Search results for: fuzzy systems
1292 Analysis of the Benefits of Motion Simulators in 5th Generation Fighter Pilots' Training
Authors: Ali Mithad Emre
Abstract:
In military aviation, the use of flight simulators has proliferated recently in order to train fifth generation fighter pilots. With these simulators, pilots can carry out real-time flights resulting in seeing their faults and can perform emergency drills prior to real flights. Since we cannot risk losing the aircraft and the pilot himself/herself in the flight training process, flight simulators are of great importance to adapt the fighter pilots competently to real flights aboard the fifth generation aircraft. The real flights are impossible to simulate thoroughly on the ground. To some extent, the fixed-based simulators may assist the pilot to steer aircraft technically and visually but flight simulators can’t trick the pilot’s vestibular, sensory, and perceptual systems without motion platforms. This paper discusses the benefits of motion simulators for fifth generation fighter pilots’ training in preference to the fixed-based counterparts by analyzing their pros and cons.
Keywords: Centrifuge, g-loc, military, pilot, sickness, simulator, VMS.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16841291 Design, Implementation and Testing of Mobile Agent Protection Mechanism for MANETS
Authors: Khaled E. A. Negm
Abstract:
In the current research, we present an operation framework and protection mechanism to facilitate secure environment to protect mobile agents against tampering. The system depends on the presence of an authentication authority. The advantage of the proposed system is that security measures is an integral part of the design, thus common security retrofitting problems do not arise. This is due to the presence of AlGamal encryption mechanism to protect its confidential content and any collected data by the agent from the visited host . So that eavesdropping on information from the agent is no longer possible to reveal any confidential information. Also the inherent security constraints within the framework allow the system to operate as an intrusion detection system for any mobile agent environment. The mechanism is tested for most of the well known severe attacks against agents and networked systems. The scheme proved a promising performance that makes it very much recommended for the types of transactions that needs highly secure environments, e. g., business to business.
Keywords: Mobile agent security, mobile accesses, agent encryption.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 20381290 Precision Assessment of the Orthometric Heights Determination in the Northern Part of Libya
Authors: Jamal A. Gledan, Akrm H. Algnin
Abstract:
The Global Positioning System (GPS), satellite-based technology, has been utilized extensively in the last few years in a wide range of Geometrics and Geographic Information Systems’ (GIS) applications. One of the main challenges dealing with GPS-based heights consists of converting them into Mean Sea Level (MSL) heights, which is used in surveys and mapping.
In this research’s work, differences in heights of 50 points, in northern part of Libya has been carried out by using both ordinary leveling (in which Geoid is the reference datum) and GPS techniques (in which Ellipsoid is the reference datum). In addition, this study utilized the EGM2008 model to obtain the undulation values between the ellipsoidal and orthometric heights. From these values of ellipsoidal heights can be obtained from GPS observations to compute the orthomteric heights. This research presents a suitable alternative, from an economical point of view, to substitute the expensive traditional leveling technique, particularly, for topographic mapping.
Keywords: Geoid undulation, GPS, ordinary and geodetic leveling, orthometric height.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 20201289 Ambient Intelligence in the Production and Retail Sector: Emerging Opportunities and Potential Pitfalls
Authors: Carsten Röcker
Abstract:
This paper provides an introduction into the evolution of information and communication technology and illustrates its usage in the work domain. The paper is sub-divided into two parts. The first part gives an overview over the different phases of information processing in the work domain. It starts by charting the past and present usage of computers in work environments and shows current technological trends, which are likely to influence future business applications. The second part starts by briefly describing, how the usage of computers changed business processes in the past, and presents first Ambient Intelligence applications based on identification and localization information, which are already used in the production and retail sector. Based on current systems and prototype applications, the paper gives an outlook of how Ambient Intelligence technologies could change business processes in the future.Keywords: Ambient Intelligence, Ubiquitous Computing, Business Applications, Radio Frequency Identification (RFID)
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 18641288 Data Gathering Protocols for Wireless Sensor Networks
Authors: Dhinu Johnson, Gurdip Singh
Abstract:
