Search results for: collection selection.
926 An Investigation of Quality Practices in Libyan Industrial Companies
Authors: Mostafa A. Shokshok, Omran Ali Abu Krais
Abstract:
This paper describes the collection and analysis of data obtained from face-to-face interviews conducted in selected Libyan industrial companies. The objectives of the interviews are to enhance understanding, and generate explanations of current issues in culture and quality management systems in Libyan companies. The method used in analyzing the questions, as well as the main finding of each question are explained. The interviews probed areas identify national and organizational culture, quality management systems, current methods, effects, barriers and other factors affecting the success of quality management implementation. Eleven questions are prepared and been discussed with the interviewees.Keywords: Interviews, quality, culture, Libyan industrial companies.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1952925 Orthogonal Regression for Nonparametric Estimation of Errors-in-Variables Models
Authors: Anastasiia Yu. Timofeeva
Abstract:
Two new algorithms for nonparametric estimation of errors-in-variables models are proposed. The first algorithm is based on penalized regression spline. The spline is represented as a piecewise-linear function and for each linear portion orthogonal regression is estimated. This algorithm is iterative. The second algorithm involves locally weighted regression estimation. When the independent variable is measured with error such estimation is a complex nonlinear optimization problem. The simulation results have shown the advantage of the second algorithm under the assumption that true smoothing parameters values are known. Nevertheless the use of some indexes of fit to smoothing parameters selection gives the similar results and has an oversmoothing effect.
Keywords: Grade point average, orthogonal regression, penalized regression spline, locally weighted regression.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2133924 Data Analysis Techniques for Predictive Maintenance on Fleet of Heavy-Duty Vehicles
Authors: Antonis Sideris, Elias Chlis Kalogeropoulos, Konstantia Moirogiorgou
Abstract:
The present study proposes a methodology for the efficient daily management of fleet vehicles and construction machinery. The application covers the area of remote monitoring of heavy-duty vehicles operation parameters, where specific sensor data are stored and examined in order to provide information about the vehicle’s health. The vehicle diagnostics allow the user to inspect whether maintenance tasks need to be performed before a fault occurs. A properly designed machine learning model is proposed for the detection of two different types of faults through classification. Cross validation is used and the accuracy of the trained model is checked with the confusion matrix.
Keywords: Fault detection, feature selection, machine learning, predictive maintenance.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 781923 Crafting of Paper Cutting Techniques for Embellishment of Fashion Textiles
Authors: A. Vaidya-Soocheta, K. M. Wong-Hon-Lang
Abstract:
Craft and fashion have always been interlinked. The combination of both often gives stunning results. The present study introduces ‘Paper Cutting Craft Techniques’ like the Japanese –Kirigami, Mexican –PapelPicado, German –Scherenschnitte, Polish –Wycinankito in textiles to develop innovative and novel design structures as embellishments and ornamentation. The project studies various ways of using these paper cutting techniques to obtain interesting features and delicate design patterns on fabrics. While paper has its advantages and related uses, it is fragile rigid and thus not appropriate for clothing. Fabric is sturdy, flexible, dimensionally stable and washable. In the present study, the cut out techniques develop creative design motifs and patterns to give an inventive and unique appeal to the fabrics. The beauty and fascination of lace in garments have always given them a nostalgic charm. Laces with their intricate and delicate complexity in combination with other materials add a feminine touch to a garment and give it a romantic, mysterious appeal. Various textured and decorative effects through fabric manipulation are experimented along with the use of paper cutting craft skills as an innovative substitute for developing lace or “Broderie Anglaise” effects on textiles. A number of assorted fabric types with varied textures were selected for the study. Techniques to avoid fraying and unraveling of the design cut fabrics were introduced. Fabrics were further manipulated by use of interesting prints with embossed effects on cut outs. Fabric layering in combination with assorted techniques such as cutting of folded fabric, printing, appliqué, embroidery, crochet, braiding, weaving added a novel