Search results for: deep feed forward neural network
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 8787

Search results for: deep feed forward neural network

6237 Detecting Port Maritime Communities in Spain with Complex Network Analysis

Authors: Nicanor Garcia Alvarez, Belarmino Adenso-Diaz, Laura Calzada Infante

Abstract:

In recent years, researchers have shown an interest in modelling maritime traffic as a complex network. In this paper, we propose a bipartite weighted network to model maritime traffic and detect port maritime communities. The bipartite weighted network considers two different types of nodes. The first one represents Spanish ports, while the second one represents the countries with which there is major import/export activity. The flow among both types of nodes is modeled by weighting the volume of product transported. To illustrate the model, the data is segmented by each type of traffic. This will allow fine tuning and the creation of communities for each type of traffic and therefore finding similar ports for a specific type of traffic, which will provide decision-makers with tools to search for alliances or identify their competitors. The traffic with the greatest impact on the Spanish gross domestic product is selected, and the evolution of the communities formed by the most important ports and their differences between 2019 and 2009 will be analyzed. Finally, the set of communities formed by the ports of the Spanish port system will be inspected to determine global similarities between them, analyzing the sum of the membership of the different ports in communities formed for each type of traffic in particular.

Keywords: bipartite networks, competition, infomap, maritime traffic, port communities

Procedia PDF Downloads 148
6236 The Role of Bridging Stakeholder in Water Management: Examining Social Networks in Working Groups and Co-Management

Authors: Fariba Ebrahimi, Mehdi Ghorbani

Abstract:

Comprehensive water management considers economic, environmental, technical and social sustainability of water resources for future generations. Integrated water management implies cooperative approach and involves all stakeholders and also introduces issues to managers and decision makers. Solving these issues needs integrated and system approach according to the recognition of actors or key persons in necessary to apply cooperative management of water resources. Therefore, social network analysis can be used to demonstrate the most effective actors for environmental base decisions. The linkage of diverse sets of actors and knowledge systems across management levels and institutional boundaries often poses one of the greatest challenges in adaptive water management. Bridging stakeholder can facilitate interactions among actors in management settings by lowering the transaction costs of collaboration. This research examines how network connections between group members affect in co- management. Cohesive network structures allow groups to more effectively achieve their goals and objectives Strong; centralized leadership is a better predictor of working group success in achieving goals and objectives. Finally, geometric position of each actor was illustrated in the network. The results of the research based on between centrality index have a key and bridging actor in recognition of cooperative management of water resources in Darbandsar village and also will help managers and planners of water in the case of recognition to organization and implementation of sustainable management of water resources and water security.

Keywords: co-management, water management, social network, bridging stakeholder, darbandsar village

Procedia PDF Downloads 308
6235 Colorectal Resection in Endometriosis: A Study on Conservative Vascular Approach

Authors: A. Zecchin, E. Vallicella, I. Alberi, A. Dalle Carbonare, A. Festi, F. Galeone, S. Garzon, R. Raffaelli, P. Pomini, M. Franchi

Abstract:

Introduction: Severe endometriosis is a multiorgan disease, that involves bowel in 31% of cases. Disabling symptoms and deep infiltration can lead to bowel obstruction: surgical bowel treatment may be needed. In these cases, colorectal segment resection is usually performed by inferior mesenteric artery ligature, as radically as for oncological surgery. This study was made on surgery based on intestinal vascular axis’ preservation. It was assessed postoperative complications risks (mainly rate of dehiscence of intestinal anastomoses), and results were compared with the ones found in literature about classical colorectal resection. Materials and methods: This was a retrospective study based on 62 patients with deep infiltrating endometriosis of the bowel, which undergo segmental resection with intestinal vascular axis preservation, between 2013 and 2016. It was assessed complications related to the intervention both during hospitalization and 30-60 days after resection. Particular attention was paid to the presence of anastomotic dehiscence. 52 patients were finally telephonically interviewed in order to investigate the presence or absence of intestinal constipation. Results and Conclusion: Segmental intestinal resection performed in this study ensured a more conservative vascular approach, with lower rate of anastomotic dehiscence (1.6%) compared to classical literature data (10.0% to 11.4% ). No complications were observed regarding spontaneous recovery of intestinal motility and bladder emptying. Constipation in some patients, even after years of intervention, is not assessable in the absence of a preoperative constipation state assessment.

Keywords: anastomotic dehiscence, deep infiltrating endometriosis, colorectal resection, vascular axis preservation

Procedia PDF Downloads 204
6234 Visualizing the Commercial Activity of a City by Analyzing the Data Information in Layers

Authors: Taras Agryzkov, Jose L. Oliver, Leandro Tortosa, Jose Vicent

Abstract:

This paper aims to demonstrate how network models can be used to understand and to deal with some aspects of urban complexity. As it is well known, the Theory of Architecture and Urbanism has been using for decades’ intellectual tools based on the ‘sciences of complexity’ as a strategy to propose theoretical approaches about cities and about architecture. In this sense, it is possible to find a vast literature in which for instance network theory is used as an instrument to understand very diverse questions about cities: from their commercial activity to their heritage condition. The contribution of this research consists in adding one step of complexity to this process: instead of working with one single primal graph as it is usually done, we will show how new network models arise from the consideration of two different primal graphs interacting in two layers. When we model an urban network through a mathematical structure like a graph, the city is usually represented by a set of nodes and edges that reproduce its topology, with the data generated or extracted from the city embedded in it. All this information is normally displayed in a single layer. Here, we propose to separate the information in two layers so that we can evaluate the interaction between them. Besides, both layers may be composed of structures that do not have to coincide: from this bi-layer system, groups of interactions emerge, suggesting reflections and in consequence, possible actions.

Keywords: graphs, mathematics, networks, urban studies

Procedia PDF Downloads 180
6233 Security in Resource Constraints Network Light Weight Encryption for Z-MAC

Authors: Mona Almansoori, Ahmed Mustafa, Ahmad Elshamy

Abstract:

Wireless sensor network was formed by a combination of nodes, systematically it transmitting the data to their base stations, this transmission data can be easily compromised if the limited processing power and the data consistency from these nodes are kept in mind; there is always a discussion to address the secure data transfer or transmission in actual time. This will present a mechanism to securely transmit the data over a chain of sensor nodes without compromising the throughput of the network by utilizing available battery resources available in the sensor node. Our methodology takes many different advantages of Z-MAC protocol for its efficiency, and it provides a unique key by sharing the mechanism using neighbor node MAC address. We present a light weighted data integrity layer which is embedded in the Z-MAC protocol to prove that our protocol performs well than Z-MAC when we introduce the different attack scenarios.

