Search results for: guzheng playing techniques
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6946

Search results for: guzheng playing techniques

4006 Scientific Theoretical Fundamentals of Comparative Analysis

Authors: Khalliyeva Gulnoz Iskandarovna, Mannonova Feruzabonu Sherali Qizi

Abstract:

A scientific field called comparative literature or literary comparative studies compares two or more literary phenomena. One of the most important scientific fields nowadays, when global social, cultural, and literary relations are growing daily, is comparative literature. Any comparative investigation reveals shared and unique characteristics of literary phenomena, which provide the cornerstone for the creation of overarching theoretical principles that apply to all literature. Comparative analysis consists of objects, and they are their constituents. For researchers, it is enough to know this. Comparative analysis, in addition to the above-mentioned actions, also focuses on comparing the components of the objects of analysis with each other. The purpose of this article is to investigate comparative analysis in literature and to identify similarities and differences between comparable objects. Students, teachers, and researchers should be able to describe comparative research techniques and their fundamental ideas when studying this topic. They should also have a basic understanding of comparative literature and their summary.

Keywords: object, natural, social, spiritual, epistemological, logical, methodological, methodological, axiological tasks, stages of comparison, environment, internal features, and typical situations

Procedia PDF Downloads 46
4005 Traditional Practices of Conserving Biodiversity: A Case Study around Jim Corbett National Park, Uttarakhand, India

Authors: Rana Parween, Rob Marchant

Abstract:

With the continued loss of global biodiversity despite the application of modern conservation techniques, it has become crucial to investigate non-conventional methods. Accelerated destruction of ecosystems due to altered land use, climate change, cultural and social change, necessitates the exploration of society-biodiversity attitudes and links. While the loss of species and their extinction is a well-known and well-documented process that attracts much-needed attention from researchers, academics, government and non-governmental organizations, the loss of traditional ecological knowledge and practices is more insidious and goes unnoticed. The growing availability of 'indirect experiences' such as the internet and media are leading to a disaffection towards nature and the 'Extinction of Experience'. Exacerbated by the lack of documentation of traditional practices and skills, there is the possibility for the 'extinction' of traditional practices and skills before they are fully recognized and captured. India, as a mega-biodiverse country, is also known for its historical conservation strategies entwined in traditional beliefs. Indigenous communities hold skillsets, knowledge, and traditions that have accumulated over multiple generations and may play an important role in conserving biodiversity today. This study explores the differences in knowledge and attitudes towards conserving biodiversity, of three different stakeholder groups living around Jim Corbett National Park, based on their age, traditions, and association with the protected area. A triangulation designed multi-strategy investigation collected qualitative and quantitative data through a questionnaire survey of village elders, the general public, and forest officers. Following an inductive approach to analyzing qualitative data, the thematic content analysis was followed. All coding and analysis were completed using NVivo 11. Although the village elders and some general public had vast amounts of traditional knowledge, most of it was related to animal husbandry and the medicinal value of plants. Village elders were unfamiliar with the concept of the term ‘biodiversity’ albeit their way of life and attitudes ensured that they care for the ecosystem without having the scientific basis underpinning biodiversity conservation. Inherently, village elders were keen to conserve nature; the superimposition of governmental policies without any tangible benefit or consultation was seen as detrimental. Alienating villagers and consequently the village elders who are the reservoirs of traditional knowledge would not only be damaging to the social network of the area but would also disdain years of tried and tested techniques held by the elders. Forest officers advocated for biodiversity and conservation education for women and children. Women, across all groups, when questioned about nature conservation, showed more interest in learning and participation. Biodiversity not only has an ethical and cultural value, but also plays a role in ecosystem function and, thus, provides ecosystem services and supports livelihoods. Therefore, underpinning and using traditional knowledge and incorporating them into programs of biodiversity conservation should be explored with a sense of urgency.

Keywords: biological diversity, mega-biodiverse countries, traditional ecological knowledge, society-biodiversity links

Procedia PDF Downloads 89
4004 An Evaluation of Barriers to Implement Reverse Logistics: A Case Study of Indian Fastener Industry

Authors: D. Garg, S. Luthra, A. Haleem

Abstract:

Reverse logistics (RL) is supposed to be a systematic procedure that helps in improving the environmental hazards and maintain business sustainability for industries. Industries in Indian are now opting for adoption of RL techniques in business. But, RL practices are not popular in Indian industries because of many barriers for its successful implementation. Therefore, need arises to identify and evaluate the barriers to implement RL practices by taking an Indian industries perspective. Literature review approach and case study approach have been adapted to identify relevant barriers to implement RL practices. Further, Fuzzy Decision Making Trial and Evaluation Laboratory methodology has been brought into use for evaluating causal relationships among the barriers to implement RL practices. Seven barriers out of ten barriers have been categorized into the cause group and remaining into effect group. This research will help Indian industries to manage these barriers towards effective implementing RL practices.

