Search results for: Wavelet Transform (WT).
354 Copper Oxide Doped Carbon Catalyst for Anodic Half-Cell of Vanadium Redox Flow Battery
Authors: Irshad U. Khan, Tanmay Paul, Murali Mohan Seepana
Abstract:
This paper presents a study on synthesizing and characterizing a Copper Oxide Doped Carbon (CuO-C) electrocatalyst for the negative half-cell reactions of Vanadium Redox Flow Battery (VRFB). The CuO was synthesized using a microreactor. The electrocatalyst was characterized using X-ray Diffraction (XRD), Fourier Transform Infrared Spectroscopy (FTIR), and Field Emission Scanning Electron Microscopy (SEM). The electrochemical performance was assessed by Linear Sweep Voltammetry (LSV). The findings suggest that the synthesized CuO exhibited favorable crystallinity, morphology, and surface area, leading to improved cell performance.
Keywords: ECSA, electrocatalyst, energy storage, Tafel.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 92353 The Determination of the Zinc Sulfate, Sodium Hydroxide and Boric Acid Molar Ratio on the Production of Zinc Borates
Authors: N. Tugrul, A. S. Kipcak, E. MoroydorDerun, S. Piskin
Abstract:
Zinc borate is an important boron compound that can be used as multi-functional flame retardant additive due to its high dehydration temperature property. In this study, theraw materials of ZnSO4.7H2O, NaOH and H3BO3werecharacterized by X-Ray Diffraction (XRD) and Fourier Transform Infrared Spectroscopy (FT-IR) and used in the synthesis of zinc borates.The synthesis parameters were set to 100°C reaction temperature and 120 minutes of reaction time, with different molar ratio of starting materials (ZnSO4.7H2O:NaOH:H3BO3). After the zinc borate synthesis, the identifications of the products were conducted by XRD and FT-IR. As a result,Zinc Oxide Borate Hydrate [Zn3B6O12.3.5H2O], were synthesized at the molar ratios of 1:1:3, 1:1:4, 1:2:5 and 1:2:6. Among these ratios 1:2:6 had the best results.
Keywords: Zinc borate, ZnSO4.7H2O, NaOH, H3BO3, XRD, FT-IR.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3822352 Fade Dynamics Investigation Applying Statistics of Fade Duration and Level Crossing Rate
Authors: Balázs Héder, Róbert Singliar, János Bitó
Abstract:
The impact of rain attenuation on wireless communication signals is predominant because of the used high frequency (above 10 GHz). The knowledge of statistics of attenuation is very important for planning point-to-point microwave links operating in high frequency band. Describing the statistics of attenuation is possible for instance with fade duration or level crossing rate. In our examination we determine these statistics from one year measured data for a given microwave link, and we are going to make an attempt to transform the level crossing rate statistic to fade duration statistic.
Keywords: Rain attenuation measurement, fade duration, level crossing rate.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1665351 Surface Coating of Polyester Fabrics by Sol Gel Synthesized ZnO Particles
Authors: Merve Küçük, M. Lütfi Öveçoğlu
Abstract:
Zinc oxide particles were synthesized using the sol-gel method and dip coated on polyester fabric. X-ray diffraction (XRD) analysis revealed a single crystal phase of ZnO particles. Chemical characteristics of the polyester fabric surface were investigated using attenuated total reflection-Fourier transform infrared (ATR-FTIR) measurements. Morphology of ZnO coated fabric was analyzed using field emission scanning electron microscopy (FESEM). After particle analysis, the aqueous ZnO solution resulted in a narrow size distribution at submicron levels. The deposit of ZnO on polyester fabrics yielded a homogeneous spread of spherical particles. Energy dispersive X-ray spectroscopy (EDX) results also affirmed the presence of ZnO particles on the polyester fabrics.
