Search results for: ion torrent personal genome machine (PGM)
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5299

Search results for: ion torrent personal genome machine (PGM)

2479 An Approach of Computer Modalities for Exploration of Hieroglyphics Substantial in an Investigation

Authors: Aditi Chauhan, Neethu S. Mohan

Abstract:

In the modern era, the advancement and digitalization in technology have taken place during an investigation of crime scene. The rapid enhancement and investigative techniques have changed the mean of identification of suspect. Identification of the person is one of the significant aspects, and personal authentication is the key of security and reliability in society. Since early 90 s, people have relied on comparing handwriting through its class and individual characteristics. But in today’s 21st century we need more reliable means to identify individual through handwriting. An approach employing computer modalities have lately proved itself auspicious enough in exploration of hieroglyphics substantial in investigating the case. Various software’s such as FISH, WRITEON, and PIKASO, CEDAR-FOX SYSTEM identify and verify the associated quantitative measure of the similarity between two samples. The research till date has been confined to identify the authorship of the concerned samples. But prospects associated with the use of computational modalities might help to identify disguised writing, forged handwriting or say altered or modified writing. Considering the applications of such modal, similar work is sure to attract plethora of research in immediate future. It has a promising role in national security too. Documents exchanged among terrorist can also be brought under the radar of surveillance, bringing forth their source of existence.

Keywords: documents, identity, computational system, suspect

Procedia PDF Downloads 163
2478 Modeling and Simulation of Flow Shop Scheduling Problem through Petri Net Tools

Authors: Joselito Medina Marin, Norberto Hernández Romero, Juan Carlos Seck Tuoh Mora, Erick S. Martinez Gomez

Abstract:

The Flow Shop Scheduling Problem (FSSP) is a typical problem that is faced by production planning managers in Flexible Manufacturing Systems (FMS). This problem consists in finding the optimal scheduling to carry out a set of jobs, which are processed in a set of machines or shared resources. Moreover, all the jobs are processed in the same machine sequence. As in all the scheduling problems, the makespan can be obtained by drawing the Gantt chart according to the operations order, among other alternatives. On this way, an FMS presenting the FSSP can be modeled by Petri nets (PNs), which are a powerful tool that has been used to model and analyze discrete event systems. Then, the makespan can be obtained by simulating the PN through the token game animation and incidence matrix. In this work, we present an adaptive PN to obtain the makespan of FSSP by applying PN analytical tools.

Keywords: flow-shop scheduling problem, makespan, Petri nets, state equation

Procedia PDF Downloads 282
2477 Forecasting Thermal Energy Demand in District Heating and Cooling Systems Using Long Short-Term Memory Neural Networks

Authors: Kostas Kouvaris, Anastasia Eleftheriou, Georgios A. Sarantitis, Apostolos Chondronasios

Abstract:

To achieve the objective of almost zero carbon energy solutions by 2050, the EU needs to accelerate the development of integrated, highly efficient and environmentally friendly solutions. In this direction, district heating and cooling (DHC) emerges as a viable and more efficient alternative to conventional, decentralized heating and cooling systems, enabling a combination of more efficient renewable and competitive energy supplies. In this paper, we develop a forecasting tool for near real-time local weather and thermal energy demand predictions for an entire DHC network. In this fashion, we are able to extend the functionality and to improve the energy efficiency of the DHC network by predicting and adjusting the heat load that is distributed from the heat generation plant to the connected buildings by the heat pipe network. Two case-studies are considered; one for Vransko, Slovenia and one for Montpellier, France. The data consists of i) local weather data, such as humidity, temperature, and precipitation, ii) weather forecast data, such as the outdoor temperature and iii) DHC operational parameters, such as the mass flow rate, supply and return temperature. The external temperature is found to be the most important energy-related variable for space conditioning, and thus it is used as an external parameter for the energy demand models. For the development of the forecasting tool, we use state-of-the-art deep neural networks and more specifically, recurrent networks with long-short-term memory cells, which are able to capture complex non-linear relations among temporal variables. Firstly, we develop models to forecast outdoor temperatures for the next 24 hours using local weather data for each case-study. Subsequently, we develop models to forecast thermal demand for the same period, taking under consideration past energy demand values as well as the predicted temperature values from the weather forecasting models. The contributions to the scientific and industrial community are three-fold, and the empirical results are highly encouraging. First, we are able to predict future thermal demand levels for the two locations under consideration with minimal errors. Second, we examine the impact of the outdoor temperature on the predictive ability of the models and how the accuracy of the energy demand forecasts decreases with the forecast horizon. Third, we extend the relevant literature with a new dataset of thermal demand and examine the performance and applicability of machine learning techniques to solve real-world problems. Overall, the solution proposed in this paper is in accordance with EU targets, providing an automated smart energy management system, decreasing human errors and reducing excessive energy production.

