Search results for: social network tools
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 16533

Search results for: social network tools

15033 The Application of AI in Developing Assistive Technologies for Non-Verbal Individuals with Autism

Authors: Ferah Tesfaye Admasu

Abstract:

Autism Spectrum Disorder (ASD) often presents significant communication challenges, particularly for non-verbal individuals who struggle to express their needs and emotions effectively. Assistive technologies (AT) have emerged as vital tools in enhancing communication abilities for this population. Recent advancements in artificial intelligence (AI) hold the potential to revolutionize the design and functionality of these technologies. This study explores the application of AI in developing intelligent, adaptive, and user-centered assistive technologies for non-verbal individuals with autism. Through a review of current AI-driven tools, including speech-generating devices, predictive text systems, and emotion-recognition software, this research investigates how AI can bridge communication gaps, improve engagement, and support independence. Machine learning algorithms, natural language processing (NLP), and facial recognition technologies are examined as core components in creating more personalized and responsive communication aids. The study also discusses the challenges and ethical considerations involved in deploying AI-based AT, such as data privacy and the risk of over-reliance on technology. Findings suggest that integrating AI into assistive technologies can significantly enhance the quality of life for non-verbal individuals with autism, providing them with greater opportunities for social interaction and participation in daily activities. However, continued research and development are needed to ensure these technologies are accessible, affordable, and culturally sensitive.

Keywords: artificial intelligence, autism spectrum disorder, non-verbal communication, assistive technology, machine learning

Procedia PDF Downloads 7
15032 Impact of Corporate Social Responsibility on the Organisational Performance

Authors: Jagbir Singh Kadyan, C. A. Suman Kadyan

Abstract:

The researchers attempts to establish whether a relationship exists between the social activities undertaken & the funds that has been spent by the selected corporate organisations. Corporate listed on the (NSE) National Stock Exchange of India, under different categories shall be selected as a sample for the purpose of this study. The researches shall also study the dynamics of corporate social responsibility funding, financing & management of corporate social responsibility funds by the above selected organisations in the Indian context. The rationale behind selecting & undertaking specific corporate social responsibility activities shall be analysed & interpreted to discover the real drivers of corporate social responsibility. Besides above, an attempt shall further make an effort to understand & analyse the nature of impact on the selected corporate organisations on its overall performances due to the activities undertaken under their specific corporate social responsibility programs.

Keywords: corporate social responsibility, organisational performance, national stock exchange, sustainability, society, health, education, sanitation, environment

Procedia PDF Downloads 592
15031 Predicting Shot Making in Basketball Learnt Fromadversarial Multiagent Trajectories

Authors: Mark Harmon, Abdolghani Ebrahimi, Patrick Lucey, Diego Klabjan

Abstract:

In this paper, we predict the likelihood of a player making a shot in basketball from multiagent trajectories. Previous approaches to similar problems center on hand-crafting features to capture domain-specific knowledge. Although intuitive, recent work in deep learning has shown, this approach is prone to missing important predictive features. To circumvent this issue, we present a convolutional neural network (CNN) approach where we initially represent the multiagent behavior as an image. To encode the adversarial nature of basketball, we use a multichannel image which we then feed into a CNN. Additionally, to capture the temporal aspect of the trajectories, we use “fading.” We find that this approach is superior to a traditional FFN model. By using gradient ascent, we were able to discover what the CNN filters look for during training. Last, we find that a combined FFN+CNN is the best performing network with an error rate of 39%.

Keywords: basketball, computer vision, image processing, convolutional neural network

Procedia PDF Downloads 151
15030 ISIS and Social Media

Authors: Neda Jebellie

Abstract:

New information and communication technologies (ICT) not only has revolutionized the world of communication but has also strongly impacted the state of international terrorism. Using the potential of social media, the new wave of terrorism easily can recruit new jihadi members, spread their violent ideology and garner financial support. IS (Islamic State) as the most dangerous terrorist group has already conquered a great deal of social media space and has deployed sophisticated web-based strategies to promote its extremist doctrine. In this respect the vastly popular social media are the perfect tools for IS to establish its virtual Caliphate (e-caliphate) and e-Ommah (e-citizen).Using social media to release violent videos of beheading journalists, burning their hostages alive and mass killing of prisoners are IS strategies to terrorize and subjugate its enemies. Several Twitter and Facebook accounts which are IS affiliations have targeted young generation of Muslims all around the world. In fact IS terrorists use modern resources of communication not only to share information and conduct operations but also justify their violent acts. The strict Wahhabi doctrine of ISIS is based on a fundamental interpretation of Islam in which religious war against non Muslims (Jihad) and killing infidels (Qatal) have been praised and recommended. Via social media IS disseminates its propaganda to inspire sympathizers across the globe. Combating this new wave of terrorism which is exploiting new communication technologies is the most significant challenge for authorities. Before the rise of internet and social media governments had to control only mosques and religious gathering such as Friday sermons(Jamaah Pray) to prevent spreading extremism among Muslims community in their country. ICT and new communication technologies have heighten the challenge of dealing with Islamic radicalism and have amplified its threat .According to the official reports even some of the governments such as UK have created a special force of Facebook warriors to engage in unconventional warfare in digital age. In compare with other terrorist groups, IS has effectively grasped social media potential. Their horrifying released videos on YouTube easily got viral and were re-twitted and shared by thousands of social media users. While some of the social media such as Twitter and Facebook have shut down many accounts alleged to IS but new ones create immediately so only blocking their websites and suspending their accounts cannot solve the problem as terrorists recreate new accounts. To combat cyber terrorism focusing on disseminating counter narrative strategies can be a solution. Creating websites and providing online materials to propagate peaceful and moderate interpretation of Islam can provide a cogent alternative to extremist views.

