Search results for: residual correction method
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 8385

Search results for: residual correction method

2715 Mobile to Server Face Recognition: A System Overview

Authors: Nurulhuda Ismail, Mas Idayu Md. Sabri

Abstract:

This paper presents a system overview of Mobile to Server Face Recognition, which is a face recognition application developed specifically for mobile phones. Images taken from mobile phone cameras lack of quality due to the low resolution of the cameras. Thus, a prototype is developed to experiment the chosen method. However, this paper shows a result of system backbone without the face recognition functionality. The result demonstrated in this paper indicates that the interaction between mobile phones and server is successfully working. The result shown before the database is completely ready. The system testing is currently going on using real images and a mock-up database to test the functionality of the face recognition algorithm used in this system. An overview of the whole system including screenshots and system flow-chart are presented in this paper. This paper also presents the inspiration or motivation and the justification in developing this system.

Keywords: Mobile to server, face recognition, system overview.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2428
2714 Feeder Reconfiguration for Loss Reduction in Unbalanced Distribution System Using Genetic Algorithm

Authors: Ganesh. Vulasala, Sivanagaraju. Sirigiri, Ramana. Thiruveedula

Abstract:

This paper presents an efficient approach to feeder reconfiguration for power loss reduction and voltage profile imprvement in unbalanced radial distribution systems (URDS). In this paper Genetic Algorithm (GA) is used to obtain solution for reconfiguration of radial distribution systems to minimize the losses. A forward and backward algorithm is used to calculate load flows in unbalanced distribution systems. By simulating the survival of the fittest among the strings, the optimum string is searched by randomized information exchange between strings by performing crossover and mutation. Results have shown that proposed algorithm has advantages over previous algorithms The proposed method is effectively tested on 19 node and 25 node unbalanced radial distribution systems.

Keywords: Distribution system, Load flows, Reconfiguration, Genetic Algorithm.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3250
2713 A Scenario Oriented Supplier Selection by Considering a Multi Tier Supplier Network

Authors: Mohammad Najafi Nobar, Bahareh Pourmehr, Mehdi Hajimirarab

Abstract:

One of the main processes of supply chain management is supplier selection process which its accurate implementation can dramatically increase company competitiveness. In presented article model developed based on the features of second tiers suppliers and four scenarios are predicted in order to help the decision maker (DM) in making up his/her mind. In addition two tiers of suppliers have been considered as a chain of suppliers. Then the proposed approach is solved by a method combined of concepts of fuzzy set theory (FST) and linear programming (LP) which has been nourished by real data extracted from an engineering design and supplying parts company. At the end results reveal the high importance of considering second tier suppliers features as criteria for selecting the best supplier.

Keywords: Supply Chain Management (SCM), SupplierSelection, Second Tier Supplier, Scenario Planning, Green Factor, Linear Programming, Fuzzy Set Theory

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1806
2712 Fusion of Shape and Texture for Unconstrained Periocular Authentication

Authors: D. R. Ambika, K. R. Radhika, D. Seshachalam

Abstract:

Unconstrained authentication is an important component for personal automated systems and human-computer interfaces. Existing solutions mostly use face as the primary object of analysis. The performance of face-based systems is largely determined by the extent of deformation caused in the facial region and amount of useful information available in occluded face images. Periocular region is a useful portion of face with discriminative ability coupled with resistance to deformation. A reliable portion of periocular area is available for occluded images. The present work demonstrates that joint representation of periocular texture and periocular structure provides an effective expression and poses invariant representation. The proposed methodology provides an effective and compact description of periocular texture and shape. The method is tested over four benchmark datasets exhibiting varied acquisition conditions.

Keywords: Periocular authentication, Zernike moments, LBPV, shape and texture fusion.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 942
2711 Quantification of Methane Emissions from Solid Waste in Oman Using IPCC Default Methodology

Authors: Wajeeha A. Qazi, Mohammed-Hasham Azam, Umais A. Mehmood, Ghithaa A. Al-Mufragi, Noor-Alhuda Alrawahi, Mohammed F. M. Abushammala

Abstract:

Municipal Solid Waste (MSW) disposed in landfill sites decompose under anaerobic conditions and produce gases which mainly contain carbon dioxide (CO2) and methane (CH4). Methane has the potential of causing global warming 25 times more than CO2, and can potentially affect human life and environment. Thus, this research aims to determine MSW generation and the annual CH4 emissions from the generated waste in Oman over the years 1971-2030. The estimation of total waste generation was performed using existing models, while the CH4 emissions estimation was performed using the intergovernmental panel on climate change (IPCC) default method. It is found that total MSW generation in Oman might be reached 3,089 Gg in the year 2030, which approximately produced 85 Gg of CH4 emissions in the year 2030.

