Search results for: shortest path problem
6754 Desing of PSS and SVC to Improve Power System Stability
Authors: Mahmoud Samkan
Abstract:
In this paper, the design and assessment of new coordination between Power System Stabilizers (PSSs) and Static Var Compensator (SVC) in a multimachine power system via statistical method are proposed. The coordinated design problem of PSSs and SVC over a wide range of loading conditions is handled as an optimization problem. The Bacterial Swarming Optimization (BSO), which synergistically couples the Bacterial Foraging (BF) with the Particle Swarm Optimization (PSO), is employed to seek for optimal controllers parameters. By minimizing the proposed objective function, in which the speed deviations between generators are involved; stability performance of the system is enhanced. To compare the capability of PSS and SVC, both are designed independently, and then in a coordinated manner. Simultaneous tuning of the BSO based coordinated controller gives robust damping performance over wide range of operating conditions and large disturbance in compare to optimized PSS controller based on BSO (BSOPSS) and optimized SVC controller based on BSO (BSOSVC). Moreover, a statistical T test is executed to validate the robustness of coordinated controller versus uncoordinated one.Keywords: SVC, PSSs, multimachine power system, coordinated design, bacteria swarm optimization, statistical assessment
Procedia PDF Downloads 3796753 Performance Evaluation of Vertical Handover on Silom Line BTS
Authors: Silumpa Suboonsan, Suwat Pattaramalai
Abstract:
In this paper, the performance of internet usage by using Vertical Handover (VHO) between cellular network and wireless local area network (WLAN) on Silom line Bangkok Mass Transit System (BTS) is evaluated. In the evaluation model, there is the WLAN on every BTS station and there are cellular base stations along the BTS path. The maximum data rates for cellular network are 7.2, 14.4, 42, and 100Mbps and for WLAN are 54, 150, and 300Mbps. The simulation are based on users using internet, watching VDOs and browsing web pages, on the BTS train from first station to the last station (full time usage) and on the BTS train for traveling some number of stations (random time). The results shows that VHO system has throughput a lot more than using only cellular network when the data rate of WLAN is more than one of cellular network. Lastly, the number of watching HD VDO and Full HD VDO is higher on VHO system on both regular time and rush hour of BTS travelling.Keywords: vertical handover, WLAN, cellular, silom line BTS
Procedia PDF Downloads 4796752 Green Growth in Kazakhstan: Political Leadership, Business Strategies and Environmental Fiscal Reform for Competitive System Change
Authors: A. S. Salimzhanova, J. C. Sardinas, O. A. Yanovskaya
Abstract:
The objective of this research work is to discuss the concept of green growth in the Republic of Kazakhstan introduced by its government in the National Sustainable Development Strategy with the objective of transition to a resource-efficient, green economy. We believe that emerging economies like Kazakhstan can pursue a cleaner and more efficient development path by introducing an environmental tax system based on resource consumption rather than only income and labor. The key issues discussed in this article are the eco-efficiency, which refers to closing the gap between economic and ecological efficiencies, and the structural change of the economy toward green growth. We also strongly believe that studying the experience of East Asian countries on green reform including eco-innovation and green solutions in business is essential to the case of Kazakhstan. All of these will raise the status of Kazakhstan to the level of one of the thirty developed countries over the next decades.Keywords: economic strategy, green growth, green solutions, natural resource management, environmental tax system
Procedia PDF Downloads 2836751 Double Layer Security Model for Identification Friend or Foe
Authors: Buse T. Aydın, Enver Ozdemir
Abstract:
In this study, a double layer authentication scheme between the aircraft and the Air Traffic Control (ATC) tower is designed to prevent any unauthorized aircraft from introducing themselves as friends. The method is a combination of classical cryptographic methods and new generation physical layers. The first layer has employed the embedded key of the aircraft. The embedded key is assumed to installed during the construction of the utility. The other layer is a physical attribute (flight path, distance, etc.) between the aircraft and the ATC tower. We create a mathematical model so that two layers’ information is employed and an aircraft is authenticated as a friend or foe according to the accuracy of the results of the model. The results of the aircraft are compared with the results of the ATC tower and if the values found by the aircraft and ATC tower match within a certain error margin, we mark the aircraft as a friend. In this method, even if embedded key is captured by the enemy aircraft, without the information of the second layer, the enemy can easily be determined. Overall, in this work, we present a more reliable system by adding a physical layer in the authentication process.Keywords: ADS-B, communication with physical layer security, cryptography, identification friend or foe
Procedia PDF Downloads 1646750 Accelerated Expansion of a Matter-Antimatter Universe and Gravity as an Electromagnetic Force
Authors: Maarten J. Van der Burgt
Abstract:
A universe containing matter and antimatter can only exist when matter and antimatter repel each other. Such a system, where like attracts like and like repels unlike, will always expand. Calculations made for such a symmetric universe demonstrate that the expansion is consistent with Hubble’s law, the observed increase in the expansion velocity with time, the initial high acceleration and the foam structure of the universe. Conversely, these observations can be considered as proof for a symmetrical universe and for antimatter possessing a negative gravitational mass. A second proof can be found by reinterpreting the behavior of relativistic moving charged particles. Attributing their behavior to a charge defect of √(1-v2/c2) instead of to a mass defect of 1/√(1-v2/c2) makes it plausible that gravitation is an electromagnetic force, as already suggested by Feynman. This would automatically imply that antimatter has a negative gravitational mass. These proofs underpin the untenability of the Weak Equivalence Principle which states that in a gravitational field all structure less point-like particles follow the same path.Keywords: celestial mechanics, cosmology, gravitation astrophysics, origin of structure, miscellaneous (matter and antimatter)
Procedia PDF Downloads 2316749 Parameter Tuning of Complex Systems Modeled in Agent Based Modeling and Simulation
Authors: Rabia Korkmaz Tan, Şebnem Bora
Abstract:
The major problem encountered when modeling complex systems with agent-based modeling and simulation techniques is the existence of large parameter spaces. A complex system model cannot be expected to reflect the whole of the real system, but by specifying the most appropriate parameters, the actual system can be represented by the model under certain conditions. When the studies conducted in recent years were reviewed, it has been observed that there are few studies for parameter tuning problem in agent based simulations, and these studies have focused on tuning parameters of a single model. In this study, an approach of parameter tuning is proposed by using metaheuristic algorithms such as Genetic Algorithm (GA), Particle Swarm Optimization (PSO), Artificial Bee Colonies (ABC), Firefly (FA) algorithms. With this hybrid structured study, the parameter tuning problems of the models in the different fields were solved. The new approach offered was tested in two different models, and its achievements in different problems were compared. The simulations and the results reveal that this proposed study is better than the existing parameter tuning studies.Keywords: parameter tuning, agent based modeling and simulation, metaheuristic algorithms, complex systems
Procedia PDF Downloads 2326748 A Development of Science Instructional Model Based on Stem Education Approach to Enhance Scientific Mind and Problem Solving Skills for Primary Students
Authors: Prasita Sooksamran, Wareerat Kaewurai
Abstract:
STEM is an integrated teaching approach promoted by the Ministry of Education in Thailand. STEM Education is an integrated approach to teaching Science, Technology, Engineering, and Mathematics. It has been questioned by Thai teachers on the grounds of how to integrate STEM into the classroom. Therefore, the main objective of this study is to develop a science instructional model based on the STEM approach to enhance scientific mind and problem-solving skills for primary students. This study is participatory action research, and follows the following steps: 1) develop a model 2) seek the advice of experts regarding the teaching model. Developing the instructional model began with the collection and synthesis of information from relevant documents, related research and other sources in order to create prototype instructional model. 2) The examination of the validity and relevance of instructional model by a panel of nine experts. The findings were as follows: 1. The developed instructional model comprised of principles, objective, content, operational procedures and learning evaluation. There were 4 principles: 1) Learning based on the natural curiosity of primary school level children leading to knowledge inquiry, understanding and knowledge construction, 2) Learning based on the interrelation between people and environment, 3) Learning that is based on concrete learning experiences, exploration and the seeking of knowledge, 4) Learning based on the self-construction of knowledge, creativity, innovation and 5) relating their findings to real life and the solving of real-life problems. The objective of this construction model is to enhance scientific mind and problem-solving skills. Children will be evaluated according to their achievements. Lesson content is based on science as a core subject which is integrated with technology and mathematics at grade 6 level according to The Basic Education Core Curriculum 2008 guidelines. The operational procedures consisted of 6 steps: 1) Curiosity 2) Collection of data 3) Collaborative planning 4) Creativity and Innovation 5) Criticism and 6) Communication and Service. The learning evaluation is an authentic assessment based on continuous evaluation of all the material taught. 2. The experts agreed that the Science Instructional Model based on the STEM Education Approach had an excellent level of validity and relevance (4.67 S.D. 0.50).Keywords: instructional model, STEM education, scientific mind, problem solving
Procedia PDF Downloads 1946747 The Environmental Benefits of the Adoption of Emission Control for Locomotives in Brazil
Authors: Rui de Abrantes, André Luiz Silva Forcetto
Abstract:
Air pollution is a big problem in many cities around the world. Brazilian big cities also have this problem, where millions of people are exposed daily to pollutants levels above the recommended by WHO. Brazil has taken several actions to reduce air pollution, among others, controlling the atmospheric emissions from vehicles, non-road mobile machinery, and motorcycles, but on the other side, there are no emissions controls for locomotives, which are exposing the population to tons of pollutants annually. The rail network is not homogeneously distributed in the national territory; it is denser near the big cities, and this way, the population is more exposed to pollutants; apart from that, the government intends to increase the rail network as one of the strategies for greenhouse gas mitigation, complying with the international agreements against the climate changes. This paper initially presents the estimated emissions from locomotive fleets with no emission control and with emission control equivalent to US Tier 3 from 2028 and for the next 20 years. However, we realized that a program equivalent to phase Tier 3 would not be effective, so we proposed a program in two steps that will avoid the release of more than 2.4 million tons of CO and 531,000 tons of hydrocarbons, 3.7 million tons of nitrogen oxides, and 102,000 tons of particulate matter in 20 years.Keywords: locomotives, emission control, air pollution, pollutants emission
Procedia PDF Downloads 556746 Scheduling of Repetitive Activities for Height-Rise Buildings: Optimisation by Genetic Algorithms
Authors: Mohammed Aljoma
Abstract:
In this paper, a developed prototype for the scheduling of repetitive activities in height-rise buildings was presented. The activities that describe the behavior of the most of activities in multi-storey buildings are scheduled using the developed approach. The prototype combines three methods to attain the optimized planning. The methods include Critical Path Method (CPM), Gantt and Line of Balance (LOB). The developed prototype; POTER is used to schedule repetitive and non-repetitive activities with respect to all constraints that can be automatically generated using a generic database. The prototype uses the method of genetic algorithms for optimizing the planning process. As a result, this approach enables contracting organizations to evaluate various planning solutions that are calculated, tested and classified by POTER to attain an optimal time-cost equilibrium according to their own criteria of time or coast.Keywords: planning scheduling, genetic algorithms, repetitive activity, construction management, planning, scheduling, risk management, project duration
Procedia PDF Downloads 3116745 Mainstreaming Environmentally-Friendly Household Management Practice through Indonesian Women Social Gathering
