Search results for: Message Transition Pattern
808 Adaptive WiFi Fingerprinting for Location Approximation
Authors: Mohd Fikri Azli bin Abdullah, Khairul Anwar bin Kamarul Hatta, Esther Jeganathan
Abstract:
WiFi has become an essential technology that is widely used nowadays. It is famous due to its convenience to be used with mobile devices. This is especially true for Internet users worldwide that use WiFi connections. There are many location based services that are available nowadays which uses Wireless Fidelity (WiFi) signal fingerprinting. A common example that is gaining popularity in this era would be Foursquare. In this work, the WiFi signal would be used to estimate the user or client’s location. Similar to GPS, fingerprinting method needs a floor plan to increase the accuracy of location estimation. Still, the factor of inconsistent WiFi signal makes the estimation defer at different time intervals. Given so, an adaptive method is needed to obtain the most accurate signal at all times. WiFi signals are heavily distorted by external factors such as physical objects, radio frequency interference, electrical interference, and environmental factors to name a few. Due to these factors, this work uses a method of reducing the signal noise and estimation using the Nearest Neighbour based on past activities of the signal to increase the signal accuracy up to more than 80%. The repository yet increases the accuracy by using Artificial Neural Network (ANN) pattern matching. The repository acts as the server cum support of the client side application decision. Numerous previous works has adapted the methods of collecting signal strengths in the repository over the years, but mostly were just static. In this work, proposed solutions on how the adaptive method is done to match the signal received to the data in the repository are highlighted. With the said approach, location estimation can be done more accurately. Adaptive update allows the latest location fingerprint to be stored in the repository. Furthermore, any redundant location fingerprints are removed and only the updated version of the fingerprint is stored in the repository. How the location estimation of the user can be predicted would be highlighted more in the proposed solution section. After some studies on previous works, it is found that the Artificial Neural Network is the most feasible method to deploy in updating the repository and making it adaptive. The Artificial Neural Network functions are to do the pattern matching of the WiFi signal to the existing data available in the repository.
Keywords: Adaptive Repository, Artificial Neural Network, Location Estimation, Nearest Neighbour Euclidean Distance, WiFi RSSI Fingerprinting.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3460807 Collocation Errors in English as Second Language (ESL) Essay Writing
Authors: Fatima Muhammad Shitu
Abstract:
In language learning, second language learners as well as Native speakers commit errors in their attempt to achieve competence in the target language. The realm of collocation has to do with meaning relation between lexical items. In all human language, there is a kind of ‘natural order’ in which words are arranged or relate to one another in sentences so much so that when a word occurs in a given context, the related or naturally co-occurring word will automatically come to the mind. It becomes an error, therefore, if students inappropriately pair or arrange such ‘naturally’ co–occurring lexical items in a text. It has been observed that most of the second language learners in this research group commit collocation errors. A study of this kind is very significant as it gives insight into the kinds of errors committed by learners. This will help the language teacher to be able to identify the sources and causes of such errors as well as correct them thereby guiding, helping and leading the learners towards achieving some level of competence in the language. The aim of the study is to understand the nature of these errors as stumbling blocks to effective essay writing. The objective of the study is to identify the errors, analyze their structural compositions so as to determine whether there are similarities between students in this regard and to find out whether there are patterns to these kinds of errors which will enable the researcher to understand their sources and causes. As a descriptive research, the researcher samples some nine hundred essays collected from three hundred undergraduate learners of English as a second language in the Federal College of Education, Kano, North- West Nigeria, i.e. three essays per each student. The essays which were given on three different lecture times were of similar thematic preoccupations (i.e. same topics) and length (i.e. same number of words). The essays were written during the lecture hour at three different lecture occasions. The errors were identified in a systematic manner whereby errors so identified were recorded only once even if they occur severally in students’ essays. The data was collated using percentages in which the identified numbers of occurrences were converted accordingly in percentages. The findings from the study indicate that there are similarities as well as regular and repeated errors which provided a pattern. Based on the pattern identified, the conclusion is that students’ collocation errors are attributable to poor teaching and learning which resulted in wrong generalization of rules.
