Search results for: prophylactic of professional destruction techniques.
2127 Organizational Socialization Levels in Nurses
Authors: M. Aslan, A. Karaaslan, S. Selcuk
Abstract:
The research was conducted in order to determine the organizational socialization levels of nurses working in hospitals in the form of a descriptive study. The research population was composed of nurses employed in public and private sector hospitals in the province of Konya with 0-3 years of professional experience in the hospitals (N=1200); and the sample was composed of 495 nurses that accepted to take part in the study voluntarily. Statistical evaluation of data was conducted in SPSS.16 software. The results of the study revealed that the total score taken by nurses at the organizational socialization scale was 262.95; and this was close to the maximum score. Particularly the departmental socialization sub-dimension proved to be higher in comparison to the other two dimensions (organization socialization and task socialization). Statistically meaningful differences were found in the levels of organization socialization in relation to the status of organizational orientation training, level of education and age group.Keywords: Nurses, Newcomers, Organizational Socialization.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17502126 Automated Optic Disc Detection in Retinal Images of Patients with Diabetic Retinopathy and Risk of Macular Edema
Authors: Arturo Aquino, Manuel Emilio Gegundez, Diego Marin
Abstract:
In this paper, a new automated methodology to detect the optic disc (OD) automatically in retinal images from patients with risk of being affected by Diabetic Retinopathy (DR) and Macular Edema (ME) is presented. The detection procedure comprises two independent methodologies. On one hand, a location methodology obtains a pixel that belongs to the OD using image contrast analysis and structure filtering techniques and, on the other hand, a boundary segmentation methodology estimates a circular approximation of the OD boundary by applying mathematical morphology, edge detection techniques and the Circular Hough Transform. The methodologies were tested on a set of 1200 images composed of 229 retinographies from patients affected by DR with risk of ME, 431 with DR and no risk of ME and 540 images of healthy retinas. The location methodology obtained 98.83% success rate, whereas the OD boundary segmentation methodology obtained good circular OD boundary approximation in 94.58% of cases. The average computational time measured over the total set was 1.67 seconds for OD location and 5.78 seconds for OD boundary segmentation.
Keywords: Diabetic retinopathy, macular edema, optic disc, automated detection, automated segmentation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 27992125 Modeling Oxygen-transfer by Multiple Plunging Jets using Support Vector Machines and Gaussian Process Regression Techniques
Authors: Surinder Deswal
Abstract:
The paper investigates the potential of support vector machines and Gaussian process based regression approaches to model the oxygen–transfer capacity from experimental data of multiple plunging jets oxygenation systems. The results suggest the utility of both the modeling techniques in the prediction of the overall volumetric oxygen transfer coefficient (KLa) from operational parameters of multiple plunging jets oxygenation system. The correlation coefficient root mean square error and coefficient of determination values of 0.971, 0.002 and 0.945 respectively were achieved by support vector machine in comparison to values of 0.960, 0.002 and 0.920 respectively achieved by Gaussian process regression. Further, the performances of both these regression approaches in predicting the overall volumetric oxygen transfer coefficient was compared with the empirical relationship for multiple plunging jets. A comparison of results suggests that support vector machines approach works well in comparison to both empirical relationship and Gaussian process approaches, and could successfully be employed in modeling oxygen-transfer.Keywords: Oxygen-transfer, multiple plunging jets, support vector machines, Gaussian process.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16452124 Co-Disposal of Coal Ash with Mine Tailings in Surface Paste Disposal Practices: A Gold Mining Case Study
Authors: M. L. Dinis, M. C. Vila, A. Fiúza, A. Futuro, C. Nunes
Abstract:
The present paper describes the study of paste tailings prepared in laboratory using gold tailings, produced in a Finnish gold mine with the incorporation of coal ash. Natural leaching tests were conducted with the original materials (tailings, fly and bottom ashes) and also with paste mixtures that were prepared with different percentages of tailings and ashes. After leaching, the solid wastes were physically and chemically characterized and the results were compared to those selected as blank – the unleached samples. The tailings and the coal ash, as well as the prepared mixtures, were characterized, in addition to the textural parameters, by the following measurements: grain size distribution, chemical composition and pH. Mixtures were also tested in order to characterize their mechanical behavior by measuring the flexural strength, the compressive strength and the consistency. The original tailing samples presented an alkaline pH because during their processing they were previously submitted to pressure oxidation with destruction of the sulfides. Therefore, it was not possible to ascertain the effect of the coal ashes in the acid mine drainage. However, it was possible to verify that the paste reactivity was affected mostly by the bottom ash and that the tailings blended with bottom ash present lower mechanical strength than when blended with a combination of fly and bottom ash. Surface paste disposal offer an attractive alternative to traditional methods in addition to the environmental benefits of incorporating large-volume wastes (e.g. bottom ash). However, a comprehensive characterization of the paste mixtures is crucial to optimize paste design in order to enhance engineer and environmental properties.Keywords: Coal ash, gold tailings, paste, surface disposal.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14502123 Normal and Peaberry Coffee Beans Classification from Green Coffee Bean Images Using Convolutional Neural Networks and Support Vector Machine
Authors: Hira Lal Gope, Hidekazu Fukai
Abstract:
The aim of this study is to develop a system which can identify and sort peaberries automatically at low cost for coffee producers in developing countries. In this paper, the focus is on the classification of peaberries and normal coffee beans using image processing and machine learning techniques. The peaberry is not bad and not a normal bean. The peaberry is born in an only single seed, relatively round seed from a coffee cherry instead of the usual flat-sided pair of beans. It has another value and flavor. To make the taste of the coffee better, it is necessary to separate the peaberry and normal bean before green coffee beans roasting. Otherwise, the taste of total beans will be mixed, and it will be bad. In roaster procedure time, all the beans shape, size, and weight must be unique; otherwise, the larger bean will take more time for roasting inside. The peaberry has a different size and different shape even though they have the same weight as normal beans. The peaberry roasts slower than other normal beans. Therefore, neither technique provides a good option to select the peaberries. Defect beans, e.g., sour, broken, black, and fade bean, are easy to check and pick up manually by hand. On the other hand, the peaberry pick up is very difficult even for trained specialists because the shape and color of the peaberry are similar to normal beans. In this study, we use image processing and machine learning techniques to discriminate the normal and peaberry bean as a part of the sorting system. As the first step, we applied Deep Convolutional Neural Networks (CNN) and Support Vector Machine (SVM) as machine learning techniques to discriminate the peaberry and normal bean. As a result, better performance was obtained with CNN than with SVM for the discrimination of the peaberry. The trained artificial neural network with high performance CPU and GPU in this work will be simply installed into the inexpensive and low in calculation Raspberry Pi system. We assume that this system will be used in under developed countries. The study evaluates and compares the feasibility of the methods in terms of accuracy of classification and processing speed.
Keywords: Convolutional neural networks, coffee bean, peaberry, sorting, support vector machine.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15622122 Harnessing the Power of AI: Transforming DevSecOps for Enhanced Cloud Security
Authors: Ashly Joseph, Jithu Paulose
Abstract:
The increased usage of cloud computing has revolutionized the IT landscape, but it has also raised new security concerns. DevSecOps emerged as a way for tackling these difficulties by integrating security into the software development process. However, the rising complexity and sophistication of cyber threats need more advanced solutions. This paper looks into the usage of artificial intelligence (AI) techniques in the DevSecOps framework to increase cloud security. This study uses quantitative and qualitative techniques to assess the usefulness of AI approaches such as machine learning, natural language processing, and deep learning in reducing security issues. This paper thoroughly examines the symbiotic relationship between AI and DevSecOps, concentrating on how AI may be seamlessly integrated into the continuous integration and continuous delivery (CI/CD) pipeline, automated security testing, and real-time monitoring methods. The findings emphasize AI's huge potential to improve threat detection, risk assessment, and incident response skills. Furthermore, the paper examines the implications and challenges of using AI in DevSecOps workflows, considering factors like as scalability, interpretability, and adaptability. This paper adds to a better understanding of AI's revolutionary role in cloud security and provides valuable insights for practitioners and scholars in the field.
