Search results for: systems administration
8222 The Role of Artificial Intelligence in Concrete Constructions
Authors: Ardalan Tofighi Soleimandarabi
Abstract:
Artificial intelligence has revolutionized the concrete construction industry and improved processes by increasing efficiency, accuracy, and sustainability. This article examines the applications of artificial intelligence in predicting the compressive strength of concrete, optimizing mixing plans, and improving structural health monitoring systems. Artificial intelligence-based models, such as artificial neural networks (ANN) and combined machine learning techniques, have shown better performance than traditional methods in predicting concrete properties. In addition, artificial intelligence systems have made it possible to improve quality control and real-time monitoring of structures, which helps in preventive maintenance and increases the life of infrastructure. Also, the use of artificial intelligence plays an effective role in sustainable construction by optimizing material consumption and reducing waste. Although the implementation of artificial intelligence is associated with challenges such as high initial costs and the need for specialized training, it will create a smarter, more sustainable, and more affordable future for concrete structures.Keywords: artificial intelligence, concrete construction, compressive strength prediction, structural health monitoring, stability
Procedia PDF Downloads 268221 Business-Intelligence Mining of Large Decentralized Multimedia Datasets with a Distributed Multi-Agent System
Authors: Karima Qayumi, Alex Norta
Abstract:
The rapid generation of high volume and a broad variety of data from the application of new technologies pose challenges for the generation of business-intelligence. Most organizations and business owners need to extract data from multiple sources and apply analytical methods for the purposes of developing their business. Therefore, the recently decentralized data management environment is relying on a distributed computing paradigm. While data are stored in highly distributed systems, the implementation of distributed data-mining techniques is a challenge. The aim of this technique is to gather knowledge from every domain and all the datasets stemming from distributed resources. As agent technologies offer significant contributions for managing the complexity of distributed systems, we consider this for next-generation data-mining processes. To demonstrate agent-based business intelligence operations, we use agent-oriented modeling techniques to develop a new artifact for mining massive datasets.Keywords: agent-oriented modeling (AOM), business intelligence model (BIM), distributed data mining (DDM), multi-agent system (MAS)
Procedia PDF Downloads 4368220 Tracing Back the Bot Master
Authors: Sneha Leslie
Abstract:
The current situation in the cyber world is that crimes performed by Botnets are increasing and the masterminds (botmaster) are not detectable easily. The botmaster in the botnet compromises the legitimate host machines in the network and make them bots or zombies to initiate the cyber-attacks. This paper will focus on the live detection of the botmaster in the network by using the strong framework 'metasploit', when distributed denial of service (DDOS) attack is performed by the botnet. The affected victim machine will be continuously monitoring its incoming packets. Once the victim machine gets to know about the excessive count of packets from any IP, that particular IP is noted and details of the noted systems are gathered. Using the vulnerabilities present in the zombie machines (already compromised by botmaster), the victim machine will compromise them. By gaining access to the compromised systems, applications are run remotely. By analyzing the incoming packets of the zombies, the victim comes to know the address of the botmaster. This is an effective and a simple system where no specific features of communication protocol are considered.Keywords: bonet, DDoS attack, network security, detection system, metasploit framework
Procedia PDF Downloads 2568219 Improvements and Implementation Solutions to Reduce the Computational Load for Traffic Situational Awareness with Alerts (TSAA)
Authors: Salvatore Luongo, Carlo Luongo
Abstract:
This paper discusses the implementation solutions to reduce the computational load for the Traffic Situational Awareness with Alerts (TSAA) application, based on Automatic Dependent Surveillance-Broadcast (ADS-B) technology. In 2008, there were 23 total mid-air collisions involving general aviation fixed-wing aircraft, 6 of which were fatal leading to 21 fatalities. These collisions occurred during visual meteorological conditions, indicating the limitations of the see-and-avoid concept for mid-air collision avoidance as defined in the Federal Aviation Administration’s (FAA). The commercial aviation aircraft are already equipped with collision avoidance system called TCAS, which is based on classic transponder technology. This system dramatically reduced the number of mid-air collisions involving air transport aircraft. In general aviation, the same reduction in mid-air collisions has not occurred, so this reduction is the main objective of the TSAA application. The major difference between the original conflict detection application and the TSAA application is that the conflict detection is focused on preventing loss of separation in en-route environments. Instead TSAA is devoted to reducing the probability of mid-air collision in all phases of flight. The TSAA application increases the flight crew traffic situation awareness providing alerts of traffic that are detected in conflict with ownship in support of the see-and-avoid responsibility. The relevant effort has been spent in the design process and the code generation in order to maximize the efficiency and performances in terms of computational load and memory consumption reduction. The TSAA architecture is divided into two high-level systems: the “Threats database” and the “Conflict detector”. The first one receives the traffic data from ADS-B device and provides the memorization of the target’s data history. Conflict detector module