Keywords: Dip coating, polyester fabrics, sol-gel, zinc oxide.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1518350 The Euler Equations of Steady Flow in Terms of New Dependent and Independent Variables
Authors: Peiangpob Monnuanprang
Abstract:
In this paper we study the transformation of Euler equations 1 , u u u Pf t (ρ ∂) + ⋅∇ = − ∇ + ∂ G G G G ∇⋅ = u 0, G where (ux, t) G G is the velocity of a fluid, P(x, t) G is the pressure of a fluid andρ (x, t) G is density. First of all, we rewrite the Euler equations in terms of new unknown functions. Then, we introduce new independent variables and transform it to a new curvilinear coordinate system. We obtain the Euler equations in the new dependent and independent variables. The governing equations into two subsystems, one is hyperbolic and another is elliptic.
Keywords: Euler equations, transformation, hyperbolic, elliptic
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1737349 Synchrotron X-ray Based Investigation of Fe Environment in Porous Anode of Shewanella oneidensis Microbial Fuel Cell
Authors: Sunil Dehipawala, Gayathrie Amarasuriya, N. Gadura, G. Tremberger Jr, D. Lieberman, Harry Gafney, Todd Holden, T. Cheung
Abstract:
The iron environment in Fe-doped Vycor Anode was investigated with EXAFS using Brookhaven Synchrotron Light Source. The iron-reducing Shewanella oneidensis culture was grown in a microbial fuel cell under anaerobic respiration. The Fe bond length was found to decrease and correlate with the amount of biofilm growth on the Fe-doped Vycor Anode. The data suggests that Fe-doped Vycor Anode would be a good substrate to study the Shewanella oneidensis nanowire structure using EXAFS.Keywords: EXAFS, Fourier Transform, Microbial Fuel Cell, Shewanella oneidensis.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1959348 Status and Requirements of Counter-Cyberterrorism
Authors: Jeong-Tae Kim, Tchanghee Hyun
Abstract:
The number of intrusions and attacks against critical infrastructures and other information networks is increasing rapidly. While there is no identified evidence that terrorist organizations are currently planning a coordinated attack against the vulnerabilities of computer systems and network connected to critical infrastructure, and origins of the indiscriminate cyber attacks that infect computers on network remain largely unknown. The growing trend toward the use of more automated and menacing attack tools has also overwhelmed some of the current methodologies used for tracking cyber attacks. There is an ample possibility that this kind of cyber attacks can be transform to cyberterrorism caused by illegal purposes. Cyberterrorism is a matter of vital importance to national welfare. Therefore, each countries and organizations have to take a proper measure to meet the situation and consider effective legislation about cyberterrorism.Keywords: Cyberterrorism, cyber attack, information security, legislation
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2794347 K-Means Based Matching Algorithm for Multi-Resolution Feature Descriptors
Authors: Shao-Tzu Huang, Chen-Chien Hsu, Wei-Yen Wang
Abstract:
Matching high dimensional features between images is computationally expensive for exhaustive search approaches in computer vision. Although the dimension of the feature can be degraded by simplifying the prior knowledge of homography, matching accuracy may degrade as a tradeoff. In this paper, we present a feature matching method based on k-means algorithm that reduces the matching cost and matches the features between images instead of using a simplified geometric assumption. Experimental results show that the proposed method outperforms the previous linear exhaustive search approaches in terms of the inlier ratio of matched pairs.
