Search results for: dual-SLA indicators for computing force applications
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 10779

Search results for: dual-SLA indicators for computing force applications

8019 E-Hailing Taxi Industry Management Mode Innovation Based on the Credit Evaluation

Authors: Yuan-lin Liu, Ye Li, Tian Xia

Abstract:

There are some shortcomings in Chinese existing taxi management modes. This paper suggests to establish the third-party comprehensive information management platform and put forward an evaluation model based on credit. Four indicators are used to evaluate the drivers’ credit, they are passengers’ evaluation score, driving behavior evaluation, drivers’ average bad record number, and personal credit score. A weighted clustering method is used to achieve credit level evaluation for taxi drivers. The management of taxi industry is based on the credit level, while the grade of the drivers is accorded to their credit rating. Credit rating determines the cost, income levels, the market access, useful period of license and the level of wage and bonus, as well as violation fine. These methods can make the credit evaluation effective. In conclusion, more credit data will help to set up a more accurate and detailed classification standard library.

Keywords: credit, mobile internet, e-hailing taxi, management mode, weighted cluster

Procedia PDF Downloads 325
8018 Analyzing Extended Reality Technologies for Human Space Exploration

Authors: Morgan Kuligowski, Marientina Gotsis

Abstract:

Extended reality (XR) technologies share an intertwined history with spaceflight and innovation. New advancements in XR technologies offer expanding possibilities to advance the future of human space exploration with increased crew autonomy. This paper seeks to identify implementation gaps between existing and proposed XR space applications to inform future mission planning. A review of virtual reality, augmented reality, and mixed reality technologies implemented aboard the International Space Station revealed a total of 16 flown investigations. A secondary set of ground-tested XR human spaceflight applications were systematically retrieved from literature sources. The two sets of XR technologies, those flown and those existing in the literature were analyzed to characterize application domains and device types. Comparisons between these groups revealed untapped application areas for XR to support crew psychological health, in-flight training, and extravehicular operations on future flights. To fill these roles, integrating XR technologies with advancements in biometric sensors and machine learning tools is expected to transform crew capabilities.

Keywords: augmented reality, extended reality, international space station, mixed reality, virtual reality

Procedia PDF Downloads 216
8017 Investigation of Chord Protocol in Peer to Peer Wireless Mesh Network with Mobility

Authors: P. Prasanna Murali Krishna, M. V. Subramanyam, K. Satya Prasad

Abstract:

File sharing in networks are generally achieved using Peer-to-Peer (P2P) applications. Structured P2P approaches are widely used in adhoc networks due to its distributed and scalability features. Efficient mechanisms are required to handle the huge amount of data distributed to all peers. The intrinsic characteristics of P2P system makes for easier content distribution when compared to client-server architecture. All the nodes in a P2P network act as both client and server, thus, distributing data takes lesser time when compared to the client-server method. CHORD protocol is a resource routing based where nodes and data items are structured into a 1- dimensional ring. The structured lookup algorithm of Chord is advantageous for distributed P2P networking applications. Though, structured approach improves lookup performance in a high bandwidth wired network it could contribute to unnecessary overhead in overlay networks leading to degradation of network performance. In this paper, the performance of existing CHORD protocol on Wireless Mesh Network (WMN) when nodes are static and dynamic is investigated.

Keywords: wireless mesh network (WMN), structured P2P networks, peer to peer resource sharing, CHORD Protocol, DHT

Procedia PDF Downloads 480
8016 Stock Price Prediction with 'Earnings' Conference Call Sentiment

Authors: Sungzoon Cho, Hye Jin Lee, Sungwhan Jeon, Dongyoung Min, Sungwon Lyu

Abstract:

Major public corporations worldwide use conference calls to report their quarterly earnings. These 'earnings' conference calls allow for questions from stock analysts. We investigated if it is possible to identify sentiment from the call script and use it to predict stock price movement. We analyzed call scripts from six companies, two each from Korea, China and Indonesia during six years 2011Q1 – 2017Q2. Random forest with Frequency-based sentiment scores using Loughran MacDonald Dictionary did better than control model with only financial indicators. When the stock prices went up 20 days from earnings release, our model predicted correctly 77% of time. When the model predicted 'up,' actual stock prices went up 65% of time. This preliminary result encourages us to investigate advanced sentiment scoring methodologies such as topic modeling, auto-encoder, and word2vec variants.