Keywords: Collocations, errors, collocation errors, second language learning.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 7911806 Technological Innovation Persistence Organizational Innovation Matters
Authors: H. Naciba, C. Le Bas, C. Mothe, T.U. Nguyen-Thi
Abstract:
Organizational innovation favors technological innovation, but does it also influence technological innovation persistence? This article investigates empirically the pattern of technological innovation persistence and tests the potential impact of organizational innovation using firm-level data from three waves of the French Community Innovation Surveys. Evidence shows a positive effect of organizational innovation on technological innovation persistence, according to various measures of organizational innovation. Moreover, this impact is more significant for complex innovators (i.e., those who innovate in both products and processes). These results highlight the complexity of managing organizational practices with regard to the firm-s technological innovation. They also add to comprehension of the drivers of innovation persistence, through a focus on an often forgotten dimension of innovation in a broader sense.Keywords: Organizational Innovation, Technological Innovation, Persistence
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1467805 Morphology Study of Inverted Planar Heterojunction Perovskite Solar Cells in Sequential Deposition
Authors: Asmat Nawaz, Ali Koray Erdinc, Burak Gultekin, Muhammad Tayyib, Ceylan Zafer, Kaiying Wang, M. Nadeem Akram
Abstract:
In this study, a sequential deposition process is used for the fabrication of PEDOT: PSS based inverted planar perovskite solar cell. A small amount of additive deionized water (DI-H2O) was added into PbI2 + Dimethyl formamide (DMF) precursor solution in order to increase the solubility of PbI2 in DMF, and finally to manipulate the surface morphology of the perovskite films. A morphology transition from needle like structure to hexagonal plates, and then needle-like again has been observed as the DI-H2O was added continuously (0.0 wt% to 3.0wt%). The latter one leads to full surface coverage of the perovskite, which is essential for high performance solar cell.Keywords: Charge carrier diffusion lengths, methylamonium lead iodide, precursor composition, perovskite solar cell, sequential deposition.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1677804 DNS of a Laminar Separation Bubble
Authors: N. K. Singh, S. Sarkar
Abstract:
Direct numerical simulation (DNS) is used to study the evolution of a boundary layer that was laminar initially followed by separation and then reattachment owing to generation of turbulence. This creates a closed region of recirculation, known as the laminar-separation bubble. The present simulation emulates the flow environment encountered in a modern LP turbine blade, where a laminar separation bubble may occur on the suction surface. The unsteady, incompressible three-dimensional (3-D) Navier-Stokes (NS) equations have been solved over a flat plate in the Cartesian coordinates. The adverse pressure gradient, which causes the flow to separate, is created by a boundary condition. The separated shear layer undergoes transition through appearance of ╬ø vortices, stretching of these create longitudinal streaks. Breakdown of the streaks into small and irregular structures makes the flow turbulent downstream.
Keywords: Adverse pressure gradient, direct numerical simulation, laminar separation bubble.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2603803 A Low-Power Two-Stage Seismic Sensor Scheme for Earthquake Early Warning System
Authors: Arvind Srivastav, Tarun Kanti Bhattacharyya
Abstract:
The north-eastern, Himalayan, and Eastern Ghats Belt of India comprise of earthquake-prone, remote, and hilly terrains. Earthquakes have caused enormous damages in these regions in the past. A wireless sensor network based earthquake early warning system (EEWS) is being developed to mitigate the damages caused by earthquakes. It consists of sensor nodes, distributed over the region, that perform majority voting of the output of the seismic sensors in the vicinity, and relay a message to a base station to alert the residents when an earthquake is detected. At the heart of the EEWS is a low-power two-stage seismic sensor that continuously tracks seismic events from incoming three-axis accelerometer signal at the first-stage, and, in the presence of a seismic event, triggers the second-stage P-wave detector that detects the onset of P-wave in an earthquake event. The parameters of the P-wave detector have been optimized for minimizing detection time and maximizing the accuracy of detection.Working of the sensor scheme has been verified with seven earthquakes data retrieved from IRIS. In all test cases, the scheme detected the onset of P-wave accurately. Also, it has been established that the P-wave onset detection time reduces linearly with the sampling rate. It has been verified with test data; the detection time for data sampled at 10Hz was around 2 seconds which reduced to 0.3 second for the data sampled at 100Hz.Keywords: Earthquake early warning system, EEWS, STA/LTA, polarization, wavelet, event detector, P-wave detector.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 781802 State Economic Safety in the Conditions of Innovative Economy Formation