Keywords: Feature matching, k-means clustering, scale invariant feature transform, linear exhaustive search.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1086346 Building and Tree Detection Using Multiscale Matched Filtering
Authors: Abdullah H. Özcan, Dilara Hisar, Yetkin Sayar, Cem Ünsalan
Abstract:
In this study, an automated building and tree detection method is proposed using DSM data and true orthophoto image. A multiscale matched filtering is used on DSM data. Therefore, first watershed transform is applied. Then, Otsu’s thresholding method is used as an adaptive threshold to segment each watershed region. Detected objects are masked with NDVI to separate buildings and trees. The proposed method is able to detect buildings and trees without entering any elevation threshold. We tested our method on ISPRS semantic labeling dataset and obtained promising results.Keywords: Building detection, tree detection, matched filtering, multiscale, local maximum filtering, watershed segmentation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 549345 High Level Synthesis of Kahn Process Networks(KPN) for Streaming Applications
Authors: Attiya Mahmood, Syed Ali Abbas, Shoab A. Khan
Abstract:
Streaming Applications usually run in parallel or in series that incrementally transform a stream of input data. It poses a design challenge to break such an application into distinguishable blocks and then to map them into independent hardware processing elements. For this, there is required a generic controller that automatically maps such a stream of data into independent processing elements without any dependencies and manual considerations. In this paper, Kahn Process Networks (KPN) for such streaming applications is designed and developed that will be mapped on MPSoC. This is designed in such a way that there is a generic Cbased compiler that will take the mapping specifications as an input from the user and then it will automate these design constraints and automatically generate the synthesized RTL optimized code for specified application. Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1823344 Media Facades Utilization for Sustainable Tourism Promotion in Historic Places: Case Study of the Walled City of Famagusta, North Cyprus
Authors: Nikou Javadi, Uğur Dağlı
Abstract:
The importance of culture and tourism in the attractiveness and competitiveness of the countries is central, and many regions are evidencing their cultural assets, tangible and intangible, as a means to create comparative advantages in tourism and produce a distinctive place in response to the pressures of globalization. Culture and tourism are interlinked because of their obvious combination and growth potential. Cultural tourism is a crucial global tourism market with fast growing. Regions can develop significant relations between culture and tourism to increase their attractiveness as places to visit, live and invest, increasing their competitiveness. Accordingly, having new and creative approach to historical areas as cultural value-based destinations can improve their conditions to promote tourism. Furthermore, in 21st century, media become the most important factor affecting the development of urban cities, including public places. As a result of the digital revolution, re-imaging and re-linkage public places by media are essential to create more interactions between public spaces and users, interaction media display, and urban screens, one of the most important defined media. This interaction can transform the urban space from being neglected to be more interactive space with users, especially the pedestrians. The paper focuses on The Walled City of Famagusta. As many other historic quarters elsewhere in the world, is in a process, of decay and deterioration, and its functionally distinctive areas are severely threatened by physical, functional, locational, and image obsolescence at varying degrees. So the focus on the future development of this area through tourism promotion can be an appropriate decision for the monument enhancement of the spatial quality in Walled City of Famagusta. In this paper, it is aimed to identify the effects of these new digital factors to transform public spaces especially in historic urban areas to promote creative tourism. Accordingly, two different analysis methods are used as well as a theoretical review. The first is case study on site and the second is Close ended questionnaire, test many concepts raised in this paper. The physical analysis on site carried out in order to evaluate the walled city restoration for touristic purpose. Besides, theoretical review is done in order to provide background to the subject and cleared Factors to attract tourists.
Keywords: Historical areas, Media Facade, Sustainable tourism, Walled city of Famagusta.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2253343 New Approach in Diagnostics Method for Milling Process using Envelope Analysis
Authors: C. Bisu, M. Zapciu, A. Gérard
Abstract:
This paper proposes a method to vibration analysis in order to on-line monitoring and predictive maintenance during the milling process. Adapting envelope method to diagnostics and the analysis for milling tool materials is an important contribution to the qualitative and quantitative characterization of milling capacity and a step by modeling the three-dimensional cutting process. An experimental protocol was designed and developed for the acquisition, processing and analyzing three-dimensional signal. The vibration envelope analysis is proposed to detect the cutting capacity of the tool with the optimization application of cutting parameters. The research is focused on Hilbert transform optimization to evaluate the dynamic behavior of the machine/ tool/workpiece.Keywords: diagnostics, envelope, milling, vibration
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1935342 Molecular Characteristics of Phosphoric Acid Treated Soils
Authors: Amin Eisazadeh, Khairul Anuar Kassim, Hadi Nur