Keywords: Cloud Security, DevSecOps, Artificial Intelligence, AI, Machine Learning, Natural Language Processing, NLP, cybersecurity, AI-driven Security.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1602121 Robust Digital Cinema Watermarking
Authors: Sadi Vural, Hiromi Tomii, Hironori Yamauchi
Abstract:
With the advent of digital cinema and digital broadcasting, copyright protection of video data has been one of the most important issues. We present a novel method of watermarking for video image data based on the hardware and digital wavelet transform techniques and name it as “traceable watermarking" because the watermarked data is constructed before the transmission process and traced after it has been received by an authorized user. In our method, we embed the watermark to the lowest part of each image frame in decoded video by using a hardware LSI. Digital Cinema is an important application for traceable watermarking since digital cinema system makes use of watermarking technology during content encoding, encryption, transmission, decoding and all the intermediate process to be done in digital cinema systems. The watermark is embedded into the randomly selected movie frames using hash functions. Embedded watermark information can be extracted from the decoded video data. For that, there is no need to access original movie data. Our experimental results show that proposed traceable watermarking method for digital cinema system is much better than the convenient watermarking techniques in terms of robustness, image quality, speed, simplicity and robust structure.Keywords: Decoder, Digital content, JPEG2000 Frame, System-On-Chip, traceable watermark, Hash Function, CRC-32.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16562120 Core Competence Development while Carrying out Organizational Changes
Authors: Olga A. Shvetsova
Abstract:
The paper contains the different issues of competence management in industrial companies. The theoretical bases of human resources management and practical issues of innovative enterprises’ competitiveness are considered. The research is focused on the modern industrial enterprise changes management problems; it focuses on the effective personnel management of industrial enterprises on the basis of competence approach. The influence of organizational changes on the competence development is discussed. The need for development of the new technologies is mentioned, proposal is based on competence-based approach in personnel management including in the conditions of carrying out organizational changes; methods of acquisition and development of missing key professional competences are discussed; importance of key competencies in forming competitive advantage of the organization is mentioned.Keywords: Competence model, development of industrial company, organizational changes, competitiveness, core competencies.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 8952119 In-situ Chemical Oxidation of Residual TCE by Permanganate in Epikarst
Authors: Nihat Hakan Akyol, Irfan Yolcubal
Abstract:
In-situ chemical oxidation (ISCO) has been widely used for source zone remediation of Dense Nonaqueous Phase Liquids (DNAPLs) in subsurface environments. DNAPL source zones for karst aquifers are generally located in epikarst where the DNAPL mass is trapped either in karst soil or at the regolith contact with carbonate bedrock. This study aims to investigate the performance of oxidation of residual trichloroethylene found in such environments by potassium permanganate. Batch and flow cell experiments were conducted to determine the kinetics and the mass removal rate of TCE. pH change, Cl production, TCE and MnO4 destruction were monitored routinely during experiments. Nonreactive tracer tests were also conducted prior and after the oxidation process to determine the influence of oxidation on flow conditions. The results show that oxidant consumption rate of the calcareous epikarst soil was significant and the oxidant demand was determined to be 20 g KMnO4/kg soil. Oxidation rate of residual TCE (1.26x10-3 s-1) was faster than the oxidant consumption rate of the soil (2.54 - 2.92x10-4 s-1) at only high oxidant concentrations (> 40 mM KMnO4). Half life of TCE oxidation ranged from 7.9 to 10.7 min. Although highly significant fraction of residual TCE mass in the system was destroyed by permanganate oxidation, TCE concentration in the effluent remained above its MCL. Flow interruption tests indicate that efficiency of ISCO was limited by the rate of TCE dissolution and the rate-limited desorption of TCE. The residence time and the initial concentration of the oxidant in the source zone also controlled the efficiency of ISCO in epikarst.Keywords: Epikarst, in-situ chemical oxidation, permanganate.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 20332118 Gender Differences in Research Output, Funding and Collaboration
Authors: Ashkan Ebadi, Andrea Schiffauerova
Abstract:
In spite of the global efforts toward gender equality, female researchers are still underrepresented in professional scientific activities. The gender gap is more seen in engineering and math-intensive technological scientific fields thus calling for a specific attention. This paper focuses on the Canadian funded researchers who are active in natural sciences and engineering, and analyses the gender aspects of researchers’ performance, their scientific collaboration patterns as well as their share of the federal funding within the period of 2000 to 2010. Our results confirm the existence of gender disparity among the examined Canadian researchers. Although it was observed that male researchers have been performing better in terms of number of publications, the impact of the research was almost the same for both genders. In addition, it was observed that research funding is more biased towards male researchers and they have more control over their scientific community as well.
Keywords: Bibliometrics, collaboration, funding, gender differences, research output.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15562117 Between Kenzo Tange and Fernando Távora: An ‘Affinitarian’ Architectural Regard
Authors: João Cepeda
Abstract:
In crafting their way between theory and practice, authors and artists seem to be always immersed in a never-ending process of relating epochs, objects and images. Endless ‘affinities’ emerge, from a somewhat unexplainable (and intimate) magnetic relation. It is through this ‘warburgian’ assessment that two of the most prominent twentieth century modern architects from Japan and Portugal are put into perspective in this paper, focusing on their paths and thinking-practice, and on the research of their personal and professional archives. Moreover, this research especially aims its focus at essaying specifically on the possible ‘affinities’ between two of their most renowned architectural projects: the Kenzo Tange’s (demolished) Villa Seijo project in Tokyo (Japan), and Fernando Távora’s Tennis Pavilion design in Matosinhos (Portugal), respectively, side-by-side – through in-depth fieldwork in the sites, bibliographical and archival research, (unprecedented) material analysis, and a final critical consideration.