estimates ownship and targets trajectories in order to perform the detection of possible future loss of separation between ownship and each target. Finally, the alerts are verified by additional conflict verification logic, in order to prevent possible undesirable behaviors of the alert flag. In order to reduce the computational load, a pre-check evaluation module is used. This pre-check is only a computational optimization, so the performances of the conflict detector system are not modified in terms of number of alerts detected. The pre-check module uses analytical trajectories propagation for both target and ownship. This allows major accuracy and avoids the step-by-step propagation, which requests major computational load. Furthermore, the pre-check permits to exclude the target that is certainly not a threat, using an analytical and efficient geometrical approach, in order to decrease the computational load for the following modules. This software improvement is not suggested by FAA documents, and so it is the main innovation of this work. The efficiency and efficacy of this enhancement are verified using fast-time and real-time simulations and by the execution on a real device in several FAA scenarios. The final implementation also permits the FAA software certification in compliance with DO-178B standard. The computational load reduction allows the installation of TSAA application also on devices with multiple applications and/or low capacity in terms of available memory and computational capabilitiesKeywords: traffic situation awareness, general aviation, aircraft conflict detection, computational load reduction, implementation solutions, software certification
Procedia PDF Downloads 2888218 Linear Dynamic Stability Analysis of a Continuous Rotor-Disk-Blades System
Authors: F. Rahimi Dehgolan, S. E. Khadem, S. Bab, M. Najafee
Abstract:
Nowadays, using rotating systems like shafts and disks in industrial machines have been increased constantly. Dynamic stability is one of the most important factors in designing rotating systems. In this study, linear frequencies and stability of a coupled continuous flexible rotor-disk-blades system are studied. The Euler-Bernoulli beam theory is utilized to model the blade and shaft. The equations of motion are extracted using the extended Hamilton principle. The equations of motion have been simplified using the Coleman and complex transformations method. The natural frequencies of the linear part of the system are extracted, and the effects of various system parameters on the natural frequencies and decay rates (stability condition) are clarified. It can be seen that the centrifugal stiffening effect applied to the blades is the most important parameter for stability of the considered rotating system. This result highlights the importance of considering this stiffing effect in blades equation.Keywords: rotating shaft, flexible blades, centrifugal stiffness, stability
Procedia PDF Downloads 2728217 Enhancement of Thermal Performance of Latent Heat Solar Storage System
Authors: Rishindra M. Sarviya, Ashish Agrawal
Abstract:
Solar energy is available abundantly in the world, but it is not continuous and its intensity also varies with time. Due to above reason the acceptability and reliability of solar based thermal system is lower than conventional systems. A properly designed heat storage system increases the reliability of solar thermal systems by bridging the gap between the energy demand and availability. In the present work, two dimensional numerical simulation of the melting of heat storage material is presented in the horizontal annulus of double pipe latent heat storage system. Longitudinal fins were used as a thermal conductivity enhancement. Paraffin wax was used as a heat-storage or phase change material (PCM). Constant wall temperature is applied to heat transfer tube. Presented two-dimensional numerical analysis shows the movement of melting front in the finned cylindrical annulus for analyzing the thermal behavior of the system during melting.Keywords: latent heat, numerical study, phase change material, solar energy
Procedia PDF Downloads 3148216 Integrating Accreditation and Quality Assurance Exercises into the Quranic School System in the South-Western Nigeria
Authors: Popoola Sulaimon Akorede, Muinat A. Agbabiaka-Mustapha
Abstract:
The Quranic / piazza school where the rudiments of Islam are being imparted from the teaching of Arabic/ Quranic alphabets which later metamorphosized to higher fundamental principles of Islam is the major determinant of the existence of Islam in any part of south western Nigeria. In other words, one can successfully say that where there is a few or non-existence of such schools in that part of the country, the practice of the religion of Islam would be either very low or not existing at all. However, it has been discovered in the modern worlds that several challenges are militating against the development of these schools and among these challenges are poor admission policy, inadequate facilities such as learning environment and instructional materials, curriculum inadequacy and the management and the administration of the schools which failed to change in order to meet the modern contemporary Educational challenges. The focus of this paper therefore is to improve the conditions of these basic Islamic schools through the introduction of quality assurance and integrating accreditation Exercise to improve their status in order to enhance economic empowerment and to further their educational career in the future so that they will be able to compete favourably among the graduates of conventional universities. The scope of this study is limited to only seven (7) states of yorubaland and with only three (3) proprietors/ schools from each state which are Lagos, Oyo, Ogun, Osun, Ekiti, Ondo and parts of Kwara State. The study revealed that quality assurance as well as accreditation exercise are lacking in all the local Arabic/Quranic schools. Suggestions are proffered towards correcting the anomalies in these schools so that they can meet the modern Educational standard.Keywords: accreditation, quality assurance, Quranic schools, South-western Nigeria