Sensor network applications are often data centric and involve collecting data from a set of sensor nodes to be delivered to various consumers. Typically, nodes in a sensor network are resource-constrained, and hence the algorithms operating in these networks must be efficient. There may be several algorithms available implementing the same service, and efficient considerations may require a sensor application to choose the best suited algorithm. In this paper, we present a systematic evaluation of a set of algorithms implementing the data gathering service. We propose a modular infrastructure for implementing such algorithms in TOSSIM with separate configurable modules for various tasks such as interest propagation, data propagation, aggregation, and path maintenance. By appropriately configuring these modules, we propose a number of data gathering algorithms, each of which incorporates a different set of heuristics for optimizing performance. We have performed comprehensive experiments to evaluate the effectiveness of these heuristics, and we present results from our experimentation efforts.Keywords: Data Centric Protocols, Shortest Paths, Sensor networks, Message passing systems.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14441287 Message Framework for Disaster Management: An Application Model for Mines
Authors: A. Baloğlu, A. Çınar
Abstract:
Different tools and technologies were implemented for Crisis Response and Management (CRM) which is generally using available network infrastructure for information exchange. Depending on type of disaster or crisis, network infrastructure could be affected and it could not be able to provide reliable connectivity. Thus any tool or technology that depends on the connectivity could not be able to fulfill its functionalities. As a solution, a new message exchange framework has been developed. Framework provides offline/online information exchange platform for CRM Information Systems (CRMIS) and it uses XML compression and packet prioritization algorithms and is based on open source web technologies. By introducing offline capabilities to the web technologies, framework will be able to perform message exchange on unreliable networks. The experiments done on the simulation environment provide promising results on low bandwidth networks (56kbps and 28.8 kbps) with up to 50% packet loss and the solution is to successfully transfer all the information on these low quality networks where the traditional 2 and 3 tier applications failed.
Keywords: Crisis Response and Management, XML Messaging, Web Services, XML compression, Mining.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 19021286 In vitro and in vivo Anticancer Activity of Nanosize Zinc Oxide Composites of Doxorubicin
Authors: E. R. Arakelova, S. G. Grigoryan, F. G. Arsenyan, N. S. Babayan, R. M. Grigoryan, N. K. Sarkisyan
Abstract:
The nanotechnology offers some exciting possibilities in cancer treatment, including the possibility of destroying tumors with minimal damage to healthy tissue and organs by targeted drug delivery systems. Considerable achievements in investigations aimed at the use of ZnO nanoparticles and nanocontainers in diagnostics and antitumor therapy were described. However, there are substantial obstacles to the purposes to be achieved by the use of zinc oxide nanosize materials in antitumor therapy. Among the serious problems are the techniques of obtaining ZnO nanosize materials. The article presents a new vector delivery system for the known antitumor drug, doxorubicin in the form of polymeric (PEO, starch-NaCMC) hydrogels, in which nanosize ZnO film of a certain thickness are deposited directly on the drug surface on glass substrate by DC-magnetron sputtering of a zinc target. Anticancer activity in vitro and in vivo of those nanosize zinc oxide composites is shown.
Keywords: Anticancer activity, cancer specificity, doxorubicin, zinc oxide.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 42011285 Experimental Study of the Pressure Drop after Fractal-Shaped Orifices in a Turbulent Flow Pipe
Authors: A. Abou El-Azm Aly, A. Chong, F. Nicolleau, S. Beck
Abstract:
The fractal-shaped orifices are assumed to have a significant effect on the pressure drop downstream pipe flow due to their edge self-similarity shape which enhances the mixing properties. Here, we investigate the pressure drop after these fractals using a digital micro-manometer at different stations downstream a turbulent flow pipe then a direct comparison has been made with the pressure drop measured from regular orifices with the same flow area. Our results showed that the fractal-shaped orifices have a significant effect on the pressure drop downstream the flow. Also the pressure drop measured across the fractal-shaped orifices is noticed to be lower that that from ordinary orifices of the same flow areas. This result could be important in designing piping systems from point of view of losses consideration with the same flow control area. This is promising to use the fractal-shaped orifices as flowmeters as they can sense the pressure drop across them accurately with minimum losses than the regular ones.Keywords: Fractal-shaped orifice, pressure drop, turbulent flow.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 18901284 Design and Sensitivity Analysis of Photovoltaic/Thermal Solar Collector
Authors: H. M. Farghally, N. M. Ahmed, H. T. El-Madany, D. M. Atia, F. H. Fahmy
Abstract:
Energy is required in almost every aspect of human activities and development of any nation in the world. Increasing fossil fuel price, energy security and climate change have important bearings on sustainable development of any nation. The renewable energy technology is considered one of the drastic approaches which taken over the world to reduce the energy problem. The preservation of vegetables by freezing is one of the most important methods of retaining quality in agricultural products over long-term storage periods. Freezing factories show high demand of energy for both heat and electricity; the hybrid Photovoltaic/Thermal (PV/T) systems could be used in order to meet this requirement. This paper presents PV/T system design for freezing factory. Also, the complete mathematical modeling and MATLAB SIMULINK of PV/T collector is introduced. The sensitivity analysis for the manufacturing parameters of PV/T collector is carried out to study their effect on both thermal and electrical efficiency.
