Search results for: cloud connected vehicle
1432 Protection and Renewal Strategies of Historical Blocks from the Perspective of “Staged Authenticity”
Authors: Xu Yingqiang, Wang Zhongde
Abstract:
In the age of stock development, the contradiction between the protection and development of historical blocks in China has become increasingly prominent, among which how to reconcile the contradiction between tourists and local residents and inherit urban culture is an important proposition. Based on this, this paper introduces the theory of " staged authenticity ", combs its development process and related research progress, constructs an analysis and research model of historical blocks based on the theory of " staged authenticity ", and puts forward the protection and renewal strategy of historical blocks from the perspective of " staged authenticity ", which provides theoretical basis for coordinating the tourism-residence contradiction and protecting urban characteristics in the protection and renewal of historical blocks. The research holds that we should pay attention to the important value of "curtain" space, rationally arrange "curtain" and divide "foreground" and "background"; extract "props" from real history and culture to restore the authenticity of "stage" scenes; clever arrangement of tour streamline, so that all scenes are connected in series rhythmically; make the "actors" perform interactively in the "foreground" space, so as to enhance the "audience" sense of scene substitution.Keywords: historic block, protection and renewal, staged authenticity, curtain
Procedia PDF Downloads 631431 Segmentation of Arabic Handwritten Numeral Strings Based on Watershed Approach
Authors: Nidal F. Shilbayeh, Remah W. Al-Khatib, Sameer A. Nooh
Abstract:
Arabic offline handwriting recognition systems are considered as one of the most challenging topics. Arabic Handwritten Numeral Strings are used to automate systems that deal with numbers such as postal code, banking account numbers and numbers on car plates. Segmentation of connected numerals is the main bottleneck in the handwritten numeral recognition system. This is in turn can increase the speed and efficiency of the recognition system. In this paper, we proposed algorithms for automatic segmentation and feature extraction of Arabic handwritten numeral strings based on Watershed approach. The algorithms have been designed and implemented to achieve the main goal of segmenting and extracting the string of numeral digits written by hand especially in a courtesy amount of bank checks. The segmentation algorithm partitions the string into multiple regions that can be associated with the properties of one or more criteria. The numeral extraction algorithm extracts the numeral string digits into separated individual digit. Both algorithms for segmentation and feature extraction have been tested successfully and efficiently for all types of numerals.Keywords: handwritten numerals, segmentation, courtesy amount, feature extraction, numeral recognition
Procedia PDF Downloads 3791430 Driver Behavior Analysis and Inter-Vehicular Collision Simulation Approach
Authors: Lu Zhao, Nadir Farhi, Zoi Christoforou, Nadia Haddadou
Abstract:
The safety test of deploying intelligent connected vehicles (ICVs) on the road network is a critical challenge. Road traffic network simulation can be used to test the functionality of ICVs, which is not only time-saving and less energy-consuming but also can create scenarios with car collisions. However, the relationship between different human driver behaviors and the car-collision occurrences has been not understood clearly; meanwhile, the procedure of car-collisions generation in the traffic numerical simulators is not fully integrated. In this paper, we propose an approach to identify specific driver profiles from real driven data; then, we replicate them in numerical traffic simulations with the purpose of generating inter-vehicular collisions. We proposed three profiles: (i) 'aggressive': short time-headway, (ii) 'inattentive': long reaction time, and (iii) 'normal' with intermediate values of reaction time and time-headway. These three driver profiles are extracted from the NGSIM dataset and simulated using the intelligent driver model (IDM), with an extension of reaction time. At last, the generation of inter-vehicular collisions is performed by varying the percentages of different profiles.Keywords: vehicular collisions, human driving behavior, traffic modeling, car-following models, microscopic traffic simulation
Procedia PDF Downloads 1691429 Analysis of Cyber Activities of Potential Business Customers Using Neo4j Graph Databases
Authors: Suglo Tohari Luri
Abstract:
Data analysis is an important aspect of business performance. With the application of artificial intelligence within databases, selecting a suitable database engine for an application design is also very crucial for business data analysis. The application of business intelligence (BI) software into some relational databases such as Neo4j has proved highly effective in terms of customer data analysis. Yet what remains of great concern is the fact that not all business organizations have the neo4j business intelligence software applications to implement for customer data analysis. Further, those with the BI software lack personnel with the requisite expertise to use it effectively with the neo4j database. The purpose of this research is to demonstrate how the Neo4j program code alone can be applied for the analysis of e-commerce website customer visits. As the neo4j database engine is optimized for handling and managing data relationships with the capability of building high performance and scalable systems to handle connected data nodes, it will ensure that business owners who advertise their products at websites using neo4j as a database are able to determine the number of visitors so as to know which products are visited at routine intervals for the necessary decision making. It will also help in knowing the best customer segments in relation to specific goods so as to place more emphasis on their advertisement on the said websites.Keywords: data, engine, intelligence, customer, neo4j, database
