Search results for: research data sharing
38687 Research on the Impact of Spatial Layout Design on College Students’ Learning and Mental Health: Analysis Based on a Smart Classroom Renovation Project in Shanghai, China
Authors: Zhang Dongqing
Abstract:
Concern for students' mental health and the application of intelligent advanced technologies are driving changes in teaching models. The traditional teacher-centered classroom is beginning to transform into a student-centered smart interactive learning environment. Nowadays, smart classrooms are compatible with constructivist learning. This theory emphasizes the role of teachers in the teaching process as helpers and facilitators of knowledge construction, and students learn by interacting with them. The spatial design of classrooms is closely related to the teaching model and should also be developed in the direction of smart classroom design. The goal is to explore the impact of smart classroom layout on student-centered teaching environment and teacher-student interaction under the guidance of constructivist learning theory, by combining the design process and feedback analysis of the smart transformation project on the campus of Tongji University in Shanghai. During the research process, the theoretical basis of constructivist learning was consolidated through literature research and case analysis. The integration and visual field analysis of the traditional and transformed indoor floor plans were conducted using space syntax tools. Finally, questionnaire surveys and interviews were used to collect data. The main conclusions are as followed: flexible spatial layouts can promote students' learning effects and mental health; the interactivity of smart classroom layouts is different and needs to be combined with different teaching models; the public areas of teaching buildings can also improve the interactive learning atmosphere by adding discussion space. This article provides a data-based research basis for improving students' learning effects and mental health, and provides a reference for future smart classroom design.Keywords: spatial layout, smart classroom, space syntax, renovation, educational environment
Procedia PDF Downloads 7338686 Operating Speed Models on Tangent Sections of Two-Lane Rural Roads
Authors: Dražen Cvitanić, Biljana Maljković
Abstract:
This paper presents models for predicting operating speeds on tangent sections of two-lane rural roads developed on continuous speed data. The data corresponds to 20 drivers of different ages and driving experiences, driving their own cars along an 18 km long section of a state road. The data were first used for determination of maximum operating speeds on tangents and their comparison with speeds in the middle of tangents i.e. speed data used in most of operating speed studies. Analysis of continuous speed data indicated that the spot speed data are not reliable indicators of relevant speeds. After that, operating speed models for tangent sections were developed. There was no significant difference between models developed using speed data in the middle of tangent sections and models developed using maximum operating speeds on tangent sections. All developed models have higher coefficient of determination then models developed on spot speed data. Thus, it can be concluded that the method of measuring has more significant impact on the quality of operating speed model than the location of measurement.Keywords: operating speed, continuous speed data, tangent sections, spot speed, consistency
Procedia PDF Downloads 45238685 Monitoring Public Transportation in Developing Countries Using Automatic Vehicle Location System: A Case Study
Authors: Ahmed Osama, Hassan A. Mahdy, Khalid A. Kandil, Mohamed Elhabiby
Abstract:
Automatic Vehicle Location systems (AVL) have been used worldwide for more than twenty years and have showed great success in public transportation management and monitoring. Cairo public bus service suffers from several problems such as unscheduled stops, unscheduled route deviations, and inaccurate schedules, which have negative impacts on service reliability. This research aims to study those problems for a selected bus route in Cairo using a prototype AVL system. Experimental trips were run on the selected route; and the locations of unscheduled stops, regions of unscheduled deviations, along with other trip time and speed data were collected. Data was analyzed to demonstrate the reliability of passengers on the unscheduled stops compared to the scheduled ones. Trip time was also modeled to assess the unscheduled stops’ impact on trip time, and to check the accuracy of the applied scheduled trip time. Moreover, frequency and length of the unscheduled route deviations, as well as their impact on the bus stops, were illustrated. Solutions were proposed for the bus service deficiencies using the AVL system. Finally, recommendations were proposed for further research.Keywords: automatic vehicle location, public transportation, unscheduled stops, unscheduled route deviations, inaccurate schedule
Procedia PDF Downloads 39038684 Hand Symbol Recognition Using Canny Edge Algorithm and Convolutional Neural Network
Authors: Harshit Mittal, Neeraj Garg
Abstract:
Hand symbol recognition is a pivotal component in the domain of computer vision, with far-reaching applications spanning sign language interpretation, human-computer interaction, and accessibility. This research paper discusses the approach with the integration of the Canny Edge algorithm and convolutional neural network. The significance of this study lies in its potential to enhance communication and accessibility for individuals with hearing impairments or those engaged in gesture-based interactions with technology. In the experiment mentioned, the data is manually collected by the authors from the webcam using Python codes, to increase the dataset augmentation, is applied to original images, which makes the model more compatible and advanced. Further, the dataset of about 6000 coloured images distributed equally in 5 classes (i.e., 1, 2, 3, 4, 5) are pre-processed first to gray images and then by the Canny Edge algorithm with threshold 1 and 2 as 150 each. After successful data building, this data is trained on the Convolutional Neural Network model, giving accuracy: 0.97834, precision: 0.97841, recall: 0.9783, and F1 score: 0.97832. For user purposes, a block of codes is built in Python to enable a window for hand symbol recognition. This research, at its core, seeks to advance the field of computer vision by providing an advanced perspective on hand sign recognition. By leveraging the capabilities of the Canny Edge algorithm and convolutional neural network, this study contributes to the ongoing efforts to create more accurate, efficient, and accessible solutions for individuals with diverse communication needs.Keywords: hand symbol recognition, computer vision, Canny edge algorithm, convolutional neural network