Keywords: Methane, emissions, landfills, solid waste.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2130
2710 Evaluating the Feasibility of Magnetic Induction to Cross an Air-Water Boundary

Authors: Mark Watson, J.-F. Bousquet, Adam Forget

Abstract:

A magnetic induction based underwater communication link is evaluated using an analytical model and a custom Finite-Difference Time-Domain (FDTD) simulation tool. The analytical model is based on the Sommerfeld integral, and a full-wave simulation tool evaluates Maxwell’s equations using the FDTD method in cylindrical coordinates. The analytical model and FDTD simulation tool are then compared and used to predict the system performance for various transmitter depths and optimum frequencies of operation. To this end, the system bandwidth, signal to noise ratio, and the magnitude of the induced voltage are used to estimate the expected channel capacity. The models show that in seawater, a relatively low-power and small coils may be capable of obtaining a throughput of 40 to 300 kbps, for the case where a transmitter is at depths of 1 to 3 m and a receiver is at a height of 1 m.

Keywords: Magnetic Induction, FDTD, Underwater Communication, Sommerfeld.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 570
2709 Fast Facial Feature Extraction and Matching with Artificial Face Models

Authors: Y. H. Tsai, Y. W. Chen

Abstract:

Facial features are frequently used to represent local properties of a human face image in computer vision applications. In this paper, we present a fast algorithm that can extract the facial features online such that they can give a satisfying representation of a face image. It includes one step for a coarse detection of each facial feature by AdaBoost and another one to increase the accuracy of the found points by Active Shape Models (ASM) in the regions of interest. The resulted facial features are evaluated by matching with artificial face models in the applications of physiognomy. The distance measure between the features and those in the fate models from the database is carried out by means of the Hausdorff distance. In the experiment, the proposed method shows the efficient performance in facial feature extractions and online system of physiognomy.

Keywords: Facial feature extraction, AdaBoost, Active shapemodel, Hausdorff distance

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1812
2708 Interactive Compromise Approach with Particle Swarm Optimization for Environmental/Economic Power Dispatch

Authors: Ming-Tang Tsai, Chih-Wei Yen

Abstract:

In this paper, an Interactive Compromise Approach with Particle Swarm Optimization(ICA-PSO) is presented to solve the Economic Emission Dispatch(EED) problem. The cost function and emission function are modeled as the nonsmooth functions, respectively. The bi-objective including both the minimization of cost and emission is formulated in this paper. ICA-PSO is proposed to solve EED problem for finding a better compromise solution. The solution methodology can offer a global or near-global solution for decision-making requirements. The effectiveness and efficiency of ICA-PSO are demonstrated by a sample test system. Test results can be shown that the proposed method provide a practical and flexible framework for power dispatch.

Keywords: Interactive Compromise Approach, Emission Control, Economic Dispatch, Particle Swarm Optimization.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1453
2707 A Bathtub Curve from Nonparametric Model

Authors: Eduardo C. Guardia, Jose W. M. Lima, Afonso H. M. Santos

Abstract:

This paper presents a nonparametric method to obtain the hazard rate “Bathtub curve” for power system components. The model is a mixture of the three known phases of a component life, the decreasing failure rate (DFR), the constant failure rate (CFR) and the increasing failure rate (IFR) represented by three parametric Weibull models. The parameters are obtained from a simultaneous fitting process of the model to the Kernel nonparametric hazard rate curve. From the Weibull parameters and failure rate curves the useful lifetime and the characteristic lifetime were defined. To demonstrate the model the historic time-to-failure of distribution transformers were used as an example. The resulted “Bathtub curve” shows the failure rate for the equipment lifetime which can be applied in economic and replacement decision models.

