Search results for: weak law of large numbers.
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2891

Search results for: weak law of large numbers.

2711 Player Number Localization and Recognition in Soccer Video using HSV Color Space and Internal Contours

Authors: Matko Šaric, Hrvoje Dujmic, Vladan Papic, Nikola Rožic

Abstract:

Detection of player identity is challenging task in sport video content analysis. In case of soccer video player number recognition is effective and precise solution. Jersey numbers can be considered as scene text and difficulties in localization and recognition appear due to variations in orientation, size, illumination, motion etc. This paper proposed new method for player number localization and recognition. By observing hue, saturation and value for 50 different jersey examples we noticed that most often combination of low and high saturated pixels is used to separate number and jersey region. Image segmentation method based on this observation is introduced. Then, novel method for player number localization based on internal contours is proposed. False number candidates are filtered using area and aspect ratio. Before OCR processing extracted numbers are enhanced using image smoothing and rotation normalization.

Keywords: player number, soccer video, HSV color space

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1974
2710 Usability Evaluation of Online News Websites: A User Perspective Approach

Authors: Qasem A. Al-Radaideh, Emad Abu-Shanab, Shaima Hamam, Hani Abu-Salem

Abstract:

Online news websites are one of the main and wide areas of Mass Media. Since the nineties several Jordanian newspapers were introduced to the World Wide Web to reach various and large numbers of audiances. Examples of these newspapers that have online version are Al-Rai, Ad-Dustor and AlGhad. Other pure online news websites include Ammon and Rum. The main aim of this study is to evaluate online newspaper websites using two assessment measures; usability and web content. This aim is achieved by using a questionnaire based evaluation which is based on the definition of usability and web content in the ISO document as the standard number 9241-part 11. The results are obtained based on 204 audiences- responses. The results of the research showed that the usability factor is relatively good for all Jordanian online newspapers whereas the web content factor is moderate.

Keywords: Communication and mass media, Jordanian online news websites, website content, website usability.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4219
2709 Tobephobia: Teachers- Ineptitude to Manage Curriculum Change

Authors: P. Singh

Abstract:

In this paper, Tobephobia (TBP) alludes to the fear of failure experienced by teachers to manage curriculum change. TBP is an emerging concept and it extends the boundaries of research in terms of how we view achievement and failure in education. Outcomes-based education (OBE) was introduced fifteen years ago in South African schools without simultaneously upgrading teachers- professional competencies. This exploratory research, therefore examines a simple question: What is the impact of TBP and OBE on teachers? Teacher ineptitude to cope with the OBE curriculum in the classroom is a serious problem affecting large numbers of South African teachers. This exploratory study sought to determine the perceived negative impact of OBE and TBP on teachers. A survey was conducted amongst 311 teachers in Port Elizabeth and Durban, South Africa. The results confirm the very negative impact of TBP and OBE on teachers. This exploratory study authenticates the existence of TBP.

Keywords: Curriculum change, fear of failure in education, outcomes-based education, Tobephobia.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2120
2708 Analytical Solution for Compressible Gas Flow Inside a Two-Dimensional Poiseuille Flow in Microchannels with Constant Heat Flux Including the Creeping Effect

Authors: Amir Reza Ghahremani, Salman SafariMohsenabad, Mohammad Behshad Shafii

Abstract:

To achieve reliable solutions, today-s numerical and experimental activities need developing more accurate methods and utilizing expensive facilities, respectfully in microchannels. The analytical study can be considered as an alternative approach to alleviate the preceding difficulties. Among the analytical solutions, those with high robustness and low complexities are certainly more attractive. The perturbation theory has been used by many researchers to analyze microflows. In present work, a compressible microflow with constant heat flux boundary condition is analyzed. The flow is assumed to be fully developed and steady. The Mach and Reynolds numbers are also assumed to be very small. For this case, the creeping phenomenon may have some effect on the velocity profile. To achieve robustness solution it is assumed that the flow is quasi-isothermal. In this study, the creeping term which appears in the slip boundary condition is formulated by different mathematical formulas. The difference between this work and the previous ones is that the creeping term is taken into account and presented in non-dimensionalized form. The results obtained from perturbation theory are presented based on four non-dimensionalized parameters including the Reynolds, Mach, Prandtl and Brinkman numbers. The axial velocity, normal velocity and pressure profiles are obtained. Solutions for velocities and pressure for two cases with different Br numbers are compared with each other and the results show that the effect of creeping phenomenon on the velocity profile becomes more important when Br number is less than O(ε).