Keywords: earnings call script, random forest, sentiment analysis, stock price prediction

Procedia PDF Downloads 292
8015 Gas Sweetening Process Simulation: Investigation on Recovering Waste Hydraulic Energy

Authors: Meisam Moghadasi, Hassan Ali Ozgoli, Foad Farhani

Abstract:

In this research, firstly, a commercial gas sweetening unit with methyl-di-ethanol-amine (MDEA) solution is simulated and comprised in an integrated model in accordance with Aspen HYSYS software. For evaluation purposes, in the second step, the results of the simulation are compared with operating data gathered from South Pars Gas Complex (SPGC). According to the simulation results, the considerable energy potential contributed to the pressure difference between absorber and regenerator columns causes this energy driving force to be applied in power recovery turbine (PRT). In the last step, the amount of waste hydraulic energy is calculated, and its recovery methods are investigated.

Keywords: gas sweetening unit, simulation, MDEA, power recovery turbine, waste-to-energy

Procedia PDF Downloads 178
8014 The Driving Force for Taiwan Social Innovation Business Model Transformation: A Case Study of Social Innovation Internet Celebrity Training Project

Authors: Shih-Jie Ma, Jui-Hsu Hsiao, Ming-Ying Hsieh, Shin-Yan Yang, Chun-Han Yeh, Kuo-Chun Su

Abstract:

In Taiwan, social enterprises and non-profit organizations (NPOs) are not familiar with innovative business models, such as live streaming. In 2019, a brand new course called internet celebrity training project is introduced to them by the Social Innovation Lab. The Goal of this paper is to evaluate the effect of this project, to explore the role of new technology (internet live stream) in business process management (BPM), and to analyze how live stream programs can assist social enterprises in creating new business models. Social Innovation, with the purpose to solve social issues in innovative ways, is one of the most popular topics in the world. Social Innovation Lab was established in 2017 by Executive Yuan in Taiwan. The vision of Social Innovation Lab is to exploit technology, innovation and experimental methods to solve social issues, and to maximize the benefits from government investment. Social Innovation Lab aims at creating a platform for both supply and demand sides of social issues, to make social enterprises and start-ups communicate with each other, and to build an eco-system in which stakeholders can make a social impact. Social Innovation Lab keeps helping social enterprises and NPOs to gain better publicity and to enhance competitiveness by facilitating digital transformation. In this project, Social Innovation Lab exerted the influence of social media such as YouTube and Facebook, to make social enterprises and start-ups adjust their business models by using the live stream of social media, which becomes one of the tools to expand their market and diversify their sales channels. Internet live stream training courses were delivered in different regions of Taiwan in 2019, including Taitung, Taichung, Kaohsiung and Hualien. Through these courses, potential groups and enterprises were cultivated to become so-called internet celebrities. With their concern about social issues in mind, these internet celebrities know how to manipulate social media to make a social impact in different fields, such as aboriginal people, food and agriculture, LOHAS (Lifestyles of Health and Sustainability), environmental protection and senior citizens. Participants of live stream training courses in Taiwan are selected to take in-depth interviews and questionnaire surveys. Results indicate that the digital transformation process of social enterprises and NPOs can be successful by implementing business process reengineering, a significant change made by social innovation internet celebrities. Therefore, this project can be the new driving force to facilitate the business model transformation in Taiwan.

Keywords: business process management, digital transformation, live stream, social innovation

Procedia PDF Downloads 146
8013 Peaceful Coexistence with Non-Muslims from the Perspective of Quran

Authors: Mohsen Nouraei

Abstract:

Peaceful coexistence with other religions is one of the most important matters raised the issue of religious diversity. Some people believe that the Quranic policy about the non-Muslims is based on the war and regard the reason of the progress of Islam in the early centuries as based on sword force. This article, which is written in a descriptive and analytical method, investigates this claim and evaluates it with the teachings and instructions of the Quran. The result of this paper shows that not only the teachings of the Quran do not cause the problems, but also The Quranic verses has obligated the Muslims to interact peacefully with their doctrinal opponents and exercise justice in this regard. This paper shows that the principle of interaction with non-Muslims is based on peace and coexistence, and Islam is the inspirer of religious coexistence with the followers of other religions.

Keywords: Quran, peace, religious coexistence, Christians, Jewish

Procedia PDF Downloads 418
8012 Understanding How Money Laundering and Financing of Terrorism Are Conducted through the Real Estate Sector in the Middle East and North Africa Region

Authors: Haytham Yassine

Abstract:

This research seeks to identify how money laundering activities are executed through the real estate sector. This article provides academics with literature on the topic and provides scholars, and practitioners with a better understanding of the risks and challenges involved. Data are gathered through survey in the Middle East and North Africa region and review of the available research. The results of the analysis will help identifying the factors attracting criminals to the real estate sector and develop an understanding of the methods used to launder illicit funds through this sector and the indicators of suspicion for reporting entities. Further analysis reveals the risks posed by money laundering and terrorist financing on the real estate sector and challenges facing states in this regard.