Keywords: IS-islamic state, cyber terrorism, social media, terrorism, information, communication technologies

Procedia PDF Downloads 486
15029 Advances in Fiber Optic Technology for High-Speed Data Transmission

Authors: Salim Yusif

Abstract:

Fiber optic technology has revolutionized telecommunications and data transmission, providing unmatched speed, bandwidth, and reliability. This paper presents the latest advancements in fiber optic technology, focusing on innovations in fiber materials, transmission techniques, and network architectures that enhance the performance of high-speed data transmission systems. Key advancements include the development of ultra-low-loss optical fibers, multi-core fibers, advanced modulation formats, and the integration of fiber optics into next-generation network architectures such as Software-Defined Networking (SDN) and Network Function Virtualization (NFV). Additionally, recent developments in fiber optic sensors are discussed, extending the utility of optical fibers beyond data transmission. Through comprehensive analysis and experimental validation, this research offers valuable insights into the future directions of fiber optic technology, highlighting its potential to drive innovation across various industries.

Keywords: fiber optics, high-speed data transmission, ultra-low-loss optical fibers, multi-core fibers, modulation formats, coherent detection, software-defined networking, network function virtualization, fiber optic sensors

Procedia PDF Downloads 55
15028 Data-Driven Simulations Tools for Der and Battery Rich Power Grids

Authors: Ali Moradiamani, Samaneh Sadat Sajjadi, Mahdi Jalili

Abstract:

Power system analysis has been a major research topic in the generation and distribution sections, in both industry and academia, for a long time. Several load flow and fault analysis scenarios have been normally performed to study the performance of different parts of the grid in the context of, for example, voltage and frequency control. Software tools, such as PSCAD, PSSE, and PowerFactory DIgSILENT, have been developed to perform these analyses accurately. Distribution grid had been the passive part of the grid and had been known as the grid of consumers. However, a significant paradigm shift has happened with the emergence of Distributed Energy Resources (DERs) in the distribution level. It means that the concept of power system analysis needs to be extended to the distribution grid, especially considering self sufficient technologies such as microgrids. Compared to the generation and transmission levels, the distribution level includes significantly more generation/consumption nodes thanks to PV rooftop solar generation and battery energy storage systems. In addition, different consumption profile is expected from household residents resulting in a diverse set of scenarios. Emergence of electric vehicles will absolutely make the environment more complicated considering their charging (and possibly discharging) requirements. These complexities, as well as the large size of distribution grids, create challenges for the available power system analysis software. In this paper, we study the requirements of simulation tools in the distribution grid and how data-driven algorithms are required to increase the accuracy of the simulation results.

Keywords: smart grids, distributed energy resources, electric vehicles, battery storage systsms, simulation tools

Procedia PDF Downloads 100
15027 Education for Social Justice: University Teachers’ Conceptions and Practice: A Comparative Study

Authors: Digby Warren, Jiri Kropac

Abstract:

While aspirations of social justice are often articulated by universities as a “feel good” mantra, what is meant by education for social justice deserves deeper consideration. Based on in-depth interviews with academics (voluntary participants in this research) in different disciplines and institutions in the UK, Czech Republic, and other EU countries, this comparative study presents thematic findings regarding lecturers’ conceptions of education for social justice -what it is, why it is important, why they are personally committed to it, how it connects with their own values- and their practice of it- how it is implemented through curriculum content, teaching and learning activities, and assessment tasks. It concludes by presenting an analysis of the challenges, constraints, and enabling factors in practising social justice education in different subject, institutional and national contexts.