Procedia PDF Downloads 3898215 Anti-Inflammatory, Analgesic and Antipyretic Activity of Terminalia arjuna Roxb. Extract in Animal Models
Authors: Linda Chularojmontri, Seewaboon Sireeratawong, Suvara Wattanapitayakul
Abstract:
Terminalia arjuna Roxb. (family Combretaceae) is commonly known as ‘Sa maw thet’ in Thai. The fruit is used in traditional medicine as natural mild laxatives, carminative and expectorant. Aim of the study: This research aims to study the anti-inflammatory, analgesic and antipyretic activities of Terminalia arjuna extract by using animal models in comparison to the reference drugs. Materials and Methods: The anti-inflammatory study was conducted by two experimental animal models namely ethyl phenylpropionate (EPP)-induced ear edema and carrageenan-induced paw edema. The study of analgesic activity used two methods of pain induction including acetic acid and heat-induced pain. In addition, the antipyretic activity study was performed by induced hyperthermia with yeast. Results: The results showed that the oral administration of Terminalia arjuna extract possessed acute anti-inflammatory effect in carrageenan-induced paw edema. Terminalia arjuna extract showed the analgesic activity in acetic acid-induced writhing response and heat-induced pain. This indicates its peripheral effect by inhibiting the biosynthesis and/or release of some pain mediators and some mechanism through Central nervous system. Moreover, Terminalia arjuna extract at the dose of 1000 and 1500 mg/kg body weight showed the antipyretic activity, which might be because of the inhibition of prostaglandins. Conclusion: The findings of this study indicated that the Terminalia arjuna extract possesses the anti-inflammatory, analgesic and antipyretic activities in animals.Keywords: analgesic activity, anti-inflammatory activity, antipyretic activity, Terminalia arjuna extract
Procedia PDF Downloads 2668214 Analytic Hierarchy Process Method for Supplier Selection Considering Green Logistics: Case Study of Aluminum Production Sector
Authors: H. Erbiyik, A. Bal, M. Sirakaya, Ö. Yesildal, E. Yolcu
Abstract:
The emergence of many environmental issues began with the Industrial Revolution. The depletion of natural resources and emerging environmental challenges over time requires enterprises and managers to take into consideration environmental factors while managing business. If we take notice of these causes; the design and implementation of environmentally friendly green purchasing, production and waste management systems become very important at green logistics systems. Companies can adopt green supply chain with the awareness of these facts. The concept of green supply chain constitutes from green purchasing, green production, green logistics, waste management and reverse logistics. In this study, we wanted to identify the concept of green supply chain and why green supply chain should be applied. In the practice part of the study an analytic hierarchy process (AHP) study is conducted on an aluminum production company to evaluate suppliers.Keywords: aluminum sector, analytic hierarchy process, decision making, green logistics
Procedia PDF Downloads 3608213 Overview of Development of a Digital Platform for Building Critical Infrastructure Protection Systems in Smart Industries
Authors: Bruno Vilić Belina, Ivan Župan
Abstract:
Smart industry concepts and digital transformation are very popular in many industries. They develop their own digital platforms, which have an important role in innovations and transactions. The main idea of smart industry digital platforms is central data collection, industrial data integration, and data usage for smart applications and services. This paper presents the development of a digital platform for building critical infrastructure protection systems in smart industries. Different service contraction modalities in service level agreements (SLAs), customer relationship management (CRM) relations, trends, and changes in business architectures (especially process business architecture) for the purpose of developing infrastructural production and distribution networks, information infrastructure meta-models and generic processes by critical infrastructure owner demanded by critical infrastructure law, satisfying cybersecurity requirements and taking into account hybrid threats are researched.Keywords: cybersecurity, critical infrastructure, smart industries, digital platform
Procedia PDF Downloads 1138212 Digital System Design for Strategic Improvement Planning in Education: A Socio-Technical and Iterative Design Approach
Authors: Neeley Current, Fatih Demir, Kenneth Haggerty, Blake Naughton, Isa Jahnke
Abstract:
Educational systems seek reform using data-intensive continuous improvement processes known as strategic improvement plans (SIPs). Schools turn to digital systems to monitor, analyze and report SIPs. One technical challenge of these digital systems focuses on integrating a highly diverse set of data sources. Another challenge is to create a learnable sociotechnical system to help administrators, principals and teachers add, manipulate and interpret data. This study explores to what extent one particular system is usable and useful for strategic planning activities and whether intended users see the benefit of the system achieve the goal of improving workflow related to strategic planning in schools. In a three-phase study, researchers used sociotechnical design methods to understand the current workflow, technology use, and processes of teachers and principals surrounding their strategic improvement planning. Additionally, design review and task analysis usability methods were used to evaluate task completion, usability, and user satisfaction of the system. The resulting socio-technical models illustrate the existing work processes and indicate how and at which places in the workflow the newly developed system could have an impact. The results point to the potential of the system but also indicate that it was initially too complicated for use. However, the diverse users see the potential benefits, especially to overcome the diverse set of data sources, and that the system could fill a gap for schools in planning and conducting strategic improvement plans.Keywords: continuous improvement process, education reform, strategic improvement planning, sociotechnical design, software development, usability
