Search results for: X-ray techniques.
1266 An Enhanced Slicing Algorithm Using Nearest Distance Analysis for Layer Manufacturing
Authors: M. Vatani, A. R. Rahimi, F. Brazandeh, A. Sanati nezhad
Abstract:
Although the STL (stereo lithography) file format is widely used as a de facto industry standard in the rapid prototyping industry due to its simplicity and ability to tessellation of almost all surfaces, but there are always some defects and shortcoming in their usage, which many of them are difficult to correct manually. In processing the complex models, size of the file and its defects grow extremely, therefore, correcting STL files become difficult. In this paper through optimizing the exiting algorithms, size of the files and memory usage of computers to process them will be reduced. In spite of type and extent of the errors in STL files, the tail-to-head searching method and analysis of the nearest distance between tails and heads techniques were used. As a result STL models sliced rapidly, and fully closed contours produced effectively and errorless.Keywords: Layer manufacturing, STL files, slicing algorithm, nearest distance analysis.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 41571265 Unequal Error Protection for Region of Interest with Embedded Zerotree Wavelet
Abstract:
This paper describes a new method of unequal error protection (UEP) for region of interest (ROI) with embedded zerotree wavelet algorithm (EZW). ROI technique is important in applications with different parts of importance. In ROI coding, a chosen ROI is encoded with higher quality than the background (BG). Unequal error protection of image is provided by different coding techniques. In our proposed method, image is divided into two parts (ROI, BG) that consist of more important bytes (MIB) and less important bytes (LIB). The experimental results verify effectiveness of the design. The results of our method demonstrate the comparison of the unequal error protection (UEP) of image transmission with defined ROI and the equal error protection (EEP) over multiple noisy channels.Keywords: embedded zerotree wavelet (EZW), equal error protection (EEP), region of interest (ROI), RS code, unequal error protection (UEP)
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14691264 Modification and Characterization of Bacterial Cellulose Biopolymer as Proton Conducting Membrane
Abstract:
This study describes the preparation of a novel proton conducting membranes based on bacterial cellulose (BC) modified by grafting of 2-acrylamido-2-methyl-1 -propanesulfonic acid (AMPS) through UV-induced graft polymerization. These AMPS-g-BC membranes have been characterized by various techniques including FTIR, SEM and TGA, to find their successful grafting of AMPS on BC, surface morphology and thermal stability, respectively. Physical properties of AMPS-g-BC membranes have been assessed in terms of Lamda value( λ ), ion exchange capacity(IEC) and proton conductivity. The relationship between degree of grafting and AMPS concentration used for grafting has been determined by weight gain method. An optimum proton conductivity equal to 2.89x10-2 S cm-1 and IEC value equal to 1.79 mmol g-1 have been obtained when 20 wt% AMPS concentration is used for grafting (i.e. the corresponding membrane is notated as AMPS20-g-BC).Keywords: Bacterial cellulose, 2-acrylamido-2-methyl-1-propanesulfonic acid, Proton conducting membrane, Self diffusioncoefficient, Fuel cell
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 22651263 Stochastic Estimation of Cavity Flowfield
Authors: Yin Yin Pey, Leok Poh Chua, Wei Long Siauw
Abstract:
Linear stochastic estimation and quadratic stochastic estimation techniques were applied to estimate the entire velocity flow-field of an open cavity with a length to depth ratio of 2. The estimations were done through the use of instantaneous velocity magnitude as estimators. These measurements were obtained by Particle Image Velocimetry. The predicted flow was compared against the original flow-field in terms of the Reynolds stresses and turbulent kinetic energy. Quadratic stochastic estimation proved to be more superior than linear stochastic estimation in resolving the shear layer flow. When the velocity fluctuations were scaled up in the quadratic estimate, both the time-averaged quantities and the instantaneous cavity flow can be predicted to a rather accurate extent.Keywords: Open cavity, Particle Image Velocimetry, Stochastic estimation, Turbulent kinetic energy.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17111262 On the Analysis of Bandwidth Management for Hybrid Load Balancing Scheme in WLANs
Authors: Chutima Prommak, Airisa Jantaweetip
Abstract:
In wireless networks, bandwidth is scare resource and it is essential to utilize it effectively. This paper analyses effects of using different bandwidth management techniques on the network performances of the Wireless Local Area Networks (WLANs) that use hybrid load balancing scheme. In particular, we study three bandwidth management schemes, namely Complete Sharing (CS), Complete Partitioning (CP), and Partial Sharing (PS). Performances of these schemes are evaluated by simulation experiments in term of percentage of network association blocking. Our results show that the CS scheme can provide relatively low blocking percentage in various network traffic scenarios whereas the PS scheme can enhance quality of services of the multimedia traffic with rather small expenses on the blocking percentage of the best effort traffic.