Keywords: hybrid MAC protocol, data integrity, lightweight encryption, neighbor based key sharing, sensor node dataprocessing, Z-MAC

Procedia PDF Downloads 144
6232 Correlation of SPT N-Value and Equipment Drilling Parameters in Deep Soil Mixing

Authors: John Eric C. Bargas, Maria Cecilia M. Marcos

Abstract:

One of the most common ground improvement techniques is Deep Soil Mixing (DSM). As the technique progresses, there is still lack in the development when it comes to depth control. This was the issue experienced during the installation of DSM in one of the National projects in the Philippines. This study assesses the feasibility of using equipment drilling parameters such as hydraulic pressure, drilling speed and rotational speed in determining the Standard Penetration Test N-value of a specific soil. Hydraulic pressure and drilling speed with a constant rotational speed of 30 rpm have a positive correlation with SPT N-value for cohesive soil and sand. A linear trend was observed for cohesive soil. The correlation of SPT N-value and hydraulic pressure yielded a R²=0.5377 while the correlation of SPT N-value and drilling speed has a R²=0.6355. While the best fitted model for sand is polynomial trend. The correlation of SPT N-value and hydraulic pressure yielded a R²=0.7088 while the correlation of SPT N-value and drilling speed has a R²=0.4354. The low correlation may be attributed to the behavior of sand when the auger penetrates. Sand tends to follow the rotation of the auger rather than resisting which was observed for very loose to medium dense sand. Specific Energy and the product of hydraulic pressure and drilling speed yielded same R² with a positive correlation. Linear trend was observed for cohesive soil while polynomial trend for sand. Cohesive soil yielded a R²=0.7320 which has a strong relationship. Sand also yielded a strong relationship having a coefficient of determination, R²=0.7203. It is feasible to use hydraulic pressure and drilling speed to estimate the SPT N-value of the soil. Also, the product of hydraulic pressure and drilling speed can be a substitute to specific energy when estimating the SPT N-value of a soil. However, additional considerations are necessary to account for other influencing factors like ground water and physical and mechanical properties of soil.

Keywords: ground improvement, equipment drilling parameters, standard penetration test, deep soil mixing

Procedia PDF Downloads 47
6231 Performance of Osmotic Microbial Fuel Cell in Wastewater Treatment and Electricity Generation: A Critical Review

Authors: Shubhangi R. Deshmukh, Anupam B. Soni

Abstract:

Clean water and electricity are vital services needed in all communities. Bio-degradation of wastewater contaminants and desalination technologies are the best possible alternatives for the global shortage of fresh water supply. Osmotic microbial fuel cell (OMFC) is a versatile technology that uses microorganism (used for biodegradation of organic waste) and membrane technology (used for water purification) for wastewater treatment and energy generation simultaneously. This technology is the combination of microbial fuel cell (MFC) and forward osmosis (FO) processes. OMFC can give more electricity and clean water than the MFC which has a regular proton exchange membrane. FO gives many improvements such as high contamination removal, lower operating energy, raising high proton flux than other pressure-driven membrane technology. Lower concentration polarization lowers the membrane fouling by giving osmotic water recovery without extra cost. In this review paper, we have discussed the principle, mechanism, limitation, and application of OMFC technology reported to date. Also, we have interpreted the experimental data from various literature on the water recovery and electricity generation assessed by a different component of OMFC. The area of producing electricity using OMFC has further scope for research and seems like a promising route to wastewater treatment.

Keywords: forward osmosis, microbial fuel cell, osmotic microbial fuel cell, wastewater treatment

Procedia PDF Downloads 182
6230 Effect of Ginger (Zingiber Officinale) And Garlic (Allium Sativum) Mixture on Growth Performance, Feed Utilization and Survival of Clarias Gariepinus Fingerlings

Authors: Maryam I. Abdullahi, Suleiman Aliyu, Armaya'u Hamisu Bichi

Abstract:

The study was conducted at the University Fish Farm, Federal University Dutsinma. The aim of the study was to determine the effects of dietary supplementation of Allium sativum and Zingiber officinale mixture on growth performance, feed utilization and survival of C. gariepinus fingerling reared in tank system. The experimental setup comprised of four treatment (4) groups labeled as T1, T2, T3 and T4, each treatment replicated 3 times with ten (10) fingerlings in each replicate respectively. Treatment 1 contained 0.5% of Zingiber officinale and 0.5% of Allium sativum (ZO-AS: 1.0%), Treatment 2 contained 0.75% Zingiber officinale, and 0.75% garlic (ZO-AS: 1.5%) while T3 contained 1% ginger and 1% Allium sativum (ZO-AS: 2.0%) respectively. The experiment lasted for twelve (12) weeks (84 days). The survival rate ranges from 90% - 100%. With a higher Final Mean Weight (893.10) and Percentage Mean Weight (942.65) as compared to the control group and others. There was no significant difference (p > 0.05) in the FMW (893.10) of the fish fed 1.5g/kg of Garlic and Ginger diets than the control (687.00). The SGR (1.20) of fish-fed Zingiber officinale and Allium sativum fortified diets shows that there is no significant difference between treatments fed 1.5g/kg Zingiber officinale and Allium sativum and the control group. Generally, there was an increased survival rate in the experimental fish-fed Zingiber officinale and Allium sativum-supplemented diets as compared to the control.