Keywords: Tange, Távora, architecture, affinities.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1162116 The Design of Safe Spaces in Healthcare Facilities Vulnerable to Tornado Impact in Central US
Authors: Lucy Ampaw-Asiedu, Terri R. Norton
Abstract:
In the wake of recent disasters happening around the world such as earthquake in Italy (January, 2017); hurricanes in the United States (US) (September 2016 and September 2017); and compounding disasters in Haiti (September 2010 and September 2016); to our best knowledge, never has the world seen the need to work on preemptive rather than reactionary measures to salvage this situation than now. Tornadoes are natural hazards that mostly affect mid-western and central states in the US. Tornadoes, like all natural hazards such as hurricanes, earthquakes, floods and others, are very destructive and result in massive destruction to homes, cause billions of dollars in damage and claims many lives. Healthcare facilities in general are vulnerable to disasters, and therefore, the safety of patients, health workers and those who come in to seek shelter should be a priority. The focus of this study is to assess disaster management measures instituted by healthcare facilities. Thus, the sole aim of the study is to examine the vulnerabilities and the design of safe spaces in healthcare facilities in Central US. Objectives that guide the study are to primarily identify the impacts of tornadoes in hospitals and to assess the structural design or specifications of safe spaces. St. John’s Regional Medical Center, now Mercy Hospital in Joplin, is used as a case study. Preliminary results show that the lateral base shear of the proposed design to be 684.24 ton (1508.49kip) for the safe space. Findings from this work will be used to make recommendations about the design of safe spaces for health care facilities in Central US.
Keywords: Disaster management, safe spaces, structural design, tornado, vulnerability.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 11342115 Resilient Machine Learning in the Nuclear Industry: Crack Detection as a Case Study
Authors: Anita Khadka, Gregory Epiphaniou, Carsten Maple
Abstract:
There is a dramatic surge in the adoption of Machine Learning (ML) techniques in many areas, including the nuclear industry (such as fault diagnosis and fuel management in nuclear power plants), autonomous systems (including self-driving vehicles), space systems (space debris recovery, for example), medical surgery, network intrusion detection, malware detection, to name a few. Artificial Intelligence (AI) has become a part of everyday modern human life. To date, the predominant focus has been developing underpinning ML algorithms that can improve accuracy, while factors such as resiliency and robustness of algorithms have been largely overlooked. If an adversarial attack is able to compromise the learning method or data, the consequences can be fatal, especially but not exclusively in safety-critical applications. In this paper, we present an in-depth analysis of five adversarial attacks and two defence methods on a crack detection ML model. Our analysis shows that it can be dangerous to adopt ML techniques without rigorous testing, since they may be vulnerable to adversarial attacks, especially in security-critical areas such as the nuclear industry. We observed that while the adopted defence methods can effectively defend against different attacks, none of them could protect against all five adversarial attacks entirely.
Keywords: Resilient Machine Learning, attacks, defences, nuclear industry, crack detection.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 5152114 A Comprehensive Survey on Machine Learning Techniques and User Authentication Approaches for Credit Card Fraud Detection
Authors: Niloofar Yousefi, Marie Alaghband, Ivan Garibay
Abstract:
With the increase of credit card usage, the volume of credit card misuse also has significantly increased, which may cause appreciable financial losses for both credit card holders and financial organizations issuing credit cards. As a result, financial organizations are working hard on developing and deploying credit card fraud detection methods, in order to adapt to ever-evolving, increasingly sophisticated defrauding strategies and identifying illicit transactions as quickly as possible to protect themselves and their customers. Compounding on the complex nature of such adverse strategies, credit card fraudulent activities are rare events compared to the number of legitimate transactions. Hence, the challenge to develop fraud detection that are accurate and efficient is substantially intensified and, as a consequence, credit card fraud detection has lately become a very active area of research. In this work, we provide a survey of current techniques most relevant to the problem of credit card fraud detection. We carry out our survey in two main parts. In the first part, we focus on studies utilizing classical machine learning models, which mostly employ traditional transnational features to make fraud predictions. These models typically rely on some static physical characteristics, such as what the user knows (knowledge-based method), or what he/she has access to (object-based method). In the second part of our survey, we review more advanced techniques of user authentication, which use behavioral biometrics to identify an individual based on his/her unique behavior while he/she is interacting with his/her electronic devices. These approaches rely on how people behave (instead of what they do), which cannot be easily forged. By providing an overview of current approaches and the results reported in the literature, this survey aims to drive the future research agenda for the community in order to develop more accurate, reliable and scalable models of credit card fraud detection.