Keywords: machine learning, LSTMs, district heating and cooling system, thermal demand

Procedia PDF Downloads 128
2476 Preliminary Proposal to Use Adaptive Computer Games in the Virtual Rehabilitation Therapy

Authors: Mamoun S. Ideis, Zein Salah

Abstract:

Virtual Rehabilitation (VR) refers to using Virtual Reality’s hardware and simulations as means of exercising tools to rehabilitate patients in need. These patients will undergo their treatment exercises while playing different computer games, which helps achieve greater motivation for patients undergoing their therapeutic exercises. Virtual Rehabilitation systems adopt computer games as part of the treatment therapy. In this paper, we present a preliminary proposal to using adaptive computer games in Virtual Rehabilitation therapy. We also present some tips in designing those adaptive computer games by using different machine learning algorithms in order to create a personalized experience for each patient, which in turn, increases the potential benefits of the treatment that each patient receives. Furthermore, we propose a method of comparing the results of treatment using the adaptive computer games with the results of using static and classical computer games.

Keywords: virtual rehabilitation, physiotherapy, adaptive computer games, post-stroke, game design

Procedia PDF Downloads 281
2475 Enabling Citizen Participation in Urban Planning through Geospatial Gamification

Authors: Joanne F. Hayek

Abstract:

This study explores the use of gamification to promote citizen e-participation in urban planning. The research departs from a case study: the ‘Shape Your City’ web app designed and programmed by the author and presented as part of the 2021 Dubai Design Week to engage citizens in the co-creation of the future of their city through a gamified experience. The paper documents the design and development methodology of the web app and concludes with the findings of its pilot release. The case study explores the use of mobile interactive mapping, real-time data visualization, augmented reality, and machine learning as tools to enable co-planning. The paper also details the user interface design strategies employed to integrate complex cross-sector e-planning systems and make them accessible to citizens.

Keywords: gamification, co-planning, citizen e-participation, mobile interactive mapping, real-time data visualization

Procedia PDF Downloads 131
2474 Design of Control System Based On PLC and Kingview for Granulation Product Line

Authors: Mei-Feng, Yude-Fan, Min-Zhu

Abstract:

Based on PLC and kingview, this paper proposed a method that designed a set of the automatic control system according to the craft flow and demands for granulation product line. There were the main station and subordinate stations in PLC which were communicated by PROFIBUS network. PLC and computer were communicated by Ethernet network. The conversation function between human and machine was realized by kingview software, including actual time craft flows, historic report curves and product report forms. The construction of the control system, hardware collocation and software design were introduced. Besides these, PROFIBUS network frequency conversion control, the difficult points and configuration software design were elaborated. The running results showed that there were several advantages in the control system. They were high automatic degree, perfect function, perfect steady and convenient operation.

Keywords: PLC, PROFIBUS, configuration, frequency

Procedia PDF Downloads 390
2473 Needs Assessment of Barangay Health Workers in Delivering Health Care Services: Basis for Communication Planning

Authors: Ivan N. Gallegos, Merle Dawn Comidoy, Mira Sol Cabal, Paul Martin Acol, Arnie Polistico

Abstract:

Barangay Health Workers (BHWs) are the lead health advocates who provide basic health care services at the grass-roots level. Hence, adequate skills and training are needed to deliver these services effectively. The study aimed at identifying the communication needs of Barangay health workers situated at the dumpsite of Davao City, Philippines, gravitating towards designing a communication plan tailor-fitted to their needs. It employed a qualitative research design, particularly an in-depth interview of the health workers. Several communication problems were identified, including the lack of participation of BHWs in the Barangay development plan, the lack of a continuous skills enhancement program, ineffective communication strategies resulting in insufficient knowledge of proper personal hygiene, and the inactive participation of community members in health services. Based on these communication problems, the following activities and training were suggested: capacitating BHWs on writing proposals and plans; basic communication skills training; educational seminars for parents; and a sanitation campaign.

Keywords: communication planning, health care services, Barangay health workers, communication strategies

Procedia PDF Downloads 70
2472 Effect of Clay Content on the Drained Shear Strength

Authors: Navid Khayat

Abstract:

Drained shear strength of saturated soils is fully understood. Shear strength of unsaturated soils is usually expressed in terms of soil suction. Evaluation of shear strength of compacted mixtures of sand–clay at optimum water content is main purpose of this research. To prepare the required samples, first clay and sand are mixed in 10, 30, 50, and 70 percent by dry weight and then compacted at the proper optimum water content according to the standard proctor test. The samples were sheared in direct shear machine. Stress –strain relationship of samples indicated a ductile behavior. Most of the samples showed a dilatancy behavior during the shear and the tendency for dilatancy increased with the increase in sand proportion. The results show that with the increase in percentage of sand a decrease in cohesion intercept c' for mixtures and an increase in the angle of internal friction Φ’is observed.