Procedia PDF Downloads 3018211 A Neurosymbolic Learning Method for Uplink LTE-A Channel Estimation
Authors: Lassaad Smirani
Abstract:
In this paper we propose a Neurosymbolic Learning System (NLS) as a channel estimator for Long Term Evolution Advanced (LTE-A) uplink. The proposed system main idea based on Neural Network has modules capable of performing bidirectional information transfer between symbolic module and connectionist module. We demonstrate various strengths of the NLS especially the ability to integrate theoretical knowledge (rules) and experiential knowledge (examples), and to make an initial knowledge base (rules) converted into a connectionist network. Also to use empirical knowledge witch by learning will have the ability to revise the theoretical knowledge and acquire new one and explain it, and finally the ability to improve the performance of symbolic or connectionist systems. Compared with conventional SC-FDMA channel estimation systems, The performance of NLS in terms of complexity and quality is confirmed by theoretical analysis and simulation and shows that this system can make the channel estimation accuracy improved and bit error rate decreased.Keywords: channel estimation, SC-FDMA, neural network, hybrid system, BER, LTE-A
Procedia PDF Downloads 3978210 Building Collapse: Factors and Resisting Mechanisms: A Review of Case Studies
Authors: Genevieve D. Fernandes, Nisha P. Naik
Abstract:
All through the ages in all human civilizations, men have been engaged in construction activity, not only to build their dwellings and house their activities, but also roads, bridges to facilitate means of transport, and communication etc. The main concern in this activity was to ensure safety and reduce the collapse of the buildings and other structures. But even after taking all precautions, it is impossible to guarantee safety and collapse because of several unforeseen reasons like faulty constructions, design errors, overloading, soil liquefaction, gas explosion, material degradation, terrorist attacks and economic factors also contributing to the collapse. It is also uneconomical to design the structure for unforeseen events unless they have a reasonable chance of occurrence. In order to ensure safety and prevent collapse, many guidelines have been framed by local bodies and government authorities in many countries like the United States Department of Defence (DOD), United States General Service Administration (GSA) and Euro-Codes in European Nations. Some other practices are followed to incorporate redundancies in the structure like detailing, ductile designs, tying of elements at particular locations, and provision of hinges and interconnections. It is also to be admitted that a full-proof safe design structure for accidental events cannot be prepared and implemented as it is uneconomical and the chances of such occurrences are less. This paper reviews past case studies of the collapse of structures with the aim of developing an understanding of the collapse mechanism. This study will definitely help to bring about a detailed improvement in the design to maximise the quality of the construction at a minimal cost.Keywords: unforeseen factors, progressive collapse, collapse resisting mechanisms, column removal scenario
Procedia PDF Downloads 1438209 Impact on the Results of Sub-Group Analysis on Performance of Recommender Systems
Authors: Ho Yeon Park, Kyoung-Jae Kim
Abstract:
The purpose of this study is to investigate whether friendship in social media can be an important factor in recommender system through social scientific analysis of friendship in popular social media such as Facebook and Twitter. For this purpose, this study analyzes data on friendship in real social media using component analysis and clique analysis among sub-group analysis in social network analysis. In this study, we propose an algorithm to reflect the results of sub-group analysis on the recommender system. The key to this algorithm is to ensure that recommendations from users in friendships are more likely to be reflected in recommendations from users. As a result of this study, outcomes of various subgroup analyzes were derived, and it was confirmed that the results were different from the results of the existing recommender system. Therefore, it is considered that the results of the subgroup analysis affect the recommendation performance of the system. Future research will attempt to generalize the results of the research through further analysis of various social data.Keywords: sub-group analysis, social media, social network analysis, recommender systems
Procedia PDF Downloads 3698208 Model Based Simulation Approach to a 14-Dof Car Model Using Matlab/Simulink
Authors: Ishit Sheth, Chandrasekhar Jinendran, Chinmaya Ranjan Sahu
Abstract:
A fourteen degree of freedom (DOF) ride and handling control mathematical model is developed for a car using generalized boltzmann hamel equation which will create a basis for design of ride and handling controller. Mathematical model developed yield equations of motion for non-holonomic constrained systems in quasi-coordinates. The governing differential equation developed integrates ride and handling control of car. Model-based systems engineering approach is implemented for simulation using matlab/simulink, vehicle’s response in different DOF is examined and later validated using commercial software (ADAMS). This manuscript involves detailed derivation of full car vehicle model which provides response in longitudinal, lateral and yaw motion to demonstrate the advantages of the developed model over the existing dynamic model. The dynamic behaviour of the developed ride and handling model is simulated for different road conditions.Keywords: Full Vehicle Model, MBSE, Non Holonomic Constraints, Boltzmann Hamel Equation
Procedia PDF Downloads 2378207 Magnetic Levitation Control: A Comparative Analysis of Two-Position and Tuned PID Methods Using Arduino Microcontrollers
Authors: Charles Anthony S. Santillan, Jude Noel P. Jarina, Patricia Mae A. Cuevas, Julito B. Añora Jr.