Keywords: Renewable energy, Hybrid PV/T system, Sensitivity analysis.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 38941283 P-ACO Approach to Assignment Problem in FMSs
Authors: I. Mahdavi, A. Jazayeri, M. Jahromi, R. Jafari, H. Iranmanesh
Abstract:
One of the most important problems in production planning of flexible manufacturing system (FMS) is machine tool selection and operation allocation problem that directly influences the production costs and times .In this paper minimizing machining cost, set-up cost and material handling cost as a multi-objective problem in flexible manufacturing systems environment are considered. We present a 0-1 integer linear programming model for the multiobjective machine tool selection and operation allocation problem and due to the large scale nature of the problem, solving the problem to obtain optimal solution in a reasonable time is infeasible, Paretoant colony optimization (P-ACO) approach for solving the multiobjective problem in reasonable time is developed. Experimental results indicate effectiveness of the proposed algorithm for solving the problem.
Keywords: Flexible manufacturing system, Production planning, Machine tool selection, Operation allocation, Multiobjective optimization, Metaheuristic.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 19071282 Natural Language Database Interface for Selection of Data Using Grammar and Parsing
Authors: N. D. Karande, G. A. Patil
Abstract:
Databases have become ubiquitous. Almost all IT applications are storing into and retrieving information from databases. Retrieving information from the database requires knowledge of technical languages such as Structured Query Language (SQL). However majority of the users who interact with the databases do not have a technical background and are intimidated by the idea of using languages such as SQL. This has led to the development of a few Natural Language Database Interfaces (NLDBIs). A NLDBI allows the user to query the database in a natural language. This paper highlights on architecture of new NLDBI system, its implementation and discusses on results obtained. In most of the typical NLDBI systems the natural language statement is converted into an internal representation based on the syntactic and semantic knowledge of the natural language. This representation is then converted into queries using a representation converter. A natural language query is translated to an equivalent SQL query after processing through various stages. The work has been experimented on primitive database queries with certain constraints.
Keywords: Natural language database interface, representation converter, syntactic and semantic knowledge
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 27051281 The SEMONT Monitoring and Risk Assessment of Environmental EMF Pollution
Authors: Dragan Kljajic, Nikola Djuric, Karolina Kasas-Lazetic, Danka Antic
Abstract:
Wireless communications have been expanded very fast in recent decades. This technology relies on an extensive network of base stations and antennas, using radio frequency signals to transmit information. Devices that use wireless communication, while offering various services, basically act as sources of non-ionizing electromagnetic fields (EMF). Such devices are permanently present in human vicinity and almost constantly radiate, causing EMF pollution of the environment. This fact has initiated development of modern systems for observation of the EMF pollution, as well as for risk assessment. This paper presents the Serbian electromagnetic field monitoring network – SEMONT, designed for automated, remote and continuous broadband monitoring of EMF in the environment. Measurement results of the SEMONT monitoring at one of the test locations, within the main campus of the University of Novi Sad, are presented and discussed, along with corresponding exposure assessment of the general population, regarding the Serbian legislation.