Keywords: clay, sand, drained shear strength, cohesion intercept

Procedia PDF Downloads 424
2471 Traffic Sign Recognition System Using Convolutional Neural NetworkDevineni

Authors: Devineni Vijay Bhaskar, Yendluri Raja

Abstract:

We recommend a model for traffic sign detection stranded on Convolutional Neural Networks (CNN). We first renovate the unique image into the gray scale image through with support vector machines, then use convolutional neural networks with fixed and learnable layers for revealing and understanding. The permanent layer can reduction the amount of attention areas to notice and crop the limits very close to the boundaries of traffic signs. The learnable coverings can rise the accuracy of detection significantly. Besides, we use bootstrap procedures to progress the accuracy and avoid overfitting problem. In the German Traffic Sign Detection Benchmark, we obtained modest results, with an area under the precision-recall curve (AUC) of 99.49% in the group “Risk”, and an AUC of 96.62% in the group “Obligatory”.

Keywords: convolutional neural network, support vector machine, detection, traffic signs, bootstrap procedures, precision-recall curve

Procedia PDF Downloads 106
2470 CSRFDtool: Automated Detection and Prevention of a Reflected Cross-Site Request Forgery

Authors: Alaa A. Almarzuki, Nora A. Farraj, Aisha M. Alshiky, Omar A. Batarfi

Abstract:

The number of internet users is dramatically increased every year. Most of these users are exposed to the dangers of attackers in one way or another. The reason for this lies in the presence of many weaknesses that are not known for native users. In addition, the lack of user awareness is considered as the main reason for falling into the attackers’ snares. Cross Site Request Forgery (CSRF) has placed in the list of the most dangerous threats to security in OWASP Top Ten for 2013. CSRF is an attack that forces the user’s browser to send or perform unwanted request or action without user awareness by exploiting a valid session between the browser and the server. When CSRF attack successes, it leads to many bad consequences. An attacker may reach private and personal information and modify it. This paper aims to detect and prevent a specific type of CSRF, called reflected CSRF. In a reflected CSRF, a malicious code could be injected by the attackers. This paper explores how CSRF Detection Extension prevents the reflected CSRF by checking browser specific information. Our evaluation shows that the proposed solution succeeds in preventing this type of attack.

Keywords: CSRF, CSRF detection extension, attackers, attacks

Procedia PDF Downloads 403
2469 Testing of the Decreasing Bond Strength of Polyvinyl Acetate Adhesive by Low Temperatures

Authors: Pavel Boška, Jan Bomba, Tomáš Beránek, Jiří Procházka

Abstract:

When using wood products bonded by polyvinyl acetate, glues such as windows are the most limiting element of degradation of the glued joint due to weather changes. In addition to moisture and high temperatures, the joint may damage the low temperature below freezing point, where dimensional changes in the material and distortion of the adhesive film occur. During the experiments, the joints were exposed to several degrees of sub-zero temperatures from 0 °C to -40 °C and then to compare how the decreasing temperature affects the strength of the joint. The experiment was performed on wood beech samples (Fagus sylvatica), bonded with PVAc with D3 resistance and the shear strength of bond was measured. The glued and treated samples were tested on a laboratory testing machine, recording the strength of the joint. The statistical results have given us information that the strength of the joint gradually decreases with decreasing temperature, but a noticeable and statistically significant change is achieved only at very low temperatures.

Keywords: adhesives, bond strength, low temperatures, polyvinyl acetate

Procedia PDF Downloads 340
2468 Optimization of Roster Construction In Sports

Authors: Elijah Cavan

Abstract:

In Major League Sports (MLB, NBA, NHL, NFL), it is the Front Office Staff (FOS) who make decisions about who plays for their respective team. The FOS bear the brunt of the responsibility for acquiring players through drafting, trading and signing players in free agency while typically contesting with maximum roster salary constraints. The players themselves are volatile assets of these teams- their value fluctuates with age and performance. A simple comparison can be made when viewing players as assets. The problem here is similar to that of optimizing your investment portfolio. The The goal is ultimately to maximize your periodic returns while tolerating a fixed risk (degree of uncertainty/ potential loss). Each franchise may value assets differently, and some may only tolerate lower risk levels- these are examples of factors that introduce additional constraints into the model. In this talk, we will detail the mathematical formulation of this problem as a constrained optimization problem- which can be solved with classical machine learning methods but is also well posed as a problem to be solved on quantum computers

Keywords: optimization, financial mathematics, sports analytics, simulated annealing

Procedia PDF Downloads 104
2467 A quantitative Analysis of Impact of Potential Variables on the Energy Performance of Old and New Buildings in China

Authors: Yao Meng, Mahroo Eftekhari, Dennis Loveday

Abstract:

Currently, there are two types of heating systems in Chinese residential buildings, with respect to the controllability of the heating system, one is an old heating system without any possibility of controlling room temperature and another is a new heating system that provides temperature control of individual rooms. This paper is aiming to evaluate the impact of potential variables on the energy performance of old and new buildings respectively in China, and to explore how the use of individual room temperature control would change occupants’ heating behaviour and thermal comfort in Chinese residential buildings and its impact on the building energy performance. In the study, two types of residential buildings have been chosen, the new building install personal control on the heating system, together with ‘pay for what you use’ tariffs. The old building comprised uncontrolled heating with payment based on floor area. The studies were carried out in each building, with a longitudinal monitoring of indoor air temperature, outdoor air temperature, window position. The occupants’ behaviour and thermal sensation were evaluated by questionnaires. Finally, use the simulated analytic method to identify the impact of influence variables on energy use for both types of buildings.