Procedia PDF Downloads 6538683 Socioeconomic Values and Administration in Northern Nigeria: An Examination of the Impacts of Dearth of Values
Authors: Hassan Alhaji Hassan, Inuwa Abdu Ibrahim
Abstract:
The research looks at the decaying socioeconomic values in northern Nigeria, which is directly affecting the administration of service at different levels. The aim is to establish the consequence of a valueless society on individual and public life at different levels. The result of governments’ continued neglect of education, societal values, which have negatively affected societal development and indeed development in general. Therefore, focus is on governments’ poor performance in Nigeria, using secondary sources of data. In conclusion, the research asserts the need for the application of the values of some traditional values as personal principles and good governance as the way out of the present deteriorating conditions.Keywords: socioeconomic, values, education, Northern Nigeria, good governance
Procedia PDF Downloads 39038682 Data Mining of Students' Performance Using Artificial Neural Network: Turkish Students as a Case Study
Authors: Samuel Nii Tackie, Oyebade K. Oyedotun, Ebenezer O. Olaniyi, Adnan Khashman
Abstract:
Artificial neural networks have been used in different fields of artificial intelligence, and more specifically in machine learning. Although, other machine learning options are feasible in most situations, but the ease with which neural networks lend themselves to different problems which include pattern recognition, image compression, classification, computer vision, regression etc. has earned it a remarkable place in the machine learning field. This research exploits neural networks as a data mining tool in predicting the number of times a student repeats a course, considering some attributes relating to the course itself, the teacher, and the particular student. Neural networks were used in this work to map the relationship between some attributes related to students’ course assessment and the number of times a student will possibly repeat a course before he passes. It is the hope that the possibility to predict students’ performance from such complex relationships can help facilitate the fine-tuning of academic systems and policies implemented in learning environments. To validate the power of neural networks in data mining, Turkish students’ performance database has been used; feedforward and radial basis function networks were trained for this task; and the performances obtained from these networks evaluated in consideration of achieved recognition rates and training time.Keywords: artificial neural network, data mining, classification, students’ evaluation
Procedia PDF Downloads 61338681 Non-Revenue Water Management in Palestine
Authors: Samah Jawad Jabari
Abstract:
Water is the most important and valuable resource not only for human life but also for all living things on the planet. The water supply utilities should fulfill the water requirement quantitatively and qualitatively. Drinking water systems are exposed to both natural (hurricanes and flood) and manmade hazards (risks) that are common in Palestine. Non-Revenue Water (NRW) is a manmade risk which remains a major concern in Palestine, as the NRW levels are estimated to be at a high level. In this research, Hebron city water distribution network was taken as a case study to estimate and audit the NRW levels. The research also investigated the state of the existing water distribution system in the study area by investigating the water losses and obtained more information on NRW prevention and management practices. Data and information have been collected from the Palestinian Water Authority (PWA) and Hebron Municipality (HM) archive. In addition to that, a questionnaire has been designed and administered by the researcher in order to collect the necessary data for water auditing. The questionnaire also assessed the views of stakeholder in PWA and HM (staff) on the current status of the NRW in the Hebron water distribution system. The important result obtained by this research shows that NRW in Hebron city was high and in excess of 30%. The main factors that contribute to NRW were the inaccuracies in billing volumes, unauthorized consumption, and the method of estimating consumptions through faulty meters. Policy for NRW reduction is available in Palestine; however, it is clear that the number of qualified staff available to carry out the activities related to leak detection is low, and that there is a lack of appropriate technologies to reduce water losses and undertake sufficient system maintenance, which needs to be improved to enhance the performance of the network and decrease the level of NRW losses.Keywords: non-revenue water, water auditing, leak detection, water meters
Procedia PDF Downloads 29838680 Energy Justice and Economic Growth
Authors: Marinko Skare, Malgorzata Porada Rochon
Abstract:
This paper study the link between energy justice and economic growth. The link between energy justice and growth has not been extensively studied. Here we study the impact and importance of energy justice, as a part of the energy transition process, on economic growth. Our study shows energy justice growth is an important determinant of economic growth and development that should be addressed at the industry and economic levels. We use panel data modeling and causality testing to research the empirical link between energy justice and economic growth. Industry and economy-level policies designed to support energy justice initiatives are beneficial to economic growth. Energy justice is a necessary condition for green growth and sustainability targets.Keywords: energy justice, economic growth, panel data, energy transition
Procedia PDF Downloads 11338679 A Neural Network Based Clustering Approach for Imputing Multivariate Values in Big Data
Authors: S. Nickolas, Shobha K.