Keywords: Bathtub curve, failure analysis, lifetime estimation, parameter estimation, Weibull distribution.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2235
2706 The Role of People in Continuing Airworthiness: A Case Study Based on the Royal Thai Air Force

Authors: B. Ratchaneepun, N.S. Bardell

Abstract:

It is recognized that people are the main drivers in almost all the processes that affect airworthiness assurance. This is especially true in the area of aircraft maintenance, which is an essential part of continuing airworthiness. This work investigates what impact English language proficiency, the intersection of the military and Thai cultures, and the lack of initial and continuing human factors training have on the work performance of maintenance personnel in the Royal Thai Air Force (RTAF). A quantitative research method based on a cross-sectional survey was used to gather data about these three key aspects of “people” in a military airworthiness environment. 30 questions were developed addressing the crucial topics of English language proficiency, impact of culture, and human factors training. The officers and the non-commissioned officers (NCOs) who work for the Aeronautical Engineering Divisions in the RTAF comprised the survey participants. The survey data were analysed to support various hypotheses by using a t-test method. English competency in the RTAF is very important since all of the service manuals for Thai military aircraft are written in English. Without such competency, it is difficult for maintenance staff to perform tasks and correctly interpret the relevant maintenance manual instructions; any misunderstandings could lead to potential accidents. The survey results showed that the officers appreciated the importance of this more than the NCOs, who are the people actually doing the hands-on maintenance work. Military culture focuses on the success of a given mission, and leverages the power distance between the lower and higher ranks. In Thai society, a power distance also exists between younger and older citizens. In the RTAF, such a combination tends to inhibit a just reporting culture and hence hinders safety. The survey results confirmed this, showing that the older people and higher ranks involved with RTAF aircraft maintenance believe that the workplace has a positive safety culture and climate, whereas the younger people and lower ranks think the opposite. The final area of consideration concerned human factors training and non-technical skills training. The survey revealed that those participants who had previously attended such courses appreciated its value and were aware of its benefits in daily life. However, currently there is no regulation in the RTAF to mandate recurrent training to maintain such knowledge and skills. The findings from this work suggest that the people involved in assuring the continuing airworthiness of the RTAF would benefit from: (i) more rigorous requirements and standards in the recruitment, initial training and continuation training regarding English competence; (ii) the development of a strong safety culture that exploits the uniqueness of both the military culture and the Thai culture; and (iii) providing more initial and recurrent training in human factors and non-technical skills.

Keywords: Aircraft maintenance, continuing airworthiness, military culture, people, Royal Thai Air Force.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 650
2705 Some Aspects of Study the Leaching and Acid Corrosion of Concrete

Authors: Alena Sicakova, Adriana Estokova

Abstract:

Although properly made concrete is inherently a durable material, there are many physical and chemical forces in the environment which can contribute to its deterioration. This paper deals with two aspects of concrete durability in chemical aggressive environment: degradation effect of particular aggressive exposure and role of particular mineral additives. Results of the study of leaching and acid corrosion processes in samples prepared with specific dosage of microsilica and zeolite are given in the paper.

Corrosion progress after 60-day exposition is manifested by increasing rate of both Ca and Si release, what is identified by XRF method. Kind and dosage of additions used in experiment was found to be helpful for stabilization of concrete microstructure.The lowest concentration of mean elements in leachates was observed for mixture V1 (microsilica only) unlike the V2 (microsilica + zeolite). It is surprising in the terms of recommendations of zeolite application for acid exposure. Using microsilica only seems to be more effective.

Keywords: Sustainability, durability, concrete, acid corrosion, leaching.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2113
2704 ML Detection with Symbol Estimation for Nonlinear Distortion of OFDM Signal

Authors: Somkiat Lerkvaranyu, Yoshikazu Miyanaga

Abstract:

In this paper, a new technique of signal detection has been proposed for detecting the orthogonal frequency-division multiplexing (OFDM) signal in the presence of nonlinear distortion.There are several advantages of OFDM communications system.However, one of the existing problems is remain considered as the nonlinear distortion generated by high-power-amplifier at the transmitter end due to the large dynamic range of an OFDM signal. The proposed method is the maximum likelihood detection with the symbol estimation. When the training data are available, the neural network has been used to learn the characteristic of received signal and to estimate the new positions of the transmitted symbol which are provided to the maximum likelihood detector. Resulting in the system performance, the nonlinear distortions of a traveling wave tube amplifier with OFDM signal are considered in this paper.Simulation results of the bit-error-rate performance are obtained with 16-QAM OFDM systems.

