Search results for: textiles in architecture
464 Vibrations of Thin Bio Composite Plates
Authors: Timo Avikainen, Tuukka Verho
Abstract:
The use of natural fibers as reinforcements is growing increasingly in polymers which are involved in e.g. structural, vibration, and acoustic applications. The use of bio composites is being investigated as lightweight materials with specific properties like the ability to dissipate vibration energy and positive environmental profile and are thus considered as potential replacements for synthetic composites. The macro-level mechanical properties of the biocomposite material depend on several parameters in the detailed architecture and morphology of the reinforcing fiber structure. The polymer matrix phase is often applied to remain the fiber structure in touch. A big role in the packaging details of the fibers is related to the used manufacturing processes like extrusion, injection molding and treatments. There are typically big variances in the detailed parameters of the microstructure fibers. The study addressed the question of how the multiscale simulation methodology works in bio composites with short pulp fibers. The target is to see how the vibro – acoustic performance of thin–walled panels can be controlled by the detailed characteristics of the fiber material. Panels can be used in sound-producing speakers or sound insulation applications. The multiscale analysis chain is tested starting from the microstructural level and continuing via macrostructural material parameters to the product component part/assembly levels. Another application is the dynamic impact type of loading, exposing the material to the crack type damages that is in this study modeled as the Charpy impact tests.Keywords: bio composite, pulp fiber, vibration, acoustics, impact, FEM
Procedia PDF Downloads 82463 GA3C for Anomalous Radiation Source Detection
Authors: Chia-Yi Liu, Bo-Bin Xiao, Wen-Bin Lin, Hsiang-Ning Wu, Liang-Hsun Huang
Abstract:
In order to reduce the risk of radiation damage that personnel may suffer during operations in the radiation environment, the use of automated guided vehicles to assist or replace on-site personnel in the radiation environment has become a key technology and has become an important trend. In this paper, we demonstrate our proof of concept for autonomous self-learning radiation source searcher in an unknown environment without a map. The research uses GPU version of Asynchronous Advantage Actor-Critic network (GA3C) of deep reinforcement learning to search for radiation sources. The searcher network, based on GA3C architecture, has self-directed learned and improved how search the anomalous radiation source by training 1 million episodes under three simulation environments. In each episode of training, the radiation source position, the radiation source intensity, starting position, are all set randomly in one simulation environment. The input for searcher network is the fused data from a 2D laser scanner and a RGB-D camera as well as the value of the radiation detector. The output actions are the linear and angular velocities. The searcher network is trained in a simulation environment to accelerate the learning process. The well-performance searcher network is deployed to the real unmanned vehicle, Dashgo E2, which mounts LIDAR of YDLIDAR G4, RGB-D camera of Intel D455, and radiation detector made by Institute of Nuclear Energy Research. In the field experiment, the unmanned vehicle is enable to search out the radiation source of the 18.5MBq Na-22 by itself and avoid obstacles simultaneously without human interference.Keywords: deep reinforcement learning, GA3C, source searching, source detection
Procedia PDF Downloads 114462 Text Localization in Fixed-Layout Documents Using Convolutional Networks in a Coarse-to-Fine Manner
Authors: Beier Zhu, Rui Zhang, Qi Song
Abstract:
Text contained within fixed-layout documents can be of great semantic value and so requires a high localization accuracy, such as ID cards, invoices, cheques, and passports. Recently, algorithms based on deep convolutional networks achieve high performance on text detection tasks. However, for text localization in fixed-layout documents, such algorithms detect word bounding boxes individually, which ignores the layout information. This paper presents a novel architecture built on convolutional neural networks (CNNs). A global text localization network and a regional bounding-box regression network are introduced to tackle the problem in a coarse-to-fine manner. The text localization network simultaneously locates word bounding points, which takes the layout information into account. The bounding-box regression network inputs the features pooled from arbitrarily sized RoIs and refine the localizations. These two networks share their convolutional features and are trained jointly. A typical type of fixed-layout documents: ID cards, is selected to evaluate the effectiveness of the proposed system. These networks are trained on data cropped from nature scene images, and synthetic data produced by a synthetic text generation engine. Experiments show that our approach locates high accuracy word bounding boxes and achieves state-of-the-art performance.Keywords: bounding box regression, convolutional networks, fixed-layout documents, text localization
Procedia PDF Downloads 194461 Understanding Mental Constructs of Language and Emotion
Authors: Sakshi Ghai
Abstract:
The word ‘emotion’ has been microscopically studied through psychological, anthropological and biological lenses and have indubitably been one of the most researched concepts as, in all situations and reactions that constitute human life, emotions form the very niche of our mutual existence. While understanding the social aspects of cognition, one can realize that emotions are deeply interwoven with language and thereby are pivotal in inducing human actions and behavior. The society or the outward social structure is the result of the inward psychological structure of our human relationships, for the individual is the result of the total experience, knowledge and conduct of man. The aim of this paper is threefold: first, to establish the relation between mental representations of emotions and its neuropsychological connection with language on a conscious and sub-conscious level; secondly, to describe how innate, basic and higher cognitive emotions affect the constantly changing state of an agent and peruse its assistance in determining the moral compass within all beings. Lastly, in the course of this paper, the concept of the architecture of mind is explored considering how it has developed an ability to display adaptive emotional states and responses, which are in sync with the language of thought. For every response to the social environment is so deeply determined by the very social milieu in which one is situated, language has a fundamental role in constructing emotions and articulating behavior. Being linguistic beings, we tend to associate emotion, feelings and other aspects of inwards mental states intrinsically with the language we use. This paper aims to devise a discursive approach to understand how emotions are fabricated, intertwined with the mental constructs further expressed and communicated through the various units of language.Keywords: mental representation, emotion, language, psychology