Keywords: EMF monitoring, exposure assessment, sensor nodes, wireless network.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 22561280 Renewable Energy Supply Options in Kuwait
Authors: Osamah A. Alsayegh, Fatma A. Fairouz
Abstract:
This paper compares planning results of the electricity and water generation inventory up to year 2030 in the State of Kuwait. Currently, the generation inventory consists of oil and gas fired technologies only. The planning study considers two main cases. The first case, Reference case, examines a generation inventory based on oil and gas fired generation technologies only. The second case examines the inclusion of renewables as part of the generation inventory under two scenarios. In the first scenario, Ref-RE, renewable build-out is based on optimum economic performance of overall generation system. Result shows that the optimum installed renewable capacity with electric energy generation of 11% . In the second scenario, Ref-RE20, the renewable capacity build-out is forced to provide 20% of electric energy by 2030. The respective energy systems costs of Reference, Ref-RE and Ref-RE20 case scenarios reach US dollar 24, 10 and 14 billion annually in 2030.Keywords: Generation inventory, solar, planning, TIMES, wind.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 26351279 Robust Stability in Multivariable Neural Network Control using Harmonic Analysis
Authors: J. Fernandez de Canete, S. Gonzalez-Perez, P. del Saz-Orozco, I. Garcia-Moral
Abstract:
Robust stability and performance are the two most basic features of feedback control systems. The harmonic balance analysis technique enables to analyze the stability of limit cycles arising from a neural network control based system operating over nonlinear plants. In this work a robust stability analysis based on the harmonic balance is presented and applied to a neural based control of a non-linear binary distillation column with unstructured uncertainty. We develop ways to describe uncertainty in the form of neglected nonlinear dynamics and high harmonics for the plant and controller respectively. Finally, conclusions about the performance of the neural control system are discussed using the Nyquist stability margin together with the structured singular values of the uncertainty as a robustness measure.Keywords: Robust stability, neural network control, unstructured uncertainty, singular values, distillation column.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16281278 All-Silicon Raman Laser with Quasi-Phase-Matched Structures and Resonators
Authors: Isao Tomita
Abstract:
The principle of all-silicon Raman lasers for an output wavelength of 1.3 μm is presented, which employs quasi-phase-matched structures and resonators to enhance the output power. 1.3-μm laser beams for GE-PONs in FTTH systems generated from a silicon device are very important because such a silicon device can be monolithically integrated with the silicon planar lightwave circuits (Si PLCs) used in the GE-PONs. This reduces the device fabrication processes and time and also optical losses at the junctions between optical waveguides of the Si PLCs and Si laser devices when compared with 1.3-μm III-V semiconductor lasers set on the Si PLCs employed at present. We show that the quasi-phase-matched Si Raman laser with resonators can produce about 174 times larger laser power at 1.3 μm (at maximum) than that without resonators for a Si waveguide of Raman gain 20 cm/GW and optical loss 1.2 dB/cm, pumped at power 10 mW, where the length of the waveguide is 3 mm and its cross-section is (1.5 μm)2.Keywords: All-silicon raman laser, FTTH, GE-PON, quasi-phase-matched structure, resonator.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 8971277 Improving University Operations with Data Mining: Predicting Student Performance
Authors: Mladen Dragičević, Mirjana Pejić Bach, Vanja Šimičević
Abstract:
The purpose of this paper is to develop models that would enable predicting student success. These models could improve allocation of students among colleges and optimize the newly introduced model of government subsidies for higher education. For the purpose of collecting data, an anonymous survey was carried out in the last year of undergraduate degree student population using random sampling method. Decision trees were created of which two have been chosen that were most successful in predicting student success based on two criteria: Grade Point Average (GPA) and time that a student needs to finish the undergraduate program (time-to-degree). Decision trees have been shown as a good method of classification student success and they could be even more improved by increasing survey sample and developing specialized decision trees for each type of college. These types of methods have a big potential for use in decision support systems.
Keywords: Data mining, knowledge discovery in databases, prediction models, student success.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 25401276 The Parameters Analysis for the Intersection Collision Avoidance Systems Based on Radar Sensors
Authors: Jieh-Shian Young, Chan Wei Hsu
Abstract:
This paper mainly studies the analyses of parameters in the intersection collision avoidance (ICA) system based on the radar sensors. The parameters include the positioning errors, the repeat period of the radar sensor, the conditions of potential collisions of two cross-path vehicles, etc. The analyses of the parameters can provide the requirements, limitations, or specifications of this ICA system. In these analyses, the positioning errors will be increased as the measured vehicle approach the intersection. In addition, it is not necessary to implement the radar sensor in higher position since the positioning sensitivities become serious as the height of the radar sensor increases. A concept of the safety buffer distances for front and rear of the measured vehicle is also proposed. The conditions for potential collisions of two cross-path vehicles are also presented to facilitate the computation algorithm.Keywords: Intersection Collision Avoidance (ICA), Positioning Errors, Radar Sensors, Sensitivity of Positioning.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15811275 An Energy-Efficient Model of Integrating Telehealth IoT Devices with Fog and Cloud Computing-Based Platform
Authors: Yunyong Guo, Sudhakar Ganti, Bryan Guo
Abstract:
The rapid growth of telehealth Internet of Things (IoT) devices has raised concerns about energy consumption and efficient data processing. This paper presents an energy-efficient model that integrates telehealth IoT devices with a fog and cloud computing-based platform, offering a sustainable and robust solution to overcome these challenges. Our model employs fog computing as a localized data processing layer while leveraging cloud computing for resource-intensive tasks, significantly reducing energy consumption. We incorporate adaptive energy-saving strategies. Simulation analysis validates our approach's effectiveness in enhancing energy efficiency for telehealth IoT systems integrated with localized fog nodes and both private and public cloud infrastructures. Future research will focus on further optimization of the energy-saving model, exploring additional functional enhancements, and assessing its broader applicability in other healthcare and industry sectors.
