Search results for: collective animal behavior algorithm
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 11300

Search results for: collective animal behavior algorithm

9770 Fiqh Challenge in Production of Halal Pharmaceutical Products

Authors: Saadan Man, Razidah Othmanjaludin, Madiha Baharuddin

Abstract:

Nowadays, the pharmaceutical products are produced through the mixing of active and complex ingredient, naturally or synthetically; and involve extensive use of prohibited animal products. This article studies the challenges faced from fiqh perspective in the production of halal pharmaceutical products which frequently contain impure elements or prohibited animal derivatives according to Islamic law. This study is qualitative which adopts library research as well as field research by conducting series of interviews with the several related parties. The gathered data is analyzed from Sharia perspective by using some instruments especially the principle of Maqasid of Sharia. This study shows that the halal status of pharmaceutical products depends on the three basic elements: the sources of the basic ingredient; the processes involved in three phases of production, i.e., before, during and after; and the possible effects of the products. Various fiqh challenges need to be traversed in producing halal pharmaceutical products including the sources of the ingredients, the logistic process, the tools used, and the procedures of productions. Thus, the whole supply chain of production of pharmaceutical products must be well managed in accordance to the halal standard.

Keywords: fiqh, halal pharmaceutical, pharmaceutical products, Malaysia

Procedia PDF Downloads 180
9769 The Patterns and Levels of Physical Activity and Sedentary Behavior of Primary School Learners in Eastern Cape Province, South Africa

Authors: Howard Gomwe, Eunice Seekoe, Philemon Lyoka, Chioneso Show Marange, Dennyford Mafa

Abstract:

Background: This study was designed to assess PA levels and sedentary behavior among primary school learners in the Eastern Cape province of South Africa. Methods: A cross-sectional study was adopted to assess the patterns and levels of PA and sedentary behavior using the Physical Activity Questionnaire for Older Children (PAQ-C). Results: Using complete case analysis, 870 randomly selected participants (boys = 351 and girls = 519) aged 9 to 14 years were retained. The sample comprised of primary school learners, both boys and girls; aged 9-14 years old, who were randomly selected from rural, urban and peri-urban areas in the Eastern Cape Province of South Africa. Overly, the sample had a mean PAQ-C score of 2.33 ± 0.43. The mean of PA in boys was significantly higher (p = 0.003) in comparison with the girls. The 13 to 14 age group had a significantly higher PA level (p = 0.014). Learners from urban areas (n = 136; 77.3%) engaged more in sedentary behaviour as compared to those from rural areas (n = 252; 54.9%). Conclusion: The findings demonstrated low levels of PA and high engagement of sedentary behavior, which have negative implications on the health, growth and development of children. The study, therefore, recommends relevant stakeholders to implement interventions aimed to promote the increase in PA and reduction in sedentary behaviors for primary school learners in the Eastern Cape province in South Africa.

Keywords: learners, physical activity, sedentary behavior, south Africa

Procedia PDF Downloads 197
9768 An Ant Colony Optimization Approach for the Pollution Routing Problem

Authors: P. Parthiban, Sonu Rajak, N. Kannan, R. Dhanalakshmi

Abstract:

This paper deals with the Vehicle Routing Problem (VRP) with environmental considerations which is called Pollution Routing Problem (PRP). The objective is to minimize the operational and environmental costs. It consists of routing a number of vehicles to serve a set of customers, and determining fuel consumption, driver wages and their speed on each route segment, while respecting the capacity constraints and time windows. In this context, we presented an Ant Colony Optimization (ACO) approach, combined with a Speed Optimization Algorithm (SOA) to solve the PRP. The proposed solution method consists of two stages. Stage one is to solve a Vehicle Routing Problem with Time Window (VRPTW) using ACO and in the second stage a SOA is run on the resulting VRPTW solutions. Given a vehicle route, the SOA consists of finding the optimal speed on each arc of the route in order to minimize an objective function comprising fuel consumption costs and driver wages. The proposed algorithm tested on benchmark problem, the preliminary results show that the proposed algorithm is able to provide good solutions.

Keywords: ant colony optimization, CO2 emissions, combinatorial optimization, speed optimization, vehicle routing

Procedia PDF Downloads 305
9767 Experimental-Numerical Inverse Approaches in the Characterization and Damage Detection of Soft Viscoelastic Layers from Vibration Test Data

Authors: Alaa Fezai, Anuj Sharma, Wolfgang Mueller-Hirsch, André Zimmermann

Abstract:

Viscoelastic materials have been widely used in the automotive industry over the last few decades with different functionalities. Besides their main application as a simple and efficient surface damping treatment, they may ensure optimal operating conditions for on-board electronics as thermal interface or sealing layers. The dynamic behavior of viscoelastic materials is generally dependent on many environmental factors, the most important being temperature and strain rate or frequency. Prior to the reliability analysis of systems including viscoelastic layers, it is, therefore, crucial to accurately predict the dynamic and lifetime behavior of these materials. This includes the identification of the dynamic material parameters under critical temperature and frequency conditions along with a precise damage localization and identification methodology. The goal of this work is twofold. The first part aims at applying an inverse viscoelastic material-characterization approach for a wide frequency range and under different temperature conditions. For this sake, dynamic measurements are carried on a single lap joint specimen using an electrodynamic shaker and an environmental chamber. The specimen consists of aluminum beams assembled to adapter plates through a viscoelastic adhesive layer. The experimental setup is reproduced in finite element (FE) simulations, and frequency response functions (FRF) are calculated. The parameters of both the generalized Maxwell model and the fractional derivatives model are identified through an optimization algorithm minimizing the difference between the simulated and the measured FRFs. The second goal of the current work is to guarantee an on-line detection of the damage, i.e., delamination in the viscoelastic bonding of the described specimen during frequency monitored end-of-life testing. For this purpose, an inverse technique, which determines the damage location and size based on the modal frequency shift and on the change of the mode shapes, is presented. This includes a preliminary FE model-based study correlating the delamination location and size to the change in the modal parameters and a subsequent experimental validation achieved through dynamic measurements of specimen with different, pre-generated crack scenarios and comparing it to the virgin specimen. The main advantage of the inverse characterization approach presented in the first part resides in the ability of adequately identifying the material damping and stiffness behavior of soft viscoelastic materials over a wide frequency range and under critical temperature conditions. Classic forward characterization techniques such as dynamic mechanical analysis are usually linked to limitations under critical temperature and frequency conditions due to the material behavior of soft viscoelastic materials. Furthermore, the inverse damage detection described in the second part guarantees an accurate prediction of not only the damage size but also its location using a simple test setup and outlines; therefore, the significance of inverse numerical-experimental approaches in predicting the dynamic behavior of soft bonding layers applied in automotive electronics.

Keywords: damage detection, dynamic characterization, inverse approaches, vibration testing, viscoelastic layers

Procedia PDF Downloads 194
9766 Eating Behavior and Nutritional Status of Pregnant Women Living in Keserwan Lebanon

Authors: Cynthia Zgheib, Yonna Sacre

Abstract:

Pregnancy, this particular moment in the life of a woman, requires monitoring of eating behavior changes. However, the food choices during pregnancy should be varied and healthy, including the consumption of different food groups. Nutritional status is the process of acquisition and consumption of food. Therefore, a varied diet is associated with good nutritional status. This is why the nutrition education is a strategy commonly applied to improve maternal nutrition during pregnancy. Thus, it is crucial to assess 'The eating behavior and nutritional status of pregnant women living in Keserwan Lebanon.' In order to evaluate the association of different persona, socioeconomic and sociodemographic factors with the eating behavior and nutrition in the concerned study category, a cross-sectional descriptive study was conducted on a sample of 150 pregnant women aging between 18 and 40 years randomly selected from the hospitals and clinics located in Keserwan area and equally distributed between different cities and villages of the area according to altitude. The purpose of this study was to evaluate the eating behavior of the concerned population and to compare it to the recommendation of the food guide pyramid, their level of food awareness and finally to analyze their blood tests in order to detect any nutrients deficiency that they may face during the course of their pregnancy. Sociodemographic, lifestyle, eating behaviour, health, eating patterns, awareness, and food frequency questionnaire (FFQ) were collected through a validated questionnaire specifically adapted for the purpose of the study. Statistical analysis was carried out, and multivariate models were used in order to evaluate the association between several independent variables and the eating behaviour and nutritional status of Lebanese pregnant women The final analysis has shown that 48.7% of pregnant women were aged between 30 and 40 years old, 56% had a normal BMI between 18.5 and 24.9, thus age affects the eating behavior, so the older are the pregnant women, and the healthier is their eating behavior. In fact, 80.7% had acceptable food behavior which is based on an equilibrium between both quantity and quality of food, although the recommended foods are foods found in the food pyramid and available in the Lebanese diet. In addition, 68% had an acceptable level of awareness concerning the health importance of good eating habits, therefore, it is positively affecting their food choices. Moreover, 50 % have an acceptable nutritional status which is confirmed by their biological tests. Future governmental or national studies and programs could be settled aiming to increase the awareness about the good eating behaviors and nutritional status of Lebanese pregnant women.

