Search results for: Model order Reduction.
4678 A Study of Factors Affecting the Elapsed Time of Housing Renewal Project Implementation in Seoul
Authors: In Su Na, Gunwon Lee, Seiyong Kim
Abstract:
This study analyzed the effect of area variables and economic variables on the length of each period of the project in order to analyze the effect of agreement rate on project implementation in housing renewal projects. In conclusion, as can be seen from these results, a low agreement rate may not translate into project promotion, and a higher agreement rate may not translate into project delay. The expectation of the policy is that the lower the agreement rate, the more projects would be promoted, but that is not the actual effect. From a policy consistency viewpoint, changing the agreement rate frequently, depending on the decision of the public, is not reasonable. The policy of using agreement rate as a necessary condition for project implementation should be reconsidered.Keywords: Area and Economic Variables, Elapsed time, Housing Renewal Project.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16294677 Two Wheels Balancing Robot with Line Following Capability
Authors: Nor Maniha Abdul Ghani, Faradila Naim, Tan Piow Yon
Abstract:
This project focuses on the development of a line follower algorithm for a Two Wheels Balancing Robot. In this project, ATMEGA32 is chosen as the brain board controller to react towards the data received from Balance Processor Chip on the balance board to monitor the changes of the environment through two infra-red distance sensor to solve the inclination angle problem. Hence, the system will immediately restore to the set point (balance position) through the implementation of internal PID algorithms at the balance board. Application of infra-red light sensors with the PID control is vital, in order to develop a smooth line follower robot. As a result of combination between line follower program and internal self balancing algorithms, we are able to develop a dynamically stabilized balancing robot with line follower function.Keywords: infra-red sensor, PID algorithms, line followerBalancing robot
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 75284676 Usability Issues of Smart Phone Applications: For Visually Challenged People
Authors: Anam Ashraf, Arif Raza
Abstract:
In this era of globalization, adoption of technology is quite difficult for people with physical disabilities compared to people with normal abilities. The advancement in mobile based accessible applications have opened up several different avenues for the visually challenged across the globe. Smartphones applications are not very common for blind people, but they access and use these applications in their daily lives to some extent. Several smartphone applications have a number of usability issues for the visually impaired. In this paper, we evaluate the usability of various android & iPhone applications for blind people through analysis and surveys. This paper aspires to provide guidance in order to increase smartphone application accessibility for the visually impaired. An abstract application design is also proposed to overcome usability issues in smartphone applications for visually challenged people.
Keywords: Eyes-free shell, human computer interaction, usability engineering, visually challenged.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 51954675 Exploiting Self-Adaptive Replication Management on Decentralized Tuple Space
Authors: Xing Jiankuan, Qin Zheng, Zhang Jinxue
Abstract:
Decentralized Tuple Space (DTS) implements tuple space model among a series of decentralized hosts and provides the logical global shared tuple repository. Replication has been introduced to promote performance problem incurred by remote tuple access. In this paper, we propose a replication approach of DTS allowing replication policies self-adapting. The accesses from users or other nodes are monitored and collected to contribute the decision making. The replication policy may be changed if the better performance is expected. The experiments show that this approach suitably adjusts the replication policies, which brings negligible overhead.Keywords: Decentralization, Replication Management, SelfAdaption, Tuple Space.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 12274674 Smith Predictor Design by CDM for Temperature Control System
Authors: Roengruen P., Tipsuwanporn V., Puawade P., Numsomran A.
Abstract:
Smith Predictor control is theoretically a good solution to the problem of controlling the time delay systems. However, it seldom gets use because it is almost impossible to find out a precise mathematical model of the practical system and very sensitive to uncertain system with variable time-delay. In this paper is concerned with a design method of smith predictor for temperature control system by Coefficient Diagram Method (CDM). The simulation results show that the control system with smith predictor design by CDM is stable and robust whilst giving the desired time domain system performance.
Keywords: CDM, Smith Predictor, temperature process
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 24404673 A Method for Improving Dental Crown Fit-Increasing the Robustness
Authors: Kero T., Söderberg R., Andersson M., Lindkvist L.
