Search results for: problem structuring
4891 Comparative Performance Analysis of Fiber Delay Line Based Buffer Architectures for Contention Resolution in Optical WDM Networks
Authors: Manoj Kumar Dutta
Abstract:
Wavelength division multiplexing (WDM) technology is the most promising technology for the proper utilization of huge raw bandwidth provided by an optical fiber. One of the key problems in implementing the all-optical WDM network is the packet contention. This problem can be solved by several different techniques. In time domain approach the packet contention can be reduced by incorporating fiber delay lines (FDLs) as optical buffer in the switch architecture. Different types of buffering architectures are reported in literatures. In the present paper a comparative performance analysis of three most popular FDL architectures are presented in order to obtain the best contention resolution performance. The analysis is further extended to consider the effect of different fiber non-linearities on the network performance.Keywords: WDM network, contention resolution, optical buffering, non-linearity, throughput
Procedia PDF Downloads 4514890 The Superior Performance of Investment Bank-Affiliated Mutual Funds
Authors: Michelo Obrey
Abstract:
Traditionally, mutual funds have long been esteemed as stand-alone entities in the U.S. However, the prevalence of the fund families’ affiliation to financial conglomerates is eroding this striking feature. Mutual fund families' affiliation with financial conglomerates can potentially be an important source of superior performance or cost to the affiliated mutual fund investors. On the one hand, financial conglomerates affiliation offers the mutual funds access to abundant resources, better research quality, private material information, and business connections within the financial group. On the other hand, conflict of interest is bound to arise between the financial conglomerate relationship and fund management. Using a sample of U.S. domestic equity mutual funds from 1994 to 2017, this paper examines whether fund family affiliation to an investment bank help the affiliated mutual funds deliver superior performance through private material information advantage possessed by the investment banks or it costs affiliated mutual fund shareholders due to the conflict of interest. Robust to alternative risk adjustments and cross-section regression methodologies, this paper finds that the investment bank-affiliated mutual funds significantly outperform those of the mutual funds that are not affiliated with an investment bank. Interestingly the paper finds that the outperformance is confined to holding return, a return measure that captures the investment talent that is uninfluenced by transaction costs, fees, and other expenses. Further analysis shows that the investment bank-affiliated mutual funds specialize in hard-to-value stocks, which are not more likely to be held by unaffiliated funds. Consistent with the information advantage hypothesis, the paper finds that affiliated funds holding covered stocks outperform affiliated funds without covered stocks lending no support to the hypothesis that affiliated mutual funds attract superior stock-picking talent. Overall, the paper findings are consistent with the idea that investment banks maximize fee income by monopolistically exploiting their private information, thus strategically transferring performance to their affiliated mutual funds. This paper contributes to the extant literature on the agency problem in mutual fund families. It adds to this stream of research by showing that the agency problem is not only prevalent in fund families but also in financial organizations such as investment banks that have affiliated mutual fund families. The results show evidence of exploitation of synergies such as private material information sharing that benefit mutual fund investors due to affiliation with a financial conglomerate. However, this research has a normative dimension, allowing such incestuous behavior of insider trading and exploitation of superior information not only negatively affect the unaffiliated fund investors but also led to an unfair and unleveled playing field in the financial market.Keywords: mutual fund performance, conflicts of interest, informational advantage, investment bank
Procedia PDF Downloads 1894889 Requirement Engineering for Intrusion Detection Systems in Wireless Sensor Networks
Authors: Afnan Al-Romi, Iman Al-Momani
Abstract:
The urge of applying the Software Engineering (SE) processes is both of vital importance and a key feature in critical, complex large-scale systems, for example, safety systems, security service systems, and network systems. Inevitably, associated with this are risks, such as system vulnerabilities and security threats. The probability of those risks increases in unsecured environments, such as wireless networks in general and in Wireless Sensor Networks (WSNs) in particular. WSN is a self-organizing network of sensor nodes connected by wireless links. WSNs consist of hundreds to thousands of low-power, low-cost, multi-function sensor nodes that are small in size and communicate over short-ranges. The distribution of sensor nodes in an open environment that could be unattended in addition to the resource constraints in terms of processing, storage and power, make such networks in stringent limitations such as lifetime (i.e. period of operation) and security. The importance of WSN applications that could be found in many militaries and civilian aspects has drawn the attention of many researchers to consider its security. To address this important issue and overcome one of the main challenges of WSNs, security solution systems have been developed by researchers. Those solutions are software-based network Intrusion Detection Systems (IDSs). However, it has been witnessed, that those developed IDSs are neither secure enough nor accurate to detect all malicious behaviours of attacks. Thus, the problem