Keywords: barriers, decision making trial and evaluation laboratory (DEMATEL), fuzzy set theory, Indian industries, reverse logistics (RL)

Procedia PDF Downloads 310
4003 Traffic Light Detection Using Image Segmentation

Authors: Vaishnavi Shivde, Shrishti Sinha, Trapti Mishra

Abstract:

Traffic light detection from a moving vehicle is an important technology both for driver safety assistance functions as well as for autonomous driving in the city. This paper proposed a deep-learning-based traffic light recognition method that consists of a pixel-wise image segmentation technique and a fully convolutional network i.e., UNET architecture. This paper has used a method for detecting the position and recognizing the state of the traffic lights in video sequences is presented and evaluated using Traffic Light Dataset which contains masked traffic light image data. The first stage is the detection, which is accomplished through image processing (image segmentation) techniques such as image cropping, color transformation, segmentation of possible traffic lights. The second stage is the recognition, which means identifying the color of the traffic light or knowing the state of traffic light which is achieved by using a Convolutional Neural Network (UNET architecture).

Keywords: traffic light detection, image segmentation, machine learning, classification, convolutional neural networks

Procedia PDF Downloads 153
4002 Analysis of Q-Learning on Artificial Neural Networks for Robot Control Using Live Video Feed

Authors: Nihal Murali, Kunal Gupta, Surekha Bhanot

Abstract:

Training of artificial neural networks (ANNs) using reinforcement learning (RL) techniques is being widely discussed in the robot learning literature. The high model complexity of ANNs along with the model-free nature of RL algorithms provides a desirable combination for many robotics applications. There is a huge need for algorithms that generalize using raw sensory inputs, such as vision, without any hand-engineered features or domain heuristics. In this paper, the standard control problem of line following robot was used as a test-bed, and an ANN controller for the robot was trained on images from a live video feed using Q-learning. A virtual agent was first trained in simulation environment and then deployed onto a robot’s hardware. The robot successfully learns to traverse a wide range of curves and displays excellent generalization ability. Qualitative analysis of the evolution of policies, performance and weights of the network provide insights into the nature and convergence of the learning algorithm.

Keywords: artificial neural networks, q-learning, reinforcement learning, robot learning

Procedia PDF Downloads 358
4001 Presentation of HVA Faults in SONELGAZ Underground Network and Methods of Faults Diagnostic and Faults Location

Authors: I. Touaїbia, E. Azzag, O. Narjes

Abstract:

Power supply networks are growing continuously and their reliability is getting more important than ever. The complexity of the whole network comprises numerous components that can fail and interrupt the power supply for the end user. Underground distribution systems are normally exposed to permanent faults, due to specific construction characteristics. In these systems, visual inspection cannot be performed. In order to enhance service restoration, accurate fault location techniques must be applied. This paper describes the different faults that affect the underground distribution system of SONELGAZ (National Society of Electricity and Gas of Algeria), and cable fault location procedure with impulse reflection method (TDR), based in the analyses of the cable response of the electromagnetic impulse, allows cable fault prelocation. The results are obtained from real test in the underground distribution feeder from electrical network of energy distribution company of Souk-Ahras, in order to know the influence of cable characteristics in the types and frequency of faults.

Keywords: distribution networks, fault location, TDR, underground cable

Procedia PDF Downloads 515
4000 Machine Learning Automatic Detection on Twitter Cyberbullying

Authors: Raghad A. Altowairgi

Abstract:

With the wide spread of social media platforms, young people tend to use them extensively as the first means of communication due to their ease and modernity. But these platforms often create a fertile ground for bullies to practice their aggressive behavior against their victims. Platform usage cannot be reduced, but intelligent mechanisms can be implemented to reduce the abuse. This is where machine learning comes in. Understanding and classifying text can be helpful in order to minimize the act of cyberbullying. Artificial intelligence techniques have expanded to formulate an applied tool to address the phenomenon of cyberbullying. In this research, machine learning models are built to classify text into two classes; cyberbullying and non-cyberbullying. After preprocessing the data in 4 stages; removing characters that do not provide meaningful information to the models, tokenization, removing stop words, and lowering text. BoW and TF-IDF are used as the main features for the five classifiers, which are; logistic regression, Naïve Bayes, Random Forest, XGboost, and Catboost classifiers. Each of them scores 92%, 90%, 92%, 91%, 86% respectively.