Authors: Zh.Mingaleva, K.Balkova
Abstract:
Innovations and innovative activity get the increasing value for successful financial and economic activity of the countries and regions. The level of innovative sphere development determines place of a country or a region in world economy and forms a basis of steady economic growth. This article is devoted to different aspects of organization of the national economic safety in the conditions of innovative development, its problems, risks and threats. Economy can be considered as aspiring for transition to innovative way only with finding of economic safety: financial independence, power stability and technological progress. There are statistical indicators, defining the level of economic security and factors, threatening economic safety of the state. The research is based on the analysis of factors and indicators in conditions of innovative development. The paper is illustrated by the examples of possible estimated system of the economic safety level.Keywords: Economic safety, innovative activity, innovative development, innovative economy
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1536801 Some Separations in Covering Approximation Spaces
Authors: Xun Ge, Jinjin Li, Ying Ge
Abstract:
Adopting Zakowski-s upper approximation operator C and lower approximation operator C, this paper investigates granularity-wise separations in covering approximation spaces. Some characterizations of granularity-wise separations are obtained by means of Pawlak rough sets and some relations among granularitywise separations are established, which makes it possible to research covering approximation spaces by logical methods and mathematical methods in computer science. Results of this paper give further applications of Pawlak rough set theory in pattern recognition and artificial intelligence.Keywords: Rough set, covering approximation space, granularitywise separation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1685800 Uneven Development: Structural Changes and Income Outcomes across States in Malaysia
Authors: Siti Aiysyah Tumin
Abstract:
This paper looks at the nature of structural changes—the transition of employment from agriculture, to manufacturing, then to different types of services—in different states in Malaysia and links it to income outcomes for households and workers. Specifically, this paper investigates the conditional association between the concentration of different economic activities and income outcomes (household incomes and employee wages) in almost four decades. Using publicly available state-level employment and income data, we found that significant wage premium was associated with “modern” services (finance, real estate, professional, information and communication), which are urban-based services sectors that employ a larger proportion of skilled and educated workers. However, employment in manufacturing and other services subsectors was significantly associated with a lower income dispersion and inequality, alluding to their importance in welfare improvements.Keywords: Employment, labour market, structural change, wages.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 536799 A new Cellular Automata Model of Cardiac Action Potential Propagation based on Summation of Excited Neighbors
Authors: F. Pourhasanzade, S. H. Sabzpoushan
Abstract:
The heart tissue is an excitable media. A Cellular Automata is a type of model that can be used to model cardiac action potential propagation. One of the advantages of this approach against the methods based on differential equations is its high speed in large scale simulations. Recent cellular automata models are not able to avoid flat edges in the result patterns or have large neighborhoods. In this paper, we present a new model to eliminate flat edges by minimum number of neighbors.Keywords: Cellular Automata, Action Potential Simulation, Isotropic Pattern.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1949798 Optimizing the Probabilistic Neural Network Training Algorithm for Multi-Class Identification
Authors: Abdelhadi Lotfi, Abdelkader Benyettou
Abstract:
In this work, a training algorithm for probabilistic neural networks (PNN) is presented. The algorithm addresses one of the major drawbacks of PNN, which is the size of the hidden layer in the network. By using a cross-validation training algorithm, the number of hidden neurons is shrunk to a smaller number consisting of the most representative samples of the training set. This is done without affecting the overall architecture of the network. Performance of the network is compared against performance of standard PNN for different databases from the UCI database repository. Results show an important gain in network size and performance.