Abstract:
The research examines the effectiveness of Two-Position and Tuned PID controllers in magnetic levitation systems. Magnetic levitation, a crucial technology in diverse industries, depends on meticulous control mechanisms for stability and performance. The study seeks to compare these two control strategies to ascertain their efficacy in practical applications. The paper explores the theoretical foundations of the controllers, presents an experimental methodology emphasizing setup and installation, and examines the results about stability, response time, and susceptibility to disturbances. By interpreting and discussing the findings, the research provides valuable perspectives on the practical ramifications of utilizing Two-Position and Tuned PID controllers in magnetic levitation systems. The conclusion encapsulates significant outcomes and proposes avenues for future research, thereby contributing to the progress of control strategies in magnetic levitation technology.Keywords: arduino, comparative analysis, magnetic levitation, tuned PID controller, two-position controller
Procedia PDF Downloads 778206 AIR SAFE: an Internet of Things System for Air Quality Management Leveraging Artificial Intelligence Algorithms
Authors: Mariangela Viviani, Daniele Germano, Simone Colace, Agostino Forestiero, Giuseppe Papuzzo, Sara Laurita
Abstract:
Nowadays, people spend most of their time in closed environments, in offices, or at home. Therefore, secure and highly livable environmental conditions are needed to reduce the probability of aerial viruses spreading. Also, to lower the human impact on the planet, it is important to reduce energy consumption. Heating, Ventilation, and Air Conditioning (HVAC) systems account for the major part of energy consumption in buildings [1]. Devising systems to control and regulate the airflow is, therefore, essential for energy efficiency. Moreover, an optimal setting for thermal comfort and air quality is essential for people’s well-being, at home or in offices, and increases productivity. Thanks to the features of Artificial Intelligence (AI) tools and techniques, it is possible to design innovative systems with: (i) Improved monitoring and prediction accuracy; (ii) Enhanced decision-making and mitigation strategies; (iii) Real-time air quality information; (iv) Increased efficiency in data analysis and processing; (v) Advanced early warning systems for air pollution events; (vi) Automated and cost-effective m onitoring network; and (vii) A better understanding of air quality patterns and trends. We propose AIR SAFE, an IoT-based infrastructure designed to optimize air quality and thermal comfort in indoor environments leveraging AI tools. AIR SAFE employs a network of smart sensors collecting indoor and outdoor data to be analyzed in order to take any corrective measures to ensure the occupants’ wellness. The data are analyzed through AI algorithms able to predict the future levels of temperature, relative humidity, and CO₂ concentration [2]. Based on these predictions, AIR SAFE takes actions, such as opening/closing the window or the air conditioner, to guarantee a high level of thermal comfort and air quality in the environment. In this contribution, we present the results from the AI algorithm we have implemented on the first s et o f d ata c ollected i n a real environment. The results were compared with other models from the literature to validate our approach.Keywords: air quality, internet of things, artificial intelligence, smart home
Procedia PDF Downloads 978205 Semantic-Based Collaborative Filtering to Improve Visitor Cold Start in Recommender Systems
Authors: Baba Mbaye
Abstract:
In collaborative filtering recommendation systems, a user receives suggested items based on the opinions and evaluations of a community of users. This type of recommendation system uses only the information (notes in numerical values) contained in a usage matrix as input data. This matrix can be constructed based on users' behaviors or by offering users to declare their opinions on the items they know. The cold start problem leads to very poor performance for new users. It is a phenomenon that occurs at the beginning of use, in the situation where the system lacks data to make recommendations. There are three types of cold start problems: cold start for a new item, a new system, and a new user. We are interested in this article at the cold start for a new user. When the system welcomes a new user, the profile exists but does not have enough data, and its communities with other users profiles are still unknown. This leads to recommendations not adapted to the profile of the new user. In this paper, we propose an approach that improves cold start by using the notions of similarity and semantic proximity between users profiles during cold start. We will use the cold-metadata available (metadata extracted from the new user's data) useful in positioning the new user within a community. The aim is to look for similarities and semantic proximities with the old and current user profiles of the system. Proximity is represented by close concepts considered to belong to the same group, while similarity groups together elements that appear similar. Similarity and proximity are two close but not similar concepts. This similarity leads us to the construction of similarity which is based on: a) the concepts (properties, terms, instances) independent of ontology structure and, b) the simultaneous representation of the two concepts (relations, presence of terms in a document, simultaneous presence of the authorities). We propose an ontology, OIVCSRS (Ontology of Improvement Visitor Cold Start in Recommender Systems), in order to structure the terms and concepts representing the meaning of an information field, whether by the metadata of a namespace, or the elements of a knowledge domain. This approach allows us to automatically attach the new user to a user community, partially compensate for the data that was not initially provided and ultimately to associate a better first profile with the cold start. Thus, the aim of this paper is to propose an approach to improving cold start using semantic technologies.Keywords: visitor cold start, recommender systems, collaborative filtering, semantic filtering
Procedia PDF Downloads 2228204 Criminal Justice System, Health and Imprisonment in India
Authors: Debolina Chatterjee, Suhita Chopra Chatterjee
Abstract:
Imprisonment is an expansive concept, as it is regulated by laws under criminal justice system of the state. The state sets principles of punishment to control offenders and also puts limits to excess punitive control. One significant way through which it exercises control is through rules governing healthcare of imprisoned population. Prisons signify specialized settings which accommodate both medical and legal concerns. The provision of care operates within the institutional paradigm of punishment. This requires the state to negotiate adequately between goals of punishment and fulfilment of basic human rights of offenders. The present study is based on a critical analysis of prison healthcare standards in India, which include government policies and guidelines. It also demonstrates how healthcare is delivered by drawing insights from a primary study conducted in a correctional home in the state of West Bengal, India, which houses both male and female inmates. Forty women were interviewed through semi-structured interviews, followed by focus group discussions. Doctors and administrative personnel were also interviewed. Findings show how institutional practices control women through subversion of the role of doctors to prison administration. Also, poor healthcare infrastructure, unavailability of specialized services, hierarchies between personnel and inmates make prisons unlikely sites for therapeutic intervention. The paper further discusses how institutional practices foster gender-based discriminatory practices.Keywords: imprisonment, Indian prisons, prison healthcare, punishment
Procedia PDF Downloads 2358203 Development of a Wind Resource Assessment Framework Using Weather Research and Forecasting (WRF) Model, Python Scripting and Geographic Information Systems
Authors: Jerome T. Tolentino, Ma. Victoria Rejuso, Jara Kaye Villanueva, Loureal Camille Inocencio, Ma. Rosario Concepcion O. Ang
Abstract:
Wind energy is rapidly emerging as the primary source of electricity in the Philippines, although developing an accurate wind resource model is difficult. In this study, Weather Research and Forecasting (WRF) Model, an open source mesoscale Numerical Weather Prediction (NWP) model, was used to produce a 1-year atmospheric simulation with 4 km resolution on the Ilocos Region of the Philippines. The WRF output (netCDF) extracts the annual mean wind speed data using a Python-based Graphical User Interface. Lastly, wind resource assessment was produced using a GIS software. Results of the study showed that it is more flexible to use Python scripts than using other post-processing tools in dealing with netCDF files. Using WRF Model, Python, and Geographic Information Systems, a reliable wind resource map is produced.Keywords: wind resource assessment, weather research and forecasting (WRF) model, python, GIS software
Procedia PDF Downloads 4458202 Reconstruction of Performace-Based Budgeting in Indonesian Local Government: Application of Soft Systems Methodology in Producing Guideline for Policy Implementation
Authors: Deddi Nordiawan
Abstract:
Effective public policy creation required a strong budget system, both in terms of design and implementation. Performance-based Budget is an evolutionary approach with two substantial characteristics; first, the strong integration between budgeting and planning, and second, its existence as guidance so that all activities and expenditures refer to measurable performance targets. There are four processes in the government that should be followed in order to make the budget become performance-based. These four processes consist of the preparation of a vision according to the bold aspiration, the formulation of outcome, the determination of output based on the analysis of organizational resources, and the formulation of Value Creation Map that contains a series of programs and activities. This is consistent with the concept of logic model which revealed that the budget performance should be placed within a relational framework of resources, activities, outputs, outcomes and impacts. Through the issuance of Law 17/2003 regarding State Finance, local governments in Indonesia have to implement performance-based budget. Central Government then issued Government Regulation 58/2005 which contains the detail guidelines how to prepare local governments budget. After a decade, implementation of performance budgeting in local government is still not fully meet expectations, though the guidance is completed, socialization routinely performed, and trainings have also been carried out at all levels. Accordingly, this study views the practice of performance-based budget at local governments as a problematic situation. This condition must be approached with a system approach that allows the solutions from many point of views. Based on the fact that the infrastructure of budgeting has already settled, the study then considering the situation as complexity. Therefore, the intervention needs to be done in the area of human activity system. Using Soft Systems Methodology, this research will reconstruct the process of performance-based budget at local governments is area of human activity system. Through conceptual models, this study will invite all actors (central government, local government, and the parliament) for dialogue and formulate interventions in human activity systems that systematically desirable and culturally feasible. The result will direct central government in revise the guidance to local government budgeting process as well as a reference to build the capacity building strategy.Keywords: soft systems methodology, performance-based budgeting, Indonesia, public policy
Procedia PDF Downloads 2558201 Investigation of Ezetimibe Administration on Cell Survival Markers in Kidney Ischemia
Authors: Zahra Heydari
Abstract:
Introduction: One of the major clinical issues is acute renal failure, which is caused by ischemia-reperfusion of the kidney and is associated with high mortality. Despite advances in this area, important issues such as tissue necrosis, cell apoptosis, and so on in damaged tissue are suggestive for more researches and study on this subject. Objective: Evaluation of the potential utility of Ezetimibe in reducing injuries and cell death induced by kidney ischemia/ reperfusion through inducing expression changes of different cellular pathways in adult Sprague-Dawley rats. Materials and methods: Forty rats weighing 180-200g were divided into 4 groups. For this purpose, the first right kidneys of the rats were removed during surgery. After 20 days, the left renal artery was closed with a soft clamp and reperfusion was performed. After 24 hours, blood samples were collected and sent to the laboratory with kidneys to measure bax and bcl-2 by Western blotting and histopathological tests. Results: Quantitative damage reviews of Kidney tissue indicates damage Acute and severe tubular lesions were observed in the ischemia group. Also, the amount of injury was significantly reduced in the treatment group. There was also a significant difference between the ischemia and sham groups. In general, the results show that a single dose of 1.2 mg/kg of ezetimibe can reduce the bax/ bcl-2 ratio compared to the ischemia group. In general, the results showed Ezetimibe is effective in reducing cell damage and death due to ischemia/ reperfusion after renal ischemia through changes in the expression of various cellular pathways in rats.Keywords: acute renal failure, renal ischemia-reperfusion injury, ezetimibe, apoptosis
Procedia PDF Downloads 2008200 The Creative Unfolding of “Reduced Descriptive Structures” in Musical Cognition: Technical and Theoretical Insights Based on the OpenMusic and PWGL Long-Term Feedback
Authors: Jacopo Baboni Schilingi
Abstract:
We here describe the theoretical and philosophical understanding of a long term use and development of algorithmic computer-based tools applied to music composition. The findings of our research lead us to interrogate some specific processes and systems of communication engaged in the discovery of specific cultural artworks: artistic creation in the sono-musical domain. Our hypothesis is that the patterns of auditory learning cannot be only understood in terms of social transmission but would gain to be questioned in the way they rely on various ranges of acoustic stimuli modes of consciousness and how the different types of memories engaged in the percept-action expressive systems of our cultural communities also relies on these shadowy conscious entities we named “Reduced Descriptive Structures”.Keywords: algorithmic sonic computation, corrected and self-correcting learning patterns in acoustic perception, morphological derivations in sensorial patterns, social unconscious modes of communication
Procedia PDF Downloads 1608199 Architectural Knowledge Systems Related to Use of Terracotta in Bengal
Authors: Nandini Mukhopadhyay
Abstract:
The prominence of terracotta as a building material in Bengal is well justified by its geographical location. The architectural knowledge system associated with terracotta can be comprehended in the typology of the built structures as they act as texts to interpret the knowledge. The history of Bengal has witnessed the influence of several rulers in developing the architectural vocabulary of the region. This metamorphosis of the architectural knowledge systems in the region includes the Bhakti movement, the Islamic influence, and the British rule, which led to the evolution of the use of terracotta from decorative elements to structural elements in the present-day context. This paper intends to develop an understanding of terracotta as a building material, its use in a built structure, the common problems associated with terracotta construction, and the techniques of maintenance, repair, and conservation. This paper also explores the size, shape, and geometry of the material and its varied use in temples, mosques in the region. It also takes into note that the use of terracotta was concentrated majorly to religious structures and not in the settlements of the common people. And the architectural style of temples and mosques of Bengal is hugely influenced by the houses of the common.Keywords: terracotta, material, knowledge system, conservation
Procedia PDF Downloads 1528198 Effects of Incident Angle and Distance on Visible Light Communication
Authors: Taegyoo Woo, Jong Kang Park, Jong Tae Kim
Abstract:
Visible Light Communication (VLC) provides wireless communication features in illumination systems. One of the key applications is to recognize the user location by indoor illuminators such as light emitting diodes. For localization of individual receivers in these systems, we usually assume that receivers and transmitters are placed in parallel. However, it is difficult to satisfy this assumption because the receivers move randomly in real case. It is necessary to analyze the case when transmitter is not placed perfectly parallel to receiver. It is also important to identify changes on optical gain by the tilted angles and distances of them against the illuminators. In this paper, we simulate optical gain for various cases where the tilt of the receiver and the distance change. Then, we identified changing patterns of optical gains according to tilted angles of a receiver and distance. These results can help many VLC applications understand the extent of the location errors with regard to optical gains of the receivers and identify the root cause.Keywords: visible light communication, incident angle, optical gain, light emitting diode
Procedia PDF Downloads 3388197 Current Status of Industry 4.0 in Material Handling Automation and In-house Logistics
Authors: Orestis Κ. Efthymiou, Stavros T. Ponis
Abstract:
In the last decade, a new industrial revolution seems to be emerging, supported -once again- by the rapid advancements of Information Technology in the areas of Machine-to-Machine (M2M) communication permitting large numbers of intelligent devices, e.g. sensors to communicate with each other and take decisions without any or minimum indirect human intervention. The advent of these technologies have triggered the emergence of a new category of hybrid (cyber-physical) manufacturing systems, combining advanced manufacturing techniques with innovative M2M applications based on the Internet of Things (IoT), under the umbrella term Industry 4.0. Even though the topic of Industry 4.0 has attracted much attention during the last few years, the attempts of providing a systematic literature review of the subject are scarce. In this paper, we present the authors’ initial study of the field with a special focus on the use and applications of Industry 4.0 principles in material handling automations and in-house logistics. Research shows that despite the vivid discussion and attractiveness of the subject, there are still many challenges and issues that have to be addressed before Industry 4.0 becomes standardized and widely applicable.Keywords: Industry 4.0, internet of things, manufacturing systems, material handling, logistics