Abstract:
The introduction of mass-customization has enabled new ways to treat patients within medicine. However, the introduction of industrialized treatments has also meant new obstacles. The purpose of this study was to introduce and theoretically test a method for improving dental crown fit. The optimization method allocates support points in order to check the final variation for dental crowns. Three different types of geometries were tested and compared. The three geometries were also divided into three sub-geometries: Current method, Optimized method and Feasible method. The Optimized method, using the whole surface for support points, provided the best results. The results support the objective of the study. It also seems that the support optimization method can dramatically improve the robustness of dental crown treatments.Keywords: Bio-medicine, Dentistry, Mass-customization, Optimization and Robust design.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16324672 The Effects of Software Size on Development Effort and Software Quality
Authors: Zhizhong Jiang, Peter Naudé, Binghua Jiang
Abstract:
Effective evaluation of software development effort is an important issue during project plan. This study provides a model to predict development effort based on the software size estimated with function points. We generalize the average amount of effort spent on each phase of the development, and give the estimates for the effort used in software building, testing, and implementation. Finally, this paper finds a strong correlation between software defects and software size. As the size of software constantly increases, the quality remains to be a matter which requires major concern.
Keywords: Development effort, function points, software quality, software size.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 22904671 Deep Learning and Virtual Environment
Authors: Danielle Morin, Jennifer D.E.Thomas, Raafat G. Saade
Abstract:
While computers are known to facilitate lower levels of learning, such as rote memorization of facts, measurable through electronically administered and graded multiple-choice questions, yes/no, and true/false answers, the imparting and measurement of higher-level cognitive skills is more vexing. These require more open-ended delivery and answers, and may be more problematic in an entirely virtual environment, notwithstanding the advances in technologies such as wikis, blogs, discussion boards, etc. As with the integration of all technology, merit is based more on the instructional design of the course than on the technology employed in, and of, itself. With this in mind, this study examined the perceptions of online students in an introductory Computer Information Systems course regarding the fostering of various higher-order thinking and team-building skills as a result of the activities, resources and technologies (ART) used in the course.
Keywords: Critical thinking, deep learning, distance learning, elearning, online learning, virtual environments.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 22774670 Object Detection based Weighted-Center Surround Difference
Authors: Seung-Hun Kim, Kye-Hoon Jeon, Byoung-Doo Kang, I1-Kyun Jung
Abstract:
Intelligent traffic surveillance technology is an issue in the field of traffic data analysis. Therefore, we need the technology to detect moving objects in real-time while there are variations in background and natural light. In this paper, we proposed a Weighted-Center Surround Difference method for object detection in outdoor environments. The proposed system detects objects using the saliency map that is obtained by analyzing the weight of each layers of Gaussian pyramid. In order to validate the effectiveness of our system, we implemented the proposed method using a digital signal processor, TMS320DM6437. Experimental results show that blurred noisy around objects was effectively eliminated and the object detection accuracy is improved.Keywords: Saliency Map, Center Surround Difference, Object Detection, Surveillance System
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17424669 XML based Safe and Scalable Multi-Agent Development Framework
Authors: Rinkaj Goyal, Pravin Chandra, Yogesh Singh
Abstract:
In this paper we describe our efforts to design and implement an agent development framework that has the potential to scale to the size of any underlying network suitable for various ECommerce activities. The main novelty in our framework is it-s capability to allow the development of sophisticated, secured agents which are simple enough to be practical. We have adopted FIPA agent platform reference Model as backbone for implementation along with XML for agent Communication and Java Cryptographic Extension and architecture to realize the security of communication information between agents. The advantage of our architecture is its support of agents development in different languages and Communicating with each other using a more open standard i.e. XMLKeywords: Agent, Agent Development Framework, Agent Coordination, Security
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16284668 Optimization Technique in Scheduling Duck Tours
Authors: Norhazwani M. Y., Khoo, C. F., Hasrul Nisham R.
