Search results for: genome applications
1256 Walsh-Hadamard Transform for Facial Feature Extraction in Face Recognition
Authors: M. Hassan, I. Osman, M. Yahia
Abstract:
This Paper proposes a new facial feature extraction approach, Wash-Hadamard Transform (WHT). This approach is based on correlation between local pixels of the face image. Its primary advantage is the simplicity of its computation. The paper compares the proposed approach, WHT, which was traditionally used in data compression with two other known approaches: the Principal Component Analysis (PCA) and the Discrete Cosine Transform (DCT) using the face database of Olivetti Research Laboratory (ORL). In spite of its simple computation, the proposed algorithm (WHT) gave very close results to those obtained by the PCA and DCT. This paper initiates the research into WHT and the family of frequency transforms and examines their suitability for feature extraction in face recognition applications.
Keywords: Face Recognition, Facial Feature Extraction, Principal Component Analysis, and Discrete Cosine Transform, Wash-Hadamard Transform.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 25711255 Error Effects on SAR Image Resolution using Range Doppler Imaging Algorithm
Authors: Su Su Yi Mon, Fang Jiancheng
Abstract:
Synthetic Aperture Radar (SAR) is an imaging radar form by taking full advantage of the relative movement of the antenna with respect to the target. Through the simultaneous processing of the radar reflections over the movement of the antenna via the Range Doppler Algorithm (RDA), the superior resolution of a theoretical wider antenna, termed synthetic aperture, is obtained. Therefore, SAR can achieve high resolution two dimensional imagery of the ground surface. In addition, two filtering steps in range and azimuth direction provide accurate enough result. This paper develops a simulation in which realistic SAR images can be generated. Also, the effect of velocity errors in the resulting image has also been investigated. Taking some velocity errors into account, the simulation results on the image resolution would be presented. Most of the times, algorithms need to be adjusted for particular datasets, or particular applications.
Keywords: Synthetic Aperture Radar (SAR), Range Doppler Algorithm (RDA), Image Resolution.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 33481254 Riemann-Liouville Fractional Calculus and Multiindex Dzrbashjan-Gelfond-Leontiev Differentiation and Integration with Multiindex Mittag-Leffler Function
Authors: U.K. Saha, L.K. Arora
Abstract:
The multiindex Mittag-Leffler (M-L) function and the multiindex Dzrbashjan-Gelfond-Leontiev (D-G-L) differentiation and integration play a very pivotal role in the theory and applications of generalized fractional calculus. The object of this paper is to investigate the relations that exist between the Riemann-Liouville fractional calculus and multiindex Dzrbashjan-Gelfond-Leontiev differentiation and integration with multiindex Mittag-Leffler function.
Keywords: Multiindex Mittag-Leffler function, Multiindex Dzrbashjan-Gelfond-Leontiev differentiation and integration, Riemann-Liouville fractional integrals and derivatives.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15311253 Electrode Engineering for On-Chip Liquid Driving by Using Electrokinetic Effect
Authors: Reza Hadjiaghaie Vafaie, Aysan Madanpasandi, Behrooz Zare Desari, Seyedmohammad Mousavi
Abstract:
High lamination in microchannel is one of the main challenges in on-chip components like micro total analyzer systems and lab-on-a-chips. Electro-osmotic force is highly effective in chip-scale. This research proposes a microfluidic-based micropump for low ionic strength solutions. Narrow microchannels are designed to generate an efficient electroosmotic flow near the walls. Microelectrodes are embedded in the lateral sides and actuated by low electric potential to generate pumping effect inside the channel. Based on the simulation study, the fluid velocity increases by increasing the electric potential amplitude. We achieve a net flow velocity of 100 µm/s, by applying +/- 2 V to the electrode structures. Our proposed low voltage design is of interest in conventional lab-on-a-chip applications.