Keywords: Bandwidth management, Load Balancing, WLANs.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14621261 On the Robust Stability of Homogeneous Perturbed Large-Scale Bilinear Systems with Time Delays and Constrained Inputs
Authors: Chien-Hua Lee, Cheng-Yi Chen
Abstract:
The stability test problem for homogeneous large-scale perturbed bilinear time-delay systems subjected to constrained inputs is considered in this paper. Both nonlinear uncertainties and interval systems are discussed. By utilizing the Lyapunove equation approach associated with linear algebraic techniques, several delay-independent criteria are presented to guarantee the robust stability of the overall systems. The main feature of the presented results is that although the Lyapunov stability theorem is used, they do not involve any Lyapunov equation which may be unsolvable. Furthermore, it is seen the proposed schemes can be applied to solve the stability analysis problem of large-scale time-delay systems.
Keywords: homogeneous bilinear system, constrained input, time-delay, uncertainty, transient response, decay rate.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16081260 Mobile Medical Operation Route Planning
Authors: K. Somprasonk, R. Boondiskulchok
Abstract:
Medical services are usually provided in hospitals; however, in developing country, some rural residences have fewer opportunities to access in healthcare services due to the limitation of transportation communication. Therefore, in Thailand, there are charitable organizations operating to provide medical treatments to these people by shifting the medical services to operation sites; this is commonly known as mobile medical service. Operation routing is important for the organization to reduce its transportation cost in order to focus more on other important activities; for instance, the development of medical apparatus. VRP is applied to solve the problem of high transportation cost of the studied organization with the searching techniques of saving algorithm to find the minimum total distance of operation route and satisfy available time constraints of voluntary medical staffs.
Keywords: Decision Support System, Mobile Medical Service Planning, Saving Algorithm, Vehicle Routing Problem
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16101259 Compression Study on Velvet and Termeh in Iranian Brocade
Authors: R. Moosazadeh
Abstract:
From ancient times, in some cultures, the way of choosing the colour and pattern of the fabric, and its decoration, represents a message about their beliefs, traditions and ethnical origins. Due to the diversity of clothing in the Middle East, two special types of Iranian fabrics have been investigated. The process of knitting with a weaving-loom is always accompanied by passing the fibres of the warp in different ways. This study presented the historical investigation of brocades and explanation about traditional Iranian brocades in terms of fabric, shape, and patterns. Moreover, the compression results between characteristics of Termeh and velvet have been reported. The aim of the study was to focus on the history of fabric texture in Iran and general information about brocades and Termeh fabrics in expressions of their historical traditions. In conclusion, it is attempted to introduce knitting techniques and designed models which have been presented for this traditional and expensive Iranian fabric.
Keywords: Texture, brocade, Termeh, Velvet Braid.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 7971258 Flagging Critical Components to Prevent Transient Faults in Real-Time Systems
Authors: Muhammad Sheikh Sadi, D. G. Myers, Cesar Ortega Sanchez
Abstract:
This paper proposes the use of metrics in design space exploration that highlight where in the structure of the model and at what point in the behaviour, prevention is needed against transient faults. Previous approaches to tackle transient faults focused on recovery after detection. Almost no research has been directed towards preventive measures. But in real-time systems, hard deadlines are performance requirements that absolutely must be met and a missed deadline constitutes an erroneous action and a possible system failure. This paper proposes the use of metrics to assess the system design to flag where transient faults may have significant impact. These tools then allow the design to be changed to minimize that impact, and they also flag where particular design techniques – such as coding of communications or memories – need to be applied in later stages of design.