Keywords: Creeping Effect, Microflow, Slip, Perturbation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2457
2707 A Novel Method for the Characterization of Synchronization and Coupling in Multichannel EEG and ECoG

Authors: Manfred Hartmann, Andreas Graef, Hannes Perko, Christoph Baumgartner, Tilmann Kluge

Abstract:

In this paper we introduce a novel method for the characterization of synchronziation and coupling effects in multivariate time series that can be used for the analysis of EEG or ECoG signals recorded during epileptic seizures. The method allows to visualize the spatio-temporal evolution of synchronization and coupling effects that are characteristic for epileptic seizures. Similar to other methods proposed for this purpose our method is based on a regression analysis. However, a more general definition of the regression together with an effective channel selection procedure allows to use the method even for time series that are highly correlated, which is commonly the case in EEG/ECoG recordings with large numbers of electrodes. The method was experimentally tested on ECoG recordings of epileptic seizures from patients with temporal lobe epilepsies. A comparision with the results from a independent visual inspection by clinical experts showed an excellent agreement with the patterns obtained with the proposed method.

Keywords: EEG, epilepsy, regression analysis, seizurepropagation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1422
2706 A Boundary Fitted Nested Grid Model for Tsunami Computation along Penang Island in Peninsular Malaysia

Authors: Md. Fazlul Karim, Ahmad Izani Ismail, Mohammed Ashaque Meah

Abstract:

This paper focuses on the development of a 2-D boundary fitted and nested grid (BFNG) model to compute the tsunami propagation of Indonesian tsunami 2004 along the coastal region of Penang in Peninsular Malaysia.

In the presence of a curvilinear coastline, boundary fitted grids are suitable to represent the model boundaries accurately. On the other hand, when large gradient of velocity within a confined area is expected, the use of a nested grid system is appropriate to improve the numerical accuracy with the least grid numbers.

This paper constructs a shallow water nested and orthogonal boundary fitted grid model and presents computational results of the tsunami impact on the Penang coast due to the Indonesian tsunami of 2004. The results of the numerical simulations are compared with available data.

Keywords: Boundary Fitted Nested Model, Tsunami, Penang Island, 2004 Indonesian Tsunami.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1875
2705 The Genesis of the Anomalous Sernio Fan, Valtellina, Northern Italy

Authors: E. De Finis, P. Gattinoni, L. Scesi

Abstract:

Massive rock avalanches formed some of the largest landslide deposits on Earth and they represent one of the major geohazards in high-relief mountains. This paper interprets a very large sedimentary fan (the Sernio fan, Valtellina, Northern Italy), located 20 Km SW from Val Pola Rock avalanche (1987), as the deposit of a partial collapse of a Deep Seated Gravitational Slope Deformation (DSGSD), afterwards eroded and buried by debris flows. The proposed emplacement sequence has been reconstructed based on geomorphological, structural and mechanical evidences. The Sernio fan is actually considered anomalous with reference to the very high ratio between the fan area (≈ 4.5km2) and the basin area (≈ 3km2). The morphology of the fan area is characterised by steep slopes (dip ≈ 20%) and the fan apex is extended for 1.8 km inside the small catchment basin. This sedimentary fan was originated by a landslide that interested a part of a large deep-seated gravitational slope deformation, involving a wide area of about 55 km². The main controlling factor is tectonic and it is related to the proximity to regional fault systems and the consequent occurrence of fault weak rocks (GSI locally lower than 10 with compressive stress lower than 20MPa). Moreover, the fan deposit shows sedimentary evidences of recent debris flow events. The best current explanation of the Sernio fan involves an initial failure of some hundreds of Mm3. The run-out was quite limited because of the morphology of Valtellina’s valley floor, and the deposit filled the main valley forming a landslide dam, as confirmed by the lacustrine deposits detected upstream the fan. Nowadays the debris flow events represent the main hazard in the study area.