Keywords: Integration, electrokinetic, on-chip, fluid pumping, microfluidic.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 8441252 System Concept for Low Analog Complexity and High-IF Superposition Heterodyne Receivers
Authors: Marko Mailand, Hans-Joachim Jentschel
Abstract:
For today-s and future wireless communications applications, more and more data traffic has to be transmitted with growing speed and quality demands. The analog front-end of any mobile device has to cope with very hard specifications regardless which transmission standard has to be supported. State-of-the-art analog front-end implementations are reaching the limit of technical feasibility. For that reason, alternative front-end architectures could support a continuing development of mobile communications e.g., six-port-based front-ends [1], [2]. In this article we propose an analog front-end with high intermediate frequency and which utilizes additive mixing instead of multiplicative mixing. The system architecture is presented and several spurious effects as well as their influence on the system dimensioning are discussed. Furthermore, several issues concerning the technical feasibility are provided and some simulation results are discussed which show the principle functionality of the proposed superposition heterodyne receiver.Keywords: receivers, analog front-end, heterodyning, self-mixing.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14441251 Analysis of Detecting Wormhole Attack in Wireless Networks
Authors: Khin Sandar Win
Abstract:
In multi hop wireless systems, such as ad hoc and sensor networks, mobile ad hoc network applications are deployed, security emerges as a central requirement. A particularly devastating attack is known as the wormhole attack, where two or more malicious colluding nodes create a higher level virtual tunnel in the network, which is employed to transport packets between the tunnel end points. These tunnels emulate shorter links in the network. In which adversary records transmitted packets at one location in the network, tunnels them to another location, and retransmits them into the network. The wormhole attack is possible even if the attacker has not compromised any hosts and even if all communication provides authenticity and confidentiality. In this paper, we analyze wormhole attack nature in ad hoc and sensor networks and existing methods of the defending mechanism to detect wormhole attacks without require any specialized hardware. This analysis able to provide in establishing a method to reduce the rate of refresh time and the response time to become more faster.Keywords: Ad hoc network, Sensor network, Wormhole attack, defending mechanism.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 22971250 Approach for a Safety Element out of Context for an Actuator Circuit Control Module
Authors: H. Noun, C. Urban-Seelmann, M. Abdelfattah, G. Zeller, G. Rajesh, I. Mozgova, R. Lachmayer
Abstract:
Several modules in automotive are usually modified and adapted for various project-specific applications. Due to a standardized safety concept a high reusability is accessible. A safety element out of context (SEooC) according to ISO 26262 can be a suitable approach. Based on the same safety concept and analysis, common modules can reach high reusability. For developing according to a module out of context, an appropriate and detailed development approach is required. This paper shows how to deduce this development processes for platform modules. Therefore, the detailed approach of the SEooC is derived. The aim is to create a detailed workflow for all phases of the development and integration of any kind of system modules. As an application example, an automotive project for an actuator control module is considered.
Keywords: Functional Safety, Safety Element out of Context, System Engineering, Hardware Engineering.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3801249 Development of Composite Adsorbent for Waste Water Treatment Using Adsorption and Electrochemical Regeneration
Authors: H. M. A. Asghar, S. N. Hussain, E. P. L. Roberts, N. W. Brown, H. Sattar
Abstract:
A unique combination of adsorption and electrochemical regeneration with a proprietary adsorbent material called Nyex 100 was introduced at the University of Manchester for waste water treatment applications. Nyex 100 is based on graphite intercalation compound. It is non porous and electrically conducing adsorbent material. This material exhibited very small BET surface area i.e. 2.75 m2g-1, in consequence, small adsorptive capacities for the adsorption of various organic pollutants were obtained. This work aims to develop composite adsorbent material essentially capable of electrochemical regeneration coupled with improved adsorption characteristics. An organic dye, acid violet 17 was used as standard organic pollutant. The developed composite material was successfully electrochemically regenerated using a DC current of 1 A for 60 minutes. Regeneration efficiency was maintained at around 100% for five adsorption-regeneration cycles.Keywords: Adsorption, electrically conducting adsorbent material, electrochemical regeneration, waste water.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 32181248 Applications of Rough Set Decompositions in Information Retrieval
Authors: Chen Wu, Xiaohua Hu
Abstract:
This paper proposes rough set models with three different level knowledge granules in incomplete information system under tolerance relation by similarity between objects according to their attribute values. Through introducing dominance relation on the discourse to decompose similarity classes into three subclasses: little better subclass, little worse subclass and vague subclass, it dismantles lower and upper approximations into three components. By using these components, retrieving information to find naturally hierarchical expansions to queries and constructing answers to elaborative queries can be effective. It illustrates the approach in applying rough set models in the design of information retrieval system to access different granular expanded documents. The proposed method enhances rough set model application in the flexibility of expansions and elaborative queries in information retrieval.Keywords: Incomplete information system, Rough set model, tolerance relation, dominance relation, approximation, decomposition, elaborative query.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16121247 Effect of Geometrical Parameters on Natural Frequencies of FGM Cylindrical shell with Holes Under Various Boundary Conditions
Authors: Mostafa Ghayour, Mohammad Sadegh Golabi
Abstract:
In the recent years, functionally gradient materials (FGMs) have gained considerable attention in the high temperature environment applications. In this paper, free vibration of thin functionally graded cylindrical shell with hole composed of stainless steel and zirconia is studied. The mechanical properties vary smoothly and continuously from one surface to the other according to a volume fraction power-law distribution. The Influence of shell geometrical parameters, variations of volume fractions and boundary conditions on natural frequency is considered. The equations of motion are based on strains-displacement relations from Love-s shell theory and Rayleigh method. The results have been obtained for natural frequencies of cylindrical shell with holes for different shape, number and location in this paper.
