Search results for: Sewage Network
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4833

Search results for: Sewage Network

4773 Application of Typha domingensis Pers. in Artificial Floating for Sewage Treatment

Authors: Tatiane Benvenuti, Fernando Hamerski, Alexandre Giacobbo, Andrea M. Bernardes, Marco A. S. Rodrigues

Abstract:

Population growth in urban areas has caused damages to the environment, a consequence of the uncontrolled dumping of domestic and industrial wastewater. The capacity of some plants to purify domestic and agricultural wastewater has been demonstrated by several studies. Since natural wetlands have the ability to transform, retain and remove nutrients, constructed wetlands have been used for wastewater treatment. They are widely recognized as an economical, efficient and environmentally acceptable means of treating many different types of wastewater. T. domingensis Pers. species have shown a good performance and low deployment cost to extract, detoxify and sequester pollutants. Constructed Floating Wetlands (CFWs) consist of emergent vegetation established upon a buoyant structure, floating on surface waters. The upper parts of the vegetation grow and remain primarily above the water level, while the roots extend down in the water column, developing an extensive under water-level root system. Thus, the vegetation grows hydroponically, performing direct nutrient uptake from the water column. Biofilm is attached on the roots and rhizomes, and as physical and biochemical processes take place, the system functions as a natural filter. The aim of this study is to diagnose the application of macrophytes in artificial floating in the treatment of domestic sewage in south Brazil. The T. domingensis Pers. plants were placed in a flotation system (polymer structure), in full scale, in a sewage treatment plant. The sewage feed rate was 67.4 m³.d⁻¹ ± 8.0, and the hydraulic retention time was 11.5 d ± 1.3. This CFW treat the sewage generated by 600 inhabitants, which corresponds to 12% of the population served by this municipal treatment plant. During 12 months, samples were collected every two weeks, in order to evaluate parameters as chemical oxygen demand (COD), biochemical oxygen demand in 5 days (BOD5), total Kjeldahl nitrogen (TKN), total phosphorus, total solids, and metals. The average removal of organic matter was around 55% for both COD and BOD5. For nutrients, TKN was reduced in 45.9% what was similar to the total phosphorus removal, while for total solids the reduction was 33%. For metals, aluminum, copper, and cadmium, besides in low concentrations, presented the highest percentage reduction, 82.7, 74.4 and 68.8% respectively. Chromium, iron, and manganese removal achieved values around 40-55%. The use of T. domingensis Pers. in artificial floating for sewage treatment is an effective and innovative alternative in Brazilian sewage treatment systems. The evaluation of additional parameters in the treatment system may give useful information in order to improve the removal efficiency and increase the quality of the water bodies.

Keywords: constructed wetland, floating system, sewage treatment, Typha domingensis Pers.

Procedia PDF Downloads 171
4772 Occurrence and Fate of EDCs in Wastewater and Aquatic Environments in the West Bank of Palestine

Authors: Wa`d Odeh, Alon Tal, Alfred Abed Rabbo, Nader Al Khatib, Shai Arnon

Abstract:

The presence of endocrine disrupting compounds (EDCs) in raw sewage and effluents from wastewater treatment plants (WWTPs) has been increasingly studied in the last few decades. Higher risks are said to characterize situations where raw sewage streams are found to be flowing, or where partial and inadequate wastewater treatment exists. Such conditions are prevalent in the West Bank area of Palestine. To our knowledge, no previous data concerning the occurrence and fate of EDCs in the aquatic environment has ever been systematically evaluated in the region. Hence, the main objective of this study was to identify the occurrence and concentrations of major EDCs in raw sewage, wastewater effluents produced by treatment plants and in the receiving environments, including streams and groundwater in the West Bank, Palestine. Water samples were collected and analyzed for four times during the years of 2013 and 2014. Two large-scale conventional activated sludge WWTPs, two wastewater watercourses, one naturally perennial stream, and five groundwater locations close to wastewater sources were sampled and analyzed by GC/MS following EPA methods (525.2). Five EDCs (estriol, estrone, testosterone, bisphenol A, and octylphenol) were detected in trace concentrations (ng/l) in wastewater streams and at inputs to WWTPs. WWTPs were not able to achieve complete removal of all EDCs, and EDCs were still found in the effluents. In this regard, the most significant environmental estrogenic impact was due to estrone concentrations. Nevertheless, no EDCs were detected in groundwater. Yet, in order for effluents to be reused, significant improvement in treatment infrastructure should be a top priority for environmental managers in the region.