exclusivity to the fabrics. The fabrics developed by these innovative methods were then tailored into garments. The study thus tested the feasibility and practicability of using these fabrics by designing a collection of evening wear garments based on the theme ‘Nostalgia’. The prototypes developed were complemented by designing fashion accessories with the crafted fabrics. Prototypes of accessories add interesting features to the study. The adaptation and application of this novel technique of paper cutting craft on textiles can be an innovative start for a new trend in textile and fashion industry. The study anticipates that this technique will open new avenues in the world of fashion to incorporate its use commercially.Keywords: Collection, fabric cutouts, nostalgia, prototypes.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2550922 Evaluating Performance of an Anomaly Detection Module with Artificial Neural Network Implementation
Authors: Edward Guillén, Jhordany Rodriguez, Rafael Páez
Abstract:
Anomaly detection techniques have been focused on two main components: data extraction and selection and the second one is the analysis performed over the obtained data. The goal of this paper is to analyze the influence that each of these components has over the system performance by evaluating detection over network scenarios with different setups. The independent variables are as follows: the number of system inputs, the way the inputs are codified and the complexity of the analysis techniques. For the analysis, some approaches of artificial neural networks are implemented with different number of layers. The obtained results show the influence that each of these variables has in the system performance.
Keywords: Network Intrusion Detection, Machine learning, Artificial Neural Network.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2078921 Quantitative Estimation of Periodicities in Lyari River Flow Routing
Authors: Rana Khalid Naeem, Asif Mansoor
Abstract:
The hydrologic time series data display periodic structure and periodic autoregressive process receives considerable attention in modeling of such series. In this communication long term record of monthly waste flow of Lyari river is utilized to quantify by using PAR modeling technique. The parameters of model are estimated by using Frances & Paap methodology. This study shows that periodic autoregressive model of order 2 is the most parsimonious model for assessing periodicity in waste flow of the river. A careful statistical analysis of residuals of PAR (2) model is used for establishing goodness of fit. The forecast by using proposed model confirms significance and effectiveness of the model.Keywords: Diagnostic checks, Lyari river, Model selection, Monthly waste flow, Periodicity, Periodic autoregressive model.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1648920 Evolving Neural Networks using Moment Method for Handwritten Digit Recognition
Authors: H. El Fadili, K. Zenkouar, H. Qjidaa
Abstract:
This paper proposes a neural network weights and topology optimization using genetic evolution and the backpropagation training algorithm. The proposed crossover and mutation operators aims to adapt the networks architectures and weights during the evolution process. Through a specific inheritance procedure, the weights are transmitted from the parents to their offsprings, which allows re-exploitation of the already trained networks and hence the acceleration of the global convergence of the algorithm. In the preprocessing phase, a new feature extraction method is proposed based on Legendre moments with the Maximum entropy principle MEP as a selection criterion. This allows a global search space reduction in the design of the networks. The proposed method has been applied and tested on the well known MNIST database of handwritten digits.Keywords: Genetic algorithm, Legendre Moments, MEP, Neural Network.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1663919 Applications of Social Marketing in Road Safety of Georgia
Authors: Charita Jashi
Abstract:
The aim of the paper is to explore the role of social marketing in changing the behavior of consumers on road safety, identify critical aspects and priority needs which impede the implementation of road safety program in Georgia. Given the goals of the study, a quantitative method was used to carry out interviews for primary data collection. This research identified the awareness level of road safety, legislation base, and marketing interventions to change behavior of drivers and pedestrians. During several years the non-governmental sector together with the local authorities and media have been very intensively working on the road safety issue in Georgia, but only seat-belts campaign should be considered rather successful. Despite achievements in this field, efficiency of road safety programs far from fulfillment and needs strong empowering.