Keywords: Functionally gradient material, Vibration, various boundary conditions, cylindrical shells.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 18091246 Post-Compression Consideration in Video Watermarking for Wireless Communication
Authors: Chuen-Ching Wang, Yao-Tang Chang, Yu-Chang Hsu
Abstract:
A simple but effective digital watermarking scheme utilizing a context adaptive variable length coding (CAVLC) method is presented for wireless communication system. In the proposed approach, the watermark bits are embedded in the final non-zero quantized coefficient of each DCT block, thereby yielding a potential reduction in the length of the coded block. As a result, the watermarking scheme not only provides the means to check the authenticity and integrity of the video stream, but also improves the compression ratio and therefore reduces both the transmission time and the storage space requirements of the coded video sequence. The results confirm that the proposed scheme enables the detection of malicious tampering attacks and reduces the size of the coded H.264 file. Therefore, the current study is feasible to apply in the video applications of wireless communication such as 3G systemKeywords: 3G, wireless communication, CAVLC, digitalwatermarking, motion compensation
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 18711245 Reaction to the Fire of a Composite Material the Base of Scrapes of Tires End Latex for Thermal Isolation
Authors: E. T. L. Cöuras Ford, V. A. C. Vale, J. U. L. Mendes, R. M. Nascimento
Abstract:
The great majority of the applications of thermal isolation in the strip of drops and averages temperatures (up to 200ºC), it is made of materials aggressive nature, such an as glass wool, rock wool, polystyrene, EPS among others. Such materials, in spite of the effectiveness in the retention of the flow of heat, possess considerable cost and when discarded they are long years to be to decompose. In that context, trying to adapt the world politics the about of the preservation of the environment, a study began with intention of developing a material composite, with properties of thermal, originating from insulating industrial residues. In this research, the behavior of the composite was analyzed, as submitted the fire. For this, the reaction rehearsals were accomplished to the fire for the composites 2:1; 1:1; 1:2 and for the Latex, based in the "con" experiment in agreement with the norm ASTM - E 1334 - 90. As consequence, in function of the answers of the system was possible to be observed to the acting of each mixture proportion.Keywords: Composite, Latex, Reaction to the fire.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 10351244 Effect of Mode Loading on FCRG Plate with Double Through Crack at Hole
Authors: M. Benachour, N. Benachour, M. Benguediab, A. Hadjoui
Abstract:
The knowledge of the nature of loading is very important in order to hold account on the total behavior such as vibration, shock, fatigue, etc. Fatigue present 90% of failure when loadings fatigues are very complex. In this paper a study of double through crack at hole for plate subjected to fatigue loading is presented. Various modes loading are studied where the applied load is the same one. The fatigue life is given where the effect of stress ratio is highlighted. This work is conducted on aluminum alloy 2024 T351 used for much aerospace and aeronautics applications. The fatigue crack growth behavior with constant amplitude is studied using the AFGROW code when Forman model is applied. The fatigue crack growth rate and fatigue life for different loading modes are compared with variation of others geometrical parameter such as thickness and dimensions of notch hole.Keywords: Fatigue crack, mode loading, aluminum alloy
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15571243 On-line Testing of Software Components for Diagnosis of Embedded Systems
Authors: Thi-Quynh Bui, Oum-El-Kheir Aktouf
Abstract:
This paper studies the dependability of componentbased applications, especially embedded ones, from the diagnosis point of view. The principle of the diagnosis technique is to implement inter-component tests in order to detect and locate the faulty components without redundancy. The proposed approach for diagnosing faulty components consists of two main aspects. The first one concerns the execution of the inter-component tests which requires integrating test functionality within a component. This is the subject of this paper. The second one is the diagnosis process itself which consists of the analysis of inter-component test results to determine the fault-state of the whole system. Advantage of this diagnosis method when compared to classical redundancy faulttolerant techniques are application autonomy, cost-effectiveness and better usage of system resources. Such advantage is very important for many systems and especially for embedded ones.Keywords: Dependability, diagnosis, middlewares, embeddedsystems, fault tolerance, inter-component testing.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17471242 Towards Finite Element Modeling of the Accoustics of Human Head
Authors: Maciej Paszynski, Leszek Demkowicz, Jason Kurtz
Abstract:
In this paper, a new formulation for acoustics coupled with linear elasticity is presented. The primary objective of the work is to develop a three dimensional hp adaptive finite element method code destinated for modeling of acoustics of human head. The code will have numerous applications e.g. in designing hearing protection devices for individuals working in high noise environments. The presented work is in the preliminary stage. The variational formulation has been implemented and tested on a sequence of meshes with concentric multi-layer spheres, with material data representing the tissue (the brain), skull and the air. Thus, an efficient solver for coupled elasticity/acoustics problems has been developed, and tested on high contrast material data representing the human head.
Keywords: finite element method, acoustics, coupled problems, biomechanics
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 19771241 Cryptography Over Elliptic Curve Of The Ring Fq[e], e4 = 0
Authors: Chillali Abdelhakim
Abstract:
Groups where the discrete logarithm problem (DLP) is believed to be intractable have proved to be inestimable building blocks for cryptographic applications. They are at the heart of numerous protocols such as key agreements, public-key cryptosystems, digital signatures, identification schemes, publicly verifiable secret sharings, hash functions and bit commitments. The search for new groups with intractable DLP is therefore of great importance.The goal of this article is to study elliptic curves over the ring Fq[], with Fq a finite field of order q and with the relation n = 0, n ≥ 3. The motivation for this work came from the observation that several practical discrete logarithm-based cryptosystems, such as ElGamal, the Elliptic Curve Cryptosystems . In a first time, we describe these curves defined over a ring. Then, we study the algorithmic properties by proposing effective implementations for representing the elements and the group law. In anther article we study their cryptographic properties, an attack of the elliptic discrete logarithm problem, a new cryptosystem over these curves.
Keywords: Elliptic Curve Over Ring, Discrete Logarithm Problem.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 35831240 Zamzam Water as Corrosion Inhibitor for Steel Rebar in Rainwater and Simulated Acid Rain
Authors: Ahmed A. Elshami, Stéphanie Bonnet, Abdelhafid Khelidj
Abstract:
Corrosion inhibitors are widely used in concrete industry to reduce the corrosion rate of steel rebar which is present in contact with aggressive environments. The present work aims to using Zamzam water from well located within the Masjid al-Haram in Mecca, Saudi Arabia 20 m (66 ft) east of the Kaaba, the holiest place in Islam as corrosion inhibitor for steel in rain water and simulated acid rain. The effect of Zamzam water was investigated by electrochemical impedance spectroscopy (EIS) and Potentiodynamic polarization techniques in Department of Civil Engineering - IUT Saint-Nazaire, Nantes University, France. Zamzam water is considered to be one of the most important steel corrosion inhibitor which is frequently used in different industrial applications. Results showed that zamzam water gave a very good inhibition for steel corrosion in rain water and simulated acid rain.