Keywords: clarias gariepinus, zingiber officinale, allium sativum, fingerlings

Procedia PDF Downloads 68
6229 A Machine Learning Based Method to Detect System Failure in Resource Constrained Environment

Authors: Payel Datta, Abhishek Das, Abhishek Roychoudhury, Dhiman Chattopadhyay, Tanushyam Chattopadhyay

Abstract:

Machine learning (ML) and deep learning (DL) is most predominantly used in image/video processing, natural language processing (NLP), audio and speech recognition but not that much used in system performance evaluation. In this paper, authors are going to describe the architecture of an abstraction layer constructed using ML/DL to detect the system failure. This proposed system is used to detect the system failure by evaluating the performance metrics of an IoT service deployment under constrained infrastructure environment. This system has been tested on the manually annotated data set containing different metrics of the system, like number of threads, throughput, average response time, CPU usage, memory usage, network input/output captured in different hardware environments like edge (atom based gateway) and cloud (AWS EC2). The main challenge of developing such system is that the accuracy of classification should be 100% as the error in the system has an impact on the degradation of the service performance and thus consequently affect the reliability and high availability which is mandatory for an IoT system. Proposed ML/DL classifiers work with 100% accuracy for the data set of nearly 4,000 samples captured within the organization.

Keywords: machine learning, system performance, performance metrics, IoT, edge

Procedia PDF Downloads 195
6228 Exploring the Psychosocial Brain: A Retrospective Analysis of Personality, Social Networks, and Dementia Outcomes

Authors: Felicia N. Obialo, Aliza Wingo, Thomas Wingo

Abstract:

Psychosocial factors such as personality traits and social networks influence cognitive aging and dementia outcomes both positively and negatively. The inherent complexity of these factors makes defining the underlying mechanisms of their influence difficult; however, exploring their interactions affords promise in the field of cognitive aging. The objective of this study was to elucidate some of these interactions by determining the relationship between social network size and dementia outcomes and by determining whether personality traits mediate this relationship. The longitudinal Alzheimer’s Disease (AD) database provided by Rush University’s Religious Orders Study/Memory and Aging Project was utilized to perform retrospective regression and mediation analyses on 3,591 participants. Participants who were cognitively impaired at baseline were excluded, and analyses were adjusted for age, sex, common chronic diseases, and vascular risk factors. Dementia outcome measures included cognitive trajectory, clinical dementia diagnosis, and postmortem beta-amyloid plaque (AB), and neurofibrillary tangle (NT) accumulation. Personality traits included agreeableness (A), conscientiousness (C), extraversion (E), neuroticism (N), and openness (O). The results show a positive correlation between social network size and cognitive trajectory (p-value = 0.004) and a negative relationship between social network size and odds of dementia diagnosis (p = 0.024/ Odds Ratio (OR) = 0.974). Only neuroticism mediates the positive relationship between social network size and cognitive trajectory (p < 2e-16). Agreeableness, extraversion, and neuroticism all mediate the negative relationship between social network size and dementia diagnosis (p=0.098, p=0.054, and p < 2e-16, respectively). All personality traits are independently associated with dementia diagnosis (A: p = 0.016/ OR = 0.959; C: p = 0.000007/ OR = 0.945; E: p = 0.028/ OR = 0.961; N: p = 0.000019/ OR = 1.036; O: p = 0.027/ OR = 0.972). Only conscientiousness and neuroticism are associated with postmortem AD pathologies; specifically, conscientiousness is negatively associated (AB: p = 0.001, NT: p = 0.025) and neuroticism is positively associated with pathologies (AB: p = 0.002, NT: p = 0.002). These results support the study’s objectives, demonstrating that social network size and personality traits are strongly associated with dementia outcomes, particularly the odds of receiving a clinical diagnosis of dementia. Personality traits interact significantly and beneficially with social network size to influence the cognitive trajectory and future dementia diagnosis. These results reinforce previous literature linking social network size to dementia risk and provide novel insight into the differential roles of individual personality traits in cognitive protection.

Keywords: Alzheimer’s disease, cognitive trajectory, personality traits, social network size

Procedia PDF Downloads 127
6227 A Comparative Study on Electrical Characteristics of Au/n-SiC structure, with and Without Zn-Doped PVA Interfacial Layer at Room Temperature

Authors: M. H. Aldahrob, A. Kokce, S. Altindal, H. E. Lapa

Abstract:

In order to obtain the detailed information about the effect of (Zn-doped PVA) interfacial layer, surface states (Nss) and series resistance (Rs) on electrical characteristics, both Au/n- type 4H-SiC (MS) with and without (Zn doped PVA) interfacial layer were fabricated to compare. The main electrical parameters of them were investigated using forward and reverse bias current-voltage (I-V), capacitance-voltage (C-V) and conductance –voltage (G/W –V) measurements were performed at room temperature. Experimental results show that the value of ideality factor (n), zero –bias barrier height (ΦBo), Rs, rectifier rate (RR=IF/IR) and the density of Nss are strong functions interfacial layer and applied bias voltage. The energy distribution profile of Nss was obtained from forward bias I-V data by taking into account voltage dependent effective BH (ΦBo) and ideality factor (n(V)). Voltage dependent profile of Rs was also obtained both by using Ohm’s law and Nicollian and Brew methods. The other main diode parameters such as the concentration of doping donor atom (ND), Fermi energy level (EF).BH (ΦBo), depletion layer with (WD) were obtained by using the intercept and slope of the reverse bias C-2 vs V plots. It was found that (Zn-doped PVA) interfacial layer lead to a quite decrease in the values Nss, Rs and leakage current and increase in shunt resistance (Rsh) and RR. Therefore, we can say that the use of thin (Zn-doped PVA) interfacial layer can quite improved the performance of MS structure.