Keywords: eating behavior, nutritional status, level of awareness, pregnant woman

Procedia PDF Downloads 246
9765 Crack Propagation Effect at the Interface of a Composite Beam

Authors: Mezidi Amar

Abstract:

In this research work, crack propagation at the interface of a composite beam is considered. The behavior of composite beams (CB) depends upon a law based on relationship between tangential or normal efforts with inelastic propagation. Throughout this study, composite beams are classified like composite beams with partial connection or sandwich beams of three layers. These structural systems are controlled by the same nature of differential equations regarding their behavior in the plane, as well as out-of-plane. Multi-layer elements with partial connection are typically met in the field of timber construction where the elements are assembled by joining. The formalism of the behavior in the plane and out-of-plane of these composite beams is obtained and their results concerning the engineering aspect or simple of interpretation are proposed for the case of composite beams made up of rectangular section and simply supported section. An apparent analytical peculiarity or paradox in the bending behavior of elastic–composite beams with interlayer slip, sandwich beam or other similar problems subjected to boundary moments exists. For a fully composite beam subjected to end moments, the partial composite model will render a non-vanishing uniform value for the normal force in the individual subelement. Obtained results are similar to those for the case of vibrations in the plane as well for the composite beams as for the sandwich beams where eigen-frequencies increase with related rigidity.

Keywords: composite beam, behaviour, interface, deflection, propagation

Procedia PDF Downloads 283
9764 The Role of Metaheuristic Approaches in Engineering Problems

Authors: Ferzat Anka

Abstract:

Many types of problems can be solved using traditional analytical methods. However, these methods take a long time and cause inefficient use of resources. In particular, different approaches may be required in solving complex and global engineering problems that we frequently encounter in real life. The bigger and more complex a problem, the harder it is to solve. Such problems are called Nondeterministic Polynomial time (NP-hard) in the literature. The main reasons for recommending different metaheuristic algorithms for various problems are the use of simple concepts, the use of simple mathematical equations and structures, the use of non-derivative mechanisms, the avoidance of local optima, and their fast convergence. They are also flexible, as they can be applied to different problems without very specific modifications. Thanks to these features, it can be easily embedded even in many hardware devices. Accordingly, this approach can also be used in trend application areas such as IoT, big data, and parallel structures. Indeed, the metaheuristic approaches are algorithms that return near-optimal results for solving large-scale optimization problems. This study is focused on the new metaheuristic method that has been merged with the chaotic approach. It is based on the chaos theorem and helps relevant algorithms to improve the diversity of the population and fast convergence. This approach is based on Chimp Optimization Algorithm (ChOA), that is a recently introduced metaheuristic algorithm inspired by nature. This algorithm identified four types of chimpanzee groups: attacker, barrier, chaser, and driver, and proposed a suitable mathematical model for them based on the various intelligence and sexual motivations of chimpanzees. However, this algorithm is not more successful in the convergence rate and escaping of the local optimum trap in solving high-dimensional problems. Although it and some of its variants use some strategies to overcome these problems, it is observed that it is not sufficient. Therefore, in this study, a newly expanded variant is described. In the algorithm called Ex-ChOA, hybrid models are proposed for position updates of search agents, and a dynamic switching mechanism is provided for transition phases. This flexible structure solves the slow convergence problem of ChOA and improves its accuracy in multidimensional problems. Therefore, it tries to achieve success in solving global, complex, and constrained problems. The main contribution of this study is 1) It improves the accuracy and solves the slow convergence problem of the ChOA. 2) It proposes new hybrid movement strategy models for position updates of search agents. 3) It provides success in solving global, complex, and constrained problems. 4) It provides a dynamic switching mechanism between phases. The performance of the Ex-ChOA algorithm is analyzed on a total of 8 benchmark functions, as well as a total of 2 classical and constrained engineering problems. The proposed algorithm is compared with the ChoA, and several well-known variants (Weighted-ChoA, Enhanced-ChoA) are used. In addition, an Improved algorithm from the Grey Wolf Optimizer (I-GWO) method is chosen for comparison since the working model is similar. The obtained results depict that the proposed algorithm performs better or equivalently to the compared algorithms.

Keywords: optimization, metaheuristic, chimp optimization algorithm, engineering constrained problems

Procedia PDF Downloads 62
9763 Proposing an Algorithm to Cluster Ad Hoc Networks, Modulating Two Levels of Learning Automaton and Nodes Additive Weighting

Authors: Mohammad Rostami, Mohammad Reza Forghani, Elahe Neshat, Fatemeh Yaghoobi

Abstract:

An Ad Hoc network consists of wireless mobile equipment which connects to each other without any infrastructure, using connection equipment. The best way to form a hierarchical structure is clustering. Various methods of clustering can form more stable clusters according to nodes' mobility. In this research we propose an algorithm, which allocates some weight to nodes based on factors, i.e. link stability and power reduction rate. According to the allocated weight in the previous phase, the cellular learning automaton picks out in the second phase nodes which are candidates for being cluster head. In the third phase, learning automaton selects cluster head nodes, member nodes and forms the cluster. Thus, this automaton does the learning from the setting and can form optimized clusters in terms of power consumption and link stability. To simulate the proposed algorithm we have used omnet++4.2.2. Simulation results indicate that newly formed clusters have a longer lifetime than previous algorithms and decrease strongly network overload by reducing update rate.