Keywords: residential buildings, China, design parameters, energy efficiency, simulation analytics method

Procedia PDF Downloads 537
2466 The Influence of Wasta on Employees and Organizations in Kuwait

Authors: Abrar Al-Enzi

Abstract:

This study investigates the role of the popular utilization of Wasta within Arab societies. Wasta, by definition, is a set of personal networks based on family or kinship ties in which power and influence are utilized to get things done. As Wasta evolved, it became intensely rooted in Arab cultures, which is considered as an intrinsic tool of the culture, a method of doing business transactions and as a family obligation. However, the consequences related to Wasta in business are substantial as it impacts organizational performance, employee’s perception of the organization and the atmosphere between employees. To date, there has been little in-depth organizational research on the impact of Wasta. Hence, the question that will be addressed is: Does Wasta influence human resource management, knowledge sharing and innovation in Kuwait, which in turn affects employees’ commitment within organizations? As a result, a mixed method sequential exploratory research design will be used to examine the mentioned subject, which consists of three phases: (1) Doing some initial exploratory interviews; (2) Developing a paper-based and online survey (Quantitative method) based on the findings; (3) Lastly, following up with semi-structured interviews (Qualitative method). The rationale behind this approach is that both qualitative and quantitative methods complement each other by providing a more complete picture of the subject matter.

Keywords: commitment, HRM practices, social capital, Wasta

Procedia PDF Downloads 250
2465 Critical Review of Web Content Mining Extraction Mechanisms

Authors: Rabia Bashir, Sajjad Akbar

Abstract:

There is an inevitable demand of web mining due to rapid increase of huge information on the Internet, but the striking variety of web structures has made required content retrieval a difficult task. To counter this issue, Web Content Mining (WCM) emerges as a potential candidate which extracts and integrates suitable resources of data to users. In past few years, research has been done on several extraction techniques for WCM i.e. agent-based, template-based, assumption-based, statistic-based, wrapper-based and machine learning. However, it is still unclear that either these approaches are efficiently tackling the significant challenges of WCM or not. To answer this question, this paper identifies these challenges such as language independency, structure flexibility, performance, automation, dynamicity, redundancy handling, intelligence, relevant content retrieval, and privacy. Further, mapping of these challenges is done with existing extraction mechanisms which helps to adopt the most suitable WCM approach, given some conditions and characteristics at hand.

Keywords: content mining challenges, web content mining, web content extraction approaches, web information retrieval

Procedia PDF Downloads 534
2464 Multimodal Biometric Cryptography Based Authentication in Cloud Environment to Enhance Information Security

Authors: D. Pugazhenthi, B. Sree Vidya

Abstract:

Cloud computing is one of the emerging technologies that enables end users to use the services of cloud on ‘pay per usage’ strategy. This technology grows in a fast pace and so is its security threat. One among the various services provided by cloud is storage. In this service, security plays a vital factor for both authenticating legitimate users and protection of information. This paper brings in efficient ways of authenticating users as well as securing information on the cloud. Initial phase proposed in this paper deals with an authentication technique using multi-factor and multi-dimensional authentication system with multi-level security. Unique identification and slow intrusive formulates an advanced reliability on user-behaviour based biometrics than conventional means of password authentication. By biometric systems, the accounts are accessed only by a legitimate user and not by a nonentity. The biometric templates employed here do not include single trait but multiple, viz., iris and finger prints. The coordinating stage of the authentication system functions on Ensemble Support Vector Machine (SVM) and optimization by assembling weights of base SVMs for SVM ensemble after individual SVM of ensemble is trained by the Artificial Fish Swarm Algorithm (AFSA). Thus it helps in generating a user-specific secure cryptographic key of the multimodal biometric template by fusion process. Data security problem is averted and enhanced security architecture is proposed using encryption and decryption system with double key cryptography based on Fuzzy Neural Network (FNN) for data storing and retrieval in cloud computing . The proposing scheme aims to protect the records from hackers by arresting the breaking of cipher text to original text. This improves the authentication performance that the proposed double cryptographic key scheme is capable of providing better user authentication and better security which distinguish between the genuine and fake users. Thus, there are three important modules in this proposed work such as 1) Feature extraction, 2) Multimodal biometric template generation and 3) Cryptographic key generation. The extraction of the feature and texture properties from the respective fingerprint and iris images has been done initially. Finally, with the help of fuzzy neural network and symmetric cryptography algorithm, the technique of double key encryption technique has been developed. As the proposed approach is based on neural networks, it has the advantage of not being decrypted by the hacker even though the data were hacked already. The results prove that authentication process is optimal and stored information is secured.