Keywords: endocrine disrupting compounds, raw sewage streams, conventional activated sludge WWTPs, WWTPs effluents

Procedia PDF Downloads 371
4771 Service Life Modelling of Concrete Deterioration Due to Biogenic Sulphuric Acid (BSA) Attack-State-of-an-Art-Review

Authors: Ankur Bansal, Shashank Bishnoi

Abstract:

Degradation of Sewage pipes, sewage pumping station and Sewage treatment plants(STP) is of major concern due to difficulty in their maintenance and the high cost of replacement. Most of these systems undergo degradation due to Biogenic sulphuric acid (BSA) attack. Since most of Waste water treatment system are underground, detection of this deterioration remains hidden. This paper presents a literature review, outlining the mechanism of this attack focusing on critical parameters of BSA attack, along with available models and software to predict the deterioration due to this attack. This paper critically examines the various steps and equation in various Models of BSA degradation, detail on assumptions and working of different softwares are also highlighted in this paper. The paper also focuses on the service life design technique available through various codes and method to integrate the servile life design with BSA degradation on concrete. In the end, various methods enhancing the resistance of concrete against Biogenic sulphuric acid attack are highlighted. It may be concluded that the effective modelling for degradation phenomena may bring positive economical and environmental impacts. With current computing capabilities integrated degradation models combining the various durability aspects can bring positive change for sustainable society.

Keywords: concrete degradation, modelling, service life, sulphuric acid attack

Procedia PDF Downloads 284
4770 Development of Filling Material in 3D Printer with the Aid of Computer Software for Supported with Natural Zeolite for the Removal of Nitrogen and Phosphorus

Authors: Luís Fernando Cusioli, Leticia Nishi, Lucas Bairros, Gabriel Xavier Jorge, Sandro Rogério Lautenschalager, Celso Varutu Nakamura, Rosângela Bergamasco

Abstract:

Focusing on the elimination of nitrogen and phosphorus from sewage, the study proposes to face the challenges of eutrophication and to optimize the effectiveness of sewage treatment through biofilms and filling produced by a 3D printer, seeking to identify the most effective Polylactic Acid (PLA), Acrylonitrile Butadiene Styrene (ABS). The study also proposes to evaluate the nitrification process in a Submerged Aerated Biological Filter (FBAS) on a pilot plant scale, quantifying the removal of nitrogen and phosphorus. The experiment will consist of two distinct phases, namely, a bench stage and the implementation of a pilot plant. During the bench stage, samples will be collected at five points to characterize the microbiota. Samples will be collected, and the microbiota will be investigated using Fluorescence In Situ Hybridization (FISH), deepening the understanding of the performance of biofilms in the face of multiple variables. In this context, the study contributes to the search for effective solutions to mitigate eutrophication and, thus, strengthen initiatives to improve effluent treatment.

Keywords: eutrophication, sewage treatment, biofilms, nitrogen and phosphorus removal, 3d printer, environmental efficiency

Procedia PDF Downloads 44
4769 Methicillin Resistant Staphylococcus aureus Specific Bacteriophage Isolation from Sewage Treatment Plant and in vivo Analysis of Phage Efficiency in Swiss Albino Mice

Authors: Pratibha Goyal, Nupur Mathur, Anuradha Singh

Abstract:

Antibiotic resistance is the worldwide threat to human health in this century. Excessive use of antibiotic after their discovery in 1940 makes certain bacteria to become resistant against antibiotics. Most common antibiotic-resistant bacteria include Staphylococcus aureus, Salmonella typhi, E.coli, Klebsiella pneumonia, and Streptococcus pneumonia. Among all Staphylococcus resistant strain called Methicillin-resistant Staphylococcus aureus (MRSA) is responsible for several lives threatening infection in human commonly found in the hospital environment. Our study aimed to isolate bacteriophage against MRSA from the hospital sewage treatment plant and to analyze its efficiency In Vivo in Swiss albino mice model. Sewage sample for the isolation of bacteriophages was collected from SDMH hospital sewage treatment plant in Jaipur. Bacteriophages isolated by the use of enrichment technique and after characterization, isolated phages used to determine phage treatment efficiency in mice. Mice model used to check the safety and suitability of phage application in human need which in turn directly support the use of natural bacteriophage rather than synthetic chemical to kill pathogens. Results show the plaque formation in-vitro and recovery of MRSA infected mice during the experiment. Favorable lytic efficiency determination of MRSA and Salmonella presents a natural way to treat lethal infections caused by Multidrug-resistant bacteria by using their natural host-pathogen relationship.

