotoxicity of tested substances was measured using colorimetric 3-(4,5-dimethylthiazol-2-yl)-2,5-diphenyl-tetrazolium bromide assay (MTT assay) in SH-SY5Y cell line. Toxicity was expressed as toxicological index IC₅₀. The tested compounds showed different cytotoxicity ranging from 1.5 to 27 mM. K027 was the least, and methoxime was the most toxic reactivator. The lowest toxicity was found in a monopyridinium reactivator and bispyridinium reactivators with simple 3C carbon linker. Shortening of connection chain length to 1C, incorporation of oxygen moiety into 3C compounds, elongation of carbon linker to 4C and insertion of a double bond into 4C substances increase AChE reactivators' cytotoxicity. Acknowledgements: This work was supported by a long-term organization development plan Medical Aspects of Weapons of Mass Destruction of the Faculty of Military Health Sciences, University of Defence.Keywords: acetylcholinesterase, cytotoxicity, organophosphorus poisoning, reactivators of acetylcholinesterase
Procedia PDF Downloads 3079230 Differences Choosing Closed Approach or Open Approach in Rhinoplasty Outcomes
Authors: Alessandro Marano
Abstract:
Aim: The author describes a strategy for choosing between two different rhinoplasty approaches for outcomes treatment. Methods: Series of the case study. There are advantages and disadvantages on both approaches for rhinoplasty. On the side of the open approach, we are be able to better manage the techniques for shaping and restoring nasal structures in rhinoplasty outcomes; on the other side, the closed approach requires more practice and experience to achieve good results. Results: Author’s choice is the closed approach on rhinoplasty outcomes. Anyway, the open approach is most commonly preferred due to superior management and better vision on nasal structures. Conclusions: Both approaches are valid for the treatment of rhinoplasty outcomes, author's preferred approach is closed, with minimally invasive modification focused on restoring outcomes in nasal function and aesthetics.Keywords: rhinoplasty, aesthetic, face, outcomes
Procedia PDF Downloads 1119229 Real Time Multi Person Action Recognition Using Pose Estimates
Authors: Aishrith Rao
Abstract:
Human activity recognition is an important aspect of video analytics, and many approaches have been recommended to enable action recognition. In this approach, the model is used to identify the action of the multiple people in the frame and classify them accordingly. A few approaches use RNNs and 3D CNNs, which are computationally expensive and cannot be trained with the small datasets which are currently available. Multi-person action recognition has been performed in order to understand the positions and action of people present in the video frame. The size of the video frame can be adjusted as a hyper-parameter depending on the hardware resources available. OpenPose has been used to calculate pose estimate using CNN to produce heap-maps, one of which provides skeleton features, which are basically joint features. The features are then extracted, and a classification algorithm can be applied to classify the action.Keywords: human activity recognition, computer vision, pose estimates, convolutional neural networks
Procedia PDF Downloads 1419228 A Deterministic Large Deviation Model Based on Complex N-Body Systems
Authors: David C. Ni
Abstract:
In the previous efforts, we constructed N-Body Systems by an extended Blaschke product (EBP), which represents a non-temporal and nonlinear extension of Lorentz transformation. In this construction, we rely only on two parameters, nonlinear degree, and relative momentum to characterize the systems. We further explored root computation via iteration with an algorithm extended from Jenkins-Traub method. The solution sets demonstrate a form of σ+ i [-t, t], where σ and t are the real numbers, and the [-t, t] shows various canonical distributions. In this paper, we correlate the convergent sets in the original domain with solution sets, which demonstrating large-deviation distributions in the codomain. We proceed to compare our approach with the formula or principles, such as Donsker-Varadhan and Wentzell-Freidlin theories. The deterministic model based on this construction allows us to explore applications in the areas of finance and statistical mechanics.Keywords: nonlinear Lorentz transformation, Blaschke equation, iteration solutions, root computation, large deviation distribution, deterministic model
Procedia PDF Downloads 3939227 Applications of AI, Machine Learning, and Deep Learning in Cyber Security
Authors: Hailyie Tekleselase
Abstract:
Deep learning is increasingly used as a building block of security systems. However, neural networks are hard to interpret and typically solid to the practitioner. This paper presents a detail survey of computing methods in cyber security, and analyzes the prospects of enhancing the cyber security capabilities by suggests that of accelerating the intelligence of the security systems. There are many AI-based applications used in industrial scenarios such as Internet of Things (IoT), smart grids, and edge computing. Machine learning technologies require a training process which introduces the protection problems in the training data and algorithms. We present machine learning techniques currently applied to the detection of intrusion, malware, and spam. Our conclusions are based on an extensive review of the literature as well as on experiments performed on real enterprise systems and network traffic. We conclude that problems can be solved successfully only when methods of artificial intelligence are being used besides human experts or operators.Keywords: artificial intelligence, machine learning, deep learning, cyber security, big data
Procedia PDF Downloads 1269226 Determining Design Parameters for Sizing of Hydronic Heating Systems in Concrete Thermally Activated Building Systems
Authors: Rahmat Ali, Inamullah Khan, Amjad Naseer, Abid A. Shah
Abstract:
Hydronic Heating and Cooling systems in concrete slab based buildings are increasingly becoming a popular substitute to conventional heating and cooling systems. In exploring the materials, techniques employed, and their relative performance measures, a fair bit of uncertainty exists. This research has identified the simplest method of determining the thermal field of a single hydronic pipe when acting as a part of a concrete slab, based on which the spacing and positioning of pipes for a best thermal performance and surface temperature control are determined. The pipe material chosen is the commonly used PEX pipe, which has an all-around performance and thermal characteristics with a thermal conductivity of 0.5W/mK. Concrete Test samples were constructed and their thermal fields tested under varying input conditions. Temperature sensing devices were embedded into the wet concrete at fixed distances from the pipe and other touch sensing temperature devices were employed for determining the extent of the thermal field and validation studies. In the first stage, it was found that the temperature along a specific distance was the same and that heat dissipation occurred in well-defined layers. The temperature obtained in concrete was then related to the different control parameters including water supply temperature. From the results, the temperature of water required for a specific temperature rise in concrete is determined. The thermally effective area is also determined which is then used to calculate the pipe spacing and positioning for the desired level of thermal comfort.Keywords: thermally activated building systems, concrete slab temperature, thermal field, energy efficiency, thermal comfort, pipe spacing
Procedia PDF Downloads 3379225 On-line Control of the Natural and Anthropogenic Safety in Krasnoyarsk Region
Authors: T. Penkova, A. Korobko, V. Nicheporchuk, L. Nozhenkova, A. Metus
Abstract:
This paper presents an approach of on-line control of the state of technosphere and environment objects based on the integration of Data Warehouse, OLAP and Expert systems technologies. It looks at the structure and content of data warehouse that provides consolidation and storage of monitoring data. There is a description of OLAP-models that provide a multidimensional analysis of monitoring data and dynamic analysis of principal parameters of controlled objects. The authors suggest some criteria of emergency risk assessment using expert knowledge about danger levels. It is demonstrated now some of the proposed solutions could be adopted in territorial decision making support systems. Operational control allows authorities to detect threat, prevent natural and anthropogenic emergencies and ensure a comprehensive safety of territory.Keywords: decision making support systems, emergency risk assessment, natural and anthropogenic safety, on-line control, territory
Procedia PDF Downloads 4069224 Analyzing the Shearing-Layer Concept Applied to Urban Green System
Authors: S. Pushkar, O. Verbitsky
Abstract:
Currently, green rating systems are mainly utilized for correctly sizing mechanical and electrical systems, which have short lifetime expectancies. In these systems, passive solar and bio-climatic architecture, which have long lifetime expectancies, are neglected. Urban rating systems consider buildings and services in addition to neighborhoods and public transportation as integral parts of the built environment. The main goal of this study was to develop a more consistent point allocation system for urban building standards by using six different lifetime shearing layers: Site, Structure, Skin, Services, Space, and Stuff, each reflecting distinct environmental damages. This shearing-layer concept was applied to internationally well-known rating systems: Leadership in Energy and Environmental Design (LEED) for Neighborhood Development, BRE Environmental Assessment Method (BREEAM) for Communities, and Comprehensive Assessment System for Building Environmental Efficiency (CASBEE) for Urban Development. The results showed that LEED for Neighborhood Development and BREEAM for Communities focused on long-lifetime-expectancy building designs, whereas CASBEE for Urban Development gave equal importance to the Building and Service Layers. Moreover, although this rating system was applied using a building-scale assessment, “Urban Area + Buildings” focuses on a short-lifetime-expectancy system design, neglecting to improve the architectural design by considering bio-climatic and passive solar aspects.Keywords: green rating system, urban community, sustainable design, standardization, shearing-layer concept, passive solar architecture
Procedia PDF Downloads 5799223 5iD Viewer: Observation of Fish School Behaviour in Labyrinths and Use of Semantic and Syntactic Entropy for School Structure Definition
Authors: Dalibor Štys, Kryštof M. Stys, Maryia Chkalova, Petr Kouba, Aliaxandr Pautsina, Dalibor Štys Jr., Jana Pečenková, Denis Durniev, Tomáš Náhlík, Petr Císař
Abstract:
In this article, a construction and some properties of the 5iD viewer, the system recording simultaneously five views of a given experimental object is reported. Properties of the system are demonstrated on the analysis of fish schooling behavior. It is demonstrated the method of instrument calibration which allows inclusion of image distortion and it is proposed and partly tested also the method of distance assessment in the case that only two opposite cameras are available. Finally, we demonstrate how the state trajectory of the behavior of the fish school may be constructed from the entropy of the system.Keywords: 3D positioning, school behavior, distance calibration, space vision, space distortion
Procedia PDF Downloads 3909222 Role of IT Systems in Corporate Recruitment: Challenges and Constraints
Authors: Brahim Bellali, Fatima Bellali
Abstract:
The integration of information technology systems (ITS) into a company's human resources processes seems to be the appropriate solution to the problem of evolving and adapting its human resources management practices in order to be both more strategic and more efficient in terms of costs and service quality. In this context, the aim of this work is to study the impact of information technology systems (ITS) on the recruitment process. In this study, we targeted candidates who had recruited using IT tools. The target population consists of 34 candidates based in Casablanca, Morocco. In order to collect the data, a questionnaire had to be drawn up. The survey is based on a data sheet and a questionnaire that is divided into several sections to make it more structured and comprehensible. The results show that the majority of respondents say that companies are making greater use of online CV libraries and social networks as digital solutions during the recruitment process. The results also show that 50% of candidates say that the use of digital tools by companies would not slow them down when applying for a job and that these IT tools improve manual recruitment processes, while 44.1% think that they facilitate recruitment without any human intervention. The majority of respondents (52.9%) think that social networks are the digital solutions most often used by recruiters in the sourcing phase. The constraints of digital recruitment encountered are the dehumanization of human resources (44.1%) and the limited interaction during remote interviews (44.1%), which leaves no room for informal exchanges. Digital recruitment can be a highly effective strategy for finding qualified candidates in a variety of fields. Here are a few recommendations for optimizing your digital recruitment process: (1) Use online recruitment platforms: LinkedIn, Twitter, and Facebook ; (2) Use applicant tracking systems (ATS) ; (3) Develop a content marketing strategy.Keywords: IT systems, recruitment, challenges, constraints
Procedia PDF Downloads 339221 A Combined High Gain-Higher Order Sliding Mode Controller for a Class of Uncertain Nonlinear Systems
Authors: Abderraouf Gaaloul, Faouzi Msahli
Abstract:
The use of standard sliding mode controller, usually, leads to the appearing of an undesirable chattering phenomenon affecting the control signal. Such problem can be overcome using a higher-order sliding mode controller (HOSMC) which preserves the main properties of the standard sliding mode and deliberately increases the control smoothness. In this paper, we propose a new HOSMC for a class of uncertain multi-input multi-output nonlinear systems. Based on high gain and integral sliding mode paradigms, the established control scheme removes theoretically the chattering phenomenon and provides the stability of the control system. Numerical simulations are developed to show the effectiveness of the proposed controller when applied to solve a control problem of two water levels into a quadruple-tank process.Keywords: nonlinear systems, sliding mode control, high gain, higher order
Procedia PDF Downloads 3279220 Acupuncture and Topiramat in Treatment of Migraine
Authors: Lazgeen Mohammed
Abstract:
The greatest advantage of acupuncture over western medicine is that it is safe . Unlike synthetic drugs, acupuncture has virtually no side effects, and the procedures for treating headaches are much less invasive. Migraine headaches are usually one-sided, pulsating or throbbing, and moderate or severe in intensity.. Some patients also experience auras, a neurological symptom that develops gradually over 5-20 minutes. The patient may see brief flashes or waves of light, or changes in their vision. Other common features of auras include vertigo, imbalance, confusion and numbness.Acupuncture had been used to treat 50 patients suffering from migraine ,topiramat (topamax) given to prevent the attacks, duration of treatment is 10 weeks , the patients were fallowed up for one year .Topiramat is called an anticonvulsant.Topiramat is also used to prevent migraine headaches in adults and teenagers who are at least 12 years old. This medicine will only prevent migraine headaches or reduce the number of attacks. It will not treat a headache that has already begun.Keywords: acpuncture, migraine, topiramat, headache
Procedia PDF Downloads 719219 Convertible Lease, Risky Debt and Financial Structure with Growth Option
Authors: Ons Triki, Fathi Abid
Abstract:
The basic objective of this paper is twofold. It resides in designing a model for a contingent convertible lease contract that can ensure the financial stability of a company and recover the losses of the parties to the lease in the event of default. It also aims to compare the convertible lease contract on inefficiencies resulting from the debt-overhang problem and asset substitution with other financing policies. From this perspective, this paper highlights the interaction between investments and financing policies in a dynamic model with existing assets and a growth option where the investment cost is financed by a contingent convertible lease and equity. We explore the impact of the contingent convertible lease on the capital structure. We also check the reliability and effectiveness of the use of the convertible lease contract as a means of financing. Findings show that the rental convertible contract with a sufficiently high conversion ratio has less severe inefficiencies arising from risk-shifting and debt overhang than those entailed by risky debt and pure-equity financing. The problem of underinvestment pointed out by Mauer and Ott (2000) and the problem of overinvestment mentioned by Hackbarth and Mauer (2012) may be reduced under contingent convertible lease financing. Our findings predict that the firm value under contingent convertible lease financing increases globally with asset volatility instead of decreasing with business risk. The study reveals that convertible leasing contracts can stand for a reliable solution to ensure the lessee and quickly recover the counterparties of the lease upon default.Keywords: contingent convertible lease, growth option, debt overhang, risk-shifting, capital structure
Procedia PDF Downloads 729218 Chaotic Behavior in Monetary Systems: Comparison among Different Types of Taylor Rule
Authors: Reza Moosavi Mohseni, Wenjun Zhang, Jiling Cao
Abstract:
The aim of the present study is to detect the chaotic behavior in monetary economic relevant dynamical system. The study employs three different forms of Taylor rules: current, forward, and backward looking. The result suggests the existence of the chaotic behavior in all three systems. In addition, the results strongly represent that using expectations especially rational expectation hypothesis can increase complexity of the system and leads to more chaotic behavior.Keywords: taylor rule, monetary system, chaos theory, lyapunov exponent, GMM estimator
Procedia PDF Downloads 5289217 Investigating the Formation of Nano-Hydroxyapatite on a Biocompatible and Antibacterial Cu/Mg-Substituted Bioglass
Authors: Elhamalsadat Ghaffari, Moghan Amirhosseinian, Amir Khaleghipour
Abstract:
Multifunctional bioactive glasses (BGs) are designed with a focus on the provision of bactericidal and biological properties desired for angiogenesis, osteogenesis, and ultimately potential applications in bone tissue engineering. To achieve these, six sol-gel copper/magnesium substituted derivatives of 58S-BG, i.e. a mol% series of 60SiO2-4P2O5-5CuO-(31-x) CaO/xMgO (where x=0, 1, 3, 5, 8, and 10), were synthesized. Afterwards, the effect of MgO/CaO substitution on the in vitro formation of nano-hydroxyapatite (HA), osteoblast-like cell responses and BGs antibacterial performance were studied. During the BGs synthesis, the elimination of nitrates was achieved at 700 °C that prevented the BGs crystallization and stabilized the obtained dried gels. The structural and morphological evaluations were performed with X-ray diffraction (XRD), Fourier transform infrared spectroscopy (FTIR), and scanning electron microscopy (SEM). These characterizations revealed that Cu-substituted 58S-BG consisting of 5 mol% MgO (BG-5/5) slightly had retarded the formation of HA. In addition, Cu-substituted 58S-BGs consisting 8 mol% and 10 mol% MgO (BG-5/8 and BG-5/10) displayed lower bioactivity probably due to the lower ion release rate of Ca–Si into the simulated body fluid (SBF). The determination of 3-(4, 5 dimethylthiazol-2-yl)-2, 5-diphenyltetrazolium bromide (MTT) and alkaline phosphate (ALP) activities proved that the highest values of both differentiation and proliferation of MC3T3-E1 cells can be obtained from a 5 mol% MgO substituted BG, while the over addition of MgO (8 mol% and 10 mol%) decreased the bioactivity. Furthermore, these novel Cu/Mg-substituted 58S-BGs displayed antibacterial effect against methicillin-resistant Staphylococcus aureus bacteria. Taken together, the results suggest the equally-substituted BG-5/5 (i.e. the one consists of 5 mol% of both CuO and MgO) as a promising candidate for bone tissue engineering, among all newly designed BGs in this work, owing to its desirable cell proliferation, ALP activity and antibacterial properties.Keywords: apatite, bioactivity, biomedical applications, sol-gel processes
Procedia PDF Downloads 1289216 Blindness and Deafness, the Outcomes of Varicella Zoster Virus Encephalitis in HIV Positive Patient
Authors: Hadiseh Hosamirudsari, Farhad Afsarikordehmahin, Pooria Sekhavatfar
Abstract:
Concomitant cortical blindness and deafness that follow varicella zoster virus (VZV) infection is rare. We describe a case of ophthalmic zoster that caused cortical blindness and deafness after central nervous system (CNS) involvement. A 42-year old, HIV infected woman has developed progressive blurry vision and deafness, 4 weeks after ophthalmic zoster. A physical examination and positive VZV polymerase chain reaction (PCR) of cerebrospinal fluid (CSF) suggested VZV encephalitis. Complication of VZV encephalitis is considered as the cause of blindness and deafness. In neurological deficit patient especially with a history of herpes zoster, VZV infection should be regarded as the responsible agent in inflammatory disorders of nervous system. The immunocompromised state of patient (including HIV) is as important an agent as VZV infection in developing the disease.Keywords: blindness, deafness, hiv, VZV encephalitis
Procedia PDF Downloads 3089215 The Impact of P108L Genetic Variant on Calcium Release and Malignant Hyperthermia Susceptibility
Authors: Mohammed Althobiti, Patrick Booms, Dorota Fiszer, Philip Hopkins
Abstract:
Malignant hyperthermia (MH) is a pharmacogenetic disorder of skeletal muscle. MH results from anaesthetics induced breakdown of calcium homeostasis. RYR1 and CACN1AS mutations represent the aetiology in ~70% of the MH population. Previous studies indicate that up to 25% of MH patients carry no variants in these genes. Therefore, the aim of this study is to investigate the relationships between MH susceptibility and genes encoding skeletal muscle Ca2+ channels as well as accessory proteins. The JSRP, encoding JP-45, was previously sequenced and novel genetic variants were identified. The variant p.P108L (c.323C > T) was identified in exon 4 and encodes a change from a proline at amino acid 108 to leucine residue. The variant P108L was detected in two patients out of 50 with 4% frequency in the sample population. The alignment of DNA sequences in different species indicates highly conserved proline sequences involved in the substitution of the P108L variant. In this study, the variant P108L co-segregates with the SNP p.V92A (c.275T > C) at the same exon, both variants being inherited in the same two patients only. This indicates that the two variants may represent a haplotype. Therefore, a set of single nucleotide polymorphisms and statistical analysis will be used to investigate the effects of haplotypes on MH susceptibility. Furthermore, investigating the effect of the P108L variant in combination with RYR1 mutations or other genetic variants in other genes as a combination of two or more genetic variants, haplotypes may then provide stronger genetic evidence indicating that JSRP1 is associated with MH susceptibility. In conclusion, these preliminary results lend a potential modifier role of the variant P108L in JSRP1 in MH susceptibility and further investigations are suggested to confirm these results.Keywords: JSRP1, malignant hyperthermia, RyR1, skeletal muscle