Authors: Erinetta P. Anjani, Karina Mariz, Rifqi K. Fathianto
Abstract:
While Islam teaches its’ followers to be mindful of God’s creation, including the environment, Indonesia as one of the world’s largest Muslim country, is now also world’s second-largest plastic waste contributor. The problem of waste is a complicated matter in Indonesia and is worsening because many landfills are now on verge of overcapacity. The causes of this problem are at least due to two things. First is Indonesia’s bad waste management. Second, people’s low of eco-literacy, as can be seen in massive use of non-degradable materials, low rate of waste separation, low rate of recycling and up cycling, whereas households are the largest source of waste in Indonesia. Mostly dealing with patriarchal culture, women in Indonesia play big and important role in their households, from family matter to household management (including waste management), to economic matter. Uniquely, the majority of Muslim women in Indonesia are engaged in -arisan- women social gathering or in -majelis ta’lim- women community in Islamic prayer, which serves as a social mechanism. As many NGOs are working on tackling environmental issues by raising awareness in order for the people to adapt a more environmentally-friendly household management practices, the problem of waste in Indonesia is meeting a bright light. Using qualitative data and descriptive analysis, the following is a proposal for a program intended to spread eco-literacy for waste management to women in Indonesia through their social gathering in order for them to gain awareness and start implementing eco-actions in their households. We attempt Waste4Change, a social company which provides environmentally-friendly waste management services, to reach women with modules that consist of environmental education, trainings, and workshops. We will then monitor and counsel the women to make sure if the lesson is going to be fully applied in their houses. The program will take place nearby University of Indonesia, Depok, West Java.Keywords: eco-literacy, environmental education, household waste management, Muslim women social gathering, Waste4Change
Procedia PDF Downloads 1626744 Optimisation of Intermodal Transport Chain of Supermarkets on Isle of Wight, UK
Authors: Jingya Liu, Yue Wu, Jiabin Luo
Abstract:
This work investigates an intermodal transportation system for delivering goods from a Regional Distribution Centre to supermarkets on the Isle of Wight (IOW) via the port of Southampton or Portsmouth in the UK. We consider this integrated logistics chain as a 3-echelon transportation system. In such a system, there are two types of transport methods used to deliver goods across the Solent Channel: one is accompanied transport, which is used by most supermarkets on the IOW, such as Spar, Lidl and Co-operative food; the other is unaccompanied transport, which is used by Aldi. Five transport scenarios are studied based on different transport modes and ferry routes. The aim is to determine an optimal delivery plan for supermarkets of different business scales on IOW, in order to minimise the total running cost, fuel consumptions and carbon emissions. The problem is modelled as a vehicle routing problem with time windows and solved by genetic algorithm. The computing results suggested that accompanied transport is more cost efficient for small and medium business-scale supermarket chains on IOW, while unaccompanied transport has the potential to improve the efficiency and effectiveness of large business scale supermarket chains.Keywords: genetic algorithm, intermodal transport system, Isle of Wight, optimization, supermarket
Procedia PDF Downloads 3746743 Understanding Mudrocks and Their Shear Strength Deterioration Associated with Inundation
Authors: Haslinda Nahazanan, Afshin Asadi, Zainuddin Md. Yusoff, Nik Nor Syahariati Nik Daud
Abstract:
Mudrocks is considered as a problematic material due to their unexpected behaviour specifically when they are contacting with water or being exposed to the atmosphere. Many instability problems of cutting slopes were found lying on high slaking mudrocks. It has become one of the major concerns to geotechnical engineer as mudrocks cover up to 50% of sedimentary rocks in the geologic records. Mudrocks display properties between soils and rocks which can be very hard to understand. Therefore, this paper aims to review the definition, mineralogy, geo-chemistry, classification and engineering properties of mudrocks. As water has become one of the major factors that will rapidly change the behaviour of mudrocks, a review on the shear strength of mudrocks in Derbyshire has been made using a fully automated hydraulic stress path testing system under three states: dry, short-term inundated and long-term inundated. It can be seen that the strength of mudrocks has deteriorated as it condition changed from dry to short-term inundated and finally to long-term inundated.Keywords: mudrocks, sedimentary rocks, inundation, shear strength
Procedia PDF Downloads 2406742 Contextual Toxicity Detection with Data Augmentation
Authors: Julia Ive, Lucia Specia
Abstract:
Understanding and detecting toxicity is an important problem to support safer human interactions online. Our work focuses on the important problem of contextual toxicity detection, where automated classifiers are tasked with determining whether a short textual segment (usually a sentence) is toxic within its conversational context. We use “toxicity” as an umbrella term to denote a number of variants commonly named in the literature, including hate, abuse, offence, among others. Detecting toxicity in context is a non-trivial problem and has been addressed by very few previous studies. These previous studies have analysed the influence of conversational context in human perception of toxicity in controlled experiments and concluded that humans rarely change their judgements in the presence of context. They have also evaluated contextual detection models based on state-of-the-art Deep Learning and Natural Language Processing (NLP) techniques. Counterintuitively, they reached the general conclusion that computational models tend to suffer performance degradation in the presence of context. We challenge these empirical observations by devising better contextual predictive models that also rely on NLP data augmentation techniques to create larger and better data. In our study, we start by further analysing the human perception of toxicity in conversational data (i.e., tweets), in the absence versus presence of context, in this case, previous tweets in the same conversational thread. We observed that the conclusions of previous work on human perception are mainly due to data issues: The contextual data available does not provide sufficient evidence that context is indeed important (even for humans). The data problem is common in current toxicity datasets: cases labelled as toxic are either obviously