Keywords: antibiotic resistance, bacteriophages, methicillin resistance Staphylococcus aureus, pathogens, phage therapy, Salmonella typhi

Procedia PDF Downloads 116
4768 Survivable IP over WDM Network Design Based on 1 ⊕ 1 Network Coding

Authors: Nihed Bahria El Asghar, Imen Jouili, Mounir Frikha

Abstract:

Inter-datacenter transport network is very bandwidth and delay demanding. The data transferred over such a network is also highly QoS-exigent mostly because a huge volume of data should be transported transparently with regard to the application user. To avoid the data transfer failure, a backup path should be reserved. No re-routing delay should be observed. A dedicated 1+1 protection is however not applicable in inter-datacenter transport network because of the huge spare capacity. In this context, we propose a survivable virtual network with minimal backup based on network coding (1 ⊕ 1) and solve it using a modified Dijkstra-based heuristic.

Keywords: network coding, dedicated protection, spare capacity, inter-datacenters transport network

Procedia PDF Downloads 418
4767 Metagenomics Analysis on Microbial Communities of Sewage Sludge from Nyeri-Kangemi Wastewater Treatment Plant, Nyeri County-Kenya

Authors: Allan Kiptanui Kimisto, Geoffrey Odhiambo Ongondo, Anastasia Wairimu Muia, Cyrus Ndungu Kimani

Abstract:

The major challenge to proper sewage sludge treatment processes is the poor understanding of sludge microbiome diversities. This study applied the whole-genome. shotgun metagenomics technique to profile the microbial composition of sewage sludge in two active digestion lagoons at the Nyeri-Kangemi Wastewater Treatment Plant in Nyeri County, Kenya. Total microbial community DNA was extracted from samples using the available ZymoBIOMICS™ DNA Miniprep Kit and sequenced using Shotgun metagenomics. Samples were analyzed using MG-RAST software (Project ID: mgp100988), which allowed for comparing taxonomic diversity before β-diversities studies for Bacteria, Archaea and Eukaryotes. The study identified 57 phyla, 145 classes, 301 orders, 506 families, 963 genera, and 1980 species. Bacteria dominated the microbes and comprised 28 species, 51 classes, 110 orders, 243 families, 597 genera, and 1518 species. The Bacteroides(6.77%) were dominant, followed by Acinetobacter(1.44%) belonging to the Gammaproteobacteria and Acidororax (1.36%), Bacillus (1.24%) and Clostridium (1.02%) belonging to Betaproteobacteria. Archaea recorded 5 phyla, 13 classes, 19 orders, 29 families, 60 genera,and87 species, with the dominant genera being Methanospirillum (16.01%), methanosarcina (15.70%), and Methanoregula(14.80%) and Methanosaeta (8.74%), Methanosphaerula(5.48%) and Methanobrevibacter(5.03%) being the subdominant group. The eukaryotes were the least in abundance and comprised 24 phyla, 81 classes, 301 orders, 506 families, 963 genera, and 980 species. Arabidopsis (4.91%) and Caenorhabditis (4.81%) dominated the eukaryotes, while Dityostelium (3.63%) and Drosophila(2.08%) were the subdominant genera. All these microbes play distinct roles in the anaerobic treatment process of sewage sludge. The local sludge microbial composition and abundance variations may be due to age difference differences between the two digestion lagoons in operation at the plant and the different degradation rales played by the taxa. The information presented in this study can help in the genetic manipulation or formulation of optimal microbial ratios to improve their effectiveness in sewage sludge treatment. This study recommends further research on how the different taxa respond to environmental changes over time and space.

