Search results for: privacy preservation scheme
723 Image Segmentation Using Active Contours Based on Anisotropic Diffusion
Authors: Shafiullah Soomro
Abstract:
Active contour is one of the image segmentation techniques and its goal is to capture required object boundaries within an image. In this paper, we propose a novel image segmentation method by using an active contour method based on anisotropic diffusion feature enhancement technique. The traditional active contour methods use only pixel information to perform segmentation, which produces inaccurate results when an image has some noise or complex background. We use Perona and Malik diffusion scheme for feature enhancement, which sharpens the object boundaries and blurs the background variations. Our main contribution is the formulation of a new SPF (signed pressure force) function, which uses global intensity information across the regions. By minimizing an energy function using partial differential framework the proposed method captures semantically meaningful boundaries instead of catching uninterested regions. Finally, we use a Gaussian kernel which eliminates the problem of reinitialization in level set function. We use several synthetic and real images from different modalities to validate the performance of the proposed method. In the experimental section, we have found the proposed method performance is better qualitatively and quantitatively and yield results with higher accuracy compared to other state-of-the-art methods.Keywords: active contours, anisotropic diffusion, level-set, partial differential equations
Procedia PDF Downloads 161722 Maqasid and the Global Digital Economy Opportunities and Challenges for Business and Management
Authors: Yasser Mohamed Abdelrahman Tarshany
Abstract:
The emergence of the digital economy has transformed global business and created new opportunities for growth and development. However, as digital technologies continue to reshape the global economy, there is a growing need to ensure that these transformations are guided by ethical principles that serve the common good. In this context, Maqasid, the Islamic ethical framework that focuses on the higher objectives and values of Shariah, offers a valuable lens for examining the ethical implications of digital transformation. The research objective of this study is to explore the opportunities and challenges of integrating Maqasid into the global digital economy from a business and management perspective. Specifically, the study aims to analyze the ethical implications of digital technologies for the economy and to identify strategies for leveraging Maqasid to promote ethical and socially responsible practices in the digital age. The study adopts a qualitative research methodology, drawing on existing literature and empirical data to develop a conceptual framework for understanding the relationship between Maqasid and the global digital economy. The study also employs case studies and interviews with business leaders and policymakers to explore practical strategies for integrating Maqasid into digital business practices. The research findings reveal that Maqasid can serve as a powerful framework for promoting ethical and socially responsible practices in the digital economy. Specifically, the study identifies several key strategies for leveraging Maqasid in digital business practices, including promoting social justice, protecting privacy and personal data, and ensuring transparency and accountability in business operations. The research outcomes of this study provide a valuable contribution to the field of business and management by demonstrating the importance of integrating ethical principles into the digital economy. Furthermore, the study highlights the potential of Maqasid as a powerful framework for promoting ethical and socially responsible practices in the digital age. Finally, the study suggests several avenues for future research, including exploring the role of Maqasid in promoting digital inclusion and reducing inequality in the global economy.Keywords: Maqasid, global digital, economy, opportunities, challenges for business, management
Procedia PDF Downloads 14721 Business and Human Rights: An Analysis of the UK Modern Slavery Act 2015
Authors: Prapin Nuchpiam
Abstract:
Sustainable Development Goals (SDGs) have become a global agenda for all. The role of the business sector is significant in promoting sustainable development, particularly to prevent, address, and remedy human rights abuses committed in business operations. Modern slavery is one of the complex issues of human rights. The paper aims to study the UK Modern Slavery Act (MSA) 2015, whose main purpose is to tackle modern slavery in all its forms: human trafficking, slavery, forced labor, and domestic servitude. The Act has a great significance in its approach to involving businesses in combating modern slavery without imposing stricter regulations on them. In doing so, Section 54 of the MSA requires commercial organizations to disclose a statement confirming the transparency in their corporate supply chains. Even though the statement is required by law, in practice, it is rather similar to the ‘comply or explain’ scheme. In other words, compliance is mainly enforced due to fear of reputational risk, rather than of lawbreaking. Thailand has been reported a number of modern slavery cases, particularly in the production stage of supply chains. With desperate attempts to solve modern slavery, the Thai government tends to seek stricter regulation and stronger punishment as the main approach. The paper will analyze the effective implementation of section 54and conclude whether and to what extent the MSA can be applied to the case of Thailand.Keywords: human rights, responsible business, SDGs, the UK modern slavery act 2015
Procedia PDF Downloads 123720 Double Layer Security Authentication Model for Automatic Dependent Surveillance-Broadcast
Authors: Buse T. Aydin, Enver Ozdemir
Abstract:
An automatic dependent surveillance-broadcast (ADS-B) system has serious security problems. In this study, a double layer authentication scheme between the aircraft and ground station, aircraft to aircraft, ground station to ATC tower is designed to prevent any unauthorized aircrafts from introducing themselves as friends. This method can be used as a solution to the problem of authentication. The method is a combination of classical cryptographic methods and new generation physical layers. The first layer has employed the embedded key of the aircraft. The embedded key is assumed to installed during the construction of the utility. The other layer is a physical attribute (flight path, distance, etc.) between the aircraft and the ATC tower. We create a mathematical model so that two layers’ information is employed and an aircraft is authenticated as a friend or unknown according to the accuracy of the results of the model. The results of the aircraft are compared with the results of the ATC tower and if the values found by the aircraft and ATC tower match within a certain error margin, we mark the aircraft as friend. As a result, the ADS-B messages coming from this authenticated friendly aircraft will be processed. In this method, even if the embedded key is captured by the unknown aircraft, without the information of the second layer, the unknown aircraft can easily be determined. Overall, in this work, we present a reliable system by adding physical layer in the authentication process.Keywords: ADS-B, authentication, communication with physical layer security, cryptography, identification friend or foe
Procedia PDF Downloads 179719 Design and Development of an Autonomous Beach Cleaning Vehicle
Authors: Mahdi Allaoua Seklab, Süleyman BaşTürk
Abstract:
In the quest to enhance coastal environmental health, this study introduces a fully autonomous beach cleaning machine, a breakthrough in leveraging green energy and advanced artificial intelligence for ecological preservation. Designed to operate independently, the machine is propelled by a solar-powered system, underscoring a commitment to sustainability and the use of renewable energy in autonomous robotics. The vehicle's autonomous navigation is achieved through a sophisticated integration of LIDAR and a camera system, utilizing an SSD MobileNet V2 object detection model for accurate and real-time trash identification. The SSD framework, renowned for its efficiency in detecting objects in various scenarios, is coupled with the lightweight and precise highly MobileNet V2 architecture, making it particularly suited for the computational constraints of on-board processing in mobile robotics. Training of the SSD MobileNet V2 model was conducted on Google Colab, harnessing cloud-based GPU resources to facilitate a rapid and cost-effective learning process. The model was refined with an extensive dataset of annotated beach debris, optimizing the parameters using the Adam optimizer and a cross-entropy loss function to achieve high-precision trash detection. This capability allows the machine to intelligently categorize and target waste, leading to more effective cleaning operations. This paper details the design and functionality of the beach cleaning machine, emphasizing its autonomous operational capabilities and the novel application of AI in environmental robotics. The results showcase the potential of such technology to fill existing gaps in beach maintenance, offering a scalable and eco-friendly solution to the growing problem of coastal pollution. The deployment of this machine represents a significant advancement in the field, setting a new standard for the integration of autonomous systems in the service of environmental stewardship.Keywords: autonomous beach cleaning machine, renewable energy systems, coastal management, environmental robotics
Procedia PDF Downloads 27718 An Enhanced Hybrid Backoff Technique for Minimizing the Occurrence of Collision in Mobile Ad Hoc Networks
Authors: N. Sabiyath Fatima, R. K. Shanmugasundaram
Abstract:
In Mobile Ad-hoc Networks (MANETS), every node performs both as transmitter and receiver. The existing backoff models do not exactly forecast the performance of the wireless network. Also, the existing models experience elevated packet collisions. Every time a collision happens, the station’s contention window (CW) is doubled till it arrives at the utmost value. The main objective of this paper is to diminish collision by means of contention window Multiplicative Increase Decrease Backoff (CWMIDB) scheme. The intention of rising CW is to shrink the collision possibility by distributing the traffic into an outsized point in time. Within wireless Ad hoc networks, the CWMIDB algorithm dynamically controls the contention window of the nodes experiencing collisions. During packet communication, the backoff counter is evenly selected from the given choice of [0, CW-1]. At this point, CW is recognized as contention window and its significance lies on the amount of unsuccessful transmission that had happened for the packet. On the initial transmission endeavour, CW is put to least amount value (C min), if transmission effort fails, subsequently the value gets doubled, and once more the value is set to least amount on victorious broadcast. CWMIDB is simulated inside NS2 environment and its performance is compared with Binary Exponential Backoff Algorithm. The simulation results show improvement in transmission probability compared to that of the existing backoff algorithm.Keywords: backoff, contention window, CWMIDB, MANET
Procedia PDF Downloads 277717 Reliability and Cost Focused Optimization Approach for a Communication Satellite Payload Redundancy Allocation Problem
Authors: Mehmet Nefes, Selman Demirel, Hasan H. Ertok, Cenk Sen
Abstract:
A typical reliability engineering problem regarding communication satellites has been considered to determine redundancy allocation scheme of power amplifiers within payload transponder module, whose dominant function is to amplify power levels of the received signals from the Earth, through maximizing reliability against mass, power, and other technical limitations. Adding each redundant power amplifier component increases not only reliability but also hardware, testing, and launch cost of a satellite. This study investigates a multi-objective approach used in order to solve Redundancy Allocation Problem (RAP) for a communication satellite payload transponder, focusing on design cost due to redundancy and reliability factors. The main purpose is to find the optimum power amplifier redundancy configuration satisfying reliability and capacity thresholds simultaneously instead of analyzing respectively or independently. A mathematical model and calculation approach are instituted including objective function definitions, and then, the problem is solved analytically with different input parameters in MATLAB environment. Example results showed that payload capacity and failure rate of power amplifiers have remarkable effects on the solution and also processing time.Keywords: communication satellite payload, multi-objective optimization, redundancy allocation problem, reliability, transponder
Procedia PDF Downloads 261716 Enhancing Healthcare Delivery in Low-Income Markets: An Exploration of Wireless Sensor Network Applications
Authors: Innocent Uzougbo Onwuegbuzie
Abstract:
Healthcare delivery in low-income markets is fraught with numerous challenges, including limited access to essential medical resources, inadequate healthcare infrastructure, and a significant shortage of trained healthcare professionals. These constraints lead to suboptimal health outcomes and a higher incidence of preventable diseases. This paper explores the application of Wireless Sensor Networks (WSNs) as a transformative solution to enhance healthcare delivery in these underserved regions. WSNs, comprising spatially distributed sensor nodes that collect and transmit health-related data, present opportunities to address critical healthcare needs. Leveraging WSN technology facilitates real-time health monitoring and remote diagnostics, enabling continuous patient observation and early detection of medical issues, especially in areas with limited healthcare facilities and professionals. The implementation of WSNs can enhance the overall efficiency of healthcare systems by enabling timely interventions, reducing the strain on healthcare facilities, and optimizing resource allocation. This paper highlights the potential benefits of WSNs in low-income markets, such as cost-effectiveness, increased accessibility, and data-driven decision-making. However, deploying WSNs involves significant challenges, including technical barriers like limited internet connectivity and power supply, alongside concerns about data privacy and security. Moreover, robust infrastructure and adequate training for local healthcare providers are essential for successful implementation. It further examines future directions for WSNs, emphasizing innovation, scalable solutions, and public-private partnerships. By addressing these challenges and harnessing the potential of WSNs, it is possible to revolutionize healthcare delivery and improve health outcomes in low-income markets.Keywords: wireless sensor networks (WSNs), healthcare delivery, low-Income markets, remote patient monitoring, health data security
Procedia PDF Downloads 36715 The Effect of General Data Protection Regulation on South Asian Data Protection Laws
Authors: Sumedha Ganjoo, Santosh Goswami
Abstract:
The rising reliance on technology places national security at the forefront of 21st-century issues. It complicates the efforts of emerging and developed countries to combat cyber threats and increases the inherent risk factors connected with technology. The inability to preserve data securely might have devastating repercussions on a massive scale. Consequently, it is vital to establish national, regional, and global data protection rules and regulations that penalise individuals who participate in immoral technology usage and exploit the inherent vulnerabilities of technology. This study paper seeks to analyse GDPR-inspired Bills in the South Asian Region and determine their suitability for the development of a worldwide data protection framework, considering that Asian countries are much more diversified than European ones. In light of this context, the objectives of this paper are to identify GDPR-inspired Bills in the South Asian Region, identify their similarities and differences, as well as the obstacles to developing a regional-level data protection mechanism, thereby satisfying the need to develop a global-level mechanism. Due to the qualitative character of this study, the researcher did a comprehensive literature review of prior research papers, journal articles, survey reports, and government publications on the aforementioned topics. Taking into consideration the survey results, the researcher conducted a critical analysis of the significant parameters highlighted in the literature study. Many nations in the South Asian area are in the process of revising their present data protection measures in accordance with GDPR, according to the primary results of this study. Consideration is given to the data protection laws of Thailand, Malaysia, China, and Japan. Significant parallels and differences in comparison to GDPR have been discussed in detail. The conclusion of the research analyses the development of various data protection legislation regimes in South Asia.Keywords: data privacy, GDPR, Asia, data protection laws
Procedia PDF Downloads 82714 Hybrid Genetic Approach for Solving Economic Dispatch Problems with Valve-Point Effect
Authors: Mohamed I. Mahrous, Mohamed G. Ashmawy
Abstract:
Hybrid genetic algorithm (HGA) is proposed in this paper to determine the economic scheduling of electric power generation over a fixed time period under various system and operational constraints. The proposed technique can outperform conventional genetic algorithms (CGAs) in the sense that HGA make it possible to improve both the quality of the solution and reduce the computing expenses. In contrast, any carefully designed GA is only able to balance the exploration and the exploitation of the search effort, which means that an increase in the accuracy of a solution can only occure at the sacrifice of convergent speed, and vice visa. It is unlikely that both of them can be improved simultaneously. The proposed hybrid scheme is developed in such a way that a simple GA is acting as a base level search, which makes a quick decision to direct the search towards the optimal region, and a local search method (pattern search technique) is next employed to do the fine tuning. The aim of the strategy is to achieve the cost reduction within a reasonable computing time. The effectiveness of the proposed hybrid technique is verified on two real public electricity supply systems with 13 and 40 generator units respectively. The simulation results obtained with the HGA for the two real systems are very encouraging with regard to the computational expenses and the cost reduction of power generation.Keywords: genetic algorithms, economic dispatch, pattern search
Procedia PDF Downloads 444713 Experimental and Numerical Investigation of Heat Transfer in THTL Test Loop Shell and Tube Heat Exchanger
Authors: M. Moody, R. Mahmoodi, A. R. Zolfaghari, A. Aminottojari
Abstract:
In this study, flow inside the shell side of a shell-and-tube heat exchanger is simulated numerically for laminar and turbulent flows in both steady state and transient mode. Governing equations of fluid flow are discrete using finite volume method and central difference scheme and solved with simple algorithm which is staggered grid by using MATLAB programming language. The heat transfer coefficient is obtained using velocity field from equation Dittus-Bolter. In comparison with, heat exchanger is simulated with ANSYS CFX software and experimental data measured in the THTL test loop. Numerical results obtained from the study show good agreement with experimental data and ANSYS CFX results. In addition, by deliberation the effect of the baffle spacing and the baffle cut on the heat transfer rate for turbulent flow, it is illustrated that the heat transfer rate depends on the baffle spacing and the baffle cut directly. In other word in spied of large turbulence, if these two parameters are not selected properly in the heat exchanger, the heat transfer rate can reduce.Keywords: shell-and-tube heat exchanger, flow and heat transfer, laminar and turbulence flow, turbulence model, baffle spacing, baffle cut