Keywords: Criticality, Metrics, Real-Time Systems, Transient Faults.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 13401257 Identification of Wideband Sources Using Higher Order Statistics in Noisy Environment
Authors: S. Bourennane, A. Bendjama
Abstract:
This paper deals with the localization of the wideband sources. We develop a new approach for estimating the wide band sources parameters. This method is based on the high order statistics of the recorded data in order to eliminate the Gaussian components from the signals received on the various hydrophones.In fact the noise of sea bottom is regarded as being Gaussian. Thanks to the coherent signal subspace algorithm based on the cumulant matrix of the received data instead of the cross-spectral matrix the wideband correlated sources are perfectly located in the very noisy environment. We demonstrate the performance of the proposed algorithm on the real data recorded during an underwater acoustics experiments.
Keywords: Higher-order statistics, high resolution array processing techniques, localization of acoustics sources, wide band sources.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15971256 Influence of Thermal Annealing on The Structural Properties of Vanadyl Phthalocyanine Thin Films: A Comparative Study
Authors: Fakhra Aziz, K. Sulaiman, M. R. Muhammad, M. Hassan Sayyad, Kh. Karimov
Abstract:
This paper presents a comparative study on Vanadyl Phthalocyanine (VOPc) thin films deposited by thermal evaporation and spin coating techniques. The samples were prepared on cleaned glass substrates and annealed at various temperatures ranging form 95oC to 155oC. To obtain the morphological and structural properties of VOPc thin films, X-ray diffraction (XRD) technique and atomic force microscopy (AFM) have been implied. The AFM topographic images show a very slight difference in the thermally grown films, before and after annealing, however best results are achieved for the spin-cast film annealed at 125oC. The XRD spectra show no existence of the sharp peaks, suggesting the material to be amorphous. The humps in the XRD patterns indicate the presence of some crystallites.Keywords: Annealing, optical properties, thin films, Vanadylphthalocyanine.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 24351255 Segmentation of Images through Clustering to Extract Color Features: An Application forImage Retrieval
Authors: M. V. Sudhamani, C. R. Venugopal
Abstract:
This paper deals with the application for contentbased image retrieval to extract color feature from natural images stored in the image database by segmenting the image through clustering. We employ a class of nonparametric techniques in which the data points are regarded as samples from an unknown probability density. Explicit computation of the density is avoided by using the mean shift procedure, a robust clustering technique, which does not require prior knowledge of the number of clusters, and does not constrain the shape of the clusters. A non-parametric technique for the recovery of significant image features is presented and segmentation module is developed using the mean shift algorithm to segment each image. In these algorithms, the only user set parameter is the resolution of the analysis and either gray level or color images are accepted as inputs. Extensive experimental results illustrate excellent performance.Keywords: Segmentation, Clustering, Image Retrieval, Features.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14591254 Extended Low Power Bus Binding Combined with Data Sequence Reordering
Authors: Jihyung Kim, Taejin Kim, Sungho Park, Jun-Dong Cho
Abstract:
In this paper, we address the problem of reducing the switching activity (SA) in on-chip buses through the use of a bus binding technique in high-level synthesis. While many binding techniques to reduce the SA exist, we present yet another technique for further reducing the switching activity. Our proposed method combines bus binding and data sequence reordering to explore a wider solution space. The problem is formulated as a multiple traveling salesman problem and solved using simulated annealing technique. The experimental results revealed that a binding solution obtained with the proposed method reduces 5.6-27.2% (18.0% on average) and 2.6-12.7% (6.8% on average) of the switching activity when compared with conventional binding-only and hybrid binding-encoding methods, respectively.Keywords: low power, bus binding, switching activity, multiple traveling salesman problem, data sequence reordering
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 13321253 Cognitive Radio Networks (CRN): Resource Allocation Techniques Based On DNA-inspired Computing
Authors: Santosh Kumar Singh, Krishna Chandra Roy, Vibhakar Pathak
Abstract:
Spectrum is a scarce commodity, and considering the spectrum scarcity faced by the wireless-based service providers led to high congestion levels. Technical inefficiencies from pooled, since all networks share a common pool of channels, exhausting the available channels will force networks to block the services. Researchers found that cognitive radio (CR) technology may resolve the spectrum scarcity. A CR is a self-configuring entity in a wireless networking that senses its environment, tracks changes, and frequently exchanges information with their networks. However, CRN facing challenges and condition become worst while tracks changes i.e. reallocation of another under-utilized channels while primary network user arrives. In this paper, channels or resource reallocation technique based on DNA-inspired computing algorithm for CRN has been proposed.