Keywords: artificial fish swarm algorithm (AFSA), biometric authentication, decryption, encryption, fingerprint, fusion, fuzzy neural network (FNN), iris, multi-modal, support vector machine classification

Procedia PDF Downloads 244
2463 Graded Orientation of the Linear Polymers

Authors: Levan Nadareishvili, Roland Bakuradze, Barbara Kilosanidze, Nona Topuridze, Liana Sharashidze, Ineza Pavlenishvili

Abstract:

Some regularities of formation of a new structural state of the thermoplastic polymers-gradually oriented (stretched) state (GOS) are discussed. Transition into GOS is realized by the graded oriented stretching-by action of inhomogeneous mechanical field on the isotropic linear polymers or by zonal stretching that is implemented on a standard tensile-testing machine with using a specially designed zone stretching device (ZSD). Both technical approaches (especially zonal stretching method) allows to manage the such quantitative parameters of gradually oriented polymers as a range of change in relative elongation/orientation degree, length of this change and profile (linear, hyperbolic, parabolic, logarithmic, etc.). Uniaxial graded stretching method should be considered as an effective technological solution to create polymer materials with a predetermined gradient of physical properties.

Keywords: controlled graded stretching, gradually oriented state, linear polymers, zone stretching device

Procedia PDF Downloads 418
2462 Design Guidelines for an Enhanced Interaction Experience in the Domain of Smartphone-Based Applications for Sport and Fitness

Authors: Paolo Pilloni, Fabrizio Mulas, Salvatore Carta

Abstract:

Nowadays, several research studies point up that an active lifestyle is essential for physical and mental health benefits. Mobile phones have greatly influenced people’s habits and attitudes also in the way they exercise. Our research work is mainly focused on investigating how to exploit mobile technologies to favour people’s exertion experience. To this end, we developed an exertion framework users can exploit through a real world mobile application, called BLINDED, designed to act as a virtual personal trainer to support runners during their trainings. In this work, inspired by both previous findings in the field of interaction design for people with visual impairments, feedback gathered from real users of our framework, and positive results obtained from two experimentations, we present some new interaction facilities we designed to enhance the interaction experience during a training. The positive obtained results helped us to derive some interaction design recommendations we believe will be a valid support for designers of future mobile systems conceived to be used in circumstances where there are limited possibilities of interaction.

Keywords: human computer interaction, interaction design guidelines, persuasive mobile technologies for sport and health

Procedia PDF Downloads 518
2461 Modal Analysis for Optimal Location of Doubly Fed Induction-Generator-Based Wind Farms for Reduction of Small Signal Oscillation

Authors: Meet Patel, Darshan Patel, Nilay Shah

Abstract:

Excess growth of wind-based renewable energy sources is required to identify the optimal location and damping capacity of doubly fed induction-generator-based (DFIG) wind farms while it penetrates into the transmission network. In this analysis, various ratings of DFIG wind farms are penetrated into the Single Machine Infinite Bus (SMIB ) at a different distance of the transmission line. On the basis of detailed examinations, a prime position is evaluated to maximize the stability of overall systems. A damping controller is designed at an optimum location to mitigate the small oscillations. The proposed model was validated using eigenvalue analysis, calculation of the participation factor, and time-domain simulation.

Keywords: DFIG, small signal stability, eigenvalues, time domain simulation

Procedia PDF Downloads 97
2460 A System Dynamics Approach to Exploring Personality Traits in Young Children

Authors: Misagh Faezipour

Abstract:

System dynamics is a systems engineering approach that can help address the complex challenges in different systems. Little is known about how the brain represents people to predict behavior. This work is based on how the brain simulates different personal behavior and responds to them in the case of young children ages one to five. As we know, children’s minds/brains are just as clean as a crystal, and throughout time, in their surroundings, families, and education center, they grow to develop and have different kinds of behavior towards the world and the society they live in. Hence, this work aims to identify how young children respond to various personality behavior and observes their reactions towards them from a system dynamics perspective. We will be exploring the Big Five personality traits in young children. A causal model is developed in support of the system dynamics approach. These models graphically present the factors and factor relationships that contribute to the big five personality traits and provide a better understanding of the entire behavior model. A simulator will be developed that includes a set of causal model factors and factor relationships. The simulator models the behavior of different factors related to personality traits and their impacts and can help make more informed decisions in a risk-free environment.

Keywords: personality traits, systems engineering, system dynamics, causal model, behavior model

Procedia PDF Downloads 82
2459 A Preliminary Study for Building an Arabic Corpus of Pair Questions-Texts from the Web: Aqa-Webcorp

Authors: Wided Bakari, Patrce Bellot, Mahmoud Neji

Abstract:

With the development of electronic media and the heterogeneity of Arabic data on the Web, the idea of building a clean corpus for certain applications of natural language processing, including machine translation, information retrieval, question answer, become more and more pressing. In this manuscript, we seek to create and develop our own corpus of pair’s questions-texts. This constitution then will provide a better base for our experimentation step. Thus, we try to model this constitution by a method for Arabic insofar as it recovers texts from the web that could prove to be answers to our factual questions. To do this, we had to develop a java script that can extract from a given query a list of html pages. Then clean these pages to the extent of having a database of texts and a corpus of pair’s question-texts. In addition, we give preliminary results of our proposal method. Some investigations for the construction of Arabic corpus are also presented in this document.