Keywords: mobile Ad Hoc networks, clustering, learning automaton, cellular automaton, battery power

Procedia PDF Downloads 395
9762 A Bivariate Inverse Generalized Exponential Distribution and Its Applications in Dependent Competing Risks Model

Authors: Fatemah A. Alqallaf, Debasis Kundu

Abstract:

The aim of this paper is to introduce a bivariate inverse generalized exponential distribution which has a singular component. The proposed bivariate distribution can be used when the marginals have heavy-tailed distributions, and they have non-monotone hazard functions. Due to the presence of the singular component, it can be used quite effectively when there are ties in the data. Since it has four parameters, it is a very flexible bivariate distribution, and it can be used quite effectively for analyzing various bivariate data sets. Several dependency properties and dependency measures have been obtained. The maximum likelihood estimators cannot be obtained in closed form, and it involves solving a four-dimensional optimization problem. To avoid that, we have proposed to use an EM algorithm, and it involves solving only one non-linear equation at each `E'-step. Hence, the implementation of the proposed EM algorithm is very straight forward in practice. Extensive simulation experiments and the analysis of one data set have been performed. We have observed that the proposed bivariate inverse generalized exponential distribution can be used for modeling dependent competing risks data. One data set has been analyzed to show the effectiveness of the proposed model.

Keywords: Block and Basu bivariate distributions, competing risks, EM algorithm, Marshall-Olkin bivariate exponential distribution, maximum likelihood estimators

Procedia PDF Downloads 122
9761 Shear Behavior of Ultra High Strength Concrete Beams

Authors: Ghada Diaa, Enas A. Khattab

Abstract:

Ultra High Strength Concrete (UHSC) is a new advanced concrete that is being transferred from laboratory researches to practicable applications. In addition to its excellent durability properties, UHSC has high compressive and tensile strengths, and high modulus of elasticity. Despite of this low degree of hydration, ultra high strength values can be achieved by controlling the mixture proportions. In this research, an experimental program was carried out to investigate the shear behavior of ultra high strength concrete beams. A total of nine beams were tested to determine the effect of different parameters on the shear behavior of UHSC beams. The parameters include concrete strength, steel fiber volume, shear span to depth ratio, and web reinforcement ratio. The results demonstrated that nominal shear stress at cracking load and at ultimate load increased with the increase of concrete strength or the decrease in shear span-depth ratio. Using steel fibers or shear reinforcement increases the ultimate shear strength and makes the shear behavior more ductile. In this study, a simplified analytical model to calculate the shear strength of UHSC beams is introduced. Shear strength estimated according to the proposed method in this research is in good agreement with the experimental results.

Keywords: ultra high strength, shear strength, diagonal, cracking, steel fibers

Procedia PDF Downloads 598
9760 Reversible Information Hitting in Encrypted JPEG Bitstream by LSB Based on Inherent Algorithm

Authors: Vaibhav Barve

Abstract:

Reversible information hiding has drawn a lot of interest as of late. Being reversible, we can restore unique computerized data totally. It is a plan where mystery data is put away in digital media like image, video, audio to maintain a strategic distance from unapproved access and security reason. By and large JPEG bit stream is utilized to store this key data, first JPEG bit stream is encrypted into all around sorted out structure and then this secret information or key data is implanted into this encrypted region by marginally changing the JPEG bit stream. Valuable pixels suitable for information implanting are computed and as indicated by this key subtle elements are implanted. In our proposed framework we are utilizing RC4 algorithm for encrypting JPEG bit stream. Encryption key is acknowledged by framework user which, likewise, will be used at the time of decryption. We are executing enhanced least significant bit supplanting steganography by utilizing genetic algorithm. At first, the quantity of bits that must be installed in a guaranteed coefficient is versatile. By utilizing proper parameters, we can get high capacity while ensuring high security. We are utilizing logistic map for shuffling of bits and utilization GA (Genetic Algorithm) to find right parameters for the logistic map. Information embedding key is utilized at the time of information embedding. By utilizing precise picture encryption and information embedding key, the beneficiary can, without much of a stretch, concentrate the incorporated secure data and totally recoup the first picture and also the original secret information. At the point when the embedding key is truant, the first picture can be recouped pretty nearly with sufficient quality without getting the embedding key of interest.

Keywords: data embedding, decryption, encryption, reversible data hiding, steganography

Procedia PDF Downloads 278
9759 The Influence of Basalt and Steel Fibers on the Flexural Behavior of RC Beams

Authors: Yasmin Z. Murad, Haneen M. Abdl-Jabbar

Abstract:

An experimental program is conducted in this research to investigate the influence of basalt fibers and steel fibers on the flexural behavior of RC beams. Reinforced concrete beams are constructed using steel fiber concrete and basalt fiber concrete. Steel and basalt fibers are included in a percentage of 15% and 2.5% of the total cement weight, respectively. Test results have shown that basalt fibers have increased the load carrying capacity of the beams up to 30% and the maximum deflection to almost 2.4 times that measured in the control specimen. It has also shown that steel fibers have increased the load carrying capacity of the beams up to 47% and the ultimate deflection is almost duplicated compared to the control beam. Steel and basalt fibers have increased the ductility of the reinforced concrete beams.