Keywords: interfacial polymer layer, thickness dependence, electric and dielectric properties, series resistance, interface state

Procedia PDF Downloads 248
6226 Extraction of Nutraceutical Bioactive Compounds from the Native Algae Using Solvents with a Deep Natural Eutectic Point and Ultrasonic-assisted Extraction

Authors: Seyedeh Bahar Hashemi, Alireza Rahimi, Mehdi Arjmand

Abstract:

Food is the source of energy and growth through the breakdown of its vital components and plays a vital role in human health and nutrition. Many natural compounds found in plant and animal materials play a special role in biological systems and the origin of many such compounds directly or indirectly is algae. Algae is an enormous source of polysaccharides and have gained much interest in human flourishing. In this study, algae biomass extraction is conducted using deep eutectic-based solvents (NADES) and Ultrasound-assisted extraction (UAE). The aim of this research is to extract bioactive compounds including total carotenoid, antioxidant activity, and polyphenolic contents. For this purpose, the influence of three important extraction parameters namely, biomass-to-solvent ratio, temperature, and time are studied with respect to their impact on the recovery of carotenoids, and phenolics, and on the extracts’ antioxidant activity. Here we employ the Response Surface Methodology for the process optimization. The influence of the independent parameters on each dependent is determined through Analysis of Variance. Our results show that Ultrasound-assisted extraction (UAE) for 50 min is the best extraction condition, and proline:lactic acid (1:1) and choline chloride:urea (1:2) extracts show the highest total phenolic contents (50.00 ± 0.70 mgGAE/gdw) and antioxidant activity [60.00 ± 1.70 mgTE/gdw, 70.00 ± 0.90 mgTE/gdw in 2.2-diphenyl-1-picrylhydrazyl (DPPH), and 2.2′-azino-bis (3-ethylbenzothiazoline-6-sulfonic acid) (ABTS)]. Our results confirm that the combination of UAE and NADES provides an excellent alternative to organic solvents for sustainable and green extraction and has huge potential for use in industrial applications involving the extraction of bioactive compounds from algae. This study is among the first attempts to optimize the effects of ultrasonic-assisted extraction, ultrasonic devices, and deep natural eutectic point and investigate their application in bioactive compounds extraction from algae. We also study the future perspective of ultrasound technology which helps to understand the complex mechanism of ultrasonic-assisted extraction and further guide its application in algae.

Keywords: natural deep eutectic solvents, ultrasound-assisted extraction, algae, antioxidant activity, phenolic compounds, carotenoids

Procedia PDF Downloads 179
6225 A Study on Human Musculoskeletal Model for Cycle Fitting: Comparison with EMG

Authors: Yoon- Ho Shin, Jin-Seung Choi, Dong-Won Kang, Jeong-Woo Seo, Joo-Hack Lee, Ju-Young Kim, Dae-Hyeok Kim, Seung-Tae Yang, Gye-Rae Tack

Abstract:

It is difficult to study the effect of various variables on cycle fitting through actual experiment. To overcome such difficulty, the forward dynamics of a musculoskeletal model was applied to cycle fitting in this study. The measured EMG data were compared with the muscle activities of the musculoskeletal model through forward dynamics. EMG data were measured from five cyclists who do not have musculoskeletal diseases during three minutes pedaling with a constant load (150 W) and cadence (90 RPM). The muscles used for the analysis were the Vastus Lateralis (VL), Tibialis Anterior (TA), Bicep Femoris (BF), and Gastrocnemius Medial (GM). Person’s correlation coefficients of the muscle activity patterns, the peak timing of the maximum muscle activities, and the total muscle activities were calculated and compared. BIKE3D model of AnyBody (Anybodytech, Denmark) was used for the musculoskeletal model simulation. The comparisons of the actual experiments with the simulation results showed significant correlations in the muscle activity patterns (VL: 0.789, TA: 0.503, BF: 0.468, GM: 0.670). The peak timings of the maximum muscle activities were distributed at particular phases. The total muscle activities were compared with the normalized muscle activities, and the comparison showed about 10% difference in the VL (+10%), TA (+9.7%), and BF (+10%), excluding the GM (+29.4%). Thus, it can be concluded that muscle activities of model & experiment showed similar results. The results of this study indicated that it was possible to apply the simulation of further improved musculoskeletal model to cycle fitting.

Keywords: musculoskeletal modeling, EMG, cycle fitting, simulation

Procedia PDF Downloads 568
6224 Optimizing the Location of Parking Areas Adapted for Dangerous Goods in the European Road Transport Network

Authors: María Dolores Caro, Eugenio M. Fedriani, Ángel F. Tenorio

Abstract:

The transportation of dangerous goods by lorries throughout Europe must be done by using the roads conforming the European Road Transport Network. In this network, there are several parking areas where lorry drivers can park to rest according to the regulations. According to the "European Agreement concerning the International Carriage of Dangerous Goods by Road", parking areas where lorries transporting dangerous goods can park to rest, must follow several security stipulations to keep safe the rest of road users. At this respect, these lorries must be parked in adapted areas with strict and permanent surveillance measures. Moreover, drivers must satisfy several restrictions about resting and driving time. Under these facts, one may expect that there exist enough parking areas for the transport of this type of goods in order to obey the regulations prescribed by the European Union and its member countries. However, the already-existing parking areas are not sufficient to cover all the stops required by drivers transporting dangerous goods. Our main goal is, starting from the already-existing parking areas and the loading-and-unloading location, to provide an optimal answer to the following question: how many additional parking areas must be built and where must they be located to assure that lorry drivers can transport dangerous goods following all the stipulations about security and safety for their stops? The sense of the word “optimal” is due to the fact that we give a global solution for the location of parking areas throughout the whole European Road Transport Network, adjusting the number of additional areas to be as lower as possible. To do so, we have modeled the problem using graph theory since we are working with a road network. As nodes, we have considered the locations of each already-existing parking area, each loading-and-unloading area each road bifurcation. Each road connecting two nodes is considered as an edge in the graph whose weight corresponds to the distance between both nodes in the edge. By applying a new efficient algorithm, we have found the additional nodes for the network representing the new parking areas adapted for dangerous goods, under the fact that the distance between two parking areas must be less than or equal to 400 km.

Keywords: trans-european transport network, dangerous goods, parking areas, graph-based modeling

Procedia PDF Downloads 280
6223 Effect of Probiotic and Prebiotic on Performance, Some Blood Parameters, and Intestine Morphology of Laying Hens

Authors: A. Zarei, M. Porkhalili, B. Gholamhosseini

Abstract:

In this experiment, sixty Hy-Line (W-36) laying hens were selected in 40weeks of age. Experimental diets were consumed for 12 weeks duration by them. The experimental design was completely randomized block included four treatments and each of them with five replications and three sample in each replicate. Treatments were as follow: Basal diet+probiotic, basal diet + prebiotic and basal diet+probiotic+ prebiotic. Performance traits were measured such as: hen production, egg weight, feed intake, feed conversion ratio ,shell thickness, shell strength, shell weight, hough unit, yolk color, and yolk cholesterol. Blood parameters like; Ca, cholesterol, triglyceride, VLDL and antibody titer and so morphological of intestine were determined. At the end of experimental period, after sampling from end of cecum, bacterial colony count was measured. Results showed; shell weight was significantly greater than other treatments in probiotic treatment.Yolk weight in prebiotic treatment was significantly greater than other treatments. The ratio of height of villi to dept of crypt cells in duodenum, jejunum, ileum and secum in prebiotic treatment were significantly greater. Results from the other traits were not significant between treatments, however there were totally good results in other traits with simultaneous usage of probiotic and prebiotic.

