Search results for: Means of securing graves
4390 Research on the Risks of Railroad Receiving and Dispatching Trains Operators: Natural Language Processing Risk Text Mining
Authors: Yangze Lan, Ruihua Xv, Feng Zhou, Yijia Shan, Longhao Zhang, Qinghui Xv
Abstract:
Receiving and dispatching trains is an important part of railroad organization, and the risky evaluation of operating personnel is still reflected by scores, lacking further excavation of wrong answers and operating accidents. With natural language processing (NLP) technology, this study extracts the keywords and key phrases of 40 relevant risk events about receiving and dispatching trains and reclassifies the risk events into 8 categories, such as train approach and signal risks, dispatching command risks, and so on. Based on the historical risk data of personnel, the K-Means clustering method is used to classify the risk level of personnel. The result indicates that the high-risk operating personnel need to strengthen the training of train receiving and dispatching operations towards essential trains and abnormal situations.Keywords: receiving and dispatching trains, natural language processing, risk evaluation, K-means clustering
Procedia PDF Downloads 914389 Causes for the Precession of the Perihelion in the Planetary Orbits
Authors: Kwan U. Kim, Jin Sim, Ryong Jin Jang, Sung Duk Kim
Abstract:
It is Leverrier that discovered the precession of the perihelion in the planetary orbits for the first time in the world, while it is Einstein that explained the astronomical phenomenom for the first time in the world. The amount of the precession of the perihelion for Einstein’s theory of gravitation has been explained by means of the inverse fourth power force(inverse third power potential) introduced totheory of gravitation through Schwarzschild metric However, the methodology has a serious shortcoming that it is impossible to explain the cause for the precession of the perihelion in the planetary orbits. According to our study, without taking the cause for the precession of the perihelion, 6 methods can explain the amount of the precession of the perihelion discovered by Leverrier. Therefore, the problem of what caused the perihelion to precess in the planetary orbits must be solved for physics because it is a profound scientific and technological problem for a basic experiment in construction of relativistic theory of gravitation. The scientific solution to the problem proved that Einstein’s explanation for the planetary orbits is a magic made by the numerical expressions obtained from fictitious gravitation introduced to theory of gravitation and wrong definition of proper time The problem of the precession of the perihelion seems solved already by means of general theory of relativity, but, in essence, the cause for the astronomical phenomenon has not been successfully explained for astronomy yet. The right solution to the problem comes from generalized theory of gravitation. Therefore, in this paper, it has been shown that by means of Schwarzschild field and the physical quantities of relativistic Lagrangian redflected in it, fictitious gravitation is not the main factor which can cause the perihelion to precess in the planetary orbits. In addition to it, it has been shown that the main factor which can cause the perihelion to precess in the planetary orbits is the inverse third power force existing really in the relativistic region in the Solar system.Keywords: inverse third power force, precession of the perihelion, fictitious gravitation, planetary orbits
Procedia PDF Downloads 114388 A Study on the Effect of Rib Structure in Spoke-Type PMSM
Authors: Hyun-Soo Seol, In-Gun Kim, Hyun Seok Hong, Dong-Woo Kang, Ju Lee
Abstract:
Rotor of Spoke-Type PMSM is divided into permanent magnet and rotor core. Moreover, rotor core is composed of pole-piece, Bridge and rib. Piece between the permanent magnet N and S poles is pole-piece. Bridge and rib hold pole-piece. In the case of pole-piece and bridge, it is essential structure of Spoke-Type PMSM. However, Rib can be selected by the designer depending on the operating conditions and constraints. If rib is present in the rotor, rib which acts in the leak path generates a leakage flux. Although the leakage flux reduces the torque in low speed, it expands speed range in high speed. So, there is a relationship of trade off. Viewed from the standpoint of permanent magnet demagnetization, since the magnetic flux by the stator winding leaks to the rib, it is an advantage. In addition, rib affects the safety factor of the rotor. For application required high speed operation, since the securing the safety factor of the rotor is important, rib structure is advantageous. On the other hand, in the case of the application that does not require high speed operation, it is desirable to increase the output power by designing without rib. In this paper, Effects on rib structure is analyzed in detail and this paper provides designer with information about rotor design of spoke-type PMSM according to rib structure.Keywords: spoke-Type PMSM, rotor shape, rib, operation range
Procedia PDF Downloads 4294387 The Effectiveness of ICT-Assisted PBL on College-Level Nano Knowledge and Learning Skills
Authors: Ya-Ting Carolyn Yang, Ping-Han Cheng, Shi-Hui Gilbert Chang, Terry Yuan-Fang Chen, Chih-Chieh Li
Abstract:
Nanotechnology is widely applied in various areas so professionals in the related fields have to know more than nano knowledge. In the study, we focus on adopting ICT-assisted PBL in college general education to foster professionals who possess multiple abilities. The research adopted a pretest and posttest quasi-experimental design. The control group received traditional instruction, and the experimental group received ICT-assisted PBL instruction. Descriptive statistics will be used to describe the means, standard deviations, and adjusted means for the tests between the two groups. Next, analysis of covariance (ANCOVA) will be used to compare the final results of the two research groups after 6 weeks of instruction. Statistics gathered in the end of the research can be used to make contrasts. Therefore, we will see how different teaching strategies can improve students’ understanding about nanotechnology and learning skills.Keywords: nanotechnology, science education, project-based learning, information and communication technology
Procedia PDF Downloads 3754386 Comparison of Authentication Methods in Internet of Things Technology