Keywords: Arabic, web, corpus, search engine, URL, question, corpus building, script, Google, html, txt

Procedia PDF Downloads 311
2458 Delamination of Scale in a Fe Carbon Steel Surface by Effect of Interface Roughness and Oxide Scale Thickness

Authors: J. M. Lee, W. R. Noh, C. Y. Kim, M. G. Lee

Abstract:

Delamination of oxide scale has been often discovered at the interface between Fe carbon steel and oxide scale. Among several mechanisms of this delamination behavior, the normal tensile stress to the substrate-scale interface has been described as one of the main factors. The stress distribution at the interface is also known to be affected by thermal expansion mismatch between substrate and oxide scale, creep behavior during cooling and the geometry of the interface. In this study, stress states near the interface in a Fe carbon steel with oxide scale have been investigated using FE simulations. The thermal and mechanical properties of oxide scales are indicated in literature and Fe carbon steel is measured using tensile testing machine. In particular, the normal and shear stress components developed at the interface during bending are investigated. Preliminary numerical sensitivity analyses are provided to explain the effects of the interface geometry and oxide thickness on the delamination behavior.

Keywords: oxide scale, delamination, Fe analysis, roughness, thickness, stress state

Procedia PDF Downloads 334
2457 Forthcoming Big Data on Smart Buildings and Cities: An Experimental Study on Correlations among Urban Data

Authors: Yu-Mi Song, Sung-Ah Kim, Dongyoun Shin

Abstract:

Cities are complex systems of diverse and inter-tangled activities. These activities and their complex interrelationships create diverse urban phenomena. And such urban phenomena have considerable influences on the lives of citizens. This research aimed to develop a method to reveal the causes and effects among diverse urban elements in order to enable better understanding of urban activities and, therefrom, to make better urban planning strategies. Specifically, this study was conducted to solve a data-recommendation problem found on a Korean public data homepage. First, a correlation analysis was conducted to find the correlations among random urban data. Then, based on the results of that correlation analysis, the weighted data network of each urban data was provided to people. It is expected that the weights of urban data thereby obtained will provide us with insights into cities and show us how diverse urban activities influence each other and induce feedback.

Keywords: big data, machine learning, ontology model, urban data model

Procedia PDF Downloads 397
2456 Impact of Network Workload between Virtualization Solutions on a Testbed Environment for Cybersecurity Learning

Authors: Kevin Fernagut, Olivier Flauzac, Erick M. G. Robledo, Florent Nolot

Abstract:

The adoption of modern lightweight virtualization often comes with new threats and network vulnerabilities. This paper seeks to assess this with a different approach studying the behavior of a testbed built with tools such as Kernel-Based Virtual Machine (KVM), Linux Containers (LXC) and Docker, by performing stress tests within a platform where students experiment simultaneously with cyber-attacks, and thus observe the impact on the campus network and also find the best solution for cyber-security learning. Interesting outcomes can be found in the literature comparing these technologies. It is, however, difficult to find results of the effects on the global network where experiments are carried out. Our work shows that other physical hosts and the faculty network were impacted while performing these trials. The problems found are discussed, as well as security solutions and the adoption of new network policies.

Keywords: containerization, containers, cybersecurity, cyberattacks, isolation, performance, virtualization, virtual machines

Procedia PDF Downloads 136
2455 Analysis of Stress Concentration of a Hybrid Composite Material with Centre Circular Hole Subjected to Tensile Loading

Authors: C. Shalini Devi

Abstract:

This work describes the stress concentration in a rectangular specimen with a circular hole made up of hybrid composite material with the combination of glass/carbon with epoxy. The arrangements of cross ply lamina in the sequence of alternative carbon and glass, using carbon fiber in panel, gives more strength to the structure as the carbon properties are higher when compared to glass. Typical aircraft and automobile components are with cut-outs, and such cut-outs reduce the weight of the aircraft according to the weight reduction law and also they reduce the bulking load carrying capacity. Experimental investigations were carried out using three specimens as per ASTM D5766 and three specimens as per ASTM D3039 in the Universal Testing Machine. Stress concentration in the rectangular specimen with a hole is also analysed using FEA and comparing the results.