Keywords: Road safety, social marketing interventions, behavior change, well-being.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1115918 Testing the Performance of Rival Warehousing Policies through Discrete Event Simulation
Authors: João Vilas-Boas, Abdul Suleman, Luis Moreira
Abstract:
This research tested the performance of alternative warehouse designs concerning the picking process. The chosen performance measures were Travel Distance and Total Fulfilment Time. An explanatory case study was built up around a model implemented with SIMUL8. Hypotheses were set by selecting outcomes from the literature survey matching popular empirical findings. 17.4% reductions were found for Total Fulfilment Time and Resource Utilisation. The latter was then used as a proxy for operational efficiency. Literal replication of theoretical data-patterns was considered as an internal validity sign. Assessing the estimated changes benefits ahead of implementation was found to be a contribution to practice.Keywords: Warehouse discrete-event simulation, Storage policy selection and assessment, Performance evaluation of order picking.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2116917 FEA- Aided Design, Optimization and Development of an Axial Flux Motor for Implantable Ventricular Assist Device
Authors: Neethu S., Shinoy K.S., A.S. Shajilal
Abstract:
This paper presents the optimal design and development of an axial flux motor for blood pump application. With the design objective of maximizing the motor efficiency and torque, different topologies of AFPM machine has been examined. Selection of optimal magnet fraction, Halbach arrangement of rotor magnets and the use of Soft Magnetic Composite (SMC) material for the stator core results in a novel motor with improved efficiency and torque profile. The results of the 3D Finite element analysis for the novel motor have been shown.Keywords: Axial flux motor, Finite Element Methods, Halbach array, Left Ventricular Assist Device, Soft magnetic composite.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2190916 A Methodology for Creating a Conceptual Model Under Uncertainty
Authors: Bogdan Walek, Jiri Bartos, Cyril Klimes
Abstract:
This article deals with the conceptual modeling under uncertainty. First, the division of information systems with their definition will be described, focusing on those where the construction of a conceptual model is suitable for the design of future information system database. Furthermore, the disadvantages of the traditional approach in creating a conceptual model and database design will be analyzed. A comprehensive methodology for the creation of a conceptual model based on analysis of client requirements and the selection of a suitable domain model is proposed here. This article presents the expert system used for the construction of a conceptual model and is a suitable tool for database designers to create a conceptual model.
Keywords: Conceptual model, conceptual modeling, database, methodology, uncertainty, information system, entity, attribute, relationship, conceptual domain model, fuzzy.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1584915 Neutrosophic Multiple Criteria Decision Making Analysis Method for Selecting Stealth Fighter Aircraft
Authors: C. Ardil
Abstract:
In this paper, a neutrosophic multiple criteria decision analysis method is proposed to select stealth fighter aircraft. Neutrosophic multiple criteria decision analysis methods are used to analyze the neutrosophic environment and give results under uncertainty and incompleteness. Neutrosophic numbers are used to evaluate alternatives over a set of evaluation criteria in decision making problems. Finally, the proposed model is applied to a practical decision problem for selecting stealth fighter aircraft.
Keywords: neutrosophic sets, multiple criteria decision making analysis, stealth fighter aircraft, aircraft selection, MCDMA, SVNNs
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 590914 Digital filters for Hot-Mix Asphalt Complex Modulus Test Data Using Genetic Algorithm Strategies
Authors: Madhav V. Chitturi, Anshu Manik, Kasthurirangan Gopalakrishnan
Abstract:
The dynamic or complex modulus test is considered to be a mechanistically based laboratory test to reliably characterize the strength and load-resistance of Hot-Mix Asphalt (HMA) mixes used in the construction of roads. The most common observation is that the data collected from these tests are often noisy and somewhat non-sinusoidal. This hampers accurate analysis of the data to obtain engineering insight. The goal of the work presented in this paper is to develop and compare automated evolutionary computational techniques to filter test noise in the collection of data for the HMA complex modulus test. The results showed that the Covariance Matrix Adaptation-Evolutionary Strategy (CMA-ES) approach is computationally efficient for filtering data obtained from the HMA complex modulus test.Keywords: HMA, dynamic modulus, GA, evolutionarycomputation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1571913 Information System for Data Selection and New Information Acquisition for Reconfigurable Multifunctional Machine Tools
Authors: Sasho Guergov
Abstract:
The purpose of the paper is to develop an informationcontrol environment for overall management and self-reconfiguration of the reconfigurable multifunctional machine tool for machining both rotation and prismatic parts and high concentration of different technological operations - turning, milling, drilling, grinding, etc. For the realization of this purpose on the basis of defined sub-processes for the implementation of the technological process, architecture of the information-search system for machine control is suggested. By using the object-oriented method, a structure and organization of the search system based on agents and manager with central control are developed. Thus conditions for identification of available information in DBs, self-reconfiguration of technological system and entire control of the reconfigurable multifunctional machine tool are created.