Keywords: Ad hoc networks, channels reallocation, cognitive radio, DNA local sequence alignment.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17861252 Problem Solving Techniques with Extensive Computational Network and Applying in an Educational Software
Abstract:
Knowledge bases are basic components of expert systems or intelligent computational programs. Knowledge bases provide knowledge, events that serve deduction activity, computation and control. Therefore, researching and developing of models for knowledge representation play an important role in computer science, especially in Artificial Intelligence Science and intelligent educational software. In this paper, the extensive deduction computational model is proposed to design knowledge bases whose attributes are able to be real values or functional values. The system can also solve problems based on knowledge bases. Moreover, the models and algorithms are applied to produce the educational software for solving alternating current problems or solving set of equations automatically.Keywords: Educational software, artificial intelligence, knowledge base systems, knowledge representation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15931251 Color Image Enhancement Using Multiscale Retinex and Image Fusion Techniques
Authors: Chang-Hsing Lee, Cheng-Chang Lien, Chin-Chuan Han
Abstract:
In this paper, an edge-strength guided multiscale retinex (EGMSR) approach will be proposed for color image contrast enhancement. In EGMSR, the pixel-dependent weight associated with each pixel in the single scale retinex output image is computed according to the edge strength around this pixel in order to prevent from over-enhancing the noises contained in the smooth dark/bright regions. Further, by fusing together the enhanced results of EGMSR and adaptive multiscale retinex (AMSR), we can get a natural fused image having high contrast and proper tonal rendition. Experimental results on several low-contrast images have shown that our proposed approach can produce natural and appealing enhanced images.
Keywords: Image Enhancement, Multiscale Retinex, Image Fusion.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 27381250 Investigation of Interference Conditions in BFWA System Applying Adaptive TDD
Authors: Gábor Szládek, Balázs Héder, János Bitó
Abstract:
In a BFWA (Broadband Fixed Wireless Access Network) the evolved SINR (Signal to Interference plus Noise Ratio) is relevant influenced by the applied duplex method. The TDD (Time Division Duplex), especially adaptive TDD method has some advantage contrary to FDD (Frequency Division Duplex), for example the spectrum efficiency and flexibility. However these methods are suffering several new interference situations that can-t occur in a FDD system. This leads to reduced SINR in the covered area what could cause some connection outages. Therefore, countermeasure techniques against interference are necessary to apply in TDD systems. Synchronization is one way to handling the interference. In this paper the TDD systems – applying different system synchronization degree - will be compared by the evolved SINR at different locations of the BFWA service area and the percentage of the covered area by the system.