Keywords: cyberbullying, machine learning, Bag-of-Words, term frequency-inverse document frequency, natural language processing, Catboost

Procedia PDF Downloads 113
3999 Housing Price Prediction Using Machine Learning Algorithms: The Case of Melbourne City, Australia

Authors: The Danh Phan

Abstract:

House price forecasting is a main topic in the real estate market research. Effective house price prediction models could not only allow home buyers and real estate agents to make better data-driven decisions but may also be beneficial for the property policymaking process. This study investigates the housing market by using machine learning techniques to analyze real historical house sale transactions in Australia. It seeks useful models which could be deployed as an application for house buyers and sellers. Data analytics show a high discrepancy between the house price in the most expensive suburbs and the most affordable suburbs in the city of Melbourne. In addition, experiments demonstrate that the combination of Stepwise and Support Vector Machine (SVM), based on the Mean Squared Error (MSE) measurement, consistently outperforms other models in terms of prediction accuracy.

Keywords: house price prediction, regression trees, neural network, support vector machine, stepwise

Procedia PDF Downloads 206
3998 Robust and Dedicated Hybrid Cloud Approach for Secure Authorized Deduplication

Authors: Aishwarya Shekhar, Himanshu Sharma

Abstract:

Data deduplication is one of important data compression techniques for eliminating duplicate copies of repeating data, and has been widely used in cloud storage to reduce the amount of storage space and save bandwidth. In this process, duplicate data is expunged, leaving only one copy means single instance of the data to be accumulated. Though, indexing of each and every data is still maintained. Data deduplication is an approach for minimizing the part of storage space an organization required to retain its data. In most of the company, the storage systems carry identical copies of numerous pieces of data. Deduplication terminates these additional copies by saving just one copy of the data and exchanging the other copies with pointers that assist back to the primary copy. To ignore this duplication of the data and to preserve the confidentiality in the cloud here we are applying the concept of hybrid nature of cloud. A hybrid cloud is a fusion of minimally one public and private cloud. As a proof of concept, we implement a java code which provides security as well as removes all types of duplicated data from the cloud.

Keywords: confidentiality, deduplication, data compression, hybridity of cloud

Procedia PDF Downloads 368
3997 Contraction and Membrane Potential of C2C12 with GTXs

Authors: Bayan Almofty, Yuto Yamaki, Tadamasa Terai, Sadahito Uto

Abstract:

Culture techniques of skeletal muscle cells are advanced in the field of regenerative medicine and applied research of cultured muscle. As applied research of cultured muscle, myopathy (muscles disease) treatment is expected and development bio of actuator is also expected in biomedical engineering. Grayanotoxins (GTXs) is known as neurotoxins that enhance the permeability of cell membrane for Na ions. Grayanotoxins are extracted from a famous Pieris japonica and Ericaceae as well as a phytotoxin. In this study, we investigated the effect of GTXs on muscle cells (C2C12) contraction and membrane potential. Contraction of myotubes is induced by applied external electrical stimulation. Contraction and membrane potential change of skeletal muscle cells are induced by injection of current. We, therefore, concluded that effect of Grayanotoxins on contraction and membrane potential of C2C12 relate to acute toxicity of GTXs.

Keywords: skeletal muscle cells C2C12, grayanotoxins, contraction, membrane potential, acute toxicity, pytotoxin, motubes

Procedia PDF Downloads 493
3996 Integration of Fuzzy Logic in the Representation of Knowledge: Application in the Building Domain

Authors: Hafida Bouarfa, Mohamed Abed

Abstract:

The main object of our work is the development and the validation of a system indicated Fuzzy Vulnerability. Fuzzy Vulnerability uses a fuzzy representation in order to tolerate the imprecision during the description of construction. At the the second phase, we evaluated the similarity between the vulnerability of a new construction and those of the whole of the historical cases. This similarity is evaluated on two levels: 1) individual similarity: bases on the fuzzy techniques of aggregation; 2) Global similarity: uses the increasing monotonous linguistic quantifiers (RIM) to combine the various individual similarities between two constructions. The third phase of the process of Fuzzy Vulnerability consists in using vulnerabilities of historical constructions narrowly similar to current construction to deduce its estimate vulnerability. We validated our system by using 50 cases. We evaluated the performances of Fuzzy Vulnerability on the basis of two basic criteria, the precision of the estimates and the tolerance of the imprecision along the process of estimation. The comparison was done with estimates made by tiresome and long models. The results are satisfactory.