Keywords: Classification, probabilistic neural networks, network optimization, pattern recognition.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1224797 Performance Analysis of Chrominance Red and Chrominance Blue in JPEG
Authors: Mamta Garg
Abstract:
While compressing text files is useful, compressing still image files is almost a necessity. A typical image takes up much more storage than a typical text message and without compression images would be extremely clumsy to store and distribute. The amount of information required to store pictures on modern computers is quite large in relation to the amount of bandwidth commonly available to transmit them over the Internet and applications. Image compression addresses the problem of reducing the amount of data required to represent a digital image. Performance of any image compression method can be evaluated by measuring the root-mean-square-error & peak signal to noise ratio. The method of image compression that will be analyzed in this paper is based on the lossy JPEG image compression technique, the most popular compression technique for color images. JPEG compression is able to greatly reduce file size with minimal image degradation by throwing away the least “important" information. In JPEG, both color components are downsampled simultaneously, but in this paper we will compare the results when the compression is done by downsampling the single chroma part. In this paper we will demonstrate more compression ratio is achieved when the chrominance blue is downsampled as compared to downsampling the chrominance red in JPEG compression. But the peak signal to noise ratio is more when the chrominance red is downsampled as compared to downsampling the chrominance blue in JPEG compression. In particular we will use the hats.jpg as a demonstration of JPEG compression using low pass filter and demonstrate that the image is compressed with barely any visual differences with both methods.Keywords: JPEG, Discrete Cosine Transform, Quantization, Color Space Conversion, Image Compression, Peak Signal to Noise Ratio & Compression Ratio.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1677796 Constructing Masculinity through Images: Content Analysis of Lifestyle Magazines in Croatia
Authors: Marija Lončar, Zorana Šuljug Vučica, Magdalena Nigoević
Abstract:
Diverse social, cultural and economic trends and changes in contemporary societies influence the ways masculinity is represented in a variety of media. Masculinity is constructed within media images as a dynamic process that changes slowly over time and is shaped by various social factors. In many societies, dominant masculinity is still associated with authority, heterosexuality, marriage, professional and financial success, ethnic dominance and physical strength. But contemporary media depict men in ways that suggest a change in the approach to media images. The number of media images of men, which promote men’s identity through their body, have increased. With the male body more scrutinized and commodified, it is necessary to highlight how the body is represented and which visual elements are crucial since the body has an important role in the construction of masculinities. The study includes content analysis of male body images in the advertisements of different men’s and women’s lifestyle magazines available in Croatia. The main aim was to explore how masculinities are currently being portrayed through body regarding age, physical appearance, fashion, touch and gaze. The findings are also discussed in relation to female images since women are central in many of the processes constructing masculinities and according to the recent conceptualization of masculinity. Although the construction of male images varies through body features, almost all of them convey the message that men’s identity could be managed through manipulation and by enhancing the appearance. Furthermore, they suggest that men should engage in “bodywork” through advertised products, activities and/or practices, in order to achieve their preferred social image.
Keywords: Body images, content analysis, lifestyle magazines, masculinity.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1456795 Study of the Flow Structure in a Penstock in Unsteady Regime
Authors: F. Nkontchou Ngongang, M. Tchawe Tchawe, B. Djeumako, B. Kenmeugne
Abstract:
In this work, the flow structure in the Songloulou dam, is visualized in a time interval to observe the different fluid layers in our structure. Firstly, the three-dimensional modelling of the penstock is carried out in the software Gambit, followed by calculations in Fluent that proceeds introduction of boundary conditions. After calculation, we identified four periods corresponding to four regimes. In the first, spanning from 0.00 to 1.50s, we have the non-developed hydraulically rough turbulent regime, characterized by abrupt variations with modifications of the velocity fields. The second extends from 1.50 to 3.50s, where we have the transition regime characterized by slight variations and modifications of the velocity fields but with a great difference of the values of the current lines. From 3.50 to 5.00s, we encounter the third, which is the fully developed turbulent hydraulically rough regime, characterized by fields that vary no more, but have minute differences in the streamlines. The last period is from 5.00s and more, where we have a flow that is almost stationary, hence there are no changes in the fields.
Keywords: Unsteady flow, penstock, friction coefficient, hydroelectric dam.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 351794 An Intelligent Transportation System for Safety and Integrated Management of Railway Crossings
Authors: M. Magrini, D. Moroni, G. Palazzese, G. Pieri, D. Azzarelli, A. Spada, L. Fanucci, O. Salvetti
Abstract:
Railway crossings are complex entities whose optimal management cannot be addressed unless with the help of an intelligent transportation system integrating information both on train and vehicular flows. In this paper, we propose an integrated system named SIMPLE (Railway Safety and Infrastructure for Mobility applied at level crossings) that, while providing unparalleled safety in railway level crossings, collects data on rail and road traffic and provides value-added services to citizens and commuters. Such services include for example alerts, via variable message signs to drivers and suggestions for alternative routes, towards a more sustainable, eco-friendly and efficient urban mobility. To achieve these goals, SIMPLE is organized as a System of Systems (SoS), with a modular architecture whose components range from specially-designed radar sensors for obstacle detection to smart ETSI M2M-compliant camera networks for urban traffic monitoring. Computational unit for performing forecast according to adaptive models of train and vehicular traffic are also included. The proposed system has been tested and validated during an extensive trial held in the mid-sized Italian town of Montecatini, a paradigmatic case where the rail network is inextricably linked with the fabric of the city. Results of the tests are reported and discussed.