Keywords: Information system, multifunctional machine tool, reconfigurable machine tool, search system.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1329912 Product Development and Derivatives Exploration by using Photosynthetic Bacteria
Authors: Yi-Fang Hung, Jinn-Tsyy Lai
Abstract:
Lycopene, which can be extracted from plants and is very popular for fruit intake, is restricted for healthy food development due to its high price. On the other hand, it will get great safety concerns, especially in the food or cosmetic application, if the raw material of lycopene is produced by chemical synthesis. In this project, we provide a key technology to bridge the limitation as mentioned above. Based on the abundant bioresources of BCRC (Bioresource Collection and Research Center, Taiwan), a promising lycopene output will be anticipated by the introduction of fermentation technology along with industry-related core energy. Our results showed that addition of tween 80(0.2%) and span 20 produced higher amount of lycopene. And piperidine, when was added at 48hr to the cultivation medium, could promote lycopene excretion effectively also.Keywords: photosynthetic bacteria, lycopene, tween80, Piperidine
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1846911 Cloud Computing Initiative using Modified Ant Colony Framework
Authors: Soumya Banerjee, Indrajit Mukherjee, P.K. Mahanti
Abstract:
Scheduling of diversified service requests in distributed computing is a critical design issue. Cloud is a type of parallel and distributed system consisting of a collection of interconnected and virtual computers. It is not only the clusters and grid but also it comprises of next generation data centers. The paper proposes an initial heuristic algorithm to apply modified ant colony optimization approach for the diversified service allocation and scheduling mechanism in cloud paradigm. The proposed optimization method is aimed to minimize the scheduling throughput to service all the diversified requests according to the different resource allocator available under cloud computing environment.Keywords: Ant Colony, Cloud Computing, Grid, Resource allocator, Service Request.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2768910 Induction Heating Process Design Using Comsol® Multiphysics Software Version 4.2a
Authors: K. Djellabi, M. E. H. Latreche
Abstract:
Induction heating computer simulation is a powerful tool for process design and optimization, induction coil design, equipment selection, as well as education and business presentations. The authors share their vast experience in the practical use of computer simulation for different induction heating and heat treating processes. In this paper treated with mathematical modeling and numerical simulation of induction heating furnaces with axisymmetric geometries for the numerical solution, we propose finite element methods combined with boundary (FEM) for the electromagnetic model using COMSOL® Multiphysics Software. Some numerical results for an industrial furnace are shown with high frequency.