Keywords: case based reasoning, fuzzy logic, fuzzy case based reasoning, seismic vulnerability

Procedia PDF Downloads 281
3995 An Application of Geographic Information System to Select Areas for Sanitary Landfill in Bang Nok- Khwaek Municipality

Authors: Musthaya Patchanee

Abstract:

The study of Sanitary landfill in Bang Nok-khwaek municipality consists of two procedures. First, to survey and create the spatial database by using physical factor, environmental factor, economical factor and social factor to follow the method of Geographic information system: GIS, second, to analyze the proper spatial for allocating the sanitary landfill in Bang Nok-khwaek municipality by using Overlay techniques to calculate the weighting linear total in Arc GIS program. The study found that there are 2.49 sq.km. proper spatial for the sanitary landfill in Bang Nok-khwaek municipals city which is 66.76% of the whole area. The highest proper spatial is 0.02 sq.km. which is 0.54%, The high proper spatial is 0.3 sq.km. which is 8.04%, the moderate spatial is 1.62 sq.km. which is 43.43% and the low proper spatial is 0.55 sq.km. which is 14.75%. These results will be used as the guideline to select the sanitary landfill area in accordance with sanitation standard for Subdistrict Administrative Organization and Subbdistrict Municipality in Samut Songkhram provice.

Keywords: Geographic Information System (GIS), sanitary landfill, Bang Nok-Khwaek municipality, Subdistrict Administrative Organization

Procedia PDF Downloads 383
3994 Detecting Heartbeat Architectural Tactic in Source Code Using Program Analysis

Authors: Ananta Kumar Das, Sujit Kumar Chakrabarti

Abstract:

Architectural tactics such as heartbeat, ping-echo, encapsulate, encrypt data are techniques that are used to achieve quality attributes of a system. Detecting architectural tactics has several benefits: it can aid system comprehension (e.g., legacy systems) and in the estimation of quality attributes such as safety, security, maintainability, etc. Architectural tactics are typically spread over the source code and are implicit. For large codebases, manual detection is often not feasible. Therefore, there is a need for automated methods of detection of architectural tactics. This paper presents a formalization of the heartbeat architectural tactic and a program analytic approach to detect this tactic in source code. The experiment of the proposed method is done on a set of Java applications. The outcome of the experiment strongly suggests that the method compares well with a manual approach in terms of its sensitivity and specificity, and far supersedes a manual exercise in terms of its scalability.

Keywords: software architecture, architectural tactics, detecting architectural tactics, program analysis, AST, alias analysis

Procedia PDF Downloads 142
3993 Design and Simulation of Variable Air Volume Air Conditioning System Based on Improved Sliding Mode Control

Authors: Abbas Anser, Ahmad Irfan

Abstract:

The main purpose of the VAV (Variable Air Volume) in Heating, Ventilation, and Air Conditioning (HVAC) system is to reduce energy consumption and make the buildings comfortable for the occupants. For better performance of the air conditioning system, different control techniques have been developed. In this paper, an Improved Sliding Mode Control (ISMC), based on Power Rate Exponential Reaching Law (PRERL), has been implemented on a VAV air conditioning system. Through the proposed technique, fast response and robustness have been achieved. To verify the efficacy of ISMC, a comparison of the suggested control technique has been made with Exponential Reaching Law (ERL) based SMC. And secondly, chattering, which is unfavorable as it deteriorates the mechanical parts of the air conditioning system by the continuous movement of the mechanical parts and consequently it increases the energy loss in the air conditioning system, has been alleviated. MATLAB/SIMULINK results show the effectiveness of the utilized scheme, which ensures the enhancement of the energy efficiency of the VAV air conditioning system.