Keywords: Intelligent Transportation Systems (ITS), railway, railroad crossing, smart camera networks, radar obstacle detection, real-time traffic optimization, IoT, ETSI M2M, transport safety.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1420793 Endogenous Growth of Small Open Economies in New Europe under Global Imbalance
Authors: Tatyana Boikova
Abstract:
The strong international competition as the factor of rising economic development efficiency should not turn into destructive force for models of social orientation. What result Europe received from the accelerated integration without a long transition period of the accepted countries. Correlative relationship between the research and development expenditure and labor productivity, inflation and the rate economy's growth of the USA and the euro zone, employment and gross value added between Old and New Europe is analyzed in this article. The article estimates the differences in economic growth of Old and New Europe. Correlation rate between cycles of the euro area and the countries of Central and the Eastern Europe very much differs, though some of these countries have high correlation as members of the Economic and Monetary Union. Besides, the majority of the countries of Central and the Eastern Europe does not correspond to criteria of an optimum currency area.
Keywords: endogenous economic growth, sustainability, competitiveness, economic development
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1644792 First-Principles Density Functional Study of Nitrogen-Doped P-Type ZnO
Authors: Abdusalam Gsiea, Ramadan Al-habashi, Mohamed Atumi, Khaled Atmimi
Abstract:
We present a theoretical investigation on the structural, electronic properties and vibrational mode of nitrogen impurities in ZnO. The atomic structures, formation and transition energies and vibrational modes of (NO3)i interstitial or NO4 substituting on an oxygen site ZnO were computed using ab initio total energy methods. Based on Local density functional theory, our calculations are in agreement with one interpretation of bound-excition photoluminescence for N-doped ZnO. First-principles calculations show that (NO3)i defects interstitial or NO4 substituting on an Oxygen site in ZnO are important suitable impurity for p-type doping in ZnO. However, many experimental efforts have not resulted in reproducible p-type material with N2 and N2O doping. by means of first-principle pseudo-potential calculation we find that the use of NO or NO2 with O gas might help the experimental research to resolve the challenge of achieving p-type ZnO.Keywords: Density functional theory, nitrogen, p-type, ZnO.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 969791 Verification of On-Line Vehicle Collision Avoidance Warning System using DSRC
Authors: C. W. Hsu, C. N. Liang, L. Y. Ke, F. Y. Huang
Abstract:
Many accidents were happened because of fast driving, habitual working overtime or tired spirit. This paper presents a solution of remote warning for vehicles collision avoidance using vehicular communication. The development system integrates dedicated short range communication (DSRC) and global position system (GPS) with embedded system into a powerful remote warning system. To transmit the vehicular information and broadcast vehicle position; DSRC communication technology is adopt as the bridge. The proposed system is divided into two parts of the positioning andvehicular units in a vehicle. The positioning unit is used to provide the position and heading information from GPS module, and furthermore the vehicular unit is used to receive the break, throttle, and othersignals via controller area network (CAN) interface connected to each mechanism. The mobile hardware are built with an embedded system using X86 processor in Linux system. A vehicle is communicated with other vehicles via DSRC in non-addressed protocol with wireless access in vehicular environments (WAVE) short message protocol. From the position data and vehicular information, this paper provided a conflict detection algorithm to do time separation and remote warning with error bubble consideration. And the warning information is on-line displayed in the screen. This system is able to enhance driver assistance service and realize critical safety by using vehicular information from the neighbor vehicles.KeywordsDedicated short range communication, GPS, Control area network, Collision avoidance warning system.