Procedia PDF Downloads 289460 Exploring Students’ Self-Evaluation on Their Learning Outcomes through an Integrated Cumulative Grade Point Average Reporting Mechanism
Authors: Suriyani Ariffin, Nor Aziah Alias, Khairil Iskandar Othman, Haslinda Yusoff
Abstract:
An Integrated Cumulative Grade Point Average (iCGPA) is a mechanism and strategy to ensure the curriculum of an academic programme is constructively aligned to the expected learning outcomes and student performance based on the attainment of those learning outcomes that is reported objectively in a spider web. Much effort and time has been spent to develop a viable mechanism and trains academics to utilize the platform for reporting. The question is: How well do learners conceive the idea of their achievement via iCGPA and whether quality learner attributes have been nurtured through the iCGPA mechanism? This paper presents the architecture of an integrated CGPA mechanism purported to address a holistic evaluation from the evaluation of courses learning outcomes to aligned programme learning outcomes attainment. The paper then discusses the students’ understanding of the mechanism and evaluation of their achievement from the generated spider web. A set of questionnaires were distributed to a group of students with iCGPA reporting and frequency analysis was used to compare the perspectives of students on their performance. In addition, the questionnaire also explored how they conceive the idea of an integrated, holistic reporting and how it generates their motivation to improve. The iCGPA group was found to be receptive to what they have achieved throughout their study period. They agreed that the achievement level generated from their spider web allows them to develop intervention and enhance the programme learning outcomes before they graduate.Keywords: learning outcomes attainment, iCGPA, programme learning outcomes, spider web, iCGPA reporting skills
Procedia PDF Downloads 207459 A Study on Architectural Characteristics of Traditional Iranian Ordinary Houses in Mashhad, Iran
Authors: Rana Daneshvar Salehi
Abstract:
In many Iranian cities including Mashhad, the capital of Razavi Khorasan Province, ordinary samples of domestic architecture on a small scale is not considered as heritage. While the principals of house formation are respected in all traditional Iranian houses; from moderate to great ones. During the past decade, Mashhad has lost its identity, and has become a modern city. Identifying it as the capital of the Islamic Culture in 2017 by ISESCO and consequently looking for new developments and transfiguration caused to demolish a large number of traditional modest habitation. For this reason, the present paper aims to introduce the three undiscovered houses with the historical and monumental values located in the oldest neighborhoods of Mashhad which have been neglected in the cultural heritage field. The preliminary phase of this approach will be a measured survey to identify the significant characteristics of selected dwellings and understand the challenges through focusing on building form, orientation, room function, space proportion and ornamental elements’ details. A comparison between the case studies and the wealthy domestically buildings presents that a house belongs to inhabitants with an average income could introduce the same accurate, regular, harmonic and proportionate design which can be found in the great mansions. It reveals that an ordinary traditional house can be regarded as valuable construction not only for its historical characteristics but also for its aesthetical and architectural features that could avoid further destructions in the future.Keywords: traditional ordinary house, architectural characteristic, proportion, heritage
Procedia PDF Downloads 146458 A Grey-Box Text Attack Framework Using Explainable AI
Authors: Esther Chiramal, Kelvin Soh Boon Kai
Abstract:
Explainable AI is a strong strategy implemented to understand complex black-box model predictions in a human-interpretable language. It provides the evidence required to execute the use of trustworthy and reliable AI systems. On the other hand, however, it also opens the door to locating possible vulnerabilities in an AI model. Traditional adversarial text attack uses word substitution, data augmentation techniques, and gradient-based attacks on powerful pre-trained Bidirectional Encoder Representations from Transformers (BERT) variants to generate adversarial sentences. These attacks are generally white-box in nature and not practical as they can be easily detected by humans e.g., Changing the word from “Poor” to “Rich”. We proposed a simple yet effective Grey-box cum Black-box approach that does not require the knowledge of the model while using a set of surrogate Transformer/BERT models to perform the attack using Explainable AI techniques. As Transformers are the current state-of-the-art models for almost all Natural Language Processing (NLP) tasks, an attack generated from BERT1 is transferable to BERT2. This transferability is made possible due to the attention mechanism in the transformer that allows the model to capture long-range dependencies in a sequence. Using the power of BERT generalisation via attention, we attempt to exploit how transformers learn by attacking a few surrogate transformer variants which are all based on a different architecture. We demonstrate that this approach is highly effective to generate semantically good sentences by changing as little as one word that is not detectable by humans while still fooling other BERT models.Keywords: BERT, explainable AI, Grey-box text attack, transformer
Procedia PDF Downloads 136457 Improving Cheon-Kim-Kim-Song (CKKS) Performance with Vector Computation and GPU Acceleration
Authors: Smaran Manchala
Abstract:
Homomorphic Encryption (HE) enables computations on encrypted data without requiring decryption, mitigating data vulnerability during processing. Usable Fully Homomorphic Encryption (FHE) could revolutionize secure data operations across cloud computing, AI training, and healthcare, providing both privacy and functionality, however, the computational inefficiency of schemes like Cheon-Kim-Kim-Song (CKKS) hinders their widespread practical use. This study focuses on optimizing CKKS for faster matrix operations through the implementation of vector computation parallelization and GPU acceleration. The variable effects of vector parallelization on GPUs were explored, recognizing that while parallelization typically accelerates operations, it could introduce overhead that results in slower runtimes, especially in smaller, less computationally demanding operations. To assess performance, two neural network models, MLPN and CNN—were tested on the MNIST dataset using both ARM and x86-64 architectures, with CNN chosen for its higher computational demands. Each test was repeated 1,000 times, and outliers were removed via Z-score analysis to measure the effect of vector parallelization on CKKS performance. Model accuracy was also evaluated under CKKS encryption to ensure optimizations did not compromise results. According to the results of the trail runs, applying vector parallelization had a 2.63X efficiency increase overall with a 1.83X performance increase for x86-64 over ARM architecture. Overall, these results suggest that the application of vector parallelization in tandem with GPU acceleration significantly improves the efficiency of CKKS even while accounting for vector parallelization overhead, providing impact in future zero trust operations.Keywords: CKKS scheme, runtime efficiency, fully homomorphic encryption (FHE), GPU acceleration, vector parallelization
