Search results for: geometric search algorithm
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5651

Search results for: geometric search algorithm

3701 In Search of Good Fortune: Individualization, Youth and the Spanish Labour Market within a Context of Crisis

Authors: Matthew Lee Turnbough

Abstract:

In 2007 Spain began to experience the effects of a deep economic crisis, which would generate a situation characterised by instability and uncertainty. This has been an obstacle, especially acute for the youth of this country seeking to enter the workforce. As a result of the impact of COVID-19, the youth in Spain are now suffering the effects of a new crisis that has deepened an already fragile labour environment. In this paper, we analyse the discourses that have emerged from a precarious labour market, specifically from two companies dedicated to operating job portals and job listings in Spain, Job Today, and CornerJob. These two start-up businesses have developed mobile applications geared towards young adults in search of employment in the service sector, two of the companies with the highest user rates in Spain. Utilizing a discourse analysis approach, we explore the impact of individualization and how the process of psychologization may contribute to an increasing reliance on individual solutions to social problems. As such, we seek to highlight the expectations and demands that are placed upon young workers and the type of subjectivity that this dynamic could foster, all this within an unstable framework seemingly marked by chance, a context which is key for the emergence of individualization. Furthermore, we consider the extent to which young adults incorporate these discourses and the strategies they employ basing our analysis on the VULSOCU (New Forms of Socio-Existential Vulnerability, Supports, and Care in Spain) research project, specifically the results of nineteen in-depth interviews and three discussion groups with young adults in this country. Consequently, we seek to elucidate the argumentative threads rooted in the process of individualization and underline the implications of this dynamic for the young worker and his/her labour insertion while also identifying manifestations of the goddess of fortune as a representation of chance in this context. Finally, we approach this panorama of social change in Spain from the perspective of the individuals or young adults who find themselves immersed in this transition from one crisis to another.

Keywords: chance, crisis, discourses, individualization, work, youth

Procedia PDF Downloads 108
3700 Multi-Robotic Partial Disassembly Line Balancing with Robotic Efficiency Difference via HNSGA-II

Authors: Tao Yin, Zeqiang Zhang, Wei Liang, Yanqing Zeng, Yu Zhang

Abstract:

To accelerate the remanufacturing process of electronic waste products, this study designs a partial disassembly line with the multi-robotic station to effectively dispose of excessive wastes. The multi-robotic partial disassembly line is a technical upgrade to the existing manual disassembly line. Balancing optimization can make the disassembly line smoother and more efficient. For partial disassembly line balancing with the multi-robotic station (PDLBMRS), a mixed-integer programming model (MIPM) considering the robotic efficiency differences is established to minimize cycle time, energy consumption and hazard index and to calculate their optimal global values. Besides, an enhanced NSGA-II algorithm (HNSGA-II) is proposed to optimize PDLBMRS efficiently. Finally, MIPM and HNSGA-II are applied to an actual mixed disassembly case of two types of computers, the comparison of the results solved by GUROBI and HNSGA-II verifies the correctness of the model and excellent performance of the algorithm, and the obtained Pareto solution set provides multiple options for decision-makers.

Keywords: waste disposal, disassembly line balancing, multi-robot station, robotic efficiency difference, HNSGA-II

Procedia PDF Downloads 222
3699 A Concept for Design of Road Super-Elevation Based on Horizontal Radius, Vertical Gradient and Accident Rate

Authors: U. Chattaraj, D. Meena

Abstract:

Growth of traffic brings various negative effects, such as road accidents. To avoid such problems, a model is developed for the purpose of highway safety. In such areas, fuzzy logic is the most well-known simulation in the larger field. A model is accomplished for hilly and steep terrain based on Fuzzy Inference System (FIS), for which output is super elevation and input data is horizontal radius, vertical gradient, accident rate (AR). This result shows that the system can be efficaciously applied as for highway safety tool distinguishing hazards components correlated to the characteristics of the highway and has a great influence to the making of decision for accident precaution in transportation models. From this model, a positive relationship between geometric elements, accident rate, and super elevation is also identified.

Keywords: accident rate, fuzzy inference system, fuzzy logic, gradient, radius, super elevation

Procedia PDF Downloads 209
3698 Tracking Filtering Algorithm Based on ConvLSTM

Authors: Ailing Yang, Penghan Song, Aihua Cai

Abstract:

The nonlinear maneuvering target tracking problem is mainly a state estimation problem when the target motion model is uncertain. Traditional solutions include Kalman filtering based on Bayesian filtering framework and extended Kalman filtering. However, these methods need prior knowledge such as kinematics model and state system distribution, and their performance is poor in state estimation of nonprior complex dynamic systems. Therefore, in view of the problems existing in traditional algorithms, a convolution LSTM target state estimation (SAConvLSTM-SE) algorithm based on Self-Attention memory (SAM) is proposed to learn the historical motion state of the target and the error distribution information measured at the current time. The measured track point data of airborne radar are processed into data sets. After supervised training, the data-driven deep neural network based on SAConvLSTM can directly obtain the target state at the next moment. Through experiments on two different maneuvering targets, we find that the network has stronger robustness and better tracking accuracy than the existing tracking methods.