Keywords: Energy-efficient, fog computing, IoT, telehealth.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1521274 A Weighted Approach to Unconstrained Iris Recognition
Authors: Yao-Hong Tsai
Abstract:
This paper presents a weighted approach to unconstrained iris recognition. In nowadays, commercial systems are usually characterized by strong acquisition constraints based on the subject’s cooperation. However, it is not always achievable for real scenarios in our daily life. Researchers have been focused on reducing these constraints and maintaining the performance of the system by new techniques at the same time. With large variation in the environment, there are two main improvements to develop the proposed iris recognition system. For solving extremely uneven lighting condition, statistic based illumination normalization is first used on eye region to increase the accuracy of iris feature. The detection of the iris image is based on Adaboost algorithm. Secondly, the weighted approach is designed by Gaussian functions according to the distance to the center of the iris. Furthermore, local binary pattern (LBP) histogram is then applied to texture classification with the weight. Experiment showed that the proposed system provided users a more flexible and feasible way to interact with the verification system through iris recognition.
Keywords: Authentication, iris recognition, Adaboost, local binary pattern.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 19371273 Real-Time Image Encryption Using a 3D Discrete Dual Chaotic Cipher
Authors: M. F. Haroun, T. A. Gulliver
Abstract:
In this paper, an encryption algorithm is proposed for real-time image encryption. The scheme employs a dual chaotic generator based on a three dimensional (3D) discrete Lorenz attractor. Encryption is achieved using non-autonomous modulation where the data is injected into the dynamics of the master chaotic generator. The second generator is used to permute the dynamics of the master generator using the same approach. Since the data stream can be regarded as a random source, the resulting permutations of the generator dynamics greatly increase the security of the transmitted signal. In addition, a technique is proposed to mitigate the error propagation due to the finite precision arithmetic of digital hardware. In particular, truncation and rounding errors are eliminated by employing an integer representation of the data which can easily be implemented. The simple hardware architecture of the algorithm makes it suitable for secure real-time applications.Keywords: Chaotic systems, image encryption, 3D Lorenz attractor, non-autonomous modulation, FPGA.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 12171272 Statistical Modeling of Mobile Fading Channels Based on Triply Stochastic Filtered Marked Poisson Point Processes
Authors: Jihad S. Daba, J. P. Dubois
Abstract:
Understanding the statistics of non-isotropic scattering multipath channels that fade randomly with respect to time, frequency, and space in a mobile environment is very crucial for the accurate detection of received signals in wireless and cellular communication systems. In this paper, we derive stochastic models for the probability density function (PDF) of the shift in the carrier frequency caused by the Doppler Effect on the received illuminating signal in the presence of a dominant line of sight. Our derivation is based on a generalized Clarke’s and a two-wave partially developed scattering models, where the statistical distribution of the frequency shift is shown to be consistent with the power spectral density of the Doppler shifted signal.
Keywords: Doppler shift, filtered Poisson process, generalized Clark’s model, non-isotropic scattering, partially developed scattering, Rician distribution.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 8331271 DEA ANN Approach in Supplier Evaluation System
Authors: Dilek Özdemir, Gül Tekin Temur
Abstract:
In Supply Chain Management (SCM), strengthening partnerships with suppliers is a significant factor for enhancing competitiveness. Hence, firms increasingly emphasize supplier evaluation processes. Supplier evaluation systems are basically developed in terms of criteria such as quality, cost, delivery, and flexibility. Because there are many variables to be analyzed, this process becomes hard to execute and needs expertise. On this account, this study aims to develop an expert system on supplier evaluation process by designing Artificial Neural Network (ANN) that is supported with Data Envelopment Analysis (DEA). The methods are applied on the data of 24 suppliers, which have longterm relationships with a medium sized company from German Iron and Steel Industry. The data of suppliers consists of variables such as material quality (MQ), discount of amount (DOA), discount of cash (DOC), payment term (PT), delivery time (DT) and annual revenue (AR). Meanwhile, the efficiency that is generated by using DEA is added to the supplier evaluation system in order to use them as system outputs.