Authors: Hafizah Che Hasan, Fateen Nazwa Yusof, Maslina Daud
Abstract:
Internet of Things (IoT) is a powerful industry system, which end-devices are interconnected and automated, allowing the devices to analyze data and execute actions based on the analysis. The IoT technology leverages the technology of Radio-Frequency Identification (RFID) and Wireless Sensor Network (WSN), including mobile and sensor. These technologies contribute to the evolution of IoT. However, due to more devices are connected each other in the Internet, and data from various sources exchanged between things, confidentiality of the data becomes a major concern. This paper focuses on one of the major challenges in IoT; authentication, in order to preserve data integrity and confidentiality are in place. A few solutions are reviewed based on papers from the last few years. One of the proposed solutions is securing the communication between IoT devices and cloud servers with Elliptic Curve Cryptograhpy (ECC) based mutual authentication protocol. This solution focuses on Hyper Text Transfer Protocol (HTTP) cookies as security parameter. Next proposed solution is using keyed-hash scheme protocol to enable IoT devices to authenticate each other without the presence of a central control server. Another proposed solution uses Physical Unclonable Function (PUF) based mutual authentication protocol. It emphasizes on tamper resistant and resource-efficient technology, which equals a 3-way handshake security protocol.Keywords: Internet of Things (IoT), authentication, PUF ECC, keyed-hash scheme protocol
Procedia PDF Downloads 2644385 Ambiguity in Anti-conversion Laws in the Indian States – A Limitation to the Freedom of Religion Guaranteed under the Constitution of India
Authors: Roy Alex, Dr. Shampa I Dev
Abstract:
Abstract Nine out of twenty-eight states in India have enacted anti-conversion laws to regulate religious conversions by use of force, allurement, inducement, or fraudulent means. The vagueness of the definitions of the terms used in these laws makes them inconsistent with the provisions of the right to freedom of religion guaranteed by the Constitution. It is a critical question whether these laws protect the religious freedom of groups that are “vulnerable” to missionary inducements, or are they restricting the freedom of citizens to propagate their religion to others or change their religious identity? This article looks into the constitutionality of the anti-conversion laws passed in the Indian States and argues that these laws limit the freedom of religion guaranteed under Article 25 of the Constitution of India. The ambiguity in the anti-conversion laws passed in various states of India is brought out by critically analyzing multiple cases charged under anti-conversion laws.Keywords: Freedom of Religion, Anti-conversion Laws, allurement, inducement, and fraudulent means.
Procedia PDF Downloads 1064384 The Role of Evaluation for Effective and Efficient Change in Higher Education Institutions
Authors: Pattaka Sa-Ngimnet
Abstract:
That the University as we have known it is no longer serving the needs of the vast majority of students and potential students has been a topic of much discussion. Institutions of higher education, in this age of global culture, are in a process of metamorphosis. Technology is being used to allow more students, older students, working students and disabled students, who cannot attend conventional classes, to have greater access to higher education through the internet. But change must come about only after much evaluation and experimentation or education will simply become a commodity as, in some cases, it already has. This paper will be concerned with the meaning and methods of change and evaluation as they are applied to institutions of higher education. Organization’s generally have different goals and different approaches in order to be successful. However, the means of reaching those goals requires rational and effective planning. Any plans for successful change in any institution must take into account both effectiveness and efficiency and the differences between them. “Effectiveness” refers to an adequate means of achieving an objective. “Efficiency” refers to the ability to achieve an objective without waste of time or resources (The Free Dictionary). So an effective means may not be efficient and an efficient means may not be effective. The goal is to reach a synthesis of effectiveness and efficiency that will maximize both to the extent each is limited by the other. This focus of this paper then is to determine how an educational institution can become either successful or oppressive depending on the kinds of planning, evaluating and changes that operate by and on the administration. If the plan is concerned only with efficiency, the institution can easily become oppressive and lose sight of its purpose of educating students. If it is overly concentrated on effectiveness, the students may receive a superior education in the short run but the institution will face operating difficulties. In becoming only goal oriented, institutions also face problems. Simply stated, if the institution reaches its goals, the stake holders may become satisfied and fail to change and keep up with the needs of the times. So goals should be seen only as benchmarks in a process of becoming even better in providing quality education. Constant and consistent evaluation is the key to making all these factors come together in a successful process of planning, testing and changing the plans as needed. The focus of the evaluation has to be considered. Evaluations must take into account progress and needs of students, methods and skills of instructors, resources available from the institution and the styles and objectives of administrators. Thus the role of evaluation is pivotal in providing for the maximum of both effective and efficient change in higher education institutions.Keywords: change, effectiveness, efficiency, education
Procedia PDF Downloads 3204383 Evaluating the Use of Digital Art Tools for Drawing to Enhance Artistic Ability and Improve Digital Skill among Junior School Students
Authors: Aber Salem Aboalgasm, Rupert Ward
Abstract:
This study investigated some results of the use of digital art tools by junior school children in order to discover if these tools could promote artistic ability and creativity. The study considers the ease of use and usefulness of the tools as well as how to assess artwork produced by digital means. As the use of these tools is a relatively new development in Art education, this study may help educators in their choice of which tools to use and when to use them. The study also aims to present a model for the assessment of students’ artistic development and creativity by studying their artistic activity. This model can help in determining differences in students’ creative ability and could be useful both for teachers, as a means of assessing digital artwork, and for students, by providing the motivation to use the tools to their fullest extent. Sixteen students aged nine to ten years old were observed and recorded while they used the digital drawing tools. The study found that, according to the students’ own statements, it was not the ease of use but the successful effects the tools provided which motivated the children to use them.Keywords: artistic ability, creativity, drawing digital tool, TAM model, psychomotor domain
Procedia PDF Downloads 3304382 Spoken Rhetoric in Arabic Heritage
Authors: Ihab Al-Mokrani
Abstract:
The Arabic heritage has two types of spoken rhetoric: the first type which al-Jaahiz calls “the rhetoric of the sign,” which means body language, and the rhetoric of silence which is of no less importance than the rhetoric of the sign, the speaker’s appearance and movements, etc. The second type is the spoken performance of utterances which bears written rhetoric arts like metaphor, simile, metonymy, etc. Rationale of the study: First: in spite of the factual existence of rhetorical phenomena in the Arabic heritage, there has been no contemporary study handling the spoken rhetoric in the Arabic heritage. Second: Arabic Civilization is originally a spoken one. Comparing the Arabic culture and civilization, from one side, to the Greek, roman or Pharaonic cultures and civilizations, from the other side, shows that the latter cultures and civilizations started and flourished written while the former started among illiterate people who had no interest in writing until recently. That sort of difference on the part of the Arabic culture and civilization created a rhetoric different from rhetoric in the other cultures and civilizations. Third: the spoken nature of the Arabic civilization influenced the Arabic rhetoric in the sense that specific rhetorical arts have been introduced matching that spoken nature. One of these arts is the art of concision which compensates for the absence of writing’s means of preserving the text. In addition, this interprets why many of the definitions of the Arabic rhetoric were defining rhetoric as the art of concision. Also, this interprets the fact that the literary genres known in the Arabic culture were limited by the available narrow space like poetry, anecdotes, and stories, while the literary genres in the Greek culture were of wide space as epics and drama. This is not of any contrast to the fact that some Arabic poetry would exceed 100 lines of poetry as Arabic poetry was based on the line organic unity, which means that every line could stand alone with a full meaning that is not dependent on the rest of the poem; and that last aspect has never happened in any culture other than the Arabic culture.Keywords: Arabic rhetoric, spoken rhetoric, Arabic heritage, culture
Procedia PDF Downloads 7714381 Laser Beam Micro-Drilling Effect on Ti-6Al-4V Titanium Alloy Sheet Properties
Authors: Petr Homola, Roman Růžek
Abstract:
Laser beam micro-drilling (LBMD) is one of the most important non-contact machining processes of materials that are difficult to machine by means oeqf conventional machining methods used in various industries. The paper is focused on LBMD knock-down effect on Ti-6Al-4V (Grade 5) titanium alloy sheets properties. Two various process configurations were verified with a focus on laser damages in back-structure parts affected by the process. The effects of the LBMD on the material properties were assessed by means of tensile and fatigue tests and fracture surface analyses. Fatigue limit of LBMD configurations reached a significantly lower value between 15% and 30% of the static strength as compared to the reference raw material with 58% value. The farther back-structure configuration gives a two-fold fatigue life as compared to the closer LBMD configuration at a given stress applied.Keywords: fatigue, fracture surface, laser beam micro-drilling, titanium alloy
Procedia PDF Downloads 1554380 Numerical investigation of Hydrodynamic and Parietal Heat Transfer to Bingham Fluid Agitated in a Vessel by Helical Ribbon Impeller
Authors: Mounir Baccar, Amel Gammoudi, Abdelhak Ayadi
Abstract:
The efficient mixing of highly viscous fluids is required for many industries such as food, polymers or paints production. The homogeneity is a challenging operation for this fluids type since they operate at low Reynolds number to reduce the required power of the used impellers. Particularly, close-clearance impellers, mainly helical ribbons, are chosen for highly viscous fluids agitated in laminar regime which is currently heated through vessel wall. Indeed, they are characterized by high shear strains closer to the vessel wall, which causes a disturbing thermal boundary layer and ensures the homogenization of the bulk volume by axial and radial vortices. The hydrodynamic and thermal behaviors of Newtonian fluids in vessels agitated by helical ribbon impellers, has been mostly studied by many researchers. However, rarely researchers investigated numerically the agitation of yield stress fluid by means of helical ribbon impellers. This paper aims to study the effect of the Double Helical Ribbon (DHR) stirrers on both the hydrodynamic and the thermal behaviors of yield stress fluids treated in a cylindrical vessel by means of numerical simulation approach. For this purpose, continuity, momentum, and thermal equations were solved by means of 3D finite volume technique. The effect of Oldroyd (Od) and Reynolds (Re) numbers on the power (Po) and Nusselt (Nu) numbers for the mentioned stirrer type have been studied. Also, the velocity and thermal fields, the dissipation function and the apparent viscosity have been presented in different (r-z) and (r-θ) planes.Keywords: Bingham fluid, Hydrodynamic and thermal behavior, helical ribbon, mixing, numerical modelling
Procedia PDF Downloads 3064379 Substation Automation, Digitization, Cyber Risk and Chain Risk Management Reliability
Authors: Serzhan Ashirov, Dana Nour, Rafat Rob, Khaled Alotaibi
Abstract:
There has been a fast growth in the introduction and use of communications, information, monitoring, and sensing technologies. The new technologies are making their way to the Industrial Control Systems as embedded in products, software applications, IT services, or commissioned to enable integration and automation of increasingly global supply chains. As a result, the lines that separated the physical, digital, and cyber world have diminished due to the vast implementation of the new, disruptive digital technologies. The variety and increased use of these technologies introduce many cybersecurity risks affecting cyber-resilience of the supply chain, both in terms of the product or service delivered to a customer and members of the supply chain operation. US department of energy considers supply chain in the IR4 space to be the weakest link in cybersecurity. The IR4 identified the digitization of the field devices, followed by digitalization that eventually moved through the digital transformation space with little care for the new introduced cybersecurity risks. This paper will examine the best methodologies for securing the electrical substations from cybersecurity attacks due to supply chain risks, and due to digitization effort. SCADA systems are the most vulnerable part of the power system infrastructure due to digitization and due to the weakness and vulnerabilities in the supply chain security. The paper will discuss in details how create a secure supply chain methodology, secure substations, and mitigate the risks due to digitizationKeywords: cybersecurity, supply chain methodology, secure substation, digitization
Procedia PDF Downloads 644378 The Conceptual Exploration of Comfort Zone by Using Content Analysis
Authors: Lilla Szabó Hangya, Szilvia Jambori
Abstract:
The comfort zone is less studied area in the field of psychology. One of the most important definitions is that comfort zone is a psychological state in which things feel familiar to a person with low level of anxiety and stress. But the validity of comfort zone does not confirm till now. The aim of our pilot research is to test which psychological factors could determine how young adults behave during their decision process to stay in one’s comfort zone or to leave it. Every person has a number of comfort zones, so we are not able to measure it directly, only those personality traits which predict if someone leaves his comfort zone easier or harder. In our study at first we wanted to clarify the meaning of comfort zone. 110 young adults (male: 37, female: 73; ages from 18 to 70, average age: 26,6) took part in the study. Beside their demographic datas we asked them what does the comfort zone mean for them. The results showed that the meaning of the comfort zone can be grouped in five dimensions: comfort (49,6 %), leaving it-change (8,1%), ambivalent feelings (10,6%), related to other people (10,6%), pursuit of self-realization (16,8%). Our results demonstrated age related characteristics. For young people at the age of 19 the comfort zone is related to other people, because during adolescents peer relationships become more important. Subjects at the age 20-30 answered that the comfort zone means comfort and stability for them. Their life becomes stable for a while, they are studying or working. But at the age of 25, when they finish university, most of them answered comfort zone means a changing process for them. On the other hand for subjects at the age of 27 the means of the comfort zone is pursuit of self-realization. After that period at the age of 31 when they have families and stable job the stability will also dominant. We saw that the comfort zone has much more meaning besides a pleasant psychological trait. Further we would like to determine which psychological factors relate to comfort zone, and what kind of personality traits could predict leaving or staying in one’s comfort zone. We want to observe the relationship between comfort zone and subjective well-being, life satisfaction self-efficacy or self-esteem.Keywords: comfort zone, development, personality trait, young adults
Procedia PDF Downloads 3404377 Knowledge Representation Based on Interval Type-2 CFCM Clustering
Authors: Lee Myung-Won, Kwak Keun-Chang
Abstract:
This paper is concerned with knowledge representation and extraction of fuzzy if-then rules using Interval Type-2 Context-based Fuzzy C-Means clustering (IT2-CFCM) with the aid of fuzzy granulation. This proposed clustering algorithm is based on information granulation in the form of IT2 based Fuzzy C-Means (IT2-FCM) clustering and estimates the cluster centers by preserving the homogeneity between the clustered patterns from the IT2 contexts produced in the output space. Furthermore, we can obtain the automatic knowledge representation in the design of Radial Basis Function Networks (RBFN), Linguistic Model (LM), and Adaptive Neuro-Fuzzy Networks (ANFN) from the numerical input-output data pairs. We shall focus on a design of ANFN in this paper. The experimental results on an estimation problem of energy performance reveal that the proposed method showed a good knowledge representation and performance in comparison with the previous works.Keywords: IT2-FCM, IT2-CFCM, context-based fuzzy clustering, adaptive neuro-fuzzy network, knowledge representation
Procedia PDF Downloads 3224376 Unreliable Production Lines with Simultaneously Unbalanced Operation Time Means, Breakdown, and Repair Rates
Authors: Sabry Shaaban, Tom McNamara, Sarah Hudson
Abstract:
This paper investigates the benefits of deliberately unbalancing both operation time means (MTs) and unreliability (failure and repair rates) for non-automated production lines.The lines were simulated with various line lengths, buffer capacities, degrees of imbalance and patterns of MT and unreliability imbalance. Data on two performance measures, namely throughput (TR) and average buffer level (ABL) were gathered, analyzed and compared to a balanced line counterpart. A number of conclusions were made with respect to the ranking of configurations, as well as to the relationships among the independent design parameters and the dependent variables. It was found that the best configurations are a balanced line arrangement and a monotone decreasing MT order, coupled with either a decreasing or a bowl unreliability configuration, with the first generally resulting in a reduced TR and the second leading to a lower ABL than those of a balanced line.Keywords: unreliable production lines, unequal mean operation times, unbalanced failure and repair rates, throughput, average buffer level