Abstract:
The expansive nature of soils containing high amounts of clay minerals can be altered through chemical stabilization, resulting in a material suitable for construction purposes. The primary objective of this investigation was to study the changes induced in the molecular structure of phosphoric acid stabilized bentonite and lateritic soil using Nuclear Magnetic Resonance (NMR) and Fourier Transform Infrared (FTIR) spectroscopy. Based on the obtained data, it was found that a surface alteration mechanism was the main reason responsible for the improvement of treated soils. Furthermore, the results indicated that the Al present in the octahedral layer of clay minerals were more amenable to chemical attacks and also partly responsible for the formation of new products.Keywords: Bentonite, Laterite clay, Molecularcharacterization, Phosphoric acid, Stabilization
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2406341 An Efficient Classification Method for Inverse Synthetic Aperture Radar Images
Authors: Sang-Hong Park
Abstract:
This paper proposes an efficient method to classify inverse synthetic aperture (ISAR) images. Because ISAR images can be translated and rotated in the 2-dimensional image place, invariance to the two factors is indispensable for successful classification. The proposed method achieves invariance to translation and rotation of ISAR images using a combination of two-dimensional Fourier transform, polar mapping and correlation-based alignment of the image. Classification is conducted using a simple matching score classifier. In simulations using the real ISAR images of five scaled models measured in a compact range, the proposed method yields classification ratios higher than 97 %.Keywords: Radar, ISAR, radar target classification, radar imaging.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2194340 A New Approach to the Approximate Solutions of Hamilton-Jacobi Equations
Authors: Joe Imae, Kenjiro Shinagawa, Tomoaki Kobayashi, Guisheng Zhai
Abstract:
We propose a new approach on how to obtain the approximate solutions of Hamilton-Jacobi (HJ) equations. The process of the approximation consists of two steps. The first step is to transform the HJ equations into the virtual time based HJ equations (VT-HJ) by introducing a new idea of ‘virtual-time’. The second step is to construct the approximate solutions of the HJ equations through a computationally iterative procedure based on the VT-HJ equations. It should be noted that the approximate feedback solutions evolve by themselves as the virtual-time goes by. Finally, we demonstrate the effectiveness of our approximation approach by means of simulations with linear and nonlinear control problems.
Keywords: Nonlinear Control, Optimal Control, Hamilton-Jacobi Equation, Virtual-Time
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1512339 Recent Trends in Nonlinear Methods of HRV Analysis: A Review
Authors: Ramesh K. Sunkaria
Abstract:
The linear methods of heart rate variability analysis such as non-parametric (e.g. fast Fourier transform analysis) and parametric methods (e.g. autoregressive modeling) has become an established non-invasive tool for marking the cardiac health, but their sensitivity and specificity were found to be lower than expected with positive predictive value <30%. This may be due to considering the RR-interval series as stationary and re-sampling them prior to their use for analysis, whereas actually it is not. This paper reviews the non-linear methods of HRV analysis such as correlation dimension, largest Lyupnov exponent, power law slope, fractal analysis, detrended fluctuation analysis, complexity measure etc. which are currently becoming popular as these uses the actual RR-interval series. These methods are expected to highly accurate cardiac health prognosis.Keywords: chaos, nonlinear dynamics, sample entropy, approximate entropy, detrended fluctuation analysis.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2351338 An E-learning System Architecture based on Cloud Computing
Authors: Md. Anwar Hossain Masud, Xiaodi Huang
Abstract:
The massive proliferation of affordable computers, Internet broadband connectivity and rich education content has created a global phenomenon in which information and communication technology (ICT) is being used to transform education. Therefore, there is a need to redesign the educational system to meet the needs better. The advent of computers with sophisticated software has made it possible to solve many complex problems very fast and at a lower cost. This paper introduces the characteristics of the current E-Learning and then analyses the concept of cloud computing and describes the architecture of cloud computing platform by combining the features of E-Learning. The authors have tried to introduce cloud computing to e-learning, build an e-learning cloud, and make an active research and exploration for it from the following aspects: architecture, construction method and external interface with the model.
Keywords: Architecture, Cloud Computing, E-learning, Information Technology
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 11071337 A Note on MHD Flow and Heat Transfer over a Curved Stretching Sheet by Considering Variable Thermal Conductivity
Authors: M. G. Murtaza, E. E. Tzirtzilakis, M. Ferdows
Abstract:
The mixed convective flow of MHD incompressible, steady boundary layer in heat transfer over a curved stretching sheet due to temperature dependent thermal conductivity is studied. We use curvilinear coordinate system in order to describe the governing flow equations. Finite difference solutions with central differencing have been used to solve the transform governing equations. Numerical results for the flow velocity and temperature profiles are presented as a function of the non-dimensional curvature radius. Skin friction coefficient and local Nusselt number at the surface of the curved sheet are discussed as well.