Abstract:
The treatment of incomplete data is an important step in the data pre-processing. Missing values creates a noisy environment in all applications and it is an unavoidable problem in big data management and analysis. Numerous techniques likes discarding rows with missing values, mean imputation, expectation maximization, neural networks with evolutionary algorithms or optimized techniques and hot deck imputation have been introduced by researchers for handling missing data. Among these, imputation techniques plays a positive role in filling missing values when it is necessary to use all records in the data and not to discard records with missing values. In this paper we propose a novel artificial neural network based clustering algorithm, Adaptive Resonance Theory-2(ART2) for imputation of missing values in mixed attribute data sets. The process of ART2 can recognize learned models fast and be adapted to new objects rapidly. It carries out model-based clustering by using competitive learning and self-steady mechanism in dynamic environment without supervision. The proposed approach not only imputes the missing values but also provides information about handling the outliers.Keywords: ART2, data imputation, clustering, missing data, neural network, pre-processing
Procedia PDF Downloads 27438678 Analyzing the Social, Cultural and Economic Impacts of Indigenous Tourism on the Indigenous Communities: Case Study of the Nubian Community in Egypt
Authors: M. Makary
Abstract:
Indigenous tourism is nowadays one of the fastest growing sections of the tourism industry. Nevertheless, it does not yet receive attention on the agenda of public tourism policies in Egypt; however, there are various tourism initiatives in indigenous areas throughout the country mainly in the Nubia region, which located in Upper Egypt, where most of Egypt's indigenous Nubians are concentrated. Considering indigenous tourism can lead to both positive and negative impacts on the indigenous communities the main aim of this study is to analyze the socio-cultural and economic impacts of the indigenous tourism on the indigenous communities in Egypt: the case study of Nubians. Qualitative and quantitative approaches of data collection were designed and applied in conducting this study. Semi-structured interviews, focus groups, and the observations are the main preliminary data collection techniques used in this study while, the secondary data were sourced from articles, statistics, dissertations, and websites. The research concludes that indigenous tourism offers a strong motivation to save the identity of the indigenous communities and to foster their economic development. However, it also has negative impacts on their society.Keywords: indigenous tourism, sustainable tourism, Indigenous communities, Nubians
Procedia PDF Downloads 24538677 The Effect That the Data Assimilation of Qinghai-Tibet Plateau Has on a Precipitation Forecast
Authors: Ruixia Liu
Abstract:
Qinghai-Tibet Plateau has an important influence on the precipitation of its lower reaches. Data from remote sensing has itself advantage and numerical prediction model which assimilates RS data will be better than other. We got the assimilation data of MHS and terrestrial and sounding from GSI, and introduced the result into WRF, then got the result of RH and precipitation forecast. We found that assimilating MHS and terrestrial and sounding made the forecast on precipitation, area and the center of the precipitation more accurate by comparing the result of 1h,6h,12h, and 24h. Analyzing the difference of the initial field, we knew that the data assimilating about Qinghai-Tibet Plateau influence its lower reaches forecast by affecting on initial temperature and RH.Keywords: Qinghai-Tibet Plateau, precipitation, data assimilation, GSI
Procedia PDF Downloads 23438676 Fashion through Senses: A Study of the Impact of Sensory Cues on the Consumption of Fashion Accessories by Female Shoppers
Authors: Vaishali Joshi
Abstract:
Purpose: A literature gap exists on the concept of sensory marketing elements, such as tactile elements, auditory elements, visual elements, and olfactory elements, studied together in the context of retailing. An investigation is required to study the impact of these sensory cues together on consumer behaviour. So, this study will undertake the impact of sensory marketing in fashion accessories stores on female shoppers’ purchasing activities. The present research study highlights the role of sensory cues, such as tactile cues, visual cues, auditory cues, and olfactory cues, on the shopper’s emotional states and their purchase intention. Design/methodology/approach: The emotional states and the purchase intention of the female shoppers influenced by the visual, tactile, olfactory, and auditory cues present in the fashion accessories stores were measured. The mall intercept technique was used for the data collection. Data analysis was done through Structural Equation Modelling. Research limitations/implications: The restricted geographical range and limited sample size of the study had a substantial poor influence on the wide usage of the study’s outcome. Also, here, the sample was female respondents only.Keywords: sensory marketing, visual cues, olfactory cues, tactile cues, auditory cues
Procedia PDF Downloads 8638675 Your Third Step to Understanding Research Ethics: Survey-Based Perspective
Authors: Sadeq Al Yaari, Ayman Al Yaari, Adham Al Yaari, Montaha Al Yaari, Aayah Al Yaari, Sajedah Al Yaari
Abstract:
Objective: This research summarizes the third volume of the book entitled: “Research Ethics”. It aims at surveying KSU as a typical and practical example for scientific resources and references along with some couriers that can be used for transferring these resources from one place to another. Method: It is a survey and analytic research design wherein the researchers attempted to list, describe and analyze the resources and references, notably those relating to linguistics. The researchers have also analyzed the role of some famous couriers in sending and receiving scientific resources. Results KSU has one of the most organized systems in the field of scientific research and is a reliable provider of information references and resources. Couriers are effective means through which the researcher can get the resource s/he needs to complete his scientific project.Keywords: KSU, scientific research, library, couriers, resources, linguistics, survey, ethics, method