Procedia PDF Downloads 1931428 An Approach to Building a Recommendation Engine for Travel Applications Using Genetic Algorithms and Neural Networks
Authors: Adrian Ionita, Ana-Maria Ghimes
Abstract:
The lack of features, design and the lack of promoting an integrated booking application are some of the reasons why most online travel platforms only offer automation of old booking processes, being limited to the integration of a smaller number of services without addressing the user experience. This paper represents a practical study on how to improve travel applications creating user-profiles through data-mining based on neural networks and genetic algorithms. Choices made by users and their ‘friends’ in the ‘social’ network context can be considered input data for a recommendation engine. The purpose of using these algorithms and this design is to improve user experience and to deliver more features to the users. The paper aims to highlight a broader range of improvements that could be applied to travel applications in terms of design and service integration, while the main scientific approach remains the technical implementation of the neural network solution. The motivation of the technologies used is also related to the initiative of some online booking providers that have made the fact that they use some ‘neural network’ related designs public. These companies use similar Big-Data technologies to provide recommendations for hotels, restaurants, and cinemas with a neural network based recommendation engine for building a user ‘DNA profile’. This implementation of the ‘profile’ a collection of neural networks trained from previous user choices, can improve the usability and design of any type of application.Keywords: artificial intelligence, big data, cloud computing, DNA profile, genetic algorithms, machine learning, neural networks, optimization, recommendation system, user profiling
Procedia PDF Downloads 1621427 Bosporus Evolution: Its Role in the Black Sea Forming
Authors: I. V. Kuzminov
Abstract:
The research is dedicated to the issue of Bosporus evolution and its key role in the Black Sea forming. Up till nowadays, there is no distinct picture of the historical and geographical events of the last 10 thousand years on the territory from Altai up to the Alps. The present article is an attempt to clarify and, moreover, link the presented version to the historical and climatic events of this period. The paper is a development of the basic idea stated in "Hypothesis on the Black Sea origin". The succession of events in dynamics is offered in this article. In the article, it is shown that fluctuation of the level of the World Ocean is a mirror of the basic events connected with the climate on the Earth on the one hand and hydraulic processes on the other hand. In the present article, it is come out with the assumption that at the formation of passage, there were some cycles of change in a level of the World ocean. The phase of the beginning of climate warming is characterized by an increase in the level of inland water bodies on the way of meltwater runoff and an increase in the World ocean level. The end of the warming phase is characterized by the continuation of a rise in the level of the World ocean and the drying up of inland water bodies deprived of meltwater replenishment.Keywords: Bosporus, Ryan-Pitman hypothesis, fluctuations of the World Ocean level, the Paratethys Sea, catastrophic breakthrough
Procedia PDF Downloads 1091426 Study of Information Technology Support to Knowledge Sharing in Social Enterprises
Authors: Maria Granados
Abstract:
Information technology (IT) facilitates the management of knowledge in organisations through the effective leverage of collective experience and knowledge of employees. This supports information processing needs, as well as enables and facilitates sense-making activities of knowledge workers. The study of IT support for knowledge management (KM) has been carried out mainly in larger organisations where resources and competitive conditions can trigger the use of KM. However, there is still a lack of understanding on how IT can support the management of knowledge under different organisational settings influenced by: constant tensions between social and economic objectives, more focus on sustainability than competiveness, limited resources, and high levels of democratic participation and intrinsic motivations among employees. All these conditions are presented in Social Enterprises (SEs), which are normally micro and small businesses that trade to tackle social problems, improve communities, people’s life chances, and the environment. Thus, their importance to society and economies is increasing. However, there is still a need for more understanding of how these organisations operate, perform, innovate and scale-up. This knowledge is crucial to design and provide accurate strategies to enhance the sector and increase its impact and coverage. To obtain a conceptual and empirical understanding of how IT can facilitate KM in the particular organisational conditions of SEs, a quantitative study was conducted with 432 owners and senior members of SEs in UK, underpinned by 21 interviews. The findings demonstrated how IT was supporting more the recovery and storage of necessary information in SEs, and less the collaborative work and communication among enterprise members. However, it was established that SEs were using cloud solutions, web 2.0 tools, Skype and centralised shared servers to manage informally their knowledge. The possible impediments for SEs to support themselves more on IT solutions can be linked mainly to economic and human constraints. These findings elucidate new perspectives that can contribute not only to SEs and SE supporters, but also to other businesses.Keywords: social enterprises, knowledge management, information technology, collaboration, small firms
Procedia PDF Downloads 2681425 Real-Time Recognition of the Terrain Configuration to Improve Driving Stability for Unmanned Robots
Authors: Bongsoo Jeon, Jayoung Kim, Jihong Lee
Abstract:
Methods for measuring or estimating of ground shape by a laser range finder and a vision sensor (exteroceptive sensors) have critical weakness in terms that these methods need prior database built to distinguish acquired data as unique surface condition for driving. Also, ground information by exteroceptive sensors does not reflect the deflection of ground surface caused by the movement of UGVs. Therefore, this paper proposes a method of recognizing exact and precise ground shape using Inertial Measurement Unit (IMU) as a proprioceptive sensor. In this paper, firstly this method recognizes attitude of a robot in real-time using IMU and compensates attitude data of a robot with angle errors through analysis of vehicle dynamics. This method is verified by outdoor driving experiments of a real mobile robot.Keywords: inertial measurement unit, laser range finder, real-time recognition of the ground shape, proprioceptive sensor
Procedia PDF Downloads 2851424 Shape Management Method for Safety Evaluation of Bridge Based on Terrestrial Laser Scanning Using Least Squares
Authors: Gichun Cha, Dongwan Lee, Junkyeong Kim, Aoqi Zhang, Seunghee Park
Abstract:
All the world are studying the construction technology of double deck tunnel in order to respond to the increasing urban traffic demands and environmental changes. Advanced countries have the construction technology of the double deck tunnel structure. but the domestic country began research on it. Construction technologies are important. But Safety evaluation of structure is necessary to prevent possible accidents during construction. Thus, the double deck tunnel was required the shape management of middle slabs. The domestic country is preparing the construction of double deck tunnel for an alternate route and a pleasant urban environment. Shape management of double deck tunnel has been no research because it is a new attempted technology. The present, a similar study is bridge structure for the shape management. Bridge is implemented shape model using terrestrial laser scanning(TLS). Therefore, we proceed research on the bridge slabs because there is a similar structure of double deck tunnel. In the study, we develop shape management method of bridge slabs using TLS. We select the Test-bed for measurement site. This site is bridge located on Sungkyunkwan University Natural Sciences Campus. This bridge has a total length of 34m, the vertical height of 8.7m from the ground. It connects Engineering Building #1 and Engineering Building #2. Point cloud data for shape management is acquired the TLS and We utilized the Leica ScanStation C10/C5 model. We will confirm the Maximum displacement area of middle slabs using Least-Squares Fitting. We expect to raise stability for double deck tunnel through shape management for middle slabs.Keywords: bridge slabs, least squares, safety evaluation, shape management method, terrestrial laser scanning
Procedia PDF Downloads 2401423 A Research Using Remote Monitoring Technology for Pump Output Monitoring in Distributed Fuel Stations in Nigeria
Authors: Ofoegbu Ositadinma Edward
Abstract:
This research paper discusses a web based monitoring system that enables effective monitoring of fuel pump output and sales volume from distributed fuel stations under the domain of a single company/organization. The traditional method of operation by these organizations in Nigeria is non-automated and accounting for dispensed product is usually approximated and manual as there is little or no technology implemented to presently provide information relating to the state of affairs in the station both to on-ground staff and to supervisory staff that are not physically present in the station. This results in unaccountable losses in product and revenue as well as slow decision making. Remote monitoring technology as a vast research field with numerous application areas incorporating various data collation techniques and sensor networks can be applied to provide information relating to fuel pump status in distributed fuel stations reliably. Thus, the proposed system relies upon a microcontroller, keypad and pump to demonstrate the traditional fuel dispenser. A web-enabled PC with an accompanying graphic user interface (GUI) was designed using virtual basic which is connected to the microcontroller via the serial port which is to provide the web implementation.Keywords: fuel pump, microcontroller, GUI, web
Procedia PDF Downloads 4321422 Research on the Aero-Heating Prediction Based on Hybrid Meshes and Hybrid Schemes
Authors: Qiming Zhang, Youda Ye, Qinxue Jiang
Abstract:
Accurate prediction of external flowfield and aero-heating at the wall of hypersonic vehicle is very crucial for the design of aircrafts. Unstructured/hybrid meshes have more powerful advantages than structured meshes in terms of pre-processing, parallel computing and mesh adaptation, so it is imperative to develop high-resolution numerical methods for the calculation of aerothermal environment on unstructured/hybrid meshes. The inviscid flux scheme is one of the most important factors affecting the accuracy of unstructured/ hybrid mesh heat flux calculation. Here, a new hybrid flux scheme is developed and the approach of interface type selection is proposed: i.e. 1) using the exact Riemann scheme solution to calculate the flux on the faces parallel to the wall; 2) employing Sterger-Warming (S-W) scheme to improve the stability of the numerical scheme in other interfaces. The results of the heat flux fit the one observed experimentally and have little dependence on grids, which show great application prospect in unstructured/ hybrid mesh.Keywords: aero-heating prediction, computational fluid dynamics, hybrid meshes, hybrid schemes
Procedia PDF Downloads 2461421 A Comprehensive Review of Electronic Health Records Implementation in Healthcare
Authors: Lateefat Amao, Misagh Faezipour
Abstract:
Implementing electronic health records (EHR) in healthcare is a pivotal transition aimed at digitizing and optimizing patient health information management. The expectations associated with this transition are high, even towards other health information systems (HIS) and health technology. This multifaceted process involves careful planning and execution to improve the quality and efficiency of patient care, especially as healthcare technology is a sensitive niche. Key considerations include a thorough needs assessment, judicious vendor selection, robust infrastructure development, and training and adaptation of healthcare professionals. Comprehensive training programs, data migration from legacy systems and models, interoperability, as well as security and regulatory compliance are imperative for healthcare staff to navigate EHR systems adeptly. The purpose of this work is to offer a comprehensive review of the literature on EHR implementation. It explores the impact of this health technology on health practices, highlights challenges and barriers to its successful utility, and offers practical strategies that can impact its success in healthcare. This paper provides a thorough review of studies on the adoption of EHRs, emphasizing the wide range of experiences and results connected to EHR use in the medical field, especially across different types of healthcare organizations.Keywords: healthcare, electronic health records, EHR implementation, patient care, interoperability
Procedia PDF Downloads 791420 Experimental and Analytical Study of Various Types of Shear Connector Used for Cold-Formed Steel-Ferrocement Composite Beam
Authors: Talal Alhajri, Mahmood M. Tahir, Khaled Alenezi, Mohamad Ragaee
Abstract:
This work presents the experimental tests carried out to evaluate the behaviour of different types of shear connectors proposed for cold formed steel (CFS) section integrated with ferrocement slab as potential used for composite beam. Ten push-out test specimens of cold-formed steel lipped channel sections connected with ferrocement slab were tested. Three types of shear connectors were studied comprised of bolts, self-drilling-screw and bar angle. The connection behavior is analysed in terms of its load-slip relationship and the failure mode. The parametric studies were performed to investigate the effect on the shear connector’s capacity by varying the number of layers of wire mesh used in ferrocement slab and types of shear connector used. An analytical analysis using ANSYS program and theoretical analysis (Eurocode 4) were carried out to verify the experiment results. The results show that the experimental, theoretical, and numerical values proved to have good agreement with each other.Keywords: cold-formed steel, composite beam, ferrocement, finite element method, push-out test, shear connector
Procedia PDF Downloads 3621419 Three Dimensional Simulation of the Transient Modeling and Simulation of Different Gas Flows Velocity and Flow Distribution in Catalytic Converter with Porous Media
Authors: Amir Reza Radmanesh, Sina Farajzadeh Khosroshahi, Hani Sadr
Abstract:
The transient catalytic converter performance is governed by complex interactions between exhaust gas flow and the monolithic structure of the catalytic converter. Stringent emission regulations around the world necessitate the use of highly-efficient catalytic converters in vehicle exhaust systems. Computational fluid dynamics (CFD) is a powerful tool for calculating the flow field inside the catalytic converter. Radial velocity profiles, obtained by a commercial CFD code, present very good agreement with respective experimental results published in the literature. However the applicability of CFD for transient simulations is limited by the high CPU demands. In the present work, Geometric modeling ceramic monolith substrate is done with square shaped channel type of Catalytic converter and it is coated platinum and palladium. This example illustrates the effect of flow distribution on thermal response of a catalytic converter and different gas flow velocities, during the critical phase of catalytic converter warm up.Keywords: catalytic converter, computational fluid dynamic, porous media, velocity distribution
Procedia PDF Downloads 8561418 Comparison of Blockchain Ecosystem for Identity Management
Authors: K. S. Suganya, R. Nedunchezhian
Abstract:
In recent years, blockchain technology has been found to be the most significant discovery in this digital era, after the discovery of the Internet and Cloud Computing. Blockchain is a simple, distributed public ledger that contains all the user’s transaction details in a block. The global copy of the block is then shared among all its peer-peer network users after validation by the Blockchain miners. Once a block is validated and accepted, it cannot be altered by any users making it a trust-free transaction. It also resolves the problem of double-spending by using traditional cryptographic methods. Since the advent of bitcoin, blockchain has been the backbone for all its transactions. But in recent years, it has found its roots and uses in many fields like Smart Contracts, Smart City management, healthcare, etc. Identity management against digital identity theft has become a major concern among financial and other organizations. To solve this digital identity theft, blockchain technology can be employed with existing identity management systems, which maintain a distributed public ledger containing details of an individual’s identity containing information such as Digital birth certificates, Citizenship number, Bank details, voter details, driving license in the form of blocks verified on the blockchain becomes time-stamped, unforgeable and publicly visible for any legitimate users. The main challenge in using blockchain technology to prevent digital identity theft is ensuring the pseudo-anonymity and privacy of the users. This survey paper will exert to study the blockchain concepts, consensus protocols, and various blockchain-based Digital Identity Management systems with their research scope. This paper also discusses the role of Blockchain in COVID-19 pandemic management by self-sovereign identity and supply chain management.Keywords: blockchain, consensus protocols, bitcoin, identity theft, digital identity management, pandemic, COVID-19, self-sovereign identity
Procedia PDF Downloads 1301417 Deep Learning-Based Channel Estimation for Reconfigurable Intelligent Surface-Assisted Unmanned Aerial Vehicle-Enabled Wireless Communication System
Authors: Getaneh Berie Tarekegn
