Search results for: Large neural networks
1588 QoS Expectations in IP Networks: A Practical View
Authors: S. Arrizabalaga, A. Salterain, M. Domínguez, I. Alvaro
Abstract:
Traditionally, Internet has provided best-effort service to every user regardless of its requirements. However, as Internet becomes universally available, users demand more bandwidth and applications require more and more resources, and interest has developed in having the Internet provide some degree of Quality of Service. Although QoS is an important issue, the question of how it will be brought into the Internet has not been solved yet. Researches, due to the rapid advances in technology are proposing new and more desirable capabilities for the next generation of IP infrastructures. But neither all applications demand the same amount of resources, nor all users are service providers. In this way, this paper is the first of a series of papers that presents an architecture as a first step to the optimization of QoS in the Internet environment as a solution to a SMSE's problem whose objective is to provide public service to internet with certain Quality of Service expectations. The service provides new business opportunities, but also presents new challenges. We have designed and implemented a scalable service framework that supports adaptive bandwidth based on user demands, and the billing based on usage and on QoS. The developed application has been evaluated and the results show that traffic limiting works at optimum and so it does exceeding bandwidth distribution. However, some considerations are done and currently research is under way in two basic areas: (i) development and testing new transfer protocols, and (ii) developing new strategies for traffic improvements based on service differentiation.
Keywords: Differentiated Services, Linux, Quality of Service, queueing disciplines, web application.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 19231587 Design Modelling Control and Simulation of DC/DC Power Buck Converter
Authors: H. Abaali
Abstract:
The power buck converter is the most widely used DC/DC converter topology. They have a very large application area such as DC motor drives, photovoltaic power system which require fast transient responses and high efficiency over a wide range of load current. This work proposes, the modelling of DC/DC power buck converter using state-space averaging method and the current-mode control using a proportional-integral controller. The efficiency of the proposed model and control loop are evaluated with operating point changes. The simulation results proved the effectiveness of the linear model of DC/DC power buck converter.Keywords: DC/DC power buck converter, Linear current control, State-space averaging method.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 34791586 An Empirical Analysis of Earnings Management in Australia
Authors: Lan Sun, Subhrendu Rath
Abstract:
This is a comprehensive large-sample study of Australian earnings management. Using a sample of 4,844 firm-year observations across nine Australia industries from 2000 to 2006, we find substantial corporate earnings management activity across several Australian industries. We document strong evidence of size and return on assets being primary determinants of earnings management in Australia. The effects of size and return on assets are also found to be dominant in both income-increasing and incomedecreasing earnings manipulation. We also document that that periphery sector firms are more likely to involve larger magnitude of earnings management than firms in the core sector.
Keywords: Earnings management, discretionary accruals, income-increasing/decreasing manipulation, dual economy sector
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 37391585 Interactive, Topic-Oriented Search Support by a Centroid-Based Text Categorisation
Authors: Mario Kubek, Herwig Unger
Abstract:
Centroid terms are single words that semantically and topically characterise text documents and so may serve as their very compact representation in automatic text processing. In the present paper, centroids are used to measure the relevance of text documents with respect to a given search query. Thus, a new graphbased paradigm for searching texts in large corpora is proposed and evaluated against keyword-based methods. The first, promising experimental results demonstrate the usefulness of the centroid-based search procedure. It is shown that especially the routing of search queries in interactive and decentralised search systems can be greatly improved by applying this approach. A detailed discussion on further fields of its application completes this contribution.Keywords: Search algorithm, centroid, query, keyword, cooccurrence, categorisation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 6231584 Restarted GMRES Method Augmented with the Combination of Harmonic Ritz Vectors and Error Approximations
Authors: Qiang Niu, Linzhang Lu
Abstract:
Restarted GMRES methods augmented with approximate eigenvectors are widely used for solving large sparse linear systems. Recently a new scheme of augmenting with error approximations is proposed. The main aim of this paper is to develop a restarted GMRES method augmented with the combination of harmonic Ritz vectors and error approximations. We demonstrate that the resulted combination method can gain the advantages of two approaches: (i) effectively deflate the small eigenvalues in magnitude that may hamper the convergence of the method and (ii) partially recover the global optimality lost due to restarting. The effectiveness and efficiency of the new method are demonstrated through various numerical examples.