Keywords: Zamzam water, corrosion inhibitor, rain water and simulated acid rain.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 28031239 Global Exponential Stability of Impulsive BAM Fuzzy Cellular Neural Networks with Time Delays in the Leakage Terms
Authors: Liping Zhang, Kelin Li
Abstract:
In this paper, a class of impulsive BAM fuzzy cellular neural networks with time delays in the leakage terms is formulated and investigated. By establishing a delay differential inequality and M-matrix theory, some sufficient conditions ensuring the existence, uniqueness and global exponential stability of equilibrium point for impulsive BAM fuzzy cellular neural networks with time delays in the leakage terms are obtained. In particular, a precise estimate of the exponential convergence rate is also provided, which depends on system parameters and impulsive perturbation intention. It is believed that these results are significant and useful for the design and applications of BAM fuzzy cellular neural networks. An example is given to show the effectiveness of the results obtained here.
Keywords: Global exponential stability, bidirectional associative memory, fuzzy cellular neural networks, leakage delays, impulses.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 13301238 Screening and Identification of Microorganisms – Potential Producers of Arachidonic Acid
Authors: A. V. Goncharova, T. A. Karpenyuk, Y. S. Tsurkan, R. U. Beisembaeva, A. M. Kalbaeva, T. D. Mukasheva, L. V. Ignatova
Abstract:
Microorganisms isolated from water and soil of Kazakhstan to identify potential high-effective producers of the arachidonic acid, exhibiting a wide range of physiological activity and having practical applications were screened. Based on the results of two independent tests (the test on the sensitivity of the growth processes of microorganisms to acetylsalicylic acid - an irreversible inhibitor of PGH-synthase involved in the metabolism of arachidonic acid and its derivatives, the test for inhibition of peroxidase activity of membrane-bounding fraction of PGH - synthase by acetylsalicylic acid) were selected microbial cultures which are potential highproducer of arachidonic acid. They are characterized by a stable strong growth in the laboratory conditions. Identification of microorganism cultures based on morphological, physiological, biochemical and molecular genetic characteristics was performed.
Keywords: Arachidonic acid, aspirin-sensitive culture, bacteria, producers, screening.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 21041237 eTransformation Framework for the Cognitive Systems
Authors: Ana Hol
Abstract:
Digital systems are in the Cognitive wave of the eTransformations and are now extensively aimed at meeting the individuals’ demands, both those of customers requiring services and those of service providers. It is also apparent that successful future systems will not just simply open doors to the traditional owners/users to offer and receive services such as Uber, for example, does today, but will in the future require more customized and cognitively enabled infrastructures that will be responsive to the system user’s needs. To be able to identify what is required for such systems this research reviews the historical and the current effects of the eTransformation process by studying: 1. eTransitions of company websites and mobile applications, 2. Emergence of new shared economy business models such as Uber, and 3. New requirements for demand driven, cognitive systems capable of learning and just-in-time decision-making. Based on the analysis, this study proposes a Cognitive eTransformation Framework capable of guiding implementations of new responsive and user aware systems.
Keywords: System implementations, AI supported systems, cognitive systems, eTransformation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 9521236 An Experimental Investigation of Factors Affecting Consumers' Reactions to Mobile APP-Based Promotions
Authors: Shu-Lu Hsu, Jeffrey C. F. Tai, Yi-Han Wang
Abstract:
The purpose of this study is to understand how consumers react to a company's promotional offers with mobile applications (APP) as premiums. This paper presents the results of an experimental study where five features of APP were involved: the cost (free/discounted) for earning APP, the relationship between APP and the promoted product, the perceived usefulness, the perceived ease of use, and the perceived playfulness of APP in the context of light foods purchase. The results support that the above features, except perceived ease of use, have substantial influences on consumers' intention to adopt the APP. Among the five features, the cost for earning APP has the most impact on the adopting intention of APP. The study also found a positive influence of adopting intention of APP on the consumer's purchase intention of the promoted product. Thus, APP-based premiums may enhance the consumer's purchase intention of a company's promoted products.
Keywords: Mobile Application, Premium, Sales Promotion, TAM.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 24831235 A Low Cost and High Quality Duty-Cycle Modulation Scheme and Applications
Authors: B. Lonla Moffo, J. Mbihi, L. Nneme Nneme
Abstract:
In this paper, a low cost duty-cycle modulation scheme is studied in depth and compared to the standard pulse width modulation technique. Using a mix of analytical reasoning and electronics simulation tools, it is shown that under the same operating conditions, most characteristics of the proposed duty-cycle modulation scheme are better than those provided by a standard pulse width modulation technique. The simulation results obtained when testing both modulation control policies on prototyping systems, indicate that the proposed duty-cycle modulation approach, appears to be a high quality control policy in a wide variety of application areas, including A/D and D/A conversion, signal transmission and switching control in power electronics.