Keywords: probiotic, prebiotic, laying hens, performance, blood parameters, intestine morphology

Procedia PDF Downloads 322
6222 Energy Efficient Assessment of Energy Internet Based on Data-Driven Fuzzy Integrated Cloud Evaluation Algorithm

Authors: Chuanbo Xu, Xinying Li, Gejirifu De, Yunna Wu

Abstract:

Energy Internet (EI) is a new form that deeply integrates the Internet and the entire energy process from production to consumption. The assessment of energy efficient performance is of vital importance for the long-term sustainable development of EI project. Although the newly proposed fuzzy integrated cloud evaluation algorithm considers the randomness of uncertainty, it relies too much on the experience and knowledge of experts. Fortunately, the enrichment of EI data has enabled the utilization of data-driven methods. Therefore, the main purpose of this work is to assess the energy efficient of park-level EI by using a combination of a data-driven method with the fuzzy integrated cloud evaluation algorithm. Firstly, the indicators for the energy efficient are identified through literature review. Secondly, the artificial neural network (ANN)-based data-driven method is employed to cluster the values of indicators. Thirdly, the energy efficient of EI project is calculated through the fuzzy integrated cloud evaluation algorithm. Finally, the applicability of the proposed method is demonstrated by a case study.

Keywords: energy efficient, energy internet, data-driven, fuzzy integrated evaluation, cloud model

Procedia PDF Downloads 202
6221 Harmonization of Accreditation Standards in Education of Central Asian Countries: Theoretical Aspect

Authors: Yskak Nabi, Onolkan Umankulova, Ilyas Seitov

Abstract:

Tempus project about “Central Asian network for quality assurance – CANQA” had been implemented in 2009-2012. As the result of the project, two accreditation agencies were established: the agency for quality assurance in the field of education, “EdNet” in Kyrgyzstan, center of progressive technologies in Tajikistan. The importance of the research studies of the project is supported by the idea that the creation of Central-Asian network for quality assurance in education is still relevant, and results of the International forum “Global in regional: Kazakhstan in Bologna process and EU projects,” that was held in Nur-Sultan in October 2020, proves this. At the same time, the previous experience of the partnership between accreditation agencies of Central Asia shows that recommendations elaborated within the CANQA project were not theoretically justified. But there are a number of facts and arguments that prove the practical appliance of these recommendations. In this respect, joint activities of accreditation agencies of Kyrgyzstan and Kazakhstan are representative. For example, independent Kazakh agency of accreditation and rating successfully conducts accreditation of Kyrgyz universities; based on the memorandum about joint activity between the agency for quality assurance in the field of education “EdNet” (Kyrgyzstan) and Astana accreditation agency (Kazakhstan), the last one provides its experts for accreditation procedures in EdNet. Exchange of experience among the agencies shows an effective approach towards adaptation of European standards to the reality of education systems of Central Asia with consideration of not only a legal framework but also from the point of European practices view. Therefore, the relevance of the research is identified as there is a practical partnership between accreditation agencies of Central Asian countries, but the absence of theoretical justification of integrational processes in the accreditation field. As a result, the following hypothesis was put forward: “if to develop theoretical aspects for harmonization of accreditation standards, then integrational processes would be improved since the implementation of Bologna process principles would be supported with wider possibilities, and particularly, students and academic mobility would be improved.” Indeed, for example, in Kazakhstan, the total share of foreign students was 5,04% in 2020, and most of them are coming from Kyrgyzstan, Tajikistan, and Uzbekistan, and if integrational processes will be improved, then this share can increase.

Keywords: accreditation standards in education, Central Asian countries, pedagogical theory, model

Procedia PDF Downloads 199
6220 Analysis and Design Modeling for Next Generation Network Intrusion Detection and Prevention System

Authors: Nareshkumar Harale, B. B. Meshram

Abstract:

The continued exponential growth of successful cyber intrusions against today’s businesses has made it abundantly clear that traditional perimeter security measures are no longer adequate and effective. We evolved the network trust architecture from trust-untrust to Zero-Trust, With Zero Trust, essential security capabilities are deployed in a way that provides policy enforcement and protection for all users, devices, applications, data resources, and the communications traffic between them, regardless of their location. Information exchange over the Internet, in spite of inclusion of advanced security controls, is always under innovative, inventive and prone to cyberattacks. TCP/IP protocol stack, the adapted standard for communication over network, suffers from inherent design vulnerabilities such as communication and session management protocols, routing protocols and security protocols are the major cause of major attacks. With the explosion of cyber security threats, such as viruses, worms, rootkits, malwares, Denial of Service attacks, accomplishing efficient and effective intrusion detection and prevention is become crucial and challenging too. In this paper, we propose a design and analysis model for next generation network intrusion detection and protection system as part of layered security strategy. The proposed system design provides intrusion detection for wide range of attacks with layered architecture and framework. The proposed network intrusion classification framework deals with cyberattacks on standard TCP/IP protocol, routing protocols and security protocols. It thereby forms the basis for detection of attack classes and applies signature based matching for known cyberattacks and data mining based machine learning approaches for unknown cyberattacks. Our proposed implemented software can effectively detect attacks even when malicious connections are hidden within normal events. The unsupervised learning algorithm applied to network audit data trails results in unknown intrusion detection. Association rule mining algorithms generate new rules from collected audit trail data resulting in increased intrusion prevention though integrated firewall systems. Intrusion response mechanisms can be initiated in real-time thereby minimizing the impact of network intrusions. Finally, we have shown that our approach can be validated and how the analysis results can be used for detecting and protection from the new network anomalies.