Abstract:
Tourism industries are rapidly increased for the last few years especially in Malaysia. In order to attract more tourists, Malaysian Governance encourages any effort to increase Malaysian tourism industry. One of the efforts in attracting more tourists in Malacca, Malaysia is a duck tour. Duck tour is an amphibious sightseeing tour that works in two types of engines, hence, it required a huge cost to operate and maintain the vehicle. To other country, it is not so new but in Malaysia, it is just introduced, thus it does not have any systematic routing yet. Therefore, this paper proposed an optimization technique to formulate and schedule this tour to minimize the operating costs by considering it into Travelling Salesman Problem (TSP). The problem is then can be solved by one of the optimization technique especially meta-heuristics approach such as Tabu Search (TS) and Reactive Tabu Search (RTS).Keywords: Optimization, Reactive Tabu Search, Tabu Search, Travelling Salesman Problem
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17114667 China’s Health Silk Road in the Southeast Asia and Europe during COVID-19
Authors: Wanda Luen-Wun Siu, Xiaowen Zhang
Abstract:
The COVID-19 pandemic has presented an opportune time for China to deploy its health diplomacy around the world. This paper focused on China’s health diplomacy along the path of its Health Silk Road, with particular emphasis on the Southeast Asia and Europe amid COVID-19. This paper employed a retrospective literature review, analyzed China’s health diplomacy in such regions to cultivate bilateral and multilateral relationships. Findings argued that such health diplomacy is a success and China has taken the helm of international public health patronage. This research contributes to the literature in health diplomacy and suggests that amid the ever changing international order, China has exerted great effort in its health diplomacy and established itself as a responsible world power.
Keywords: China’s health silk road, COVID-19, Europe, Middle East.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4084666 Kernel’s Parameter Selection for Support Vector Domain Description
Authors: Mohamed EL Boujnouni, Mohamed Jedra, Noureddine Zahid
Abstract:
Support Vector Domain Description (SVDD) is one of the best-known one-class support vector learning methods, in which one tries the strategy of using balls defined on the feature space in order to distinguish a set of normal data from all other possible abnormal objects. As all kernel-based learning algorithms its performance depends heavily on the proper choice of the kernel parameter. This paper proposes a new approach to select kernel's parameter based on maximizing the distance between both gravity centers of normal and abnormal classes, and at the same time minimizing the variance within each class. The performance of the proposed algorithm is evaluated on several benchmarks. The experimental results demonstrate the feasibility and the effectiveness of the presented method.
Keywords: Gravity centers, Kernel’s parameter, Support Vector Domain Description, Variance.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 18394665 Development of Blower for Air Management System of Fuel Cell Modules
Authors: Joo-Han Kim, Jung-Moo Seo, Ha Gyeong Sung, Se Hyun Rhyu
Abstract:
This study presents a blower for air management system of fuel cell modules. A blower is composed of BLDC motor and impeller. Magnetic equivalent circuit model and finite element analysis are used to design the motor, and an improved structure is considered to reduce a mechanical loss induced from bearing units. Finally, air blower system combined with the motor and an impeller is manufactured and output properties, such as an air pressure and an amount of flowing air, are measured. Through the experimental results, a validity of the simulated one is confirmed.Keywords: Fuel cell modules, BLDC motor, Impeller, Air management
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15944664 The Temperature Range in the Simulation of Residual Stress and Hot Tearing During Investment Casting
Authors: Saeid Norouzi, Ali Shams, Hassan Farhangi, Alireza Darvish
Abstract:
Hot tear cracking and residual stress are two different consequences of thermal stress both of which can be considered as casting problem. The purpose of the present study is simulation of the effect of casting shape characteristic on hot tearing and residual stress. This study shows that the temperature range for simulation of hot tearing and residual stress are different. In this study, in order to study the development of thermal stress and to predict the hot tearing and residual stress of shaped casting, MAGMASOFT simulation program was used. The strategy of this research was the prediction of hot tear location using pinpointing hot spot and thermal stress concentration zones. The results shows that existing of stress concentration zone increases the hot tearing probability and consequently reduces the amount of remaining residual stress in casting parts.