Procedia PDF Downloads 537712 Artificial Bee Colony Optimization for SNR Maximization through Relay Selection in Underlay Cognitive Radio Networks
Authors: Babar Sultan, Kiran Sultan, Waseem Khan, Ijaz Mansoor Qureshi
Abstract:
In this paper, a novel idea for the performance enhancement of secondary network is proposed for Underlay Cognitive Radio Networks (CRNs). In Underlay CRNs, primary users (PUs) impose strict interference constraints on the secondary users (SUs). The proposed scheme is based on Artificial Bee Colony (ABC) optimization for relay selection and power allocation to handle the highlighted primary challenge of Underlay CRNs. ABC is a simple, population-based optimization algorithm which attains global optimum solution by combining local search methods (Employed and Onlooker Bees) and global search methods (Scout Bees). The proposed two-phase relay selection and power allocation algorithm aims to maximize the signal-to-noise ratio (SNR) at the destination while operating in an underlying mode. The proposed algorithm has less computational complexity and its performance is verified through simulation results for a different number of potential relays, different interference threshold levels and different transmit power thresholds for the selected relays.Keywords: artificial bee colony, underlay spectrum sharing, cognitive radio networks, amplify-and-forward
Procedia PDF Downloads 581711 Social Collaborative Learning Model Based on Proactive Involvement to Promote the Global Merit Principle in Cultivating Youths' Morality
Authors: Wera Supa, Panita Wannapiroon
Abstract:
This paper is a report on the designing of the social collaborative learning model based on proactive involvement to Promote the global merit principle in cultivating youths’ morality. The research procedures into two phases, the first phase is to design the social collaborative learning model based on proactive involvement to promote the global merit principle in cultivating youths’ morality, and the second is to evaluate the social collaborative learning model based on proactive involvement. The sample group in this study consists of 15 experts who are dominant in proactive participation, moral merit principle and youths’ morality cultivation from executive level, lecturers and the professionals in information and communication technology expertise selected using the purposive sampling method. Data analyzed by arithmetic mean and standard deviation. This study has explored that there are four significant factors in promoting the hands-on collaboration of global merit scheme in order to implant virtues to adolescences which are: 1) information and communication Technology Usage; 2) proactive involvement; 3) morality cultivation policy, and 4) global merit principle. The experts agree that the social collaborative learning model based on proactive involvement is highly appropriate.Keywords: social collaborative learning, proactive involvement, global merit principle, morality
Procedia PDF Downloads 388710 Artificial Intelligence-Based Chest X-Ray Test of COVID-19 Patients
Authors: Dhurgham Al-Karawi, Nisreen Polus, Shakir Al-Zaidi, Sabah Jassim
Abstract:
The management of COVID-19 patients based on chest imaging is emerging as an essential tool for evaluating the spread of the pandemic which has gripped the global community. It has already been used to monitor the situation of COVID-19 patients who have issues in respiratory status. There has been increase to use chest imaging for medical triage of patients who are showing moderate-severe clinical COVID-19 features, this is due to the fast dispersal of the pandemic to all continents and communities. This article demonstrates the development of machine learning techniques for the test of COVID-19 patients using Chest X-Ray (CXR) images in nearly real-time, to distinguish the COVID-19 infection with a significantly high level of accuracy. The testing performance has covered a combination of different datasets of CXR images of positive COVID-19 patients, patients with viral and bacterial infections, also, people with a clear chest. The proposed AI scheme successfully distinguishes CXR scans of COVID-19 infected patients from CXR scans of viral and bacterial based pneumonia as well as normal cases with an average accuracy of 94.43%, sensitivity 95%, and specificity 93.86%. Predicted decisions would be supported by visual evidence to help clinicians speed up the initial assessment process of new suspected cases, especially in a resource-constrained environment.Keywords: COVID-19, chest x-ray scan, artificial intelligence, texture analysis, local binary pattern transform, Gabor filter
Procedia PDF Downloads 145709 Assignment of Airlines Technical Members under Disruption
Authors: Walid Moudani
Abstract:
The Crew Reserve Assignment Problem (CRAP) considers the assignment of the crew members to a set of reserve activities covering all the scheduled flights in order to ensure a continuous plan so that operations costs are minimized while its solution must meet hard constraints resulting from the safety regulations of Civil Aviation as well as from the airlines internal agreements. The problem considered in this study is of highest interest for airlines and may have important consequences on the service quality and on the economic return of the operations. In this communication, a new mathematical formulation for the CRAP is proposed which takes into account the regulations and the internal agreements. While current solutions make use of Artificial Intelligence techniques run on main frame computers, a low cost approach is proposed to provide on-line efficient solutions to face perturbed operating conditions. The proposed solution method uses a dynamic programming approach for the duties scheduling problem and when applied to the case of a medium airline while providing efficient solutions, shows good potential acceptability by the operations staff. This optimization scheme can then be considered as the core of an on-line Decision Support System for crew reserve assignment operations management.Keywords: airlines operations management, combinatorial optimization, dynamic programming, crew scheduling
Procedia PDF Downloads 354708 Deep Reinforcement Learning Model Using Parameterised Quantum Circuits
Authors: Lokes Parvatha Kumaran S., Sakthi Jay Mahenthar C., Sathyaprakash P., Jayakumar V., Shobanadevi A.