Keywords: network intrusion detection, network intrusion prevention, association rule mining, system analysis and design

Procedia PDF Downloads 227
6219 Adequate Nutritional Support and Monitoring in Post-Traumatic High Output Duodenal Fistula

Authors: Richa Jaiswal, Vidisha Sharma, Amulya Rattan, Sushma Sagar, Subodh Kumar, Amit Gupta, Biplab Mishra, Maneesh Singhal

Abstract:

Background: Adequate nutritional support and daily patient monitoring have an independent therapeutic role in the successful management of high output fistulae and early recovery after abdominal trauma. Case presentation: An 18-year-old girl was brought to AIIMS emergency with alleged history of fall of a heavy weight (electric motor) over abdomen. She was evaluated as per Advanced Trauma Life Support(ATLS) protocols and diagnosed to have significant abdominal trauma. After stabilization, she was referred to Trauma center. Abdomen was guarded and focused assessment with sonography for trauma(FAST) was found positive. Complete duodenojejunal(DJ) junction transection was found at laparotomy, and end-to-end repair was done. However, patient was re-explored in view of biliary peritonitis on post-operative day3, and anastomotic leak was found with sloughing of duodenal end. Resection of non-viable segments was done followed by side-to-side anastomosis. Unfortunately, the anastomosis leaked again, this time due to a post-anastomotic kink, diagnosed on dye study. Due to hostile abdomen, the patient was planned for supportive care, with plan of build-up and delayed definitive surgery. Percutaneous transheptic biliary drainage (PTBD) and STSG were required in the course as well. Nutrition: In intensive care unit (ICU), major goals of nutritional therapy were to improve wound healing, optimize nutrition, minimize enteral feed associated complications, reduce biliary fistula output, and prepare the patient for definitive surgeries. Feeding jejunostomy (FJ) was started from day 4 at the rate of 30ml/h along with total parenteral nutrition (TPN) and intra-venous (IV) micronutrients support. Due to high bile output, bile refeed started from day 13.After 23 days of ICU stay, patient was transferred to general ward with body mass index (BMI)<11kg/m2 and serum albumin –1.5gm%. Patient was received in the ward in catabolic phase with high risk of refeeding syndrome. Patient was kept on FJ bolus feed at the rate of 30–50 ml/h. After 3–4 days, while maintaining patient diet book log it was observed that patient use to refuse feed at night and started becoming less responsive with every passing day. After few minutes of conversation with the patient for a couple of days, she complained about enteral feed discharge in urine, mild pain and sign of dumping syndrome. Dye study was done, which ruled out any enterovesical fistula and conservative management were planned. At this time, decision was taken for continuous slow rate feeding through commercial feeding pump at the rate of 2–3ml/min. Drastic improvement was observed from the second day in gastro-intestinal symptoms and general condition of the patient. Nutritional composition of feed, TPN and diet ranged between 800 and 2100 kcal and 50–95 g protein. After STSG, TPN was stopped. Periodic diet counselling was given to improve oral intake. At the time of discharge, serum albumin level was 2.1g%, weight – 38.6, BMI – 15.19 kg/m2. Patient got discharge on an oral diet. Conclusion: Successful management of post-traumatic proximal high output fistulae is a challenging task, due to impaired nutrient absorption and enteral feed associated complications. Strategic- and goal-based nutrition support can salvage such critically ill patients, as demonstrated in the present case.

Keywords: nutritional monitoring, nutritional support, duodenal fistula, abdominal trauma

Procedia PDF Downloads 261
6218 Description of the Non-Iterative Learning Algorithm of Artificial Neuron

Authors: B. S. Akhmetov, S. T. Akhmetova, A. I. Ivanov, T. S. Kartbayev, A. Y. Malygin

Abstract:

The problem of training of a network of artificial neurons in biometric appendices is that this process has to be completely automatic, i.e. the person operator should not participate in it. Therefore, this article discusses the issues of training the network of artificial neurons and the description of the non-iterative learning algorithm of artificial neuron.

Keywords: artificial neuron, biometrics, biometrical applications, learning of neuron, non-iterative algorithm

Procedia PDF Downloads 494
6217 Language Development and Growing Spanning Trees in Children Semantic Network

Authors: Somayeh Sadat Hashemi Kamangar, Fatemeh Bakouie, Shahriar Gharibzadeh

Abstract:

In this study, we target to exploit Maximum Spanning Trees (MST) of children's semantic networks to investigate their language development. To do so, we examine the graph-theoretic properties of word-embedding networks. The networks are made of words children learn prior to the age of 30 months as the nodes and the links which are built from the cosine vector similarity of words normatively acquired by children prior to two and a half years of age. These networks are weighted graphs and the strength of each link is determined by the numerical similarities of the two words (nodes) on the sides of the link. To avoid changing the weighted networks to the binaries by setting a threshold, constructing MSTs might present a solution. MST is a unique sub-graph that connects all the nodes in such a way that the sum of all the link weights is maximized without forming cycles. MSTs as the backbone of the semantic networks are suitable to examine developmental changes in semantic network topology in children. From these trees, several parameters were calculated to characterize the developmental change in network organization. We showed that MSTs provides an elegant method sensitive to capture subtle developmental changes in semantic network organization.

Keywords: maximum spanning trees, word-embedding, semantic networks, language development

Procedia PDF Downloads 145
6216 Training of Future Computer Science Teachers Based on Machine Learning Methods

Authors: Meruert Serik, Nassipzhan Duisegaliyeva, Danara Tleumagambetova

Abstract:

The article highlights and describes the characteristic features of real-time face detection in images and videos using machine learning algorithms. Students of educational programs reviewed the research work "6B01511-Computer Science", "7M01511-Computer Science", "7M01525- STEM Education," and "8D01511-Computer Science" of Eurasian National University named after L.N. Gumilyov. As a result, the advantages and disadvantages of Haar Cascade (Haar Cascade OpenCV), HoG SVM (Histogram of Oriented Gradients, Support Vector Machine), and MMOD CNN Dlib (Max-Margin Object Detection, convolutional neural network) detectors used for face detection were determined. Dlib is a general-purpose cross-platform software library written in the programming language C++. It includes detectors used for determining face detection. The Cascade OpenCV algorithm is efficient for fast face detection. The considered work forms the basis for the development of machine learning methods by future computer science teachers.