Procedia PDF Downloads 3359214 UniFi: Universal Filter Model for Image Enhancement
Authors: Aleksei Samarin, Artyom Nazarenko, Valentin Malykh
Abstract:
Image enhancement is becoming more and more popular, especially on mobile devices. Nowadays, it is a common approach to enhance an image using a convolutional neural network (CNN). Such a network should be of significant size; otherwise, a possibility for the artifacts to occur is overgrowing. The existing large CNNs are computationally expensive, which could be crucial for mobile devices. Another important flaw of such models is they are poorly interpretable. There is another approach to image enhancement, namely, the usage of predefined filters in combination with the prediction of their applicability. We present an approach following this paradigm, which outperforms both existing CNN-based and filter-based approaches in the image enhancement task. It is easily adaptable for mobile devices since it has only 47 thousand parameters. It shows the best SSIM 0.919 on RANDOM250 (MIT Adobe FiveK) among small models and is thrice faster than previous models.Keywords: universal filter, image enhancement, neural networks, computer vision
Procedia PDF Downloads 1019213 Hardware Error Analysis and Severity Characterization in Linux-Based Server Systems
Authors: Nikolaos Georgoulopoulos, Alkis Hatzopoulos, Konstantinos Karamitsios, Konstantinos Kotrotsios, Alexandros I. Metsai
Abstract:
In modern server systems, business critical applications run in different types of infrastructure, such as cloud systems, physical machines and virtualization. Often, due to high load and over time, various hardware faults occur in servers that translate to errors, resulting to malfunction or even server breakdown. CPU, RAM and hard drive (HDD) are the hardware parts that concern server administrators the most regarding errors. In this work, selected RAM, HDD and CPU errors, that have been observed or can be simulated in kernel ring buffer log files from two groups of Linux servers, are investigated. Moreover, a severity characterization is given for each error type. Better understanding of such errors can lead to more efficient analysis of kernel logs that are usually exploited for fault diagnosis and prediction. In addition, this work summarizes ways of simulating hardware errors in RAM and HDD, in order to test the error detection and correction mechanisms of a Linux server.Keywords: hardware errors, Kernel logs, Linux servers, RAM, hard disk, CPU
Procedia PDF Downloads 1549212 Teachers' Technological Pedagogical and Content Knowledge and Technology Integration in Teaching and Learning in a Small Island Developing State: A Concept Paper
Authors: Aminath Waseela, Vinesh Chandra, Shaun Nykvist,
Abstract:
The success of technology integration initiatives hinges on the knowledge and skills of teachers to effectively integrate technology in classroom teaching. Consequently, gaining an understanding of teachers' technology knowledge and its integration can provide useful insights on strategies that can be adopted to enhance teaching and learning, especially in developing country contexts where research is scant. This paper extends existing knowledge on teachers' use of technology by developing a conceptual framework that recognises how three key types of knowledge; content, pedagogy, technology, and their integration are at the crux of teachers' technology use while at the same time is amenable to empirical studies. Although the aforementioned knowledge is important for effective use of technology that can result in enhanced student engagement, literature on how this knowledge leads to effective technology use and enhanced student engagement is limited. Thus, this theoretical paper proposes a framework to explore teachers' knowledge through the lens of the Technological Pedagogical and Content Knowledge (TPACK); the integration of technology in classroom teaching through the Substitution Augmentation Modification and Redefinition (SAMR) model and how this affects students' learning through the Bloom's Digital Taxonomy (BDT) lens. Studies using this framework could inform the design of professional development to support teachers to develop skills for effective use of available technology that can enhance student learning engagement.Keywords: information and communication technology, ICT, in-service training, small island developing states, SIDS, student engagement, technology integration, technology professional development training, technological pedagogical and content knowledge, TPACK