Keywords: PID, SMC, HVAC, PRERL, feedback linearization, VAV, chattering

Procedia PDF Downloads 109
3992 Ag and Au Nanoparticles Fabrication in Cross-Linked Polymer Microgels for Their Comparative Catalytic Study

Authors: Luqman Ali Shah, Murtaza Sayed, Mohammad Siddiq

Abstract:

Three-dimensional cross-linked polymer microgels with temperature responsive N-isopropyl acrylamide (NIPAM) and pH-sensitive methacrylic acid (MAA) were successfully synthesized by free radical emulsion polymerization with different amount of MAA. Silver and gold nanoparticles with size of 6.5 and 3.5 nm (±0.5 nm) respectively were homogeneously reduced inside these materials by chemical reduction method at pH 2.78 and 8.36 for the preparation of hybrid materials. The samples were characterized by FTIR, DLS and TEM techniques. The catalytic activity of the hybrid materials was investigated for the reduction of 4-nitrophenol (4- NP) using NaBH4 as reducing agent by UV-visible spectroscopy. The hybrid polymer network synthesized at pH 8.36 shows enhanced catalytic efficiency compared to catalysts synthesized at pH 2.78. In this study, it has been explored that catalyst activity strongly depends on amount of MAA, synthesis pH and type of metal nanoparticles entrapped.

Keywords: cross-linked polymer microgels, free radical polymerization, metal nanoparticles, catalytic activity, comparative study

Procedia PDF Downloads 308
3991 Performance Evaluation of an Inventive Co2 Gas Separation Inorganic Ceramic Membrane System

Authors: Ngozi Claribelle Nwogu, Mohammed Nasir Kajama, Oyoh Kechinyere, Edward Gobina

Abstract:

Atmospheric carbon dioxide emissions are considered as the greatest environmental challenge the world is facing today. The challenges to control the emissions include the recovery of CO2 from flue gas. This concern has been improved due to recent advances in materials process engineering resulting in the development of inorganic gas separation membranes with excellent thermal and mechanical stability required for most gas separations. This paper therefore evaluates the performance of a highly selective inorganic membrane for CO2 recovery applications. Analysis of results obtained is in agreement with experimental literature data. Further results show the prediction performance of the membranes for gas separation and the future direction of research. The materials selection and the membrane preparation techniques are discussed. Method of improving the interface defects in the membrane and its effect on the separation performance has also been reviewed and in addition advances to totally exploit the potential usage of this innovative membrane.

Keywords: carbon dioxide, gas separation, inorganic ceramic membrane, permselectivity

Procedia PDF Downloads 320
3990 Implementation in Python of a Method to Transform One-Dimensional Signals in Graphs

Authors: Luis Andrey Fajardo Fajardo

Abstract:

We are immersed in complex systems. The human brain, the galaxies, the snowflakes are examples of complex systems. An area of interest in Complex systems is the chaos theory. This revolutionary field of science presents different ways of study than determinism and reductionism. Here is where in junction with the Nonlinear DSP, chaos theory offer valuable techniques that establish a link between time series and complex theory in terms of complex networks, so that, the study of signals can be explored from the graph theory. Recently, some people had purposed a method to transform time series in graphs, but no one had developed a suitable implementation in Python with signals extracted from Chaotic Systems or Complex systems. That’s why the implementation in Python of an existing method to transform one dimensional chaotic signals from time domain to graph domain and some measures that may reveal information not extracted in the time domain is proposed.

Keywords: Python, complex systems, graph theory, dynamical systems

Procedia PDF Downloads 496
3989 HPPDFIM-HD: Transaction Distortion and Connected Perturbation Approach for Hierarchical Privacy Preserving Distributed Frequent Itemset Mining over Horizontally-Partitioned Dataset

Authors: Fuad Ali Mohammed Al-Yarimi

Abstract:

Many algorithms have been proposed to provide privacy preserving in data mining. These protocols are based on two main approaches named as: the perturbation approach and the Cryptographic approach. The first one is based on perturbation of the valuable information while the second one uses cryptographic techniques. The perturbation approach is much more efficient with reduced accuracy while the cryptographic approach can provide solutions with perfect accuracy. However, the cryptographic approach is a much slower method and requires considerable computation and communication overhead. In this paper, a new scalable protocol is proposed which combines the advantages of the perturbation and distortion along with cryptographic approach to perform privacy preserving in distributed frequent itemset mining on horizontally distributed data. Both the privacy and performance characteristics of the proposed protocol are studied empirically.