Keywords: shotgun metagenomics, sludge, bacteria, archaea, eukaryotes

Procedia PDF Downloads 62
4766 Study on Energy Performance Comparison of Information Centric Network Based on Difference of Network Architecture

Authors: Takumi Shindo, Koji Okamura

Abstract:

The first generation of the wide area network was circuit centric network. How the optimal circuit can be signed was the most important issue to get the best performance. This architecture had succeeded for line based telephone system. The second generation was host centric network and Internet based on this architecture has very succeeded world widely. And Internet became as new social infrastructure. Currently the architecture of the network is based on the location of the information. This future network is called Information centric network (ICN). The information-centric network (ICN) has being researched by many projects and different architectures for implementation of ICN have been proposed. The goal of this study is to compare performances of those ICN architectures. In this paper, the authors propose general ICN model which can represent two typical ICN architectures and compare communication performances using request routing. Finally, simulation results are shown. Also, we assume that this network architecture should be adapt to energy on-demand routing.

Keywords: ICN, information centric network, CCN, energy

Procedia PDF Downloads 303
4765 The Study of Effective Microorganism's Biopreperation for Wastewater Treatment

Authors: Batsukh Chultem, Oyunbileg Natsagdorj, Namsrai Steyrmunkh

Abstract:

Many industries, tourist camps and houses, discharge aqueous effluents containing relatively high levels of heavy metals, harmful organic compounds water. Untreated effluent from these manufacturing processes has an adverse impact on the environment. A specific problem associated with waste water in the environment is accumulation in the food chain and persistence in the environment. The screening of microorganisms resistant to pollution and able to detoxification them is essential for the development of clean-up technologies. The purpose of this study is to use advanced microbiological technology products for oxidizing organic and heavy metals pollutants as a biological treatment, to reduce water pollution, which arise as a result of waste water due to day-to-day operations of industries and houses of Ulaanbaatar city and tourist camps located around the lake Hovsgol, in Hovsgol province of Mongolia. By comparing the results from tests of effective microorganism’s bio-preparation treated sewage samples and not treated sewage samples shows that the treated sewage samples pollution decreased defending on treatment period and ratio. Treated water analyses show that: the suspended solids 352 mg/l, pH 5.85-7.95, ammonium nitrate 81.25-221.2 mg NH₄/l, nitrite 0.088-0.227 mg NO₂/l, nitrate 8.5-11.5 mg NO₃/l, and orthophosphate 1.06-15.46 mg PO₄/l. Also, heavy metals were decreased and microbiological test results defined parameters, respectively show the waste water pollution was reduced.

Keywords: effective microorganims, environment, pollution, treatment

Procedia PDF Downloads 94
4764 Secure Content Centric Network

Authors: Syed Umair Aziz, Muhammad Faheem, Sameer Hussain, Faraz Idris

Abstract:

Content centric network is the network based on the mechanism of sending and receiving the data based on the interest and data request to the specified node (which has cached data). In this network, the security is bind with the content not with the host hence making it host independent and secure. In this network security is applied by taking content’s MAC (message authentication code) and encrypting it with the public key of the receiver. On the receiver end, the message is first verified and after verification message is saved and decrypted using the receiver's private key.

Keywords: content centric network, client-server, host security threats, message authentication code, named data network, network caching, peer-to-peer

Procedia PDF Downloads 612
4763 Survey on Securing the Optimized Link State Routing (OLSR) Protocol in Mobile Ad-hoc Network

Authors: Kimaya Subhash Gaikwad, S. B. Waykar

Abstract:

The mobile ad-hoc network (MANET) is collection of various types of nodes. In MANET various protocols are used for communication. In OLSR protocol, a node is selected as multipoint relay (MPR) node which broadcast the messages. As the MANET is open kind of network any malicious node can easily enter into the network and affect the performance of the network. The performance of network mainly depends on the components which are taking part into the communication. If the proper nodes are not selected for the communication then the probability of network being attacked is more. Therefore, it is important to select the more reliable and secure components in the network. MANET does not have any filtering so that only selected nodes can be used for communication. The openness of the MANET makes it easier to attack the communication. The most of the attack are on the Quality of service (QoS) of the network. This paper gives the overview of the various attacks that are possible on OLSR protocol and some solutions. The papers focus mainly on the OLSR protocol.