Procedia PDF Downloads 4638674 The Impact of Group Hope Therapy on the Life Satisfaction, Happiness, and Hopefulness of Older Adults
Authors: Gholamzadeh Sakineh, Jedi Maryam, Fereshteh Dehghanrad
Abstract:
Background: Mental and psychological issues are common among older adults. Positive psychology theorists and researchers recommend focusing on constructs such as happiness, life satisfaction and hope rather than dwelling on negative experiences and perceptions. Objective: The research aim was to evaluate the impact of hope therapy interventions on the life satisfaction, happiness, and hopefulness of older adults in Iran. Methodology: This study used a quasi-experimental design. A convenience sample of 32 older adults was recruited from a retirement center in Shiraz, Iran. Participants were randomly assigned to either a control group (n = 16) or an experimental group (n = 16). The experimental group received eight sessions of hope therapy, each lasting 1.5 hours. The data for this study were collected using Snyder's Adult Hope Scale (AHS), Oxford Happiness Questionnaire, and Life Satisfaction Index-Z. The questionnaires were administered before, immediately after the intervention, and two months later. Descriptive and analytical statistical tests were used to analyze the data using SPSS version 19. Descriptive statistics were used to describe the sample characteristics and the distribution of the data. Analytical statistics were used to test the research hypotheses. Findings: The results showed that the hope therapy intervention significantly increased the life satisfaction and hopefulness of older adults (p < 0.05). In addition, the influence of time was also significant (p < 0.05). However, the intervention did not affect happiness in statistically significant ways. Conclusions: The findings of this study support the theoretical importance of hope therapy in improving the life satisfaction and hopefulness of older adults. Hope therapy interventions can be considered as an effective way to improve the emotional well-being and quality of life of older adults.Keywords: older adults, life satisfaction, happiness, hopefulness, hope therapy
Procedia PDF Downloads 8238673 Information Technology Application for Knowledge Management in Medium-Size Businesses
Authors: S. Thongchai
Abstract:
Result of the study on knowledge management systems in businesses was shown that the most of these businesses provide internet accessibility for their employees in order to study new knowledge via internet, corporate website, electronic mail, and electronic learning system. These business organizations use information technology application for knowledge management because of convenience, time saving, ease of use, accuracy of information and knowledge usefulness. The result indicated prominent improvements for corporate knowledge management systems as the following; 1) administrations must support corporate knowledge management system 2) the goal of corporate knowledge management must be clear 3) corporate culture should facilitate the exchange and sharing of knowledge within the organization 4) cooperation of personnel of all levels must be obtained 5) information technology infrastructure must be provided 6) they must develop the system regularly and constantly.Keywords: business organizations, information technology application, knowledge management systems, prominent improvements
Procedia PDF Downloads 38838672 Assessment of Biofuel Feedstock Production on Arkansas State Highway Transportation Department's Marginalized Lands
Authors: Ross J. Maestas
Abstract:
Biofuels are derived from multiple renewable bioenergy feedstocks including animal fats, wood, starchy grains, and oil seeds. Transportation agencies have considered growing the latter two on underutilized and nontraditional lands that they manage, such as in the Right of Way (ROW), abandoned weigh stations, and at maintenance yards. These crops provide the opportunity to generate revenue or supplement fuel once converted and offer a solution to increasing fuel costs and instability by creating a ‘home-grown’ alternative. Biofuels are non-toxic, biodegradable, and emit less Green House Gasses (GHG) than fossil fuels, therefore allowing agencies to meet sustainability goals and regulations. Furthermore, they enable land managers to achieve soil erosion and roadside aesthetic strategies. The research sought to understand if the cultivation of a biofuel feedstock within the Arkansas State Highway Transportation Department’s (AHTD) managed and marginalized lands is feasible by identifying potential land areas and crops. To determine potential plots the parcel data was downloaded from Arkansas’s GIS office. ArcGIS was used to query the data for all variations of the names of property owned by AHTD and a KML file was created that identifies the queried parcel data in Google Earth. Furthermore, biofuel refineries in the state were identified to optimize the harvest to transesterification process. Agricultural data was collected from federal and state agencies and universities to assess various oil seed crops suitable for conversion and suited to grow in Arkansas’s climate and ROW conditions. Research data determined that soybean is the best adapted biofuel feedstock for Arkansas with camelina and canola showing possibilities as well. Agriculture is Arkansas’s largest industry and soybean is grown in over half of the state’s counties. Successful cultivation of a feedstock in the aforementioned areas could potentially offer significant employment opportunity for which the skilled farmers already exist. Based on compiled data, AHTD manages 21,489 acres of marginalized land. The result of the feasibility assessment offer suggestions and guidance should AHTD decide to further investigate this type of initiative.Keywords: Arkansas highways, biofuels, renewable energy initiative, marginalized lands