Keywords: higher education, social justice, inclusivity, diversity

Procedia PDF Downloads 121
15026 Prediction of Saturated Hydraulic Conductivity Dynamics in an Iowan Agriculture Watershed

Authors: Mohamed Elhakeem, A. N. Thanos Papanicolaou, Christopher Wilson, Yi-Jia Chang

Abstract:

In this study, a physically-based, modelling framework was developed to predict saturated hydraulic conductivity (KSAT) dynamics in the Clear Creek Watershed (CCW), Iowa. The modelling framework integrated selected pedotransfer functions and watershed models with geospatial tools. A number of pedotransfer functions and agricultural watershed models were examined to select the appropriate models that represent the study site conditions. Models selection was based on statistical measures of the models’ errors compared to the KSAT field measurements conducted in the CCW under different soil, climate and land use conditions. The study has shown that the predictions of the combined pedotransfer function of Rosetta and the Water Erosion Prediction Project (WEPP) provided the best agreement to the measured KSAT values in the CCW compared to the other tested models. Therefore, Rosetta and WEPP were integrated with the Geographic Information System (GIS) tools for visualization of the data in forms of geospatial maps and prediction of KSAT variability in CCW due to the seasonal changes in climate and land use activities.

Keywords: saturated hydraulic conductivity, pedotransfer functions, watershed models, geospatial tools

Procedia PDF Downloads 257
15025 The Impact of Corporate Social Responsibility Information Disclosure on the Accuracy of Analysts' Earnings Forecasts

Authors: Xin-Hua Zhao

Abstract:

In recent years, the growth rate of social responsibility reports disclosed by Chinese corporations has grown rapidly. The economic effects of the growing corporate social responsibility reports have become a hot topic. The article takes the chemical listed engineering corporations that disclose social responsibility reports in China as a sample, and based on the information asymmetry theory, examines the economic effect generated by corporate social responsibility disclosure with the method of ordinary least squares. The research is conducted from the perspective of analysts’ earnings forecasts and studies the impact of corporate social responsibility information disclosure on improving the accuracy of analysts' earnings forecasts. The results show that there is a statistically significant negative correlation between corporate social responsibility disclosure index and analysts’ earnings forecast error. The conclusions confirm that enterprises can reduce the asymmetry of social and environmental information by disclosing social responsibility reports, and thus improve the accuracy of analysts’ earnings forecasts. It can promote the effective allocation of resources in the market.

Keywords: analysts' earnings forecasts, corporate social responsibility disclosure, economic effect, information asymmetry

Procedia PDF Downloads 154
15024 The Study of Security Techniques on Information System for Decision Making

Authors: Tejinder Singh

Abstract:

Information system is the flow of data from different levels to different directions for decision making and data operations in information system (IS). Data can be violated by different manner like manual or technical errors, data tampering or loss of integrity. Security system called firewall of IS is effected by such type of violations. The flow of data among various levels of Information System is done by networking system. The flow of data on network is in form of packets or frames. To protect these packets from unauthorized access, virus attacks, and to maintain the integrity level, network security is an important factor. To protect the data to get pirated, various security techniques are used. This paper represents the various security techniques and signifies different harmful attacks with the help of detailed data analysis. This paper will be beneficial for the organizations to make the system more secure, effective, and beneficial for future decisions making.

Keywords: information systems, data integrity, TCP/IP network, vulnerability, decision, data

Procedia PDF Downloads 303
15023 A Systematic Review on Challenges in Big Data Environment

Authors: Rimmy Yadav, Anmol Preet Kaur

Abstract:

Big Data has demonstrated the vast potential in streamlining, deciding, spotting business drifts in different fields, for example, producing, fund, Information Technology. This paper gives a multi-disciplinary diagram of the research issues in enormous information and its procedures, instruments, and system identified with the privacy, data storage management, network and energy utilization, adaptation to non-critical failure and information representations. Other than this, result difficulties and openings accessible in this Big Data platform have made.

Keywords: big data, privacy, data management, network and energy consumption

Procedia PDF Downloads 307
15022 Multi-Objectives Genetic Algorithm for Optimizing Machining Process Parameters

Authors: Dylan Santos De Pinho, Nabil Ouerhani

Abstract:

Energy consumption of machine-tools is becoming critical for machine-tool builders and end-users because of economic, ecological and legislation-related reasons. Many machine-tool builders are seeking for solutions that allow the reduction of energy consumption of machine-tools while preserving the same productivity rate and the same quality of machined parts. In this paper, we present the first results of a project conducted jointly by academic and industrial partners to reduce the energy consumption of a Swiss-Type lathe. We employ genetic algorithms to find optimal machining parameters – the set of parameters that lead to the best trade-off between energy consumption, part quality and tool lifetime. Three main machining process parameters are considered in our optimization technique, namely depth of cut, spindle rotation speed and material feed rate. These machining process parameters have been identified as the most influential ones in the configuration of the Swiss-type machining process. A state-of-the-art multi-objective genetic algorithm has been used. The algorithm combines three fitness functions, which are objective functions that permit to evaluate a set of parameters against the three objectives: energy consumption, quality of the machined parts, and tool lifetime. In this paper, we focus on the investigation of the fitness function related to energy consumption. Four different energy consumption related fitness functions have been investigated and compared. The first fitness function refers to the Kienzle cutting force model. The second fitness function uses the Material Removal Rate (RMM) as an indicator of energy consumption. The two other fitness functions are non-deterministic, learning-based functions. One fitness function uses a simple Neural Network to learn the relation between the process parameters and the energy consumption from experimental data. Another fitness function uses Lasso regression to determine the same relation. The goal is, then, to find out which fitness functions predict best the energy consumption of a Swiss-Type machining process for the given set of machining process parameters. Once determined, these functions may be used for optimization purposes – determine the optimal machining process parameters leading to minimum energy consumption. The performance of the four fitness functions has been evaluated. The Tornos DT13 Swiss-Type Lathe has been used to carry out the experiments. A mechanical part including various Swiss-Type machining operations has been selected for the experiments. The evaluation process starts with generating a set of CNC (Computer Numerical Control) programs for machining the part at hand. Each CNC program considers a different set of machining process parameters. During the machining process, the power consumption of the spindle is measured. All collected data are assigned to the appropriate CNC program and thus to the set of machining process parameters. The evaluation approach consists in calculating the correlation between the normalized measured power consumption and the normalized power consumption prediction for each of the four fitness functions. The evaluation shows that the Lasso and Neural Network fitness functions have the highest correlation coefficient with 97%. The fitness function “Material Removal Rate” (MRR) has a correlation coefficient of 90%, whereas the Kienzle-based fitness function has a correlation coefficient of 80%.

Keywords: adaptive machining, genetic algorithms, smart manufacturing, parameters optimization

Procedia PDF Downloads 143
15021 Perception of Violence through the Drawing: A Research with Mexican University Students

Authors: Yessica Martinez Soto, Cesar E. Jimenez Yanez, Margarita Barak Velasquez, Yaralin Aceves Villanueva

Abstract:

The presence of violent behavior in society is growing rapidly, which causes people to live in an environment of constant tension due to fear of becoming victims of violent acts. It is up to social scientists to be able to carry out analyzes in this regard to identify the different ways in which violence is normalized among people. The interest of this research work focuses on investigating the perception of violence in Mexican University students through the technique of drawing. To carry out this research, we worked with 67 university students from the Autonomous University of Baja California in Mexico, who drew an image of how they understood the concept of violence. His works showed us a variety of emotions, actions, and elements that relate and link with violence. One of the methodological tools to recognize and establish the link between the knowledge of a concept between discourse and practice is through graphic representations, that is, drawings. Although the drawing gives us a personal interpretation of the reality of each artist, the repetition of elements and the representation of similar situations allowed us to identify the degrees of incidence of the different types of violence and the areas in which it manifests itself.

Keywords: college students, Mexico, social representations, violence

Procedia PDF Downloads 228
15020 Using Probabilistic Neural Network (PNN) for Extracting Acoustic Microwaves (Bulk Acoustic Waves) in Piezoelectric Material

Authors: Hafdaoui Hichem, Mehadjebia Cherifa, Benatia Djamel

Abstract:

In this paper, we propose a new method for Bulk detection of an acoustic microwave signal during the propagation of acoustic microwaves in a piezoelectric substrate (Lithium Niobate LiNbO3). We have used the classification by probabilistic neural network (PNN) as a means of numerical analysis in which we classify all the values of the real part and the imaginary part of the coefficient attenuation with the acoustic velocity in order to build a model from which we note the Bulk waves easily. These singularities inform us of presence of Bulk waves in piezoelectric materials. By which we obtain accurate values for each of the coefficient attenuation and acoustic velocity for Bulk waves. This study will be very interesting in modeling and realization of acoustic microwaves devices (ultrasound) based on the propagation of acoustic microwaves.

Keywords: piezoelectric material, probabilistic neural network (PNN), classification, acoustic microwaves, bulk waves, the attenuation coefficient

Procedia PDF Downloads 427
15019 The Impact of Socioeconomic Status on Citizens’ Perceptions of Social Justice in China

Authors: Yan Liu

Abstract:

The Gini coefficient indicates that the inequality of income distribution is rising in China. How individuals viewing the equality of current society is an important predicator of social turbulence. Perceptions of social justice may vary according to the social stratification. People usually use socioeconomic status to identify divisions between social stratifications. The objective of this study is to explore the potential influence of socioeconomic status on citizens’ perceptions of social justice in China. Socioeconomic status (SES) is usually reflected by either an SES indicator or a composite of three core dimensions: education, income and occupation. With data collected in the 2010 Chinese General Social Survey (CGSS), this study uses OLS regression analyses to examine the relationship between socioeconomic status (SES) and citizens’ perceptions of social justice. This study finds that most Chinese citizens believe that the current society is fair or more than fair. Socioeconomic status (SES) has a positive impact on citizens’ perceptions of social justice, which means individuals with higher indicator of socioeconomic status prefer to believe current society is fair. However, the three core dimensions which are used to measure socioeconomic status (SES) have different influences on perceptions of social justice: First, income helps enhance citizens’ sense of social justice. Second, education weakens citizens’ sense of social justice. Third, compared to the middle occupational status, people of both higher occupational status and lower occupational status have higher levels of perceptions of social justice. Though education creates a negative influence on perceptions of social justice, its effect is much weaker than that of income, which indicates income is a determining factor for enhancing people’s perceptions of social justice in China’s market society. Policy implications are discussed.