Keywords: maneuvering target, state estimation, Kalman filter, LSTM, self-attention

Procedia PDF Downloads 158
3697 Crack Width Analysis of Reinforced Concrete Members under Shrinkage Effect by Pseudo-Discrete Crack Model

Authors: F. J. Ma, A. K. H. Kwan

Abstract:

Crack caused by shrinkage movement of concrete is a serious problem especially when restraint is provided. It may cause severe serviceability and durability problems. The existing prediction methods for crack width of concrete due to shrinkage movement are mainly numerical methods under simplified circumstances, which do not agree with each other. To get a more unified prediction method applicable to more sophisticated circumstances, finite element crack width analysis for shrinkage effect should be developed. However, no existing finite element analysis can be carried out to predict the crack width of concrete due to shrinkage movement because of unsolved reasons of conventional finite element analysis. In this paper, crack width analysis implemented by finite element analysis is presented with pseudo-discrete crack model, which combines traditional smeared crack model and newly proposed crack queuing algorithm. The proposed pseudo-discrete crack model is capable of simulating separate and single crack without adopting discrete crack element. And the improved finite element analysis can successfully simulate the stress redistribution when concrete is cracked, which is crucial for predicting crack width, crack spacing and crack number.

Keywords: crack queuing algorithm, crack width analysis, finite element analysis, shrinkage effect

Procedia PDF Downloads 411
3696 Occupational Health and Safety Servicing in Turkey: A New Approach

Authors: Duygu Çelgin

Abstract:

Until the new Occupational Health and Safety Law of Turkey, most of the workers were excluded from the mandatory occupational health and safety services. This new law, made the OHS services mandatory for all workers from all sectors including both public and private. However, in the application some problems and disadvantageous cases are occurred and the government also considered these cases. In this study, the new OHS law of Turkey and the regulations prepared according to the law are studied with the literature search.

Keywords: occupational health and safety in Turkey, OHS servicing in Turkey, safety experts, OHS support

Procedia PDF Downloads 461
3695 Improvement of Camera Calibration Based on the Relationship between Focal Length and Aberration Coefficient

Authors: Guorong Sui, Xingwei Jia, Chenhui Yin, Xiumin Gao

Abstract:

In the processing of camera-based high precision and non-contact measurement, the geometric-optical aberration is always inevitably disturbing the measuring system. Moreover, the aberration is different with the different focal length, which will increase the difficulties of the system’s calibration. Therefore, to understand the relationship between the focal length as a function of aberration properties is a very important issue to the calibration of the measuring systems. In this study, we propose a new mathematics model, which is based on the plane calibration method by Zhang Zhengyou, and establish a relationship between the focal length and aberration coefficient. By using the mathematics model and carefully modified compensation templates, the calibration precision of the system can be dramatically improved. The experiment results show that the relative error is less than 1%. It is important for optoelectronic imaging systems that apply to measure, track and position by changing the camera’s focal length.

Keywords: camera calibration, aberration coefficient, vision measurement, focal length, mathematics model

Procedia PDF Downloads 354
3694 Segmentation of Arabic Handwritten Numeral Strings Based on Watershed Approach

Authors: Nidal F. Shilbayeh, Remah W. Al-Khatib, Sameer A. Nooh

Abstract:

Arabic offline handwriting recognition systems are considered as one of the most challenging topics. Arabic Handwritten Numeral Strings are used to automate systems that deal with numbers such as postal code, banking account numbers and numbers on car plates. Segmentation of connected numerals is the main bottleneck in the handwritten numeral recognition system.  This is in turn can increase the speed and efficiency of the recognition system. In this paper, we proposed algorithms for automatic segmentation and feature extraction of Arabic handwritten numeral strings based on Watershed approach. The algorithms have been designed and implemented to achieve the main goal of segmenting and extracting the string of numeral digits written by hand especially in a courtesy amount of bank checks. The segmentation algorithm partitions the string into multiple regions that can be associated with the properties of one or more criteria. The numeral extraction algorithm extracts the numeral string digits into separated individual digit. Both algorithms for segmentation and feature extraction have been tested successfully and efficiently for all types of numerals.

Keywords: handwritten numerals, segmentation, courtesy amount, feature extraction, numeral recognition

Procedia PDF Downloads 375
3693 New Practical and Non-Malleable Elgamal Encryption for E-Voting Protoco

Authors: Karima Djebaili, Lamine Melkemi

Abstract:

Elgamal encryption is a fundamental public-key encryption in cryptography, which is based on the difficulty of discrete logarithm problem and the Diffie-Hellman problem. Supposing the Diffie–Hellman problem is computationally infeasible then Elgamal is secure under a chosen plaintext attack, where security indicates it is difficult for the attacker, given the ciphertext, to restore the whole of the plaintext. However, although it is secure against chosen plaintext attack, Elgamal is absolutely malleable i.e. is not secure against an adaptive chosen ciphertext attack, where the attacker can recover the plaintext. We present a extension on Elgamal encryption which result in non-malleability against adaptive chosen plaintext attack using concatenation and a cryptographic hash function, our evidence utilizes the device of plaintext aware. The algorithm proposed can be used in cryptography voting protocol given its level security. Our protocol protects the confidentiality of voters because each voter encrypts their choice before casting their vote, offers public verifiability using a signing algorithm, the final result is correctly computed using homomorphic property, and works even in the presence of an adversary due to the propriety of non-malleability. Moreover, the protocol prevents some parties colluding to fix the vote results.