Keywords: Dedicated short range communication, GPS, Control area network, Collision avoidance warning system.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2206790 Unsteady Boundary Layer Flow over a Stretching Sheet in a Micropolar Fluid
Authors: Roslinda Nazar, Anuar Ishak, Ioan Pop
Abstract:
Unsteady boundary layer flow of an incompressible micropolar fluid over a stretching sheet when the sheet is stretched in its own plane is studied in this paper. The stretching velocity is assumed to vary linearly with the distance along the sheet. Two equal and opposite forces are impulsively applied along the x-axis so that the sheet is stretched, keeping the origin fixed in a micropolar fluid. The transformed unsteady boundary layer equations are solved numerically using the Keller-box method for the whole transient from the initial state to final steady-state flow. Numerical results are obtained for the velocity and microrotation distributions as well as the skin friction coefficient for various values of the material parameter K. It is found that there is a smooth transition from the small-time solution to the large-time solution.Keywords: Boundary layer, micropolar fluid, stretching surface, unsteady flow.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2360789 A Systematic Approach for Finding Hamiltonian Cycles with a Prescribed Edge in Crossed Cubes
Authors: Jheng-Cheng Chen, Chia-Jui Lai, Chang-Hsiung Tsai,
Abstract:
The crossed cube is one of the most notable variations of hypercube, but some properties of the former are superior to those of the latter. For example, the diameter of the crossed cube is almost the half of that of the hypercube. In this paper, we focus on the problem embedding a Hamiltonian cycle through an arbitrary given edge in the crossed cube. We give necessary and sufficient condition for determining whether a given permutation with n elements over Zn generates a Hamiltonian cycle pattern of the crossed cube. Moreover, we obtain a lower bound for the number of different Hamiltonian cycles passing through a given edge in an n-dimensional crossed cube. Our work extends some recently obtained results.
Keywords: Interconnection network, Hamiltonian, crossed cubes, prescribed edge.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1528788 Modeling User Behaviour by Planning
Authors: Alfredo Milani, Silvia Suriani
Abstract:
A model of user behaviour based automated planning is introduced in this work. The behaviour of users of web interactive systems can be described in term of a planning domain encapsulating the timed actions patterns representing the intended user profile. The user behaviour recognition is then posed as a planning problem where the goal is to parse a given sequence of user logs of the observed activities while reaching a final state. A general technique for transforming a timed finite state automata description of the behaviour into a numerical parameter planning model is introduced. Experimental results show that the performance of a planning based behaviour model is effective and scalable for real world applications. A major advantage of the planning based approach is to represent in a single automated reasoning framework problems of plan recognitions, plan synthesis and plan optimisation.Keywords: User behaviour, Timed Transition Automata, Automated Planning.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1347787 Data Compression in Ultrasonic Network Communication via Sparse Signal Processing
Authors: Beata Zima, Octavio A. Márquez Reyes, Masoud Mohammadgholiha, Jochen Moll, Luca De Marchi
Abstract:
This document presents the approach of using compressed sensing in signal encoding and information transferring within a guided wave sensor network, comprised of specially designed frequency steerable acoustic transducers (FSATs). Wave propagation in a damaged plate was simulated using commercial FEM-based software COMSOL. Guided waves were excited by means of FSATs, characterized by the special shape of its electrodes, and modeled using PIC255 piezoelectric material. The special shape of the FSAT, allows for focusing wave energy in a certain direction, accordingly to the frequency components of its actuation signal, which makes a larger monitored area available. The process begins when a FSAT detects and records reflection from damage in the structure, this signal is then encoded and prepared for transmission, using a combined approach, based on Compressed Sensing Matching Pursuit and Quadrature Amplitude Modulation (QAM). After codification of the signal is in binary, the information is transmitted between the nodes in the network. The message reaches the last node, where it is finally decoded and processed, to be used for damage detection and localization purposes. The main aim of the investigation is to determine the location of detected damage using reconstructed signals. The study demonstrates that the special steerable capabilities of FSATs, not only facilitate the detection of damage but also permit transmitting the damage information to a chosen area in a specific direction of the investigated structure.