Keywords: credit card fraud detection, user authentication, behavioral biometrics, machine learning, literature survey
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 5582113 Application of Computational Intelligence Techniques for Economic Load Dispatch
Authors: S.C. Swain, S. Panda, A.K. Mohanty, C. Ardil
Abstract:
This paper presents the applications of computational intelligence techniques to economic load dispatch problems. The fuel cost equation of a thermal plant is generally expressed as continuous quadratic equation. In real situations the fuel cost equations can be discontinuous. In view of the above, both continuous and discontinuous fuel cost equations are considered in the present paper. First, genetic algorithm optimization technique is applied to a 6- generator 26-bus test system having continuous fuel cost equations. Results are compared to conventional quadratic programming method to show the superiority of the proposed computational intelligence technique. Further, a 10-generator system each with three fuel options distributed in three areas is considered and particle swarm optimization algorithm is employed to minimize the cost of generation. To show the superiority of the proposed approach, the results are compared with other published methods.
Keywords: Economic Load Dispatch, Continuous Fuel Cost, Quadratic Programming, Real-Coded Genetic Algorithm, Discontinuous Fuel Cost, Particle Swarm Optimization.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 22812112 Personality of Military Professionals (Commanders) and Their Way of Leading and Commanding Today and in Historical Context
Authors: Petra Hurbišová, Monika Davidová
Abstract:
The article deals with the personality of military professionals (commanders) and their way of leading and commanding today and in historical context. The first part focuses on the leadership skills of Alexander the Great, who introduced strategic innovations and even from today's perspective; he excelled in efficient work with people. This paper focuses on the way which he achieved his goals. Further attention is paid to approaches to commander´s personality by other great generals. The paper is also focused on personality traits of military professionals necessary for successful management and leadership in today's variable and challenging environment. Finally, attention is paid to the effective and ineffective ways of behavior of commanders and determining what styles of leadership is appropriate for a given situation, whether in peacetime or on deployment.Keywords: Authority, commander, leader, leadership, military professional, personality.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 23242111 Managing, Sustaining, and Future Proofing the Business of Educational Provision Following Large-Scale Disaster and Disruption
Authors: Judy Yarwood, Lesley Seaton, Philippa Seaton
Abstract:
A catastrophic earthquake measuring 6.3 on the Richter scale struck the Christchurch, New Zealand Central Business District on February 22, 2012, abruptly disrupting the business of teaching and learning at Christchurch Polytechnic Institute of Technology. This paper presents the findings from a study undertaken about the complexity of delivering an educational programme in the face of this traumatic natural event. Nine interconnected themes emerged from this multiple method study: communication, decision making, leader- and follower-ship, balancing personal and professional responsibilities, taking action, preparedness and thinking ahead, all within a disruptive and uncertain context. Sustainable responses that maximise business continuity, and provide solutions to practical challenges, are among the study-s recommendations.Keywords: Business continuity, earthquake, education, sustainability
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 19062110 From Industry 4.0 to Agriculture 4.0: A Framework to Manage Product Data in Agri-Food Supply Chain for Voluntary Traceability
Authors: Angelo Corallo, Maria Elena Latino, Marta Menegoli
Abstract:
Agri-food value chain involves various stakeholders with different roles. All of them abide by national and international rules and leverage marketing strategies to advance their products. Food products and related processing phases carry with it a big mole of data that are often not used to inform final customer. Some data, if fittingly identified and used, can enhance the single company, and/or the all supply chain creates a math between marketing techniques and voluntary traceability strategies. Moreover, as of late, the world has seen buying-models’ modification: customer is careful on wellbeing and food quality. Food citizenship and food democracy was born, leveraging on transparency, sustainability and food information needs. Internet of Things (IoT) and Analytics, some of the innovative technologies of Industry 4.0, have a significant impact on market and will act as a main thrust towards a genuine ‘4.0 change’ for agriculture. But, realizing a traceability system is not simple because of the complexity of agri-food supply chain, a lot of actors involved, different business models, environmental variations impacting products and/or processes, and extraordinary climate changes. In order to give support to the company involved in a traceability path, starting from business model analysis and related business process a Framework to Manage Product Data in Agri-Food Supply Chain for Voluntary Traceability was conceived. Studying each process task and leveraging on modeling techniques lead to individuate information held by different actors during agri-food supply chain. IoT technologies for data collection and Analytics techniques for data processing supply information useful to increase the efficiency intra-company and competitiveness in the market. The whole information recovered can be shown through IT solutions and mobile application to made accessible to the company, the entire supply chain and the consumer with the view to guaranteeing transparency and quality.