Keywords: Artificial Neural Network (ANN), DataEnvelopment Analysis (DEA), Supplier Evaluation System.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 21531270 Analysis of Feature Space for a 2d/3d Vision based Emotion Recognition Method
Authors: Robert Niese, Ayoub Al-Hamadi, Bernd Michaelis
Abstract:
In modern human computer interaction systems (HCI), emotion recognition is becoming an imperative characteristic. The quest for effective and reliable emotion recognition in HCI has resulted in a need for better face detection, feature extraction and classification. In this paper we present results of feature space analysis after briefly explaining our fully automatic vision based emotion recognition method. We demonstrate the compactness of the feature space and show how the 2d/3d based method achieves superior features for the purpose of emotion classification. Also it is exposed that through feature normalization a widely person independent feature space is created. As a consequence, the classifier architecture has only a minor influence on the classification result. This is particularly elucidated with the help of confusion matrices. For this purpose advanced classification algorithms, such as Support Vector Machines and Artificial Neural Networks are employed, as well as the simple k- Nearest Neighbor classifier.Keywords: Facial expression analysis, Feature extraction, Image processing, Pattern Recognition, Application.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 19231269 How Social Network Structure Affects the Dynamics of Evolution of Cooperation?
Authors: Mohammad Akbarpour, Reza Nasiri Mahalati, Caro Lucas
Abstract:
The existence of many biological systems, especially human societies, is based on cooperative behavior [1, 2]. If natural selection favors selfish individuals, then what mechanism is at work that we see so many cooperative behaviors? One answer is the effect of network structure. On a graph, cooperators can evolve by forming network bunches [2, 3, 4]. In a research, Ohtsuki et al used the idea of iterated prisoners- dilemma on a graph to model an evolutionary game. They showed that the average number of neighbors plays an important role in determining whether cooperation is the ESS of the system or not [3]. In this paper, we are going to study the dynamics of evolution of cooperation in a social network. We show that during evolution, the ratio of cooperators among individuals with fewer neighbors to cooperators among other individuals is greater than unity. The extent to which the fitness function depends on the payoff of the game determines this ratio.Keywords: Evolution of cooperation, Iterated prisoner's dilemma, Model dynamics, Social network structure, Intensity of selection.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 13551268 Financial Inclusion from the Perspective of Social Innovation: The Case of Colombia
Authors: Jaramillo G. Maria Luisa, Turriago H. Álvaro, Thoene Ulf
Abstract:
Financial inclusion has become a crucially important factor in debates on economic inequality posing challenges to the financial systems of countries around the world. Nowadays governments and banks are concerned about creating products that allow access to wide sectors of the population. The creation of banking products by the financial sector for people with low incomes tends to lead to improvements in the quality of life of vulnerable parts of the population. In countries with notable social and economic inequalities, financial inclusion is a key aspect for equitable economic growth. This study is based on the case of Colombia, which is a country with a strong record of economic growth over the past decade. Nevertheless, corruption, unemployment, and poverty contribute to uncertainty regarding the country’s future growth prospects. This study wants to explain the situation of financial exclusion and financial inclusion with respect to the Colombian case. Financial inclusion is going to be studied from the perspective of social innovation.Keywords: Colombia, financial exclusion, financial inclusion, social innovation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16861267 Methods for Case Maintenance in Case-Based Reasoning
Authors: A. Lawanna, J. Daengdej
Abstract:
Case-Based Reasoning (CBR) is one of machine learning algorithms for problem solving and learning that caught a lot of attention over the last few years. In general, CBR is composed of four main phases: retrieve the most similar case or cases, reuse the case to solve the problem, revise or adapt the proposed solution, and retain the learned cases before returning them to the case base for learning purpose. Unfortunately, in many cases, this retain process causes the uncontrolled case base growth. The problem affects competence and performance of CBR systems. This paper proposes competence-based maintenance method based on deletion policy strategy for CBR. There are three main steps in this method. Step 1, formulate problems. Step 2, determine coverage and reachability set based on coverage value. Step 3, reduce case base size. The results obtained show that this proposed method performs better than the existing methods currently discussed in literature.Keywords: Case-Based Reasoning, Case Base Maintenance, Coverage, Reachability.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16551266 Seismic Soil-Pile Interaction Considering Nonlinear Soil Column Behavior in Saturated and Dry Soil Conditions
Authors: Mohammad Moeini, Mehrdad Ghyabi, Kiarash Mohtasham Dolatshahi
Abstract:
This paper investigates seismic soil-pile interaction using the Beam on Nonlinear Winkler Foundation (BNWF) approach. Three soil types are considered to cover all the possible responses, as well as nonlinear site response analysis using finite element method in OpenSees platform. Excitations at each elevation that are output of the site response analysis are used as the input excitation to the soil pile system implementing multi-support excitation method. Spectral intensities of acceleration show that the extent of the response in sand is more severe than that of clay, in addition, increasing the PGA of ground strong motion will affect the sandy soil more, in comparison with clayey medium, which is an indicator of the sensitivity of soil-pile systems in sandy soil.