Procedia PDF Downloads 1308196 Machine Learning-Based Techniques for Detecting and Mitigating Cyber-attacks on Automatic Generation Control in Smart Grids
Authors: Sami M. Alshareef
Abstract:
The rapid growth of smart grid technology has brought significant advancements to the power industry. However, with the increasing interconnectivity and reliance on information and communication technologies, smart grids have become vulnerable to cyber-attacks, posing significant threats to the reliable operation of power systems. Among the critical components of smart grids, the Automatic Generation Control (AGC) system plays a vital role in maintaining the balance between generation and load demand. Therefore, protecting the AGC system from cyber threats is of paramount importance to maintain grid stability and prevent disruptions. Traditional security measures often fall short in addressing sophisticated and evolving cyber threats, necessitating the exploration of innovative approaches. Machine learning, with its ability to analyze vast amounts of data and learn patterns, has emerged as a promising solution to enhance AGC system security. Therefore, this research proposal aims to address the challenges associated with detecting and mitigating cyber-attacks on AGC in smart grids by leveraging machine learning techniques on automatic generation control of two-area power systems. By utilizing historical data, the proposed system will learn the normal behavior patterns of AGC and identify deviations caused by cyber-attacks. Once an attack is detected, appropriate mitigation strategies will be employed to safeguard the AGC system. The outcomes of this research will provide power system operators and administrators with valuable insights into the vulnerabilities of AGC systems in smart grids and offer practical solutions to enhance their cyber resilience.Keywords: machine learning, cyber-attacks, automatic generation control, smart grid
Procedia PDF Downloads 888195 Membrane-Localized Mutations as Predictors of Checkpoint Blockade Efficacy in Cancer
Authors: Zoe Goldberger, Priscilla S. Briquez, Jeffrey A. Hubbell
Abstract:
Tumor cells have mutations resulting from genetic instability that the immune system can actively recognize. Immune checkpoint immunotherapy (ICI) is commonly used in the clinic to re-activate immune reactions against mutated proteins, called neoantigens, resulting in tumor remission in cancer patients. However, only around 20% of patients show durable response to ICI. While tumor mutational burden (TMB) has been approved by the Food and Drug Administration (FDA) as a criterion for ICI therapy, the relevance of the subcellular localizations of the mutated proteins within the tumor cell has not been investigated. Here, we hypothesized that localization of mutations impacts the effect of immune responsiveness to ICI. We analyzed publicly available tumor mutation sequencing data of ICI treated patients from 3 independent datasets. We extracted the subcellular localization from the UniProtKB/Swiss-Prot database and quantified the proportion of membrane, cytoplasmic, nuclear, or secreted mutations per patient. We analyzed this information in relation to response to ICI treatment and overall survival of patients showing with 1722 ICI-treated patients that high mutational burden localized at the membrane (mTMB), correlate with ICI responsiveness, and improved overall survival in multiple cancer types. We anticipate that our results will ameliorate predictability of cancer patient response to ICI with potential implications in clinical guidelines to tailor ICI treatment. This would not only increase patient survival for those receiving ICI, but also patients’ quality of life by reducing the number of patients enduring non-effective ICI treatments.Keywords: cancer, immunotherapy, membrane neoantigens, efficacy prediction, biomarkers
Procedia PDF Downloads 1138194 Review Paper on Structural Behaviour of Industrial Pallet Rack with Braced and Unbraced Frames
Authors: Sourabh R. Dinde, Rajshekar S. Talikoti
Abstract:
According to the structural point of view Industrial Pallet rack structure can be considered typical steel framed structure. This work presents a general analysis of an industrial pallet rack structure, evaluating the influence of each of the components on the global stability. An analytical study for the sensitivity of pallet rack configuration in linear static equivalent lateral loads. The aim is to braced/unbraced frames were design and their analytical models are to be built in software. The finite element analysis is used to determine axial forces in beam and column, maximum storey displacement and buckling loads on braced/unbraced pallet rack structure. Bracing systems are mostly provided to enhance the stiffness factor of the structures with the seismic loads. Unbraced systems have mostly translational modes of failure and are very flexible due to excessive loads.Keywords: buckling capacity, cold formed steel, finite element analysis, pallets Rrack, seismic design
Procedia PDF Downloads 3298193 Architectural Strategies for Designing Durable Steel Structural Systems
Authors: Alireza Taghdiri, Sara Ghanbarzade Ghomi
Abstract:
Nowadays, steel structures are used for not only common buildings but also high-rise construction and wide span covering. The advanced methods of construction as well as the advanced structural connections have a great effect on architecture. However a better use of steel structural systems will be achieved with the deep understanding of steel structures specifications and their substantial advantages. On the other hand, the steel structures face to the different environmental factors such as air flow which cause erosion and corrosion. With the time passing, the amount of these steel mass damages and also the imposed stress will be increased. In other words, the position of erosion in steel structures related to existing stresses indicates that effective environmental conditions will gradually decrease the structural resistance of steel components and result in decreasing the durability of steel components. In this paper, the durability of different steel structural components is evaluated and on the basis of these stress, architectural strategies for designing the system and the components of steel structures is recognized in order to achieve an optimum life cycle.Keywords: durability, bending stress, erosion in steel structure, life cycle
Procedia PDF Downloads 567