Procedia PDF Downloads 1479211 Merging of Results in Distributed Information Retrieval Systems
Authors: Larbi Guezouli, Imane Azzouz
Abstract:
This work is located in the domain of distributed information retrieval ‘DIR’. A simplified view of the DIR requires a multi-search in a set of collections, which forces the system to analyze results found in these collections, and merge results back before sending them to the user in a single list. Our work is to find a fusion method based on the relevance score of each result received from collections and the relevance of the local search engine of each collection.Keywords: information retrieval, distributed IR systems, merging results, datamining
Procedia PDF Downloads 3369210 Adaptive Optimal Controller for Uncertain Inverted Pendulum System: A Dynamic Programming Approach for Continuous Time System
Authors: Dao Phuong Nam, Tran Van Tuyen, Do Trong Tan, Bui Minh Dinh, Nguyen Van Huong
Abstract:
In this paper, we investigate the adaptive optimal control law for continuous-time systems with input disturbances and unknown parameters. This paper extends previous works to obtain the robust control law of uncertain systems. Through theoretical analysis, an adaptive dynamic programming (ADP) based optimal control is proposed to stabilize the closed-loop system and ensure the convergence properties of proposed iterative algorithm. Moreover, the global asymptotic stability (GAS) for closed system is also analyzed. The theoretical analysis for continuous-time systems and simulation results demonstrate the performance of the proposed algorithm for an inverted pendulum system.Keywords: approximate/adaptive dynamic programming, ADP, adaptive optimal control law, input state stability, ISS, inverted pendulum
Procedia PDF Downloads 1949209 Impact of Information Technology Systems on the Recruitment Process in Morocco
Authors: Brahim Bellali, Fatima Bellali
Abstract:
The integration of information technology systems (ITS) into a company's ‘human resources processes seems to be the appropriate solution to the problem of evolving and adapting its human resources management practices in order to be both more strategic and more efficient in terms of costs and service quality. In this context, the aim of this work is to study the impact of information technology systems (ITS) on the recruitment process. In this study, we targeted candidates who had recruited using IT tools. The target population consists of 34 candidates based in Casablanca, Morocco. In order to collect the data, a questionnaire had to be drawn up. The survey is based on a data sheet and a questionnaire that is divided into several sections to make it more structured and comprehensible. The results show that the majority of respondents say that companies are making greater use of online CV libraries and social networks as digital solutions during the recruitment process. The results also show that 50% of candidates say that the use of digital tools by companies would not slow them down when applying for a job and that these IT tools improve manual recruitment processes, while 44.1% think that they facilitate recruitment without any human intervention. The majority of respondents (52.9%) think that social networks are the digital solutions most often used by recruiters in the sourcing phase. The constraints of digital recruitment encountered are the dehumanization of human resources (44.1%) and the limited interaction during remote interviews (44.1%), which leaves no room for informal exchanges. Digital recruitment can be a highly effective strategy for finding qualified candidates in a variety of fields. Here are a few recommendations for optimizing your digital recruitment process: (1) Use online recruitment platforms: LinkedIn, Twitter, and Facebook ; (2) Use applicant tracking systems (ATS) ; (3) Develop a content marketing strategy.Keywords: IT systems, recruitment, challenges, constraints
Procedia PDF Downloads 99208 Economic Approaches to Obtaining and Maintaining Quality, Sterile Drinking Water from Natural Waters Through the Use of Nanotechnological Membrane Systems
Authors: George Bibileishvili, Manana Mamulashvili, Zaza Javashvili, Liana Ebanoidze
Abstract:
Economic Approaches to Obtaining and Maintaining Quality, Sterile Drinking Water from Natural Waters Through the Use of Nanotechnological Membrane SystemsKeywords: membrane, filter, ultrafiltration, water
Procedia PDF Downloads 759207 Impact of Information Technology Systems on the Recruitment Process in Morocco
Authors: Bellali Brahim, Bellali Fatima
Abstract:
The integration of information technology systems (ITS) into a company's ‘human resources processes seems to be the appropriate solution to the problem of evolving and adapting its human resources management practices in order to be both more strategic and more efficient in terms of costs and service quality. In this context, the aim of this work is to study the impact of nformation technology systems (ITS) on the recruitment process. In this study, we targeted candidates who had recruited using IT tools. The target population consists of 34 candidates based in Casablanca, Morocco. In order to collect the data, a questionnaire had to be drawn up. The survey is based on a data sheet and a questionnaire that is divided into several sections to make it more structured and comprehensible. The results show that the majority of respondents say that companies are making greater use of online CV libraries and social networks as digital solutions during the recruitment process. The results also show that 50% of candidates say that the use of digital tools by companies would not slow them down when applying for a job and that these IT tools improve manual recruitment processes, while 44.1% think that they facilitate recruitment without any human intervention. The majority of respondents (52.9%) think that social networks are the digital solutions most often used by recruiters in the sourcing phase. The constraints of digital recruitment encountered are the dehumanization of human resources (44.1%) and the limited interaction during remote interviews (44.1%), which leaves no room for informal exchanges. Digital recruitment can be a highly effective strategy for finding qualified candidates in a variety of fields. Here are a few recommendations for optimizing your digital recruitment process: (1) Use online recruitment platforms: LinkedIn, Twitter, and Facebook ; (2) Use applicant tracking systems (ATS) ; (3) Develop a content marketing strategy.Keywords: IT systems, recruitment, challenges, constraints
Procedia PDF Downloads 269206 Hypergraph for System of Systems modeling
Authors: Haffaf Hafid
Abstract:
Hypergraphs, after being used to model the structural organization of System of Sytems (SoS) at macroscopic level, has recent trends towards generalizing this powerful representation at different stages of complex system modelling. In this paper, we first describe different applications of hypergraph theory, and step by step, introduce multilevel modeling of SoS by means of integrating Constraint Programming Langages (CSP) dealing with engineering system reconfiguration strategy. As an application, we give an A.C.T Terminal controlled by a set of Intelligent Automated Vehicle.Keywords: hypergraph model, structural analysis, bipartite graph, monitoring, system of systems, reconfiguration analysis, hypernetwork
Procedia PDF Downloads 4889205 Ultra-Reliable Low Latency V2X Communication for Express Way Using Multiuser Scheduling Algorithm
Authors: Vaishali D. Khairnar
Abstract:
The main aim is to provide lower-latency and highly reliable communication facilities for vehicles in the automobile industry; vehicle-to-everything (V2X) communication basically intends to increase expressway road security and its effectiveness. The Ultra-Reliable Low-Latency Communications (URLLC) algorithm and cellular networks are applied in combination with Mobile Broadband (MBB). This is particularly used in express way safety-based driving applications. Expressway vehicle drivers (humans) will communicate in V2X systems using the sixth-generation (6G) communication systems which have very high-speed mobility features. As a result, we need to determine how to ensure reliable and consistent wireless communication links and improve the quality to increase channel gain, which is becoming a challenge that needs to be addressed. To overcome this challenge, we proposed a unique multi-user scheduling algorithm for ultra-massive multiple-input multiple-output (MIMO) systems using 6G. In wideband wireless network access in case of high traffic and also in medium traffic conditions, moreover offering quality-of-service (QoS) to distinct service groups with synchronized contemporaneous traffic on the highway like the Mumbai-Pune expressway becomes a critical problem. Opportunist MAC (OMAC) is a way of proposing communication across a wireless communication link that can change in space and time and might overcome the above-mentioned challenge. Therefore, a multi-user scheduling algorithm is proposed for MIMO systems using a cross-layered MAC protocol to achieve URLLC and high reliability in V2X communication.Keywords: ultra-reliable low latency communications, vehicle-to-everything communication, multiple-input multiple-output systems, multi-user scheduling algorithm
Procedia PDF Downloads 88