Keywords: Beam on nonlinear Winkler foundation method, multi-support excitation, nonlinear site response analysis, seismic soil-pile interaction.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 12131265 Searching the Stabilizing Effects of Neutron Shell Closure via Fusion Evaporation Residue Studies
Authors: B. R. S. Babu, E. Prasad, P. V. Laveen, A. M. Vinodkumar
Abstract:
Searching the “Island of stability” is a topic of extreme interest in theoretical as well as experimental modern physics today. This “island of stability” is spanned by superheavy elements (SHE's) that are produced in the laboratory. SHE's are believed to exist primarily due to the “magic” stabilizing effects of nuclear shell structure. SHE synthesis is extremely difficult due to their very low production cross section, often of the order of pico barns or less. Stabilizing effects of shell closures at proton number Z=82 and neutron number N=126 are predicted theoretically. Though stabilizing effects of Z=82 have been experimentally verified, no concluding observations have been made with N=126, so far. We measured and analyzed the total evaporation residue (ER) cross sections for a number of systems with neutron number around 126 to explore possible shell closure effects in ER cross sections, in this work.Keywords: Superheavy element, fusion evaporation, evaporation reside, compound nucleus.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16221264 Robust Image Registration Based on an Adaptive Normalized Mutual Information Metric
Authors: Huda Algharib, Amal Algharib, Hanan Algharib, Ali Mohammad Alqudah
Abstract:
Image registration is an important topic for many imaging systems and computer vision applications. The standard image registration techniques such as Mutual information/ Normalized mutual information -based methods have a limited performance because they do not consider the spatial information or the relationships between the neighbouring pixels or voxels. In addition, the amount of image noise may significantly affect the registration accuracy. Therefore, this paper proposes an efficient method that explicitly considers the relationships between the adjacent pixels, where the gradient information of the reference and scene images is extracted first, and then the cosine similarity of the extracted gradient information is computed and used to improve the accuracy of the standard normalized mutual information measure. Our experimental results on different data types (i.e. CT, MRI and thermal images) show that the proposed method outperforms a number of image registration techniques in terms of the accuracy.
Keywords: Image registration, mutual information, image gradients, Image transformations.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 8961263 Human Motion Capture: New Innovations in the Field of Computer Vision
Authors: Najm Alotaibi
Abstract:
Human motion capture has become one of the major area of interest in the field of computer vision. Some of the major application areas that have been rapidly evolving include the advanced human interfaces, virtual reality and security/surveillance systems. This study provides a brief overview of the techniques and applications used for the markerless human motion capture, which deals with analyzing the human motion in the form of mathematical formulations. The major contribution of this research is that it classifies the computer vision based techniques of human motion capture based on the taxonomy, and then breaks its down into four systematically different categories of tracking, initialization, pose estimation and recognition. The detailed descriptions and the relationships descriptions are given for the techniques of tracking and pose estimation. The subcategories of each process are further described. Various hypotheses have been used by the researchers in this domain are surveyed and the evolution of these techniques have been explained. It has been concluded in the survey that most researchers have focused on using the mathematical body models for the markerless motion capture.
Keywords: Human Motion Capture, Computer Vision, Vision based, Tracking.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2491