Keywords: anonymity data, data mining, distributed frequent itemset mining, gaussian perturbation, perturbation approach, privacy preserving data mining

Procedia PDF Downloads 490
3988 A Sector-Wise Study on Detecting Earnings Management in India

Authors: Raghuveer Kaur, Kartikay Sharma, Ashu Khanna

Abstract:

Earnings management has been present from times immemorial. The recent downfall of giant enterprises like Enron, Satyam and WorldCom has brought a lot of focus on the study and detection of earnings management. The present study is an attempt to study earnings management in one of the fastest emerging economy - India. The study makes an attempt to understand earnings management in different sectors of the economy. The paper first tests a hypothesis to check whether different sectors of India are engaged in earnings management or not. In the later section the paper aims to study the level of earnings management in 6 popular sectors of India: IT&BPO, Retail, Telecom, Biotech, Hotels and coffee. To measure earnings management two popular techniques of detecting earnings management has been employed: Modified Jones Model and Beniesh M Score. A total of 332 companies were studied. Publicly available data from Capitaline database has been used. The paper also classifies the top and bottom five performers on the basis of sales turnover in each sector and identifies whether they manage their earnings or not.

Keywords: earnings management, India, modified Jones model, Beneish M score

Procedia PDF Downloads 499
3987 Recovery of Petroleum Reservoir by Waterflooding Technique

Authors: Zabihullah Mahdi, Khwaja Naweed Seddiqi, Shigeo Honma

Abstract:

Through many types of research and practical studies, it has been identified that the average oil recovery factor of a petroleum reservoir is about 30 to 35 %. This study is focused on enhanced oil recovery by laboratory experiment and graphical investigation based on Buckley-Leverett theory. Horizontal oil displacement by water, in a petroleum reservoir is analyzed under the Buckley-Leverett frontal displacement theory. The extraction and prerequisite of this theory are based and pursued focusing on the key factors that control displacement. The theory is executable to the waterflooding method, which is generally employed in petroleum engineering reservoirs to sustain oil production recovery, and the techniques for evaluating the average water saturation behind the water front and the oil recovery factors in the reservoirs are presented. In this paper, the Buckley-Leverett theory handled to an experimental model and the amount of recoverable oil are investigated to be over 35%. The irreducible water saturation, viz. connate water saturation, in the reservoir is also a significant inspiration for the recovery.

Keywords: Buckley-Leverett theory, waterflooding technique, petroleum engineering, immiscible displacement

Procedia PDF Downloads 236
3986 Improving the Ability of Constructed Wetlands to Treat Acid Mine Drainage

Authors: Chigbo Emmanuel Ikechukwu

Abstract:

Constructed wetlands are seen as a potential means of ameliorating the poor quality water that derives from coal and gold mining operations. However, the processes whereby a wetland environment is able to improve water quality are not well understood and techniques for optimising their performance poorly developed. A parameter that may be manipulated in order to improve the treatment capacity of a wetland is the substrate in which the aquatic plants are rooted. This substrate can provide an environment wherein sulphate reducing bacteria, which contribute to the removal of contaminants from the water, are able to flourish. The bacteria require an energy source which is largely provided by carbon in the substrate. This paper discusses the form in which carbon is most suitable for the bacteria and describes the results of a series of experiments in which different materials were used as substrate. Synthetic acid mine drainage was passed through an anaerobic bioreactor that contained either compost or cow manure. The effluent water quality was monitored with respect to time and the effect of the substrate composition discussed.

Keywords: constructed wetland, bacteria, carbon, acid mine drainage, sulphate

Procedia PDF Downloads 423
3985 Harmonic Data Preparation for Clustering and Classification

Authors: Ali Asheibi

Abstract:

The rapid increase in the size of databases required to store power quality monitoring data has demanded new techniques for analysing and understanding the data. One suggested technique to assist in analysis is data mining. Preparing raw data to be ready for data mining exploration take up most of the effort and time spent in the whole data mining process. Clustering is an important technique in data mining and machine learning in which underlying and meaningful groups of data are discovered. Large amounts of harmonic data have been collected from an actual harmonic monitoring system in a distribution system in Australia for three years. This amount of acquired data makes it difficult to identify operational events that significantly impact the harmonics generated on the system. In this paper, harmonic data preparation processes to better understanding of the data have been presented. Underlying classes in this data has then been identified using clustering technique based on the Minimum Message Length (MML) method. The underlying operational information contained within the clusters can be rapidly visualised by the engineers. The C5.0 algorithm was used for classification and interpretation of the generated clusters.