Keywords: Arnoldi process, GMRES, Krylov subspace, systems of linear equations.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 19381583 Development of Workplace Environmental Monitoring Systems Using Ubiquitous Sensor Network
Authors: Jung-Min Yun, Jong-Hyun Baek, Byoung Ky Kang, Peom Park
Abstract:
In this study, workplace environmental monitoring systems were established using USN(Ubiquitous Sensor Networks) and LabVIEW. Although existing direct sampling methods enable finding accurate values as of the time points of measurement, those methods are disadvantageous in that continuous management and supervision are difficult and costs for are high when those methods are used. Therefore, the efficiency and reliability of workplace management by supervisors are relatively low when those methods are used. In this study, systems were established so that information on workplace environmental factors such as temperatures, humidity and noises is measured and transmitted to the PC in real time to enable supervisors to monitor workplaces through LabVIEW on the PC. When any accidents have occurred in workplaces, supervisors can immediately respond through the monitoring system and this system enables integrated workplace management and the prevention of safety accidents. By introducing these monitoring systems, safety accidents due to harmful environmental factors in workplaces can be prevented and these monitoring systems will be also helpful in finding out the correlation between safety accidents and occupational diseases by comparing and linking databases established by this monitoring system with existing statistical data.Keywords: Ubiquitous Sensor Nework, LabVIEW, Environment Monitoring.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 25451582 Portfolio Simulation in GSM Cellular Telecommunication Industry for Company's Decision and Policies Making
Authors: M. Dachyar, Yudavedito
Abstract:
The rising growth of the GSM cellular phone industry has tightening competition level between providers in making strategies enhancing the market shares in Indonesia. Tsel, as one of those companies, has to determine the proper strategy to sustain as well as improve the market share without reducing its operational income level. Portfolio simulation model is designed with a dynamic system approach. The result of this research is a recommendation to the company by optimizing its technological policies, services, and promotions. The tariff policies and the signal quality should not be the main focus because this company has had a large number of customers and a good infrastructural condition.
Keywords: Telecommunication industry, simulation, dynamic system, portfolio, quality services.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16151581 The Using of Mixing Amines in an Industrial Gas Sweetening Plant
Authors: B. Sohbi, M. Meakaff, M. Emtir, M. Elgarni
Abstract:
Natural gas is defined as gas obtained from a natural underground reservoir. It generally contains a large quantity of methane along with heavier hydrocarbons such as ethane, propane, isobutene, normal butane; also in the raw state it often contains a considerable amount of non hydrocarbons, such as nitrogen and the acid gases (carbon dioxide and hydrogen sulfide). The acid gases must be removed from natural gas before use. One of the processes witch are use in the industry to remove the acid gases from natural gas is the use of alkanolamine process. In this present paper, a simulation study for an industrial gas sweetening plant has been investigated. The aim of the study is to investigate the effect of using mixing amines as solvent on the gas treatment process using the software Hysys.
Keywords: Natural gas, alkanolamine process, gas sweetening plant, simulation, mixing amines.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 38161580 Methodology of Restoration Research in Czech Republic
Authors: M. Rehor, V. Ondracek
Abstract:
Restoration research has become important on principle recently in Czech Republic. The reason is simple. More than 70 % of mined brown coal comes from the North Bohemian Basin these days. Open cast brown coal mining has lead to large damage on the landscape. Reclamation of phytotoxic areas is one of the serious problems in the North Bohemian Basin. It mainly concerns the areas with the occurrence of overburden rocks from the coal bed enriched with coal. The presented paper includes the characteristics of the important phytotoxic areas and the methodology of their reclamation. The results are documented with the long term monitoring of physical, mineralogical, chemical and pedological parameters of rocks in the testing areas.