Keywords: Adaptive TDD, BFWA networks, duplex methods, intra system interferences.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 13281249 Diagnosis of Hate Schemas in Prisoners with Antisocial Personality Disorder (ASPD)
Authors: Barbara Gawda
Abstract:
The aim of this study is to show innovative techniques that describe the effectiveness of individuals diagnosed with antisocial personality disorders (ASPD). The author presents information about hate schemas regarding persons with ASPD and their understanding of the role of hate. The data of 60 prisoners with ASPD, 40 prisoners without ASPD, and 60 men without antisocial tendencies, has been analyzed. The participants were asked to describe their hate inspired by a photograph. The narrative discourse was analyzed, the three groups were compared. The results show the differences between the inmates with ASPD, those without ASPD, and the controls. The antisocial individuals describe hate as an ambivalent feeling with low emotional intensity, i.e., actors (in stories) are presented more as positives than as partners. They use different mechanisms to keep them from understanding the meaning of the emotional situation. The schema's characteristics were expressed in narratives attributed to high Psychopathy.
Keywords: Antisocial personality disorder, Emotional narratives, Hate schemas, Psychopathy
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 12761248 Optimization of Parametric Studies Using Strategies of Sampling Techniques
Authors: Lenka Ševelová, Aleš Florian
Abstract:
To improve the efficiency of parametric studies or tests planning the method is proposed, that takes into account all input parameters, but only a few simulation runs are performed to assess the relative importance of each input parameter. For K input parameters with N input values the total number of possible combinations of input values equals NK. To limit the number of runs, only some (totally N) of possible combinations are taken into account. The sampling procedure Updated Latin Hypercube Sampling is used to choose the optimal combinations. To measure the relative importance of each input parameter, the Spearman rank correlation coefficient is proposed. The sensitivity and the influence of all parameters are analyzed within one procedure and the key parameters with the largest influence are immediately identified.Keywords: Concrete, pavement, simulation, reliability, Latin Hypercube Sampling, parametric studies.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 13301247 Areas of Lean Manufacturing for Productivity Improvement in a Manufacturing Unit
Authors: Hudli Mohd. Rameez, K.H.Inamdar
Abstract:
Many organisations are nowadays interested to adopt lean manufacturing strategy that would enable them to compete in this competitive globalisation market. In this respect, it is necessary to assess the implementation of lean manufacturing in different organisations so that the important best practices can be identified. This paper describes the development of key areas which will be used to assess the adoption and implementation of lean manufacturing practices. There are some key areas developed to evaluate and reduce the most optimal projects so as to enhance their production efficiency and increase the purpose of the economic benefits of the manufacturing unit. Lean manufacturing is becoming lean enterprise by treating its customers and suppliers as partners. This gives the extra edge in today-s cost and time competitive markets. The organisation is becoming strong in all the conventional competition points. They are Price, Quality and Delivery. Lean enterprise owners can deliver high quality products quickly, with low price.Keywords: Competitive points, implementation, Leanmanufacturing, tools and techniques
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 33151246 A Meshfree Solution of Tow-Dimensional Potential Flow Problems
Authors: I. V. Singh, A. Singh
Abstract:
In this paper, mesh-free element free Galerkin (EFG) method is extended to solve two-dimensional potential flow problems. Two ideal fluid flow problems (i.e. flow over a rigid cylinder and flow over a sphere) have been formulated using variational approach. Penalty and Lagrange multiplier techniques have been utilized for the enforcement of essential boundary conditions. Four point Gauss quadrature have been used for the integration on two-dimensional domain (Ω) and nodal integration scheme has been used to enforce the essential boundary conditions on the edges (┌). The results obtained by EFG method are compared with those obtained by finite element method. The effects of scaling and penalty parameters on EFG results have also been discussed in detail.