Keywords: Curved stretching sheet, finite difference method, MHD, variable thermal conductivity.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1102336 Encryption Image via Mutual Singular Value Decomposition
Authors: Adil Al-Rammahi
Abstract:
Image or document encryption is needed through egovernment data base. Really in this paper we introduce two matrices images, one is the public, and the second is the secret (original). The analyses of each matrix is achieved using the transformation of singular values decomposition. So each matrix is transformed or analyzed to three matrices say row orthogonal basis, column orthogonal basis, and spectral diagonal basis. Product of the two row basis is calculated. Similarly the product of the two column basis is achieved. Finally we transform or save the files of public, row product and column product. In decryption stage, the original image is deduced by mutual method of the three public files.
Keywords: Image cryptography, Singular values decomposition.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2086335 Straight Line Defect Detection with Feed Forward Neural Network
Authors: S. Liangwongsan, A. Oonsivilai
Abstract:
Nowadays, hard disk is one of the most popular storage components. In hard disk industry, the hard disk drive must pass various complex processes and tested systems. In each step, there are some failures. To reduce waste from these failures, we must find the root cause of those failures. Conventionall data analysis method is not effective enough to analyze the large capacity of data. In this paper, we proposed the Hough method for straight line detection that helps to detect straight line defect patterns that occurs in hard disk drive. The proposed method will help to increase more speed and accuracy in failure analysis.
Keywords: Hough Transform, Failure Analysis, Media, Hard Disk Drive
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2094334 Detection of Action Potentials in the Presence of Noise Using Phase-Space Techniques
Authors: Christopher Paterson, Richard Curry, Alan Purvis, Simon Johnson
Abstract:
Emerging Bio-engineering fields such as Brain Computer Interfaces, neuroprothesis devices and modeling and simulation of neural networks have led to increased research activity in algorithms for the detection, isolation and classification of Action Potentials (AP) from noisy data trains. Current techniques in the field of 'unsupervised no-prior knowledge' biosignal processing include energy operators, wavelet detection and adaptive thresholding. These tend to bias towards larger AP waveforms, AP may be missed due to deviations in spike shape and frequency and correlated noise spectrums can cause false detection. Also, such algorithms tend to suffer from large computational expense. A new signal detection technique based upon the ideas of phasespace diagrams and trajectories is proposed based upon the use of a delayed copy of the AP to highlight discontinuities relative to background noise. This idea has been used to create algorithms that are computationally inexpensive and address the above problems. Distinct AP have been picked out and manually classified from real physiological data recorded from a cockroach. To facilitate testing of the new technique, an Auto Regressive Moving Average (ARMA) noise model has been constructed bases upon background noise of the recordings. Along with the AP classification means this model enables generation of realistic neuronal data sets at arbitrary signal to noise ratio (SNR).Keywords: Action potential detection, Low SNR, Phase spacediagrams/trajectories, Unsupervised/no-prior knowledge.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1643333 Polydopamine Nanoparticle as a Stable and Capacious Nano-Reservoir of Rifampicin
Authors: Tasnuva Tamanna, Aimin Yu
Abstract:
Application of nanoscience in biomedical field has come across as a new era. This study involves the synthesis of nano drug carrier with antibiotic loading. Based on the founding that polydopamine (PDA) nanoparticles could be formed via self-polymerization of dopamine at alkaline pH, one-step synthesis of rifampicin coupled polydopamine (PDA-R) nanoparticles was achieved by adding rifampicin into the dopamine solution. The successful yield of PDA nanoparticles with or without the presence of rifampicin during the polymerization process was characterized by scanning electron microscopy, Fourier transform infrared spectroscopy, and Raman spectroscopy. Drug loading was monitored by UV-vis spectroscopy and the loading efficiency of rifampicin was calculated to be 76%. Such highly capacious nano-reservoir was found very stable with little drug leakage at pH 3.