Keywords: basalt fiber, steel fiber, reinforced concrete beams, flexural behavior

Procedia PDF Downloads 134
9758 K-Means Based Matching Algorithm for Multi-Resolution Feature Descriptors

Authors: Shao-Tzu Huang, Chen-Chien Hsu, Wei-Yen Wang

Abstract:

Matching high dimensional features between images is computationally expensive for exhaustive search approaches in computer vision. Although the dimension of the feature can be degraded by simplifying the prior knowledge of homography, matching accuracy may degrade as a tradeoff. In this paper, we present a feature matching method based on k-means algorithm that reduces the matching cost and matches the features between images instead of using a simplified geometric assumption. Experimental results show that the proposed method outperforms the previous linear exhaustive search approaches in terms of the inlier ratio of matched pairs.

Keywords: feature matching, k-means clustering, SIFT, RANSAC

Procedia PDF Downloads 342
9757 Short-Term Load Forecasting Based on Variational Mode Decomposition and Least Square Support Vector Machine

Authors: Jiangyong Liu, Xiangxiang Xu, Bote Luo, Xiaoxue Luo, Jiang Zhu, Lingzhi Yi

Abstract:

To address the problems of non-linearity and high randomness of the original power load sequence causing the degradation of power load forecasting accuracy, a short-term load forecasting method is proposed. The method is based on the Least Square Support Vector Machine optimized by an Improved Sparrow Search Algorithm combined with the Variational Mode Decomposition proposed in this paper. The application of the variational mode decomposition technique decomposes the raw power load data into a series of Intrinsic Mode Functions components, which can reduce the complexity and instability of the raw data while overcoming modal confounding; the proposed improved sparrow search algorithm can solve the problem of difficult selection of learning parameters in the least Square Support Vector Machine. Finally, through comparison experiments, the results show that the method can effectively improve prediction accuracy.

Keywords: load forecasting, variational mode decomposition, improved sparrow search algorithm, least square support vector machine

Procedia PDF Downloads 83
9756 New Subculture in Social Media

Authors: Maryam Mousivand

Abstract:

Subculture is one of the important concepts in social sciences and the field of cultural studies, which falls under the huge concept of culture. In general, subculture is a kind of movement and experience of collective resistance that is manifested by a population as a reaction against the acceptance of official identities approved by custom and society. Subcultures exist in the virtual world in the new era, and they emerged in various forms, such as the emergence of a subculture under common concepts and interests in the form of sites, channels, and groups of virtual space, which will be discussed in this article.

Keywords: subculture, social media, cultural studies, culture

Procedia PDF Downloads 107
9755 Testing the Capital Structure Behavior of Malaysian Firms: Shariah vs. Non-Shariah Compliant

Authors: Asyraf Abdul Halim, Mohd Edil Abd Sukor, Obiyathulla Ismath Bacha

Abstract:

This paper attempts to investigate the capital structure behavior of Shariah compliant firms of various levels as well those firms who are consistently Shariah non-compliant in Malaysia. The paper utilizes a unique dataset of firms of the heterogeneous level of Shariah-compliancy status over a 20 year period from the year 1997 to 2016. The paper focuses on the effects of dynamic forces behind capital structure variation such as the optimal capital structure behavior based on the trade-off, pecking order, market timing and firmly fixed effect models of capital structure. This study documents significant evidence in support of the trade-off theory with a high speed of adjustment (SOA) as well as for the time-invariant firm fixed effects across all Shariah compliance group.

Keywords: capital structure, market timing, trade-off theory, equity risk premium, Shariah-compliant firms

Procedia PDF Downloads 297
9754 Seismic Behavior of Short Core Buckling Restrained Braces

Authors: Nader Hoveidae

Abstract:

This paper investigates the seismic behavior of a new type of buckling restrained braces (BRBs) called "Short Core BRBs" in which a shorter core segment is used as an energy dissipating part and an elastic part is serially connected to the core. It seems that a short core BRB is easy to be fabricated, inspected and replaced after a severe earthquake. In addition, the energy dissipating capacity in a short core BRB is higher because of larger core strains. However, higher core strain demands result in high potential of low-cycle fatigue fracture. In this paper, a strategy is proposed to estimate the minimum core length in a short core BRBs. The seismic behavior of short core buckling restrained brace is experimentally examined. The results revealed that the short core buckling restrained brace is able to sustain large inelastic strains without any significant instability or strength degradation.

Keywords: short core, Buckling Restrained Brace, finite element analysis, cyclic test

Procedia PDF Downloads 345
9753 FPGA Implementation of RSA Encryption Algorithm for E-Passport Application

Authors: Khaled Shehata, Hanady Hussien, Sara Yehia

Abstract:

Securing the data stored on E-passport is a very important issue. RSA encryption algorithm is suitable for such application with low data size. In this paper the design and implementation of 1024 bit-key RSA encryption and decryption module on an FPGA is presented. The module is verified through comparing the result with that obtained from MATLAB tools. The design runs at a frequency of 36.3 MHz on Virtex-5 Xilinx FPGA. The key size is designed to be 1024-bit to achieve high security for the passport information. The whole design is achieved through VHDL design entry which makes it a portable design and can be directed to any hardware platform.