Keywords: Elgamal encryption, non-malleability, plaintext aware, e-voting

Procedia PDF Downloads 442
3692 Walmart Sales Forecasting using Machine Learning in Python

Authors: Niyati Sharma, Om Anand, Sanjeev Kumar Prasad

Abstract:

Assuming future sale value for any of the organizations is one of the major essential characteristics of tactical development. Walmart Sales Forecasting is the finest illustration to work with as a beginner; subsequently, it has the major retail data set. Walmart uses this sales estimate problem for hiring purposes also. We would like to analyzing how the internal and external effects of one of the largest companies in the US can walk out their Weekly Sales in the future. Demand forecasting is the planned prerequisite of products or services in the imminent on the basis of present and previous data and different stages of the market. Since all associations is facing the anonymous future and we do not distinguish in the future good demand. Hence, through exploring former statistics and recent market statistics, we envisage the forthcoming claim and building of individual goods, which are extra challenging in the near future. As a result of this, we are producing the required products in pursuance of the petition of the souk in advance. We will be using several machine learning models to test the exactness and then lastly, train the whole data by Using linear regression and fitting the training data into it. Accuracy is 8.88%. The extra trees regression model gives the best accuracy of 97.15%.

Keywords: random forest algorithm, linear regression algorithm, extra trees classifier, mean absolute error

Procedia PDF Downloads 144
3691 Supervised/Unsupervised Mahalanobis Algorithm for Improving Performance for Cyberattack Detection over Communications Networks

Authors: Radhika Ranjan Roy

Abstract:

Deployment of machine learning (ML)/deep learning (DL) algorithms for cyberattack detection in operational communications networks (wireless and/or wire-line) is being delayed because of low-performance parameters (e.g., recall, precision, and f₁-score). If datasets become imbalanced, which is the usual case for communications networks, the performance tends to become worse. Complexities in handling reducing dimensions of the feature sets for increasing performance are also a huge problem. Mahalanobis algorithms have been widely applied in scientific research because Mahalanobis distance metric learning is a successful framework. In this paper, we have investigated the Mahalanobis binary classifier algorithm for increasing cyberattack detection performance over communications networks as a proof of concept. We have also found that high-dimensional information in intermediate features that are not utilized as much for classification tasks in ML/DL algorithms are the main contributor to the state-of-the-art of improved performance of the Mahalanobis method, even for imbalanced and sparse datasets. With no feature reduction, MD offers uniform results for precision, recall, and f₁-score for unbalanced and sparse NSL-KDD datasets.

Keywords: Mahalanobis distance, machine learning, deep learning, NS-KDD, local intrinsic dimensionality, chi-square, positive semi-definite, area under the curve

Procedia PDF Downloads 70
3690 Correction Requirement to AISC Design Guide 31: Case Study of Web Post Buckling Design for Castellated Beams

Authors: Kitjapat Phuvoravan, Phattaraphong Ponsorn

Abstract:

In the design of Castellated beams (CB), the web post buckling acted by horizontal shear force is one of the important failure modes that have to be considered. It is also a dominant governing mode when design following the AISC 31 design guideline which is just published. However, the equation of the web post buckling given by the guideline is still questionable for most of the engineers. So the purpose of this paper is to study and provide a proposed equation for design the web post buckling with more simplified and convenient to use. The study is also including the improper of the safety factor given by the guideline. The proposed design equation is acquired by regression method based on the results of finite element analysis. An amount of Cellular beam simulated to study is modelled by using shell element, analysis with both geometric and material nonlinearity. The results of the study show that the use of the proposed equation to design the web post buckling in Castellated beams is more simple and precise for computation than the equations provided from the guideline.

Keywords: castellated beam, web opening, web post buckling, design equation

Procedia PDF Downloads 296
3689 A Priority Based Imbalanced Time Minimization Assignment Problem: An Iterative Approach

Authors: Ekta Jain, Kalpana Dahiya, Vanita Verma

Abstract:

This paper discusses a priority based imbalanced time minimization assignment problem dealing with the allocation of n jobs to m < n persons in which the project is carried out in two stages, viz. Stage-I and Stage-II. Stage-I consists of n1 ( < m) primary jobs and Stage-II consists of remaining (n-n1) secondary jobs which are commenced only after primary jobs are finished. Each job is to be allocated to exactly one person, and each person has to do at least one job. It is assumed that nature of the Stage-I jobs is such that one person can do exactly one primary job whereas a person can do more than one secondary job in Stage-II. In a particular stage, all persons start doing the jobs simultaneously, but if a person is doing more than one job, he does them one after the other in any order. The aim of the proposed study is to find the feasible assignment which minimizes the total time for the two stage execution of the project. For this, an iterative algorithm is proposed, which at each iteration, solves a constrained imbalanced time minimization assignment problem to generate a pair of Stage-I and Stage-II times. For solving this constrained problem, an algorithm is developed in the current paper. Later, alternate combinations based method to solve the priority based imbalanced problem is also discussed and a comparative study is carried out. Numerical illustrations are provided in support of the theory.