toxic (i.e., overt toxicity with swear, racist, etc. words), and thus context does is not needed for a decision, or are ambiguous, vague or unclear even in the presence of context; in addition, the data contains labeling inconsistencies. To address this problem, we propose to automatically generate contextual samples where toxicity is not obvious (i.e., covert cases) without context or where different contexts can lead to different toxicity judgements for the same tweet. We generate toxic and non-toxic utterances conditioned on the context or on target tweets using a range of techniques for controlled text generation(e.g., Generative Adversarial Networks and steering techniques). On the contextual detection models, we posit that their poor performance is due to limitations on both of the data they are trained on (same problems stated above) and the architectures they use, which are not able to leverage context in effective ways. To improve on that, we propose text classification architectures that take the hierarchy of conversational utterances into account. In experiments benchmarking ours against previous models on existing and automatically generated data, we show that both data and architectural choices are very important. Our model achieves substantial performance improvements as compared to the baselines that are non-contextual or contextual but agnostic of the conversation structure.Keywords: contextual toxicity detection, data augmentation, hierarchical text classification models, natural language processing
Procedia PDF Downloads 1766741 Feasibility of Deployable Encasing for a CVDR (Cockpit Voice and Data Recorder) in Commercial Aircraft
Authors: Vishnu Nair, Rohan Kapoor
Abstract:
Recent commercial aircraft crashes demand a paradigm shift in how the CVDRs are located and recovered, particularly if the aircraft crashes in the sea. CVDR (Cockpit Voice and Data Recorder) is most vital component out of the entire wreckage that can be obtained in order to investigate the sequence of events leading to the crash. It has been a taxing and exorbitantly expensive process locating and retrieving the same in the massive water bodies as it was seen in the air crashes in the recent past, taking the unfortunate Malaysia airlines MH-370 crash into account. The study aims to provide an aid to the persisting problem by improving the buoyant as-well-as the aerodynamic properties of the proposed CVDR encasing. Alongside this the placement of the deployable CVDR on the surface of the aircraft and floatability in case of water submersion are key factors which are taken into consideration for a better resolution to the problem. All of which results into the Deployable-CVDR emerging to the surface of the water-body. Also the whole system is designed such that it can be seamlessly integrated with the current crop of commercial aircraft. The work is supported by carrying out a computational study with the help Ansys-Fluent combination.Keywords: encasing, buoyancy, deployable CVDR, floatability, water submersion
Procedia PDF Downloads 3036740 Private Coded Computation of Matrix Multiplication
Authors: Malihe Aliasgari, Yousef Nejatbakhsh
Abstract:
The era of Big Data and the immensity of real-life datasets compels computation tasks to be performed in a distributed fashion, where the data is dispersed among many servers that operate in parallel. However, massive parallelization leads to computational bottlenecks due to faulty servers and stragglers. Stragglers refer to a few slow or delay-prone processors that can bottleneck the entire computation because one has to wait for all the parallel nodes to finish. The problem of straggling processors, has been well studied in the context of distributed computing. Recently, it has been pointed out that, for the important case of linear functions, it is possible to improve over repetition strategies in terms of the tradeoff between performance and latency by carrying out linear precoding of the data prior to processing. The key idea is that, by employing suitable linear codes operating over fractions of the original data, a function may be completed as soon as enough number of processors, depending on the minimum distance of the code, have completed their operations. The problem of matrix-matrix multiplication in the presence of practically big sized of data sets faced with computational and memory related difficulties, which makes such operations are carried out using distributed computing platforms. In this work, we study the problem of distributed matrix-matrix multiplication W = XY under storage constraints, i.e., when each server is allowed to store a fixed fraction of each of the matrices X and Y, which is a fundamental building of many science and engineering fields such as machine learning, image and signal processing, wireless communication, optimization. Non-secure and secure matrix multiplication are studied. We want to study the setup, in which the identity of the matrix of interest should be kept private from the workers and then obtain the recovery threshold of the colluding model, that is, the number of workers that need to complete their task before the master server can recover the product W. The problem of secure and private distributed matrix multiplication W = XY which the matrix X is confidential, while matrix Y is selected in a private manner from a library of public matrices. We present the best currently known trade-off between communication load and recovery threshold. On the other words, we design an achievable PSGPD scheme for any arbitrary privacy level by trivially concatenating a robust PIR scheme for arbitrary colluding workers and private databases and the proposed SGPD code that provides a smaller computational complexity at the workers.Keywords: coded distributed computation, private information retrieval, secret sharing, stragglers
Procedia PDF Downloads 1286739 Concrete Cracking Simulation Using Vector Form Intrinsic Finite Element Method
Authors: R. Z. Wang, B. C. Lin, C. H. Huang
Abstract:
This study proposes a new method to simulate the crack propagation under mode-I loading using Vector Form Intrinsic Finite Element (VFIFE) method. A new idea which is expected to combine both VFIFE and J-integral is proposed to calculate the stress density factor as the crack critical in elastic crack. The procedure of implement the cohesive crack propagation in VFIFE based on the fictitious crack model is also proposed. In VFIFIE, the structure deformation is described by numbers of particles instead of elements. The strain energy density and the derivatives of the displacement vector of every particle is introduced to calculate the J-integral as the integral path is discrete by particles. The particle on the crack tip separated into two particles once the stress on the crack tip satisfied with the crack critical and then the crack tip propagates to the next particle. The internal force and the cohesive force is applied to the particles.Keywords: VFIFE, crack propagation, fictitious crack model, crack critical