Procedia PDF Downloads 32938671 Big Data Analysis with Rhipe
Authors: Byung Ho Jung, Ji Eun Shin, Dong Hoon Lim
Abstract:
Rhipe that integrates R and Hadoop environment made it possible to process and analyze massive amounts of data using a distributed processing environment. In this paper, we implemented multiple regression analysis using Rhipe with various data sizes of actual data. Experimental results for comparing the performance of our Rhipe with stats and biglm packages available on bigmemory, showed that our Rhipe was more fast than other packages owing to paralleling processing with increasing the number of map tasks as the size of data increases. We also compared the computing speeds of pseudo-distributed and fully-distributed modes for configuring Hadoop cluster. The results showed that fully-distributed mode was faster than pseudo-distributed mode, and computing speeds of fully-distributed mode were faster as the number of data nodes increases.Keywords: big data, Hadoop, Parallel regression analysis, R, Rhipe
Procedia PDF Downloads 49738670 The Security Trade-Offs in Resource Constrained Nodes for IoT Application
Authors: Sultan Alharby, Nick Harris, Alex Weddell, Jeff Reeve
Abstract:
The concept of the Internet of Things (IoT) has received much attention over the last five years. It is predicted that the IoT will influence every aspect of our lifestyles in the near future. Wireless Sensor Networks are one of the key enablers of the operation of IoTs, allowing data to be collected from the surrounding environment. However, due to limited resources, nature of deployment and unattended operation, a WSN is vulnerable to various types of attack. Security is paramount for reliable and safe communication between IoT embedded devices, but it does, however, come at a cost to resources. Nodes are usually equipped with small batteries, which makes energy conservation crucial to IoT devices. Nevertheless, security cost in terms of energy consumption has not been studied sufficiently. Previous research has used a security specification of 802.15.4 for IoT applications, but the energy cost of each security level and the impact on quality of services (QoS) parameters remain unknown. This research focuses on the cost of security at the IoT media access control (MAC) layer. It begins by studying the energy consumption of IEEE 802.15.4 security levels, which is followed by an evaluation for the impact of security on data latency and throughput, and then presents the impact of transmission power on security overhead, and finally shows the effects of security on memory footprint. The results show that security overhead in terms of energy consumption with a payload of 24 bytes fluctuates between 31.5% at minimum level over non-secure packets and 60.4% at the top security level of 802.15.4 security specification. Also, it shows that security cost has less impact at longer packet lengths, and more with smaller packet size. In addition, the results depicts a significant impact on data latency and throughput. Overall, maximum authentication length decreases throughput by almost 53%, and encryption and authentication together by almost 62%.Keywords: energy consumption, IEEE 802.15.4, IoT security, security cost evaluation
Procedia PDF Downloads 16838669 Hybrid GNN Based Machine Learning Forecasting Model For Industrial IoT Applications
Authors: Atish Bagchi, Siva Chandrasekaran
Abstract:
Background: According to World Bank national accounts data, the estimated global manufacturing value-added output in 2020 was 13.74 trillion USD. These manufacturing processes are monitored, modelled, and controlled by advanced, real-time, computer-based systems, e.g., Industrial IoT, PLC, SCADA, etc. These systems measure and manipulate a set of physical variables, e.g., temperature, pressure, etc. Despite the use of IoT, SCADA etc., in manufacturing, studies suggest that unplanned downtime leads to economic losses of approximately 864 billion USD each year. Therefore, real-time, accurate detection, classification and prediction of machine behaviour are needed to minimise financial losses. Although vast literature exists on time-series data processing using machine learning, the challenges faced by the industries that lead to unplanned downtimes are: The current algorithms do not efficiently handle the high-volume streaming data from industrial IoTsensors and were tested on static and simulated datasets. While the existing algorithms can detect significant 'point' outliers, most do not handle contextual outliers (e.g., values within normal range but happening at an unexpected time of day) or subtle changes in machine behaviour. Machines are revamped periodically as part of planned maintenance programmes, which change the assumptions on which original AI models were created and trained. Aim: This research study aims to deliver a Graph Neural Network(GNN)based hybrid forecasting model that interfaces with the real-time machine control systemand can detect, predict machine behaviour and behavioural changes (anomalies) in real-time. This research will help manufacturing industries and utilities, e.g., water, electricity etc., reduce unplanned downtimes and consequential financial losses. Method: The data stored within a process control system, e.g., Industrial-IoT, Data Historian, is generally sampled during data acquisition from the sensor (source) and whenpersistingin the Data Historian to optimise storage and query performance. The sampling may inadvertently discard values that might contain subtle aspects of behavioural changes in machines. This research proposed a hybrid forecasting and classification model which combines the expressive and extrapolation capability of GNN enhanced with the estimates of entropy and spectral changes in the sampled