Keywords: Drug loading, nanoparticles, polydopamine, rifampicin.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2670332 A Modified Laplace Decomposition Algorithm Solution for Blasius’ Boundary Layer Equation of the Flat Plate in a Uniform Stream
Authors: M. A. Koroma, Z. Chuangyi, A. F., Kamara, A. M. H. Conteh
Abstract:
In this work, we apply the Modified Laplace decomposition algorithm in finding a numerical solution of Blasius’ boundary layer equation for the flat plate in a uniform stream. The series solution is found by first applying the Laplace transform to the differential equation and then decomposing the nonlinear term by the use of Adomian polynomials. The resulting series, which is exactly the same as that obtained by Weyl 1942a, was expressed as a rational function by the use of diagonal padé approximant.
Keywords: Modified Laplace decomposition algorithm, Boundary layer equation, Padé approximant, Numerical solution.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2374331 A New Algorithm for Enhanced Robustness of Copyright Mark
Authors: Harsh Vikram Singh, S. P. Singh, Anand Mohan
Abstract:
This paper discusses a new heavy tailed distribution based data hiding into discrete cosine transform (DCT) coefficients of image, which provides statistical security as well as robustness against steganalysis attacks. Unlike other data hiding algorithms, the proposed technique does not introduce much effect in the stegoimage-s DCT coefficient probability plots, thus making the presence of hidden data statistically undetectable. In addition the proposed method does not compromise on hiding capacity. When compared to the generic block DCT based data-hiding scheme, our method found more robust against a variety of image manipulating attacks such as filtering, blurring, JPEG compression etc.
Keywords: Information Security, Robust Steganography, Steganalysis, Pareto Probability Distribution function.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1797330 Applications of Support Vector Machines on Smart Phone Systems for Emotional Speech Recognition
Authors: Wernhuar Tarng, Yuan-Yuan Chen, Chien-Lung Li, Kun-Rong Hsie, Mingteh Chen
Abstract:
An emotional speech recognition system for the applications on smart phones was proposed in this study to combine with 3G mobile communications and social networks to provide users and their groups with more interaction and care. This study developed a mechanism using the support vector machines (SVM) to recognize the emotions of speech such as happiness, anger, sadness and normal. The mechanism uses a hierarchical classifier to adjust the weights of acoustic features and divides various parameters into the categories of energy and frequency for training. In this study, 28 commonly used acoustic features including pitch and volume were proposed for training. In addition, a time-frequency parameter obtained by continuous wavelet transforms was also used to identify the accent and intonation in a sentence during the recognition process. The Berlin Database of Emotional Speech was used by dividing the speech into male and female data sets for training. According to the experimental results, the accuracies of male and female test sets were increased by 4.6% and 5.2% respectively after using the time-frequency parameter for classifying happy and angry emotions. For the classification of all emotions, the average accuracy, including male and female data, was 63.5% for the test set and 90.9% for the whole data set.Keywords: Smart phones, emotional speech recognition, socialnetworks, support vector machines, time-frequency parameter, Mel-scale frequency cepstral coefficients (MFCC).
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1842329 Characterization for Post-treatment Effect of Bagasse Ash for Silica Extraction
Authors: Patcharin Worathanakul, Wisaroot Payubnop, Akhapon Muangpet
Abstract:
Utilization of bagasse ash for silica sources is one of the most common application for agricultural wastes and valuable biomass byproducts in sugar milling. The high percentage silica content from bagasse ash was used as silica source for sodium silicate solution. Different heating temperature, time and acid treatment were studies for silica extraction. The silica was characterized using various techniques including X-ray fluorescence, X-ray diffraction, Scanning electron microscopy, and Fourier Transform Infrared Spectroscopy method,. The synthesis conditions were optimized to obtain the bagasse ash with the maximum silica content. The silica content of 91.57 percent was achieved from heating of bagasse ash at 600°C for 3 hours under oxygen feeding and HCl treatment. The result can be used as value added for bagasse ash utilization and minimize the environmental impact of disposal problems.Keywords: Bagasse ash, synthesis, silica, extraction, posttreatment
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3818328 Gradual Shot Boundary Detection and Classification Based on Fractal Analysis
Authors: Zeinab Zeinalpour-Tabrizi, Faeze Asdaghi, Mahmooh Fathy, Mohammad Reza Jahed-Motlagh
Abstract:
Shot boundary detection is a fundamental step for the organization of large video data. In this paper, we propose a new method for video gradual shots detection and classification, using advantages of fractal analysis and AIS-based classifier. Proposed features are “vertical intercept" and “fractal dimension" of each frame of videos which are computed using Fourier transform coefficients. We also used a classifier based on Clonal Selection Algorithm. We have carried out our solution and assessed it according to the TRECVID2006 benchmark dataset.