Keywords: education, income, occupation, perceptions of social justice, social stratification, socioeconomic status

Procedia PDF Downloads 306
15018 Phishing Detection: Comparison between Uniform Resource Locator and Content-Based Detection

Authors: Nuur Ezaini Akmar Ismail, Norbazilah Rahim, Norul Huda Md Rasdi, Maslina Daud

Abstract:

A web application is the most targeted by the attacker because the web application is accessible by the end users. It has become more advantageous to the attacker since not all the end users aware of what kind of sensitive data already leaked by them through the Internet especially via social network in shake on ‘sharing’. The attacker can use this information such as personal details, a favourite of artists, a favourite of actors or actress, music, politics, and medical records to customize phishing attack thus trick the user to click on malware-laced attachments. The Phishing attack is one of the most popular attacks for social engineering technique against web applications. There are several methods to detect phishing websites such as Blacklist/Whitelist based detection, heuristic-based, and visual similarity-based detection. This paper illustrated a comparison between the heuristic-based technique using features of a uniform resource locator (URL) and visual similarity-based detection techniques that compares the content of a suspected phishing page with the legitimate one in order to detect new phishing sites based on the paper reviewed from the past few years. The comparison focuses on three indicators which are false positive and negative, accuracy of the method, and time consumed to detect phishing website.

Keywords: heuristic-based technique, phishing detection, social engineering and visual similarity-based technique

Procedia PDF Downloads 171
15017 Performance Evaluation of Routing Protocols for Video Conference over MPLS VPN Network

Authors: Abdullah Al Mamun, Tarek R. Sheltami

Abstract:

Video conferencing is a highly demanding facility now a days in order to its real time characteristics, but faster communication is the prior requirement of this technology. Multi Protocol Label Switching (MPLS) IP Virtual Private Network (VPN) address this problem and it is able to make a communication faster than others techniques. However, this paper studies the performance comparison of video traffic between two routing protocols namely the Enhanced Interior Gateway Protocol(EIGRP) and Open Shortest Path First (OSPF). The combination of traditional routing and MPLS improve the forwarding mechanism, scalability and overall network performance. We will use GNS3 and OPNET Modeler 14.5 to simulate many different scenarios and metrics such as delay, jitter and mean opinion score (MOS) value are measured. The simulation result will show that OSPF and BGP-MPLS VPN offers best performance for video conferencing application.

Keywords: OSPF, BGP, EIGRP, MPLS, Video conference, Provider router, edge router, layer3 VPN

Procedia PDF Downloads 330
15016 Neighborhood Sustainability Assessment in the New Developments of Tabriz: A Case Study for Roshdieh

Authors: Melisa Yazdan Panahi

Abstract:

Since, today in most countries around the world much attention is paid to planning the smallest unit in the city i.e. the residential neighborhoods to achieve sustainable urban development goals, a variety of assessment tools have been developed to assess and monitor the sustainability of new developments. One of the most reliable and widely used assessment tools is LEED-ND rating system. This paper whit the aim of assessing sustainability level of Roshdieh neighborhood in Tabriz, has introduced this rating system and applied it in the study area. The results indicate that Roshdieh has the potential of achieving the standards of sustainable neighborhoods, but the present situation is far from the ideal point.

Keywords: LEED-ND, sustainable neighborhood, new developments, Tabriz

Procedia PDF Downloads 396
15015 Assessing the Effects of Community Informatics on Livelihoods Sustainability in Nigeria: a Model for Rural Communities

Authors: Adebayo J. Julius, Oluremi N. Iluyomade

Abstract:

Livelihood in Nigeria is a paradox of poverty amidst plenty. The Country is endowed with a good climate for agriculture, naturally growing fruit trees and vegetables, and undomesticated water resources. In spite of all its endowment, Nigeria continues to live in poverty year in year out. This thus raises a very important question as to how can there be so much poverty in Nigeria with all its natural endowments. This study focused comparative analysis of the utilization of community informatics for sustainable livelihoods through agriculture. The idea projected in this study is that small strategic changes in the modus operandi of social informatics can have a significant impact on sustainability of livelihoods. This paper carefully explored the theories of community informatics and its efficacies in dealing with sustainability issues. This study identified, described and evaluates the roles of community informatics in some sectors of the economy, different analytical tools to benchmark the influence of social informatics in agriculture against what is obtainable in agricultural sectors of the economy were used. It further employed comparative analysis to build a case model for sustainable livelihood in agriculture through community informatics.