Procedia PDF Downloads 23456 Economic Integration in Eurasia: Modeling of the Current and Future Architecture
Authors: M. G. Shilina
Abstract:
The prospects for political and economic development of the Eurasian space are currently discussed at both governmental and expert levels. New concepts actively proposed by the Eurasian governments require the analysis and search for effective implementation options. In the paper, an attempt to identify effective solutions to the problems surrounding the current economic integration of the Eurasian states is given on the basis of an interdisciplinary, comprehensive, structured analysis. The phenomenon is considered through the prism of the international law, world economy and politics, combined with the study of existing intergovernmental practice. The modeling method was taken as the basis for the research and is supplemented by legal and empirical methods. The detailed multi-level model of practical construction the 'Great Eurasia' (the GE) concept is proposed, the option for building a phased interaction in Eurasia is given through the prism of construction by the Eurasian Economic Union (the EAEU) as the main tool. The Shanghai Cooperation Organization (the SCO) is seen as the most promising element of the model. The SCO is capable of streamlining the formation of the GE and determine the transformation of Eurasia into a common economic space. Effective development of the economic integration between Eurasian states on the framework of the SCO is optimal. The SCO+ could be used as a platform for integration-integration processes formation. The creation of stable financial ties could become the basis for the possible formation of an expanded transregional integration platform. The paper concludes that the implementation of the proposed model could entail a gradual economic rapprochement of Eurasia and beyond.Keywords: economic integration, The Eurasian Economic Union, The European Union, The Shanghai Cooperation Organization, the silk road economic belt
Procedia PDF Downloads 121455 The Impact of Artificial Intelligence on Digital Construction
Authors: Omil Nady Mahrous Maximous
Abstract:
The construction industry is currently experiencing a shift towards digitisation. This transformation is driven by adopting technologies like Building Information Modelling (BIM), drones, and augmented reality (AR). These advancements are revolutionizing the process of designing, constructing, and operating projects. BIM, for instance, is a new way of communicating and exploiting technology such as software and machinery. It enables the creation of a replica or virtual model of buildings or infrastructure projects. It facilitates simulating construction procedures, identifying issues beforehand, and optimizing designs accordingly. Drones are another tool in this revolution, as they can be utilized for site surveys, inspections, and even deliveries. Moreover, AR technology provides real-time information to workers involved in the project. Implementing these technologies in the construction industry has brought about improvements in efficiency, safety measures, and sustainable practices. BIM helps minimize rework and waste materials, while drones contribute to safety by reducing workers' exposure to areas. Additionally, AR plays a role in worker safety by delivering instructions and guidance during operations. Although the digital transformation within the construction industry is still in its early stages, it holds the potential to reshape project delivery methods entirely. By embracing these technologies, construction companies can boost their profitability while simultaneously reducing their environmental impact and ensuring safer practices.Keywords: architectural education, construction industry, digital learning environments, immersive learning BIM, digital construction, construction technologies, digital transformation artificial intelligence, collaboration, digital architecture, digital design theory, material selection, space construction
Procedia PDF Downloads 57454 Fashion Performing/Fashioning Performances: Catwalks as Communication Tools between Market, Branding and Performing Art
Authors: V. Linfante
Abstract:
Catwalks are one of the key moments in fashion: the first and most relevant display where brands stage their collections, products, ideas, and style. The garment is 'the star' of the catwalk and must show itself not just as a product but as a result of a design process endured for several months. All contents developed within this process become ingredients for connecting scenography, music, lights, and direction into a unique fashion narrative. According to the spirit of different ages, fashion shows have been transformed and shaped into peculiar formats: from Pandoras to presentations organized by Parisian couturiers, across the 'marathons' typical of the beginning of modern fashion system, coming up to the present structure of fashion weeks, with their complex organization and related creative and technical businesses. The paper intends to introduce the evolution of the fashion system through its unique process of seasonally staging and showing its production. The paper intends to analyse the evolution of the fashion shows from the intimacy of ballrooms at the beginning of the 20th century, passing through the enthusiasm attitude typical from the '70s and the '80s, to finally depict our present. In this last scenario, catwalks are not anymore a standard collections presentation but become one of the most exciting expression of contemporary culture (and sub-cultures), going from sophisticated performances (as Karl Lagerfeld's Chanel shows) to real artistic happenings (as the events of Victor&Rolf, Alexander McQueen, OFF_WHITE, Vetements, and Martin Margiela), often involving contemporary architecture, digital world, technology, social media, performing art and artists.Keywords: branding, communication, fashion, new media, performing art
Procedia PDF Downloads 150453 Downscaling Seasonal Sea Surface Temperature Forecasts over the Mediterranean Sea Using Deep Learning
Authors: Redouane Larbi Boufeniza, Jing-Jia Luo
Abstract:
This study assesses the suitability of deep learning (DL) for downscaling sea surface temperature (SST) over the Mediterranean Sea in the context of seasonal forecasting. We design a set of experiments that compare different DL configurations and deploy the best-performing architecture to downscale one-month lead forecasts of June–September (JJAS) SST from the Nanjing University of Information Science and Technology Climate Forecast System version 1.0 (NUIST-CFS1.0) for the period of 1982–2020. We have also introduced predictors over a larger area to include information about the main large-scale circulations that drive SST over the Mediterranean Sea region, which improves the downscaling results. Finally, we validate the raw model and downscaled forecasts in terms of both deterministic and probabilistic verification metrics, as well as their ability to reproduce the observed precipitation extreme and spell indicator indices. The results showed that the convolutional neural network (CNN)-based downscaling consistently improves the raw model forecasts, with lower bias and more accurate representations of the observed mean and extreme SST spatial patterns. Besides, the CNN-based downscaling yields a much more accurate forecast of extreme SST and spell indicators and reduces the significant relevant biases exhibited by the raw model predictions. Moreover, our results show that the CNN-based downscaling yields better skill scores than the raw model forecasts over most portions of the Mediterranean Sea. The results demonstrate the potential usefulness of CNN in downscaling seasonal SST predictions over the Mediterranean Sea, particularly in providing improved forecast products.Keywords: Mediterranean Sea, sea surface temperature, seasonal forecasting, downscaling, deep learning
Procedia PDF Downloads 76452 Experiencing Daylight in Architectural Spaces: A Case Study of Public Buildings in the Context of Karachi, Pakistan
Authors: Safia Asif, Saadia Bano
Abstract:
In a world with rapidly depleting resources, using artificial lighting during daytime is an act of human ignorance. Imitated light is the major source of energy consumption in public buildings. Despite, the fact that substantial working hours of these buildings usually persist in natural daylight time; there is a trend of isolated, un-fenestrated and a-contextual interiors majorly dependent on active energy sources. On the contrary, if direct and un-controlled sunlight is allowed inside the building, it will create visual and thermal discomfort. Controlled daylighting with appropriate design mechanisms is one of the important aspects of achieving thermal and visual comfort. The natural sunlight can be utilized intelligently with the help of architectural thermal controlling mechanisms to achieve a healthy and productive environment. This paper is an attempt to investigate and analyze the importance of daylighting with reference to energy efficiency and thermal comfort. For this purpose, three public buildings including two educational institutions and one general post office are selected, as case-studies in the context of Karachi, Pakistan. Various parameters of visual and thermal comfort are analyzed which includes orientation, ceiling heights, overall building profile along with daylight controlling mechanisms in terms of penetration, distribution, protection, and control. In the later part of the research, a questionnaire survey is also conducted to evaluate the user experience in terms of adequate daylighting and thermal comfort.Keywords: daylight, public buildings, sustainable architecture, visual and thermal comfort
Procedia PDF Downloads 210451 A Single Stage Cleft Rhinoplasty Technique for Primary Unilateral Cleft Lip and Palate 'The Gujrat Technique'
Authors: Diaa Othman, Muhammad Adil Khan, Muhammad Riaz
Abstract:
Without an early intervention to correct the unilateral complete cleft lip and palate deformity, nasal architecture can progress to an exaggerated cleft nose deformity. We present the results of a modified unilateral cleft rhinoplasty procedure ‘the Gujrat technique’ to correct this deformity. Ninety pediatric and adult patients with non-syndromic unilateral cleft lip underwent primary and secondary composite cleft rhinoplasty using the Gujrat technique as a single stage operation over a 10-year period. The technique involved an open rhinoplasty with Tennison lip repair, and employed a combination of three autologous cartilage grafts, seven cartilage-molding sutures and a prolene mesh graft for alar base support. Post-operative evaluation of nasal symmetry was undertaken using the validated computer program ‘SymNose’. Functional outcome and patient satisfaction were assessed using the NOSE scale and ROE (rhinoplasty outcome evaluation) questionnaires. The single group study design used the non-parametric matching pairs Wilcoxon Sign test (p < 0.001), and showed overall good to excellent functional and aesthetic outcomes, including nasal projection and tip definition, and higher scores of the digital SymNose grading system. Objective assessment of the Gujrat cleft rhinoplasty technique demonstrates its aesthetic appeal and functional versatility. Overall it is a simple and reproducible technique, with no significant complications.Keywords: cleft lip and palate, congenital rhinoplasty, nasal deformity, secondary rhinoplasty
Procedia PDF Downloads 203450 Application of Sustainable Agriculture Based on LEISA in Landscape Design of Integrated Farming
Authors: Eduwin Eko Franjaya, Andi Gunawan, Wahju Qamara Mugnisjah
Abstract:
Sustainable agriculture in the form of integrated farming with its LEISA (Low External Input Sustainable Agriculture) concept has brought a positive impact on agriculture development and ambient amelioration. But, most of the small farmers in Indonesia did not know how to put the concept of it and how to combine agricultural commodities on the site effectively and efficiently. This research has an aim to promote integrated farming (agrofisheries, etc) to the farmers by designing the agricultural landscape to become integrated farming landscape as medium of education for the farmers. The method used in this research is closely related with the rule of design in the landscape architecture science. The first step is inventarization for the existing condition on the research site. The second step is analysis. Then, the third step is concept-making that consists of base concept, design concept, and developing concept. The base concept used in this research is sustainable agriculture with LEISA. The concept design is related with activity base on site. The developing concept consists of space concept, circulation, vegetation and commodity, production system, etc. The fourth step as the final step is planning and design. This step produces site plan of integrated farming based on LEISA. The result of this research is site plan of integrated farming with its explanation, including the energy flow of integrated farming system on site and the production calendar of integrated farming commodities for education and agri-tourism opportunity. This research become the right way to promote the integrated farming and also as a medium for the farmers to learn and to develop it.Keywords: integrated farming, LEISA, planning and design, site plan
Procedia PDF Downloads 508449 Linux Security Management: Research and Discussion on Problems Caused by Different Aspects
Authors: Ma Yuzhe, Burra Venkata Durga Kumar
Abstract:
The computer is a great invention. As people use computers more and more frequently, the demand for PCs is growing, and the performance of computer hardware is also rising to face more complex processing and operation. However, the operating system, which provides the soul for computers, has stopped developing at a stage. In the face of the high price of UNIX (Uniplexed Information and Computering System), batch after batch of personal computer owners can only give up. Disk Operating System is too simple and difficult to bring innovation into play, which is not a good choice. And MacOS is a special operating system for Apple computers, and it can not be widely used on personal computers. In this environment, Linux, based on the UNIX system, was born. Linux combines the advantages of the operating system and is composed of many microkernels, which is relatively powerful in the core architecture. Linux system supports all Internet protocols, so it has very good network functions. Linux supports multiple users. Each user has no influence on their own files. Linux can also multitask and run different programs independently at the same time. Linux is a completely open source operating system. Users can obtain and modify the source code for free. Because of these advantages of Linux, it has also attracted a large number of users and programmers. The Linux system is also constantly upgraded and improved. It has also issued many different versions, which are suitable for community use and commercial use. Linux system has good security because it relies on a file partition system. However, due to the constant updating of vulnerabilities and hazards, the using security of the operating system also needs to be paid more attention to. This article will focus on the analysis and discussion of Linux security issues.Keywords: Linux, operating system, system management, security
Procedia PDF Downloads 108448 Analysis to the Characterization of Self-Esteem of Students in Eulogio 'Amang' Rodriguez Institute of Science and Technology: A Foundation of Conceptualizing Substantial Plan of Action
Authors: Eriberto R. Astorga Jr., Herbert D. Vertucio, Evelyn M. Polison
Abstract:
This study was conducted in order to determine the analysis with regards to the Characterization of Self-Esteem of EARIST Students according to their origin of self-esteem and low self-esteem as well as its causes. The respondents of this study are three thousand three hundred twenty three (3,323) randomly selected students from eight colleges of EARIST such as Arts and Sciences, Education, Public Administration and Criminology, Business Administration, Hospitality Management, Architecture and Fine Arts, Engineering, and Industrial Technology. A survey was conducted by using a validated questionnaire for information gathering about respondents profile and different factors relating to self-esteem of students such as self-origin, familial and social relationship, financial situation and education. Frequency, percentage, ranking and standards deviation, standard t-test and ANOVA were applied to investigate the differences of the answers of the respondents to the origin of their self-esteem and the reasons for low self-esteem. The results revealed that there are no significant differences in the origin of their self-esteem and the reasons of low esteem as to the eight group of respondent’s. Moreover, most causes of low esteem are caused by hearing a comment or experiencing an incident that has a negative impact student mentally and emotionally, poor health, being bullied, lack of support from family, friends, and job loss, experiencing verbal and sexual abuse and are in a violent relationship, feelings of isolation, divorce, dysfunctional family, death and lack of achievement at work and at school, trying to conform to stereotypes and prove our independence from our parents.Keywords: characterization, plan of action, profile, self-esteem
Procedia PDF Downloads 175447 Object Oriented Fault Tree Analysis Methodology
Abstract:
Traditional safety, risk and reliability analysis approaches are problem-oriented, which make it great workload when analyzing complicated and huge system, besides, too much repetitive work would to do if the analyzed system composed by many similar components. It is pressing need an object and function oriented approach to maintain high consistency with problem domain. A new approach is proposed to overcome these shortcomings of traditional approaches, the concepts: class, abstract, inheritance, polymorphism and encapsulation are introduced into FTA and establish the professional class library that the abstractions of physical objects in real word, four areas relevant information also be proposed as the establish help guide. The interaction between classes is completed by the inside or external methods that mapping the attributes to base events through fully search the knowledge base, which forms good encapsulation. The object oriented fault tree analysis system that analyze and evaluate the system safety and reliability according to the original appearance of the problem is set up, where could mapped directly from the class and object to the problem domain of the fault tree analysis. All the system failure situations can be analyzed through this bottom-up fault tree construction approach. Under this approach architecture, FTA approach is developed, which avoids the human influence of the analyst on analysis results. It reveals the inherent safety problems of analyzed system itself and provides a new way of thinking and development for safety analysis. So that object oriented technology in the field of safety applications and development, safety theory is conducive to innovation.Keywords: FTA, knowledge base, object-oriented technology, reliability analysis
Procedia PDF Downloads 248446 Image Ranking to Assist Object Labeling for Training Detection Models
Authors: Tonislav Ivanov, Oleksii Nedashkivskyi, Denis Babeshko, Vadim Pinskiy, Matthew Putman
Abstract:
Training a machine learning model for object detection that generalizes well is known to benefit from a training dataset with diverse examples. However, training datasets usually contain many repeats of common examples of a class and lack rarely seen examples. This is due to the process commonly used during human annotation where a person would proceed sequentially through a list of images labeling a sufficiently high total number of examples. Instead, the method presented involves an active process where, after the initial labeling of several images is completed, the next subset of images for labeling is selected by an algorithm. This process of algorithmic image selection and manual labeling continues in an iterative fashion. The algorithm used for the image selection is a deep learning algorithm, based on the U-shaped architecture, which quantifies the presence of unseen data in each image in order to find images that contain the most novel examples. Moreover, the location of the unseen data in each image is highlighted, aiding the labeler in spotting these examples. Experiments performed using semiconductor wafer data show that labeling a subset of the data, curated by this algorithm, resulted in a model with a better performance than a model produced from sequentially labeling the same amount of data. Also, similar performance is achieved compared to a model trained on exhaustive labeling of the whole dataset. Overall, the proposed approach results in a dataset that has a diverse set of examples per class as well as more balanced classes, which proves beneficial when training a deep learning model.Keywords: computer vision, deep learning, object detection, semiconductor