Abstract:
With the evolution of technology, the need to solve complex computational problems like machine learning and deep learning has shot up. But even the most powerful classical supercomputers find it difficult to execute these tasks. With the recent development of quantum computing, researchers and tech-giants strive for new quantum circuits for machine learning tasks, as present works on Quantum Machine Learning (QML) ensure less memory consumption and reduced model parameters. But it is strenuous to simulate classical deep learning models on existing quantum computing platforms due to the inflexibility of deep quantum circuits. As a consequence, it is essential to design viable quantum algorithms for QML for noisy intermediate-scale quantum (NISQ) devices. The proposed work aims to explore Variational Quantum Circuits (VQC) for Deep Reinforcement Learning by remodeling the experience replay and target network into a representation of VQC. In addition, to reduce the number of model parameters, quantum information encoding schemes are used to achieve better results than the classical neural networks. VQCs are employed to approximate the deep Q-value function for decision-making and policy-selection reinforcement learning with experience replay and the target network.Keywords: quantum computing, quantum machine learning, variational quantum circuit, deep reinforcement learning, quantum information encoding scheme
Procedia PDF Downloads 134707 Response of Onion to FTM and Inorganic Fertilizers Application on Growth, Yield and Nutrient Uptake in Lateritic Soil of Konkan
Authors: Rupali Thorat, S. B. Dodake, V. N. Palsande, S. D. Patil
Abstract:
A field experiment was conducted to study the “Response of onion to FYM and inorganic fertilizers application on growth, yield and nutrient uptake in lateritic soil of Konkan” at the farm of Pangari block of Irrigation of Scheme, Central Experimentation Station, Wakawali during Rabi 2009-10. There were 12 treatment combinations, comprising of 3 levels of NPK fertilizers (C1 ,C2-125 kg N, 62.5 kg P205 and 62.5 kg K20 ha-1 and C3-150 kg N, 75 kg P205 and 75 kg K20 ha-1) and 4 levels of FYM (F1-10 t FYM ha-1, F2 - 15 t FYM ha-1, F3-20 t FYM ha-1, F4-25 t FYM ha-1) replicated thrice using Factorial Randomized Block Design. The observations on plant height, number of leaves, girth of plant, polar and equatorial diameter of bulb as well as dry matter yield, onion bulb yield recorded during the course of field study were subjected to statistical analysis. Similarly nutrient content and uptake, quality parameters of bulb and soil properties were also determined and their data were also analyzed statistically. It is revealed from the study that the growth attributes, dry matter yield, onion bulb yield, nutrient content, nutrient uptake, quality parameters were improved significantly due to application of NPK @ 150:75:75 kg ha-1 along with FYM @ 20 t ha-1(C3F3). Application of NPK @ 150:75:75 kg ha-1 along with FYM @ 20 t ha-1 (C3F3) registered highest onion bulb yield (t ha-1). The quality of onion as well as availability of N, P, K, Fe, Mn, Zn and Cu in the soil was improved due to application of NPK @ 150:75:75 kg ha-1 and FYM @ 20 t ha-1.Keywords: onion, FYM, yield, nutrient uptake and fertilizer
Procedia PDF Downloads 487706 A Group Setting of IED in Microgrid Protection Management System
Authors: Jyh-Cherng Gu, Ming-Ta Yang, Chao-Fong Yan, Hsin-Yung Chung, Yung-Ruei Chang, Yih-Der Lee, Chen-Min Chan, Chia-Hao Hsu
Abstract:
There are a number of distributed generations (DGs) installed in microgrid, which may have diverse path and direction of power flow or fault current. The overcurrent protection scheme for the traditional radial type distribution system will no longer meet the needs of microgrid protection. Integrating the intelligent electronic device (IED) and a supervisory control and data acquisition (SCADA) with IEC 61850 communication protocol, the paper proposes a microgrid protection management system (MPMS) to protect power system from the fault. In the proposed method, the MPMS performs logic programming of each IED to coordinate their tripping sequence. The GOOSE message defined in IEC 61850 is used as the transmission information medium among IEDs. Moreover, to cope with the difference in fault current of microgrid between grid-connected mode and islanded mode, the proposed MPMS applies the group setting feature of IED to protect system and robust adaptability. Once the microgrid topology varies, the MPMS will recalculate the fault current and update the group setting of IED. Provided there is a fault, IEDs will isolate the fault at once. Finally, the Matlab/Simulink and Elipse Power Studio software are used to simulate and demonstrate the feasibility of the proposed method.Keywords: IEC 61850, IED, group Setting, microgrid
Procedia PDF Downloads 463705 Distributed Optical Fiber Vibration Sensing Using Phase Generated Carrier Demodulation Algorithm
Authors: Zhihua Yu, Qi Zhang, Mingyu Zhang, Haolong Dai
Abstract:
Distributed fiber-optic vibration sensors are gaining extensive attention, for the advantages of high sensitivity, accurate location, light weight, large-scale monitoring, good concealment, and etc. In this paper, a novel optical fiber distributed vibration sensing system is proposed, which is based on self-interference of Rayleigh backscattering with phase generated carrier (PGC) demodulation algorithm. Pulsed lights are sent into the sensing fiber and the Rayleigh backscattering light from a certain position along the sensing fiber would interfere through an unbalanced Michelson Interferometry (MI) to generate the interference light. An improved PGC demodulation algorithm is carried out to recover the phase information of the interference signal, which carries the sensing information. Three vibration events were applied simultaneously to different positions over 2000m sensing fiber and demodulated correctly. Experiments show that the spatial resolution of is 10 m, and the noise level of the Φ-OTDR system is about 10-3 rad/√Hz, and the signal to noise ratio (SNR) is about 30.34dB. This vibration measurement scheme can be applied at surface, seabed or downhole for vibration measurements or distributed acoustic sensing (DAS).Keywords: fiber optics sensors, Michelson interferometry, MI, phase-sensitive optical time domain reflectometry, Φ-OTDR, phase generated carrier, PGC
Procedia PDF Downloads 190704 Online Handwritten Character Recognition for South Indian Scripts Using Support Vector Machines
Authors: Steffy Maria Joseph, Abdu Rahiman V, Abdul Hameed K. M.