Keywords: money laundering, terrorism financing, real estate sector, Middle East and North Africa

Procedia PDF Downloads 158
8011 Effect of Alkalinity of Water on the Aggregation of Colloidal Silver Nanoparticles

Authors: Fedda Y. Alzoubi, Ihsan A. Aljarrah

Abstract:

Silver nanoparticles (AgNPs) are one of the most vital and fascinating nanomaterials among several metallic nanoparticles that are involved in different applications, especially in biomedical applications. Samples of different alkaline water were prepared in order to study the effect of alkalinity of water on the optical properties, size, and morphology of colloidal AgNPs prepared according to the chemical reduction method using the prepared water samples. Ultraviolet-Visible spectrophotometer, Zeta-sizer, and Scanning electron microscope (SEM) have been utilized to carry out this study. Absorption spectra AgNPs in different alkaline water show a surface Plasmon resonance (SPR) peak at the wavelength of 420 nm. The position of this peak is sensitive to the shape of the particles, and in our case, it indicates that the particles are spherical. As the alkalinity increases, the intensity of the SPR peak decreases, indicating the aggregation of particles. Zeta-sizer measurements show that the average diameter for AgNPs in pure water is found to be 53.51 nm, and this value increases as the alkalinity increases. Zeta potential values of samples show that the negatively coated particles are stable in the solution. SEM images insure the spherical shape of the prepared nanoparticles and show that as the alkalinity increases the particles aggregate into larger particles.

Keywords: aggregation, alkalinity, colloid, nanoparticle

Procedia PDF Downloads 127
8010 An Efficient Discrete Chaos in Generalized Logistic Maps with Applications in Image Encryption

Authors: Ashish Ashish

Abstract:

In the last few decades, the discrete chaos of difference equations has gained a massive attention of academicians and scholars due to its tremendous applications in each and every branch of science, such as cryptography, traffic control models, secure communications, weather forecasting, and engineering. In this article, a generalized logistic discrete map is established and discrete chaos is reported through period doubling bifurcation, period three orbit and Lyapunov exponent. It is interesting to see that the generalized logistic map exhibits superior chaos due to the presence of an extra degree of freedom of an ordered parameter. The period doubling bifurcation and Lyapunov exponent are demonstrated for some particular values of parameter and the discrete chaos is determined in the sense of Devaney's definition of chaos theoretically as well as numerically. Moreover, the study discusses an extended chaos based image encryption and decryption scheme in cryptography using this novel system. Surprisingly, a larger key space for coding and more sensitive dependence on initial conditions are examined for encryption and decryption of text messages, images and videos which secure the system strongly from external cyber attacks, coding attacks, statistic attacks and differential attacks.

Keywords: chaos, period-doubling, logistic map, Lyapunov exponent, image encryption

Procedia PDF Downloads 154
8009 An Agent-Based Modeling and Simulation of Human Muscle

Authors: Sina Saadati, Mohammadreza Razzazi

Abstract:

In this article, we have tried to present an agent-based model of human muscle. A suitable model of muscle is necessary for the analysis of mankind's movements. It can be used by clinical researchers who study the influence of motion sicknesses, like Parkinson's disease. It is also useful in the development of a prosthesis that receives the electromyography signals and generates force as a reaction. Since we have focused on computational efficiency in this research, the model can compute the calculations very fast. As far as it concerns prostheses, the model can be known as a charge-efficient method. In this paper, we are about to illustrate an agent-based model. Then, we will use it to simulate the human gait cycle. This method can also be done reversely in the analysis of gait in motion sicknesses.

Keywords: agent-based modeling and simulation, human muscle, gait cycle, motion sickness

Procedia PDF Downloads 114
8008 Critical Evaluation of Key Performance Indicators in Procurement Management Information System: In Case of Bangladesh

Authors: Qazi Mahdia Ghyas

Abstract:

Electronic Government Procurement (e-GP) has implemented in Bangladesh to ensure the good Governance. e-GP has transformed Bangladesh's procurement process electronically. But, to our best knowledge, there is no study to understand the key features of e-GP in Bangladesh. So, this study tries to identify the features of performance improvement after implementing an e-GP system that will help for further improvements. Data was collected from the PROMIS Overall Report (Central Procurement Technical Unit website) for the financial year from Q1 _July- Sep 2015-16 to Q4 _Apr- Jun 2021-22. This study did component factor analysis on KPIs and found nineteen KPIs that are statistically significant and represent time savings, efficiency, accountability, anti-corruption and compliance key features in procurement activities of e-GP. Based on the analysis, some practical measures have been recommended for better improvement of e-GP. This study has some limitations. Because of having multicollinearity issues, all the 42 KPIs (except 19) did not show a good fit for component factor analysis.