Keywords: assignment, imbalanced, priority, time minimization

Procedia PDF Downloads 224
3688 Machine Learning Approach for Mutation Testing

Authors: Michael Stewart

Abstract:

Mutation testing is a type of software testing proposed in the 1970s where program statements are deliberately changed to introduce simple errors so that test cases can be validated to determine if they can detect the errors. Test cases are executed against the mutant code to determine if one fails, detects the error and ensures the program is correct. One major issue with this type of testing was it became intensive computationally to generate and test all possible mutations for complex programs. This paper used reinforcement learning and parallel processing within the context of mutation testing for the selection of mutation operators and test cases that reduced the computational cost of testing and improved test suite effectiveness. Experiments were conducted using sample programs to determine how well the reinforcement learning-based algorithm performed with one live mutation, multiple live mutations and no live mutations. The experiments, measured by mutation score, were used to update the algorithm and improved accuracy for predictions. The performance was then evaluated on multiple processor computers. With reinforcement learning, the mutation operators utilized were reduced by 50 – 100%.

Keywords: automated-testing, machine learning, mutation testing, parallel processing, reinforcement learning, software engineering, software testing

Procedia PDF Downloads 191
3687 Comparing the Detection of Autism Spectrum Disorder within Males and Females Using Machine Learning Techniques

Authors: Joseph Wolff, Jeffrey Eilbott

Abstract:

Autism Spectrum Disorders (ASD) are a spectrum of social disorders characterized by deficits in social communication, verbal ability, and interaction that can vary in severity. In recent years, researchers have used magnetic resonance imaging (MRI) to help detect how neural patterns in individuals with ASD differ from those of neurotypical (NT) controls for classification purposes. This study analyzed the classification of ASD within males and females using functional MRI data. Functional connectivity (FC) correlations among brain regions were used as feature inputs for machine learning algorithms. Analysis was performed on 558 cases from the Autism Brain Imaging Data Exchange (ABIDE) I dataset. When trained specifically on females, the algorithm underperformed in classifying the ASD subset of our testing population. Although the subject size was relatively smaller in the female group, the manual matching of both male and female training groups helps explain the algorithm’s bias, indicating the altered sex abnormalities in functional brain networks compared to typically developing peers. These results highlight the importance of taking sex into account when considering how generalizations of findings on males with ASD apply to females.

Keywords: autism spectrum disorder, machine learning, neuroimaging, sex differences

Procedia PDF Downloads 203
3686 Bernstein Type Polynomials for Solving Differential Equations and Their Applications

Authors: Yilmaz Simsek

Abstract:

In this paper, we study the Bernstein-type basis functions with their generating functions. We give various properties of these polynomials with the aid of their generating functions. These polynomials and generating functions have many valuable applications in mathematics, in probability, in statistics and also in mathematical physics. By using the Bernstein-Galerkin and the Bernstein-Petrov-Galerkin methods, we give some applications of the Bernstein-type polynomials for solving high even-order differential equations with their numerical computations. We also give Bezier-type curves related to the Bernstein-type basis functions. We investigate fundamental properties of these curves. These curves have many applications in mathematics, in computer geometric design and other related areas. Moreover, we simulate these polynomials with their plots for some selected numerical values.

Keywords: generating functions, Bernstein basis functions, Bernstein polynomials, Bezier curves, differential equations

Procedia PDF Downloads 270
3685 Flow Analysis of Viscous Nanofluid Due to Rotating Rigid Disk with Navier’s Slip: A Numerical Study

Authors: Khalil Ur Rehman, M. Y. Malik, Usman Ali

Abstract:

In this paper, the problem proposed by Von Karman is treated in the attendance of additional flow field effects when the liquid is spaced above the rotating rigid disk. To be more specific, a purely viscous fluid flow yield by rotating rigid disk with Navier’s condition is considered in both magnetohydrodynamic and hydrodynamic frames. The rotating flow regime is manifested with heat source/sink and chemically reactive species. Moreover, the features of thermophoresis and Brownian motion are reported by considering nanofluid model. The flow field formulation is obtained mathematically in terms of high order differential equations. The reduced system of equations is solved numerically through self-coded computational algorithm. The pertinent outcomes are discussed systematically and provided through graphical and tabular practices. A simultaneous way of study makes this attempt attractive in this sense that the article contains dual framework and validation of results with existing work confirms the execution of self-coded algorithm for fluid flow regime over a rotating rigid disk.

Keywords: Navier’s condition, Newtonian fluid model, chemical reaction, heat source/sink

Procedia PDF Downloads 165
3684 Performance Enrichment of Deep Feed Forward Neural Network and Deep Belief Neural Networks for Fault Detection of Automobile Gearbox Using Vibration Signal

Authors: T. Praveenkumar, Kulpreet Singh, Divy Bhanpuriya, M. Saimurugan

Abstract:

This study analysed the classification accuracy for gearbox faults using Machine Learning Techniques. Gearboxes are widely used for mechanical power transmission in rotating machines. Its rotating components such as bearings, gears, and shafts tend to wear due to prolonged usage, causing fluctuating vibrations. Increasing the dependability of mechanical components like a gearbox is hampered by their sealed design, which makes visual inspection difficult. One way of detecting impending failure is to detect a change in the vibration signature. The current study proposes various machine learning algorithms, with aid of these vibration signals for obtaining the fault classification accuracy of an automotive 4-Speed synchromesh gearbox. Experimental data in the form of vibration signals were acquired from a 4-Speed synchromesh gearbox using Data Acquisition System (DAQs). Statistical features were extracted from the acquired vibration signal under various operating conditions. Then the extracted features were given as input to the algorithms for fault classification. Supervised Machine Learning algorithms such as Support Vector Machines (SVM) and unsupervised algorithms such as Deep Feed Forward Neural Network (DFFNN), Deep Belief Networks (DBN) algorithms are used for fault classification. The fusion of DBN & DFFNN classifiers were architected to further enhance the classification accuracy and to reduce the computational complexity. The fault classification accuracy for each algorithm was thoroughly studied, tabulated, and graphically analysed for fused and individual algorithms. In conclusion, the fusion of DBN and DFFNN algorithm yielded the better classification accuracy and was selected for fault detection due to its faster computational processing and greater efficiency.