data and additional temporal contexts to reconstruct the likely temporal trajectory of machine behavioural changes. The proposed real-time model belongs to the Deep Learning category of machine learning and interfaces with the sensors directly or through 'Process Data Historian', SCADA etc., to perform forecasting and classification tasks. Results: The model was interfaced with a Data Historianholding time-series data from 4flow sensors within a water treatment plantfor45 days. The recorded sampling interval for a sensor varied from 10 sec to 30 min. Approximately 65% of the available data was used for training the model, 20% for validation, and the rest for testing. The model identified the anomalies within the water treatment plant and predicted the plant's performance. These results were compared with the data reported by the plant SCADA-Historian system and the official data reported by the plant authorities. The model's accuracy was much higher (20%) than that reported by the SCADA-Historian system and matched the validated results declared by the plant auditors. Conclusions: The research demonstrates that a hybrid GNN based approach enhanced with entropy calculation and spectral information can effectively detect and predict a machine's behavioural changes. The model can interface with a plant's 'process control system' in real-time to perform forecasting and classification tasks to aid the asset management engineers to operate their machines more efficiently and reduce unplanned downtimes. A series of trialsare planned for this model in the future in other manufacturing industries.Keywords: GNN, Entropy, anomaly detection, industrial time-series, AI, IoT, Industry 4.0, Machine Learning
Procedia PDF Downloads 15038668 Podemos Party Origin: From Social Protest to Spanish Parliament
Authors: Víctor Manuel Muñoz-Sánchez, Antonio Manuel Pérez-Flores
Abstract:
This paper analyzes the institutionalization of social protest in Spain. In the current crisis Podemos party seems to represent the political positions of the most affected citizens by the economic situation. It studies using quantitative techniques (statistical bivariate analysis), focusing on the exploitation of several bases of statistics data from the Center for Sociological and Research of Spanish Government, 15M movement characterization to its institutionalization in the Podemos party. Making a comparison between the participant's profile by the 15M and the social bases of Podemos votes. Data on the transformation of the socio-demographic profile of the fans, connoisseurs and 15M participants and voters are given.Keywords: collective action, emerging parties, political parties, social protest
Procedia PDF Downloads 38638667 Relevance in the Water-Energy-Food nexus: an Opportunity for Promoting Socio Economic Development in Algeria
Authors: Nadjib Drouiche
Abstract:
Water resources in Algeria are scarce, often low quality, fragile, and unevenly distributed in space and time. The pressure on water resources can be associated with industrial development, a steady population growth, and demanding land irrigation measures. These conditions createa tense competitionfor managing waterresourcesand sharing thembetween agricultural development, drinking water supply, industrial activities, etc. Moreover, the impact of climate change has placed in the forefront national policies focused on the water-energy-food nexus (WEF). In this context, desalination membrane technologies could play an increasing rolefor supporting segments of the Algerian economy that are heavily water-dependent. By implementing water reuse and desalination strategies together in the agricultural sector, there is an opportunity to expand the access to healthy food and clean water, thereby keeping the WEF nexus effects under control.Keywords: desalination, mitigation, climate change, sustainable development goals
Procedia PDF Downloads 9838666 Research on the Evaluation of Enterprise-University-Research Cooperation Ability in Hubei Province
Authors: Dongfang Qiu, Yilin Lu
Abstract:
The measurement of enterprise-university-research cooperative efficiency has important meanings in improving the cooperative efficiency, strengthening the effective integration of regional resource, enhancing the ability of regional innovation and promoting the development of regional economy. The paper constructs the DEA method and DEA-Malmquist productivity index method to research the cooperation efficiency of Hubei by making comparisons with other provinces in China. The study found out the index of technology efficiency is 0.52 and the enterprise-university- research cooperative efficiency is Non-DEA efficient. To realize the DEA efficiency of Hubei province, the amount of 1652.596 R&D employees and 638.368 R&D employees’ full time equivalence should be reduced or 137.89 billion yuan of new products’ sales income be increased. Finally, it puts forward policy recommendations on existing problems to strengthen the standings of the cooperation, realize the effective application of the research results, and improve the level of management of enterprise-university-research cooperation efficiency.Keywords: cooperation ability, DEA method, enterprise-university-research cooperation, Malmquist efficiency index
Procedia PDF Downloads 39738665 Survival Data with Incomplete Missing Categorical Covariates
Authors: Madaki Umar Yusuf, Mohd Rizam B. Abubakar
Abstract:
The survival censored data with incomplete covariate data is a common occurrence in many studies in which the outcome is survival time. With model when the missing covariates are categorical, a useful technique for obtaining parameter estimates is the EM by the method of weights. The survival outcome for the class of generalized linear model is applied and this method requires the estimation of the parameters of the distribution of the covariates. In this paper, we propose some clinical trials with ve covariates, four of which have some missing values which clearly show that they were fully censored data.Keywords: EM algorithm, incomplete categorical covariates, ignorable missing data, missing at random (MAR), Weibull Distribution