Keywords: Hot tearing, residual stress, simulation, investment casting.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 27294663 An Analysis of Compression Methods and Implementation of Medical Images in Wireless Network
Authors: C. Rajan, K. Geetha, S. Geetha
Abstract:
The motivation of image compression technique is to reduce the irrelevance and redundancy of the image data in order to store or pass data in an efficient way from one place to another place. There are several types of compression methods available. Without the help of compression technique, the file size is knowingly larger, usually several megabytes, but by doing the compression technique, it is possible to reduce file size up to 10% as of the original without noticeable loss in quality. Image compression can be lossless or lossy. The compression technique can be applied to images, audio, video and text data. This research work mainly concentrates on methods of encoding, DCT, compression methods, security, etc. Different methodologies and network simulations have been analyzed here. Various methods of compression methodologies and its performance metrics has been investigated and presented in a table manner.Keywords: Image compression techniques, encoding, DCT, lossy compression, lossless compression, JPEG.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 11954662 Solving Facility Location Problem on Cluster Computing
Authors: Ei Phyo Wai, Nay Min Tun
Abstract:
Computation of facility location problem for every location in the country is not easy simultaneously. Solving the problem is described by using cluster computing. A technique is to design parallel algorithm by using local search with single swap method in order to solve that problem on clusters. Parallel implementation is done by the use of portable parallel programming, Message Passing Interface (MPI), on Microsoft Windows Compute Cluster. In this paper, it presents the algorithm that used local search with single swap method and implementation of the system of a facility to be opened by using MPI on cluster. If large datasets are considered, the process of calculating a reasonable cost for a facility becomes time consuming. The result shows parallel computation of facility location problem on cluster speedups and scales well as problem size increases.Keywords: cluster, cost, demand, facility location
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14914661 An Analysis of the Relationship between Manufacturing Growth and Economic Growth in South Africa: A Cointegration Approach
Authors: Johannes T. Tsoku, Teboho J. Mosikari, Diteboho Xaba, Thatoyaone Modise
Abstract:
This paper examines the relationship between manufacturing growth and economic growth in South Africa using quarterly data ranging from 2001 to 2014. The paper employed the Johansen cointegration to test the Kaldor’s hypothesis. The Johansen cointegration results revealed that there is a long run relationship between GDP, manufacturing, service and employment. The Granger causality results revealed that there is a unidirectional causality running from manufacturing growth to GDP growth. The overall findings of the study confirm that Kaldor’s first law of growth is applicable in South African economy. Therefore, investment strategies and policies should be alignment towards promoting growth in the manufacturing sector in order to boost the economic growth of South Africa.
Keywords: Cointegration, economic growth, Kaldor’s law, manufacturing growth.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 18574660 Ignition Time Delay in Swirling Supersonic Flow Combustion
Authors: A. M. Tahsini
Abstract:
Supersonic hydrogen-air cylindrical mixing layer is numerically analyzed to investigate the effect of inlet swirl on ignition time delay in scramjets. Combustion is treated using detail chemical kinetics. One-equation turbulence model of Spalart and Allmaras is chosen to study the problem and advection upstream splitting method is used as computational scheme. The results show that swirling both fuel and oxidizer streams may drastically decrease the ignition distance in supersonic combustion, unlike using the swirl just in fuel stream which has no helpful effect.Keywords: Ignition delay, Supersonic combustion, Swirl, Numerical simulation, Turbulence.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 21984659 Transportation Mode Choice Analysis for Accessibility of the Mehrabad International Airport by Statistical Models
Authors: N. Mirzaei Varzeghani, M. Saffarzadeh, A. Naderan, A. Taheri
Abstract:
Countries are progressing, and the world's busiest airports see year-on-year increases in travel demand. Passenger acceptability of an airport depends on the airport's appeals, which may include one of these routes between the city and the airport, as well as the facilities to reach them. One of the critical roles of transportation planners is to predict future transportation demand so that an integrated, multi-purpose system can be provided and diverse modes of transportation (rail, air, and land) can be delivered to a destination like an airport. In this study, 356 questionnaires were filled out in person over six days. First, the attraction of business and non-business trips was studied using data and a linear regression model. Lower travel costs, more passengers aged 55 and older using this airport, and other factors are essential for business trips. Non-business travelers, on the other hand, have prioritized using personal vehicles to get to the airport and ensuring convenient access to the airport. Business travelers are also less price-sensitive than non-business travelers regarding airport travel. Furthermore, carrying additional luggage (for example, more than one suitcase per person) undoubtedly decreases the attractiveness of public transit. Afterward, based on the manner and purpose of the trip, the locations with the highest trip generation to the airport were identified. The most famous district in Tehran was District 2, with 23 visits, while the most popular mode of transportation was an online taxi, with 12 trips from that location. Then, significant variables in separation and behavior of travel methods to access the airport were investigated for all systems. In this scenario, the most crucial factor is the time it takes to get to the airport, followed by the method's user-friendliness as a component of passenger preference. It has also been demonstrated that enhancing public transportation trip times reduces private transportation's market share, including taxicabs. Based on the responses of personal and semi-public vehicles, the desire of passengers to approach the airport via public transportation systems was explored to enhance present techniques and develop new strategies for providing the most efficient modes of transportation. Using the binary model, it was clear that business travelers and people who had already driven to the airport were the least likely to change.