Keywords: public procurement, electronic government procurement, KPI, performance evaluation

Procedia PDF Downloads 95
8007 Modeling of Austenitic Stainless Steel during Face Milling Using Response Surface Methodology

Authors: A. A. Selaimia, H. Bensouilah, M. A. Yallese, I. Meddour, S. Belhadi, T. Mabrouki

Abstract:

The objective of this work is to model the output responses namely; surface roughness (Ra), cutting force (Fc), during the face milling of the austenitic stainless steel X2CrNi18-9 with coated carbide tools (GC4040). For raison, response surface methodology (RMS) is used to determine the influence of each technological parameter. A full factorial design (L27) is chosen for the experiments, and the ANOVA is used in order to evaluate the influence of the technological cutting parameters namely; cutting speed (Vc), feed per tooth, and depth of cut (ap) on the out-put responses. The results reveal that (Ra) is mostly influenced by (fz) and (Fc) is found considerably affected by (ap).

Keywords: austenitic stainless steel, ANOVA, coated carbide, response surface methodology (RSM)

Procedia PDF Downloads 370
8006 Evaluation of Environmental, Technical, and Economic Indicators of a Fused Deposition Modeling Process

Authors: M. Yosofi, S. Ezeddini, A. Ollivier, V. Lavaste, C. Mayousse

Abstract:

Additive manufacturing processes have changed significantly in a wide range of industries and their application progressed from rapid prototyping to production of end-use products. However, their environmental impact is still a rather open question. In order to support the growth of this technology in the industrial sector, environmental aspects should be considered and predictive models may help monitor and reduce the environmental footprint of the processes. This work presents predictive models based on a previously developed methodology for the environmental impact evaluation combined with a technical and economical assessment. Here we applied the methodology to the Fused Deposition Modeling process. First, we present the predictive models relative to different types of machines. Then, we present a decision-making tool designed to identify the optimum manufacturing strategy regarding technical, economic, and environmental criteria.

Keywords: additive manufacturing, decision-makings, environmental impact, predictive models

Procedia PDF Downloads 131
8005 Secure Image Retrieval Based on Orthogonal Decomposition under Cloud Environment

Authors: Y. Xu, L. Xiong, Z. Xu

Abstract:

In order to protect data privacy, image with sensitive or private information needs to be encrypted before being outsourced to the cloud. However, this causes difficulties in image retrieval and data management. A secure image retrieval method based on orthogonal decomposition is proposed in the paper. The image is divided into two different components, for which encryption and feature extraction are executed separately. As a result, cloud server can extract features from an encrypted image directly and compare them with the features of the queried images, so that the user can thus obtain the image. Different from other methods, the proposed method has no special requirements to encryption algorithms. Experimental results prove that the proposed method can achieve better security and better retrieval precision.

Keywords: secure image retrieval, secure search, orthogonal decomposition, secure cloud computing

Procedia PDF Downloads 485
8004 Modeling and Characterization of the SiC Single Crystal Growth Process

Authors: T. Wejrzanowski, M. Grybczuk, E. Tymicki, K. J. Kurzydlowski

Abstract:

In the present study numerical simulations silicon carbide single crystal growth process in Physical Vapor Transport reactor are addressed. Silicon Carbide is a perspective material for many applications in modern electronics. One of the main challenges for wider applications of SiC is high price of high quality mono crystals. Improvement of silicon carbide manufacturing process has a significant influence on the product price. Better understanding of crystal growth allows for optimization of the process, and it can be achieved by numerical simulations. In this work Virtual Reactor software was used to simulate the process. Predicted geometrical properties of the final product and information about phenomena occurring inside process reactor were obtained. The latter is especially valuable because reactor chamber is inaccessible during the process due to high temperature inside the reactor (over 2000˚C). Obtained data was used for improvement of the process and reactor geometry. Resultant crystal quality was also predicted basing on crystallization front shape evolution and threading dislocation paths. Obtained results were confronted with experimental data and the results are in good agreement.

Keywords: Finite Volume Method, semiconductors, Physical Vapor Transport, silicon carbide

Procedia PDF Downloads 531
8003 The Effectiveness of the Management of Zakat on Dompet Dhuafa in Makassar

Authors: Nurul Qalbi Awaliyah, Rosmala Rauf, Indrawan, Suherman

Abstract:

Zakat is a certain amount of property which shall be issued by Moslems and given to groups who deserve it (the poor and so on) according to the conditions set by the sharia. This research aims to know the effectiveness of the management of zakat on Dompet Dhuafa in Makasar. The type of research used is quantitative research with descriptive research method. Data collection was done through the dissemination of Likert scale and measurement of the now. The samples were analyzed by as much as 68 and analyzed using SPSS 18.0. The results of the analysis of data obtained at the level of effectiveness of management of zakat in Makassar from all aspects based on SPSS has a mean 140.04 median, minimum, 141 122, and a maximum of 164. The value of all the indicators of assessment of the effectiveness of the management of zakat on Dompet Dhuafa in Makassar has an average score of (M) of 112.5 and standard deviation (SD) of 37.5. The results show that the level of effectiveness of management of zakat in Makassar city is in the category of effective percentage 85,3%. Based on the results it can be concluded that management of zakat on Dompet Dhuafa in Makassar city has been implemented effectively.