Keywords: RSA, VHDL, FPGA, modular multiplication, modular exponential

Procedia PDF Downloads 375
9752 Design and Implementation of an Image Based System to Enhance the Security of ATM

Authors: Seyed Nima Tayarani Bathaie

Abstract:

In this paper, an image-receiving system was designed and implemented through optimization of object detection algorithms using Haar features. This optimized algorithm served as face and eye detection separately. Then, cascading them led to a clear image of the user. Utilization of this feature brought about higher security by preventing fraud. This attribute results from the fact that services will be given to the user on condition that a clear image of his face has already been captured which would exclude the inappropriate person. In order to expedite processing and eliminating unnecessary ones, the input image was compressed, a motion detection function was included in the program, and detection window size was confined.

Keywords: face detection algorithm, Haar features, security of ATM

Procedia PDF Downloads 399
9751 Seismic Response of Moment Resisting Steel Frame with Hysteresis Envelope Model of Joints

Authors: Krolo Paulina

Abstract:

The seismic response of moment-resisting steel frames depends on the behavior of the joints, especially when they are considered as ductile zones. The aim of this research is to provide a realistic assessment of the moment-resisting steel frame behavior under seismic loading using nonlinear static pushover analysis (N2 method). The hysteresis behavior of the joints in the frame model was described using a new hysteresis envelope model. The obtained seismic response was compared with the results of the seismic analysis obtained for the same steel frame that takes into account the monotonic model of the joints.

Keywords: beam-to-column joints, hysteresis envelope model, moment-resisting frame, nonlinear static pushover analysis, N2 method

Procedia PDF Downloads 255
9750 Particle Swarm Optimization Algorithm vs. Genetic Algorithm for Image Watermarking Based Discrete Wavelet Transform

Authors: Omaima N. Ahmad AL-Allaf

Abstract:

Over communication networks, images can be easily copied and distributed in an illegal way. The copyright protection for authors and owners is necessary. Therefore, the digital watermarking techniques play an important role as a valid solution for authority problems. Digital image watermarking techniques are used to hide watermarks into images to achieve copyright protection and prevent its illegal copy. Watermarks need to be robust to attacks and maintain data quality. Therefore, we discussed in this paper two approaches for image watermarking, first is based on Particle Swarm Optimization (PSO) and the second approach is based on Genetic Algorithm (GA). Discrete wavelet transformation (DWT) is used with the two approaches separately for embedding process to cover image transformation. Each of PSO and GA is based on co-relation coefficient to detect the high energy coefficient watermark bit in the original image and then hide the watermark in original image. Many experiments were conducted for the two approaches with different values of PSO and GA parameters. From experiments, PSO approach got better results with PSNR equal 53, MSE equal 0.0039. Whereas GA approach got PSNR equal 50.5 and MSE equal 0.0048 when using population size equal to 100, number of iterations equal to 150 and 3×3 block. According to the results, we can note that small block size can affect the quality of image watermarking based PSO/GA because small block size can increase the search area of the watermarking image. Better PSO results were obtained when using swarm size equal to 100.

Keywords: image watermarking, genetic algorithm, particle swarm optimization, discrete wavelet transform

Procedia PDF Downloads 213
9749 Effect of Stiffeners on the Behavior of Slender Built up Steel I-Beams

Authors: M. E. Abou-Hashem El Dib, M. K. Swailem, M. M. Metwally, A. I. El Awady

Abstract:

This paper presents the effect of stiffeners on the behavior of slender steel I-beams. Nonlinear three dimensional finite element models are developed to represent the stiffened steel I-beams. The well established finite element (ANSYS 13.0) program is used to simulate the geometric and material nonlinear nature of the problem. Verification is achieved by comparing the obtained numerical results with the results of previous published experimental work. The parameters considered in the analysis are the horizontal stiffener's position and the horizontal stiffener's dimensions as well as the number of vertical stiffeners. The studied dimensions of the horizontal stiffeners include the stiffener width, the stiffener thickness and the stiffener length. The results of the achieved numerical parametric study for slender steel I-beams show the significant effect of stiffeners on the beam behavior and its failure load.