Keywords: Multimodal transportation, travel behavior, demand modeling, statistical models.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 5604658 Critical Analysis of the Hong Kong International Convention on Ship Recycling
Authors: K. P. Jain, J. F. J. Pruyn, J. J. Hopman
Abstract:
In May 2009, the International Maritime Organization (IMO) adopted the Hong Kong International Convention for the Safe and Environmentally Sound Recycling of Ships to address the growing concerns about the environmental, occupational health and safety risks related to ship recycling. The aim of the Hong Kong Convention is to provide a legally binding instrument which ensures that the process of ship recycling does not pose risks to human health, safety and to the environment. In this paper, critical analysis of the Hong Kong Convention has been carried out in order to study the effectiveness of the Convention to meet its objectives. The Convention has been studied in detail including its background, main features, major stakeholders, strengths and weaknesses. The Convention, though having several deficiencies, is a major breakthrough in not only recognizing but also dealing with the ill-practices associated with ship recycling.
Keywords: Hong Kong Convention, IMO, Ship breaking, Ship recycling.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 54674657 Adaptive Filtering in Subbands for Supervised Source Separation
Authors: Bruna Luisa Ramos Prado Vasques, Mariane Rembold Petraglia, Antonio Petraglia
Abstract:
This paper investigates MIMO (Multiple-Input Multiple-Output) adaptive filtering techniques for the application of supervised source separation in the context of convolutive mixtures. From the observation that there is correlation among the signals of the different mixtures, an improvement in the NSAF (Normalized Subband Adaptive Filter) algorithm is proposed in order to accelerate its convergence rate. Simulation results with mixtures of speech signals in reverberant environments show the superior performance of the proposed algorithm with respect to the performances of the NLMS (Normalized Least-Mean-Square) and conventional NSAF, considering both the convergence speed and SIR (Signal-to-Interference Ratio) after convergence.Keywords: Adaptive filtering, multirate processing, normalized subband adaptive filter, source separation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 9694656 Secure Proxy Signature Based on Factoring and Discrete Logarithm
Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi
Abstract:
A digital signature is an electronic signature form used by an original signer to sign a specific document. When the original signer is not in his office or when he/she travels outside, he/she delegates his signing capability to a proxy signer and then the proxy signer generates a signing message on behalf of the original signer. The two parties must be able to authenticate one another and agree on a secret encryption key, in order to communicate securely over an unreliable public network. Authenticated key agreement protocols have an important role in building a secure communications network between the two parties. In this paper, we present a secure proxy signature scheme over an efficient and secure authenticated key agreement protocol based on factoring and discrete logarithm problem.
Keywords: Discrete logarithm, factoring, proxy signature, key agreement.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 12164655 Modeling Erosion Control in Oil Production Wells
Authors: Kenneth I.Eshiet, Yong Sheng
Abstract:
The sand production problem has led researchers into making various attempts to understand the phenomenon. The generally accepted concept is that the occurrence of sanding is due to the in-situ stress conditions and the induced changes in stress that results in the failure of the reservoir sandstone during hydrocarbon production from wellbores. By using a hypothetical cased (perforated) well, an approach to the problem is presented here by using Finite Element numerical modelling techniques. In addition to the examination of the erosion problem, the influence of certain key parameters is studied in order to ascertain their effect on the failure and subsequent erosion process. The major variables investigated include: drawdown, perforation depth, and the erosion criterion. Also included is the determination of the optimal mud pressure for given operational and reservoir conditions. The improved understanding between parameters enables the choice of optimal values to minimize sanding during oil production.