Keywords: algorithm, artificial intelligence, education, machine learning

Procedia PDF Downloads 73
6215 Technologic Information about Photovoltaic Applied in Urban Residences

Authors: Stephanie Fabris Russo, Daiane Costa Guimarães, Jonas Pedro Fabris, Maria Emilia Camargo, Suzana Leitão Russo, José Augusto Andrade Filho

Abstract:

Among renewable energy sources, solar energy is the one that has stood out. Solar radiation can be used as a thermal energy source and can also be converted into electricity by means of effects on certain materials, such as thermoelectric and photovoltaic panels. These panels are often used to generate energy in homes, buildings, arenas, etc., and have low pollution emissions. Thus, a technological prospecting was performed to find patents related to the use of photovoltaic plates in urban residences. The patent search was based on ESPACENET, associating the keywords photovoltaic and home, where we found 136 patent documents in the period of 1994-2015 in the fields title and abstract. Note that the years 2009, 2010, 2011, 2012, 2013 and 2014 had the highest number of applicants, with respectively, 11, 13, 23, 29, 15 and 21. Regarding the country that deposited about this technology, it is clear that China leads with 67 patent deposits, followed by Japan with 38 patents applications. It is important to note that most depositors, 50% are companies, 44% are individual inventors and only 6% are universities. On the International Patent classification (IPC) codes, we noted that the most present classification in results was H02J3/38, which represents provisions in parallel to feed a single network by two or more generators, converters or transformers. Among all categories, there is the H session, which means Electricity, with 70% of the patents.

Keywords: photovoltaic, urban residences, technology forecasting, prospecting

Procedia PDF Downloads 300
6214 Scheduling Nodes Activity and Data Communication for Target Tracking in Wireless Sensor Networks

Authors: AmirHossein Mohajerzadeh, Mohammad Alishahi, Saeed Aslishahi, Mohsen Zabihi

Abstract:

In this paper, we consider sensor nodes with the capability of measuring the bearings (relative angle to the target). We use geometric methods to select a set of observer nodes which are responsible for collecting data from the target. Considering the characteristics of target tracking applications, it is clear that significant numbers of sensor nodes are usually inactive. Therefore, in order to minimize the total network energy consumption, a set of sensor nodes, called sentinel, is periodically selected for monitoring, controlling the environment and transmitting data through the network. The other nodes are inactive. Furthermore, the proposed algorithm provides a joint scheduling and routing algorithm to transmit data between network nodes and the fusion center (FC) in which not only provides an efficient way to estimate the target position but also provides an efficient target tracking. Performance evaluation confirms the superiority of the proposed algorithm.

Keywords: coverage, routing, scheduling, target tracking, wireless sensor networks

Procedia PDF Downloads 378
6213 Efficiency of Natural Metabolites on Quality Milk Production in Mixed Breed Cows.

Authors: Mariam Azam, Sajjad Ur Rahman, Mukarram Bashir, Muhammad Tahir, Seemal Javaid, Jawad, Aoun Muhammad, Muhammad Zohaib, Hannan Khan

Abstract:

Products of microbial origin are of great importance as they have proved their value in healthcare and nutrition, use of these microbial metabolites acquired from partially fermented soya hulls and wheat bran along with Saccharomyces cerevisiae (DL-22 S/N) substantiates to be a great source for an increase in the total milk production and quality yield.1×109 CFU/ml cells of Saccharomyces cerevisiae (DL-22 S/N) were further grown under in-vivo conditions for the assessment of quality milk production. Two groups with twelve cows, each having the same physical characteristics (Group A and Group B), were under study, Group A was daily fed with 12gm of biological metabolites and 22% protein-pelleted feed. On the other hand, the animals of Group B were provided with no metabolites in their feed. In thirty days of trial, improvement in the overall health, body score, milk protein, milk fat, yield, incidence rate of mastitis, ash, and solid not fat (SNF) was observed. The collected data showed that the average quality milk production was elevated up to 0.45 liter/h/d. However, a reduction in the milk fats up to 0.45% and uplift in the SNF value up to 0.53% of cow milk was also observed. At the same time, the incidence rate of mastitis recorded for the animals under trial was reduced to half, and improved non specific immunity was reported.

Keywords: microbial metabolites, post-biotics, animal supplements, animal nutrition, proteins, animal production, fermentation

Procedia PDF Downloads 101
6212 The Contribution of the Livestock Marketing Programme in Improving Household Food Security in Communal Areas of Umzimkhulu Local Municipality, Kwa-Zulu Natal

Authors: Sibongiseni Peacock, Denver Naidoo, Sikhalazo Dube

Abstract:

The study investigates the impact of the National Red Meat Development Programme on household food security in rural areas of uMzimkhulu. Self-administered questionnaires were employed to gather data from 77 smallholder beef farmers participating in the St. Paul feedlot project. Data analysis utilized the Household Food Insecurity Access Scale (HFIAS) developed by USAID to assess the household food security status of St. Paul feedlot beneficiaries, with descriptive statistics employed for result analysis. Findings indicate that the majority (80.50%) of beneficiaries experienced food insecurity, while (19.50%) were classified as food secure, with most participants falling within the category of moderate food insecurity. Food insecurity predominantly stemmed from challenges faced by farmers unable to sell their cattle or whose cattle were not market-ready due to bureaucratic obstacles hindering the programme. Farmers identified feed shortages as the primary constraint, resulting in missed income opportunities. These findings underscore the critical need to address feed challenges and bureaucratic barriers to enhance the efficacy of the National Red Meat Development Programme in promoting household food security in rural areas.

Keywords: National Red Meat Development, household food security, St. Paul feedlot, livestock, HFIAS

Procedia PDF Downloads 55
6211 Efficient Rehearsal Free Zero Forgetting Continual Learning Using Adaptive Weight Modulation

Authors: Yonatan Sverdlov, Shimon Ullman

Abstract:

Artificial neural networks encounter a notable challenge known as continual learning, which involves acquiring knowledge of multiple tasks over an extended period. This challenge arises due to the tendency of previously learned weights to be adjusted to suit the objectives of new tasks, resulting in a phenomenon called catastrophic forgetting. Most approaches to this problem seek a balance between maximizing performance on the new tasks and minimizing the forgetting of previous tasks. In contrast, our approach attempts to maximize the performance of the new task, while ensuring zero forgetting. This is accomplished through the introduction of task-specific modulation parameters for each task, and only these parameters are learned for the new task, after a set of initial tasks have been learned. Through comprehensive experimental evaluations, our model demonstrates superior performance in acquiring and retaining novel tasks that pose difficulties for other multi-task models. This emphasizes the efficacy of our approach in preventing catastrophic forgetting while accommodating the acquisition of new tasks.