Keywords: Dompet Duafa, effectiveness, management, Zakat

Procedia PDF Downloads 275
8002 A Multivariate 4/2 Stochastic Covariance Model: Properties and Applications to Portfolio Decisions

Authors: Yuyang Cheng, Marcos Escobar-Anel

Abstract:

This paper introduces a multivariate 4/2 stochastic covariance process generalizing the one-dimensional counterparts presented in Grasselli (2017). Our construction permits stochastic correlation not only among stocks but also among volatilities, also known as co-volatility movements, both driven by more convenient 4/2 stochastic structures. The parametrization is flexible enough to separate these types of correlation, permitting their individual study. Conditions for proper changes of measure and closed-form characteristic functions under risk-neutral and historical measures are provided, allowing for applications of the model to risk management and derivative pricing. We apply the model to an expected utility theory problem in incomplete markets. Our analysis leads to closed-form solutions for the optimal allocation and value function. Conditions are provided for well-defined solutions together with a verification theorem. Our numerical analysis highlights and separates the impact of key statistics on equity portfolio decisions, in particular, volatility, correlation, and co-volatility movements, with the latter being the least important in an incomplete market.

Keywords: stochastic covariance process, 4/2 stochastic volatility model, stochastic co-volatility movements, characteristic function, expected utility theory, veri cation theorem

Procedia PDF Downloads 152
8001 Convention Refugees in New Zealand: Being Trapped in Immigration Limbo without the Right to Obtain a Visa

Authors: Saska Alexandria Hayes

Abstract:

Multiple Convention Refugees in New Zealand are stuck in a state of immigration limbo due to a lack of defined immigration policies. The Refugee Convention of 1951 does not give the right to be issued a permanent right to live and work in the country of asylum. A gap in New Zealand's immigration law and policy has left Convention Refugees without the right to obtain a resident or temporary entry visa. The significant lack of literature on this topic suggests that the lack of visa options for Convention Refugees in New Zealand is a widely unknown or unacknowledged issue. Refugees in New Zealand enjoy the right of non-refoulement contained in Article 33 of the Refugee Convention 1951, whether lawful or unlawful. However, a number of rights contained in the Refugee Convention 1951, such as the right to gainful employment and social security, are limited to refugees who maintain lawful immigration status. If a Convention Refugee is denied a resident visa, the only temporary entry visa a Convention Refugee can apply for in New Zealand is discretionary. The appeal cases heard at the Immigration Protection Tribunal establish that Immigration New Zealand has declined resident and discretionary temporary entry visa applications by Convention Refugees for failing to meet the health or character immigration instructions. The inability of a Convention Refugee to gain residency in New Zealand creates a dependence on the issue of discretionary temporary entry visas to maintain lawful status. The appeal cases record that this reliance has led to Convention Refugees' lawful immigration status being in question, temporarily depriving them of the rights contained in the Refugee Convention 1951 of lawful refugees. In one case, the process of applying for a discretionary temporary entry visa led to a lawful Convention Refugee being temporarily deprived of the right to social security, breaching Article 24 of the Refugee Convention 1951. The judiciary has stated a constant reliance on the issue of discretionary temporary entry visas for Convention Refugees can lead to a breach of New Zealand's international obligations under Article 7 of the International Covenant on Civil and Political Rights. The appeal cases suggest that, despite successful judicial proceedings, at least three persons have been made to rely on the issue of discretionary temporary entry visas potentially indefinitely. The appeal cases establish that a Convention Refugee can be denied a discretionary temporary entry visa and become unlawful. Unlawful status could ultimately breach New Zealand's obligations under Article 33 of the Refugee Convention 1951 as it would procedurally deny Convention Refugees asylum. It would force them to choose between the right of non-refoulement or leaving New Zealand to seek the ability to access all the human rights contained in the Universal Declaration of Human Rights elsewhere. This paper discusses how the current system has given rise to these breaches and emphasizes a need to create a designated temporary entry visa category for Convention Refugees.