Keywords: deep belief networks, DBN, deep feed forward neural network, DFFNN, fault diagnosis, fusion of algorithm, vibration signal

Procedia PDF Downloads 105
3683 Scalable Systolic Multiplier over Binary Extension Fields Based on Two-Level Karatsuba Decomposition

Authors: Chiou-Yng Lee, Wen-Yo Lee, Chieh-Tsai Wu, Cheng-Chen Yang

Abstract:

Shifted polynomial basis (SPB) is a variation of polynomial basis representation. SPB has potential for efficient bit-level and digit-level implementations of multiplication over binary extension fields with subquadratic space complexity. For efficient implementation of pairing computation with large finite fields, this paper presents a new SPB multiplication algorithm based on Karatsuba schemes, and used that to derive a novel scalable multiplier architecture. Analytical results show that the proposed multiplier provides a trade-off between space and time complexities. Our proposed multiplier is modular, regular, and suitable for very-large-scale integration (VLSI) implementations. It involves less area complexity compared to the multipliers based on traditional decomposition methods. It is therefore, more suitable for efficient hardware implementation of pairing based cryptography and elliptic curve cryptography (ECC) in constraint driven applications.

Keywords: digit-serial systolic multiplier, elliptic curve cryptography (ECC), Karatsuba algorithm (KA), shifted polynomial basis (SPB), pairing computation

Procedia PDF Downloads 358
3682 Effect of Environmental Conditions on the Substrate Cu(In,Ga)Se2 Solar Cell Performances

Authors: Mekhannene Amine

Abstract:

In this paper, we began in the first step by two-dimensional simulation of a CIGS solar cell, in order to increase the current record efficiency of 20.48% for a single CIGS cell. Was created by utilizing a set of physical and technological parameters a solar cell of reference (such as layer thicknesses, gallium ratio, doping levels and materials properties) documented in bibliography and very known in the experimental field. This was accomplished through modeling and simulation using Atlas SILVACO-TCAD, an tool two and three dimensions very powerful and very adapted. This study has led us to determine the influence of different environmental parameters such as illumination (G) and temperature (T). In the second step, we continued our study by determining the influence of physical parameters (the acceptor of concentration NA) and geometric (thickness t) of the CIGS absorber layer, were varied to produce an optimum efficiency of 24.36%. This approach is promising to produce a CIGS classic solar cell to conduct a maximum performance.

Keywords: solar cell, cigs, photovoltaic generator, illumination, temperature, Atlas SILVACO-TCAD

Procedia PDF Downloads 640
3681 Hybrid Precoder Design Based on Iterative Hard Thresholding Algorithm for Millimeter Wave Multiple-Input-Multiple-Output Systems

Authors: Ameni Mejri, Moufida Hajjaj, Salem Hasnaoui, Ridha Bouallegue

Abstract:

The technology advances have most lately made the millimeter wave (mmWave) communication possible. Due to the huge amount of spectrum that is available in MmWave frequency bands, this promising candidate is considered as a key technology for the deployment of 5G cellular networks. In order to enhance system capacity and achieve spectral efficiency, very large antenna arrays are employed at mmWave systems by exploiting array gain. However, it has been shown that conventional beamforming strategies are not suitable for mmWave hardware implementation. Therefore, new features are required for mmWave cellular applications. Unlike traditional multiple-input-multiple-output (MIMO) systems for which only digital precoders are essential to accomplish precoding, MIMO technology seems to be different at mmWave because of digital precoding limitations. Moreover, precoding implements a greater number of radio frequency (RF) chains supporting more signal mixers and analog-to-digital converters. As RF chain cost and power consumption is increasing, we need to resort to another alternative. Although the hybrid precoding architecture has been regarded as the best solution based on a combination between a baseband precoder and an RF precoder, we still do not get the optimal design of hybrid precoders. According to the mapping strategies from RF chains to the different antenna elements, there are two main categories of hybrid precoding architecture. Given as a hybrid precoding sub-array architecture, the partially-connected structure reduces hardware complexity by using a less number of phase shifters, whereas it sacrifices some beamforming gain. In this paper, we treat the hybrid precoder design in mmWave MIMO systems as a problem of matrix factorization. Thus, we adopt the alternating minimization principle in order to solve the design problem. Further, we present our proposed algorithm for the partially-connected structure, which is based on the iterative hard thresholding method. Through simulation results, we show that our hybrid precoding algorithm provides significant performance gains over existing algorithms. We also show that the proposed approach reduces significantly the computational complexity. Furthermore, valuable design insights are provided when we use the proposed algorithm to make simulation comparisons between the hybrid precoding partially-connected structure and the fully-connected structure.