Abstract:
Wireless communication via unmanned aerial vehicles (UAVs) has drawn a great deal of attention due to its flexibility in establishing line-of-sight (LoS) communications. However, in complex urban and dynamic environments, the movement of UAVs can be blocked by trees and high-rise buildings that obstruct directional paths. With reconfigurable intelligent surfaces (RIS), this problem can be effectively addressed. To achieve this goal, accurate channel estimation in RIS-assisted UAV-enabled wireless communications is crucial. This paper proposes an accurate channel estimation model using long short-term memory (LSTM) for a multi-user RIS-assisted UAV-enabled wireless communication system. According to simulation results, LSTM can improve the channel estimation performance of RIS-assisted UAV-enabled wireless communication.Keywords: channel estimation, reconfigurable intelligent surfaces, long short-term memory, unmanned aerial vehicles
Procedia PDF Downloads 1071416 Generalization of Clustering Coefficient on Lattice Networks Applied to Criminal Networks
Authors: Christian H. Sanabria-Montaña, Rodrigo Huerta-Quintanilla
Abstract:
A lattice network is a special type of network in which all nodes have the same number of links, and its boundary conditions are periodic. The most basic lattice network is the ring, a one-dimensional network with periodic border conditions. In contrast, the Cartesian product of d rings forms a d-dimensional lattice network. An analytical expression currently exists for the clustering coefficient in this type of network, but the theoretical value is valid only up to certain connectivity value; in other words, the analytical expression is incomplete. Here we obtain analytically the clustering coefficient expression in d-dimensional lattice networks for any link density. Our analytical results show that the clustering coefficient for a lattice network with density of links that tend to 1, leads to the value of the clustering coefficient of a fully connected network. We developed a model on criminology in which the generalized clustering coefficient expression is applied. The model states that delinquents learn the know-how of crime business by sharing knowledge, directly or indirectly, with their friends of the gang. This generalization shed light on the network properties, which is important to develop new models in different fields where network structure plays an important role in the system dynamic, such as criminology, evolutionary game theory, econophysics, among others.Keywords: clustering coefficient, criminology, generalized, regular network d-dimensional
Procedia PDF Downloads 4111415 From a Traumatic Self to a Strong Self: Changes in Abused Women’s Emotional World After Divorcing their Violent Husbands
Authors: Eli Buchbinder
Abstract:
Women abuse life after divorce is an important issue in understanding their recovery after leaving an intimate violent relationship. The aim of this study was to describe and analyze abused women’s post-traumatic emotional changes following divorce. The study was based on semi-structured qualitative interviews, in Israel, with 12 women aged 33 to 55, at least five years after divorcing their violent husbands. The interviewees described a transformation process: from a damaged, hurting, powerless self, which coped with dissociation and emotional suppression, to a sense of recovery after the divorce. The sense of recovery was experienced as a strong self-connected to positive self-emotions, such as a sense of control and self-efficacy in coping with past pain and life’s challenges. This transformational experience was related to initiating the divorce as a necessity and/or a choice. The interviewees described a continuous dialectic process in healing: first, continuous awareness of their damaged self (post-traumatic fears and negative emotions) and second recognizing their strengths as active choicer in the face of their everyday life and their biography. The discussion of the findings focuses on abused women’s meaning-making as a basic process of healing from abusive intimate relationships.Keywords: abused women, divorce, recovery, meaning making
Procedia PDF Downloads 791414 GPU Accelerated Fractal Image Compression for Medical Imaging in Parallel Computing Platform
Authors: Md. Enamul Haque, Abdullah Al Kaisan, Mahmudur R. Saniat, Aminur Rahman
Abstract:
In this paper, we have implemented both sequential and parallel version of fractal image compression algorithms using CUDA (Compute Unified Device Architecture) programming model for parallelizing the program in Graphics Processing Unit for medical images, as they are highly similar within the image itself. There is several improvements in the implementation of the algorithm as well. Fractal image compression is based on the self similarity of an image, meaning an image having similarity in majority of the regions. We take this opportunity to implement the compression algorithm and monitor the effect of it using both parallel and sequential implementation. Fractal compression has the property of high compression rate and the dimensionless scheme. Compression scheme for fractal image is of two kinds, one is encoding and another is decoding. Encoding is very much computational expensive. On the other hand decoding is less computational. The application of fractal compression to medical images would allow obtaining much higher compression ratios. While the fractal magnification an inseparable feature of the fractal compression would be very useful in presenting the reconstructed image in a highly readable form. However, like all irreversible methods, the fractal compression is connected with the problem of information loss, which is especially troublesome in the medical imaging. A very time consuming encoding process, which can last even several hours, is another bothersome drawback of the fractal compression.Keywords: accelerated GPU, CUDA, parallel computing, fractal image compression
Procedia PDF Downloads 3321413 Smart Grids in Morocco: An Outline of the Recent Development, Key Drivers and Recommendations for Future Implementation
Authors: Mohamed Laamim, Aboubakr Benazzouz, Abdelilah Rochd, Abdellatif Ghennioui, Abderrahim El Fadili