Keywords: Data compression, ultrasonic communication, guided waves, FEM analysis.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 378786 Perception of Neighbourhood-Level Built Environment in Relation to Youth Physical Activity in Malaysia
Authors: A. Abdullah, N. Faghih Mirzaei, S. Hany Haron
Abstract:
Neighbourhood environment walkability on reported physical activity (PA) levels of students of Universiti Sains Malaysia (USM) in Malaysia. Compared with previous generations, today’s young people spend less time playing outdoors and have lower participation rates in PA. Research suggests that negative perceptions of neighbourhood walkability may be a potential barrier to adolescents’ PA. The sample consisted of 200 USM students (to 24 years old) who live outside of the main campus and engage in PA in sport halls and sport fields of USM. The data were analysed using the t-test, binary logistic regression, and discriminant analysis techniques. The present study found that youth PA was affected by neighbourhood environment walkability factors, including neighbourhood infrastructures, neighbourhood safety (crime), and recreation facilities, as well as street characteristics and neighbourhood design variables such as facades of sidewalks, roadside trees, green spaces, and aesthetics. The finding also illustrated that active students were influenced by street connectivity, neighbourhood infrastructures, recreation facilities, facades of sidewalks, and aesthetics, whereas students in the less active group were affected by access to destinations, neighbourhood safety (crime), and roadside trees and green spaces for their PAs. These results report which factors of built environments have more effect on youth PA and they message to the public to create more awareness about the benefits of PA on youth health.
Keywords: Fear of crime, neighbourhood built environment, physical activities, street characteristics design.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1380785 Air Handling Units Power Consumption Using Generalized Additive Model for Anomaly Detection: A Case Study in a Singapore Campus
Authors: Ju Peng Poh, Jun Yu Charles Lee, Jonathan Chew Hoe Khoo
Abstract:
The emergence of digital twin technology, a digital replica of physical world, has improved the real-time access to data from sensors about the performance of buildings. This digital transformation has opened up many opportunities to improve the management of the building by using the data collected to help monitor consumption patterns and energy leakages. One example is the integration of predictive models for anomaly detection. In this paper, we use the GAM (Generalised Additive Model) for the anomaly detection of Air Handling Units (AHU) power consumption pattern. There is ample research work on the use of GAM for the prediction of power consumption at the office building and nation-wide level. However, there is limited illustration of its anomaly detection capabilities, prescriptive analytics case study, and its integration with the latest development of digital twin technology. In this paper, we applied the general GAM modelling framework on the historical data of the AHU power consumption and cooling load of the building between Jan 2018 to Aug 2019 from an education campus in Singapore to train prediction models that, in turn, yield predicted values and ranges. The historical data are seamlessly extracted from the digital twin for modelling purposes. We enhanced the utility of the GAM model by using it to power a real-time anomaly detection system based on the forward predicted ranges. The magnitude of deviation from the upper and lower bounds of the uncertainty intervals is used to inform and identify anomalous data points, all based on historical data, without explicit intervention from domain experts. Notwithstanding, the domain expert fits in through an optional feedback loop through which iterative data cleansing is performed. After an anomalously high or low level of power consumption detected, a set of rule-based conditions are evaluated in real-time to help determine the next course of action for the facilities manager. The performance of GAM is then compared with other approaches to evaluate its effectiveness. Lastly, we discuss the successfully deployment of this approach for the detection of anomalous power consumption pattern and illustrated with real-world use cases.
Keywords: Anomaly detection, digital twin, Generalised Additive Model, Power Consumption Model.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 502784 Object Localization in Medical Images Using Genetic Algorithms
Authors: George Karkavitsas, Maria Rangoussi
Abstract:
We present a genetic algorithm application to the problem of object registration (i.e., object detection, localization and recognition) in a class of medical images containing various types of blood cells. The genetic algorithm approach taken here is seen to be most appropriate for this type of image, due to the characteristics of the objects. Successful cell registration results on real life microscope images of blood cells show the potential of the proposed approach.