Keywords: Meshless, EFG method, potential flow, Lagrange multiplier method, penalty method, penalty parameter and scaling parameter
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15031245 Creep Constitutive Equation for 2- Materials of Weldment-304L Stainless Steel
Authors: Amir Hossein Daei Sorkhabi, Farid Vakili Tahami
Abstract:
In this paper, creep constitutive equations of base (Parent) and weld materials of the weldment for cold-drawn 304L stainless steel have been obtained experimentally. For this purpose, test samples have been generated from cold drawn bars and weld material according to the ASTM standard. The creep behavior and properties have been examined for these materials by conducting uniaxial creep tests. Constant temperatures and constant load uni-axial creep tests have been carried out at two high temperatures, 680 and 720 oC, subjected to constant loads, which produce initial stresses ranging from 240 to 360 MPa. The experimental data have been used to obtain the creep constitutive parameters using numerical optimization techniques.Keywords: Creep, Constitutive equation, Cold-drawn 304L stainless steel, Weld, Base material
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 27711244 Awareness of Value Addition of Sweet Potato (Ipomoea batatas (L.) Lam) In Osun State, Nigeria
Authors: A. M. Omoare, E. O. Fakoya, O. E. Fapojuwo, W. O. Oyediran
Abstract:
Awareness of value addition of sweet potato has received comparatively little attention in Nigeria despite its potential to reduce perishability and enhanced utilization of the crop in diverse products forms. This study assessed the awareness of value addition of sweet potato in Osun State, Nigeria. Multi-stage random sampling technique was used to select 120 respondents for the study. Data obtained were analyzed using descriptive statistics and multiple regression analysis. Findings showed that most (75.00%) of the respondents were male with mean age of 42.10 years and 96.70% of the respondents had formal education. The mean farm size was 2.30 hectares. Majority (75.00%) of the respondents had more than 10 years farming experience. Awareness of value addition of sweet potato was very low among the respondents. It was recommended that sweet potato farmers should be empowered through effective and efficient extension training on the use of modern processing techniques in order to enhance value addition of sweet potato.
Keywords: Awareness, value addition, sweet potato, perishability.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 29301243 Efficient Iterative Detection Technique in Wireless Communication System
Authors: Hwan-Jun Choi, Sung-Bok Choi, Hyoung-Kyu Song
Abstract:
Recently, among the MIMO-OFDM detection techniques, a lot of papers suggested V-BLAST scheme which can achieve high data rate. Therefore, the signal detection of MIMO-OFDM system is important issue. In this paper, efficient iterative V-BLAST detection technique is proposed in wireless communication system. The proposed scheme adjusts the number of candidate symbol and iterative scheme based on channel state. According to the simulation result, the proposed scheme has better BER performance than conventional schemes and similar BER performance of the QRD-M with iterative scheme. Moreover complexity of proposed scheme has 50.6% less than complexity of QRD-M detection with iterative scheme. Therefore the proposed detection scheme can be efficiently used in wireless communication.
Keywords: MIMO-OFDM, V-BLAST, QR-decomposition, QRD-M, DFE, Iterative scheme, Channel condition.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 20551242 Improved Ant Colony Optimization for Solving Reliability Redundancy Allocation Problems
Authors: Phakhapong Thanitakul, Worawat Sa-ngiamvibool, Apinan Aurasopon, Saravuth Pothiya
Abstract:
This paper presents an improved ant colony optimization (IACO) for solving the reliability redundancy allocation problem (RAP) in order to maximize system reliability. To improve the performance of ACO algorithm, two additional techniques, i.e. neighborhood search, and re-initialization process are presented. To show its efficiency and effectiveness, the proposed IACO is applied to solve three RAPs. Additionally, the results of the proposed IACO are compared with those of the conventional heuristic approaches i.e. genetic algorithm (GA), particle swarm optimization (PSO) and ant colony optimization (ACO). The experimental results show that the proposed IACO approach is comparatively capable of obtaining higher quality solution and faster computational time.