Keywords: domestic policy, immigration, migration, New Zealand

Procedia PDF Downloads 102
8000 Federated Knowledge Distillation with Collaborative Model Compression for Privacy-Preserving Distributed Learning

Authors: Shayan Mohajer Hamidi

Abstract:

Federated learning has emerged as a promising approach for distributed model training while preserving data privacy. However, the challenges of communication overhead, limited network resources, and slow convergence hinder its widespread adoption. On the other hand, knowledge distillation has shown great potential in compressing large models into smaller ones without significant loss in performance. In this paper, we propose an innovative framework that combines federated learning and knowledge distillation to address these challenges and enhance the efficiency of distributed learning. Our approach, called Federated Knowledge Distillation (FKD), enables multiple clients in a federated learning setting to collaboratively distill knowledge from a teacher model. By leveraging the collaborative nature of federated learning, FKD aims to improve model compression while maintaining privacy. The proposed framework utilizes a coded teacher model that acts as a reference for distilling knowledge to the client models. To demonstrate the effectiveness of FKD, we conduct extensive experiments on various datasets and models. We compare FKD with baseline federated learning methods and standalone knowledge distillation techniques. The results show that FKD achieves superior model compression, faster convergence, and improved performance compared to traditional federated learning approaches. Furthermore, FKD effectively preserves privacy by ensuring that sensitive data remains on the client devices and only distilled knowledge is shared during the training process. In our experiments, we explore different knowledge transfer methods within the FKD framework, including Fine-Tuning (FT), FitNet, Correlation Congruence (CC), Similarity-Preserving (SP), and Relational Knowledge Distillation (RKD). We analyze the impact of these methods on model compression and convergence speed, shedding light on the trade-offs between size reduction and performance. Moreover, we address the challenges of communication efficiency and network resource utilization in federated learning by leveraging the knowledge distillation process. FKD reduces the amount of data transmitted across the network, minimizing communication overhead and improving resource utilization. This makes FKD particularly suitable for resource-constrained environments such as edge computing and IoT devices. The proposed FKD framework opens up new avenues for collaborative and privacy-preserving distributed learning. By combining the strengths of federated learning and knowledge distillation, it offers an efficient solution for model compression and convergence speed enhancement. Future research can explore further extensions and optimizations of FKD, as well as its applications in domains such as healthcare, finance, and smart cities, where privacy and distributed learning are of paramount importance.

Keywords: federated learning, knowledge distillation, knowledge transfer, deep learning

Procedia PDF Downloads 75
7999 Milling Simulations with a 3-DOF Flexible Planar Robot

Authors: Hoai Nam Huynh, Edouard Rivière-Lorphèvre, Olivier Verlinden

Abstract:

Manufacturing technologies are becoming continuously more diversified over the years. The increasing use of robots for various applications such as assembling, painting, welding has also affected the field of machining. Machining robots can deal with larger workspaces than conventional machine-tools at a lower cost and thus represent a very promising alternative for machining applications. Furthermore, their inherent structure ensures them a great flexibility of motion to reach any location on the workpiece with the desired orientation. Nevertheless, machining robots suffer from a lack of stiffness at their joints restricting their use to applications involving low cutting forces especially finishing operations. Vibratory instabilities may also happen while machining and deteriorate the precision leading to scrap parts. Some researchers are therefore concerned with the identification of optimal parameters in robotic machining. This paper continues the development of a virtual robotic machining simulator in order to find optimized cutting parameters in terms of depth of cut or feed per tooth for example. The simulation environment combines an in-house milling routine (DyStaMill) achieving the computation of cutting forces and material removal with an in-house multibody library (EasyDyn) which is used to build a dynamic model of a 3-DOF planar robot with flexible links. The position of the robot end-effector submitted to milling forces is controlled through an inverse kinematics scheme while controlling the position of its joints separately. Each joint is actuated through a servomotor for which the transfer function has been computed in order to tune the corresponding controller. The output results feature the evolution of the cutting forces when the robot structure is deformable or not and the tracking errors of the end-effector. Illustrations of the resulting machined surfaces are also presented. The consideration of the links flexibility has highlighted an increase of the cutting forces magnitude. This proof of concept will aim to enrich the database of results in robotic machining for potential improvements in production.

Keywords: control, milling, multibody, robotic, simulation

Procedia PDF Downloads 249
7998 Methodological Approach for the Prioritization of Different Micro-Contaminants as Potential River Basin Specific Pollutants in the Upper Tisza River Watershed

Authors: Mihail Simion Beldean-Galea, Virginia Coman, Florina Copaciu, Mihaela Vlassa, Radu Mihaiescu, Adina Croitoru, Viorel Arghius, Modest Gertsiuk, Mikola Gertsiuk

Abstract:

Taking into consideration the huge number of chemicals released into environment compartments a proper environmental risk assessment is difficult to predict due to the gap of legislation and improper toxicological assessment of chemicals compounds. In Romania as well as in many other countries from Europe, the chemical status of the water body is characterized taking into consideration the Water Framework Directive (WFD) and the substances listed in Annex X. This Annex includes 45 substances from different classes of organic compounds and heavy metals for which AA-EQS and MAC-EQS have been established. For other compounds which are not included in Annex X, different methodologies to prioritize chemicals for risk assessment and monitoring has been proposed. These methodologies take into account Predicted No-Effect Concentrations (PNECs) of different classes of chemicals compounds available from existing risk assessments or from read-across models for acute toxicity to the standard test organisms such as Daphnia magna and Selenastrum capricornutum. Our work presents the monitoring results of 30 priority substances including polyaromatic hydrocarbons, pesticides, halogenated compounds, plasticizers and heavy metals and other 34 substances from different classes of pesticides and pharmaceuticals which are not included on the list of priority substances, performed in the Upper Tisza River Watershed from Romania and Ukraine. The obtained monitoring data were used for the establishment of the list of more relevant pollutants in the studied area and to establish the potential river basin specific pollutants. For this purpose, two indicators such as the Frequency of exceedance and Extent of exceedance of Predicted no-Effect Concentration (PNEC) were evaluated. These two indicators are based on maximum environmental concentrations (MECs) of priority substances and for other pollutants is use statistically based averages of obtained measured concentration compared to the lowest PNEC thresholds. From the obtained results it can be concluded that polyaromatic hydrocarbon such as Fluoranthene, Benzo[a]pyrene, Benzo[b]fluorathene, benzo[k]fluoranthene, Benzo(g.h.i)perylene, Indeno(1.2.3-cd)-pyrene, heavy metals such as Cadmium, Lead and Nickel can be considered as river basin specific pollutants, their concentration exceeding the Annual Average EQS concentration. Other compounds such as estrone, estriol, 174-β estradiol, naproxen or some antibiotics (Penicillin G, Tetracycline or Ceftazidime) should be taken into account for a long monitoring, in some cases their concentration exceeding PNEC. Acknowledgements: This work is performed in the frame of NATO SfP Programme, Project no. 984440.

Keywords: prioritization, river basin specific pollutants, Tisza River, water framework directive

Procedia PDF Downloads 305
7997 Design and Implementation of a Memory Safety Isolation Method Based on the Xen Cloud Environment

Authors: Dengpan Wu, Dan Liu

Abstract:

In view of the present cloud security problem has increasingly become one of the major obstacles hindering the development of the cloud computing, put forward a kind of memory based on Xen cloud environment security isolation technology implementation. And based on Xen virtual machine monitor system, analysis of the model of memory virtualization is implemented, using Xen memory virtualization system mechanism of super calls and grant table, based on the virtual machine manager internal implementation of access control module (ACM) to design the security isolation system memory. Experiments show that, the system can effectively isolate different customer domain OS between illegal access to memory data.

Keywords: cloud security, memory isolation, xen, virtual machine

Procedia PDF Downloads 409
7996 The End Is Just the Beginning: The Importance of Project Post-Implementation Reviews

Authors: Catalin-Teodor Dogaru, Ana-Maria Dogaru

Abstract:

Success means different things to different people. For us, project managers, it becomes even harder to find a definition. Many factors have to be included in the evaluation. Moreover, literature is not very helpful, lacking consensus and neutrality. Post-implementation reviews (PIR) can be an efficient tool in evaluating how things worked on a certain project. Despite the visible progress, PIR is not a very detailed subject yet and there is not a common understanding in this matter. This may be the reason that some organizations include it in the projects’ lifecycle and some do not. Through this paper, we point out the reasons why all project managers should pay proper attention to this important step and to the elements, which can be assessed, beside the already famous triple constraints: cost, budget, and time. It is essential to take notice that PIR is not a checklist. It brings the edge in eliminating subjectivity and judging projects based on actual proof. Based on our experience, our success indicator model, presented in this paper, contributes to the success of the project! In the same time, it increases trust among customers who will perceive success more objectively.

Keywords: project, post implementation, review, success, indicators

Procedia PDF Downloads 371
7995 Investigating Interlayer Bonding in 3D Printing Pressure Vessel Applications

Authors: Cam Minh Tri Tien, Richard Fenrich, Tristan Shelley, Nam Mai-Duy, Allan Malano, Xuesen Zeng

Abstract:

Since additive manufacturing is a layer-by-layer deposition approach, good bonding quality between adjacent layers is critically important to achieve optimal mechanical performance, including applications in pressure vessels. The need to enhance the strength of printed products, especially in the build direction where layup gaps and voids exist between the printed layers, has garnered significant attention. The proposed research will focus on improving the current Fused Deposition Modelling (FDM) process to produce polymers reinforced with chopped fibers, utilizing a controlled heat zone to enhance the adhesion between printed layers. Energy will be applied to both printed and printing layers to improve the bonding strength between adjacent layers. Through the enhanced FDM process, the mechanical performance of composite parts will experience a substantial improvement, particularly in the build direction, as compared to current FDM methods. A combination of experimental, numerical, and analytical methods will be employed to demonstrate the enhanced performance of heat-controlled 3D printed parts.