Keywords: Duty-cycle Modulation, Operational amplifiers, Pulse width modulation, Power electronics, Signal processing.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 27451234 Evaluation of a Dual-Fluid Cold-Gas Thruster Concept
Authors: J. D. Burges, M. J. Hall, E. G. Lightsey
Abstract:
A new dual-fluid concept was studied that could eventually find application for cold-gas propulsion for small space satellites or other constant flow applications. In basic form, the concept uses two different refrigerant working fluids, each having a different saturation vapor pressure. The higher vapor pressure refrigerant remains in the saturation phase and is used to pressurize the lower saturation vapor pressure fluid (the propellant) which remains in the compressed liquid phase. A demonstration thruster concept based on this principle was designed and built to study its operating characteristics. An automotive-type electronic fuel injector was used to meter and deliver the propellant. Ejected propellant mass and momentum were measured for several combinations of refrigerants and hydrocarbon fluids. The thruster has the advantage of delivering relatively large total impulse at low tank pressure within a small volume.
Keywords: cold-gas, nano-satellite, R134a, thruster
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 42671233 Online Collaborative Learning System Using Speech Technology
Authors: Sid-Ahmed. Selouani, Tang-Ho Lê, Chadia Moghrabi, Benoit Lanteigne, Jean Roy
Abstract:
A Web-based learning tool, the Learn IN Context (LINC) system, designed and being used in some institution-s courses in mixed-mode learning, is presented in this paper. This mode combines face-to-face and distance approaches to education. LINC can achieve both collaborative and competitive learning. In order to provide both learners and tutors with a more natural way to interact with e-learning applications, a conversational interface has been included in LINC. Hence, the components and essential features of LINC+, the voice enhanced version of LINC, are described. We report evaluation experiments of LINC/LINC+ in a real use context of a computer programming course taught at the Université de Moncton (Canada). The findings show that when the learning material is delivered in the form of a collaborative and voice-enabled presentation, the majority of learners seem to be satisfied with this new media, and confirm that it does not negatively affect their cognitive load.Keywords: E-leaning, Knowledge Network, Speech recognition, Speech synthesis.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17131232 The Preparation of Silicon and Aluminum Extracts from Tuncbilek and Orhaneli Fly Ashes by Alkali Fusion
Authors: M. Sari Yilmaz, N. Karamahmut Mermer
Abstract:
Coal fly ash is formed as a solid waste product from the combustion of coal in coal fired power stations. Huge amounts of fly ash are produced globally every year and are predicted to increase. Nowadays, less than half of the fly ash is used as a raw material for cement manufacturing, construction and the rest of it is disposed as a waste causing yet another environmental concern. For this reason, the recycling of this kind of slurries into useful materials is quite important in terms of economical and environmental aspects. The purpose of this study is to evaluate the Orhaneli and Tuncbilek coal fly ashes for utilization in some industrial applications. Therefore the mineralogical and chemical compositions of these fly ashes were analyzed by X-ray fluorescence spectroscopy, ourier-transform infrared spectrometer, and X-ray diffraction. The silicon (Si) and aluminum (Al) in the fly ashes were activated by alkali fusion technique with sodium hydroxide. The obtained extracts were analyzed for Si and Al content by inductively coupled plasma optical emission spectrometry.Keywords: Extraction, Fly ash, Fusion, XRD.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 18941231 Adaptive Hierarchical Key Structure Generation for Key Management in Wireless Sensor Networks using A*
Authors: Jin Myoung Kim, Tae Ho Cho
Abstract:
Wireless Sensor networks have a wide spectrum of civil and military applications that call for secure communication such as the terrorist tracking, target surveillance in hostile environments. For the secure communication in these application areas, we propose a method for generating a hierarchical key structure for the efficient group key management. In this paper, we apply A* algorithm in generating a hierarchical key structure by considering the history data of the ratio of addition and eviction of sensor nodes in a location where sensor nodes are deployed. Thus generated key tree structure provides an efficient way of managing the group key in terms of energy consumption when addition and eviction event occurs. A* algorithm tries to minimize the number of messages needed for group key management by the history data. The experimentation with the tree shows efficiency of the proposed method.