Keywords: data mining, harmonic data, clustering, classification

Procedia PDF Downloads 232
3984 Innovations in Teaching

Authors: Dilek Turan Eroğlu

Abstract:

Educators have been searching the more effective and appalling methods of teaching for ages. It has always been an issue among the teachers and scientists to improve the quality of education and to ensure that all students have equal opportunities to learn. However, when it comes to the effective ways of learning,the learners are exposed to the ways which are chosen and approved to be effective by their teachers not by the learners themselves. This is the main problem of this study as the learners are not always happy to be in their classes being treated with their teachers’ favourite styles. This paper is telling the results of a study which has been conducted with the university students in Turkey. The students have been interviewed and asked to respond some questions related to best practices to find out their favourite styles, medium, techniques and strategies. The study has been conducted using qualitative research methods i.e one to one interviews and group discussions. The results show that the learners have significantly different views than the educators when it comes to modern teaching styles. Their definition of the term “modern teaching styles” is different than the general understanding. The university students expect their teachers to be “early adopter”. of ICT tools and or the other electronic devices, but a modern teacher must have many other characteristics for them.

Keywords: effective, innovation, teaching, modern teaching styles

Procedia PDF Downloads 334
3983 Comparing Nonverbal Deception Detection of Police Officers and Human Resources Students in the Czech Republic

Authors: Lenka Mynaříková, Hedvika Boukalová

Abstract:

The study looks at the ability to detect nonverbal deception among police officers and management students in the Czech Republic. Respondents from police departments (n=197) and university students of human resources (n=161) completed a deception detection task and evaluated veracity of the statements of suspects in 21 video clips from real crime investigations. Their evaluations were based on nonverbal behavior. Voices in the video clips were modified so that words were not recognizable, yet paraverbal voice characteristics were preserved. Results suggest that respondents have a tendency to lie bias based on their profession. In the evaluation of video clips, stereotypes also played a significant role. The statements of suspects of a different ethnicity, younger age or specific visual features were considered deceitful more often. Research might be beneficial for training in professions that are in need of deception detection techniques.

Keywords: deception detection, police officers, human resources, forensic psychology, forensic studies, organizational psychology

Procedia PDF Downloads 416
3982 Standard and Processing of Photodegradable Polyethylene

Authors: Nurul-Akidah M. Yusak, Rahmah Mohamed, Noor Zuhaira Abd Aziz

Abstract:

The introduction of degradable plastic materials into agricultural sectors has represented a promising alternative to promote green agriculture and environmental friendly of modern farming practices. Major challenges of developing degradable agricultural films are to identify the most feasible types of degradation mechanisms, composition of degradable polymers and related processing techniques. The incorrect choice of degradable mechanisms to be applied during the degradation process will cause premature losses of mechanical performance and strength. In order to achieve controlled process of agricultural film degradation, the compositions of degradable agricultural film also important in order to stimulate degradation reaction at required interval of time and to achieve sustainability of the modern agricultural practices. A set of photodegradable polyethylene based agricultural film was developed and produced, following the selective optimization of processing parameters of the agricultural film manufacturing system. Example of agricultural films application for oil palm seedlings cultivation is presented.

Keywords: photodegradable polyethylene, plasticulture, processing schemes

Procedia PDF Downloads 500
3981 Optimization of Multi-Zone Unconventional (Shale) Gas Reservoir Using Hydraulic Fracturing Technique

Authors: F. C. Amadi, G. C. Enyi, G. G. Nasr

Abstract:

Hydraulic fracturing is one of the most important stimulation techniques available to the petroleum engineer to extract hydrocarbons in tight gas sandstones. It allows more oil and gas production in tight reservoirs as compared to conventional means. The main aim of the study is to optimize the hydraulic fracturing as technique and for this purpose three multi-zones layer formation is considered and fractured contemporaneously. The three zones are named as Zone1 (upper zone), Zone2 (middle zone) and Zone3 (lower zone) respectively and they all occur in shale rock. Simulation was performed with Mfrac integrated software which gives a variety of 3D fracture options. This simulation process yielded an average fracture efficiency of 93.8%for the three respective zones and an increase of the average permeability of the rock system. An average fracture length of 909 ft with net height (propped height) of 210 ft (average) was achieved. Optimum fracturing results was also achieved with maximum fracture width of 0.379 inches at an injection rate of 13.01 bpm with 17995 Mscf of gas production.