Procedia PDF Downloads 136445 The Effects of T-Walls on Urban Landscape and Quality of Life and Anti-Terror Design Concept in Kabul, Afghanistan
Authors: Fakhrullah Sarwari, Hiroko Ono
Abstract:
Kabul city has suffered a lot in 40 years of conflict of civil war and “The war on terror”. After the invasion of Afghanistan by the United States of America and its allies in 2001, the Taliban was removed from operational power, but The Taliban and other terrorist groups remained in remote areas of the country, they started suicide attacks and bombings. Hence to protect from these attacks officials surrounded their office buildings and houses with concrete blast walls. It gives a bad landscape to the city and creates traffic congestions. Our research contains; questionnaire, reviewing Kabul Municipality documents and literature review. Questionnaires were distributed to Kabul citizens to find out how people feel by seeing the T-Walls on Kabul streets? And what problems they face with T-Walls. “The T-Walls pull down commission” of Kabul Municipality documents were reviewed to find out what caused the failure of this commission. A literature review has been done to compare Kabul with Washington D.C on how they designed the city against terrorism threat without turning the cities into lock down. Bogota city of Columbia urban happiness movement is reviewed and compared with Kabul. The finding of research revealed that citizens of Kabul want security but not at the expense of public realm and creating the architecture of fear. It also indicates that increasing the T-walls do not give secure feeling but instead; it increases terror, hatred and affect people’s optimism. At the end, a series of recommendation is suggested on the issue.Keywords: anti-terror design, Kabul, T-Walls, urban happiness
Procedia PDF Downloads 170444 Secure and Privacy-Enhanced Blockchain-Based Authentication System for University User Management
Authors: Ali El Ksimi
Abstract:
In today's digital academic environment, secure authentication methods are essential for managing sensitive user data, including that of students and faculty. The rise in cyber threats and data breaches has exposed the vulnerabilities of traditional authentication systems used in universities. Passwords, often the first line of defense, are particularly susceptible to hacking, phishing, and brute-force attacks. While multi-factor authentication (MFA) provides an additional layer of security, it can still be compromised and often adds complexity and inconvenience for users. As universities seek more robust security measures, blockchain technology emerges as a promising solution. Renowned for its decentralization, immutability, and transparency, blockchain has the potential to transform how user management is conducted in academic institutions. In this article, we explore a system that leverages blockchain technology specifically for managing user accounts within a university setting. The system enables the secure creation and management of accounts for different roles, such as administrators, teachers, and students. Each user is authenticated through a decentralized application (DApp) that ensures their data is securely stored and managed on the blockchain. By eliminating single points of failure and utilizing cryptographic techniques, the system enhances the security and integrity of user management processes. We will delve into the technical architecture, security benefits, and implementation considerations of this approach. By integrating blockchain into user management, we aim to address the limitations of traditional systems and pave the way for the future of digital security in education.Keywords: blockchain, university, authentication, decentralization, cybersecurity, user management, privacy
Procedia PDF Downloads 23443 Integrated Free Space Optical Communication and Optical Sensor Network System with Artificial Intelligence Techniques
Authors: Yibeltal Chanie Manie, Zebider Asire Munyelet
Abstract:
5G and 6G technology offers enhanced quality of service with high data transmission rates, which necessitates the implementation of the Internet of Things (IoT) in 5G/6G architecture. In this paper, we proposed the integration of free space optical communication (FSO) with fiber sensor networks for IoT applications. Recently, free-space optical communications (FSO) are gaining popularity as an effective alternative technology to the limited availability of radio frequency (RF) spectrum. FSO is gaining popularity due to flexibility, high achievable optical bandwidth, and low power consumption in several applications of communications, such as disaster recovery, last-mile connectivity, drones, surveillance, backhaul, and satellite communications. Hence, high-speed FSO is an optimal choice for wireless networks to satisfy the full potential of 5G/6G technology, offering 100 Gbit/s or more speed in IoT applications. Moreover, machine learning must be integrated into the design, planning, and optimization of future optical wireless communication networks in order to actualize this vision of intelligent processing and operation. In addition, fiber sensors are important to achieve real-time, accurate, and smart monitoring in IoT applications. Moreover, we proposed deep learning techniques to estimate the strain changes and peak wavelength of multiple Fiber Bragg grating (FBG) sensors using only the spectrum of FBGs obtained from the real experiment.Keywords: optical sensor, artificial Intelligence, Internet of Things, free-space optics
Procedia PDF Downloads 63442 Memristor-A Promising Candidate for Neural Circuits in Neuromorphic Computing Systems
Authors: Juhi Faridi, Mohd. Ajmal Kafeel
Abstract:
The advancements in the field of Artificial Intelligence (AI) and technology has led to an evolution of an intelligent era. Neural networks, having the computational power and learning ability similar to the brain is one of the key AI technologies. Neuromorphic computing system (NCS) consists of the synaptic device, neuronal circuit, and neuromorphic architecture. Memristor are a promising candidate for neuromorphic computing systems, but when it comes to neuromorphic computing, the conductance behavior of the synaptic memristor or neuronal memristor needs to be studied thoroughly in order to fathom the neuroscience or computer science. Furthermore, there is a need of more simulation work for utilizing the existing device properties and providing guidance to the development of future devices for different performance requirements. Hence, development of NCS needs more simulation work to make use of existing device properties. This work aims to provide an insight to build neuronal circuits using memristors to achieve a Memristor based NCS. Here we throw a light on the research conducted in the field of memristors for building analog and digital circuits in order to motivate the research in the field of NCS by building memristor based neural circuits for advanced AI applications. This literature is a step in the direction where we describe the various Key findings about memristors and its analog and digital circuits implemented over the years which can be further utilized in implementing the neuronal circuits in the NCS. This work aims to help the electronic circuit designers to understand how the research progressed in memristors and how these findings can be used in implementing the neuronal circuits meant for the recent progress in the NCS.Keywords: analog circuits, digital circuits, memristors, neuromorphic computing systems