Abstract:
Online handwritten character recognition is a challenging field in Artificial Intelligence. The classification success rate of current techniques decreases when the dataset involves similarity and complexity in stroke styles, number of strokes and stroke characteristics variations. Malayalam is a complex south indian language spoken by about 35 million people especially in Kerala and Lakshadweep islands. In this paper, we consider the significant feature extraction for the similar stroke styles of Malayalam. This extracted feature set are suitable for the recognition of other handwritten south indian languages like Tamil, Telugu and Kannada. A classification scheme based on support vector machines (SVM) is proposed to improve the accuracy in classification and recognition of online malayalam handwritten characters. SVM Classifiers are the best for real world applications. The contribution of various features towards the accuracy in recognition is analysed. Performance for different kernels of SVM are also studied. A graphical user interface has developed for reading and displaying the character. Different writing styles are taken for each of the 44 alphabets. Various features are extracted and used for classification after the preprocessing of input data samples. Highest recognition accuracy of 97% is obtained experimentally at the best feature combination with polynomial kernel in SVM.Keywords: SVM, matlab, malayalam, South Indian scripts, onlinehandwritten character recognition
Procedia PDF Downloads 574703 The Effects of a Nursing Dignity Care Program on Patients’ Dignity in Care
Authors: Yea-Pyng Lin
Abstract:
Dignity is a core element of nursing care. Maintaining the dignity of patients is an important issue because the health and recovery of patients can be adversely affected by a lack of dignity in their care. The aim of this study was to explore the effects of a nursing dignity care program upon patients’ dignity in care. A quasi-experimental research design was implemented. Nurses were recruited by purposive sampling, and their patients were recruited by simple random sampling. Nurses in the experimental group received the nursing educational program on dignity care, while nurses in the control group received in-service education as usual. Data were collected via two instruments: the dignity in care scale for nurses and the dignity in care scale to patients, both of which were developed by the researcher. Both questionnaires consisted of three domains: agreement, importance, and frequencies of providing dignity care. A total of 178 nurses in the experimental group and 193 nurses in the control group completed the pretest and the follow-up evaluations at the first month, the third month, and the sixth month. The number of patients who were cared for by the nurses in the experimental group was 94 in the pretest. The number of patients in the post-test at the first, third, and sixth months were 91, 85, and 77, respectively. In the control group, 88 patients completed the II pretest, and 80 filled out the post-test at the first month, 77 at the third, and 74 at the sixth month. The major findings revealed the scores of agreement domain among nurses in the experimental group were found significantly different from those who in the control group at each point of time. The scores of importance domain between these two groups also displayed significant differences at pretest and the first month of post-test. Moreover, the frequencies of proving dignity care to patients were significant at pretest, the third month and sixth month of post-test. However, the experimental group had only significantly different from those who in the control group on the frequencies of receiving dignity care especially in the items of ‘privacy care,’ ‘communication care,’ and ‘emotional care’ for the patients. The results show that the nursing program on dignity care could increase nurses’ dignity care for patients in three domains of agreement, importance, and frequencies of providing dignity care. For patients, only the frequencies of receiving dignity care were significantly increased. Therefore, the nursing program on dignity care could be applicable for nurses’ in-service education and practice to enhance the ability of nurses to care for patient’s dignity.Keywords: nurses, patients, dignity care, quasi-experimental, nursing education
Procedia PDF Downloads 466702 Biodiversity Conservation Practices Among Indigenous Peoples in Caraga Region, Mindanao, Philippines
Authors: Milagros S. Salibad, Levita B. Grana
Abstract:
The presence and role of Indigenous Peoples residing in key biodiversity, protected, and watershed areas within the ancestral domain in the Caraga Region hold immense significance. This study aimed to determine the level of biodiversity conservation practices among the Mamanwas, Manobos, and Higaonons, and identify facilitating or hindering factors. Employing a mixed-method research design, 421 respondents participated through a researcher-made questionnaire. Focus group discussions, key informant interviews, researcher field notes, community immersions, and secondary sources were done. The three groups have demonstrated a high level of biodiversity conservation practices manifesting their commitment to conserving their natural resources and ecosystems. Evidently, selecting and cutting only mature trees for shelter and tribal usage, and preservation of large trees that harbor ancestors’ spirits and worship through rituals (Mambabaja). Each group exhibited unique environmental practices shaped by their distinct cultures, traditions, customary knowledge, and access to information. The Mamanwa practiced traditional hunting and gathering by using traps while Manobo practiced shifting cultivation to maintain soil fertility and biodiversity, and Higaonon managed forest resources through traditional forest management (establishment of sacred forests and conservation areas). Various facilitating and hindering factors influenced their conservation efforts. Their traditional knowledge and practices, partnership and collaboration, legal recognition and support, access to information, and biodiversity monitoring system facilitate practices. Insufficient government assistance, political and social issues, scarce financial support, inadequate policy enforcement, lack of livelihood opportunities, and land use conflicts hinder them. Monitoring the sustainability of IPs' local biodiversity conservation practices is essential as they contribute to conservation endeavors.Keywords: biodiversity, conservation, indigenous peoples, traditional knowledge
Procedia PDF Downloads 77701 Classification of Forest Types Using Remote Sensing and Self-Organizing Maps
Authors: Wanderson Goncalves e Goncalves, José Alberto Silva de Sá
Abstract:
Human actions are a threat to the balance and conservation of the Amazon forest. Therefore the environmental monitoring services play an important role as the preservation and maintenance of this environment. This study classified forest types using data from a forest inventory provided by the 'Florestal e da Biodiversidade do Estado do Pará' (IDEFLOR-BIO), located between the municipalities of Santarém, Juruti and Aveiro, in the state of Pará, Brazil, covering an area approximately of 600,000 hectares, Bands 3, 4 and 5 of the TM-Landsat satellite image, and Self - Organizing Maps. The information from the satellite images was extracted using QGIS software 2.8.1 Wien and was used as a database for training the neural network. The midpoints of each sample of forest inventory have been linked to images. Later the Digital Numbers of the pixels have been extracted, composing the database that fed the training process and testing of the classifier. The neural network was trained to classify two forest types: Rain Forest of Lowland Emerging Canopy (Dbe) and Rain Forest of Lowland Emerging Canopy plus Open with palm trees (Dbe + Abp) in the Mamuru Arapiuns glebes of Pará State, and the number of examples in the training data set was 400, 200 examples for each class (Dbe and Dbe + Abp), and the size of the test data set was 100, with 50 examples for each class (Dbe and Dbe + Abp). Therefore, total mass of data consisted of 500 examples. The classifier was compiled in Orange Data Mining 2.7 Software and was evaluated in terms of the confusion matrix indicators. The results of the classifier were considered satisfactory, and being obtained values of the global accuracy equal to 89% and Kappa coefficient equal to 78% and F1 score equal to 0,88. It evaluated also the efficiency of the classifier by the ROC plot (receiver operating characteristics), obtaining results close to ideal ratings, showing it to be a very good classifier, and demonstrating the potential of this methodology to provide ecosystem services, particularly in anthropogenic areas in the Amazon.Keywords: artificial neural network, computational intelligence, pattern recognition, unsupervised learning
Procedia PDF Downloads 361700 Multilingual Practices in the UK: Kabyles’ Situational Language Choice in a Linguistically Diverse Setting.