Keywords: Numerical methods, Induction furnaces, Induction Heating, Finite element method, Comsol Multiphysics software.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 8055909 Robust Detection of R-Wave Using Wavelet Technique
Authors: Awadhesh Pachauri, Manabendra Bhuyan
Abstract:
Electrocardiogram (ECG) is considered to be the backbone of cardiology. ECG is composed of P, QRS & T waves and information related to cardiac diseases can be extracted from the intervals and amplitudes of these waves. The first step in extracting ECG features starts from the accurate detection of R peaks in the QRS complex. We have developed a robust R wave detector using wavelets. The wavelets used for detection are Daubechies and Symmetric. The method does not require any preprocessing therefore, only needs the ECG correct recordings while implementing the detection. The database has been collected from MIT-BIH arrhythmia database and the signals from Lead-II have been analyzed. MatLab 7.0 has been used to develop the algorithm. The ECG signal under test has been decomposed to the required level using the selected wavelet and the selection of detail coefficient d4 has been done based on energy, frequency and cross-correlation analysis of decomposition structure of ECG signal. The robustness of the method is apparent from the obtained results.Keywords: ECG, P-QRS-T waves, Wavelet Transform, Hard Thresholding, R-wave Detection.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2474908 Design of Modular Robotic Joints for Achieving Various Robot Configurations
Authors: Majid Tolouei-Rad, Anurag Dhull
Abstract:
This paper describes various stages of design and prototyping of a modular robot for use in various industrial applications. The major goal of current research has been to design and make different robotic joints at low cost capable of being assembled together in any given order for achieving various robot configurations. Five different types of joins were designed and manufactured where extensive research has been carried out on the design of each joint in order to achieve optimal strength, size, modularity, and price. This paper presents various stages of research and development undertaken to engineer these joints that include material selection, manufacturing, and strength analysis. The outcome of this research addresses the birth of a new generation of modular industrial robots with a wider range of applications and greater efficiency.
Keywords: Actuator, control system, configuration, robot.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3223907 A Fuzzy Mixed Integer Multi-Scenario Portfolio Optimization Model
Authors: M. S. Osman, A. A. Tharwat, I. A. El-Khodary, A. G. Chalabi
Abstract:
In this paper, we propose a multiple objective optimization model with respect to portfolio selection problem for investors looking forward to diversify their equity investments in a number of equity markets. Based on Markowitz-s M-V model we developed a Fuzzy Mixed Integer Multi-Objective Nonlinear Programming Problem (FMIMONLP) to maximize the investors- future gains on equity markets, reach the optimal proportion of the budget to be invested in different equities. A numerical example with a comprehensive analysis on artificial data from several equity markets is presented in order to illustrate the proposed model and its solution method. The model performed well compared with the deterministic version of the model.
Keywords: Equity Markets, Future Scenarios, PortfolioSelection, Multiple Criteria Fuzzy Optimization
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1975906 Apply Super-SVA to SAR Imaging with Both Aperture Gaps and Bandwidth Gaps
Authors: Wenshuai Zhai, Yunhua Zhang
Abstract:
Synthetic aperture radar (SAR) imaging usually requires echo data collected continuously pulse by pulse with certain bandwidth. However in real situation, data collection or part of signal spectrum can be interrupted due to various reasons, i.e. there will be gaps in spatial spectrum. In this case we need to find ways to fill out the resulted gaps and get image with defined resolution. In this paper we introduce our work on how to apply iterative spatially variant apodization (Super-SVA) technique to extrapolate the spatial spectrum in both azimuthal and range directions so as to fill out the gaps and get correct radar image.Keywords: SAR imaging, Sparse aperture, Stepped frequencychirp signal, high resolution, Super-SVA
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1957905 Comparative Characterization Study of Malaysian Sand as Proppant
Authors: Dahlila Kamat, Ismail Mohd Saaid, Iskandar Dzulkarnain
Abstract:
This paper presents a review on published literature and experimental works on local sands for possible use as proppant, specifically those from Terengganu coastal area. This includes examination on characteristics of sand samples and selection of experiments for proppant testing. Sand samples from identified areas were tested according to particle size distribution, density, roundness and sphericity, turbidity and mineralogy. Results from sand samples were compared against proppant specifications set by API RP 56 and selected commercial proppants. The present study found that the size distribution, sphericity, turbidity and bulk density of Terengganu sands are at par with some of commercial proppants. Nevertheless, Terengganu sand samples do not completely surpass the required roundness for use as proppant.Keywords: Hydraulic fracturing, Malaysia sand, proppant, wellstimulation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3111904 Adhesion Properties of Bifidobacterium Pseudocatenulatum G4 and Bifidobacterium Longum BB536 on HT-29 Human Epithelium Cell Line at Different Times and pH
Authors: Ali Q. S., Farid A. J., Kabeir B. M., Zamberi S., Shuhaimi M., Ghazali H. M., Yazid A. M.