Keywords: continual learning, life-long learning, neural analogies, adaptive modulation

Procedia PDF Downloads 70
6210 Leveraging Li-Fi to Enhance Security and Performance of Medical Devices

Authors: Trevor Kroeger, Hayden Williams, Edward Holzinger, David Coleman, Brian Haberman

Abstract:

The network connectivity of medical devices is increasing at a rapid rate. Many medical devices, such as vital sign monitors, share information via wireless or wired connections. However, these connectivity options suffer from a variety of well-known limitations. Wireless connectivity, especially in the unlicensed radio frequency bands, can be disrupted. Such disruption could be due to benign reasons, such as a crowded spectrum, or to malicious intent. While wired connections are less susceptible to interference, they inhibit the mobility of the medical devices, which could be critical in a variety of scenarios. This work explores the application of Light Fidelity (Li-Fi) communication to enhance the security, performance, and mobility of medical devices in connected healthcare scenarios. A simple bridge for connected devices serves as an avenue to connect traditional medical devices to the Li-Fi network. This bridge was utilized to conduct bandwidth tests on a small Li-Fi network installed into a Mock-ICU setting with a backend enterprise network similar to that of a hospital. Mobile and stationary tests were conducted to replicate various different situations that might occur within a hospital setting. Results show that in room Li-Fi connectivity provides reasonable bandwidth and latency within a hospital like setting.

Keywords: hospital, light fidelity, Li-Fi, medical devices, security

Procedia PDF Downloads 102
6209 Sinhala Sign Language to Grammatically Correct Sentences using NLP

Authors: Anjalika Fernando, Banuka Athuraliya

Abstract:

This paper presents a comprehensive approach for converting Sinhala Sign Language (SSL) into grammatically correct sentences using Natural Language Processing (NLP) techniques in real-time. While previous studies have explored various aspects of SSL translation, the research gap lies in the absence of grammar checking for SSL. This work aims to bridge this gap by proposing a two-stage methodology that leverages deep learning models to detect signs and translate them into coherent sentences, ensuring grammatical accuracy. The first stage of the approach involves the utilization of a Long Short-Term Memory (LSTM) deep learning model to recognize and interpret SSL signs. By training the LSTM model on a dataset of SSL gestures, it learns to accurately classify and translate these signs into textual representations. The LSTM model achieves a commendable accuracy rate of 94%, demonstrating its effectiveness in accurately recognizing and translating SSL gestures. Building upon the successful recognition and translation of SSL signs, the second stage of the methodology focuses on improving the grammatical correctness of the translated sentences. The project employs a Neural Machine Translation (NMT) architecture, consisting of an encoder and decoder with LSTM components, to enhance the syntactical structure of the generated sentences. By training the NMT model on a parallel corpus of Sinhala wrong sentences and their corresponding grammatically correct translations, it learns to generate coherent and grammatically accurate sentences. The NMT model achieves an impressive accuracy rate of 98%, affirming its capability to produce linguistically sound translations. The proposed approach offers significant contributions to the field of SSL translation and grammar correction. Addressing the critical issue of grammar checking, it enhances the usability and reliability of SSL translation systems, facilitating effective communication between hearing-impaired and non-sign language users. Furthermore, the integration of deep learning techniques, such as LSTM and NMT, ensures the accuracy and robustness of the translation process. This research holds great potential for practical applications, including educational platforms, accessibility tools, and communication aids for the hearing-impaired. Furthermore, it lays the foundation for future advancements in SSL translation systems, fostering inclusive and equal opportunities for the deaf community. Future work includes expanding the existing datasets to further improve the accuracy and generalization of the SSL translation system. Additionally, the development of a dedicated mobile application would enhance the accessibility and convenience of SSL translation on handheld devices. Furthermore, efforts will be made to enhance the current application for educational purposes, enabling individuals to learn and practice SSL more effectively. Another area of future exploration involves enabling two-way communication, allowing seamless interaction between sign-language users and non-sign-language users.In conclusion, this paper presents a novel approach for converting Sinhala Sign Language gestures into grammatically correct sentences using NLP techniques in real time. The two-stage methodology, comprising an LSTM model for sign detection and translation and an NMT model for grammar correction, achieves high accuracy rates of 94% and 98%, respectively. By addressing the lack of grammar checking in existing SSL translation research, this work contributes significantly to the development of more accurate and reliable SSL translation systems, thereby fostering effective communication and inclusivity for the hearing-impaired community

Keywords: Sinhala sign language, sign Language, NLP, LSTM, NMT

Procedia PDF Downloads 104
6208 Poster : Incident Signals Estimation Based on a Modified MCA Learning Algorithm

Authors: Rashid Ahmed , John N. Avaritsiotis

Abstract:

Many signal subspace-based approaches have already been proposed for determining the fixed Direction of Arrival (DOA) of plane waves impinging on an array of sensors. Two procedures for DOA estimation based neural networks are presented. First, Principal Component Analysis (PCA) is employed to extract the maximum eigenvalue and eigenvector from signal subspace to estimate DOA. Second, minor component analysis (MCA) is a statistical method of extracting the eigenvector associated with the smallest eigenvalue of the covariance matrix. In this paper, we will modify a Minor Component Analysis (MCA(R)) learning algorithm to enhance the convergence, where a convergence is essential for MCA algorithm towards practical applications. The learning rate parameter is also presented, which ensures fast convergence of the algorithm, because it has direct effect on the convergence of the weight vector and the error level is affected by this value. MCA is performed to determine the estimated DOA. Preliminary results will be furnished to illustrate the convergences results achieved.

Keywords: Direction of Arrival, neural networks, Principle Component Analysis, Minor Component Analysis

Procedia PDF Downloads 451