Keywords: Brown coal, dump, methodology, restoration.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15431579 Flood Scenarios for Hydrological and Hydrodynamic Modelling
Authors: Md. Sharif Imam Ibne Amir, Mohammad Masud Kamal khan, Mohammad Golam Rasul, Raj H Sharma, Fatema Akram
Abstract:
Future flood can be predicted using the probable maximum flood (PMF). PMF is calculated using the historical discharge or rainfall data considering the other climatic parameters remaining stationary. However climate is changing globally and the key climatic variables are temperature, evaporation, rainfall and sea level rise are likely to change. To develop scenarios to a basin or catchment scale these important climatic variables should be considered. Nowadays scenario based on climatic variables is more suitable than PMF. Six scenarios were developed for a large Fitzroy basin and presented in this paper.
Keywords: Climate change, rainfall, potential evaporation, scenario, sea level rise (SLR), sub-catchment.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 33771578 A Visco-elastic Model for High-density Cellulose Insulation Materials
Authors: Jonas Engqvist, Per Hard af Segerstad, Birger Bring, Mathias Wallin
Abstract:
A macroscopic constitutive equation is developed for a high-density cellulose insulation material with emphasis on the outof- plane stress relaxation behavior. A hypothesis is proposed where the total stress is additively composed by an out-of-plane visco-elastic isotropic contribution and an in-plane elastic orthotropic response. The theory is validated against out-of-plane stress relaxation, compressive experiments and in-plane tensile hysteresis, respectively. For large scale finite element simulations, the presented model provides a balance between simplicity and capturing the materials constitutive behaviour.
Keywords: Cellulose insulation materials, constitutive modelling, material characterisation, pressboard.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 22121577 A Review on the Outlook of the Circular Economy in the Automotive Industry
Abstract:
The relationship of the automotive industry with raw material supply is a major challenge and presents obstacles. Automobiles are ones of the most complex products using a large variety of materials. Safety, eco-friendliness and comfort requirements, physical, chemical and economic limitations set the framework in which this industry continuously optimizes the efficient and responsible use of resources. The concept of circular economy covers the issues of waste generation, resource scarcity and economic advantages. However, circularity is already known for the automobile industry – several efforts are done to foster material reuse, product remanufacturing and recycling. The aim of this study is to give an overview on how the producers comply with the growing demands on one hand, and gain efficiency and increase profitability on the other hand from circular economy.
Keywords: Automotive industry, circular economy, international requirements, natural resources.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 39911576 Blue-Collar Workers’ Accidents and Close Call Situations Connected to the Use of Cell Phones among Finns Aged 18–65
Authors: L. Korpinen, R. Pääkkönen, F. Gobba
Abstract:
There has been discussion if the use of mobile phones causes accidents. We studied workers’ accidents and near accidents related to the use of phones. This study is part of a large cross-sectional study that was carried out on 15,000 working-age Finns. We noticed that there were 4–5 times more close call situations than accidents connected to mobile phones and also work related accidents were fewer than leisure related. There are confusing parameters like the use of mobile phones at work, differences in work content between women and men.