Abstract:
Smart grids have recently sparked a lot of interest in the energy sector as they allow for the modernization and digitization of the existing power infrastructure. Smart grids have several advantages in terms of reducing the environmental impact of generating power from fossil fuels due to their capacity to integrate large amounts of distributed energy resources. On the other hand, smart grid technologies necessitate many field investigations and requirements. This paper focuses on the major difficulties that governments face around the world and compares them to the situation in Morocco. Also presented in this study are the current works and projects being developed to improve the penetration of smart grid technologies into the electrical system. Furthermore, the findings of this study will be useful to promote the smart grid revolution in Morocco, as well as to construct a strong foundation and develop future needs for better penetration of technologies that aid in the integration of smart grid features.Keywords: smart grids, microgrids, virtual power plants, digital twin, distributed energy resources, vehicle-to-grid, advanced metering infrastructure
Procedia PDF Downloads 1521412 The Development of Congeneric Elicited Writing Tasks to Capture Language Decline in Alzheimer Patients
Authors: Lise Paesen, Marielle Leijten
Abstract:
People diagnosed with probable Alzheimer disease suffer from an impairment of their language capacities; a gradual impairment which affects both their spoken and written communication. Our study aims at characterising the language decline in DAT patients with the use of congeneric elicited writing tasks. Within these tasks, a descriptive text has to be written based upon images with which the participants are confronted. A randomised set of images allows us to present the participants with a different task on every encounter, thus allowing us to avoid a recognition effect in this iterative study. This method is a revision from previous studies, in which participants were presented with a larger picture depicting an entire scene. In order to create the randomised set of images, existing pictures were adapted following strict criteria (e.g. frequency, AoA, colour, ...). The resulting data set contained 50 images, belonging to several categories (vehicles, animals, humans, and objects). A pre-test was constructed to validate the created picture set; most images had been used before in spoken picture naming tasks. Hence the same reaction times ought to be triggered in the typed picture naming task. Once validated, the effectiveness of the descriptive tasks was assessed. First, the participants (n=60 students, n=40 healthy elderly) performed a typing task, which provided information about the typing speed of each individual. Secondly, two descriptive writing tasks were carried out, one simple and one complex. The simple task contains 4 images (1 animal, 2 objects, 1 vehicle) and only contains elements with high frequency, a young AoA (<6 years), and fast reaction times. Slow reaction times, a later AoA (≥ 6 years) and low frequency were criteria for the complex task. This task uses 6 images (2 animals, 1 human, 2 objects and 1 vehicle). The data were collected with the keystroke logging programme Inputlog. Keystroke logging tools log and time stamp keystroke activity to reconstruct and describe text production processes. The data were analysed using a selection of writing process and product variables, such as general writing process measures, detailed pause analysis, linguistic analysis, and text length. As a covariate, the intrapersonal interkey transition times from the typing task were taken into account. The pre-test indicated that the new images lead to similar or even faster reaction times compared to the original images. All the images were therefore used in the main study. The produced texts of the description tasks were significantly longer compared to previous studies, providing sufficient text and process data for analyses. Preliminary analysis shows that the amount of words produced differed significantly between the healthy elderly and the students, as did the mean length of production bursts, even though both groups needed the same time to produce their texts. However, the elderly took significantly more time to produce the complex task than the simple task. Nevertheless, the amount of words per minute remained comparable between simple and complex. The pauses within and before words varied, even when taking personal typing abilities (obtained by the typing task) into account.Keywords: Alzheimer's disease, experimental design, language decline, writing process
Procedia PDF Downloads 2731411 Efficacy of Isometric Neck Exercises and Stretching with Ergonomics for Neck Pain in Computer Professionals
Authors: Esther Liyanage, Indrajith Liyanage, Masih Khan
Abstract:
Neck pain has become a common epidemiological problem. One of the reasons for this is a sedentary way of life, connected with using a personal computer during all daily activities. Work place and work duration has not been properly adapted to the personal physical conditions of these employees. During 1990’s the importance of workstation design and work methods, or ergonomics on health was brought to the forefront of public attention. Ergonomics is the application of scientific information concerning humans to the design of objects. Ergonomic intervention results in improvement of working posture and a decrease in prevalence of musculoskeletal symptoms. Stretching and resistance exercises to the neck are easy to do, when performed 1-2 times daily reduce discomfort and ease neck stiffness. This study is aimed at finding if ergonomics with exercises to the neck prove beneficial to reduce neck pain in Computer Professionals. The outcomes measures used were: Oswestry neck disability index and VAS score for pain. 100 subjects satisfying the inclusion criteria were included in the study. Results: Ergonomic intervention along with isometric neck exercises and stretching proved to reduce neck pain and disability among computer professionals.Keywords: ergonomics, neck pain, neck exercises, physiotherapy for neck pain