Keywords: beams, local buckling, slender, stiffener, thin walled section

Procedia PDF Downloads 268
9748 A Multimodal Dialogue Management System for Achieving Natural Interaction with Embodied Conversational Agents

Authors: Ozge Nilay Yalcin

Abstract:

Dialogue has been proposed to be the natural basis for the human-computer interaction, which is behaviorally rich and includes different modalities such as gestures, posture changes, gaze, para-linguistic parameters and linguistic context. However, equipping the system with these capabilities might have consequences on the usability of the system. One issue is to be able to find a good balance between rich behavior and fluent behavior, as planning and generating these behaviors is computationally expensive. In this work, we propose a multi-modal dialogue management system that automates the conversational flow from text-based dialogue examples and uses synchronized verbal and non-verbal conversational cues to achieve a fluent interaction. Our system is integrated with Smartbody behavior realizer to provide real-time interaction with embodied agent. The nonverbal behaviors are used according to turn-taking behavior, emotions, and personality of the user and linguistic analysis of the dialogue. The verbal behaviors are responsive to the emotional value of the utterance and the feedback from the user. Our system is aimed for online planning of these affective multi-modal components, in order to achieve enhanced user experience with richer and more natural interaction.

Keywords: affect, embodied conversational agents, human-agent interaction, multimodal interaction, natural interfaces

Procedia PDF Downloads 160
9747 Markov Random Field-Based Segmentation Algorithm for Detection of Land Cover Changes Using Uninhabited Aerial Vehicle Synthetic Aperture Radar Polarimetric Images

Authors: Mehrnoosh Omati, Mahmod Reza Sahebi

Abstract:

The information on land use/land cover changing plays an essential role for environmental assessment, planning and management in regional development. Remotely sensed imagery is widely used for providing information in many change detection applications. Polarimetric Synthetic aperture radar (PolSAR) image, with the discrimination capability between different scattering mechanisms, is a powerful tool for environmental monitoring applications. This paper proposes a new boundary-based segmentation algorithm as a fundamental step for land cover change detection. In this method, first, two PolSAR images are segmented using integration of marker-controlled watershed algorithm and coupled Markov random field (MRF). Then, object-based classification is performed to determine changed/no changed image objects. Compared with pixel-based support vector machine (SVM) classifier, this novel segmentation algorithm significantly reduces the speckle effect in PolSAR images and improves the accuracy of binary classification in object-based level. The experimental results on Uninhabited Aerial Vehicle Synthetic Aperture Radar (UAVSAR) polarimetric images show a 3% and 6% improvement in overall accuracy and kappa coefficient, respectively. Also, the proposed method can correctly distinguish homogeneous image parcels.

Keywords: coupled Markov random field (MRF), environment, object-based analysis, polarimetric SAR (PolSAR) images

Procedia PDF Downloads 203
9746 Efficient Storage in Cloud Computing by Using Index Replica

Authors: Bharat Singh Deora, Sushma Satpute

Abstract:

Cloud computing is based on resource sharing. Like other resources which can be shareable, storage is a resource which can be shared. We can use collective resources of storage from different locations and maintain a central index table for storage details. The storage combining of different places can form a suitable data storage which is operated from one location and is very economical. Proper storage of data should improve data reliability & availability and bandwidth utilization. Also, we are moving the contents of one storage to other according to our need.

Keywords: cloud computing, cloud storage, Iaas, PaaS, SaaS

Procedia PDF Downloads 320
9745 Coating Solutions: Study of Rheology Behavior

Authors: D. Abid, A. Guettar, A. Toubane, A. Bouda, K. Daoud

Abstract:

The aim of this work is to study coating formulations rheology. Fourteen solutions were prepared with Hydroxypropyl methylcellulose (HPMC) percentage which varies from 2 to 20 %, Ethyl cellulose (EC) percentage varying from 1 to 3 % and Titanium dioxide (TiO2) percentage which vary from 1 to 3%, Opadry solution (25%) was used as a reference for this study. Two behaviors appeared obviously ‘pseudo plastic’ and ‘dilatant’ related to the percentage of HPMC, this allowed us to define that HPMC is the polymer which influence the behavior of coating solutions.

Keywords: rheology, opadry, HPMC, B1-B6 tablets

Procedia PDF Downloads 249
9744 Behavior Adoption on Marine Habitat Conservation in Indonesia

Authors: Muhammad Yayat Afianto, Darmawan, Agung Putra Utama, Hari Kushardanto

Abstract:

Fish Forever, Rare’s innovative coastal fisheries program, combined community-based conservation management approach with spatial management to restore and protect Indonesia’s small-scale fisheries by establishing Fishing Managed Access Area. A ‘TURF-Reserve’ is a fishery management approach that positions fishers at the center of fisheries management, empowering them to take care of and make decisions about the future of their fishery. After two years of the program, social marketing campaigns succeeded in changing their behavior by adopting the new conservation behavior. The Pride-TURF-R campaigns developed an overarching hypothesis of impact that captured the knowledge, attitude and behavior changes needed to reduce threats and achieve conservation results. Rare help Batu Belah fishers to develop their group, developed with their roles, sustainable fisheries plan, and the budget plan. On 12th February 2017, the Head of Loka Kawasan Konservasi Perairan Nasional (LKKPN) which is a Technical Implementation Unit for National Marine Conservation Areas directly responsible to the Directorate General for Marine Spatial Management in the Ministry of Marine Affairs and Fisheries had signed a Partnership Agreement with the Head of Batu Belah Village to manage a TURF+Reserve area as wide as 909 hectares. The fishers group have been collecting the catch and submitting the report monthly, initiated the installation of the buoy markers for the No Take Zone, and formed the Pokmaswas (community-based surveillance group). Prior to this behavior adoption, they don’t have any fisheries data, no group of fishers, and they have still fishing inside the No Take Zone. This is really a new behavior adoption for them. This paper will show the process and success story of the social marketing campaign to conserve marine habitat in Anambas through Pride-TURF-R program.