Keywords: Anomalous sedimentary fans, debris flow, deep seated gravitational slope deformation, Italy, rock avalanche.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1738
2704 “Magnetic Cleansing” for the Provision of a ‘Quick Clean’ to Oiled Wildlife

Authors: Lawrence N. Ngeh, John D. Orbell, Stephen W. Bigger, Kasup Munaweera, Peter Dann

Abstract:

This research is part of a broad program aimed at advancing the science and technology involved in the rescue and rehabilitation of oiled wildlife. One aspect of this research involves the use of oil-sequestering magnetic particles for the removal of contaminants from plumage – so-called “magnetic cleansing". This treatment offers a number of advantages over conventional detergent-based methods including portability - which offers the possibility of providing a “quick clean" to the animal upon first encounter in the field. This could be particularly advantageous when the contaminant is toxic and/or corrosive and/or where there is a delay in transporting the victim to a treatment centre. The method could also be useful as part of a stabilization protocol when large numbers of affected animals are awaiting treatment. This presentation describes the design, development and testing of a prototype field kit for providing a “quick clean" to contaminated wildlife in the field.

Keywords: Magnetic Particles, Oiled Wildlife, Quick Clean, Wildlife Rehabilitation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1845
2703 Preparation a Study on the Use of the Resident Registration Number and Alternatives for RRN

Authors: Hyejin Pak, Changsoo Kim, Healahng Choi

Abstract:

The resident registration number was adopted for the purposes of enhanced services for resident convenience and effective performance of governmental administrative affairs. However, it has been used for identification purposes customarily and irrationally in line with the development and spread of the Internet. In response to the growing concern about the leakage of collected RRNs and possible abuses of stolen RRNs, e.g. identity theft, for crimes, the Korean Communications Commission began to take legal/regulatory actions in 2011 to minimize the online collection and use of resident registration numbers. As the use of the RRN was limited after the revision of the Act on Promotion of Information and Communications Network Utilization and Information Protection, etc., online business providers were required to have alternatives to the RRN for the purpose of identifying the user's identity and age, in compliance with the law, and settling disputes with customers. This paper presents means of verifying the personal identity by taking advantage of the commonly used infrastructure and simply replacing personal information entered and stored, without requiring users to enter their RRNs.

Keywords: Resident Registration Numbers(RRNs), Alternative identification for RRNs.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1901
2702 Spurious Crests in Second-Order Waves

Authors: M. A. Tayfun

Abstract:

Occurrences of spurious crests on the troughs of large, relatively steep second-order Stokes waves are anomalous and not an inherent characteristic of real waves. Here, the effects of such occurrences on the statistics described by the standard second-order stochastic model are examined theoretically and by way of simulations. Theoretical results and simulations indicate that when spurious occurrences are sufficiently large, the standard model leads to physically unrealistic surface features and inaccuracies in the statistics of various surface features, in particular, the troughs and thus zero-crossing heights of large waves. Whereas inaccuracies can be fairly noticeable for long-crested waves in both deep and shallower depths, they tend to become relatively insignificant in directional waves.

Keywords: Large waves, non-linear effects, simulation, spectra, spurious crests, Stokes waves, wave breaking, wave statistics.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1306
2701 The Impact of Corporate Governance Regulation in the Nigerian Banking Sector

Authors: Simisola I. Akintoye, Sunday K. Iyaniwura

Abstract:

Recent global corporate failures have called for increase in the need to regulate corporate governance across the world. In Nigeria, the impact of corporate governance regulation in the banking sector has reached epidemic levels contributing to the country’s economic depression. This study critically evaluates Nigeria’s corporate governance regime and explores how weak regulation has impacted on the banking sector. By adopting a socio legal methodology, the study analyses both theoretical and empirical works from a socio-scientific point of view to examine the role of Nigeria’s legal, cultural and social arrangements in corporate governance regulation. The study reveals that Nigeria’s institutional arrangement has contributed to its weak system of corporate governance regulation with adverse effects on the banking sector. The research mainly impacts on current global corporate governance literature in sub-Saharan Africa by contributing to knowledge of the peculiarities of corporate governance regulation in different institutional jurisdictions. The particular focus on emerging economies such as Nigeria expands on the need for countries to develop a bespoke system of corporate governance regulation that takes into consideration the peculiarities of individual countries devoid of external influence.