Keywords: shot boundary detection, gradual shots, fractal analysis, artificial immune system, choose Clooney.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1924327 Supercritical Methanol for Biodiesel Production from Jatropha Oil in the Presence of Heterogeneous Catalysts
Authors: Velid Demir, Mesut Akgün
Abstract:
The lanthanum and zinc oxide were synthesized and then loaded with 6 wt% over γ-Al2O3 using the wet impregnation method. The samples were calcined at 900 °C to ensure a coherent structure with high catalytic performance. Characterization of the catalysts was verified by X-ray diffraction (XRD) and Fourier-transform infrared spectroscopy (FTIR). The effect of catalysts on biodiesel content from jatropha oil was studied under supercritical conditions. The results showed that ZnO/γ-Al2O3 was the superior catalyst for jatropha oil with 98.05% biodiesel under reaction conditions of 7 min reaction time, 1:40 oil to methanol molar ratio, 6 wt% of catalyst loading, 90 bar of reaction pressure, and 300 °C of reaction temperature, compared to 95.50% with La2O3/γ-Al2O3 at the same parameters. For this study, ZnO/γ-Al2O3 was the most suitable catalyst due to performance and cost considerations.
Keywords: Biodiesel, heterogeneous catalyst, Jatropha oil, supercritical methanol, transesterification.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 157326 Structural Analysis of Lignins from Different Sources
Authors: I. F. Fiţigău, F. Peter, C. G. Boeriu
Abstract:
Five lignin samples were fractionated with Acetone/Water mixtures and the obtained fractions were subjected to extensive structural characterization, including Fourier Transform Infrared (FT-IR), Gel permeation Chromatography (GPC) and Phosphorus-31 NMR spectroscopy (31P-NMR). The results showed that for all studied lignins the solubility increases with the increment of the acetone concentration. Wheat straw lignin has the highest solubility in 90/10 (v/v) Acetone/Water mixture, 400 mg lignin being dissolved in 1 mL mixture. The weight average molecular weight of the obtained fractions increased with the increment of acetone concentration and thus with solubility. 31P-NMR analysis based on lignin modification by reactive phospholane into phosphitylated compounds was used to differentiate and quantify the different types of OH groups (aromatic, aliphatic, and carboxylic) found in the fractions obtained with 70/30 (v/v) Acetone/Water mixture.Keywords: Lignin, fractionation, FT-IR, GPC, 31P-NMR.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4945325 The Role of Education (Tarbiyyah) in the Religio-Political Organization
Authors: Muhaimin Bin Sulam, Abdul Mutalib Embong, Azelin Mohamed Noor
Abstract:
This paper presents the reinvention of the role of education (tarbiyyah) in the social influence of organizations focusing on the sustainability of a specific religio-political organization. The objective of the paper is to describe how the position secured by education could transform the organization while maintaining its objective and vision. The study employed the qualitative approach that involves data from conducted interviews. An analysis on the role political leaders play in educating the organization in the context of ideological struggle is also analyzed. The process description also evaluates how education could intellectualize its followers and members which inspires them to submit to their leaders and the organization. This extensive cultivation of religio-political doctrine could offer a new interpretation on politics.Keywords: Religio-political organization. Malaysia, education (tarbiyyah), followers, political movement.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 984