Procedia PDF Downloads 3396738 Reducing the Computational Overhead of Metaheuristics Parameterization with Exploratory Landscape Analysis
Authors: Iannick Gagnon, Alain April
Abstract:
The performance of a metaheuristic on a given problem class depends on the class itself and the choice of parameters. Parameter tuning is the most time-consuming phase of the optimization process after the main calculations and it often nullifies the speed advantage of metaheuristics over traditional optimization algorithms. Several off-the-shelf parameter tuning algorithms are available, but when the objective function is expensive to evaluate, these can be prohibitively expensive to use. This paper presents a surrogate-like method for finding adequate parameters using fitness landscape analysis on simple benchmark functions and real-world objective functions. The result is a simple compound similarity metric based on the empirical correlation coefficient and a measure of convexity. It is then used to find the best benchmark functions to serve as surrogates. The near-optimal parameter set is then found using fractional factorial design. The real-world problem of NACA airfoil lift coefficient maximization is used as a preliminary proof of concept. The overall aim of this research is to reduce the computational overhead of metaheuristics parameterization.Keywords: metaheuristics, stochastic optimization, particle swarm optimization, exploratory landscape analysis
Procedia PDF Downloads 1586737 Determining the Constituents of the Sunnah of Prophet Muhammad (pbuh) in the Light of the Quran: A Clinical Approach
Authors: Aamir I. Yazdani, Dr. Muhammad Nasir J. Qureshi
Abstract:
The term Sunnah has been used both, for Allah Himself and for his messengers in the Quran. The way Allah dealt with people where the messengers (rasuls) were sent is called Sunnatullāh by the Quran. Likewise, the same term is used in the Quran, for Prophet Muhammad (pbuh) as in following the trodden path (Sunnah) of his forefather Prophet Abraham, Alaihissalam. It implies; therefore, the word Sunnah cannot be applied to things which relates to theoretical knowledge like faith etc. Its ambit remains the practices, actions linked to practical things only. In the case of the Quran, we find that there is complete agreement among all Muslims on what constitutes the book of Allah, based on ijma (unanimity, total agreement, consensus) and tawatur (uninterrupted continuity, without any gap). There seems to be no unanimity on the question on what constitutes Sunnah of Prophet Muhammad (pbuh). There are, therefore, several approaches towards Sunnah adopted by Muslims. This paper is based on Qualitative Methodology to determine the criterion of what constitutes the Sunnah of the Prophet Muhammad (pbuh) and which practices constitute the precincts of the Sunnah of the Prophet Muhammad (pbuh).Keywords: Al-hikmah, Hereafter, practices, Tazkiya
Procedia PDF Downloads 1506736 VeriFy: A Solution to Implement Autonomy Safely and According to the Rules
Authors: Michael Naderhirn, Marco Pavone
Abstract:
Problem statement, motivation, and aim of work: So far, the development of control algorithms was done by control engineers in a way that the controller would fit a specification by testing. When it comes to the certification of an autonomous car in highly complex scenarios, the challenge is much higher since such a controller must mathematically guarantee to implement the rules of the road while on the other side guarantee aspects like safety and real time executability. What if it becomes reality to solve this demanding problem by combining Formal Verification and System Theory? The aim of this work is to present a workflow to solve the above mentioned problem. Summary of the presented results / main outcomes: We show the usage of an English like language to transform the rules of the road into system specification for an autonomous car. The language based specifications are used to define system functions and interfaces. Based on that a formal model is developed which formally correctly models the specifications. On the other side, a mathematical model describing the systems dynamics is used to calculate the systems reachability set which is further used to determine the system input boundaries. Then a motion planning algorithm is applied inside the system boundaries to find an optimized trajectory in combination with the formal specification model while satisfying the specifications. The result is a control strategy which can be applied in real time independent of the scenario with a mathematical guarantee to satisfy a predefined specification. We demonstrate the applicability of the method in simulation driving scenarios and a potential certification. Originality, significance, and benefit: To the authors’ best knowledge, it is the first time that it is possible to show an automated workflow which combines a specification in an English like language and a mathematical model in a mathematical formal verified way to synthesizes a controller for potential real time applications like autonomous driving.Keywords: formal system verification, reachability, real time controller, hybrid system
Procedia PDF Downloads 2446735 Tools for Transparency: The Role of Civic Technology in Increasing the Transparency of the State
Authors: Rebecca Rumbul
Abstract:
The operation of the state can often appear opaque to citizens wishing to access official information, who have to negotiate a path through numerous levels of bureaucracy rationalized through institutional policy to acquire what information they want. Even where individual states have 'Right to Information' legislation guaranteeing citizen access to information, public sector conformity to such laws vary between states and between state organizations. In response to such difficulties in bringing citizens and information together, many NGO's around the world have begun designing and hosting digital portals to facilitate the requesting and receiving of official information. How then, are these 'civic technology' tools affecting the behavior of the state? Are they increasing the transparency of the state? This study looked at 5 Right to Information civic technology sites in Chile, Uruguay, Ukraine, Hungary and the UK, and found that such sites were providing a useful platform to publish official information, but that states were still reluctant to comply with all requests. It concludes that civic technology can be an important tool in increasing the transparency of the state, but that the state must have an institutional commitment to information rights for this to be fully effective.Keywords: digital, ICT, transparency, civic technology
Procedia PDF Downloads 6676734 Assessment the Manner of Obtaining Hierarchies and Privacy of Traditional Houses Entrance in Providing a Safe Place-Case Study: Traditional Houses in Shiraz