Keywords: behavior adoption, community participation, no take zone, pride-TURF-R

Procedia PDF Downloads 253
9743 Giving Right-of-Way to Emergency Ambulances: Attitude and Behavior of Road Users in Developing Countries

Authors: Mahmoud T. Alwidyan, Ahmad Alrawashdeh, Alaa O. Oteir

Abstract:

Background: Emergency medical service (EMS) providers, oftentimes, use the lights and sirens (L&S) of their ambulances to warn road users, navigate through traffic, and expedite transport to save lives of ill and injured patients. Despite the contribution of road users in the effectiveness of reducing transport time of EMS ambulances using L&S, there is a lack of empirical assessments exploring the road user’s attitude and behavior in such situations. This study, therefore, aimed to assess the attitude and behavior of road users in response to EMS ambulances with warning L&S in use. Methods: This was a cross-sectional survey developed and distributed to adult road users in Northern Jordan. The questionnaire included 20 items addressing demographics, attitudes, and behavior toward emergency ambulances. We described the participants’ responses and assessed the association between demographics and attitude statements using logistic regression. Results: A total of 1302 questionnaires were complete and appropriate for analysis. The mean age was 34.2 (SD± 11.4) years, and the majority were males (72.6%). About half of road users (47.9%) in our sample would perform inappropriate action in response to EMS ambulances with L&S in use. The multivariate logistic regression model show that being female (OR, 0.63; 95% CI = 0.48-0.81), more educated (OR, 0.68; 95% CI = 0.53-0.86), or public transport driver (OR, 0.55; 95% CI = 0.34-0.90) is significantly associated with inappropriate response to EMS ambulances. Additionally, a significant proportion of road users may perform inappropriate and lawless driving practices such as crossing red traffic lights or following the passing by EMS ambulances, which would, in turn, increase the risk on ambulances and other road users. Conclusions: A large proportion of road users in Jordan may respond inappropriately to the EMS ambulances, and many engage in risky driving behaviors due perhaps to the lack of procedural knowledge. Policy-related interventions and educational programs are crucially needed to increase public awareness of the traffic law concerning EMS ambulances and to enhance appropriate driving behavior, which, in turn, improves the efficiency of ambulance services.

Keywords: EMS ambulances, lights and sirens, road users, attitude and behavior

Procedia PDF Downloads 69
9742 Effect of Heat Treatment on the Corrosion Behavior of Stainless Steel

Authors: Altoumi Alndalusi

Abstract:

The work examines the aqueous corrosion behavior of grades of stain less steel which are used as corrosion resistant castings for applications such as valve and pump bodies. The corrosion behavior of steels in the as-cast condition has been examined using potentiostatic studies to illustrate the need for correct thermal treatment. A metallurgical examination and chemical analysis were carried out to establish the morphology of the steel structure. Heat treatment was carried out in order to compare damage in relation to microstructure. Optical and scanning electron microscopy examinations confirmed that the austenitic steels suffers from severe localized inter-dendritic pitting attack, while non homogenized castings highly alloyed duplex steels gave inferior corrosion resistance. Through the heat treatment conditions a significant of phase transformation of the duplex steel C were occurred (from ferrite to austenite and sigma plus carbides) and were gave reduction resistance.

Keywords: cast, corrosion, duplex stainless, heat treatment, material, steel

Procedia PDF Downloads 164
9741 Location Detection of Vehicular Accident Using Global Navigation Satellite Systems/Inertial Measurement Units Navigator

Authors: Neda Navidi, Rene Jr. Landry

Abstract:

Vehicle tracking and accident recognizing are considered by many industries like insurance and vehicle rental companies. The main goal of this paper is to detect the location of a car accident by combining different methods. The methods, which are considered in this paper, are Global Navigation Satellite Systems/Inertial Measurement Units (GNSS/IMU)-based navigation and vehicle accident detection algorithms. They are expressed by a set of raw measurements, which are obtained from a designed integrator black box using GNSS and inertial sensors. Another concern of this paper is the definition of accident detection algorithm based on its jerk to identify the position of that accident. In fact, the results convinced us that, even in GNSS blockage areas, the position of the accident could be detected by GNSS/INS integration with 50% improvement compared to GNSS stand alone.

Keywords: driver behavior monitoring, integration, IMU, GNSS, monitoring, tracking

Procedia PDF Downloads 210