Procedia PDF Downloads 4864375 Finite Element Analysis of the Blanking and Stamping Processes of Nuclear Fuel Spacer Grids
Authors: Rafael Oliveira Santos, Luciano Pessanha Moreira, Marcelo Costa Cardoso
Abstract:
Spacer grid assembly supporting the nuclear fuel rods is an important concern in the design of structural components of a Pressurized Water Reactor (PWR). The spacer grid is composed by springs and dimples which are formed from a strip sheet by means of blanking and stamping processes. In this paper, the blanking process and tooling parameters are evaluated by means of a 2D plane-strain finite element model in order to evaluate the punch load and quality of the sheared edges of Inconel 718 strips used for nuclear spacer grids. A 3D finite element model is also proposed to predict the tooling loads resulting from the stamping process of a preformed Inconel 718 strip and to analyse the residual stress effects upon the spring and dimple design geometries of a nuclear spacer grid.Keywords: blanking process, damage model, finite element modelling, inconel 718, spacer grids, stamping process
Procedia PDF Downloads 3444374 The Comparison of Physical Fitness across Age and Gender in the Lithuanian Primary School Students: Population-Based Cross-Sectional Study
Authors: Arunas Emeljanovas, Brigita Mieziene, Vida Cesnaitiene, Ingunn Fjortoft, Lise Kjonniksen
Abstract:
Background: Gender differences in physical fitness were tracked in many studies with lower effect in preschool children and increasing difference among genders across age. In Lithuania, on a population level, secular trends in physical fitness were regularly observed each ten years for the last two decades for 11-18 years old students. However, there is apparently a lack of such epidemiological studies among primary school students. Assessing and monitoring physical fitness from an early age is of particular importance seeking to develop and strengthen physical abilities of youths for future health benefits. The goal of the current study was to indicate age and gender differences in anthropometric measures, musculoskeletal, motor and cardiorespiratory fitness in Lithuanian primary school children. Methods: The study included 3456 1-4th grade students from 6 to 10 years. The data reliably represents the population of primary school children in Lithuania. Among them, 1721 (49.8 percent) were boys. Physical fitness was measured by the 9-item test battery, developed by Fjørtoft and colleagues (2011). Height and weight were measured and body mass index was calculated. Student t test evaluated differences in physical fitness between boys and girls, ANOVA was performed to indicate differences across age. Results: All anthropometric and fitness means that were identified as significantly different were better in boys than in girls and in older than younger students (p < .05). Among anthropometric measures, height was higher in boys aged 7 through 9 years. Weight and BMI differed among boys and girls only at 8 years old. Means of height and weight increased significantly across all ages. Among musculoskeletal fitness tests, means of standing broad jump, throwing a tennis ball and pushing a medicine ball were different between genders within each age group and across all ages. Differences between genders were less likely in motor fitness than in musculoskeletal or cardiorespiratory fitness. Differences in means of shuttle run 10 x 5 test between genders occurred at age 6, 9 and 10 years; running 20 m at age 6 and 9 years, and climbing wall bars at age 9 and 10. Means of Reduced Cooper test representing cardiorespiratory fitness were different between genders within each age group but did not differ among age 6 and 8 as well as 7 and 8 years in boys, and among age 7 and 8 years in girls. Conclusion: In general, the current study confirms gender differences in musculoskeletal, motor and cardiorespiratory fitness found in other studies across the world in primary school and older children. Observed gender differences might be explained by higher physical activity in boys rather than girls. As it is explained by previous literature, older boys and girls had better performances than younger ones, because of the components of fitness change as a function of growth, maturation, development, and interactions among the three processes.Keywords: primary school children, motor fitness, musculoskeletal fitness, cardiovascular fitness
Procedia PDF Downloads 2084373 Site Suitability Analysis for Multipurpose Dams Using Geospatial Technologies
Authors: Saima Iftikhar Rida Shabbir, Zeeshan Hassan
Abstract:
Water shortage, energy crisis and natural misfortunes are the glitches which reduce the efficacy of agricultural ecosystems especially in Pakistan where these are more frequent besides being intense. Accordingly, the agricultural water resources, food security and country’s economy are at risk. To address this, we have used Geospatial techniques incorporating ASTER Global DEM, Geological map, rainfall data, discharge data, Landsat 5 image of Swat valley in order to assess the viability of selected sites. The sites have been studied via GIS tools, Hydrological investigation and multiparametric analysis for their potentialities of collecting and securing the rain water; regulating floods by storing the surplus water bulks by check dams and developing them for power generation. Our results showed that Siat1-1 was very useful for low-cost dam with main objective of as Debris dam; Site-2 and Site 3 were check dams sites having adequate storing reservoir so as to arrest the inconsistent flow accompanied by catering the sedimentation effects and the debris flows; Site 4 had a huge reservoir capacity but it entails enormous edifice cost over very great flood plain. Thus, there is necessity of active Hydrological developments to estimate the flooded area using advanced and multifarious GIS and remote sensing approaches so that the sites could be developed for harnessing those sites for agricultural and energy drives.Keywords: site suitability, check dams, SHP, terrain analysis, volume estimation
Procedia PDF Downloads 3134372 Forecasting Unusual Infection of Patient Used by Irregular Weighted Point Set
Authors: Seema Vaidya
Abstract:
Mining association rule is a key issue in data mining. In any case, the standard models ignore the distinction among the exchanges, and the weighted association rule mining does not transform on databases with just binary attributes. This paper proposes a novel continuous example and executes a tree (FP-tree) structure, which is an increased prefix-tree structure for securing compacted, discriminating data about examples, and makes a fit FP-tree-based mining system, FP enhanced capacity algorithm is used, for mining the complete game plan of examples by illustration incessant development. Here, this paper handles the motivation behind making remarkable and weighted item sets, i.e. rare weighted item set mining issue. The two novel brightness measures are proposed for figuring the infrequent weighted item set mining issue. Also, the algorithm are handled which perform IWI which is more insignificant IWI mining. Moreover we utilized the rare item set for choice based structure. The general issue of the start of reliable definite rules is troublesome for the grounds that hypothetically no inciting technique with no other person can promise the rightness of influenced theories. In this way, this framework expects the disorder with the uncommon signs. Usage study demonstrates that proposed algorithm upgrades the structure which is successful and versatile for mining both long and short diagnostics rules. Structure upgrades aftereffects of foreseeing rare diseases of patient.Keywords: association rule, data mining, IWI mining, infrequent item set, frequent pattern growth
Procedia PDF Downloads 3994371 Transformation of Potato, Plantain, Banana to Flour in Order to Enhance Sustainable Development and Promote Local Consumption
Authors: Munu Fritz-Austin Ndam
Abstract:
Although the Cameroonian system of farming is considered as the first generation, the primary actors here involved have not yet understood the meaning of adding value to the product or produce they produce. The challenge here is for everyone who practices agriculture as an income generating activity in Cameroon to be able to understand the concept of value-added products and to know how to go about it. Recent studies have shown that these farmers who depend on agriculture as their main income generation activity make a great loss out of it because they don’t have the means to either transport their produce to the appropriate market, they don’t the knowledge on how to transform it, or they don’t have a means of conserving the product for a longer duration. It is important to note that after a thorough evaluation of the activity carried out, the final added value product sold is of great benefit not only to the producer but the buyer and the population at large. In my proposed prestation, I will discuss how the transformation activity will have a positive impact on the lives of farmers and the buyers and, most importantly, describe the methodology and procedure which is followed before the tubers (banana, Plantain, potato)is transformed into the finished or semi-finished product.Keywords: transformation, sustainability, development, consumption
Procedia PDF Downloads 1034370 Influence of Biological and Chemical Fertilizers on Quantitative Characteristics of Sweet Wormwood
Authors: Anahita Yarahmadi, Nazanin Mahboobi, Nahid Sadat Rahmatpour Nori, Mohammad Hossein Bijeh Keshavarzi, Mohammad Javad Shakori
Abstract:
This research aimed at considering biological fertilizer effect and chemical fertilizer on the quantitative characteristics of Sweet wormwood (Artemisia annua L.), an experiment was carried out in factorial design in completely randomized design with 4 replications in an experimental greenhouse which was located in Tehran. Experimental treatment involved chemical fertilizers (Nitrogen, Phosphorus) in4 levels and biological fertilizers in 4 levels (control, Nitroxin, Bio-phosphorus and Vemricompost). Results showed that using biological fertilizers and increasing different levels of chemical fertilizers (N, P) had significant effects on all the characteristics. Considering means comparison showed that biological fertilizers lead to significant enhancement on all the characteristics and among biological fertilizers, Vermicompost treatment has the most effect. Considering means comparison tables of different levels of chemical fertilizer have been found that (N80P80) had the most increase on characteristics.Keywords: Artemisia annua L, bio-fertilizer, chemical fertilizer, vermicompost
Procedia PDF Downloads 4554369 Securing the Electronic Commerce - The Way Forward: A Comparative Ananlysis
Authors: Sarthak Mishra, Astha Sinha
Abstract:
There’s no doubt about the convenience of making commercial and business transactions over the Internet under the new business model known as the e-Commerce. The term 'Electronic commerce' or e-Commerce refers to the use of an electronic medium to carry out commercial transactions. E-Commerce is one of the parts of Information Science framework and its uses are gradually becoming popular. Thus, the threat of security issues in Information Science has now become an important subject of discussion amongst the concerned users. These two issues i.e. security and privacy are required to be looked into through social, organizational, technical and economic perspectives. The current paper analyses the effect of these two issues in the arena of e-commerce. Here, no specification has been discussed rather an attempt has been made to provide a general overview. Further, attempts have been made to discuss the security and privacy issues in relation to the E-Commerce financial transactions. We shall also discuss in particular different steps required to be taken before online shopping and also shall discuss the purpose of security and privacy in E-Commerce and why it has currently become the need of the present hour. Lastly, an attempt has been made to discuss the plausible future course of development of this practice and its impact upon the global economy and if any changes should be bought about to ensure a smooth evolution of the practice. This paper has adopted a descriptive methodology to undertake its major area of study, wherein the major source of information has been via the secondary resources. Also, the study is of a comparative nature wherein the position of the various national regimes have compared with regards to the research question.Keywords: business-business transaction (B2B), business-consumer transaction (B2C), e-commerce, online transaction, privacy and security threats
Procedia PDF Downloads 2324368 The Application of Video Segmentation Methods for the Purpose of Action Detection in Videos