Authors: Souhila Belabbas
Abstract:
This paper focuses on the Kabyles’ multilingual practices in the UK, within the Kabyle/Amazigh Cultural Organisation in London, on online platforms and at home. The Kabyles have roots in northern Algeria and associate their language, Kabyle, with a pre-Arabized history of northern Africa. Drawing on ethnographic research with this community, this study brings together their post-migration language preservation activisms as well as their dynamic multilingual practices and situational language choice into a dialogue. This shows the enduring significance of the heritage language for social, cultural and historical identity. It also demonstrates that the current survival of the “mother tongue” hinges on multilingual and multi-sited language activisms, which bear the hallmarks of both new creativities and diminishing fluencies in multilingual spaces. These multilingual repertoires also included a range of ideological stances, expressed as cultural, moral, and political attitudes to the “mother tongue” and to other, potentially more dominant, languages in their lives, involving both inclusive and exclusive instances. The Kabyles in the UK practice everyday forms of multilingualism in the dynamic terms whilst making strong identity claims to an endangered heritage language. Crucially, their language contact experiences were not a post-migration novelty but part of their pre-migration lifeworlds. The participants involved in this study shared a commitment to Kabyle identity activism. They expressed this differently, varyingly foregrounding cultural, social or political issues. These differences were related to their North-African cultural background, live, gender, religious and/or political affiliation, as well as to their different migratory trajectories. Among these ethno-conscious individuals, the use of Kabyle was often particularly vibrant in informal domains of casual conversations and mixed in with French, English and often Arabic. During community events and festivals, though, many made special efforts to converse in Kabyle as if to make a point about their commitment to a shared identity.Keywords: ethnography, language ideology, language choice, heritage language, migration trajectories, multilingual repertoires
Procedia PDF Downloads 79699 Multilingual Practices in the UK: Kabyles’ Situational Language Choice in a Linguistically Diverse Setting
Authors: Souhila Belabbas
Abstract:
This paper focuses on the Kabyles’ multilingual practices in the UK, within the Kabyle/Amazigh Cultural Organisation in London, on online platforms and at home. The Kabyles have roots in northern Algeria and associate their language, Kabyle, with a pre-Arabized history of northern Africa. Drawing on ethnographic research with this community, this study brings together their post-migration language preservation activisms as well as their dynamic multilingual practices and situational language choice into a dialogue. This shows the enduring significance of the heritage language for social, cultural and historical identity. It also demonstrates that the current survival of the “mother tongue” hinges on multilingual and multi-sited language activisms, which bear the hallmarks of both new creativities and diminishing fluencies in multilingual spaces. These multilingual repertoires also included a range of ideological stances, expressed as cultural, moral, and political attitudes to the “mother tongue” and to other, potentially more dominant, languages in their lives, involving both inclusive and exclusive instances. The Kabyles in the UK practice everyday forms of multilingualism in the dynamic terms whilst making strong identity claims to an endangered heritage language. Crucially, their language contact experiences were not a post-migration novelty but part of their pre-migration lifeworlds. The participants involved in this study shared a commitment to Kabyle identity activism. They expressed this differently, varyingly foregrounding cultural, social or political issues. These differences were related to their North-African cultural background, live, gender, religious and/or political affiliation, as well as to their different migratory trajectories. Among these ethno-conscious individuals, the use of Kabyle was often particularly vibrant in informal domains of casual conversations and mixed in with French, English and often Arabic. During community events and festivals, though, many made special efforts to converse in Kabyle as if to make a point about their commitment to a shared identity.Keywords: ethnography, language ideology, language choice, heritage language, migration trajectories, multilingual repertoires
Procedia PDF Downloads 78698 Mathematical Modeling and Simulation of Convective Heat Transfer System in Adjustable Flat Collector Orientation for Commercial Solar Dryers
Authors: Adeaga Ibiyemi Iyabo, Adeaga Oyetunde Adeoye
Abstract:
Interestingly, mechanical drying methods has played a major role in the commercialization of agricultural and agricultural allied sectors. In the overall, drying enhances the favorable storability and preservation of agricultural produce which in turn promotes its producibility, marketability, salability, and profitability. Recent researches have shown that solar drying is easier, affordable, controllable, and of course, cleaner and purer than other means of drying methods. It is, therefore, needful to persistently appraise solar dryers with a view to improving on the existing advantages. In this paper, mathematical equations were formulated for solar dryer using mass conservation law, material balance law and least cost savings method. Computer codes were written in Visual Basic.Net. The developed computer software, which considered Ibadan, a strategic south-western geographical location in Nigeria, was used to investigate the relationship between variable orientation angle of flat plate collector on solar energy trapped, derived monthly heat load, available energy supplied by solar and fraction supplied by solar energy when 50000 Kg/Month of produce was dried over a year. At variable collector tilt angle of 10°.13°,15°,18°, 20°, the derived monthly heat load, available energy supplied by solar were 1211224.63MJ, 102121.34MJ, 0.111; 3299274.63MJ, 10121.34MJ, 0.132; 5999364.706MJ, 171222.859MJ, 0.286; 4211224.63MJ, 132121.34MJ, 0.121; 2200224.63MJ, 112121.34MJ, 0.104, respectively .These results showed that if optimum collector angle is not reached, those factors needed for efficient and cost reduction drying will be difficult to attain. Therefore, this software has revealed that off - optimum collector angle in commercial solar drying does not worth it, hence the importance of the software in decision making as to the optimum collector angle of orientation.Keywords: energy, ibadan, heat - load, visual-basic.net
Procedia PDF Downloads 410697 A Development of Holonomic Mobile Robot Using Fuzzy Multi-Layered Controller
Authors: Seungwoo Kim, Yeongcheol Cho
Abstract:
In this paper, a holonomic mobile robot is designed in omnidirectional wheels and an adaptive fuzzy controller is presented for its precise trajectories. A kind of adaptive controller based on fuzzy multi-layered algorithm is used to solve the big parametric uncertainty of motor-controlled dynamic system of 3-wheels omnidirectional mobile robot. The system parameters such as a tracking force are so time-varying due to the kinematic structure of omnidirectional wheels. The fuzzy adaptive control method is able to solve the problems of classical adaptive controller and conventional fuzzy adaptive controllers. The basic idea of new adaptive control scheme is that an adaptive controller can be constructed with parallel combination of robust controllers. This new adaptive controller uses a fuzzy multi-layered architecture which has several independent fuzzy controllers in parallel, each with different robust stability area. Out of several independent fuzzy controllers, the most suited one is selected by a system identifier which observes variations in the controlled system parameter. This paper proposes a design procedure which can be carried out mathematically and systematically from the model of a controlled system. Finally, the good performance of a holonomic mobile robot is confirmed through live tests of the tracking control task.Keywords: fuzzy adaptive control, fuzzy multi-layered controller, holonomic mobile robot, omnidirectional wheels, robustness and stability.