Keywords: composite, stress concentration, finite element analysis, tensile strength

Procedia PDF Downloads 438
2454 Self-Perceived Employability of Students of International Relations of University of Warmia and Mazury in Poland

Authors: Marzena Świgoń

Abstract:

Nowadays, graduates should be prepared for serious challenges in the internal and external labor market. The notion that a degree is a “passport to employment” has been relegated to the past. In the last few years a phenomenon in the form of the increasing unemployment of highly educated young people in EU countries, including Poland has been observed. Empirical studies were conducted among Polish students in the scope of the so-called self-perceived employability review. In this study, a special scale was used which consisted of 19 statements regarding five components: student’s perception of university; field of study; self-belief; state of the external labor market; and, personal knowledge management. The respondent group consisted of final-year master’s students of International Relations at the University of Warmia and Mazury in Olsztyn, Poland. The findings of the empirical studies were compiled using statistical methods: descriptive statistics and inferential statistics. In general, in light of the conducted studies, the self-perceived employability of the Polish students was not high. Limitations of the studies were discussed, as well as the implications for future research in the scope of the students’ employability.

Keywords: self-perceived employability, students of international relations, university students, students employability

Procedia PDF Downloads 324
2453 Characterization of Alloyed Grey Cast Iron Quenched and Tempered for a Smooth Roll Application

Authors: Mohamed Habireche, Nacer E. Bacha, Mohamed Djeghdjough

Abstract:

In the brick industry, smooth double roll crusher is used for medium and fine crushing of soft to medium hard material. Due to opposite inward rotation of the rolls, the feed material is nipped between the rolls and crushed by compression. They are subject to intense wear, known as three-body abrasion, due to the action of abrasive products. The production downtime affecting productivity stems from two sources: the bi-monthly rectification of the roll crushers and their replacement when they are completely worn out. Choosing the right material for the roll crushers should result in longer machine cycles, and reduced repair and maintenance costs. All roll crushers are imported from outside Algeria. This results in sometimes very long delivery times which handicap the brickyards, in particular in respecting delivery times and honored the orders made by customers. The aim of this work is to investigate the effect of alloying additions on microstructure and wear behavior of grey lamellar cast iron for smooth roll crushers in brick industry. The base gray iron was melted in an induction furnace with low frequency at a temperature of 1500 °C, in which return cast iron scrap, new cast iron ingot, and steel scrap were added to the melt to generate the desired composition. The chemical analysis of the bar samples was carried out using Emission Spectrometer Systems PV 8050 Series (Philips) except for the carbon, for which a carbon/sulphur analyser Elementrac CS-i was used. Unetched microstructure was used to evaluate the graphite flake morphology using the image comparison measurement method. At least five different fields were selected for quantitative estimation of phase constituents. The samples were observed under X100 magnification with a Zeiss Axiover T40 MAT optical microscope equipped with a digital camera. SEM microscope equipped with EDS was used to characterize the phases present in the microstructure. The hardness (750 kg load, 5mm diameter ball) was measured with a Brinell testing machine for both treated and as-solidified condition test pieces. The test bars were used for tensile strength and metallographic evaluations. Mechanical properties were evaluated using tensile specimens made as per ASTM E8 standards. Two specimens were tested for each alloy. From each rod, a test piece was made for the tensile test. The results showed that the quenched and tempered alloys had best wear resistance at 400 °C for alloyed grey cast iron (containing 0.62%Mn, 0.68%Cr, and 1.09% Cu) due to fine carbides in the tempered matrix. In quenched and tempered condition, increasing Cu content in cast irons improved its wear resistance moderately. Combined addition of Cu and Cr increases hardness and wear resistance for a quenched and tempered hypoeutectic grey cast iron.

Keywords: casting, cast iron, microstructure, heat treating

Procedia PDF Downloads 93
2452 Development of a Social Assistive Robot for Elderly Care

Authors: Edwin Foo, Woei Wen, Lui, Meijun Zhao, Shigeru Kuchii, Chin Sai Wong, Chung Sern Goh, Yi Hao He

Abstract:

This presentation presents an elderly care and assistive social robot development work. We named this robot JOS and he is restricted to table top operation. JOS is designed to have a maximum volume of 3600 cm3 with its base restricted to 250 mm and his mission is to provide companion, assist and help the elderly. In order for JOS to accomplish his mission, he will be equipped with perception, reaction and cognition capability. His appearance will be not human like but more towards cute and approachable type. JOS will also be designed to be neutral gender. However, the robot will still have eyes, eyelid and a mouth. For his eyes and eyelids, they will be built entirely with Robotis Dynamixel AX18 motor. To realize this complex task, JOS will be also be equipped with micro-phone array, vision camera and Intel i5 NUC computer and a powered by a 12 V lithium battery that will be self-charging. His face is constructed using 1 motor each for the eyelid, 2 motors for the eyeballs, 3 motors for the neck mechanism and 1 motor for the lips movement. The vision senor will be house on JOS forehead and the microphone array will be somewhere below the mouth. For the vision system, Omron latest OKAO vision sensor is used. It is a compact and versatile sensor that is only 60mm by 40mm in size and operates with only 5V supply. In addition, OKAO vision sensor is capable of identifying the user and recognizing the expression of the user. With these functions, JOS is able to track and identify the user. If he cannot recognize the user, JOS will ask the user if he would want him to remember the user. If yes, JOS will store the user information together with the capture face image into a database. This will allow JOS to recognize the user the next time the user is with JOS. In addition, JOS is also able to interpret the mood of the user through the facial expression of the user. This will allow the robot to understand the user mood and behavior and react according. Machine learning will be later incorporated to learn the behavior of the user so as to understand the mood of the user and requirement better. For the speech system, Microsoft speech and grammar engine is used for the speech recognition. In order to use the speech engine, we need to build up a speech grammar database that captures the commonly used words by the elderly. This database is built from research journals and literature on elderly speech and also interviewing elderly what do they want to robot to assist them with. Using the result from the interview and research from journal, we are able to derive a set of common words the elderly frequently used to request for the help. It is from this set that we build up our grammar database. In situation where there is more than one person near JOS, he is able to identify the person who is talking to him through an in-house developed microphone array structure. In order to make the robot more interacting, we have also included the capability for the robot to express his emotion to the user through the facial expressions by changing the position and movement of the eyelids and mouth. All robot emotions will be in response to the user mood and request. Lastly, we are expecting to complete this phase of project and test it with elderly and also delirium patient by Feb 2015.