Abstract:
Adhesion to the human intestinal cell is considered as one of the main selection criteria of lactic acid bacteria for probiotic use. The adhesion ability of two Bifidobacteriums strains Bifidobacterium longum BB536 and Bifidobacterium psudocatenulatum G4 was done using HT-29 human epithelium cell line as in vitro study. Four different level of pH were used 5.6, 5.7, 6.6, and 6.8 with four different times 15, 30, 60, and 120 min. Adhesion was quantified by counting the adhering bacteria after Gram staining. The adhesion of B. longum BB536 was higher than B. psudocatenulatum G4. Both species showed significant different in the adhesion properties at the factors tested. The highest adhesion for both Bifidobacterium was observed at 120 min and the low adhesion was in 15 min. The findings of this study will contribute to the introduction of new effective probiotic strain for future utilization.Keywords: Bifidobacterium, Adhesion, HT-29 human epithelium cells.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1850903 Network Anomaly Detection using Soft Computing
Authors: Surat Srinoy, Werasak Kurutach, Witcha Chimphlee, Siriporn Chimphlee
Abstract:
One main drawback of intrusion detection system is the inability of detecting new attacks which do not have known signatures. In this paper we discuss an intrusion detection method that proposes independent component analysis (ICA) based feature selection heuristics and using rough fuzzy for clustering data. ICA is to separate these independent components (ICs) from the monitored variables. Rough set has to decrease the amount of data and get rid of redundancy and Fuzzy methods allow objects to belong to several clusters simultaneously, with different degrees of membership. Our approach allows us to recognize not only known attacks but also to detect activity that may be the result of a new, unknown attack. The experimental results on Knowledge Discovery and Data Mining- (KDDCup 1999) dataset.Keywords: Network security, intrusion detection, rough set, ICA, anomaly detection, independent component analysis, rough fuzzy .
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1955902 Routing Load Analysis over 802.11 DCF of Reactive Routing Protocols DSR and DYMO
Authors: Parma Nand, S.C. Sharma
Abstract:
The Mobile Ad-hoc Network (MANET) is a collection of self-configuring and rapidly deployed mobile nodes (routers) without any central infrastructure. Routing is one of the potential issues. Many routing protocols are reported but it is difficult to decide which one is best in all scenarios. In this paper on demand routing protocols DSR and DYMO based on IEEE 802.11 DCF MAC protocol are examined and characteristic summary of these routing protocols is presented. Their performance is analyzed and compared on performance measuring metrics throughput, dropped packets due to non availability of routes, duplicate RREQ generated for route discovery and normalized routing load by varying CBR data traffic load using QualNet 5.0.2 network simulator.