Keywords: Genetic algorithms, object registration, pattern recognition, blood cell microscope images.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1969783 A Data Hiding Model with High Security Features Combining Finite State Machines and PMM method
Authors: Souvik Bhattacharyya, Gautam Sanyal
Abstract:
Recent years have witnessed the rapid development of the Internet and telecommunication techniques. Information security is becoming more and more important. Applications such as covert communication, copyright protection, etc, stimulate the research of information hiding techniques. Traditionally, encryption is used to realize the communication security. However, important information is not protected once decoded. Steganography is the art and science of communicating in a way which hides the existence of the communication. Important information is firstly hidden in a host data, such as digital image, video or audio, etc, and then transmitted secretly to the receiver.In this paper a data hiding model with high security features combining both cryptography using finite state sequential machine and image based steganography technique for communicating information more securely between two locations is proposed. The authors incorporated the idea of secret key for authentication at both ends in order to achieve high level of security. Before the embedding operation the secret information has been encrypted with the help of finite-state sequential machine and segmented in different parts. The cover image is also segmented in different objects through normalized cut.Each part of the encoded secret information has been embedded with the help of a novel image steganographic method (PMM) on different cuts of the cover image to form different stego objects. Finally stego image is formed by combining different stego objects and transmit to the receiver side. At the receiving end different opposite processes should run to get the back the original secret message.Keywords: Cover Image, Finite state sequential machine, Melaymachine, Pixel Mapping Method (PMM), Stego Image, NCUT.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2261782 Numerical Example of Aperiodic Diffraction Grating
Authors: Youssef Khmou, Said Safi, Miloud Frikel
Abstract:
Diffraction grating is periodic module used in many engineering fields, its geometrical conception gives interesting properties of diffraction and interferences, a uniform and periodic diffraction grating consists of a number of identical apertures that are equally spaced, in this case, the amplitude of intensity distribution in the far field region is generally modulated by diffraction pattern of single aperture. In this paper, we study the case of aperiodic diffraction grating with identical rectangular apertures where theirs coordinates are modeled by square root function, we elaborate a computer simulation comparatively to the periodic array with same length and we discuss the numerical results.Keywords: Diffraction grating, interferences, amplitude modulation, laser.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1080781 Simulation of Population Dynamics of Aedes aegypti using Climate Dependent Model
Authors: Nuraini Yusoff, Harun Budin, Salemah Ismail
Abstract:
A climate dependent model is proposed to simulate the population of Aedes aegypti mosquito. In developing the model, average temperature of Shah Alam, Malaysia was used to determine the development rate of each stage of the life cycle of mosquito. Rainfall dependent function was proposed to simulate the hatching rate of the eggs under several assumptions. The proposed transition matrix was obtained and used to simulate the population of eggs, larvae, pupae and adults mosquito. It was found that the peak of mosquito abundance comes during a relatively dry period following a heavy rainfall. In addition, lag time between the peaks of mosquito abundance and dengue fever cases in Shah Alam was estimated.Keywords: simulation, Aedes aegypti, Lefkovitch matrix, rainfall dependent model, Shah Alam
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2487780 Analysis of the Impact of Rainfall Change on the Seasonal Monsoon over the Jaipur District
Authors: Randhir Singh Baghel
Abstract:
In this work, long-term spatiotemporal changes in rainfall are investigated and assessed at the meteorological divisional level using whole-year data from Rajasthan, India. Data from each of the district's eight tehsils are studied to see how the rainfall pattern has altered over the last 10 years. We primarily compare information from the Jaipur district in Rajasthan, India, at the tehsil level. We looked at the full year, and from January to December, there was constantly more rain than any other month. Furthermore, we compare the research of annual and monthly rainfall. Havey rainfall is also shown for two months, July and August.
Keywords: Climate change, temperature, seasonal monsoons, rainfall variability.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 165779 Effect of Time Delay on the Transmission of Dengue Fever
Authors: K. Patanarapelert, I.M. Tang
Abstract:
The effect of a time delay on the transmission on dengue fever is studied. The time delay is due to the presence of an incubation period for the dengue virus to develop in the mosquito before the mosquito becomes infectious. The conditions for the existence of a Hopf bifurcation to limit cycle behavior are established. The conditions are different from the usual one and they are based on whether a particular third degree polynomial has positive real roots. A theorem for determining whether for a given set of parameter values, a critical delay time exist is given. It is found that for a set of realistic values of the parameters in the model, a Hopf bifurcation can not occur. For a set of unrealistic values of some of the parameters, it is shown that a Hopf bifurcation can occur. Numerical solutions using this last set show the trajectory of two of the variables making a transition from a spiraling orbit to a limit cycle orbit.Keywords: Dengue fever transmission, time delay, Hopfbifurcation, limit cycle behavior
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1792