Keywords: OFDM, TWTA, nonlinear distortion, detection.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1679
2703 Elastic Strain-Concentration Factor of Cylindrical Bars with Circumferential Flat-Bottom Groove under Static Tension

Authors: Hitham M. Tlilan

Abstract:

Using finite element method (FEM), the elastic new strain-concentration factor (SNCF) of cylindrical bars with circumferential flat-bottom groove is studied. This new SNCF has been defined under triaxial stress state. The employed specimens have constant groove depth with net section and gross diameters of 10.0 and 16.7 mm, respectively. The length of flatness ao has been varied form 0.0 ~12.5 mm to study the elastic SNCF of this type of geometrical irregularities. The results that the elastic new SNCF rapidly drops from its elastic value of the groove with ao = 0.0, i.e. circumferential U-notch, and reaches minimum value at ao = 2 mm. After that the elastic new SNCF becomes nearly constant with increasing flatness length (ao). The value of tensile load at yielding at the groove root increases with increasing ao. The current results show that severity of the notch decreases with increasing flatness length ao.

Keywords: Bar, groove, strain, tension

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1678
2702 Adhesion Performance According to Lateral Reinforcement Method of Textile

Authors: Jungbhin You, Taekyun Kim, Jongho Park, Sungnam Hong, Sun-Kyu Park

Abstract:

Reinforced concrete has been mainly used in construction field because of excellent durability. However, it may lead to reduction of durability and safety due to corrosion of reinforcement steels according to damage of concrete surface. Recently, research of textile is ongoing to complement weakness of reinforced concrete. In previous research, only experiment of longitudinal length were performed. Therefore, in order to investigate the adhesion performance according to the lattice shape and the embedded length, the pull-out test was performed on the roving with parameter of the number of lateral reinforcement, the lateral reinforcement length and the lateral reinforcement spacing. As a result, the number of lateral reinforcement and the lateral reinforcement length did not significantly affect the load variation depending on the adhesion performance, and only the load analysis results according to the reinforcement spacing are affected.

Keywords: Adhesion performance, lateral reinforcement, pull-out test, textile.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1133
2701 Study of Microbial Critical Points of Saffron from Farm to Factory in Iran

Authors: N. Khazaei, M. Jouki, A. Kalbasi, H. Tavakolipour, S. Rajabifar, F. Motamedi. Sedeh, A. Jouki

Abstract:

In this research saffron samples were prepared from farms and sampling was done in four states contain : sampling from fresh saffron of petal with forceps , sampling from fresh saffron of petal by hands, sampling from dried sample by warm air in shadow, sampling from dried sample which dried by dryer. Samples collected and kept in sterile tubes and containers and carried to laboratory and maintained until experiment. Microbial experiments were performed to determine microbial load such as total count, Staphylococcus aureus, coli form, E.coli, mold and yeast. Results showed that in picking and drying stages the contamination amount increases in saffron samples. There was a significant difference between the microbial load of picked up saffron by forceps and by hands, and also between dried saffron by warm air in shadow and by dryer.

Keywords: saffron; contaminations; preparation method

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2126
2700 A Structural Equation Model of Knowledge Management Based On Organizational Climate in Universities

Authors: F. Nazem, M. Mozaiini, A. Seifi

Abstract:

The purpose of the present study was to provide a structural model of knowledge management in universities based on organizational climate. The population of the research included all employees of Islamic Azad University (IAU). The sample consisted of 1590 employees selected using stratified and cluster random sampling method. The research instruments were two questionnaires which were administered in 78 IAU branches and education centers: Sallis and Jones’s (2002) Knowledge Management Questionnaire (α= 0.97); and Latwin & Stringer’s (1968) Organizational Climate Questionnaire (α= 0.83). The results of path analysis using LISREL software indicated that dimensions of organizational climate had a direct effect on knowledge management with the indices of 0.94. The model also showed that the factor of support in organizational climate had the highest direct effect on the knowledge management.

Keywords: Knowledge management, Organizational climate, Structural model, Universities.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2287
2699 Direct Numerical Simulation of Subcooled Nucleate Pool Boiling

Authors: Sreeyuth Lal, Yohei Sato, Bojan Niceno

Abstract:

With the long-term objective of Critical Heat Flux (CHF) prediction, a Direct Numerical Simulation (DNS) framework for simulation of subcooled and saturated nucleate pool boiling is developed. One case of saturated, and three cases of subcooled boiling at different subcooling levels are simulated. Grid refinement study is also reported. Both boiling and condensation phenomena can be computed simultaneously in the proposed numerical framework. Computed bubble detachment diameters of the saturated nucleate pool boiling cases agree well with the experiment. The flow structures around the growing bubble are presented and the accompanying physics is described. The relation between heat flux evolution from the heated wall and the bubble growth is studied, along with investigations of temperature distribution and flow field evolutions.