Authors: Nassima Noufail, Sara Bouhali
Abstract:
In this work, we develop a semi-supervised solution for the purpose of action detection in videos and propose an efficient algorithm for video segmentation. The approach is divided into video segmentation, feature extraction, and classification. In the first part, a video is segmented into clips, and we used the K-means algorithm for this segmentation; our goal is to find groups based on similarity in the video. The application of k-means clustering into all the frames is time-consuming; therefore, we started by the identification of transition frames where the scene in the video changes significantly, and then we applied K-means clustering into these transition frames. We used two image filters, the gaussian filter and the Laplacian of Gaussian. Each filter extracts a set of features from the frames. The Gaussian filter blurs the image and omits the higher frequencies, and the Laplacian of gaussian detects regions of rapid intensity changes; we then used this vector of filter responses as an input to our k-means algorithm. The output is a set of cluster centers. Each video frame pixel is then mapped to the nearest cluster center and painted with a corresponding color to form a visual map. The resulting visual map had similar pixels grouped. We then computed a cluster score indicating how clusters are near each other and plotted a signal representing frame number vs. clustering score. Our hypothesis was that the evolution of the signal would not change if semantically related events were happening in the scene. We marked the breakpoints at which the root mean square level of the signal changes significantly, and each breakpoint is an indication of the beginning of a new video segment. In the second part, for each segment from part 1, we randomly selected a 16-frame clip, then we extracted spatiotemporal features using convolutional 3D network C3D for every 16 frames using a pre-trained model. The C3D final output is a 512-feature vector dimension; hence we used principal component analysis (PCA) for dimensionality reduction. The final part is the classification. The C3D feature vectors are used as input to a multi-class linear support vector machine (SVM) for the training model, and we used a multi-classifier to detect the action. We evaluated our experiment on the UCF101 dataset, which consists of 101 human action categories, and we achieved an accuracy that outperforms the state of art by 1.2%.Keywords: video segmentation, action detection, classification, Kmeans, C3D
Procedia PDF Downloads 774367 Mineral Deposits in Spatial Planning Systems – Review of European Practices
Authors: Alicja Kot-Niewiadomska
Abstract:
Securing sustainable access to raw materials is vital for the growth of the European economy and for the goals laid down in Strategy Europe 2020. One of the most important sources of mineral raw materials are primary deposits. The efficient management of them, including extraction, will ensure competitiveness of the European economy. A critical element of this approach is mineral deposits safeguarding and the most important tool - spatial planning. The safeguarding of deposits should be understood as safeguarding of land access, and safeguarding of area against development, which may (potential) prevent the use of the deposit and the necessary mining activities. Many European Union countries successfully integrated their mineral policy and spatial policy, which has ensured the proper place of mineral deposits in their spatial planning systems. These, in turn, are widely recognized as the most important mineral deposit safeguarding tool, the essence of which is to ensure long-term access to its resources. The examples of Austria, Portugal, Slovakia, Czech Republic, Sweden, and the United Kingdom, discussed in the paper, are often mentioned as examples of good practices in this area. Although none of these countries managed to avoid cases of social and environmental conflicts related to mining activities, the solutions they implement certainly deserve special attention. And for many countries, including Poland, they can be a potential source of solutions aimed at improving the protection of mineral deposits.Keywords: mineral deposits, land use planning, mineral deposit safeguarding, European practices
Procedia PDF Downloads 1714366 Nonlinear Finite Element Analysis of Composite Cantilever Beam with External Prestressing
Authors: R. I. Liban, N. Tayşi
Abstract:
This paper deals with a nonlinear finite element analysis to examine the behavior up to failure of cantilever composite steel-concrete beams which are prestressed externally. 'Pre-' means stressing the high strength external tendons in the steel beam section before the concrete slab is added. The composite beam contains a concrete slab which is connected together with steel I-beam by means of perfect shear connectors between the concrete slab and the steel beam which is subjected to static loading. A finite element analysis will be done to study the effects of external prestressed tendons on the composite steel-concrete beams by locating the tendons in different locations (profiles). ANSYS version 12.1 computer program is being used to analyze the represented three-dimensional model of the cantilever composite beam. This model gives all these outputs, mainly load-displacement behavior of the cantilever end and in the middle span of the simple support part.Keywords: composite steel-concrete beams, external prestressing, finite element analysis, ANSYS
Procedia PDF Downloads 3154365 Stochastic Edge Based Anomaly Detection for Supervisory Control and Data Acquisitions Systems: Considering the Zambian Power Grid
Authors: Lukumba Phiri, Simon Tembo, Kumbuso Joshua Nyoni
Abstract:
In Zambia recent initiatives by various power operators like ZESCO, CEC, and consumers like the mines to upgrade power systems into smart grids target an even tighter integration with information technologies to enable the integration of renewable energy sources, local and bulk generation, and demand response. Thus, for the reliable operation of smart grids, its information infrastructure must be secure and reliable in the face of both failures and cyberattacks. Due to the nature of the systems, ICS/SCADA cybersecurity and governance face additional challenges compared to the corporate networks, and critical systems may be left exposed. There exist control frameworks internationally such as the NIST framework, however, there are generic and do not meet the domain-specific needs of the SCADA systems. Zambia is also lagging in cybersecurity awareness and adoption, therefore there is a concern about securing ICS controlling key infrastructure critical to the Zambian economy as there are few known facts about the true posture. In this paper, we introduce a stochastic Edged-based Anomaly Detection for SCADA systems (SEADS) framework for threat modeling and risk assessment. SEADS enables the calculation of steady-steady probabilities that are further applied to establish metrics like system availability, maintainability, and reliability.Keywords: anomaly, availability, detection, edge, maintainability, reliability, stochastic
Procedia PDF Downloads 1104364 Artificial Intelligent Methodology for Liquid Propellant Engine Design Optimization
Authors: Hassan Naseh, Javad Roozgard
Abstract:
This paper represents the methodology based on Artificial Intelligent (AI) applied to Liquid Propellant Engine (LPE) optimization. The AI methodology utilized from Adaptive neural Fuzzy Inference System (ANFIS). In this methodology, the optimum objective function means to achieve maximum performance (specific impulse). The independent design variables in ANFIS modeling are combustion chamber pressure and temperature and oxidizer to fuel ratio and output of this modeling are specific impulse that can be applied with other objective functions in LPE design optimization. To this end, the LPE’s parameter has been modeled in ANFIS methodology based on generating fuzzy inference system structure by using grid partitioning, subtractive clustering and Fuzzy C-Means (FCM) clustering for both inferences (Mamdani and Sugeno) and various types of membership functions. The final comparing optimization results shown accuracy and processing run time of the Gaussian ANFIS Methodology between all methods.Keywords: ANFIS methodology, artificial intelligent, liquid propellant engine, optimization
Procedia PDF Downloads 5884363 ANA Negative but FANA Positive Patients with Clinical Symptoms of Rheumatic Disease: The Suggestion for Clinicians
Authors: Abdolreza Esmaeilzadeh, Mehri Mirzaei
Abstract:
Objective: Rheumatic disease is a chronic disease that causes pain, stiffness, swelling and limited motion and function of many joints. RA is the most common form of autoimmune arthritis, affecting more than 1.3 million Americans. Of these, about 75% are women. Materials and Methods: This study was formed due to the misconception about ANA test, which is frequently performed with methods based upon solid phase as ELISA. This experiment was conducted on 430 patients, with clinical symptoms that are likely affected with rheumatic diseases, simultaneously by means of ANA and FANA. Results: 36 cases (8.37%) of patients, despite positive ANA, have demonstrated negative results via Indirect Immunofluorescence Assay (IIFA), (false positive). 116 cases (27%) have demonstrated negative ANA results, by means of the ELISA technique, although they had positive IIFA results. Conclusion: Other advantages of IIFA are antibody titration and specific pattern detection that have the capability of distinguishing positive dsDNA results. According to the restrictions and false negative cases, in patients, IIFA test is highly recommended for these disease's diagnosis.Keywords: autoimmune disease, IIFA, EIA, rheumatic disease
Procedia PDF Downloads 4994362 Urban Agriculture Potential and Challenges in Mid-Sized Cities: A Case Study of Neishabour, Iran
Authors: Mohammadreza Mojtahedi
Abstract:
Urban agriculture, in the face of burgeoning urban populations and unchecked urbanization, presents a promising avenue for sustainable economic, social, and environmental growth. This study, set against the backdrop of Neishabour, Iran, delves into the potential and challenges inherent in this domain. Utilizing a descriptive-analytical approach, field survey data were predominantly collated via questionnaires. The research rigor was upheld with the Delphi method affirming the validity and a Cronbach's alpha score exceeding 0.70, underscoring reliability. The study encompassed Neishabour's 2016 populace, pegged at 264,375, drawing a sample size of 384 via Cochran's formula. The findings spotlight Neishabour's pronounced agricultural prowess, as evidenced by a significance level under 0.05 and an average difference of 0.54. Engaging in urban agricultural ventures can notably elevate job quality, spur savings, bolster profitability, promote organic cultivation, and streamline production expenses. However, challenges, such as heightened land valuations for alternative uses, conflicting land engagements, security dilemmas, technical impediments, waning citizen interest, regulatory conundrums, and perceived upfront investment risks, were identified. A silver lining emerged with urban locales, especially streets and boulevards, securing average ratings of 3.90, marking them as prime contenders for urban agricultural endeavors.Keywords: urban agriculture, sustainable development, mid-sized cities, neishabour.
Procedia PDF Downloads 614361 Non-Local Simultaneous Sparse Unmixing for Hyperspectral Data
Authors: Fanqiang Kong, Chending Bian
Abstract:
Sparse unmixing is a promising approach in a semisupervised fashion by assuming that the observed pixels of a hyperspectral image can be expressed in the form of linear combination of only a few pure spectral signatures (end members) in an available spectral library. However, the sparse unmixing problem still remains a great challenge at finding the optimal subset of endmembers for the observed data from a large standard spectral library, without considering the spatial information. Under such circumstances, a sparse unmixing algorithm termed as non-local simultaneous sparse unmixing (NLSSU) is presented. In NLSSU, the non-local simultaneous sparse representation method for endmember selection of sparse unmixing, is used to finding the optimal subset of endmembers for the similar image patch set in the hyperspectral image. And then, the non-local means method, as a regularizer for abundance estimation of sparse unmixing, is used to exploit the abundance image non-local self-similarity. Experimental results on both simulated and real data demonstrate that NLSSU outperforms the other algorithms, with a better spectral unmixing accuracy.Keywords: hyperspectral unmixing, simultaneous sparse representation, sparse regression, non-local means
Procedia PDF Downloads 245