Keywords: communication, MANET, OLSR, QoS

Procedia PDF Downloads 418
4762 A Social Network Analysis of the Palestinian Feminist Network Tal3at

Authors: Maath M. Musleh

Abstract:

This research aims to study recent trends in the Palestinian feminist movement through the case study of Tal3at. The study uses social network analysis as its primary method to analyze Twitter data. It attempts to interpret results through the lens of network theories and Parson’s AGIL paradigm. The study reveals major structural weaknesses in the Tal3at network. Our findings suggest that the movement will decline soon as sentiments of alienation amongst Palestinian women increases. These findings were validated by a couple of central actors in the network. This study contributes an SNA approach to the understanding of the understudied Palestinian feminism.

Keywords: feminism, Palestine, social network analysis, Tal3at

Procedia PDF Downloads 219
4761 Design a Network for Implementation a Hospital Information System

Authors: Abdulqader Rasool Feqi Mohammed, Ergun Erçelebi̇

Abstract:

A large number of hospitals from developed countries are adopting hospital information system to bring efficiency in hospital information system. The purpose of this project is to research on new network security techniques in order to enhance the current network security structure of save a hospital information system (HIS). This is very important because, it will avoid the system from suffering any attack. Security architecture was optimized but there are need to keep researching on best means to protect the network from future attacks. In this final project research, security techniques were uncovered to produce best network security results when implemented in an integrated framework.

Keywords: hospital information system, HIS, network security techniques, internet protocol, IP, network

Procedia PDF Downloads 396
4760 Monitoring and Prediction of Intra-Crosstalk in All-Optical Network

Authors: Ahmed Jedidi, Mesfer Mohammed Alshamrani, Alwi Mohammad A. Bamhdi

Abstract:

Optical performance monitoring and optical network management are essential in building a reliable, high-capacity, and service-differentiation enabled all-optical network. One of the serious problems in this network is the fact that optical crosstalk is additive, and thus the aggregate effect of crosstalk over a whole AON may be more nefarious than a single point of crosstalk. As results, we note a huge degradation of the Quality of Service (QoS) in our network. For that, it is necessary to identify and monitor the impairments in whole network. In this way, this paper presents new system to identify and monitor crosstalk in AONs in real-time fashion. particular, it proposes a new technique to manage intra-crosstalk in objective to relax QoS of the network.

Keywords: all-optical networks, optical crosstalk, optical cross-connect, crosstalk, monitoring crosstalk

Procedia PDF Downloads 425
4759 Software Quality Assurance in Network Security using Cryptographic Techniques

Authors: Sidra Shabbir, Ayesha Manzoor, Mehreen Sirshar

Abstract:

The use of the network communication has imposed serious threats to the security of assets over the network. Network security is getting more prone to active and passive attacks which may result in serious consequences to data integrity, confidentiality and availability. Various cryptographic techniques have been proposed in the past few years to combat with the concerned problem by ensuring quality but in order to have a fully secured network; a framework of new cryptosystem was needed. This paper discusses certain cryptographic techniques which have shown far better improvement in the network security with enhanced quality assurance. The scope of this research paper is to cover the security pitfalls in the current systems and their possible solutions based on the new cryptosystems. The development of new cryptosystem framework has paved a new way to the widespread network communications with enhanced quality in network security.

Keywords: cryptography, network security, encryption, decryption, integrity, confidentiality, security algorithms, elliptic curve cryptography

Procedia PDF Downloads 701
4758 Air Cargo Network Structure Characteristics and Robustness Analysis under the Belt and Road Area

Authors: Feng-jie Xie, Jian-hong Yan

Abstract:

Based on the complex network theory, we construct the air cargo network of the Belt and Road area, analyze its regional distribution and structural characteristics, measure the robustness of the network. The regional distribution results show that Southeast Asia and China have the most prominent development in the air cargo network of the Belt and Road area, Central Asia is the least developed. The structure characteristics found that the air cargo network has obvious small-world characteristics; the degree distribution has single-scale property; it shows a significant rich-club phenomenon simultaneously. The network robustness is measured by two attack strategies of degree and betweenness, but the betweenness of network nodes has a greater impact on network connectivity. And identified 24 key cities that have a large impact on the robustness of the network under the two attack strategies. Based on these results, recommendations are given to maintain the air cargo network connectivity in the Belt and Road area.