Keywords: alternating minimization, hybrid precoding, iterative hard thresholding, low-complexity, millimeter wave communication, partially-connected structure

Procedia PDF Downloads 314
3680 The State of Oral Health after COVID-19 Lockdown: A Systematic Review

Authors: Faeze omid, Morteza Banakar

Abstract:

Background: The COVID-19 pandemic has had a significant impact on global health and healthcare systems, including oral health. The lockdown measures implemented in many countries have led to changes in oral health behaviors, access to dental care, and the delivery of dental services. However, the extent of these changes and their effects on oral health outcomes remains unclear. This systematic review aims to synthesize the available evidence on the state of oral health after the COVID-19 lockdown. Methods: We conducted a systematic search of electronic databases (PubMed, Embase, Scopus, and Web of Science) and grey literature sources for studies reporting on oral health outcomes after the COVID-19 lockdown. We included studies published in English between January 2020 and March 2023. Two reviewers independently screened the titles, abstracts, and full texts of potentially relevant articles and extracted data from included studies. We used a narrative synthesis approach to summarize the findings. Results: Our search identified 23 studies from 12 countries, including cross-sectional surveys, cohort studies, and case reports. The studies reported on changes in oral health behaviors, access to dental care, and the prevalence and severity of dental conditions after the COVID-19 lockdown. Overall, the evidence suggests that the lockdown measures had a negative impact on oral health outcomes, particularly among vulnerable populations. There were decreases in dental attendance, increases in dental anxiety and fear, and changes in oral hygiene practices. Furthermore, there were increases in the incidence and severity of dental conditions, such as dental caries and periodontal disease, and delays in the diagnosis and treatment of oral cancers. Conclusion: The COVID-19 pandemic and associated lockdown measures have had significant effects on oral health outcomes, with negative impacts on oral health behaviors, access to care, and the prevalence and severity of dental conditions. These findings highlight the need for continued monitoring and interventions to address the long-term effects of the pandemic on oral health.

Keywords: COVID-19, oral health, systematic review, dental public health

Procedia PDF Downloads 71
3679 Algorithms Minimizing Total Tardiness

Authors: Harun Aydilek, Asiye Aydilek, Ali Allahverdi

Abstract:

The total tardiness is a widely used performance measure in the scheduling literature. This performance measure is particularly important in situations where there is a cost to complete a job beyond its due date. The cost of scheduling increases as the gap between a job's due date and its completion time increases. Such costs may also be penalty costs in contracts, loss of goodwill. This performance measure is important as the fulfillment of due dates of customers has to be taken into account while making scheduling decisions. The problem is addressed in the literature, however, it has been assumed zero setup times. Even though this assumption may be valid for some environments, it is not valid for some other scheduling environments. When setup times are treated as separate from processing times, it is possible to increase machine utilization and to reduce total tardiness. Therefore, non-zero setup times need to be considered as separate. A dominance relation is developed and several algorithms are proposed. The developed dominance relation is utilized in the proposed algorithms. Extensive computational experiments are conducted for the evaluation of the algorithms. The experiments indicated that the developed algorithms perform much better than the existing algorithms in the literature. More specifically, one of the newly proposed algorithms reduces the error of the best existing algorithm in the literature by 40 percent.

Keywords: algorithm, assembly flowshop, dominance relation, total tardiness

Procedia PDF Downloads 346
3678 Discovery of Exoplanets in Kepler Data Using a Graphics Processing Unit Fast Folding Method and a Deep Learning Model

Authors: Kevin Wang, Jian Ge, Yinan Zhao, Kevin Willis

Abstract:

Kepler has discovered over 4000 exoplanets and candidates. However, current transit planet detection techniques based on the wavelet analysis and the Box Least Squares (BLS) algorithm have limited sensitivity in detecting minor planets with a low signal-to-noise ratio (SNR) and long periods with only 3-4 repeated signals over the mission lifetime of 4 years. This paper presents a novel precise-period transit signal detection methodology based on a new Graphics Processing Unit (GPU) Fast Folding algorithm in conjunction with a Convolutional Neural Network (CNN) to detect low SNR and/or long-period transit planet signals. A comparison with BLS is conducted on both simulated light curves and real data, demonstrating that the new method has higher speed, sensitivity, and reliability. For instance, the new system can detect transits with SNR as low as three while the performance of BLS drops off quickly around SNR of 7. Meanwhile, the GPU Fast Folding method folds light curves 25 times faster than BLS, a significant gain that allows exoplanet detection to occur at unprecedented period precision. This new method has been tested with all known transit signals with 100% confirmation. In addition, this new method has been successfully applied to the Kepler of Interest (KOI) data and identified a few new Earth-sized Ultra-short period (USP) exoplanet candidates and habitable planet candidates. The results highlight the promise for GPU Fast Folding as a replacement to the traditional BLS algorithm for finding small and/or long-period habitable and Earth-sized planet candidates in-transit data taken with Kepler and other space transit missions such as TESS(Transiting Exoplanet Survey Satellite) and PLATO(PLAnetary Transits and Oscillations of stars).