Keywords: Blue-collar workers, accident, cell phone, close call situation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14371575 Results of Percutaneous Nephrolithotomy under Spinal Anesthesia
Authors: Babak Borzouei, Seyed Habibollah Mousavi-Bahar
Abstract:
Recently, there has been a considerable increase in the number of procedures carried out under regional anesthesia. However, percutaneous nephrolithotomy (PCNL) procedures are usually performed under general anesthesia. The aim of this study was to assess the safety and efficacy of PCNL under spinal anesthesia in patients with renal calculi. We describe our 9 years experience of performing PCNL under spinal anesthesia for 387 patients with large stones of the upper urinary tract, with regard to the effectiveness and side effects. All patients received spinal anesthetics (Lidocain 5%, or Bupivacaine 0.75%) and underwent PCNL in prone position. The success rate was 94.1%. The incidence of complications was 11.6%. PCNL under spinal anesthesia is feasible, safe, and well-tolerated in management of patients with renal stones.Keywords: percutaneous nephrolithotomy, spinal anesthesia, renal calculi
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 28501574 A Preliminary Study on the Suitability of Data Driven Approach for Continuous Water Level Modeling
Authors: Muhammad Aqil, Ichiro Kita, Moses Macalinao
Abstract:
Reliable water level forecasts are particularly important for warning against dangerous flood and inundation. The current study aims at investigating the suitability of the adaptive network based fuzzy inference system for continuous water level modeling. A hybrid learning algorithm, which combines the least square method and the back propagation algorithm, is used to identify the parameters of the network. For this study, water levels data are available for a hydrological year of 2002 with a sampling interval of 1-hour. The number of antecedent water level that should be included in the input variables is determined by two statistical methods, i.e. autocorrelation function and partial autocorrelation function between the variables. Forecasting was done for 1-hour until 12-hour ahead in order to compare the models generalization at higher horizons. The results demonstrate that the adaptive networkbased fuzzy inference system model can be applied successfully and provide high accuracy and reliability for river water level estimation. In general, the adaptive network-based fuzzy inference system provides accurate and reliable water level prediction for 1-hour ahead where the MAPE=1.15% and correlation=0.98 was achieved. Up to 12-hour ahead prediction, the model still shows relatively good performance where the error of prediction resulted was less than 9.65%. The information gathered from the preliminary results provide a useful guidance or reference for flood early warning system design in which the magnitude and the timing of a potential extreme flood are indicated.Keywords: Neural Network, Fuzzy, River, Forecasting
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 12891573 Critical Success Factors of Information Technology Projects
Authors: Md. Athar Imtiaz, Abduljalil S. Al-Mudhary, Md. Taha Mirhashemi, Roslina Ibrahim
Abstract:
Information Technology (IT) is being used by almost all organizations throughout the world. However its success at supporting and improving business is debatable. There is always the risk of IT project failure and studies have proven that a large number of IT projects indeed do fail. There are many components that further the success of IT projects; these have been studied in previous studies. Studies have found the most necessary components for success in software development projects, executive information systems etc. In this study previous literatures that have looked into these success promoting factors have been critically reviewed and analyzed. 15 Critical Success Factors (CSF) of IT projects were enlisted and examined. These factors can be applied to all IT projects and is not specific to a particular type of IT/IS project. A hypothesis was also generated after the evaluation of the factors.
Keywords: Critical Success Factors, CSF, IT Projects, IS Projects, Software Development Projects.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 124551572 Parallel 2-Opt Local Search on GPU
Authors: Wen-Bao Qiao, Jean-Charles Créput
Abstract:
To accelerate the solution for large scale traveling salesman problems (TSP), a parallel 2-opt local search algorithm with simple implementation based on Graphics Processing Unit (GPU) is presented and tested in this paper. The parallel scheme is based on technique of data decomposition by dynamically assigning multiple K processors on the integral tour to treat K edges’ 2-opt local optimization simultaneously on independent sub-tours, where K can be user-defined or have a function relationship with input size N. We implement this algorithm with doubly linked list on GPU. The implementation only requires O(N) memory. We compare this parallel 2-opt local optimization against sequential exhaustive 2-opt search along integral tour on TSP instances from TSPLIB with more than 10000 cities.Keywords: Doubly linked list, parallel 2-opt, tour division, GPU.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 12251571 NDENet: End-to-End Nighttime Dehazing and Enhancement
Authors: H. Baskar, A. S. Chakravarthy, P. Garg, D. Goel, A. S. Raj, K. Kumar, Lakshya, R. Parvatham, V. Sushant, B. Kumar Rout
Abstract:
In this paper, we present a computer vision task called nighttime dehaze-enhancement. This task aims to jointly perform dehazing and lightness enhancement. Our task fundamentally differs from nighttime dehazing – our goal is to jointly dehaze and enhance scenes, while nighttime dehazing aims to dehaze scenes under a nighttime setting. In order to facilitate further research on this task, we release a benchmark dataset called Reside-β Night dataset, consisting of 4122 nighttime hazed images from 2061 scenes and 2061 ground truth images. Moreover, we also propose a network called NDENet (Nighttime Dehaze-Enhancement Network), which jointly performs dehazing and low-light enhancement in an end-to-end manner. We evaluate our method on the proposed benchmark and achieve Structural Index Similarity (SSIM) of 0.8962 and Peak Signal to Noise Ratio (PSNR) of 26.25. We also compare our network with other baseline networks on our benchmark to demonstrate the effectiveness of our approach. We believe that nighttime dehaze-enhancement is an essential task particularly for autonomous navigation applications, and hope that our work will open up new frontiers in research. The code for our network is made publicly available.