Keywords: air cargo, complex network, robustness, structure properties, The Belt and Road

Procedia PDF Downloads 164
4757 An Intelligent Cloud Radio Access Network (RAN) Architecture for Future 5G Heterogeneous Wireless Network

Authors: Jin Xu

Abstract:

5G network developers need to satisfy the necessary requirements of additional capacity from massive users and spectrally efficient wireless technologies. Therefore, the significant amount of underutilized spectrum in network is motivating operators to combine long-term evolution (LTE) with intelligent spectrum management technology. This new LTE intelligent spectrum management in unlicensed band (LTE-U) has the physical layer topology to access spectrum, specifically the 5-GHz band. We proposed a new intelligent cloud RAN for 5G.

Keywords: cloud radio access network, wireless network, cloud computing, multi-agent

Procedia PDF Downloads 393
4756 Network Automation in Lab Deployment Using Ansible and Python

Authors: V. Andal Priyadharshini, Anumalasetty Yashwanth Nath

Abstract:

Network automation has evolved into a solution that ensures efficiency in all areas. The age-old technique to configure common software-defined networking protocols is inefficient as it requires a box-by-box approach that needs to be repeated often and is prone to manual errors. Network automation assists network administrators in automating and verifying the protocol configuration to ensure consistent configurations. This paper implemented network automation using Python and Ansible to configure different protocols and configurations in the container lab virtual environment. Ansible can help network administrators minimize human mistakes, reduce time consumption, and enable device visibility across the network environment.

Keywords: Python network automation, Ansible configuration, container lab deployment, software-defined networking, networking lab

Procedia PDF Downloads 132
4755 Up-Flow Sponge Submerged Biofilm Reactor for Municipal Sewage Treatment

Authors: Saber A. El-Shafai, Waleed M. Zahid

Abstract:

An up-flow submerged biofilm reactor packed with sponge was investigated for sewage treatment. The reactor was operated two cycles as single aerobic (1-1 at 3.5 L/L.d HLR and 1-2 at 3.8 L/L.day HLR) and four cycles as single anaerobic/aerobic reactor; 2-1 and 2-2 at low HLR (3.7 and 3.5 L/L.day) and 2-3 and 2-4 at high HLR (5.1 and 5.4 L/L.day). During the aerobic cycles, 50% effluent recycling significantly reduces the system performance except for phosphorous. In case of the anaerobic/aerobic reactor, the effluent recycling, significantly improves system performance at low HLR while at high HLR only phosphorous removal was improved. Excess sludge production was limited to 0.133 g TSS/g COD with better sludge volume index (SVI) in case of anaerobic/aerobic cycles; (54.7 versus 58.5 ml/g).

Keywords: aerobic, anaerobic/aerobic, up-flow, submerged biofilm, sponge

Procedia PDF Downloads 263
4754 Using Mixed Methods in Studying Classroom Social Network Dynamics

Authors: Nashrawan Naser Taha, Andrew M. Cox

Abstract:

In a multi-cultural learning context, where ties are weak and dynamic, combining qualitative with quantitative research methods may be more effective. Such a combination may also allow us to answer different types of question, such as about people’s perception of the network. In this study the use of observation, interviews and photos were explored as ways of enhancing data from social network questionnaires. Integrating all of these methods was found to enhance the quality of data collected and its accuracy, also providing a richer story of the network dynamics and the factors that shaped these changes over time.

Keywords: mixed methods, social network analysis, multi-cultural learning, social network dynamics

Procedia PDF Downloads 486
4753 Increasing of Resiliency by Using Gas Storage in Iranian Gas Network

Authors: Mohsen Dourandish

Abstract:

Iran has a huge pipeline network in every state of country which is the longest and vastest pipeline network after Russia and USA (360,000 Km high pressure pipelines and 250,000 Km distribution networks). Furthermore in recent years National Iranian Gas Company is planning to develop natural gas network to cover all cities and villages above 20 families, in a way that 97 percent of Iran population will be gas consumer by 2020. In this condition, network resiliency will be the first priority of NIGC and due to that several planning for increasing resiliency of gas network is under construction. The most important strategy of NIGC is converting tree form pattern network to loop gas networks and developing underground gas storage near main gas consuming centers. In this regard NIGC is planning for construction of over 3500 km high-pressure pipeline and also 10 TCM gas storage capacities in UGSs.