Keywords: hydraulic fracturing, optimisation, shale, tight reservoir

Procedia PDF Downloads 413
3980 Passive Non-Prehensile Manipulation on Helix Path Based on Mechanical Intelligence

Authors: Abdullah Bajelan, Adel Akbarimajd

Abstract:

Object manipulation techniques in robotics can be categorized in two major groups including manipulation with grasp and manipulation without grasp. The original aim of this paper is to develop an object manipulation method where in addition to being grasp-less, the manipulation task is done in a passive approach. In this method, linear and angular positions of the object are changed and its manipulation path is controlled. The manipulation path is a helix track with constant radius and incline. The method presented in this paper proposes a system which has not the actuator and the active controller. So this system requires a passive mechanical intelligence to convey the object from the status of the source along the specified path to the goal state. This intelligent is created based on utilizing the geometry of the system components. A general set up for the components of the system is considered to satisfy the required conditions. Then after kinematical analysis, detailed dimensions and geometry of the mechanism is obtained. The kinematical results are verified by simulation in ADAMS.

Keywords: mechanical intelligence, object manipulation, passive mechanism, passive non-prehensile manipulation

Procedia PDF Downloads 470
3979 Evaluations of 3D Concrete Printing Produced in the Environment of United Arab Emirates

Authors: Adil K. Tamimi, Tarig Ali, Rawan Anoohi, Ahmed Rajput, Kaltham Alkamali

Abstract:

3D concrete printing is one of the most innovative and modern techniques in the field of construction that achieved several milestones in that field for the following advantages: saving project’s time, ability to execute complicated shapes, reduce waste and low cost. However, the concept of 3D printing in UAE is relatively new where construction teams, including clients, consultants, and contractors, do not have the required knowledge and experience in the field. This is the most significant obstacle for the construction parties, which make them refrained from using 3D concrete printing compared to conventional concreting methods. This study shows the historical development of the 3D concrete printing, its advantages, and the challenges facing this innovation. Concrete mixes and materials have been proposed and evaluated to select the best combination for successful 3D concrete printing. The main characteristics of the 3D concrete printing in the fresh and hardened states are considered, such as slump test, flow table, compressive strength, tensile, and flexural strengths. There is need to assess the structural stability of the 3D concrete by testing the bond between interlayers of the concrete.  

Keywords: 3D printing, workability, compressive strength, robots, dimensions

Procedia PDF Downloads 131
3978 Predicting Bridge Pier Scour Depth with SVM

Authors: Arun Goel

Abstract:

Prediction of maximum local scour is necessary for the safety and economical design of the bridges. A number of equations have been developed over the years to predict local scour depth using laboratory data and a few pier equations have also been proposed using field data. Most of these equations are empirical in nature as indicated by the past publications. In this paper, attempts have been made to compute local depth of scour around bridge pier in dimensional and non-dimensional form by using linear regression, simple regression and SVM (Poly and Rbf) techniques along with few conventional empirical equations. The outcome of this study suggests that the SVM (Poly and Rbf) based modeling can be employed as an alternate to linear regression, simple regression and the conventional empirical equations in predicting scour depth of bridge piers. The results of present study on the basis of non-dimensional form of bridge pier scour indicates the improvement in the performance of SVM (Poly and Rbf) in comparison to dimensional form of scour.

Keywords: modeling, pier scour, regression, prediction, SVM (Poly and Rbf kernels)

Procedia PDF Downloads 436
3977 Effectiveness of Video Interventions for Perpetrators of Domestic Violence

Authors: Zeynep Turhan

Abstract:

Digital tools can improve knowledge and awareness of strategies and skills for healthy and respectful intimate relationships. The website of the Healthy and Respectful Relationship Program has been developed and included five key videos about how to build healthy intimate relationships. This study examined the perspectives about informative videos by focusing on how individuals learn new information or challenge their preconceptions or attitudes regarding male privilege and women's oppression. Five individuals who received no-contact orders and attended group intervention were the sample of this study. The observation notes were the major methodology examining how participants responded to video tools. The data analysis method was the interpretative phenomenological analysis. The results showed that many participants found the tools useful in learning the types of violence and communication strategies. Nevertheless, obstacles to implementing some techniques were found in their relationships. These digital tools might enhance healthy and respectful relationships despite some limitations.

Keywords: healthy relationship, digital tools, intimate partner violence, perpetrators, video interventions

Procedia PDF Downloads 77