Authors: Zahra A. Barzegar, Maryam B. Golboo
Abstract:
In this paper, the manner of obtaining hierarchies and privacy entry of traditional houses in providing a safe place in the city of Shiraz will be evaluated by qualitative–descriptive methods and 6 old houses are the case study. The houses of Shiraz, as the houses in other cities in Iran are a response to climate and physical features. The old part of Shiraz has a compressed and dense texture in which the houses are in narrow and tight alleys. In this regard, the principles of traditional house entrance design have been introduced. The results show that every house has a private entrance. Direction of the entry of most houses is toward the south and with a turn to the South-East side. Entrance to yard path in all the cases is not straight, and this had been done by using 90 degrees rotates of the corridor leading to the yard. Vestibule provides a private place for the house and entrance stairway to the rooftop is located inside it.Keywords: entrance, components of entrance, hierarchy, frontage, Shiraz houses
Procedia PDF Downloads 3106733 The Influence of Liberal Arts and Sciences Pedagogy and Covid Pandemic on Global Health Workforce Training in China: A Qualitative Study
Authors: Meifang Chen
Abstract:
Background: As China increased its engagement in global health affairs and research, global Health (GH) emerged as a new discipline in China after 2010. Duke Kunshan University (DKU), as a member of the Chinese Consortium of Universities for Global Health, is the first university that experiments “Western-style” liberal arts and sciences (LAS) education pedagogy in GH undergraduate and postgraduate programs in China since 2014. The COVID-19 pandemic has brought significant disruption to education across the world. At the peak of the pandemic, 45 countries in the Europe and Central Asia regions closed their schools, affecting 185 million students. DKU, as many other universities and schools, was unprepared for this sudden abruptness and were forced to build emergency remote learning systems almost immediately. This qualitative study aims to gain a deeper understanding of 1) how Chinese students and parents embrace GH training in the liberal arts and sciences education context, and 2) how the COVID pandemic influences the students’ learning experience as well as affects students and parents’ perceptions of GH-related study and career development in China. Methods: students and parents at DKU were invited and recruited for open-ended, semi-structured interviews during Sept 2021-Mar 2022. Open coding procedures and thematic content analysis were conducted using Nvivo 12 software. Results: A total of 18 students and 36 parents were interviewed. Both students and parents were fond of delivering GH education using the liberal arts and sciences pedagogy. Strengths of LAS included focusing on whole person development, allowing personal enrichment, tailoring curriculum to individual’s interest, providing well-rounded knowledge through interdisciplinary learning, and increasing self-study capacity and adaptability. Limitations of LAS included less time to dive deep into disciplines. There was a significant improvement in independence, creativity, problem solving, and team coordinating capabilities among the students. The impact of the COVID pandemic on GH learning experience included less domestic and abroad fieldwork opportunities, less in-person interactions (especially with foreign students and faculty), less timely support, less lab experience, and coordination challenges due to time-zone difference. The COVID pandemic increased the public’s awareness of the importance of GH and acceptance of GH as a career path. More job and postgraduate program opportunities were expected in near future. However, some parents expressed concerns about GH-related employment opportunities in China. Conclusion: The application of the liberal arts and science education pedagogy in GH training were well-received by the Chinese students and parents. Although global pandemic like COVID disrupted GH learning in many ways, most Chinese students and parents held optimistic attitudes toward GH study and career development.Keywords: COVID, global health, liberal arts and sciences pedagogy, China
Procedia PDF Downloads 1206732 Mental Well-Being and Quality of Life: A Comparative Study of Male Leather Tannery and Non-Tannery Workers of Kanpur City, India
Authors: Gyan Kashyap, Shri Kant Singh
Abstract:
Improved mental health can be articulated as a good physical health and quality of life. Mental health plays an important role in survival of any one’s life. In today’s time people living with stress in life due to their personal matters, health problems, unemployment, work environment, living environment, substance use, life style and many more important reasons. Many studies confirmed that the significant proportion of mental health people increasing in India. This study is focused on mental well-being of male leather tannery workers in Kanpur city, India. Environment at work place as well as living environment plays an important health risk factors among leather tannery workers. Leather tannery workers are more susceptible to many chemicals and physical hazards, just because they are liable to be affected by their exposure to lots of hazardous materials and processes during tanning work in very hazardous work environment. The aim of this study to determine the level of mental health disorder and quality of life among male leather tannery and non-tannery workers in Kanpur city, India. This study utilized the primary data from the cross- sectional household study which was conducted from January to June, 2015 on tannery and non-tannery workers as a part of PhD program from the Jajmau area of Kanpur city, India. The sample of 286 tannery and 295 non-tannery workers has been collected from the study area. We have collected information from the workers of age group 15-70 those who were working at the time of survey for at least one year. This study utilized the general health questionnaire (GHQ-12) and work related stress scale to test the mental wellbeing of male tannery and non-tannery workers. By using GHQ-12 and work related stress scale, Polychoric factor analysis method has been used for best threshold and scoring. Some of important question like ‘How would you rate your overall quality of life’ on Likert scale to measure the quality of life, their earnings, education, family size, living condition, household assets, media exposure, health expenditure, treatment seeking behavior and food habits etc. Results from the study revealed that around one third of tannery workers had severe mental health problems then non-tannery workers. Mental health problem shown the statistically significant association with wealth quintile, 56 percent tannery workers had severe mental health problem those belong to medium wealth quintile. And 42 percent tannery workers had moderate mental health problem among those from the low wealth quintile. Work related stress scale found the statistically significant results for tannery workers. Large proportion of tannery and non-tannery workers reported they are unable to meet their basic needs from their earnings and living in worst condition. Important result from the study, tannery workers who were involved in beam house work in tannery (58%) had severe mental health problem. This study found the statistically significant association with tannery work and mental health problem among tannery workers.Keywords: GHQ-12, mental well-being, factor analysis, quality of life, tannery workers