Keywords: Dehazing, image enhancement, nighttime, computer vision.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 6751570 Development of an Efficient CVT using Electromecanical System
Authors: A. A. Shafie, M. H. Ali
Abstract:
Continuously variable transmission (CVT) is a type of automatic transmission that can change the gear ratio to any arbitrary setting within the limits. The most common type of CVT operates on a pulley system that allows an infinite variability between highest and lowest gears with no discrete steps. However, the current CVT system with hydraulic actuation method suffers from the power loss. It needs continuous force for the pulley to clamp the belt and hold the torque resulting in large amount of energy consumption. This study focused on the development of an electromechanical actuated control CVT to eliminate the problem that faced by the existing CVT. It is conducted with several steps; computing and selecting the appropriate sizing for stroke length, lead screw system and etc. From the visual observation it was found that the CVT system of this research is satisfactory.Keywords: CVT, Hydraulic Actuator, Discrete shifts, Electromechanical system, Lead screws.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 22271569 FPGA Implementation of a Vision-Based Blind Spot Warning System
Authors: Yu Ren Lin, Yu Hong Li
Abstract:
Vision-based intelligent vehicle applications often require large amounts of memory to handle video streaming and image processing, which in turn increases complexity of hardware and software. This paper presents an FPGA implement of a vision-based blind spot warning system. Using video frames, the information of the blind spot area turns into one-dimensional information. Analysis of the estimated entropy of image allows the detection of an object in time. This idea has been implemented in the XtremeDSP video starter kit. The blind spot warning system uses only 13% of its logic resources and 95k bits block memory, and its frame rate is over 30 frames per sec (fps).
Keywords: blind-spot area, image, FPGA
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 18361568 Generating Frequent Patterns through Intersection between Transactions
Authors: M. Jamali, F. Taghiyareh
Abstract:
The problem of frequent itemset mining is considered in this paper. One new technique proposed to generate frequent patterns in large databases without time-consuming candidate generation. This technique is based on focusing on transaction instead of concentrating on itemset. This algorithm based on take intersection between one transaction and others transaction and the maximum shared items between transactions computed instead of creating itemset and computing their frequency. With applying real life transactions and some consumption is taken from real life data, the significant efficiency acquire from databases in generation association rules mining.Keywords: Association rules, data mining, frequent patterns, shared itemset.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14041567 Effect of Needle Diameter on the Morphological Structure of Electrospun n-Bi2O3/Epoxy-PVA Nanofiber Mats
Authors: Bassam M. Abunahel, Nurul Zahirah Noor Azman, Munirah Jamil
Abstract:
The effect of needle diameter on the morphological structure of electrospun n-Bi2O3/epoxy-PVA nanofibers has been investigated using three different types of needle diameters. The results were observed and investigated using two techniques of scanning electron microscope (SEM). The first technique is backscattered SEM while the second is secondary electron SEM. The results demonstrate that there is a correlation between the needle diameter and the morphology of electrospun nanofibers. As the internal needle diameter decreases, the average nanofiber diameter decreases and the fibers get thinner and smoother without agglomeration or beads formation. Moreover, with small needle diameter the nanofibrous porosity get larger compared with large needle diameter.