Keywords: Iranian gas network, peak shaving, resiliency, underground gas storage

Procedia PDF Downloads 294
4752 Dual-Network Memory Model for Temporal Sequences

Authors: Motonobu Hattori

Abstract:

In neural networks, when new patters are learned by a network, they radically interfere with previously stored patterns. This drawback is called catastrophic forgetting. We have already proposed a biologically inspired dual-network memory model which can much reduce this forgetting for static patterns. In this model, information is first stored in the hippocampal network, and thereafter, it is transferred to the neocortical network using pseudo patterns. Because, temporal sequence learning is more important than static pattern learning in the real world, in this study, we improve our conventional dual-network memory model so that it can deal with temporal sequences without catastrophic forgetting. The computer simulation results show the effectiveness of the proposed dual-network memory model.

Keywords: catastrophic forgetting, dual-network, temporal sequences, hippocampal

Procedia PDF Downloads 237
4751 Integrating Knowledge Distillation of Multiple Strategies

Authors: Min Jindong, Wang Mingxia

Abstract:

With the widespread use of artificial intelligence in life, computer vision, especially deep convolutional neural network models, has developed rapidly. With the increase of the complexity of the real visual target detection task and the improvement of the recognition accuracy, the target detection network model is also very large. The huge deep neural network model is not conducive to deployment on edge devices with limited resources, and the timeliness of network model inference is poor. In this paper, knowledge distillation is used to compress the huge and complex deep neural network model, and the knowledge contained in the complex network model is comprehensively transferred to another lightweight network model. Different from traditional knowledge distillation methods, we propose a novel knowledge distillation that incorporates multi-faceted features, called M-KD. In this paper, when training and optimizing the deep neural network model for target detection, the knowledge of the soft target output of the teacher network in knowledge distillation, the relationship between the layers of the teacher network and the feature attention map of the hidden layer of the teacher network are transferred to the student network as all knowledge. in the model. At the same time, we also introduce an intermediate transition layer, that is, an intermediate guidance layer, between the teacher network and the student network to make up for the huge difference between the teacher network and the student network. Finally, this paper adds an exploration module to the traditional knowledge distillation teacher-student network model. The student network model not only inherits the knowledge of the teacher network but also explores some new knowledge and characteristics. Comprehensive experiments in this paper using different distillation parameter configurations across multiple datasets and convolutional neural network models demonstrate that our proposed new network model achieves substantial improvements in speed and accuracy performance.

Keywords: object detection, knowledge distillation, convolutional network, model compression

Procedia PDF Downloads 246
4750 Network Coding with Buffer Scheme in Multicast for Broadband Wireless Network

Authors: Gunasekaran Raja, Ramkumar Jayaraman, Rajakumar Arul, Kottilingam Kottursamy

Abstract:

Broadband Wireless Network (BWN) is the promising technology nowadays due to the increased number of smartphones. Buffering scheme using network coding considers the reliability and proper degree distribution in Worldwide interoperability for Microwave Access (WiMAX) multi-hop network. Using network coding, a secure way of transmission is performed which helps in improving throughput and reduces the packet loss in the multicast network. At the outset, improved network coding is proposed in multicast wireless mesh network. Considering the problem of performance overhead, degree distribution makes a decision while performing buffer in the encoding / decoding process. Consequently, BuS (Buffer Scheme) based on network coding is proposed in the multi-hop network. Here the encoding process introduces buffer for temporary storage to transmit packets with proper degree distribution. The simulation results depend on the number of packets received in the encoding/decoding with proper degree distribution using buffering scheme.

Keywords: encoding and decoding, buffer, network coding, degree distribution, broadband wireless networks, multicast

Procedia PDF Downloads 370
4749 An intelligent Troubleshooting System and Performance Evaluator for Computer Network

Authors: Iliya Musa Adamu

Abstract:

This paper seeks to develop an expert system that would troubleshoot computer network and evaluate the network system performance so as to reduce the workload on technicians and increase the efficiency and effectiveness of solutions proffered to computer network problems. The platform of the system was developed using ASP.NET, whereas the codes are implemented in Visual Basic and integrated with SQL Server 2005. The knowledge base was represented using production rule, whereas the searching method that was used in developing the network troubleshooting expert system is the forward-chaining-rule-based-system. This software tool offers the advantage of providing an immediate solution to most computer network problems encountered by computer users.