Procedia PDF Downloads 3886731 A Suggested Study Plan for Mining Engineering Program in Northern Border University (NBU) to Match the Requirements of the Local Mining Industry
Authors: Mohammad Aljuhani, Yasamina Aljuhani
Abstract:
The Mining Engineering Department at College of Engineering in NBU is under establishment. It is essential to establish such department in NBU. This is because, it is the only university in the region. Moreover, the mining industry is very active in the northern borders region. However, there is no mining engineering department in KSA except one in King Abdulziz University, which is 1400 km from the mining industry in the northern borders. As a result, department graduates from KAU find difficulties to get suitable jobs in their specialization in spite of their few numbers graduated per year and the presence of many jobs vacancies at the local mining sector. Therefore, the objectives of this research are to identify, measure and analyze the above mentioned problem from educational point of view. One more objective is to add a contribution towards solving such vital, society affecting problem. For achieving the first task of the research, that is problem size identification and analyses, a questionnaire was designed. The questionnaire was directed towards experienced engineers, in the mining and related industries, including the ministry of petroleum and minerals, Saudi Geological Survey, and Ma’aden Company as being prospective employers for the mining sector. The questionnaire target was to evaluate the Saudi mining engineers from an industrial point of view and to detect the main reasons behind their failure to find jobs. In addition, the study focuses in the demand of mining engineers in the northern borders region. Moreover, the study plan of the suggested department is designed based on the requirements of the mining industry. The feedback received from the industry reflected major educational shortcomings. In order to overcome the revealed defects, the second objective of the research was achieved where a suggested study plan “curriculum” has been prepared to take into consideration all the points of weakness so as to improve the graduates’ quality to fit the local mining work market.Keywords: mining engineering, labor market, qualifications, curriculum, mining industry, mining engineers
Procedia PDF Downloads 2766730 Spatio-Temporal Variation of Gaseous Pollutants and the Contribution of Particulate Matters in Chao Phraya River Basin, Thailand
Authors: Samart Porncharoen, Nisa Pakvilai
Abstract:
The elevated levels of air pollutants in regional atmospheric environments is a significant problem that affects human health in Thailand, particularly in the Chao Phraya River Basin. Of concern are issues surrounding ambient air pollution such as particulate matter, gaseous pollutants and more specifically concerning air pollution along the river. Therefore, the spatio-temporal study of air pollution in this real environment can gain more accurate air quality data for making formalized environmental policy in river basins. In order to inform such a policy, a study was conducted over a period of January –December, 2015 to continually collect measurements of various pollutants in both urban and regional locations in the Chao Phraya River Basin. This study investigated the air pollutants in many diverse environments along the Chao Phraya River Basin, Thailand in 2015. Multivariate Analysis Techniques such as Principle Component Analysis (PCA) and Path analysis were utilised to classify air pollution in the surveyed location. Measurements were collected in both urban and rural areas to see if significant differences existed between the two locations in terms of air pollution levels. The meteorological parameters of various particulates were collected continually from a Thai pollution control department monitoring station over a period of January –December, 2015. Of interest to this study were the readings of SO2, CO, NOx, O3, and PM10. Results showed a daily arithmetic mean concentration of SO2, CO, NOx, O3, PM10 reading at 3±1 ppb, 0.5± 0.5 ppm, 30±21 ppb, 19±16 ppb, and 40±20 ug/m3 in urban locations (Bangkok). During the same time period, the readings for the same measurements in rural areas, Ayutthaya (were 1±0.5 ppb, 0.1± 0.05 ppm, 25±17 ppb, 30±21 ppb, and 35±10 ug/m3respectively. This show that Bangkok were located in highly polluted environments that are dominated source emitted from vehicles. Further, results were analysed to ascertain if significant seasonal variation existed in the measurements. It was found that levels of both gaseous pollutants and particle matter in dry season were higher than the wet season. More broadly, the results show that levels of pollutants were measured highest in locations along the Chao Phraya. River Basin known to have a large number of vehicles and biomass burning. This correlation suggests that the principle pollutants were from these anthropogenic sources. This study contributes to the body of knowledge surrounding ambient air pollution such as particulate matter, gaseous pollutants and more specifically concerning air pollution along the Chao Phraya River Basin. Further, this study is one of the first to utilise continuous mobile monitoring along a river in order to gain accurate measurements during a data collection period. Overall, the results of this study can be used for making formalized environmental policy in river basins in order to reduce the physical effects on human health.Keywords: air pollution, Chao Phraya river basin, meteorology, seasonal variation, principal component analysis
Procedia PDF Downloads 2876729 Effect of Problem Based Learning (PBL) Activities to Thai Undergraduate Student Teachers Attitude and Their Achievement
Authors: Thanawit Tongmai, Chatchawan Saewor
Abstract:
Learning management is very important for students’ development. To promote students’ potential, the teacher should design appropriate learning activity that brings their students potential out. Problem based learning has been using worldwide and it has presented numerous of success. This research aims to study third year students’ attitude and their achievement in scientific research course. To find the results, mix method was used to design research conduction. The researcher used PBL and reflection activity in the class. The students had to choose a topic, reviewed information, designed experimental, wrote academic report and presented their research by themselves. The researcher was only a facilitator. Reflection activity was used to progressing and consulting their research. The data was collected along with research conduction by questionnaire and test, including attitude, opinion and their achievement. The result of this study showed that 74.71% from all of students (n = 87) benefited from PBL and reflection activity, while 25.19% were just satisfied. 100% of students had a positive reflection toward PBL activity and they believed that PBL was the best pedagogy method for scientific research course. The achievements of these students were higher than the previous study (P < 0.05). The student’s learning achievement, A, B+ and B, was 48.28, 28.74 and 22.98% respectively. Therefore, it can conclude that PBL activity is appropriate for scientific research course and it can also promote student’s achievement.Keywords: reflection, attitude, learning, achievement, PBL
Procedia PDF Downloads 2846728 Blockchain Technology Security Evaluation: Voting System Based on Blockchain
Authors: Omid Amini
Abstract:
Nowadays, technology plays the most important role in the life of human beings because people use technology to share data and to communicate with each other, but the challenge is the security of this data. For instance, as more people turn to technology in the world, more data is generated, and more hackers try to steal or infiltrate data. In addition, the data is under the control of the central authority, which can trigger the challenge of losing information and changing information; this can create widespread anxiety for different people in different communities. In this paper, we sought to investigate Blockchain technology that can guarantee information security and eliminate the challenge of central authority access to information. Now a day, people are suffering from the current voting system. This means that the lack of transparency in the voting system is a big problem for society and the government in most countries, but blockchain technology can be the best alternative to the previous voting system methods because it removes the most important challenge for voting. According to the results, this research can be a good start to getting acquainted with this new technology, especially on the security part and familiarity with how to use a voting system based on blockchain in the world. At the end of this research, it is concluded that the use of blockchain technology can solve the major security problem and lead to a secure and transparent election.Keywords: blockchain, technology, security, information, voting system, transparency
Procedia PDF Downloads 1396727 Feasibility of Small Hydropower Plants Odisha
Authors: Sanoj Sahu, Ramakar Jha
Abstract:
Odisha (India) is in need of reliable, cost-effective power generation. A prolonged electricity crisis and increasing power demand have left over thousands of citizens without access to electricity, and much of the population suffers from sporadic outages. The purpose of this project is to build a methodology to evaluate small hydropower potential, which can be used to alleviate the Odisha’s energy problem among rural communities. This project has three major tasks: the design of a simple SHEP for a single location along a river in the Odisha; the development of water flow prediction equations through a linear regression analysis; and the design of an ArcGIS toolset to estimate the flow duration curves (FDCs) at locations where data do not exist. An explanation of the inputs to the tool, as well has how it produces a suitable output for SHEP evaluation will be presented. The paper also gives an explanation of hydroelectric power generation in the Odisha, SHEPs, and the technical and practical aspects of hydroelectric power. Till now, based on topographical and rainfall analysis we have located hundreds of sites. Further work on more number of site location and accuracy of location is to be done.Keywords: small hydropower, ArcGIS, rainfall analysis, Odisha’s energy problem
Procedia PDF Downloads 4496726 Concrete Sewer Pipe Corrosion Induced by Sulphuric Acid Environment
Authors: Anna Romanova, Mojtaba Mahmoodian, Upul Chandrasekara, Morteza A. Alani
Abstract:
Corrosion of concrete sewer pipes induced by sulphuric acid attack is a recognised problem worldwide, which is not only an attribute of countries with hot climate conditions as thought before. The significance of this problem is by far only realised when the pipe collapses causing surface flooding and other severe consequences. To change the existing post-reactive attitude of managing companies, easy to use and robust models are required to be developed which currently lack reliable data to be correctly calibrated. This paper focuses on laboratory experiments of establishing concrete pipe corrosion rate by submerging samples in to 0.5 pH sulphuric acid solution for 56 days under 10ºC, 20ºC and 30ºC temperature regimes. The result showed that at very early stage of the corrosion process the samples gained overall mass, at 30ºC the corrosion progressed quicker than for other temperature regimes, however with time the corrosion level for 10ºC and 20ºC regimes tended towards those at 30ºC. Overall, at these conditions the corrosion rates of 10 mm/year, 13,5 mm/year, and 17 mm/year were observed.Keywords: sewer pipes, concrete corrosion, sulphuric acid, concrete coupons, corrosion rate
Procedia PDF Downloads 3356725 Worst-Case Load Shedding in Electric Power Networks
Authors: Fu Lin
Abstract:
We consider the worst-case load-shedding problem in electric power networks where a number of transmission lines are to be taken out of service. The objective is to identify a prespecified number of line outages that lead to the maximum interruption of power generation and load at the transmission level, subject to the active power-flow model, the load and generation capacity of the buses, and the phase-angle limit across the transmission lines. For this nonlinear model with binary constraints, we show that all decision variables are separable except for the nonlinear power-flow equations. We develop an iterative decomposition algorithm, which converts the worst-case load shedding problem into a sequence of small subproblems. We show that the subproblems are either convex problems that can be solved efficiently or nonconvex problems that have closed-form solutions. Consequently, our approach is scalable for large networks. Furthermore, we prove the convergence of our algorithm to a critical point, and the objective value is guaranteed to decrease throughout the iterations. Numerical experiments with IEEE test cases demonstrate the effectiveness of the developed approach.Keywords: load shedding, power system, proximal alternating linearization method, vulnerability analysis
Procedia PDF Downloads 144