Keywords: Needle diameter, fiber diameter, agglomeration, porosity, SEM.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 10151566 Dominating Set Algorithm and Trust Evaluation Scheme for Secured Cluster Formation and Data Transferring
Authors: Y. Harold Robinson, M. Rajaram, E. Golden Julie, S. Balaji
Abstract:
This paper describes the proficient way of choosing the cluster head based on dominating set algorithm in a wireless sensor network (WSN). The algorithm overcomes the energy deterioration problems by this selection process of cluster heads. Clustering algorithms such as LEACH, EEHC and HEED enhance scalability in WSNs. Dominating set algorithm keeps the first node alive longer than the other protocols previously used. As the dominating set of cluster heads are directly connected to each node, the energy of the network is saved by eliminating the intermediate nodes in WSN. Security and trust is pivotal in network messaging. Cluster head is secured with a unique key. The member can only connect with the cluster head if and only if they are secured too. The secured trust model provides security for data transmission in the dominated set network with the group key. The concept can be extended to add a mobile sink for each or for no of clusters to transmit data or messages between cluster heads and to base station. Data security id preferably high and data loss can be prevented. The simulation demonstrates the concept of choosing cluster heads by dominating set algorithm and trust evaluation using DSTE. The research done is rationalized.
Keywords: Wireless Sensor Networks, LEECH, EEHC, HEED, DSTE.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14061565 The Relationship between the Energy of Gravitational Field and the Representative Pseudotensor
Authors: R. I. Khrapko
Abstract:
As is known, the role of the energy-momentum pseudotensors of the gravitational field is to extend the conservation law to the gravitational interaction by taking into account the energy and momentum of the gravitational field. We calculated the contribution of the Einstein pseudotensor to the total mass of a stationary material body and its gravitational field. It turned out that this contribution is positive, despite the fact that the mass-energy of a stationary gravitational field is negative. We concluded that the pseudotensor incorrectly describes the energy of the gravitational field. Nevertheless, this pseudotensor has been used in a large number of scientific works for 100 years. We explain this by the fact that the covariant component of the pseudotensor was regarded as the mass-energy. Besides, we prove the advantage of the covariant energy-momentum conservation law for matter in the Minkowski space-time.
Keywords: Conservation law, covariant integration, gravitation field, isolated system.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 7481564 User Selections on Social Network Applications
Authors: C. C. Liang
Abstract:
MSN used to be the most popular application for communicating among social networks, but Facebook chat is now the most popular. Facebook and MSN have similar characteristics, including usefulness, ease-of-use, and a similar function, which is the exchanging of information with friends. Facebook outperforms MSN in both of these areas. However, the adoption of Facebook and abandonment of MSN have occurred for other reasons. Functions can be improved, but users’ willingness to use does not just depend on functionality. Flow status has been established to be crucial to users’ adoption of cyber applications and to affects users’ adoption of software applications. If users experience flow in using software application, they will enjoy using it frequently, and even change their preferred application from an old to this new one. However, no investigation has examined choice behavior related to switching from Facebook to MSN based on a consideration of flow experiences and functions. This investigation discusses the flow experiences and functions of social-networking applications. Flow experience is found to affect perceived ease of use and perceived usefulness; perceived ease of use influences information ex-change with friends, and perceived usefulness; information exchange influences perceived usefulness, but information exchange has no effect on flow experience.Keywords: Consumer behavior, social media, technology acceptance model.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14061563 Deterioration Assessment Models for Water Pipelines
Authors: L. Parvizsedghy, I. Gkountis, A. Senouci, T. Zayed, M. Alsharqawi, H. El Chanati, M. El-Abbasy, F. Mosleh
Abstract:
The aging and deterioration of water pipelines in cities worldwide result in more frequent water main breaks, water service disruptions, and flooding damage. Therefore, there is an urgent need for undertaking proper maintenance procedures to avoid breaks and disastrous failures. However, due to budget limitations, the maintenance of water pipeline networks needs to be prioritized through efficient deterioration assessment models. Previous studies focused on the development of structural or physical deterioration assessment models, which require expensive inspection data. But, this paper aims at developing deterioration assessment models for water pipelines using statistical techniques. Several deterioration models were developed based on pipeline size, material type, and soil type using linear regression analysis. The categorical nature of some variables affecting pipeline deterioration was considered through developing several categorical models. The developed models were validated with an average validity percentage greater than 95%. Moreover, sensitivity analysis was carried out against different classifications and it displayed higher importance of age of pipes compared to other factors. The developed models will be helpful for the water municipalities and asset managers to assess the condition of their pipes and prioritize them for maintenance and inspection purposes.