Keywords: algorithms, astronomy data analysis, deep learning, exoplanet detection methods, small planets, habitable planets, transit photometry

Procedia PDF Downloads 214
3677 GPU Accelerated Fractal Image Compression for Medical Imaging in Parallel Computing Platform

Authors: Md. Enamul Haque, Abdullah Al Kaisan, Mahmudur R. Saniat, Aminur Rahman

Abstract:

In this paper, we have implemented both sequential and parallel version of fractal image compression algorithms using CUDA (Compute Unified Device Architecture) programming model for parallelizing the program in Graphics Processing Unit for medical images, as they are highly similar within the image itself. There is several improvements in the implementation of the algorithm as well. Fractal image compression is based on the self similarity of an image, meaning an image having similarity in majority of the regions. We take this opportunity to implement the compression algorithm and monitor the effect of it using both parallel and sequential implementation. Fractal compression has the property of high compression rate and the dimensionless scheme. Compression scheme for fractal image is of two kinds, one is encoding and another is decoding. Encoding is very much computational expensive. On the other hand decoding is less computational. The application of fractal compression to medical images would allow obtaining much higher compression ratios. While the fractal magnification an inseparable feature of the fractal compression would be very useful in presenting the reconstructed image in a highly readable form. However, like all irreversible methods, the fractal compression is connected with the problem of information loss, which is especially troublesome in the medical imaging. A very time consuming encoding process, which can last even several hours, is another bothersome drawback of the fractal compression.

Keywords: accelerated GPU, CUDA, parallel computing, fractal image compression

Procedia PDF Downloads 326
3676 Hand in Hand with Indigenous People Worldwide through the Discovery of Indigenous Entrepreneurial Models: A Systematic Literature Review of International Indigenous Entrepreneurship

Authors: Francesca Croce

Abstract:

Governmental development strategies aimed at entrepreneurship as a major resource for economic development and poverty reduction of indigenous people. As initiatives and programs are local based, there is a need to better understand the contextual factors of indigenous entrepreneurial models. The purpose of this paper is, therefore, to analyze and integrated the indigenous entrepreneurship literature in order to identify the main models of indigenous entrepreneurship. To answer this need, a systematic literature review was conducted. Relevant articles were identified in selected electronic databases (ABI/Inform Global, Business Source Premier, Web of Science; International Bibliography of the Social Sciences, Academic Search, Sociological Abstract, Entrepreneurial Studies Sources and Bibliography of Native North America) and in selected electronic review. Beginning to 1st January 1995 (first International Day of the World’s Indigenous People), 59 academic articles were selected from 1411. Through systematic analysis of the cultural, social and organizational variables, the paper highlights that a typology of indigenous entrepreneurial models is possible thought the concept of entrepreneurial ecosystem, which includes the geographical position and the environment of the indigenous communities. The results show three models of indigenous entrepreneurship: the urban indigenous entrepreneurship, the semi-urban indigenous entrepreneurship, and rural indigenous entrepreneurship. After the introduction, the paper is organized as follows. In the first part theoretical and practical needs of a systematic literature review on indigenous entrepreneurship are provided. In the second part, the methodology, the selection process and evaluation of the articles are explained. In the third part, findings are presented and each indigenous entrepreneurial model characteristics are discussed. The results of this study bring a new theorization about indigenous entrepreneurship and may be useful for scientists in the field in search of overcoming the cognitive border of Indigenous business models still too little known. Also, the study is addressed to policy makers in charge of indigenous entrepreneurial development strategies more focused on contextual factors studies.

Keywords: community development, entrepreneurial ecosystem, indigenous entrepreneurship model, indigenous people, systematic literature review

Procedia PDF Downloads 272
3675 Clinical and Microbiologic Efficacy and Safety of Imipenem Cilastatin Relebactam in Complicated Infections: A Meta-analysis

Authors: Syeda Sahra, Abdullah Jahangir, Rachelle Hamadi, Ahmad Jahangir, Allison Glaser

Abstract:

Background: Antimicrobial resistance is on the rise. The use of redundant and inappropriate antibiotics is contributing to recurrent infections and resistance. Newer antibiotics with more robust coverage for gram-negative bacteria are in great demand for complicated urinary tract infections (cUTIs), complicated intra-abdominal infections (cIAIs), hospital-acquired bacterial pneumonia (H.A.B.P.), and ventilator-associated bacterial pneumonia (V.A.B.P.). Objective: We performed this meta-analysis to evaluate the efficacy and safety profile of a new antibiotic, Imipenem/cilastatin/relebactam, compared to other broad-spectrum antibiotics for complicated infections. Search Strategy: We conducted a systemic review search on PubMed, Embase, and Central Cochrane Registry. Selection Criteria: We included randomized clinical trials (R.C.T.s) with the standard of care as comparator arm with Imipenem/cilastatin/relebactam as intervention arm. Analysis: For continuous variables, the mean difference was used. For discrete variables, we used the odds ratio. For effect sizes, we used a confidence interval of 95%. A p-value of less than 0.05 was used for statistical significance. Analysis was done using a random-effects model irrespective of heterogeneity. Heterogeneity was evaluated using the I2 statistic. Results: The authors observed similar efficacy at clinical and microbiologic response levels on early follow-up and late follow-up compared to the established standard of care. The incidence of drug-related adverse events, serious adverse events, and drug discontinuation due to adverse events were comparable across both groups. Conclusion: Imipenem/cilastatin/relebactam has a non-inferior safety and efficacy profile compared to peer antibiotics to treat severe bacterial infections (cUTIs, cIAIs, H.A.B.P., V.A.B.P.).