Keywords: Agriculture 4.0, agri-food supply chain, Industry 4.0, voluntary traceability.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 23592109 Intelligent Video-Based Monitoring of Freeway Traffic
Authors: Saad M. Al-Garni, Adel A. Abdennour
Abstract:
Freeways are originally designed to provide high mobility to road users. However, the increase in population and vehicle numbers has led to increasing congestions around the world. Daily recurrent congestion substantially reduces the freeway capacity when it is most needed. Building new highways and expanding the existing ones is an expensive solution and impractical in many situations. Intelligent and vision-based techniques can, however, be efficient tools in monitoring highways and increasing the capacity of the existing infrastructures. The crucial step for highway monitoring is vehicle detection. In this paper, we propose one of such techniques. The approach is based on artificial neural networks (ANN) for vehicles detection and counting. The detection process uses the freeway video images and starts by automatically extracting the image background from the successive video frames. Once the background is identified, subsequent frames are used to detect moving objects through image subtraction. The result is segmented using Sobel operator for edge detection. The ANN is, then, used in the detection and counting phase. Applying this technique to the busiest freeway in Riyadh (King Fahd Road) achieved higher than 98% detection accuracy despite the light intensity changes, the occlusion situations, and shadows.Keywords: Background Extraction, Neural Networks, VehicleDetection, Freeway Traffic.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 19212108 Value Engineering and Its Effect in Reduction of Industrial Organization Energy Expenses
Authors: Habibollah Najafi, Amir Abbas Yazdani, Hosseinali Nahavandi
Abstract:
The review performed on the condition of energy consumption & rate in Iran, shows that unfortunately the subject of optimization and conservation of energy in active industries of country lacks a practical & effective method and in most factories, the energy consumption and rate is more than in similar industries of industrial countries. The increasing demand of electrical energy and the overheads which it imposes on the organization, forces companies to search for suitable approaches to optimize energy consumption and demand management. Application of value engineering techniques is among these approaches. Value engineering is considered a powerful tool for improving profitability. These tools are used for reduction of expenses, increasing profits, quality improvement, increasing market share, performing works in shorter durations, more efficient utilization of sources & etc. In this article, we shall review the subject of value engineering and its capabilities for creating effective transformations in industrial organizations, in order to reduce energy costs & the results have been investigated and described during a case study in Mazandaran wood and paper industries, the biggest consumer of energy in north of Iran, for the purpose of presenting the effects of performed tasks in optimization of energy consumption by utilizing value engineering techniques in one case study.Keywords: Value Engineering (VE), Expense, Energy, Industrial
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 22762107 Role of Inflammatory Markers in Arthritic Rats Treated with Ethanolic Bark Extract of Albizia procera
Authors: M. Sangeetha, D. Chamundeeswari, C. Saravanababu, C. Rose, V. Gopal
Abstract:
Rheumatoid arthritis (RA) is a chronic, progressive, systemic inflammatory disorder affecting the synovial joints and typically producing symmetrical arthritis that leads to joint destruction, which is responsible for the deformity and disability. Despite improvements in the treatment of RA over the past decade, there still is a need for new therapeutic agents that are efficacious, less expensive, and free of severe adverse reactions. The present study aimed to investigate role of inflammatory markers in arthritic rats treated with ethanolic bark extract of Albizia procera. The protective effect of ethanolic bark extract of Albizia procera against complete Freund’s adjuvant (CFA) induced arthritis in rats. Arthritis was induced by an intradermal injection of 0.1 ml FCA in the foot pad of left hind limb of rats. ETBE (100 and 200 mg/kg b.wt./p.o) and the reference drug diclofenac (25 mg/kg b.wt./p.o) were administered to arthritic rats. Paw volume was measured for all the animals before inducing arthritis and thereafter once in seven days by using plethysmometer for 42 days. Gene expression of inflammatory markers such as IL-1β and IL-10 were investigated in paw tissues. Up regulation of IL-1β and Down regulation IL-10 were observed in CFA injected rats when compared to normal rats. ETBE attenuated these alterations dose dependently when compared to the vehicle treated rats. These results provide insights into the mechanism of anti-arthritic activity, and unravel potential therapeutic use of Albizia procera in arthritis.