Keywords: social robot, vision, elderly care, machine learning

Procedia PDF Downloads 432
2451 Impact of Marketing towards Behavior Intention

Authors: Sathyamangalam Rangasamy Guru Prasath

Abstract:

Due to the increasing homogeneity in product offerings, the attendant services provided are emerging as a key differentiator in the mind of the consumers. Services marketing are a sub field of marketing which covers the marketing of both goods and services. Service marketing differs from product marketing due to the face that services are intangible and typically require personal interaction with the customer. Relationships are a key factor when it comes to the marketing of services. The role of interpersonal relationships distinguishes service and product marketing in strategic vision and organizational considerations. This paper explores some of the trends in service marketing as they relate to strategic vision, operational and organizational changes, and marketing tactics. The presence of the customer in the service facility means that capacity management becomes an important driver of the firm’s profitability service marketing is a process from the organization’s point of view, but an experience from the customer’s perspective. The quality of the experience is a function of the careful design of customer service processes, adoption of standardized procedures, rigorous management of service quality, high standards of training and automation. Services marketing helps to ensure that these processes are designed from the customer’s perspective. Services marketing includes customer loyalty, managing relationships, complaint handling, improving service quality and productivity of service operations, and how to become a service leader in your industry.

Keywords: customer perspective, product marketing, service marketing, rigorous management

Procedia PDF Downloads 358
2450 Artificial Intelligence in Management Simulators

Authors: Nuno Biga

Abstract:

Artificial Intelligence (AI) allows machines to interpret information and learn from context analysis, giving them the ability to make predictions adjusted to each specific situation. In addition to learning by performing deterministic and probabilistic calculations, the 'artificial brain' also learns through information and data provided by those who train it, namely its users. The "Assisted-BIGAMES" version of the Accident & Emergency (A&E) simulator introduces the concept of a "Virtual Assistant" (VA) that provides users with useful suggestions, namely to pursue the following operations: a) to relocate workstations in order to shorten travelled distances and minimize the stress of those involved; b) to identify in real time the bottleneck(s) in the operations system so that it is possible to quickly act upon them; c) to identify resources that should be polyvalent so that the system can be more efficient; d) to identify in which specific processes it may be advantageous to establish partnership with other teams; and e) to assess possible solutions based on the suggested KPIs allowing action monitoring to guide the (re)definition of future strategies. This paper is built on the BIGAMES© simulator and presents the conceptual AI model developed in a pilot project. Each Virtual Assisted BIGAME is a management simulator developed by the author that guides operational and strategic decision making, providing users with useful information in the form of management recommendations that make it possible to predict the actual outcome of different alternative management strategic actions. The pilot project developed incorporates results from 12 editions of the BIGAME A&E that took place between 2017 and 2022 at AESE Business School, based on the compilation of data that allows establishing causal relationships between decisions taken and results obtained. The systemic analysis and interpretation of this information is materialised in the Assisted-BIGAMES through a computer application called "BIGAMES Virtual Assistant" that players can use during the Game. Each participant in the Virtual Assisted-BIGAMES permanently asks himself about the decisions he should make during the game in order to win the competition. To this end, the role of the VA of each team consists in guiding the players to be more effective in their decision making through presenting recommendations based on AI methods. It is important to note that the VA's suggestions for action can be accepted or rejected by the managers of each team, and as the participants gain a better understanding of the game, they will more easily dispense with the VA's recommendations and rely more on their own experience, capability, and knowledge to support their own decisions. Preliminary results show that the introduction of the VA provides a faster learning of the decision-making process. The facilitator (Serious Game Controller) is responsible for supporting the players with further analysis and the recommended action may be (or not) aligned with the previous recommendations of the VA. All the information should be jointly analysed and assessed by each player, who are expected to add “Emotional Intelligence”, a component absent from the machine learning process.

Keywords: artificial intelligence (AI), gamification, key performance indicators (KPI), machine learning, management simulators, serious games, virtual assistant

Procedia PDF Downloads 89