Keywords: expert system, forward chaining rule based system, network, troubleshooting

Procedia PDF Downloads 610
4748 Key Technologies and Evolution Strategies for Computing Force Bearer Network

Authors: Zhaojunfeng

Abstract:

Driven by the national policy of "East Data and Western Calculation", the computing first network will attract a new wave of development. As the foundation of the development of the computing first network, the computing force bearer network has become the key direction of technology research and development in the industry. This article will analyze typical computing force application scenarios and bearing requirements and sort out the SLA indicators of computing force applications. On this basis, this article carries out research and discussion on the key technologies of computing force bearer network in a slice packet network, and finally, gives evolution policy for SPN computing force bearer network to support the development of SPN computing force bearer network technology and network deployment.

Keywords: component-computing force bearing, bearing requirements of computing force application, dual-SLA indicators for computing force applications, SRv6, evolution strategies

Procedia PDF Downloads 99
4747 Optimizing the Probabilistic Neural Network Training Algorithm for Multi-Class Identification

Authors: Abdelhadi Lotfi, Abdelkader Benyettou

Abstract:

In this work, a training algorithm for probabilistic neural networks (PNN) is presented. The algorithm addresses one of the major drawbacks of PNN, which is the size of the hidden layer in the network. By using a cross-validation training algorithm, the number of hidden neurons is shrunk to a smaller number consisting of the most representative samples of the training set. This is done without affecting the overall architecture of the network. Performance of the network is compared against performance of standard PNN for different databases from the UCI database repository. Results show an important gain in network size and performance.

Keywords: classification, probabilistic neural networks, network optimization, pattern recognition

Procedia PDF Downloads 224
4746 Universality and Synchronization in Complex Quadratic Networks

Authors: Anca Radulescu, Danae Evans

Abstract:

The relationship between a network’s hardwiring and its emergent dynamics are central to neuroscience. We study the principles of this correspondence in a canonical setup (in which network nodes exhibit well-studied complex quadratic dynamics), then test their universality in biological networks. By extending methods from discrete dynamics, we study the effects of network connectivity on temporal patterns, encapsulating long-term behavior into the rich topology of network Mandelbrot sets. Then elements of fractal geometry can be used to predict and classify network behavior.

Keywords: canonical model, complex dynamics, dynamic networks, fractals, Mandelbrot set, network connectivity

Procedia PDF Downloads 277
4745 Identification of Bayesian Network with Convolutional Neural Network

Authors: Mohamed Raouf Benmakrelouf, Wafa Karouche, Joseph Rynkiewicz

Abstract:

In this paper, we propose an alternative method to construct a Bayesian Network (BN). This method relies on a convolutional neural network (CNN classifier), which determinates the edges of the network skeleton. We train a CNN on a normalized empirical probability density distribution (NEPDF) for predicting causal interactions and relationships. We have to find the optimal Bayesian network structure for causal inference. Indeed, we are undertaking a search for pair-wise causality, depending on considered causal assumptions. In order to avoid unreasonable causal structure, we consider a blacklist and a whitelist of causality senses. We tested the method on real data to assess the influence of education on the voting intention for the extreme right-wing party. We show that, with this method, we get a safer causal structure of variables (Bayesian Network) and make to identify a variable that satisfies the backdoor criterion.

Keywords: Bayesian network, structure learning, optimal search, convolutional neural network, causal inference

Procedia PDF Downloads 140
4744 Energy Savings with the Use of LED Lights at the Wastewater Treatment Plant

Authors: Kishen Prathivadi

Abstract:

The Sewer Authority Mid-Coastside (SAM) is a Joint Powers Authority formed in 1976 and provides secondary wastewater treatment to an average flow of 2.0 million gallons per day. SAM owns and operates a Wastewater Treatment Plant (WWTP) and a sanitary sewage collection system that collects sewage from its three member agencies: the City of Half Moon Bay, the Granada Community Services District and Montara Water and Sanitary District. The Sewer Authority Mid-Coastside (SAM) partnered with Pacific Gas & Electric, and its contractor GEL America, to review and replace all inefficient lighting fixtures and bulbs at the SAM treatment plant and administrative office. The project focused on replacing old and inefficient lighting fixtures and bulbs, reducing annual operating and maintenance costs, and reducing SAM’s carbon footprint. The project resulted in a 55% overall energy reduction, higher light quality and acuity, and a total operational savings of $495,000 over ten years.

Keywords: energy savings, LED, lighting, electrical

Procedia PDF Downloads 108