Keywords: CFA-Complete Freund’s adjuvant, ETBE, Ethanolic Bark Extract, IL- Interleukins, RA-Rheumatoid Arthritis.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14362106 Futuristic Black Box Design Considerations and Global Networking for Real Time Monitoring of Flight Performance Parameters
Authors: K. Parandhama Gowd
Abstract:
The aim of this research paper is to conceptualize, discuss, analyze and propose alternate design methodologies for futuristic Black Box for flight safety. The proposal also includes global networking concepts for real time surveillance and monitoring of flight performance parameters including GPS parameters. It is expected that this proposal will serve as a failsafe real time diagnostic tool for accident investigation and location of debris in real time. In this paper, an attempt is made to improve the existing methods of flight data recording techniques and improve upon design considerations for futuristic FDR to overcome the trauma of not able to locate the block box. Since modern day communications and information technologies with large bandwidth are available coupled with faster computer processing techniques, the attempt made in this paper to develop a failsafe recording technique is feasible. Further data fusion/data warehousing technologies are available for exploitation.Keywords: Flight data recorder (FDR), black box, diagnostic tool, global networking, cockpit voice and data recorder (CVDR), air traffic control (ATC), air traffic, telemetry, tracking and control centers ATTTCC).
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14572105 Directed Approach and Resolution of Practical Cases as a Motivation Tool for Self-Learning and Cooperation
Authors: B. Montero, M. Rico, A. Ares, R. Bouza
Abstract:
The development of competences and practical capacities of students is getting an important incidence into the guidelines of the European Higher Education Area (EHEA). The methodology applied in this work is based on the education through directed resolution of practical cases. All cases are related to professional tasks that the students will have to develop in their future career. The method is intended to form the necessary competences of students of the Marine Engineering and Maritime Transport Degree in the matter of “Physics". The experience was applied in the course of 2011/2012. Students were grouped, and a practical task was assigned to them, that should be developed and solved within the team. The aim was to realize students learning by three ways: their own knowledge, the contribution of their teammates and the teacher's direction. The results of the evaluation were compared with those obtained previously by the traditional teaching method.Keywords: Cooperation, Marine Engineering, Self-learning skills.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 19082104 An Ontology for Smart Learning Environments in Music Education
Authors: Konstantinos Sofianos, Michail Stefanidakis
Abstract:
Nowadays, despite the great advances in technology, most educational frameworks lack a strong educational design basis. E-learning has become prevalent, but it faces various challenges such as student isolation and lack of quality in the learning process. An intelligent learning system provides a student with educational material according to their learning background and learning preferences. It records full information about the student, such as demographic information, learning styles, and academic performance. This information allows the system to be fully adapted to the student’s needs. In this paper, we propose a framework and an ontology for music education, consisting of the learner model and all elements of the learning process (learning objects, teaching methods, learning activities, assessment). This framework can be integrated into an intelligent learning system and used for music education in schools for the development of professional skills and beyond.
Keywords: Intelligent learning systems, e-learning, music education, ontology, semantic web.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4832103 Isospectral Hulthén Potential
Authors: Anil Kumar
Abstract:
Supersymmetric Quantum Mechanics is an interesting framework to analyze nonrelativistic quantal problems. Using these techniques, we construct a family of strictly isospectral Hulth´en potentials. Isospectral wave functions are generated and plotted for different values of the deformation parameter.
Keywords: Hulth´en potential, Isospectral Hamiltonian.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 35262102 3D Human Reconstruction over Cloud Based Image Data via AI and Machine Learning
Authors: Kaushik Sathupadi, Sandesh Achar
Abstract:
Human action recognition (HAR) modeling is a critical task in machine learning. These systems require better techniques for recognizing body parts and selecting optimal features based on vision sensors to identify complex action patterns efficiently. Still, there is a considerable gap and challenges between images and videos, such as brightness, motion variation, and random clutters. This paper proposes a robust approach for classifying human actions over cloud-based image data. First, we apply pre-processing and detection, human and outer shape detection techniques. Next, we extract valuable information in terms of cues. We extract two distinct features: fuzzy local binary patterns and sequence representation. Then, we applied a greedy, randomized adaptive search procedure for data optimization and dimension reduction, and for classification, we used a random forest. We tested our model on two benchmark datasets, AAMAZ and the KTH Multi-view Football datasets. Our HAR framework significantly outperforms the other state-of-the-art approaches and achieves a better recognition rate of 91% and 89.6% over the AAMAZ and KTH Multi-view Football datasets, respectively.