Procedia PDF Downloads 359696 Medical Image Watermark and Tamper Detection Using Constant Correlation Spread Spectrum Watermarking
Authors: Peter U. Eze, P. Udaya, Robin J. Evans
Abstract:
Data hiding can be achieved by Steganography or invisible digital watermarking. For digital watermarking, both accurate retrieval of the embedded watermark and the integrity of the cover image are important. Medical image security in Teleradiology is one of the applications where the embedded patient record needs to be extracted with accuracy as well as the medical image integrity verified. In this research paper, the Constant Correlation Spread Spectrum digital watermarking for medical image tamper detection and accurate embedded watermark retrieval is introduced. In the proposed method, a watermark bit from a patient record is spread in a medical image sub-block such that the correlation of all watermarked sub-blocks with a spreading code, W, would have a constant value, p. The constant correlation p, spreading code, W and the size of the sub-blocks constitute the secret key. Tamper detection is achieved by flagging any sub-block whose correlation value deviates by more than a small value, ℇ, from p. The major features of our new scheme include: (1) Improving watermark detection accuracy for high-pixel depth medical images by reducing the Bit Error Rate (BER) to Zero and (2) block-level tamper detection in a single computational process with simultaneous watermark detection, thereby increasing utility with the same computational cost.Keywords: Constant Correlation, Medical Image, Spread Spectrum, Tamper Detection, Watermarking
Procedia PDF Downloads 194695 Verification of Simulated Accumulated Precipitation
Authors: Nato Kutaladze, George Mikuchadze, Giorgi Sokhadze
Abstract:
Precipitation forecasts are one of the most demanding applications in numerical weather prediction (NWP). Georgia, as the whole Caucasian region, is characterized by very complex topography. The country territory is prone to flash floods and mudflows, quantitative precipitation estimation (QPE) and quantitative precipitation forecast (QPF) at any leading time are very important for Georgia. In this study, advanced research weather forecasting model’s skill in QPF is investigated over Georgia’s territory. We have analyzed several convection parameterization and microphysical scheme combinations for different rainy episodes and heavy rainy phenomena. We estimate errors and biases in accumulated 6 h precipitation using different spatial resolution during model performance verification for 12-hour and 24-hour lead time against corresponding rain gouge observations and satellite data. Various statistical parameters have been calculated for the 8-month comparison period, and some skills of model simulation have been evaluated. Our focus is on the formation and organization of convective precipitation systems in a low-mountain region. Several problems in connection with QPF have been identified for mountain regions, which include the overestimation and underestimation of precipitation on the windward and lee side of the mountains, respectively, and a phase error in the diurnal cycle of precipitation leading to the onset of convective precipitation in model forecasts several hours too early.Keywords: extremal dependence index, false alarm, numerical weather prediction, quantitative precipitation forecasting
Procedia PDF Downloads 147694 Direct In-Situ Ring Opening Polymerization of E-caprolactone to Produce Biodegradable PCL/Montmorillonite Nanocomposites
Authors: Amine Harrane, Mahmoud Belalia
Abstract:
During the last decade, polymer layered silicate nanocomposites have received increasing attention from scientists and industrial researchers because they generally exhibit greatly improved mechanical, thermal, barrier and flame-retardant properties at low clay content in comparison with unfilled polymers or more conventional micro composites. Poly(ε-caprolactone) (PCL)-layered silicate nanocomposites have the advantage of adding biocompatibility and biodegradability to the traditional properties of nanocomposites. They can be prepared by in situ ring-opening polymerization of ε-caprolactone using a conventional initiator to induce polymerization in the presence of an organophilic clay, such as organomodified montmorillonite. Messersmith and Giannelis used montmorillonite exchanged with protonated 12-amino dodecanoic acid and Cr3+ exchanged fluorohectorite, a synthetic mica type of silicate. Sn-based catalysts such as tin (II) octoate and dibutyltin (IV) dimethoxide have been reported to efficiently promote the polymerization of ε-caprolactone in the presence of organomodified clays. In this work, we have used an alternative method to prepare PCL/montmorillonite nanocomposites. The cationic polymerization of ε-caprolactone was initiated directly by Maghnite-TOA, organomodified montmorillonite clay, to produce nanocomposites (Scheme 1). Resulted from nanocomposites were characterized by X-ray diffraction (XRD), transmission electron microscopy (TEM), force atomic microscopy (AFM) and thermogravimetry.Keywords: polycaprolactone, polycaprolactone/clay nanocomposites, biodegradables nanocomposites, Maghnite, Insitu polymeriation
Procedia PDF Downloads 78