Keywords: 3D Printing, pressure vessels, interlayer bonding, controlled heat

Procedia PDF Downloads 51
7994 An Approach for the Assessment of Semi-Elliptical Surface Crack

Authors: Muhammad Naweed, Usman Tariq Murtaza, Waseem Siddique

Abstract:

A pallet body approach is a finite element-based computational approach used for the modeling and assessment of a three-dimensional surface crack. The approach is capable of inserting the crack in an engineering structure and generating high-quality hexahedral mesh in the cracked region of the structure. The approach is capable of computing the stress intensity factors along a semi-elliptical surface crack numerically. The objective of this work is to present that the stress intensity factors produced by the approach can be used with confidence for capturing the parameters during the fatigue crack growth.

Keywords: pallet body approach, semi-elliptical surface crack, stress intensity factors, fatigue crack growth

Procedia PDF Downloads 102
7993 Cryptographic Protocol for Secure Cloud Storage

Authors: Luvisa Kusuma, Panji Yudha Prakasa

Abstract:

Cloud storage, as a subservice of infrastructure as a service (IaaS) in Cloud Computing, is the model of nerworked storage where data can be stored in server. In this paper, we propose a secure cloud storage system consisting of two main components; client as a user who uses the cloud storage service and server who provides the cloud storage service. In this system, we propose the protocol schemes to guarantee against security attacks in the data transmission. The protocols are login protocol, upload data protocol, download protocol, and push data protocol, which implement hybrid cryptographic mechanism based on data encryption before it is sent to the cloud, so cloud storage provider does not know the user's data and cannot analysis user’s data, because there is no correspondence between data and user.

Keywords: cloud storage, security, cryptographic protocol, artificial intelligence

Procedia PDF Downloads 357
7992 On Flow Consolidation Modelling in Urban Congested Areas

Authors: Serban Stere, Stefan Burciu

Abstract:

The challenging and continuously growing competition in the urban freight transport market emphasizes the need for optimal planning of transportation processes in terms of identifying the solution of consolidating traffic flows in congested urban areas. The aim of the present paper is to present the mathematical framework and propose a methodology of combining urban traffic flows between the distribution centers located at the boundary of a congested urban area. The three scenarios regarding traffic flow between consolidation centers that are taken into consideration in the paper are based on the same characteristics of traffic flows. The scenarios differ in terms of the accessibility of the four consolidation centers given by the infrastructure, the connections between them, and the possibility of consolidating traffic flows for one or multiple destinations. Also, synthetical indicators will allow us to compare the scenarios considered and chose the indicated for our distribution system.

Keywords: distribution system, single and multiple destinations, urban consolidation centers, traffic flow consolidation schemes

Procedia PDF Downloads 156
7991 Investigation of Riders' Path on Horizontal Curves

Authors: Lemonakis Panagiotis, Eliou Nikos, Karakasidis Theodoros, Botzoris George

Abstract:

It is well known that trajectory along with speed are two of the most important contributing factors in road accidents. Trajectory is meant as the "line“, usually different from the center-line that a driver traverses through horizontal curves which depends on the characteristics of the road environment (especially the curvature), the vehicle and the driver himself. Drivers and especially riders, tend to broaden their paths in order to succeed greater path radiuses and hence, reduce the applied centrifugal force enhancing safety. The objective of the present research is to investigate riders’ path on horizontal curves. Within the context of the research, field measurements were conducted on a rural two lane highway, with the participation of eight riders and the use of an instrumented motorcycle. The research has shown that the trajectory of the riders is correlated to the radius and the length of the horizontal curve as well.

Keywords: trajectory, path, riders, horizontal curves

Procedia PDF Downloads 341
7990 Scheduling in Cloud Networks Using Chakoos Algorithm

Authors: Masoumeh Ali Pouri, Hamid Haj Seyyed Javadi

Abstract:

Nowadays, cloud processing is one of the important issues in information technology. Since scheduling of tasks graph is an NP-hard problem, considering approaches based on undeterminisitic methods such as evolutionary processing, mostly genetic and cuckoo algorithms, will be effective. Therefore, an efficient algorithm has been proposed for scheduling of tasks graph to obtain an appropriate scheduling with minimum time. In this algorithm, the new approach is based on making the length of the critical path shorter and reducing the cost of communication. Finally, the results obtained from the implementation of the presented method show that this algorithm acts the same as other algorithms when it faces graphs without communication cost. It performs quicker and better than some algorithms like DSC and MCP algorithms when it faces the graphs involving communication cost.

Keywords: cloud computing, scheduling, tasks graph, chakoos algorithm

Procedia PDF Downloads 65