Keywords: bacterial pneumonia, complicated intra-abdominal infections, complicated urinary tract infection, Imipenem, cilastatin, relebactam

Procedia PDF Downloads 197
3674 Design of Low Latency Multiport Network Router on Chip

Authors: P. G. Kaviya, B. Muthupandian, R. Ganesan

Abstract:

On-chip routers typically have buffers are used input or output ports for temporarily storing packets. The buffers are consuming some router area and power. The multiple queues in parallel as in VC router. While running a traffic trace, not all input ports have incoming packets needed to be transferred. Therefore large numbers of queues are empty and others are busy in the network. So the time consumption should be high for the high traffic. Therefore using a RoShaQ, minimize the buffer area and time The RoShaQ architecture was send the input packets are travel through the shared queues at low traffic. At high load traffic the input packets are bypasses the shared queues. So the power and area consumption was reduced. A parallel cross bar architecture is proposed in this project in order to reduce the power consumption. Also a new adaptive weighted routing algorithm for 8-port router architecture is proposed in order to decrease the delay of the network on chip router. The proposed system is simulated using Modelsim and synthesized using Xilinx Project Navigator.

Keywords: buffer, RoShaQ architecture, shared queue, VC router, weighted routing algorithm

Procedia PDF Downloads 538
3673 Locomotion Effects of Redundant Degrees of Freedom in Multi-Legged Quadruped Robots

Authors: Hossein Keshavarz, Alejandro Ramirez-Serrano

Abstract:

Energy efficiency and locomotion speed are two key parameters for legged robots; thus, finding ways to improve them are important. This paper proposes a locomotion framework to analyze the energy usage and speed of quadruped robots via a Genetic Algorithm (GA) optimization process. For this, a quadruped robot platform with joint redundancy in its hind legs that we believe will help multi-legged robots improve their speed and energy consumption is used. ContinuO, the quadruped robot of interest, has 14 active degrees of freedom (DoFs), including three DoFs for each front leg, and unlike previously developed quadruped robots, four DoFs for each hind leg. ContinuO aims to realize a cost-effective quadruped robot for real-world scenarios with high speeds and the ability to overcome large obstructions. The proposed framework is used to locomote the robot and analyze its energy consumed at diverse stride lengths and locomotion speeds. The analysis is performed by comparing the obtained results in two modes, with and without the joint redundancy on the robot’s hind legs.

Keywords: genetic algorithm optimization, locomotion path planning, quadruped robots, redundant legs

Procedia PDF Downloads 83
3672 Autobiographical Memory Functions and Perceived Control in Depressive Symptoms among Young Adults

Authors: Meenu S. Babu, K. Jayasankara Reddy

Abstract:

Depression is a serious mental health concern that leads to significant distress and dysfunction in an individual. Due to the high physical, psychological, social, and economic burden it causes, it is important to study various bio-psycho-social factors that influence the onset, course, duration, intensity of depressive symptoms. The study aims to explore relationship between autobiographical memory (AM) functions, perceived control over stressful events and depressive symptoms. AM functions and perceived control were both found to be protective factors for individuals against depression and were both modifiable to predict better behavioral and affective outcomes. An extensive review of literatur, with a systematic search on Google Scholar, JSTOR, Science Direct and Springer Journals database, was conducted for the purpose of this review paper. These were used for all the aforementioned databases. The time frame used for the search was 2010-2021. An additional search was conducted with no time bar to map the development of the theoretical concepts. The relevant studies with quantitative, qualitative, experimental, and quasi- experimental research designs were included for the review. Studies including a sample with a DSM- 5 or ICD-10 diagnosis of depressive disorders were excluded from the study to focus on the behavioral patterns in a non-clinical population. The synthesis of the findings that were obtained from the review indicates there is a significant relationship between cognitive variables of AM functions and perceived control and depressive symptoms. AM functions were found to be have significant effects on once sense of self, interpersonal relationships, decision making, self- continuity and were related to better emotion regulation and lower depressive symptoms. Not all the components of AM function were equally significant in their relationships with various depressive symptoms. While self and directive functions were more related to emotion regulation, anhedonia, motivation and hence mood and affect, the social function was related to perceived social support and social engagement. Perceived control was found to be another protective cognitive factor that provides individuals a sense of agency and control over one’s life outcomes which was found to be low in individuals with depression. This was also associated to the locus of control, competency beliefs, contingency beliefs and subjective well being in individuals and acted as protective factors against depressive symptoms. AM and perceived control over stressful events serve adaptive functions, hence it is imperative to study these variables more extensively. They can be imperative in planning and implementing therapeutic interventions to foster these cognitive protective factors to mitigate or alleviate depressive symptoms. Exploring AM as a determining factor in depressive symptoms along with perceived control over stress creates a bridge between biological and cognitive factors underlying depression and increases the scope of developing a more eclectic and effective treatment plan for individuals. As culture plays a crucial role in AM functions as well as certain aspects of control such as locus of control, it is necessary to study these variables keeping in mind the cultural context to tailor culture/community specific interventions for depression.

Keywords: autobiographical memories, autobiographical memory functions, perceived control, depressive symptoms, depression, young adults

Procedia PDF Downloads 95