Keywords: Equivalent Plastic Strain, Erosion, Hydrocarbon Production.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14784654 A Study of Relationship between Mountaineering Participation Motivation and Risk Perception
Authors: Yen-Chieh Wen, Ching-Hui Lin
Abstract:
The main purpose of this study is to analyze climbers involved in motivation and risk perception and analysis of the predictive ability of the risk perception "mountaineering" involved in motivation. This study used questionnaires, to have to climb the 3000m high mountain in Taiwan climbers object to carry out an investigation in order to non-random sampling, a total of 231 valid questionnaires were. After statistical analysis, the study found that: 1. Climbers the highest climbers involved in motivation "to enjoy the natural beauty of the fun. 2 climbers for climbers "risk perception" the highest: the natural environment of risk. 3. Climbers “seeking adventure stimulate", “competence achievement" motivation highly predictive of risk perception. Based on these findings, this study not only practices the recommendations of the outdoor leisure industry, and also related research proposals for future researchers.Keywords: Mountaineering, motivation, risk perception, decision-making.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 28684653 Design and Implementation a New Energy Efficient Clustering Algorithm using Genetic Algorithm for Wireless Sensor Networks
Authors: Moslem Afrashteh Mehr
Abstract:
Wireless Sensor Networks consist of small battery powered devices with limited energy resources. once deployed, the small sensor nodes are usually inaccessible to the user, and thus replacement of the energy source is not feasible. Hence, One of the most important issues that needs to be enhanced in order to improve the life span of the network is energy efficiency. to overcome this demerit many research have been done. The clustering is the one of the representative approaches. in the clustering, the cluster heads gather data from nodes and sending them to the base station. In this paper, we introduce a dynamic clustering algorithm using genetic algorithm. This algorithm takes different parameters into consideration to increase the network lifetime. To prove efficiency of proposed algorithm, we simulated the proposed algorithm compared with LEACH algorithm using the matlabKeywords: Wireless Sensor Networks, Clustering, Geneticalgorithm, Energy Consumption
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 28884652 Computer-aided Sequence Planning of Shearing Operations in Progressive Dies
Authors: Alan C. Lin, Dean K. Sheu
Abstract:
This paper aims to study the methodology of building the knowledge of planning adequate punches in order to complete the task of strip layout for shearing processes, using progressive dies. The proposed methodology uses die design rules and characteristics of different types of punches to classify them into five groups: prior use (the punches must be used first), posterior use (must be used last), compatible use (may be used together), sequential use (certain punches must precede some others) and simultaneous use (must be used together). With these five groups of punches, the searching space of feasible designs will be greatly reduced, and superimposition becomes a more effective method of punch layout. The superimposition scheme will generate many feasible solutions, an evaluation function based on number of stages, moment balancing and strip stability is developed for helping designers to find better solutions.
Keywords: Manufacturing systems, advances in metal forming, computer-aided design, progressive die.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 21974651 The Measurement of Endogenous Higher-Order Formative Composite Variables in PLS-SEM: An Empirical Application from CRM System Development
Authors: Samppa Suoniemi, Harri Terho, Rami Olkkonen
Abstract:
In recent methodological articles related to structural equation modeling (SEM), the question of how to measure endogenous formative variables has been raised as an urgent, unresolved issue. This research presents an empirical application from the CRM system development context to test a recently developed technique, which makes it possible to measure endogenous formative constructs in structural models. PLS path modeling is used to demonstrate the feasibility of measuring antecedent relationships at the formative indicator level, not the formative construct level. Empirical results show that this technique is a promising approach to measure antecedent relationships of formative constructs in SEM.
Keywords: CRM system development, formative measures, PLS path modeling, research methodology.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 22714650 Application of the Neural Network to the Synthesis of Vertical Dipole Antenna over Imperfect Ground
Authors: Kais Hafsaoui
Abstract:
In this paper, we propose to study the synthesis of the vertical dipole antenna over imperfect ground. The synthesis implementation-s method for this type of antenna permits to approach the appropriated radiance-s diagram. The used approach is based on neural network. Our main contribution in this paper is the extension of a synthesis model of this vertical dipole antenna over imperfect ground.Keywords: Vertical dipole antenna, imperfect ground, neural network.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 12124649 Effect of Information System Strategies on Supply Chain Strategies and Supply Chain Performance
Authors: M. Torabizadeh, M. Khatami Rad, A. Noshadi
Abstract:
In order to achieve competitive advantage and better performance of firm, supply chain management (SCM) strategy should support and drive forward business strategy. It means that supply chain should be aligned with business strategy, at the same time supply chain (SC) managers need to use appropriate information system (IS) solution to support their strategy, which would lead to stay competitive. There are different kinds of IS strategies which enable managers to meet the SC requirement by selecting the best IS strategy. Therefore, it is important to align IS strategies and practices with SC strategies and practices, which could help us to plan for an IS application that supports and enhances a SCMS. In this study, aligning IS with SC in strategy level is considered. The main aim of this paper is to align the various IS strategies with SCM strategies and demonstrate their impact on SC and firm performance.Keywords: Information system strategy, alignment, firm performance, supply chain strategy.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1851