Keywords: Computer vision, human motion analysis, random forest, machine learning.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 622101 Academic Staff Perceptions of the Value of the Elements of an Online Learning Environment
Authors: Stuart Palmer, Dale Holt
Abstract:
Based on 276 responses from academic staff in an evaluation of an online learning environment (OLE), this paper identifies those elements of the OLE that were most used and valued by staff, those elements of the OLE that staff most wanted to see improved, and those factors that most contributed to staff perceptions that the use of the OLE enhanced their teaching. The most used and valued elements were core functions, including accessing unit information, accessing lecture/tutorial/lab notes, and reading online discussions. The elements identified as most needing attention related to online assessment: submitting assignments, managing assessment items, and receiving feedback on assignments. Staff felt that using the OLE enhanced their teaching when they were satisfied that their students were able to access and use their learning materials, and when they were satisfied with the professional development they received and were confident with their ability to teach with the OLE.Keywords: Academic staff, Distance education, Evaluation, Online learning environment.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16472100 Toward Delegated Democracy: Vote by Yourself, or Trust Your Network
Authors: Hiroshi Yamakawa, Michiko Yoshida, Motohiro Tsuchiya
Abstract:
The recent development of Information and Communication Technology (ICT) enables new ways of "democratic" decision-making such as a page-ranking system, which estimates the importance of a web page based on indirect trust on that page shared by diverse group of unorganized individuals. These kinds of "democracy" have not been acclaimed yet in the world of real politics. On the other hand, a large amount of data about personal relations including trust, norms of reciprocity, and networks of civic engagement has been accumulated in a computer-readable form by computer systems (e.g., social networking systems). We can use these relations as a new type of social capital to construct a new democratic decision-making system based on a delegation network. In this paper, we propose an effective decision-making support system, which is based on empowering someone's vote whom you trust. For this purpose, we propose two new techniques: the first is for estimating entire vote distribution from a small number of votes, and the second is for estimating active voter choice to promote voting using a delegation network. We show that these techniques could increase the voting ratio and credibility of the whole decision by agent-based simulations.
Keywords: Delegation, network centrality, social network, voting ratio.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17962099 Some Laws of Rhythm Formulas of Ussuli in the Dancing Culture of People in the Middle and the Central Asia
Authors: G. Saitova, A. Mashurova, F. Mashurova
Abstract:
In the national and professional music of oral tradition of many people in the East there is the metric formula called “ussuli", that is to say rhythmic constructions of different character and a composition. Ussuli in translation from Arabic means the law. The cultural contacts of the ancient and medieval inhabitants of the Central Asia, India, China, East Turkestan, Iraq, Afghanistan, Turkey, and Iran have played a certain role in formation of both musical and dancing heritage of each of these people. During theatrical shows many dances were performed under the accompaniment of percussion instruments as nagra, dayulpaz, doll. The abovementioned tools are used as the obligatory accompanying tool in an orchestra and at support of dancing acts as the solo tool. Dynamics of development of a dancing composition, at times execution of technique of movement depends on various combinations of ussuli and their receptions of execution.Keywords: Dancing, plastic, rhythm, ussuli.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 22212098 Comparative Analysis of Various Multiuser Detection Techniques in SDMA-OFDM System Over the Correlated MIMO Channel Model for IEEE 802.16n
Authors: Susmita Das, Kala Praveen Bagadi
Abstract:
SDMA (Space-Division Multiple Access) is a MIMO (Multiple-Input and Multiple-Output) based wireless communication network architecture which has the potential to significantly increase the spectral efficiency and the system performance. The maximum likelihood (ML) detection provides the optimal performance, but its complexity increases exponentially with the constellation size of modulation and number of users. The QR decomposition (QRD) MUD can be a substitute to ML detection due its low complexity and near optimal performance. The minimum mean-squared-error (MMSE) multiuser detection (MUD) minimises the mean square error (MSE), which may not give guarantee that the BER of the system is also minimum. But the minimum bit error rate (MBER) MUD performs better than the classic MMSE MUD in term of minimum probability of error by directly minimising the BER cost function. Also the MBER MUD is able to support more users than the number of receiving antennas, whereas the rest of MUDs fail in this scenario. In this paper the performance of various MUD techniques is verified for the correlated MIMO channel models based on IEEE 802.16n standard.Keywords: Multiple input multiple output, multiuser detection, orthogonal frequency division multiplexing, space division multiple access, Bit error rate
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1930