is the lack of coverage of all malicious behaviours in proposed IDSs, leading to unpleasant results, such as delays in the detection process, low detection accuracy, or even worse, leading to detection failure, as illustrated in the previous studies. Also, another problem is energy consumption in WSNs caused by IDS. So, in other words, not all requirements are implemented then traced. Moreover, neither all requirements are identified nor satisfied, as for some requirements have been compromised. The drawbacks in the current IDS are due to not following structured software development processes by researches and developers when developing IDS. Consequently, they resulted in inadequate requirement management, process, validation, and verification of requirements quality. Unfortunately, WSN and SE research communities have been mostly impermeable to each other. Integrating SE and WSNs is a real subject that will be expanded as technology evolves and spreads in industrial applications. Therefore, this paper will study the importance of Requirement Engineering when developing IDSs. Also, it will study a set of existed IDSs and illustrate the absence of Requirement Engineering and its effect. Then conclusions are drawn in regard of applying requirement engineering to systems to deliver the required functionalities, with respect to operational constraints, within an acceptable level of performance, accuracy and reliability.Keywords: software engineering, requirement engineering, Intrusion Detection System, IDS, Wireless Sensor Networks, WSN
Procedia PDF Downloads 3234888 Mathematical Modeling of Nonlinear Process of Assimilation
Authors: Temur Chilachava
Abstract:
In work the new nonlinear mathematical model describing assimilation of the people (population) with some less widespread language by two states with two various widespread languages, taking into account demographic factor is offered. In model three subjects are considered: the population and government institutions with the widespread first language, influencing by means of state and administrative resources on the third population with some less widespread language for the purpose of their assimilation; the population and government institutions with the widespread second language, influencing by means of state and administrative resources on the third population with some less widespread language for the purpose of their assimilation; the third population (probably small state formation, an autonomy), exposed to bilateral assimilation from two rather powerful states. Earlier by us it was shown that in case of zero demographic factor of all three subjects, the population with less widespread language completely assimilates the states with two various widespread languages, and the result of assimilation (redistribution of the assimilated population) is connected with initial quantities, technological and economic capabilities of the assimilating states. In considered model taking into account demographic factor natural decrease in the population of the assimilating states and a natural increase of the population which has undergone bilateral assimilation is supposed. At some ratios between coefficients of natural change of the population of the assimilating states, and also assimilation coefficients, for nonlinear system of three differential equations are received the two first integral. Cases of two powerful states assimilating the population of small state formation (autonomy), with different number of the population, both with identical and with various economic and technological capabilities are considered. It is shown that in the first case the problem is actually reduced to nonlinear system of two differential equations describing the classical model "predator - the victim", thus, naturally a role of the victim plays the population which has undergone assimilation, and a predator role the population of one of the assimilating states. The population of the second assimilating state in the first case changes in proportion (the coefficient of proportionality is equal to the relation of the population of assimilators in an initial time point) to the population of the first assimilator. In the second case the problem is actually reduced to nonlinear system of two differential equations describing type model "a predator – the victim", with the closed integrated curves on the phase plane. In both cases there is no full assimilation of the population to less widespread language. Intervals of change of number of the population of all three objects of model are found. The considered mathematical models which in some approach can model real situations, with the real assimilating countries and the state formations (an autonomy or formation with the unrecognized status), undergone to bilateral assimilation, show that for them the only possibility to avoid from assimilation is the natural demographic increase in population and hope for natural decrease in the population of the assimilating states.Keywords: nonlinear mathematical model, bilateral assimilation, demographic factor, first integrals, result of assimilation, intervals of change of number of the population
Procedia PDF Downloads 4704887 Recovery of Proteins from EDAM Whey Using Membrane Ultrafiltration
Authors: F. Yelles-Allam, A. A. Nouani
Abstract:
In Algeria, whey is discarded without any treatment and this causes not only pollution problem, but also a loss in nutritive components of milk. In this paper, characterization of EDAM whey, which is resulted from pasteurised mixture of cow’s milk and skim milk, and recovery of whey protein by ultrafiltration / diafiltration, was studied. The physical-chemical analysis of whey has emphasized on its pollutant and nutritive characteristics. In fact, its DBO5 and DCO are 49.33, and 127.71 gr of O2/l of whey respectively. It contains: fat (1,90±0,1 gr/l), lactose (47.32±1,57 gr/l), proteins (8.04±0,2 gr/l) and ashes (5,20±0,15 gr/l), calcium (0,48±0,04 gr/l), Na (1.104gr/l), K (1.014 gr/l), Mg (0.118 gr/l) and P (0.482 gr/l). Ultrafiltration was carried out in a polyetersulfone membrane with a cut-off of 10K. Its hydraulic intrinsic resistance and permeability are respectively: 2.041.1012 m-1 and 176,32 l/h.m2 at PTM of 1 bar. The retentate obtained at FC6, contains 16,33g/l of proteins and 70,25 g/l of dry matter. The retention rate of protein is 97, 7% and the decrease in DBO5 and DCO are at 18.875 g /l and 42.818 g/l respectively. Diafiltration performed on protein concentrates allowed the complete removal of lactose and minerals. The ultrafiltration of the whey before the disposal is an alternative for Algéria dairy industry.Keywords: diafiltration, DBO, DCO, protein, ultrafiltration, whey
Procedia PDF Downloads 2564886 Nanabis™: A Non-Opioid Alternative for Management of Cancer Bone Pain
Authors: Sean Hall
Abstract:
Prior to COVID-19, the world was preoccupied with opioids, effectiveness versus risk, and specifically toxicity versus abuse. Historically underpinning opioid use was a concept of safety. As use over time and real-world data evolved, a pursuit for efficacy associated with non-opioid alternatives became mainstream. On January 8, 2021, the US signed back into the opioid problem, with these two fundamental questions still unresolved. The author will share the current progression of a lead non-opioid cancer bone pain candidate, NanaBis™. NanaBis™ represents two innovative factors: The active ingredients are from cannabinoids; these ingredients are in a proprietary sub-micron delivery platform, NanoCelle®. The author will offer an opinion piece, potentiating the future role of delivery platforms in medicine to increase both patient safety and compliance.Keywords: NanaBis, nanoCelle, opioids, toxicity
Procedia PDF Downloads 874885 Design and Construction of Vehicle Tracking System with Global Positioning System/Global System for Mobile Communication Technology
Authors: Bala Adamu Malami
Abstract:
The necessity of low-cost electronic vehicle/car security designed in coordination with other security measures is always there in our society to reduce the risk of vehicle intrusion. Keeping this problem in mind, we are designing an automatic GPS system which is technology to build an integrated and fully customized vehicle to detect the movement of the vehicle and also serve as a security system at a reasonable cost. Users can locate the vehicle's position via GPS by using the Google Maps application to show vehicle coordinates on a smartphone. The tracking system uses a Global System for Mobile Communication (GSM) modem for communication between the mobile station and the microcontroller to send and receive commands. Further design can be improved to capture the vehicle movement range and alert the vehicle owner when the vehicle is out of range.Keywords: electronic, GPS, GSM modem, communication, vehicle
Procedia PDF Downloads 994884 Ground Water Sustainable Management in Ethiopia, Africa
Authors: Ebissa Gadissa Kedir
Abstract:
This paper presents the potential groundwater assessment and sustainable management in the selected study area. It is the most preferred water source in all climatic zones for its convenient availability, drought dependability, excellent quality, and low development cost. The rural areas, which account for more than 85% of the country's population, are encountered a shortage of potable water supply which can be solved by proper groundwater utilization. For the present study area, the groundwater potential is assessed and analysed. Thus, the study area falls in four potential groundwater zones ranging from poor to high. However, the current groundwater management practices in the study area are poor. Despite the pervasive and devastating challenges, immediate and proper responses have not yet been given to the problem. Thus, such frustrating threats and challenges have initiated the researcher to work in the project area.Keywords: GW potential, GW management, GW sustainability, South gonder, Ethiopia
Procedia PDF Downloads 664883 Measuring Energy Efficiency Performance of Mena Countries
Authors: Azam Mohammadbagheri, Bahram Fathi
Abstract:
DEA has become a very popular method of performance measure, but it still suffers from some shortcomings. One of these shortcomings is the issue of having multiple optimal solutions to weights for efficient DMUs. The cross efficiency evaluation as an extension of DEA is proposed to avoid this problem. Lam (2010) is also proposed a mixed-integer linear programming formulation based on linear discriminate analysis and super efficiency method (MILP model) to avoid having multiple optimal solutions to weights. In this study, we modified MILP model to determine more suitable weight sets and also evaluate the energy efficiency of MENA countries as an application of the proposed model.Keywords: data envelopment analysis, discriminate analysis, cross efficiency, MILP model
Procedia PDF Downloads 6874882 Fuzzy Decision Support System for Human-Realistic Overtaking in Railway Traffic Simulations
Authors: Tomáš Vyčítal
Abstract:
In a simulation model of a railway system it is important, besides other crucial algorithms, to have correct behaviour of train overtaking in stochastic conditions. This problem is being addressed in many simulation tools focused on railway traffic, however these are not very human-realistic. The goal of this paper is to create a more human-realistic overtaking decision support system for the use in railway traffic simulations. A fuzzy system has been chosen for this task as fuzzy systems are well-suited for human-like decision making. The fuzzy system designed takes into account timetables, train positions, delays and buffer times as inputs and provides an instruction to overtake or not overtake.Keywords: decision-making support, fuzzy systems, simulation, railway, transport
Procedia PDF Downloads 1404881 Externalizing Behavior Problems Influencing Social Behavior in Early Adolescence
Authors: Zhidong Zhang, Zhi-Chao Zhang
Abstract:
This study focuses on early adolescent externalizing behavioral problems which specifically concentrate on rule breaking behavior and aggressive behavior using the instrument of Achenbach System of Empirically Based Assessment (ASEBA). The purpose was to analyze the relationships between the externalizing behavioral problems and relevant background variables such as sports activities, hobbies, chores and the number of close friends. The stratified sampling method was used to collect data from 1975 participants. The results indicated that several background variables as predictors could significantly predict rule breaking behavior and aggressive behavior. Further, a hierarchical modeling method was used to explore the causal relations among background variables, breaking behavior variables and aggressive behavior variables.Keywords: aggressive behavior, breaking behavior, early adolescence, externalizing problem
Procedia PDF Downloads 5084880 Design and Implementation of a Wearable Artificial Kidney Prototype for Home Dialysis
Authors: R. A. Qawasma, F. M. Haddad, H. O. Salhab
Abstract:
Hemodialysis is a life-preserving treatment for a number of patients with kidney failure. The standard procedure of hemodialysis is three times a week during the hemodialysis procedure, the patient usually suffering from many inconvenient, exhausting feeling and effect on the heart and cardiovascular system are the most common signs. This paper provides a solution to reduce the previous problems by designing a wearable artificial kidney (WAK) taking in consideration a minimization the size of the dialysis machine. The WAK system consists of two circuits: blood circuit and dialysate circuit. The blood from the patient is filtered in the dialyzer before returning back to the patient. Several parameters using an advanced microcontroller and array of sensors. WAK equipped with visible and audible alarm system to aware the patients if there is any problem.Keywords: artificial kidney, home dialysis, renal failure, wearable kidney
Procedia PDF Downloads 2354879 Multimodal Employee Attendance Management System
Authors: Khaled Mohammed
Abstract:
This paper presents novel face recognition and identification approaches for the real-time attendance management problem in large companies/factories and government institutions. The proposed uses the Minimum Ratio (MR) approach for employee identification. Capturing the authentic face variability from a sequence of video frames has been considered for the recognition of faces and resulted in system robustness against the variability of facial features. Experimental results indicated an improvement in the performance of the proposed system compared to the Previous approaches at a rate between 2% to 5%. In addition, it decreased the time two times if compared with the Previous techniques, such as Extreme Learning Machine (ELM) & Multi-Scale Structural Similarity index (MS-SSIM). Finally, it achieved an accuracy of 99%.Keywords: attendance management system, face detection and recognition, live face recognition, minimum ratio
Procedia PDF Downloads 1554878 The Influence of Workplace Aggression on Employee Turnover Intention
Authors: Nimra Parvez, Nawaz Ahmed
Abstract:
Workplace aggression not only is a proven safety and health issue but it also is a problem witnessed at workplace which has far-reaching consequences. It hinders the overall productivity of the organizations and individual employees. The current study examined employee turnover intentions as a result of workplace aggression. The study was conducted on employees from the private sector. Self-report questionnaires that measured the workplace aggression and turnover intentions of employees were used to target a sample size of 200 employees. In the hypothesis, it was assumed that high levels of workplace aggression at any organization will result in subsequent high levels of employee turnover intentions. It was therefore identified that there has been a relationship between workplace aggression and employee turnover intentions. The results determined a positive relationship between the workplace bullying behaviors towards the individuals and the turnover intention.Keywords: bullying, organizational commitment, turnover intention, workplace aggression
Procedia PDF Downloads 2654877 Common Laws Principles: A Way to Solve Global Environmental Change
Authors: Neelam Kadyan
Abstract:
Global environmental change is happening at an alarming rate in the present world. Floods, Tsunamis’, Avalanches, Change in Weather patterns, Rise in sea temperature, Landslides, are only few evidences of this change. To regulate such alarming growth of global change in environment certain regulatory system or mechanism is required. Nuisance,negligence,absolute liability,strict liability and trespass are some of the effective common law principles which are helpful in environmental problems. What we need today is sufficient law and adequate machinery to enforce the legal standards. Without law environmental standards cannot be enforced and once again there is need to adopt the common law approach in solving the problem of environmental change as through this approach the affected person can get compensation and as the same time it puts check on wrongdoer.Keywords: global environmental problems, nuisance, negligence, trespass, strict liability, absolute liability
Procedia PDF Downloads 5664876 Stable Time Reversed Integration of the Navier-Stokes Equation Using an Adjoint Gradient Method
Authors: Jurriaan Gillissen
Abstract:
This work is concerned with stabilizing the numerical integration of the Navier-Stokes equation (NSE), backwards in time. Applications involve the detection of sources of, e.g., sound, heat, and pollutants. Stable reverse numerical integration of parabolic differential equations is also relevant for image de-blurring. While the literature addresses the reverse integration problem of the advection-diffusion equation, the problem of numerical reverse integration of the NSE has, to our knowledge, not yet been addressed. Owing to the presence of viscosity, the NSE is irreversible, i.e., when going backwards in time, the fluid behaves, as if it had a negative viscosity. As an effect, perturbations from the perfect solution, due to round off errors or discretization errors, grow exponentially in time, and reverse integration of the NSE is inherently unstable, regardless of using an implicit time integration scheme. Consequently, some sort of filtering is required, in order to achieve a stable, numerical, reversed integration. The challenge is to find a filter with a minimal adverse affect on the accuracy of the reversed integration. In the present work, we explore an adjoint gradient method (AGM) to achieve this goal, and we apply this technique to two-dimensional (2D), decaying turbulence. The AGM solves for the initial velocity field u0 at t = 0, that, when integrated forward in time, produces a final velocity field u1 at t = 1, that is as close as is feasibly possible to some specified target field v1. The initial field u0 defines a minimum of a cost-functional J, that measures the distance between u1 and v1. In the minimization procedure, the u0 is updated iteratively along the gradient of J w.r.t. u0, where the gradient is obtained by transporting J backwards in time from t = 1 to t = 0, using the adjoint NSE. The AGM thus effectively replaces the backward integration by multiple forward and backward adjoint integrations. Since the viscosity is negative in the adjoint NSE, each step of the AGM is numerically stable. Nevertheless, when applied to turbulence, the AGM develops instabilities, which limit the backward integration to small times. This is due to the exponential divergence of phase space trajectories in turbulent flow, which produces a multitude of local minima in J, when the integration time is large. As an effect, the AGM may select unphysical, noisy initial conditions. In order to improve this situation, we propose two remedies. First, we replace the integration by a sequence of smaller integrations, i.e., we divide the integration time into segments, where in each segment the target field v1 is taken as the initial field u0 from the previous segment. Second, we add an additional term (regularizer) to J, which is proportional to a high-order Laplacian of u0, and which dampens the gradients of u0. We show that suitable values for the segment size and for the regularizer, allow a stable reverse integration of 2D decaying turbulence, with accurate results for more then O(10) turbulent, integral time scales.Keywords: time reversed integration, parabolic differential equations, adjoint gradient method, two dimensional turbulence
Procedia PDF Downloads 2244875 Computational Code for Solving the Navier-Stokes Equations on Unstructured Meshes Applied to the Leading Edge of the Brazilian Hypersonic Scramjet 14-X
Authors: Jayme R. T. Silva, Paulo G. P. Toro, Angelo Passaro, Giannino P. Camillo, Antonio C. Oliveira
Abstract:
An in-house C++ code has been developed, at the Prof. Henry T. Nagamatsu Laboratory of Aerothermodynamics and Hypersonics from the Institute of Advanced Studies (Brazil), to estimate the aerothermodynamic properties around the Hypersonic Vehicle Integrated to the Scramjet. In the future, this code will be applied to the design of the Brazilian Scramjet Technological Demonstrator 14-X B. The first step towards accomplishing this objective, is to apply the in-house C++ code at the leading edge of a flat plate, simulating the leading edge of the 14-X Hypersonic Vehicle, making possible the wave phenomena of oblique shock and boundary layer to be analyzed. The development of modern hypersonic space vehicles requires knowledge regarding the characteristics of hypersonic flows in the vicinity of a leading edge of lifting surfaces. The strong interaction between a shock wave and a boundary layer, in a high supersonic Mach number 4 viscous flow, close to the leading edge of the plate, considering no slip condition, is numerically investigated. The small slip region is neglecting. The study consists of solving the fluid flow equations for unstructured meshes applying the SIMPLE algorithm for Finite Volume Method. Unstructured meshes are generated by the in-house software ‘Modeler’ that was developed at Virtual’s Engineering Laboratory from the Institute of Advanced Studies, initially developed for Finite Element problems and, in this work, adapted to the resolution of the Navier-Stokes equations based on the SIMPLE pressure-correction scheme for all-speed flows, Finite Volume Method based. The in-house C++ code is based on the two-dimensional Navier-Stokes equations considering non-steady flow, with nobody forces, no volumetric heating, and no mass diffusion. Air is considered as calorically perfect gas, with constant Prandtl number and Sutherland's law for the viscosity. Solutions of the flat plate problem for Mach number 4 include pressure, temperature, density and velocity profiles as well as 2-D contours. Also, the boundary layer thickness, boundary conditions, and mesh configurations are presented. The same problem has been solved by the academic license of the software Ansys Fluent and for another C++ in-house code, which solves the fluid flow equations in structured meshes, applying the MacCormack method for Finite Difference Method, and the results will be compared.Keywords: boundary-layer, scramjet, simple algorithm, shock wave
Procedia PDF Downloads 4914874 Stealth Laser Dicing Process Improvement via Shuffled Frog Leaping Algorithm
Authors: Pongchanun Luangpaiboon, Wanwisa Sarasang
Abstract:
In this paper, a performance of shuffled frog leaping algorithm was investigated on the stealth laser dicing process. Effect of problem on the performance of the algorithm was based on the tolerance of meandering data. From the customer specification it could be less than five microns with the target of zero microns. Currently, the meandering levels are unsatisfactory when compared to the customer specification. Firstly, the two-level factorial design was applied to preliminary study the statistically significant effects of five process variables. In this study one influential process variable is integer. From the experimental results, the new operating condition from the algorithm was superior when compared to the current manufacturing condition.Keywords: stealth laser dicing process, meandering, meta-heuristics, shuffled frog leaping algorithm
Procedia PDF Downloads 3414873 Analysis of Tandem Detonator Algorithm Optimized by Quantum Algorithm
Authors: Tomasz Robert Kuczerski
Abstract:
The high complexity of the algorithm of the autonomous tandem detonator system creates an optimization problem due to the parallel operation of several machine states of the system. Many years of experience and classic analyses have led to a partially optimized model. Limitations on the energy resources of this class of autonomous systems make it necessary to search for more effective methods of optimisation. The use of the Quantum Approximate Optimization Algorithm (QAOA) in these studies shows the most promising results. With the help of multiple evaluations of several qubit quantum circuits, proper results of variable parameter optimization were obtained. In addition, it was observed that the increase in the number of assessments does not result in further efficient growth due to the increasing complexity of optimising variables. The tests confirmed the effectiveness of the QAOA optimization method.Keywords: algorithm analysis, autonomous system, quantum optimization, tandem detonator
Procedia PDF Downloads 924872 Condition Monitoring System of Mine Air Compressors Based on Wireless Sensor Network
Authors: Sheng Fu, Yinbo Gao, Hao Lin
Abstract:
In the current mine air compressors monitoring system, there are some difficulties in the installation and maintenance because of the wired connection. To solve the problem, this paper introduces a new air compressors monitoring system based on ZigBee in which the monitoring parameters are transmitted wirelessly. The collecting devices are designed to form a cluster network to collect vibration, temperature, and pressure of air cylinders and other parameters. All these devices are battery-powered. Besides, the monitoring software in PC is developed using MFC. Experiments show that the designed wireless sensor network works well in the site environmental condition and the system is very convenient to be installed since the wireless connection. This monitoring system will have a wide application prospect in the upgrade of the old monitoring system of the air compressors.Keywords: condition monitoring, wireless sensor network, air compressor, zigbee, data collecting
Procedia PDF Downloads 5064871 Clinical Validation of C-PDR Methodology for Accurate Non-Invasive Detection of Helicobacter pylori Infection
Authors: Suman Som, Abhijit Maity, Sunil B. Daschakraborty, Sujit Chaudhuri, Manik Pradhan
Abstract:
Background: Helicobacter pylori is a common and important human pathogen and the primary cause of peptic ulcer disease and gastric cancer. Currently H. pylori infection is detected by both invasive and non-invasive way but the diagnostic accuracy is not up to the mark. Aim: To set up an optimal diagnostic cut-off value of 13C-Urea Breath Test to detect H. pylori infection and evaluate a novel c-PDR methodology to overcome of inconclusive grey zone. Materials and Methods: All 83 subjects first underwent upper-gastrointestinal endoscopy followed by rapid urease test and histopathology and depending on these results; we classified 49 subjects as H. pylori positive and 34 negative. After an overnight, fast patients are taken 4 gm of citric acid in 200 ml water solution and 10 minute after ingestion of the test meal, a baseline exhaled breath sample was collected. Thereafter an oral dose of 75 mg 13C-Urea dissolved in 50 ml water was given and breath samples were collected upto 90 minute for 15 minute intervals and analysed by laser based high precisional cavity enhanced spectroscopy. Results: We studied the excretion kinetics of 13C isotope enrichment (expressed as δDOB13C ‰) of exhaled breath samples and found maximum enrichment around 30 minute of H. pylori positive patients, it is due to the acid mediated stimulated urease enzyme activity and maximum acidification happened within 30 minute but no such significant isotopic enrichment observed for H. pylori negative individuals. Using Receiver Operating Characteristic (ROC) curve an optimal diagnostic cut-off value, δDOB13C ‰ = 3.14 was determined at 30 minute exhibiting 89.16% accuracy. Now to overcome grey zone problem we explore percentage dose of 13C recovered per hour, i.e. 13C-PDR (%/hr) and cumulative percentage dose of 13C recovered, i.e. c-PDR (%) in exhaled breath samples for the present 13C-UBT. We further explored the diagnostic accuracy of 13C-UBT by constructing ROC curve using c-PDR (%) values and an optimal cut-off value was estimated to be c-PDR = 1.47 (%) at 60 minute, exhibiting 100 % diagnostic sensitivity , 100 % specificity and 100 % accuracy of 13C-UBT for detection of H. pylori infection. We also elucidate the gastric emptying process of present 13C-UBT for H. pylori positive patients. The maximal emptying rate found at 36 minute and half empting time of present 13C-UBT was found at 45 minute. Conclusions: The present study exhibiting the importance of c-PDR methodology to overcome of grey zone problem in 13C-UBT for accurate determination of infection without any risk of diagnostic errors and making it sufficiently robust and novel method for an accurate and fast non-invasive diagnosis of H. pylori infection for large scale screening purposes.Keywords: 13C-Urea breath test, c-PDR methodology, grey zone, Helicobacter pylori
Procedia PDF Downloads 3014870 Trapped in Hegemonic Binaries: Performing the Body
Authors: Bitopi Dutta
Abstract:
This paper attempts to understand the constructs of binaries while taking into account the politics of the body. It delves into how these constructs get fashioned and recreated while performing the same across normative and non-normative discourses. While it may be almost mundane and commonplace to see the performance of body within binary constructs across the normative discourses, this is to a great extent also true for those queer discourses that have challenged the conventional/normative. With a queer feminist perspective, the paper challenges this performativity while simultaneously engaging with the subtle nuances of blurring the borders of gender markers. The problem with this polarization within binary constructs is that there remains a tendency to reinstate patriarchy within queerness. To substantiate this argument further, the paper will draw from narratives and accounts of identities with alternate sexualities and genders. The paper concludes with problematising this hegemony within queer discourses locating the question of acceptance and visibility of fluidities.Keywords: binary, body, gender, identity, performativity, queer
Procedia PDF Downloads 2914869 Improving the Management Systems of the Ownership Risks in Conditions of Transformation of the Russian Economy
Authors: Mikhail V. Khachaturyan
Abstract:
The article analyzes problems of improving the management systems of the ownership risks in the conditions of the transformation of the Russian economy. Among the main sources of threats business owners should highlight is the inefficiency of the implementation of business models and interaction with hired managers. In this context, it is particularly important to analyze the relationship of business models and ownership risks. The analysis of this problem appears to be relevant for a number of reasons: Firstly, the increased risk appetite of the owner directly affects the business model and the composition of his holdings; secondly, owners with significant stakes in the company are factors in the formation of particular types of risks for owners, for which relations have a significant influence on a firm's competitiveness and ultimately determines its survival; and thirdly, inefficient system of management ownership of risk is one of the main causes of mass bankruptcies, which significantly affects the stable operation of the economy as a whole. The separation of the processes of possession, disposal and use in modern organizations is the cause of not only problems in the process of interaction between the owner and managers in managing the organization as a whole, but also the asymmetric information about the kinds and forms of the main risks. Managers tend to avoid risky projects, inhibit the diversification of the organization's assets, while owners can insist on the development of such projects, with the aim not only of creating new values for themselves and consumers, but also increasing the value of the company as a result of increasing capital. In terms of separating ownership and management, evaluation of projects by the ratio of risk-yield requires preservation of the influence of the owner on the process of development and making management decisions. It is obvious that without a clearly structured system of participation of the owner in managing the risks of their business, further development is hopeless. In modern conditions of forming a risk management system, owners are compelled to compromise between the desire to increase the organization's ability to produce new value, and, consequently, increase its cost due to the implementation of risky projects and the need to tolerate the cost of lost opportunities of risk diversification. Improving the effectiveness of the management of ownership risks may also contribute to the revitalization of creditors on implementation claims to inefficient owners, which ultimately will contribute to the efficiency models of ownership control to exclude variants of insolvency. It is obvious that in modern conditions, the success of the model of the ownership of risk management and audit is largely determined by the ability and willingness of the owner to find a compromise between potential opportunities for expanding the firm's ability to create new value through risk and maintaining the current level of new value creation and an acceptable level of risk through the use of models of diversification.Keywords: improving, ownership risks, problem, Russia
Procedia PDF Downloads 3504868 Image Rotation Using an Augmented 2-Step Shear Transform
Authors: Hee-Choul Kwon, Heeyong Kwon
Abstract:
Image rotation is one of main pre-processing steps for image processing or image pattern recognition. It is implemented with a rotation matrix multiplication. It requires a lot of floating point arithmetic operations and trigonometric calculations, so it takes a long time to execute. Therefore, there has been a need for a high speed image rotation algorithm without two major time-consuming operations. However, the rotated image has a drawback, i.e. distortions. We solved the problem using an augmented two-step shear transform. We compare the presented algorithm with the conventional rotation with images of various sizes. Experimental results show that the presented algorithm is superior to the conventional rotation one.Keywords: high-speed rotation operation, image rotation, transform matrix, image processing, pattern recognition
Procedia PDF Downloads 2784867 Using the Countryside to Absorb Urban Political Youth: The Cultural Revolution, Ballet, and Discontent
Authors: Eva Chou
Abstract:
This paper presents a case study of a historical moment in the city vs countryside relationship that is important in urban studies in China. Policies during the Cultural Revolution in China (1966-76) several times sent educated urban youths to the countryside. Initially, they were sent to “make revolution”: they were instructed to instigate powerful disruptions of established village relations. Later, they were “sent-down” to the countryside “to learn from the peasants.” Millions of urban youths “volunteered” to live as peasants did in the poverty of the countryside, thus resolving a political problem of urban unrest for the Party. Many had remained for decades before they were able to leave; others were never re-urbanized. Ballet troupes constituted a special case in both of these periods. This paper examines the differing experiences of individual “sent-down” ballet dancers on the one hand, and on the other hand, ballet troupes assigned to perform in the countryside.Keywords: cultural revolution, reurbanized, sent-down youths, ballet
Procedia PDF Downloads 2894866 Study of Deflection at Junction in the Precast on Cyclic Loading
Authors: Jongho Park, Ui-Cheol Shin, Jinwoong Choi, Sungnam Hong, Sun-Kyu Park
Abstract:
While the numerous structures built the industrialization are aging, the effort for the maintenance is concentrated in many countries. However, the traffic jam, environmental damage, and enormous maintenance cost, and etc become a problem. So, in order to solve this, the modular bridge has been studied. This bridge is the structure which utilizes and assembles the standard precast member. Through this, the substitution of the existing bridge and advantage of the easy maintenance will be achieved. However, the reliability in the long-term behavior is insufficient due to the junction part between modular precast members. Therefore, in this research, the cyclic load loading experiment was performed on the junction and deflection was analyzed by long-term service in modular slab connection. The deflection of modular slab with junction was mostly generated when initial and final test.Keywords: modular bridge, deflection, cyclic loading, junction
Procedia PDF Downloads 5114865 Cigarette Smoke Detection Based on YOLOV3
Abstract:
In order to satisfy the real-time and accurate requirements of cigarette smoke detection in complex scenes, a cigarette smoke detection technology based on the combination of deep learning and color features was proposed. Firstly, based on the color features of cigarette smoke, the suspicious cigarette smoke area in the image is extracted. Secondly, combined with the efficiency of cigarette smoke detection and the problem of network overfitting, a network model for cigarette smoke detection was designed according to YOLOV3 algorithm to reduce the false detection rate. The experimental results show that the method is feasible and effective, and the accuracy of cigarette smoke detection is up to 99.13%, which satisfies the requirements of real-time cigarette smoke detection in complex scenes.Keywords: deep learning, computer vision, cigarette smoke detection, YOLOV3, color feature extraction
Procedia PDF Downloads 874864 Realistic Study Discover Some Posture Deformities According to Some Biomechanical Variables for Schoolchildren
Authors: Basman Abdul Jabbar
Abstract:
The researchers aimed to improve the importance of the good posture without any divisions & deformities. The importance of research lied in the discovery posture deformities early so easily treated before its transformation into advanced abnormalities difficult to treat and may need surgical intervention. Research problem was noting that some previous studies were based on the discovery of posture deformities, which was dependent on the (self-evaluation) which this type did not have accuracy to discover deformities. The Samples were (500) schoolchildren aged (9-11 years, males) at Baghdad al Karak. They were students at primary schools. The measure included all posture deformities. The researcher used video camera to analyze the posture deformities according to biomechanical variables by Kinovea software for motion analysis. The researcher recommended the need to use accurate scientific methods for early detection of posture deformities in children which contribute to the prevention and reduction of distortions.Keywords: biomechanics, children, deformities, posture
Procedia PDF Downloads 2854863 A Hybrid Hopfield Neural Network for Dynamic Flexible Job Shop Scheduling Problems
Authors: Aydin Teymourifar, Gurkan Ozturk
Abstract:
In this paper, a new hybrid Hopfield neural network is proposed for the dynamic, flexible job shop scheduling problem. A new heuristic based and easy to implement energy function is designed for the Hopfield neural network, which penalizes the constraints violation and decreases makespan. Moreover, for enhancing the performance, several heuristics are integrated to it that achieve active, and non-delay schedules also, prevent early convergence of the neural network. The suggested algorithm that is designed as a generalization of the previous studies for the flexible and dynamic scheduling problems can be used for solving real scheduling problems. Comparison of the presented hybrid method results with the previous studies results proves its efficiency.Keywords: dynamic flexible job shop scheduling, neural network, heuristics, constrained optimization
Procedia PDF Downloads 4184862 Labour Migration in Russia in the Context of Russia’s National Security Problem
Authors: A. V. Dolzhikova
Abstract:
The article deals with the problems of labour migration in the Russian Federation in the context of Russia's national security, provides the typology of migrants residing in the territory of the Russian Federation and analyzes the risk factors. The author considers the structure of migration flows and the terms of legal, economic and socio-cultural adaptation of migrants in the Russian Federation. In this connection, the status of the Russian migration legislation, the concept of the comprehensive exam in Russian as a foreign language, history of Russia and the basics of the Russian Federation legislation for foreign citizens which was introduced in Russia on January 1, 2015, are analyzed. The article discloses its role as the adaptation strategy and the factor of Russia's migration security.Keywords: comprehensive exam, migration policy, migration legislation, Russia's national security
Procedia PDF Downloads 365