Procedia PDF Downloads 40638664 Adjectives in Academic Discourse: A Comparative Study of Research Articles
Authors: Beata Grymska
Abstract:
The research studies on academic discourse focus in general on lexical bundles, epistemic modality markers, or interactions between writers and readers. Following the research into the written forms of the academic community, this study concentrates on adjectives in research articles. The study investigates the distribution of adjectives in research articles in two academic disciplines: linguistics and medicine. It is corpus-based in design and consists of 100 linguistic and 100 medical research articles all written in English. The aim of the study is to compare the distribution of adjectives between the two corpora and four main parts of articles: IMRD (Introduction, Methods, Results, and Discussion). The second aim is to see if the two corpora share common core adjectives, e.g., different, important, specific, and if there are discipline-specific adjectives. The further part of the paper elaborates on adjectives use in the corpora together with examples. The results indicate that the two corpora do not differ in the distribution of adjectives to a great extent. The occurrences of the most frequently used adjectives depend on the academic discipline of the research articles. The concluding part reflects upon the role of adjectives in academic discourse and also presents how corpora can be helpful in composing academic texts.Keywords: academic discourse, academic texts, adjectives, corpus analysis, research articles
Procedia PDF Downloads 19138663 A Study of Fatigue Life Estimation of a Modular Unmanned Aerial Vehicle by Developing a Structural Health Monitoring System
Authors: Zain Ul Hassan, Muhammad Zain Ul Abadin, Muhammad Zubair Khan
Abstract:
Unmanned aerial vehicles (UAVs) have now become of predominant importance for various operations, and an immense amount of work is going on in this specific category. The structural stability and life of these UAVs is key factor that should be considered while deploying them to different intelligent operations as their failure leads to loss of sensitive real-time data and cost. This paper presents an applied research on the development of a structural health monitoring system for a UAV designed and fabricated by deploying modular approach. Firstly, a modular UAV has been designed which allows to dismantle and to reassemble the components of the UAV without effecting the whole assembly of UAV. This novel approach makes the vehicle very sustainable and decreases its maintenance cost to a significant value by making possible to replace only the part leading to failure. Then the SHM for the designed architecture of the UAV had been specified as a combination of wings integrated with strain gauges, on-board data logger, bridge circuitry and the ground station. For the research purpose sensors have only been attached to the wings being the most load bearing part and as per analysis was done on ANSYS. On the basis of analysis of the load time spectrum obtained by the data logger during flight, fatigue life of the respective component has been predicted using fracture mechanics techniques of Rain Flow Method and Miner’s Rule. Thus allowing us to monitor the health of a specified component time to time aiding to avoid any failure.Keywords: fracture mechanics, rain flow method, structural health monitoring system, unmanned aerial vehicle
Procedia PDF Downloads 29438662 Delay Studies in Construction: Synthesis, Critical Evaluation, and the Way Forward
Authors: Abdullah Alsehaimi
Abstract:
Over decades, there have been many studies of delay in construction, and this type of study continues to be popular in construction management research. A synthesis and critical evaluation of delay studies in developing countries reveals that poor project management is cited as one of the main causes of delay. However, despite such consensus, most of the previous studies fall short in providing clear recommendations demonstrating how project management practice could be improved. Moreover, the majority of recommendations are general and not devoted to solving the difficulties associated with particular delay causes. This paper aims to demonstrate that the root cause of this state of affairs is that typical research into delay tends to be descriptive and explanatory, making it inadequate for solving persistent managerial problems in construction. It is contended that many problems in construction could be mitigated via alternative research approaches, i.e. action and constructive research. Such prescriptive research methods can assist in the development and implementation of innovative tools tackling managerial problems of construction, including that of delay. In so doing, those methods will better connect research and practice, and thus strengthen the relevance of academic construction management.Keywords: construction delay, action research, constructive research, industrial engineering
Procedia PDF Downloads 42338661 Quantum Cryptography: Classical Cryptography Algorithms’ Vulnerability State as Quantum Computing Advances
Authors: Tydra Preyear, Victor Clincy
Abstract:
Quantum computing presents many computational advantages over classical computing methods due to the utilization of quantum mechanics. The capability of this computing infrastructure poses threats to standard cryptographic systems such as RSA and AES, which are designed for classical computing environments. This paper discusses the impact that quantum computing has on cryptography, while focusing on the evolution from classical cryptographic concepts to quantum and post-quantum cryptographic concepts. Standard Cryptography is essential for securing data by utilizing encryption and decryption methods, and these methods face vulnerability problems due to the advancement of quantum computing. In order to counter these vulnerabilities, the methods that are proposed are quantum cryptography and post-quantum cryptography. Quantum cryptography uses principles such as the uncertainty principle and photon polarization in order to provide secure data transmission. In addition, the concept of Quantum key distribution is introduced to ensure more secure communication channels by distributing cryptographic keys. There is the emergence of post-quantum cryptography which is used for improving cryptographic algorithms in order to be more secure from attacks by classical and quantum computers. Throughout this exploration, the paper mentions the critical role of the advancement of cryptographic methods to keep data integrity and privacy safe from quantum computing concepts. Future research directions that would be discussed would be more effective cryptographic methods through the advancement of technology.Keywords: quantum computing, quantum cryptography, cryptography, data integrity and privacy
Procedia PDF Downloads 2638660 Provision Electronic Management Requirements in Libyan Oil Companies
Authors: Hitham Yami
Abstract:
This study will focus primarily on assessing the availability requirements of the electronic management of oil companies in Libya, and the mean objectives of the research applying electronic management and make recommendations and steps to approach electronic management. There are limited research and statistical analysis to support electronic management in Libyan companies. The groundwork for the proposed approach is to develop independent variables and the dependent variables to be restructured after it Alntra side of the field and the side to get the data to achieve the desired results and solving the problem faced by the Libyan Oil Corporation. All these strategies are proposed to achieve the goal, and solving Libyan oil installations.Keywords: oil company’s revenue, independent variables, electronic management, Libyan oil corporation
Procedia PDF Downloads 26438659 Nose Macroneedling Tie Suture Hidden Technique
Authors: Mohamed Ghoz, Hala Alsabeh
Abstract:
Context: Macroscopic Nose Macroneedling (MNM) is a new non-surgical procedure for lifting and tightening the nose. It is a tissue-non-invasive technique that uses a needle to create micro-injuries in the skin. These injuries stimulate the production of collagen and elastin, which results in the tightening and lifting of the skin. Research Aim: The research aim of this study was to investigate the efficacy and safety of MNM for the treatment of nasal deformities. Methodology A total of 100 patients with nasal deformities were included in this study. The patients were randomly assigned to either the MNM group or the control group. The MNM group received a single treatment of MNM, while the control group received no treatment. The patients were evaluated at baseline, 6 months, and 12 months after treatment. Findings: The results of this study showed that MNM was effective in improving the appearance of the nose in patients with nasal deformities. At 6 months after treatment, the patients in the MNM group had significantly improved nasal tip projection, nasal bridge height, and nasal width compared to the patients in the control group. The improvements in nasal appearance were maintained at 12 months after treatment. Theoretical Importance: The findings of this study provide support for the use of MNM as a safe and effective treatment for nasal deformities. MNM is a non-surgical procedure that is associated with minimal downtime and no risk of scarring. This makes it an attractive option for patients who are looking for a minimally invasive treatment for their nasal deformities. Data Collection: Data was collected from the patients using a variety of methods, including clinical assessments, photographic assessments, and patient-reported outcome measures. Analysis Procedures: The data was analyzed using a variety of statistical methods, including descriptive statistics, inferential statistics, and meta-analysis. Question Addressed: The research question addressed in this study was whether MNM is an effective and safe treatment for nasal deformities. Conclusion: The findings of this study suggest that MNM is an effective and safe treatment for nasal deformities. MNM is a non-surgical procedure that is associated with minimal downtime and no risk of scarring. This makes it an attractive option for patients who are looking for a minimally invasive treatment for their nasal deformities.Keywords: nose, surgery, tie, suture
Procedia PDF Downloads 7538658 Robust Recognition of Locomotion Patterns via Data-Driven Machine Learning in the Cloud Environment
Authors: Shinoy Vengaramkode Bhaskaran, Kaushik Sathupadi, Sandesh Achar
Abstract:
Human locomotion recognition is important in a variety of sectors, such as robotics, security, healthcare, fitness tracking and cloud computing. With the increasing pervasiveness of peripheral devices, particularly Inertial Measurement Units (IMUs) sensors, researchers have attempted to exploit these advancements in order to precisely and efficiently identify and categorize human activities. This research paper introduces a state-of-the-art methodology for the recognition of human locomotion patterns in a cloud environment. The methodology is based on a publicly available benchmark dataset. The investigation implements a denoising and windowing strategy to deal with the unprocessed data. Next, feature extraction is adopted to abstract the main cues from the data. The SelectKBest strategy is used to abstract optimal features from the data. Furthermore, state-of-the-art ML classifiers are used to evaluate the performance of the system, including logistic regression, random forest, gradient boosting and SVM have been investigated to accomplish precise locomotion classification. Finally, a detailed comparative analysis of results is presented to reveal the performance of recognition models.Keywords: artificial intelligence, cloud computing, IoT, human locomotion, gradient boosting, random forest, neural networks, body-worn sensors
Procedia PDF Downloads 11