Keywords: CFD, interface tracking method, phase change model, subcooled nucleate pool boiling.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2465
2698 Double-Diffusive Natural Convection with Marangoni and Cooling Effects

Authors: Norazam Arbin, Ishak Hashim

Abstract:

Double-diffusive natural convection in an open top square cavity and heated from the side is studied numerically. Constant temperatures and concentration are imposed along the right and left walls while the heat balance at the surface is assumed to obey Newton-s law of cooling. The finite difference method is used to solve the dimensionless governing equations. The numerical results are reported for the effect of Marangoni number, Biot number and Prandtl number on the contours of streamlines, temperature and concentration. The predicted results for the average Nusselt number and Sherwood number are presented for various parametric conditions. The parameters involved are as follows; the thermal Marangoni number, 0 ≤ MaT ≤1000 , the solutal Marangoni number, 0 1000 c ≤ Ma ≤ , the Biot number, 0 ≤ Bi ≤ 6 , Grashof number, 5 Gr = 10 and aspect ratio 1. The study focused on both flows; thermal dominated, N = 0.8 , and compositional dominated, N = 1.3 .

Keywords: Double-diffusive, Marangoni effects, heat and mass transfer.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1870
2697 The Fake News Impact on the Public Policy Cycle: A Systemic Analysis through Documentary Survey

Authors: Aron Miranda Burgos, Ergon Cugler de Moraes Silva

Abstract:

In the present article, it is observed that the constant advancement of issues related to misinformation impacts the guarantee of the public policy cycle. Thus, it is found that the dissemination of false information has a direct influence on each of the component stages of this cycle. Therefore, in order to maintain scientific and theoretical credibility in the qualitative analysis process, it was necessary to logically interpose the concepts of firehosing of falsehood, fake news, public policy cycle, as well as using the epistemological and pragmatic mechanism at the intersection of such academic concepts, such as the scientific method. It was found, through the analysis of official documents and public notes, how the multiple theoretical perspectives evidence the commitment of the provision and elaboration of public policies, verifying the way in which the fake news impact each part of the process in this atmosphere.

Keywords: Firehosing of falsehood, governance, misinformation, post-truth.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 869
2696 Fermentable Sugars from Palm Empty Fruit Bunch Biomass for Bioethanol Production

Authors: U. A. Asli, H. Hamid, Z.A. Zakaria, A. N. Sadikin, R. Rasit

Abstract:

This study investigated the effect of a dilute acid, lime and ammonia aqueous pretreatment on the fermentable sugars conversion from empty fruit bunch (EFB) biomass. The dilute acid treatment was carried out in an autoclave, at 121ºC with 4% of sulfuric acid. In the lime pretreatment, 3 wt % of calcium hydroxide was used, whereas the third method was done by soaking EFB with 28% ammonia solution. The EFB biomass was then subjected to a two-stage-acid hydrolysis process. Subsequently, the hydrolysate was fermented by using instant baker’s yeast to produce bioethanol. The highest glucose yield was 890 mg/g of biomass, obtained from the sample which underwent lime pretreatment. The highest bioethanol yield of 6.1mg/g of glucose was achieved from acid pretreatment. This showed that the acid pretreatment gave the most fermentable sugars compared to the other two pretreatments.

Keywords: Bioethanol, biomass, empty fruit bunch (EFB), fermentable sugars.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3747
2695 A Practical Scheme for Transmission Loss Allocation to Generators and Loads in Restructured Power Systems

Authors: M.R. Ebrahimi, M. Ehsan

Abstract:

This paper presents a practical scheme that can be used for allocating the transmission loss to generators and loads. In this scheme first the share of a generator or load on the current through a branch is determined using Z-bus modified matrix. Then the current components are decomposed and the branch loss allocation is obtained. A motivation of proposed scheme is to improve the results of Z-bus method and to reach more fair allocation. The proposed scheme has been implemented and tested on several networks. To achieve practical and applicable results, the proposed scheme is simulated and compared on the transmission network (400kv) of Khorasan region in Iran and the 14-bus standard IEEE network. The results show that the proposed scheme is comprehensive and fair to allocating the energy losses of a power market to its participants.