Keywords: Ant colony optimization, Heuristic algorithm, Mixed-integer nonlinear programming, Redundancy allocation problem, Reliability optimization.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 20931241 Quality Control of Automotive Gearbox Based On Vibration Signal Analysis
Authors: Nilson Barbieri, Bruno Matos Martins, Gabriel de Sant'Anna Vitor Barbieri
Abstract:
In more complex systems, such as automotive gearbox, a rigorous treatment of the data is necessary because there are several moving parts (gears, bearings, shafts, etc.), and in this way, there are several possible sources of errors and also noise. The basic objective of this work is the detection of damage in automotive gearbox. The detection methods used are the wavelet method, the bispectrum; advanced filtering techniques (selective filtering) of vibrational signals and mathematical morphology. Gearbox vibration tests were performed (gearboxes in good condition and with defects) of a production line of a large vehicle assembler. The vibration signals are obtained using five accelerometers in different positions of the sample. The results obtained using the kurtosis, bispectrum, wavelet and mathematical morphology showed that it is possible to identify the existence of defects in automotive gearboxes.Keywords: Automotive gearbox, mathematical morphology, wavelet, bispectrum.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 23161240 Optimal Risk Reduction in the Railway Industry by Using Dynamic Programming
Authors: Michael Todinov, Eberechi Weli
Abstract:
The paper suggests for the first time the use of dynamic programming techniques for optimal risk reduction in the railway industry. It is shown that by using the concept ‘amount of removed risk by a risk reduction option’, the problem related to optimal allocation of a fixed budget to achieve a maximum risk reduction in the railway industry can be reduced to an optimisation problem from dynamic programming. For n risk reduction options and size of the available risk reduction budget B (expressed as integer number), the worst-case running time of the proposed algorithm is O (n x (B+1)), which makes the proposed method a very efficient tool for solving the optimal risk reduction problem in the railway industry.
Keywords: Optimisation, railway risk reduction, budget constraints, dynamic programming.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 21791239 Differentiation between Common Tick Species Using Molecular Biology Techniques in Saudi Arabia
Authors: Kholoud A. Al-Shammery , Badr El-Sabah A. Fetoh, Ahmed M. Alshammari
Abstract:
Protein and Esterase electrophoresis were used to genetically identify two Saudi tick species. Engorged females of the camel tick Hyalomma dromedarii (Koch) (Acari: Ixodidae) and the cattle tick Boophilus annulatus (Say) (Acari: Ixodidae) ticks collected from infested camels and cattle in the animals resting house at Hail region in KSA were used. The results showed that there are a variation in both of protein and esterase activity levels and a high polymorphism within and between the genera and species of Hyalomma and Boophilus . In conclusion, the protein and esterase electrophoretic analysis used in the present study could successfully distinguish among tick species, commonly found in Saudi Arabia.Keywords: Molecular biology, The camel tick Hyalomma dromedarii, The cattle tick Boophilus annulatus , Ticks.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 29421238 Embodied Energy in Concrete and Structural Masonry on Typical Brazilian Buildings
Authors: Marco A. S. González, Marlova P. Kulakowski, Luciano G. Breitenbach, Felipe Kirch
Abstract:
The AEC sector has an expressive environmental responsibility. Actually, most building materials have severe environmental impacts along their production cycle. Professionals enrolled in building design may choice the materials and techniques with less impact among the viable options. This work presents a study about embodied energy in materials of two typical Brazilian constructive alternatives. The construction options considered are reinforced concrete structure and structural masonry. The study was developed for the region of São Leopoldo, southern Brazil. Results indicated that the energy embodied in these two constructive systems is approximately 1.72 GJ·m-2 and 1.26 GJ·m-2, respectively. It may be concluded that the embodied energy is lower in the structural masonry system, with a reduction around to 1/4 in relation to the traditional option. The results can be used to help design decisions.
Keywords: Civil construction, sustainability, embodied energy.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 27531237 A Review on Soft Computing Technique in Intrusion Detection System
Authors: Noor Suhana Sulaiman, Rohani Abu Bakar, Norrozila Sulaiman
Abstract:
Intrusion Detection System is significant in network security. It detects and identifies intrusion behavior or intrusion attempts in a computer system by monitoring and analyzing the network packets in real time. In the recent year, intelligent algorithms applied in the intrusion detection system (IDS) have been an increasing concern with the rapid growth of the network security. IDS data deals with a huge amount of data which contains irrelevant and redundant features causing slow training and testing process, higher resource consumption as well as poor detection rate. Since the amount of audit data that an IDS needs to examine is very large even for a small network, classification by hand is impossible. Hence, the primary objective of this review is to review the techniques prior to classification process suit to IDS data.Keywords: Intrusion Detection System, security, soft computing, classification.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1863