Keywords: informatics , model, rural community, livelihoods sustainability, Nigeria

Procedia PDF Downloads 145
15014 Application of Modal Analysis for Commissioning of a Ball Screw System

Authors: T. D. Tran, H. Schlegel, R. Neugebauer

Abstract:

Ball screws are an important component in machine tools. In mechatronic systems and machine tools, a ball screw has to work usually at a high speed. Otherwise the axial compliance of the ball screw, in combination with the inertia of the slide, the motor, the coupling and the screw, will cause an oscillation resonance, which limits the systems bandwidth and consequently influences performance of the motion controller. In this paper, the modal analysis method by measuring and analysing the vibrating parameters of the ball screw system to determine the dynamic characteristic of existing structures is used. On the one hand, the results of this study were obtained by the theoretical analysis and the modal testing of a ball screw system test station with the help of an impact hammer, respectively using excitation by motor. The experimental study showed oscillating forms of the ball screw for each frequency and obtained eigenfrequencies of the ball screw system. On the other hand, in this research a simulation with the help of the numerical modal analysis in order to analyse the oscillation and to find the eigenfrequencies of the ball screw system is used. Furthermore, the model order reduction by modal reduction and also according to Guyan is carried out. On the basis of these results a secure and also rapid commissioning of the control loops with regard to operating in their optimal function is targeted.

Keywords: modal analysis, ball screw, controller system, machine tools

Procedia PDF Downloads 455
15013 The Relationship Between Social Support, Happiness, Work-Family Conflict and State-Trait Anxiety Among Single Mothers by Choice at Time of Covid-19 Pandemic

Authors: Shamir Balderman Orit, Shamir Michal

Abstract:

Israel often deals with crisis situations, but most have been characterized as security crises (e.g., war). This is the first time that the Israel has dealt with a health and social emergency as part of a global crisis. The crisis began in January 2020 with the emergence of the novel coronavirus (Covid-19), which was defined as a pandemic (World Health Organization, 2020) and arrived in Israel in early March 2020. This study examined how single mothers by choice (SMBC) experience state anxiety (SA), social support, work–family conflict (WFC), and happiness. This group has not been studied in the context of crises in general or a global crisis. Using a snowball sample, 386 SMBCanswered an online questionnaire. The findings show a negative relationship between income and level of state anxiety. State anxiety was also negatively associated with social support, level of happiness, and WFC. Finally, a stepwise regression analysis indicated that happiness explained 34% of the variance in SA. We also found that most of the women did not turn to formal support agencies such as social workers, other Government Ministries, or municipal welfare. A positive and strong correlations was also found between SA and WFC. The findings of the study reinforce the understanding that although these women made a conscious and informed decision regarding the choice of their family cell, their situation is more complex in the absence of a spouse support. Therefore, this study, as other future studies in the field of SMBC, may contribute to the improvement of their social status and the understanding that they are a unique group. Although SMBC are a growing sector of society in the past few years, there are still special needs and special attention that is needed from the formal and informal supports systems. A comparative study of these two groups and in different countries would shed light on SA among mothers in general, regardless of their relationship status and location. Researchers should expand this study by comparing mothers in relationships and exploring how SMBC coped in other countries. In summary, the findings of the study contribute knowledge on three levels: (a) knowledge about SMBC in general and during crisis situations; (b) examination of social support using tools assessing receipt of assistance and support, some of which were developed for the present study; and (c) insights regarding counseling, accompaniment, and guidance of welfare mechanisms.

Keywords: single mothers by choice, state anxiety, social support, happiness, work-family conflict

Procedia PDF Downloads 102
15012 STATCOM’s Contribution to the Improvement of Voltage Plan and Power Flow in an Electrical Transmission Network

Authors: M. Adjabi, A. Amiar, P. O. Logerais

Abstract:

Flexible Alternative Current Systems Transmission (FACTS) are used since nearly four decades and present very good dynamic performances. The purpose of this work is to study the behavior of a system where Static Compensator (STATCOM) is located at the midpoint of a transmission line which is the idea of the project functioning in disturbed modes with various levels of load. The studied model and starting from the analysis of various alternatives will lead to the checking of the aptitude of the STATCOM to maintain the voltage plan and to improve the power flow in electro-energetic system which is the east region of Algerian 400 kV transmission network. The steady state performance of STATCOM’s controller is analyzed through computer simulations with Matlab/Simulink program. The simulation results have demonstrated that STATCOM can be effectively applied in power transmission systems to solve the problems of poor dynamic performance and voltage regulation.