Keywords: Transmission Loss, Loss Allocation, Z-bus modifiedmatrix, current Components Decomposition and Restructured PowerSystems

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1510
2694 Analysis of Detecting Wormhole Attack in Wireless Networks

Authors: Khin Sandar Win

Abstract:

In multi hop wireless systems, such as ad hoc and sensor networks, mobile ad hoc network applications are deployed, security emerges as a central requirement. A particularly devastating attack is known as the wormhole attack, where two or more malicious colluding nodes create a higher level virtual tunnel in the network, which is employed to transport packets between the tunnel end points. These tunnels emulate shorter links in the network. In which adversary records transmitted packets at one location in the network, tunnels them to another location, and retransmits them into the network. The wormhole attack is possible even if the attacker has not compromised any hosts and even if all communication provides authenticity and confidentiality. In this paper, we analyze wormhole attack nature in ad hoc and sensor networks and existing methods of the defending mechanism to detect wormhole attacks without require any specialized hardware. This analysis able to provide in establishing a method to reduce the rate of refresh time and the response time to become more faster.

Keywords: Ad hoc network, Sensor network, Wormhole attack, defending mechanism.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2298
2693 Elimination Noise by Adaptive Wavelet Threshold

Authors: Iman Elyasi, Sadegh Zarmehi

Abstract:

Due to some reasons, observed images are degraded which are mainly caused by noise. Recently image denoising using the wavelet transform has been attracting much attention. Waveletbased approach provides a particularly useful method for image denoising when the preservation of edges in the scene is of importance because the local adaptivity is based explicitly on the values of the wavelet detail coefficients. In this paper, we propose several methods of noise removal from degraded images with Gaussian noise by using adaptive wavelet threshold (Bayes Shrink, Modified Bayes Shrink and Normal Shrink). The proposed thresholds are simple and adaptive to each subband because the parameters required for estimating the threshold depend on subband data. Experimental results show that the proposed thresholds remove noise significantly and preserve the edges in the scene.

Keywords: Image denoising, Bayes Shrink, Modified Bayes Shrink, Normal Shrink.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2473
2692 Paper-Based Colorimetric Sensor Utilizing Peroxidase-Mimicking Magnetic Nanoparticles Conjugated with Aptamers

Authors: Min-Ah Woo, Min-Cheol Lim, Hyun-Joo Chang, Sung-Wook Choi

Abstract:

We developed a paper-based colorimetric sensor utilizing magnetic nanoparticles conjugated with aptamers (MNP-Apts) against E. coli O157:H7. The MNP-Apts were applied to a test sample solution containing the target cells, and the solution was simply dropped onto PVDF (polyvinylidene difluoride) membrane. The membrane moves the sample radially to form the sample spots of different compounds as concentric rings, thus the MNP-Apts on the membrane enabled specific recognition of the target cells through a color ring generation by MNP-promoted colorimetric reaction of TMB (3,3',5,5'-tetramethylbenzidine) and H2O2. This method could be applied to rapidly and visually detect various bacterial pathogens in less than 1 h without cell culturing.

Keywords: Aptamer, colorimetric sensor, E. coli O157:H7, magnetic nanoparticle, polyvinylidene difluoride.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1345
2691 Increase of Energy Efficiency by Means of Application of Active Bearings

Authors: Alexander Babin, Leonid Savin

Abstract:

In the present paper, increasing of energy efficiency of a thrust hybrid bearing with a central feeding chamber is considered. The mathematical model was developed to determine the pressure distribution and the reaction forces, based on the Reynolds equation and static characteristics’ equations. The boundary problem of pressure distribution calculation was solved using the method of finite differences. For various types of lubricants, geometry and operational characteristics, axial gaps can be determined, where the minimal friction coefficient is provided. The next part of the study considers the application of servovalves in order to maintain the desired position of the rotor. The report features the calculation results and the analysis of the influence of the operational and geometric parameters on the energy efficiency of mechatronic fluid-film bearings.