Procedia PDF Downloads 174441 Applying Concurrent Development Process for the Web Using Aspect-Oriented Approach
Authors: Hiroaki Fukuda
Abstract:
This paper shows a concurrent development process for modern web application, called Rich Internet Application (RIA), and describes its effect using a non-trivial application development. In the last years, RIAs such as Ajax and Flex have become popular based mainly on high-speed network. RIA provides sophisticated interfaces and user experiences, therefore, the development of RIA requires two kinds of engineer: a developer who implements business logic, and a designer who designs interface and experiences. Although collaborative works are becoming important for the development of RIAs, shared resources such as source code make it difficult. For example, if a design of interface is modified after developers have finished business logic implementations, they need to repeat the same implementations, and also tests to verify application’s behavior. MVC architecture and Object-oriented programming (OOP) enables to dividing an application into modules such as interfaces and logic, however, developers and/or designers have to write pieces of code (e.g., event handlers) that make these modules work as an application. On the other hand, Aspect-oriented programming (AOP) is ex- pected to solve complexity of application software development nowadays. AOP provides methods to separate crosscutting concerns that are scattered pieces of code from primary concerns. In this paper, we provide a concurrent development process for RIAs by introducing AOP concept. This process makes it possible to reduce shared resources between developers and designers, therefore they can perform their tasks concurrently. In addition, we describe experiences of development for a practical application using our proposed development process to show its availability.Keywords: aspect-oriented programming, concurrent, development process, rich internet application
Procedia PDF Downloads 301440 A Power Management System for Indoor Micro-Drones in GPS-Denied Environments
Authors: Yendo Hu, Xu-Yu Wu, Dylan Oh
Abstract:
GPS-Denied drones open the possibility of indoor applications, including dynamic arial surveillance, inspection, safety enforcement, and discovery. Indoor swarming further enhances these applications in accuracy, robustness, operational time, and coverage. For micro-drones, power management becomes a critical issue, given the battery payload restriction. This paper proposes an application enabling battery replacement solution that extends the micro-drone active phase without human intervention. First, a framework to quantify the effectiveness of a power management solution for a drone fleet is proposed. The operation-to-non-operation ratio, ONR, gives one a quantitative benchmark to measure the effectiveness of a power management solution. Second, a survey was carried out to evaluate the ONR performance for the various solutions. Third, through analysis, this paper proposes a solution tailored to the indoor micro-drone, suitable for swarming applications. The proposed automated battery replacement solution, along with a modified micro-drone architecture, was implemented along with the associated micro-drone. Fourth, the system was tested and compared with the various solutions within the industry. Results show that the proposed solution achieves an ONR value of 31, which is a 1-fold improvement of the best alternative option. The cost analysis shows a manufacturing cost of $25, which makes this approach viable for cost-sensitive markets (e.g., consumer). Further challenges remain in the area of drone design for automated battery replacement, landing pad/drone production, high-precision landing control, and ONR improvements.Keywords: micro-drone, battery swap, battery replacement, battery recharge, landing pad, power management
Procedia PDF Downloads 119439 Theatrical Architecture in Bologna at the Beginning of the Twentieth Century: The Renaissance of Modernissimo Cinema
Authors: Giorgia Predari, Riccardo Gulli
Abstract:
The paper describes the history and the stylistic choices adopted in the construction of Palazzo Ronzani in Bologna, which was the first building to rise after the heavy demolitions carried out in the historical center of the city at the beginning of the twentieth century. In 1910, the local administration adopted a detailed plan to change the aspect of the city, as it was already happening in the main European capitals. In this context, starting from 1911, the architect and scenographer Gualtiero Pontoni designed for Alessandro Ronzani -the owner of a well-known Bolognese beer company- his Palazzo, which is listed among the first multifunctional buildings in Bologna, containing offices, commercial activities, and entertainment spaces. In an area of about 2000 m², the architect was able to propose a theatre with a capacity of 2000 seats at the basement, shops, a cafè-chantant and a restaurant on the ground floor, clubs, studios and commercial stores on the mezzanine and the first plan, and a hotel on the upper floors. The whole core of the building, at the underground levels, consisted of a reinforced concrete frame (one of the first examples of this type of construction in the city), which allowed the hall to have a free span of 11 x 12 meters, and a height of about 9 meters. Used until 2007 as a cinema, the hall has remained then in disuse for almost 10 years, but now an important functional restoration project with a strong architectural and scenographic value is taking place. It will bring the spaces back to the original geometries, in a historical and artistic condition inspired by the styles of the early Twentieth century.Keywords: Modernissimo, Palazzo Ronzani, liberty, Bologna
Procedia PDF Downloads 120438 Exploring the Cultural Significance of Mural Paintings in the Tombs of Gilan, Iran: Evaluation of Drawn Figures
Authors: Zeinab Mirabulqasemi, Gholamali Hatam
Abstract:
This article discusses the significance of mural paintings in Iranian culture, particularly within the context of religious tombs known as Imamzadehs. These tombs, dedicated to Shiite imams and other revered religious figures, serve as important religious and communal spaces. The tradition of tomb construction evolved from early Islamic practices, gradually transforming burial sites into places of worship. In the Gilan region of Iran, these tombs hold a revered status, serving as focal points for religious observances and social gatherings. The murals adorning these tombs often depict religious motifs, with a particular emphasis on events like the Day of Judgment and the martyrdom of the Imams, notably the saga of Ashura. These paintings also reflect the community's social perspectives and historical allegiances. Various architectural styles are employed in constructing these tombs, including Islamic, traditional, local, and aesthetic architecture. However, the region's climate poses challenges to the preservation of these structures and their murals. Despite these challenges, efforts are made to document and preserve these artworks to ensure their accessibility for future generations. This research also studies tomb paintings by adopting a multifaceted approach, including library research, image analysis, and field research. Finally, it examines the portrayal of significant figures such as the Shiite imams, prophets, and Imamzadehs within these murals, highlighting their thematic significance and cultural importance.Keywords: cultural ritual, Shiite imams, mural, belief foundations, religious paintings
Procedia PDF Downloads 55437 Reading the Interior Furnishings of the Houses through Turkish Films in the 1980's
Authors: Dicle Aydın, Tuba Bulbul Bahtiyar, Esra Yaldız
Abstract:
Housing offers a confirmed space for individuals. In the sense of interior decoration design, housing is a kind of typology in which user’s profile and individual preferences are considered as primary determinants. In Turkish society, the transition from traditional residences to apartment buildings brings the change in interior fittings depending upon the location of houses in its wake. The social status of the users in the residence and the differences of their everyday life can be represented more evident in these interior fittings. Hence, space becomes a tool to carry the information of users and the act. From this aspect, space as a concrete tool also enables a multidirectional communication with the cinema which reflects the social, cultural and economic changes of the society. While space takes a virtual or real part of the cinema, architecture discipline has also been influenced by cinematic phenomenas in its own practice. The subject of the movie and its content commune with the space, therefore, the design of the space is formed to support the subject. The purpose of this study is to analyze the space through motion pictures that convey the information of social life with an objective perspective. In addition, this study aims to determine the space, fittings and the use of fittings with respect to the social status of users. Morever, three films in 1980s in which Kemal Sunal, protagonist of the scripts that reflect society in many ways, performed are examined in this study. Movie sets are considered in many ways. For instance, in one of these movies, different houses from an apartment are analyzed vis a vis the perspective of the study.Keywords: housing, interior, furniture, furnishing, user
Procedia PDF Downloads 202436 Covalently Conjugated Gold–Porphyrin Nanostructures
Authors: L. Spitaleri, C. M. A. Gangemi, R. Purrello, G. Nicotra, G. Trusso Sfrazzetto, G. Casella, M. Casarin, A. Gulino
Abstract:
Hybrid molecular–nanoparticle materials, obtained with a bottom-up approach, are suitable for the fabrication of functional nanostructures showing structural control and well-defined properties, i.e., optical, electronic or catalytic properties, in the perspective of applications in different fields of nanotechnology. Gold nanoparticles (Au NPs) exhibit important chemical, electronic and optical properties due to their size, shape and electronic structures. In fact, Au NPs containing no more than 30-40 atoms are only luminescent because they can be considered as large molecules with discrete energy levels, while nano-sized Au NPs only show the surface plasmon resonance. Hence, it appears that gold nanoparticles can alternatively be luminescent or plasmonic, and this represents a severe constraint for their use as an optical material. The aim of this work was the fabrication of nanoscale assembly of Au NPs covalently anchored to each other by means of novel bi-functional porphyrin molecules that work as bridges between different gold nanoparticles. This functional architecture shows a strong surface plasmon due to the Au nanoparticles and a strong luminescence signal coming from porphyrin molecules, thus, behaving like an artificial organized plasmonic and fluorescent network. The self-assembly geometry of this porphyrin on the Au NPs was studied by investigation of the conformational properties of the porphyrin derivative at the DFT level. The morphology, electronic structure and optical properties of the conjugated Au NPs – porphyrin system were investigated by TEM, XPS, UV–vis and Luminescence. The present nanostructures can be used for plasmon-enhanced fluorescence, photocatalysis, nonlinear optics, etc., under atmospheric conditions since our system is not reactive to air nor water and does not need to be stored in a vacuum or inert gas.Keywords: gold nanoparticle, porphyrin, surface plasmon resonance, luminescence, nanostructures
Procedia PDF Downloads 155435 Digital Platform for Psychological Assessment Supported by Sensors and Efficiency Algorithms
Authors: Francisco M. Silva
Abstract:
Technology is evolving, creating an impact on our everyday lives and the telehealth industry. Telehealth encapsulates the provision of healthcare services and information via a technological approach. There are several benefits of using web-based methods to provide healthcare help. Nonetheless, few health and psychological help approaches combine this method with wearable sensors. This paper aims to create an online platform for users to receive self-care help and information using wearable sensors. In addition, researchers developing a similar project obtain a solid foundation as a reference. This study provides descriptions and analyses of the software and hardware architecture. Exhibits and explains a heart rate dynamic and efficient algorithm that continuously calculates the desired sensors' values. Presents diagrams that illustrate the website deployment process and the webserver means of handling the sensors' data. The goal is to create a working project using Arduino compatible hardware. Heart rate sensors send their data values to an online platform. A microcontroller board uses an algorithm to calculate the sensor heart rate values and outputs it to a web server. The platform visualizes the sensor's data, summarizes it in a report, and creates alerts for the user. Results showed a solid project structure and communication from the hardware and software. The web server displays the conveyed heart rate sensor's data on the online platform, presenting observations and evaluations.Keywords: Arduino, heart rate BPM, microcontroller board, telehealth, wearable sensors, web-based healthcare
Procedia PDF Downloads 126