Procedia PDF Downloads 3261410 Internal DC Short-Circuit Fault Analysis and Protection for VSI of Wind Power Generation Systems
Authors: Mehdi Radmehr, Amir Hamed Mashhadzadeh, Mehdi Jafari
Abstract:
Traditional HVDC systems are tough to DC short circuits as they are current regulated with a large reactance connected in series with cables. Multi-terminal DC wind farm topologies are attracting increasing research attempt. With AC/DC converters on the generator side, this topology can be developed into a multi-terminal DC network for wind power collection, which is especially suitable for large-scale offshore wind farms. For wind farms, the topology uses high-voltage direct-current transmission based on voltage-source converters (VSC-HVDC). Therefore, they do not suffer from over currents due to DC cable faults and there is no over current to react to. In this study, the multi-terminal DC wind farm topology is introduced. Then, possible internal DC faults are analyzed according to type and characteristic. Fault over current expressions are given in detail. Under this characteristic analysis, fault detection and detailed protection methods are proposed. Theoretical analysis and PSCAD/EMTDC simulations are provided.Keywords: DC short circuits, multi-terminal DC wind farm topologies, HVDC transmission based on VSC, fault analysis
Procedia PDF Downloads 4191409 Progress and Challenges of Smart Cities in India: An Exploratory Study
Authors: Sushil K. Sharma, Jeff Zhang, Saeed Tabar
Abstract:
Worldwide, several governments are utilizing the Internet of Things (IoT) and other information and communication technologies (ICTs) to create smart city infrastructures to improve both the quality of government services and citizen welfare. Over 700 cities from around the world have already started implementing their smart city projects. Smart City utilizes the network of connected things, or the Internet of Things (IoT), that interconnects devices and various components across city infrastructure, making them work together seamlessly to enhance the quality, performance, and interactivity of urban services, optimize resources, and reduce costs. Without developing smart cities, the accelerating growth of cities, and their disproportionate consumption of physical and social resources are unsustainable. In 2016, the Indian Government released a list of 100 cities with the intention of kick-starting the process of developing them into 'smart cities’ as part of the Smart Cities Mission. This study reports the progress and challenges of Smart City projects in India. The data were collected through the city/state government websites, media reports, and focus group discussions/interviews. The preliminary results indicate that smart city projects are not only behind in their implementation and scope but also lacks the sincerity for its implementation.Keywords: smart city, smart government, Internet of Things, digital government
Procedia PDF Downloads 1811408 Impact of Endogenous Risk Factors on Risk Cost in KSA PPP Projects
Authors: Saleh Alzahrani, Halim Boussabaine
Abstract:
The Public Private Partnership (PPP) contracts are produced taking into account the reason that the configuration, development, operation, and financing of an open undertaking is to be recompensed to a private gathering inside a solitary contractual structure. PPP venture dangers are ordinarily connected with the improvement and development of another resource and in addition its operation for a considerable length of time. Without a doubt, the most genuine outcomes of dangers amid the development period are value and time overwhelms. These occasions are amongst the most extensively utilized situations as a part of worth for cash investigation dangers. The wellsprings of danger change over the life cycle of a PPP venture. In customary acquirement, the general population segment ordinarily needs to cover all value trouble from these dangers. At any rate there is bounty confirmation to recommend that cost pain is a standard in a percentage of the tasks that are conveyed under customary obtainment. This paper means to research the effect of endogenous dangers on expense overwhelm in KSA PPP ventures. The paper displays a brief writing survey on PPP danger evaluating systems, and after that presents an affiliation model between danger occasions and expense invade in KSA. The paper finishes up with considerations for future examination.Keywords: PPP, risk pricing, impact of risk, Endogenous risks
Procedia PDF Downloads 4511407 RoboWeedSupport-Sub Millimeter Weed Image Acquisition in Cereal Crops with Speeds up till 50 Km/H
Authors: Morten Stigaard Laursen, Rasmus Nyholm Jørgensen, Mads Dyrmann, Robert Poulsen
Abstract:
For the past three years, the Danish project, RoboWeedSupport, has sought to bridge the gap between the potential herbicide savings using a decision support system and the required weed inspections. In order to automate the weed inspections it is desired to generate a map of the weed species present within the field, to generate the map images must be captured with samples covering the field. This paper investigates the economical cost of performing this data collection based on a camera system mounted on a all-terain vehicle (ATV) able to drive and collect data at up to 50 km/h while still maintaining a image quality sufficient for identifying newly emerged grass weeds. The economical estimates are based on approximately 100 hectares recorded at three different locations in Denmark. With an average image density of 99 images per hectare the ATV had an capacity of 28 ha per hour, which is estimated to cost 6.6 EUR/ha. Alternatively relying on a boom solution for an existing tracktor it was estimated that a cost of 2.4 EUR/ha is obtainable under equal conditions.Keywords: weed mapping, integrated weed management, weed recognition, image acquisition
Procedia PDF Downloads 2321406 Optimal Allocation of PHEV Parking Lots to Minimize Dstribution System Losses
Authors: Mohsen Mazidi, Ali Abbaspour, Mahmud Fotuhi-Firuzabad, Mohamamd Rastegar
Abstract:
To tackle the air pollution issues, Plug-in Hybrid Electric Vehicles (PHEVs) are proposed as an appropriate solution. Charging a large amount of PHEV batteries, if not controlled, would have negative impacts on the distribution system. The control process of charging of these vehicles can be centralized in parking lots that may provide a chance for better coordination than the individual charging in houses. In this paper, an optimization-based approach is proposed to determine the optimum PHEV parking capacities in candidate nodes of the distribution system. In so doing, a profile for charging and discharging of PHEVs is developed in order to flatten the network load profile. Then, this profile is used in solving an optimization problem to minimize the distribution system losses. The outputs of the proposed method are the proper place for PHEV parking lots and optimum capacity for each parking. The application of the proposed method on the IEEE-34 node test feeder verifies the effectiveness of the method.Keywords: loss, plug-in hybrid electric vehicle (PHEV), PHEV parking lot, V2G
Procedia PDF Downloads 5401405 Super-ellipsoidal Potential Function for Autonomous Collision Avoidance of a Teleoperated UAV
Authors: Mohammed Qasim, Kyoung-Dae Kim
Abstract:
In this paper, we present the design of the super-ellipsoidal potential function (SEPF), that can be used for autonomous collision avoidance of an unmanned aerial vehicle (UAV) in a 3-dimensional space. In the design of SEPF, we have the full control over the shape and size of the potential function. In particular, we can adjust the length, width, height, and the amount of flattening at the tips of the potential function so that the collision avoidance motion vector generated from the potential function can be adjusted accordingly. Based on the idea of the SEPF, we also propose an approach for the local autonomy of a UAV for its collision avoidance when the UAV is teleoperated by a human operator. In our proposed approach, a teleoperated UAV can not only avoid collision autonomously with other surrounding objects but also track the operator’s control input as closely as possible. As a result, an operator can always be in control of the UAV for his/her high-level guidance and navigation task without worrying too much about the UAVs collision avoidance while it is being teleoperated. The effectiveness of the proposed approach is demonstrated through a human-in-the-loop simulation of quadrotor UAV teleoperation using virtual robot experimentation platform (v-rep) and Matlab programs.Keywords: artificial potential function, autonomous collision avoidance, teleoperation, quadrotor
Procedia PDF Downloads 3981404 Fixed-Frequency Pulse Width Modulation-Based Sliding Mode Controller for Switching Multicellular Converter
Authors: Rihab Hamdi, Amel Hadri Hamida, Ouafae Bennis, Fatima Babaa, Sakina Zerouali
Abstract:
This paper features a sliding mode controller (SMC) for closed-loop voltage control of DC-DC three-cells buck converter connected in parallel, operating in continuous conduction mode (CCM), based on pulse-width modulation (PWM). To maintain the switching frequency, the approach is to incorporate a pulse-width modulation that utilizes an equivalent control, inferred by applying the SM control method, to produce a control sign to be contrasted and the fixed-frequency within the modulator. Detailed stability and transient performance analysis have been conducted using Lyapunov stability criteria to restrict the switching frequency variation facing wide variations in output load, input changes, and set-point changes. The results obtained confirm the effectiveness of the proposed control scheme in achieving an enhanced output transient performance while faithfully realizing its control objective in the event of abrupt and uncertain parameter variations. Simulations studies in MATLAB/Simulink environment are performed to confirm the idea.Keywords: DC-DC converter, pulse width modulation, power electronics, sliding mode control
Procedia PDF Downloads 1451403 Adaptable Regulatory Oversight and Safety Awareness Regime: An Experience-Based Contribution Towards Sustainability in a Changing Railway Environment
Authors: Peaceman Sopazi, Mabila Mathebula, John Smallwood
Abstract:
Recent health and safety (H&S) concerns and their resultant impact on railway operations, namely, the severe acute respiratory syndrome (SARS) or collectively known as SARS-CoV-2 (Covid-19) pandemic and the Fourth Industrial Revolution (4IR), which have dominated public discourse, brought into question as to whether, or not, some aspects of how we have so far managed safety oversight as railway regulatory bodies and operators will remain relevant in a changing railway environment. Railway practitioners have generally found themselves between a proverbial rock and a hard place by being confronted by emerging challenges which have brought along great opportunities for sustainability. As witnesses and participants to the progressively introduced railway safety management, and transformation regimes, this paper attempts to share gathered field experience on adaptable regulatory oversight and safety awareness. The discourse is approached from a South African context but also with an informed perspective of what seems to work and what usually does not. The authors share their own multi and transdisciplinary experience coupled with insights they have gained as researchers of global trends in general safety management and specific aspects of railway safety management, for sustainability. In addition to sharing a largely experience-based methodology for survival, suggestions are offered for consideration as a way of keeping the railway safety management discourse alive as practitioners navigate a new path which is shrouded in a cloud of untold uncertainty. The authors further believe that the right timing for the implementation of the proposed suggestions in this paper will produce beneficial outcomes. Finally, the paper will identify areas that are still open for further investigation for and by researchers and practitioners alike.Keywords: health & safety management, safety awareness, railway safety management, railway systems sustainability
Procedia PDF Downloads 172