Keywords: Heuristic search, key management, security, sensor network.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16841230 Day/Night Detector for Vehicle Tracking in Traffic Monitoring Systems
Authors: M. Taha, Hala H. Zayed, T. Nazmy, M. Khalifa
Abstract:
Recently, traffic monitoring has attracted the attention of computer vision researchers. Many algorithms have been developed to detect and track moving vehicles. In fact, vehicle tracking in daytime and in nighttime cannot be approached with the same techniques, due to the extreme different illumination conditions. Consequently, traffic-monitoring systems are in need of having a component to differentiate between daytime and nighttime scenes. In this paper, a HSV-based day/night detector is proposed for traffic monitoring scenes. The detector employs the hue-histogram and the value-histogram on the top half of the image frame. Experimental results show that the extraction of the brightness features along with the color features within the top region of the image is effective for classifying traffic scenes. In addition, the detector achieves high precision and recall rates along with it is feasible for real time applications.Keywords: Day/night detector, daytime/nighttime classification, image classification, vehicle tracking, traffic monitoring.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 45081229 Development of Quasi-Two-Dimensional Nb2O5 for Functional Electrodes of Advanced Electrochemical Systems
Authors: S. Zhuiykov, E. Kats
Abstract:
In recent times there has been a growing interest in the development of quasi-two-dimensional niobium pentoxide (Nb2O5) as a semiconductor for the potential electronic applications such as capacitors, filtration, dye-sensitised solar cells and gas sensing platforms. Therefore once the purpose is established, Nb2O5 can be prepared in a number of nano- and sub-micron-structural morphologies that include rods, wires, belts and tubes. In this study films of Nb2O5 were prepared on gold plated silicon substrate using spin-coating technique and subsequently by mechanical exfoliation. The reason this method was employed was to achieve layers of less than 15nm in thickness. The sintering temperature of the specimen was 800oC. The morphology and structural characteristics of the films were analyzed by Atomic Force Microscopy (AFM), Raman Spectroscopy, X-ray Photoelectron Spectroscopy (XPS).Keywords: Mechanical exfoliation, niobium pentoxide, quazitwo- dimensional, semiconductor, sol-gel, spin-coating, two dimensional semiconductors.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 23951228 Autonomously Determining the Parameters for SVDD with RBF Kernel from a One-Class Training Set
Authors: Andreas Theissler, Ian Dear
Abstract:
The one-class support vector machine “support vector data description” (SVDD) is an ideal approach for anomaly or outlier detection. However, for the applicability of SVDD in real-world applications, the ease of use is crucial. The results of SVDD are massively determined by the choice of the regularisation parameter C and the kernel parameter of the widely used RBF kernel. While for two-class SVMs the parameters can be tuned using cross-validation based on the confusion matrix, for a one-class SVM this is not possible, because only true positives and false negatives can occur during training. This paper proposes an approach to find the optimal set of parameters for SVDD solely based on a training set from one class and without any user parameterisation. Results on artificial and real data sets are presented, underpinning the usefulness of the approach.
Keywords: Support vector data description, anomaly detection, one-class classification, parameter tuning.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 29351227 Energy Map Construction using Adaptive Alpha Grey Prediction Model in WSNs
Authors: Surender Kumar Soni, Dhirendra Pratap Singh
Abstract:
Wireless Sensor Networks can be used to monitor the physical phenomenon in such areas where human approach is nearly impossible. Hence the limited power supply is the major constraint of the WSNs due to the use of non-rechargeable batteries in sensor nodes. A lot of researches are going on to reduce the energy consumption of sensor nodes. Energy map can be used with clustering, data dissemination and routing techniques to reduce the power consumption of WSNs. Energy map can also be used to know which part of the network is going to fail in near future. In this paper, Energy map is constructed using the prediction based approach. Adaptive alpha GM(1,1) model is used as the prediction model. GM(1,1) is being used worldwide in many applications for predicting future values of time series using some past values due to its high computational efficiency and accuracy.Keywords: Adaptive Alpha GM(1, 1) Model, Energy Map, Prediction Based Data Reduction, Wireless Sensor Networks
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1801