Keywords: Adhoc networks, wireless networks, CBR, routingprotocols, route discovery, simulation, performance evaluation, MAC, IEEE 802.11.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1724901 Evaluation of the Effects of Climate Change in Destruction Procedure on Iran-s Historic Buildings
Authors: Firouz Parvizian Ganje, Emad Hezbkhah, Behbood Maashkar
Abstract:
Climate change could lead to changes in cultural environments and landscapes as we know them.Climate change presents an immediate and significant threat to our natural and built environments and to the ways of life which co-exist with these environments. In most traditional buildings, the harmony of texture with nature and environment has been ever considered; so houses and cities have been mixed with their natural environment so astonishingly and the selection and usage of materials have been in such a way that they have provided the utmost conformity with the environment, as the result the created areas have a unique beauty and attraction.The extent to which climate change contributes to destruction procedure on Iran-s historic buildings.is a subject of current discussion. Cities, towns and built-up areas also have their own characteristics that might make them particularly vulnerable to climate change.Keywords: Climate Change, historic buildings, Iran
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1797900 The Selection of the Nearest Anchor Using Received Signal Strength Indication (RSSI)
Authors: Hichem Sassi, Tawfik Najeh, Noureddine Liouane
Abstract:
The localization information is crucial for the operation of WSN. There are principally two types of localization algorithms. The Range-based localization algorithm has strict requirements on hardware, thus is expensive to be implemented in practice. The Range-free localization algorithm reduces the hardware cost. However, it can only achieve high accuracy in ideal scenarios. In this paper, we locate unknown nodes by incorporating the advantages of these two types of methods. The proposed algorithm makes the unknown nodes select the nearest anchor using the Received Signal Strength Indicator (RSSI) and choose two other anchors which are the most accurate to achieve the estimated location. Our algorithm improves the localization accuracy compared with previous algorithms, which has been demonstrated by the simulating results.Keywords: WSN, localization, DV-hop, RSSI.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1815899 Autonomous Virtual Agent Navigation in Virtual Environments
Authors: Jafreezal Jaafar, Eric McKenzie
Abstract:
This paper presents a solution for the behavioural animation of autonomous virtual agent navigation in virtual environments. We focus on using Dempster-Shafer-s Theory of Evidence in developing visual sensor for virtual agent. The role of the visual sensor is to capture the information about the virtual environment or identifie which part of an obstacle can be seen from the position of the virtual agent. This information is require for vitual agent to coordinate navigation in virtual environment. The virual agent uses fuzzy controller as a navigation system and Fuzzy α - level for the action selection method. The result clearly demonstrates the path produced is reasonably smooth even though there is some sharp turn and also still not diverted too far from the potential shortest path. This had indicated the benefit of our method, where more reliable and accurate paths produced during navigation task.Keywords: Agent, Navigation, Demster Shafer, Fuzzy Logic.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1629898 Soil Remediation Technologies towards Green Remediation Strategies
Authors: G. Petruzzelli, F. Pedron, M. Grifoni, M. Barbafieri, I. Rosellini, B. Pezzarossa
Abstract:
As a result of diverse industrial activities, pollution from numerous contaminant affects both groundwater and soils. Many contaminated sites have been discovered in industrialized countries and their remediation is a priority in environmental legislations. The aim of this paper is to provide the evolution of remediation from consolidated invasive technologies to environmental friendly green strategies. Many clean-up technologies have been used. Nowadays the technologies selection is no longer exclusively based on eliminating the source of pollution, but the aim of remediation includes also the recovery of soil quality. “Green remediation”, a strategy based on “soft technologies”, appears the key to tackle the issue of remediation of contaminated sites with the greatest attention to environmental quality, including the preservation of soil functionality.
Keywords: Bioremediation, green remediation, phytoremediation, remediation technologies, soil.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1858897 Improved BEENISH Protocol for Wireless Sensor Networks Based Upon Fuzzy Inference System
Authors: Rishabh Sharma, Renu Vig, Neeraj Sharma
Abstract:
The main design parameter of WSN (wireless sensor network) is the energy consumption. To compensate this parameter, hierarchical clustering is a technique that assists in extending duration of the networks life by efficiently consuming the energy. This paper focuses on dealing with the WSNs and the FIS (fuzzy interface system) which are deployed to enhance the BEENISH protocol. The node energy, mobility, pause time and density are considered for the selection of CH (cluster head). The simulation outcomes exhibited that the projected system outperforms the traditional system with regard to the energy utilization and number of packets transmitted to sink.
Keywords: Wireless sensor network, sink, sensor node, routing protocol, fuzzy rule, fuzzy inference system.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 477