Keywords: STATCOM, reactive power, power flow, voltage plan, Algerian network

Procedia PDF Downloads 565
15011 STATCOM's Contribution to the Improvement of Voltage Plan and Power Flow in an Electrical Transmission Network

Authors: M. Adjabi, A. Amiar, P. O. Logerais

Abstract:

Flexible Alternative Current Systems Transmission (FACTS) are used since nearly four decades and present very good dynamic performances. The purpose of this work is to study the behavior of a system where Static Compensator (STATCOM) is located at the midpoint of a transmission line which is the idea of the project functioning in disturbed modes with various levels of load. The studied model and starting from the analysis of various alternatives will lead to the checking of the aptitude of the STATCOM to maintain the voltage plan and to improve the power flow in electro-energetic system which is the east region of Algerian 400 kV transmission network. The steady state performance of STATCOM’s controller is analyzed through computer simulations with Matlab/Simulink program. The simulation results have demonstrated that STATCOM can be effectively applied in power transmission systems to solve the problems of poor dynamic performance and voltage regulation.

Keywords: STATCOM, reactive power, power flow, voltage plan, Algerian network

Procedia PDF Downloads 595
15010 Wireless Sensor Anomaly Detection Using Soft Computing

Authors: Mouhammd Alkasassbeh, Alaa Lasasmeh

Abstract:

We live in an era of rapid development as a result of significant scientific growth. Like other technologies, wireless sensor networks (WSNs) are playing one of the main roles. Based on WSNs, ZigBee adds many features to devices, such as minimum cost and power consumption, and increasing the range and connect ability of sensor nodes. ZigBee technology has come to be used in various fields, including science, engineering, and networks, and even in medicinal aspects of intelligence building. In this work, we generated two main datasets, the first being based on tree topology and the second on star topology. The datasets were evaluated by three machine learning (ML) algorithms: J48, meta.j48 and multilayer perceptron (MLP). Each topology was classified into normal and abnormal (attack) network traffic. The dataset used in our work contained simulated data from network simulation 2 (NS2). In each database, the Bayesian network meta.j48 classifier achieved the highest accuracy level among other classifiers, of 99.7% and 99.2% respectively.

Keywords: IDS, Machine learning, WSN, ZigBee technology

Procedia PDF Downloads 542
15009 An ANN Approach for Detection and Localization of Fatigue Damage in Aircraft Structures

Authors: Reza Rezaeipour Honarmandzad

Abstract:

In this paper we propose an ANN for detection and localization of fatigue damage in aircraft structures. We used network of piezoelectric transducers for Lamb-wave measurements in order to calculate damage indices. Data gathered by the sensors was given to neural network classifier. A set of neural network electors of different architecture cooperates to achieve consensus concerning the state of each monitored path. Sensed signal variations in the ROI, detected by the networks at each path, were used to assess the state of the structure as well as to localize detected damage and to filter out ambient changes. The classifier has been extensively tested on large data sets acquired in the tests of specimens with artificially introduced notches as well as the results of numerous fatigue experiments. Effect of the classifier structure and test data used for training on the results was evaluated.

Keywords: ANN, fatigue damage, aircraft structures, piezoelectric transducers, lamb-wave measurements

Procedia PDF Downloads 415
15008 Using Machine Learning to Build a Real-Time COVID-19 Mask Safety Monitor

Authors: Yash Jain

Abstract:

The US Center for Disease Control has recommended wearing masks to slow the spread of the virus. The research uses a video feed from a camera to conduct real-time classifications of whether or not a human is correctly wearing a mask, incorrectly wearing a mask, or not wearing a mask at all. Utilizing two distinct datasets from the open-source website Kaggle, a mask detection network had been trained. The first dataset that was used to train the model was titled 'Face Mask Detection' on Kaggle, where the dataset was retrieved from and the second dataset was titled 'Face Mask Dataset, which provided the data in a (YOLO Format)' so that the TinyYoloV3 model could be trained. Based on the data from Kaggle, two machine learning models were implemented and trained: a Tiny YoloV3 Real-time model and a two-stage neural network classifier. The two-stage neural network classifier had a first step of identifying distinct faces within the image, and the second step was a classifier to detect the state of the mask on the face and whether it was worn correctly, incorrectly, or no mask at all. The TinyYoloV3 was used for the live feed as well as for a comparison standpoint against the previous two-stage classifier and was trained using the darknet neural network framework. The two-stage classifier attained a mean average precision (MAP) of 80%, while the model trained using TinyYoloV3 real-time detection had a mean average precision (MAP) of 59%. Overall, both models were able to correctly classify stages/scenarios of no mask, mask, and incorrectly worn masks.