Keywords: Water pipelines, deterioration assessment models, regression analysis.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 12001562 Application of a Novel Audio Compression Scheme in Automatic Music Recommendation, Digital Rights Management and Audio Fingerprinting
Authors: Anindya Roy, Goutam Saha
Abstract:
Rapid progress in audio compression technology has contributed to the explosive growth of music available in digital form today. In a reversal of ideas, this work makes use of a recently proposed efficient audio compression scheme to develop three important applications in the context of Music Information Retrieval (MIR) for the effective manipulation of large music databases, namely automatic music recommendation (AMR), digital rights management (DRM) and audio finger-printing for song identification. The performance of these three applications has been evaluated with respect to a database of songs collected from a diverse set of genres.
Keywords: Audio compression, Music Information Retrieval, Digital Rights Management, Audio Fingerprinting.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15401561 Tribological Behaviour of Si-Cu-Mo-Ni Alloyed Austempered Ductile Iron
Authors: Rajendra M. Galagali, R. G. Tikotkar
Abstract:
Ductile iron samples alloyed with 2.5% Si, 0.78% Cu, 0.421% Mo and 0.151% Ni were austempered at 345 °C and 380 °C for 150 and 180 mins and then tested for wear strength. Ductile iron was also included in the study for comparison purposes. A pin-on-disc machine was employed for wear study. The investigations were carried out for a speed of 3 m/s, under the contact load of 29.43 N with varying sliding distances ranging from 1000 m to 5000 m. The experimental outcome indicates that ADI austempered at 345 °C is more wear resistant than the one austempered at 380 °C. Also for only a sliding distance of 3000 m, both exhibited almost same wear resistance. SEM analysis indicates running sliding marks more or less parallel to one another. Spalled layers and large voids which resemble delamination were observed on worn surface of ADI380. This indicated the occurrence of severe wear. Dark patches observed indicate oxidized surface.
Keywords: Austempered ductile iron, coefficient of friction, dry sliding wear, sliding distance.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 10461560 Interactive Model Based On an Extended CPN
Authors: Shuzhen Yao, Fengjing Zhao, Jianwei He
Abstract:
The UML modeling of complex distributed systems often is a great challenge due to the large amount of parallel real-time operating components. In this paper the problems of verification of such systems are discussed. ECPN, an Extended Colored Petri Net is defined to formally describe state transitions of components and interactions among components. The relationship between sequence diagrams and Free Choice Petri Nets is investigated. Free Choice Petri Net theory helps verifying the liveness of sequence diagrams. By converting sequence diagrams to ECPNs and then comparing behaviors of sequence diagram ECPNs and statecharts, the consistency among models is analyzed. Finally, a verification process for an example model is demonstrated.
Keywords: Consistency, liveness, Petri Net, sequence diagram.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16111559 The Problem of Using the Calculation of the Critical Path to Solver Instances of the Job Shop Scheduling Problem
Authors: Marco Antonio Cruz-Chávez, Juan Frausto-Solís, Fernando Ramos-Quintana
Abstract:
A procedure commonly used in Job Shop Scheduling Problem (JSSP) to evaluate the neighborhoods functions that use the non-deterministic algorithms is the calculation of the critical path in a digraph. This paper presents an experimental study of the cost of computation that exists when the calculation of the critical path in the solution for instances in which a JSSP of large size is involved. The results indicate that if the critical path is use in order to generate neighborhoods in the meta-heuristics that are used in JSSP, an elevated cost of computation exists in spite of the fact that the calculation of the critical path in any digraph is of polynomial complexity.
Keywords: Job Shop, CPM, critical path, neighborhood, meta-heuristic.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2303