Keywords: Active bearings, energy efficiency, mathematical model, mechatronics, thrust multipad bearing.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1222
2690 Generating 3D Anisotropic Centroidal Voronoi Tessellations

Authors: Alexandre Marin, Alexandra Bac, Laurent Astart

Abstract:

New numerical methods for PDE resolution (such as Finite Volumes (FV) or Virtual Element Method (VEM)) open new needs in terms of meshing of domains of interest, and in particular polyhedral meshes have many advantages. One way to build such meshes consists in constructing Restricted Voronoi Diagrams (RVDs) whose boundaries respect the domain of interest. By minimizing a function defined for RVDs, the shapes of cells can be controlled, i.e. elongated according to user-defined directions or adjusted to comply with given aspect ratios (anisotropy) and density variations. In this paper, our contribution is threefold: first, we present a gradient formula for the Voronoi tessellation energy under a continuous anisotropy field. Second, we describe a meshing algorithm based on the optimisation of this function that we validate against state-of-the-art approaches. Finally, we propose a hierarchical approach to speed up our meshing algorithm.

Keywords: Anisotropic Voronoi Diagrams, Meshes for Numerical Simulations, Optimisation, Volumic Polyhedral Meshing.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 62
2689 Applications of Rough Set Decompositions in Information Retrieval

Authors: Chen Wu, Xiaohua Hu

Abstract:

This paper proposes rough set models with three different level knowledge granules in incomplete information system under tolerance relation by similarity between objects according to their attribute values. Through introducing dominance relation on the discourse to decompose similarity classes into three subclasses: little better subclass, little worse subclass and vague subclass, it dismantles lower and upper approximations into three components. By using these components, retrieving information to find naturally hierarchical expansions to queries and constructing answers to elaborative queries can be effective. It illustrates the approach in applying rough set models in the design of information retrieval system to access different granular expanded documents. The proposed method enhances rough set model application in the flexibility of expansions and elaborative queries in information retrieval.

Keywords: Incomplete information system, Rough set model, tolerance relation, dominance relation, approximation, decomposition, elaborative query.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1612
2688 Effect of Geometrical Parameters on Natural Frequencies of FGM Cylindrical shell with Holes Under Various Boundary Conditions

Authors: Mostafa Ghayour, Mohammad Sadegh Golabi

Abstract:

In the recent years, functionally gradient materials (FGMs) have gained considerable attention in the high temperature environment applications. In this paper, free vibration of thin functionally graded cylindrical shell with hole composed of stainless steel and zirconia is studied. The mechanical properties vary smoothly and continuously from one surface to the other according to a volume fraction power-law distribution. The Influence of shell geometrical parameters, variations of volume fractions and boundary conditions on natural frequency is considered. The equations of motion are based on strains-displacement relations from Love-s shell theory and Rayleigh method. The results have been obtained for natural frequencies of cylindrical shell with holes for different shape, number and location in this paper.

Keywords: Functionally gradient material, Vibration, various boundary conditions, cylindrical shells.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1809
2687 Multichannel Image Mosaicing of Stem Cells

Authors: Alessandro Bevilacqua, Alessandro Gherardi, Filippo Piccinini

Abstract:

Image mosaicing techniques are usually employed to offer researchers a wider field of view of microscopic image of biological samples. a mosaic is commonly achieved using automated microscopes and often with one “color" channel, whether it refers to natural or fluorescent analysis. In this work we present a method to achieve three subsequent mosaics of the same part of a stem cell culture analyzed in phase contrast and in fluorescence, with a common non-automated inverted microscope. The mosaics obtained are then merged together to mark, in the original contrast phase images, nuclei and cytoplasm of the cells referring to a mosaic of the culture, rather than to single images. The experiments carried out prove the effectiveness of our approach with cultures of cells stained with calcein (green/cytoplasm and nuclei) and hoechst (blue/nuclei) probes.

Keywords: Microscopy, image mosaicing, fluorescence, stem cells.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1487
2686 Post-Compression Consideration in Video Watermarking for Wireless Communication

Authors: Chuen-Ching Wang, Yao-Tang Chang, Yu-Chang Hsu

Abstract:

A simple but effective digital watermarking scheme utilizing a context adaptive variable length coding (CAVLC) method is presented for wireless communication system. In the proposed approach, the watermark bits are embedded in the final non-zero quantized coefficient of each DCT block, thereby yielding a potential reduction in the length of the coded block. As a result, the watermarking scheme not only provides the means to check the authenticity and integrity of the video stream, but also improves the compression ratio and therefore reduces both the transmission time and the storage space requirements of the coded video sequence. The results confirm that the proposed scheme enables the detection of malicious tampering attacks and reduces the size of the coded H.264 file. Therefore, the current study is feasible to apply in the video applications of wireless communication such as 3G system

Keywords: 3G, wireless communication, CAVLC, digitalwatermarking, motion compensation

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1871