Keywords: datasets, classifier, mask-detection, real-time, TinyYoloV3, two-stage neural network classifier

Procedia PDF Downloads 156
15007 Detecting and Thwarting Interest Flooding Attack in Information Centric Network

Authors: Vimala Rani P, Narasimha Malikarjunan, Mercy Shalinie S

Abstract:

Data Networking was brought forth as an instantiation of information-centric networking. The attackers can send a colossal number of spoofs to take hold of the Pending Interest Table (PIT) named an Interest Flooding attack (IFA) since the in- interests are recorded in the PITs of the intermediate routers until they receive corresponding Data Packets are go beyond the time limit. These attacks can be detrimental to network performance. PIT expiration rate or the Interest satisfaction rate, which cannot differentiate the IFA from attacks, is the criterion Traditional IFA detection techniques are concerned with. Threshold values can casually affect Threshold-based traditional methods. This article proposes an accurate IFA detection mechanism based on a Multiple Feature-based Extreme Learning Machine (MF-ELM). Accuracy of the attack detection can be increased by presenting the entropy of Internet names, Interest satisfaction rate and PIT usage as features extracted in the MF-ELM classifier. Furthermore, we deploy a queue-based hostile Interest prefix mitigation mechanism. The inference of this real-time test bed is that the mechanism can help the network to resist IFA with higher accuracy and efficiency.

Keywords: information-centric network, pending interest table, interest flooding attack, MF-ELM classifier, queue-based mitigation strategy

Procedia PDF Downloads 203
15006 Using the Weakest Precondition to Achieve Self-Stabilization in Critical Networks

Authors: Antonio Pizzarello, Oris Friesen

Abstract:

Networks, such as the electric power grid, must demonstrate exemplary performance and integrity. Integrity depends on the quality of both the system design model and the deployed software. Integrity of the deployed software is key, for both the original versions and the many that occur throughout numerous maintenance activity. Current software engineering technology and practice do not produce adequate integrity. Distributed systems utilize networks where each node is an independent computer system. The connections between them is realized via a network that is normally redundantly connected to guarantee the presence of a path between two nodes in the case of failure of some branch. Furthermore, at each node, there is software which may fail. Self-stabilizing protocols are usually present that recognize failure in the network and perform a repair action that will bring the node back to a correct state. These protocols first introduced by E. W. Dijkstra are currently present in almost all Ethernets. Super stabilization protocols capable of reacting to a change in the network topology due to the removal or addition of a branch in the network are less common but are theoretically defined and available. This paper describes how to use the Software Integrity Assessment (SIA) methodology to analyze self-stabilizing software. SIA is based on the UNITY formalism for parallel and distributed programming, which allows the analysis of code for verifying the progress property p leads-to q that describes the progress of all computations starting in a state satisfying p to a state satisfying q via the execution of one or more system modules. As opposed to demonstrably inadequate test and evaluation methods SIA allows the analysis and verification of any network self-stabilizing software as well as any other software that is designed to recover from failure without external intervention of maintenance personnel. The model to be analyzed is obtained by automatic translation of the system code to a transition system that is based on the use of the weakest precondition.

Keywords: network, power grid, self-stabilization, software integrity assessment, UNITY, weakest precondition

Procedia PDF Downloads 221
15005 Evaluation of Routing Protocols in Mobile Adhoc Networks

Authors: Anu Malhotra

Abstract:

An Ad-hoc network is one that is an autonomous, self configuring network made up of mobile nodes connected via wireless links. Ad-hoc networks often consist of nodes, mobile hosts (MH) or mobile stations (MS, also serving as routers) connected by wireless links. Different routing protocols are used for data transmission in between the nodes in an adhoc network. In this paper two protocols (OLSR and AODV) are analyzed on the basis of two parameters i.e. time delay and throughput with different data rates. On the basis of these analysis, we observed that with same data rate, AODV protocol is having more time delay than the OLSR protocol whereas throughput for the OLSR protocol is less compared to the AODV protocol.

Keywords: routing adhoc, mobile hosts, mobile stations, OLSR protocol, AODV protocol

Procedia PDF Downloads 502
15004 Identification of Nonlinear Systems Using Radial Basis Function Neural Network

Authors: C. Pislaru, A. Shebani

Abstract:

This paper uses the radial basis function neural network (RBFNN) for system identification of nonlinear systems. Five nonlinear systems are used to examine the activity of RBFNN in system modeling of nonlinear systems; the five nonlinear systems are dual tank system, single tank system, DC motor system, and two academic models. The feed forward method is considered in this work for modelling the non-linear dynamic models, where the K-Means clustering algorithm used in this paper to select the centers of radial basis function network, because it is reliable, offers fast convergence and can handle large data sets. The least mean square method is used to adjust the weights to the output layer, and Euclidean distance method used to measure the width of the Gaussian function.

Keywords: system identification, nonlinear systems, neural networks, radial basis function, K-means clustering algorithm

Procedia PDF Downloads 466