Keywords: Banks, corporate governance, emerging economies, Nigeria.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1623
2700 Weighted Harmonic Arnoldi Method for Large Interior Eigenproblems

Authors: Zhengsheng Wang, Jing Qi, Chuntao Liu, Yuanjun Li

Abstract:

The harmonic Arnoldi method can be used to find interior eigenpairs of large matrices. However, it has been shown that this method may converge erratically and even may fail to do so. In this paper, we present a new method for computing interior eigenpairs of large nonsymmetric matrices, which is called weighted harmonic Arnoldi method. The implementation of the method has been tested by numerical examples, the results show that the method converges fast and works with high accuracy.

Keywords: Harmonic Arnoldi method, weighted harmonic Arnoldi method, eigenpair, interior eigenproblem, non symmetric matrix.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1540
2699 Military Combat Aircraft Selection Using Trapezoidal Fuzzy Numbers with the Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS)

Authors: C. Ardil

Abstract:

This article presents a new approach to uncertainty, vagueness, and imprecision analysis for ranking alternatives with fuzzy data for decision making using the Technique for Order Preference by Similarity to Ideal Solution (TOPSIS). In the proposed approach, fuzzy decision information related to the aircraft selection problem is taken into account in ranking the alternatives and selecting the best one. The basic procedural step is to transform the fuzzy decision matrices into matrices of alternatives evaluated according to all decision criteria. A numerical example illustrates the proposed approach for the military combat aircraft selection problem.

Keywords: trapezoidal fuzzy numbers, multiple criteria decision making analysis, decision making, aircraft selection, MCDMA, fuzzy TOPSIS

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 455
2698 An Ontology Abstract Machine

Authors: Leong Lee, Jennifer Leopold, Julia Albath, Alton Coalter

Abstract:

As more people from non-technical backgrounds are becoming directly involved with large-scale ontology development, the focal point of ontology research has shifted from the more theoretical ontology issues to problems associated with the actual use of ontologies in real-world, large-scale collaborative applications. Recently the National Science Foundation funded a large collaborative ontology development project for which a new formal ontology model, the Ontology Abstract Machine (OAM), was developed to satisfy some unique functional and data representation requirements. This paper introduces the OAM model and the related algorithms that enable maintenance of an ontology that supports node-based user access. The successful software implementation of the OAM model and its subsequent acceptance by a large research community proves its validity and its real-world application value.

Keywords: Ontology, Abstract Machine, Ontology Editor, WebbasedOntology Management System.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1399
2697 Simulations of Laminar Liquid Flows through Superhydrophobic Micro-Pipes

Authors: Mohamed E. Eleshaky

Abstract:

This paper investigates the dynamic behavior of laminar water flows inside superhydrophobic micro-pipes patterned with square micro-posts features under different operating conditions. It also investigates the effects of air fraction and Reynolds number on the frictional performance of these pipes. Rather than modeling the air-water interfaces of superhydrophobic as a flat inflexible surface, a transient, incompressible, three-dimensional, volume-of-fluid (VOF) methodology has been employed to continuously track the air–water interface shape inside micro-pipes. Also, the entrance effects on the flow field have been taken into consideration. The results revealed the strong dependency of the frictional performance on the air fractions and Reynolds number. The frictional resistance reduction becomes increasingly more significant at large air fractions and low Reynolds numbers. Increasing Reynolds number has an adverse effect on the frictional resistance reduction.

Keywords: Drag reduction, laminar flow in micropipes, numerical simulation, superhyrophobic surfaces, microposts.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1942
2696 Efficient Implementation of Serial and Parallel Support Vector Machine Training with a Multi-Parameter Kernel for Large-Scale Data Mining

Authors: Tatjana Eitrich, Bruno Lang

Abstract:

This work deals with aspects of support vector learning for large-scale data mining tasks. Based on a decomposition algorithm that can be run in serial and parallel mode we introduce a data transformation that allows for the usage of an expensive generalized kernel without additional costs. In order to speed up the decomposition algorithm we analyze the problem of working set selection for large data sets and analyze the influence of the working set sizes onto the scalability of the parallel decomposition scheme. Our modifications and settings lead to improvement of support vector learning performance and thus allow using extensive parameter search methods to optimize classification accuracy.

Keywords: Support Vector Machines, Shared Memory Parallel Computing, Large Data

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1574
2695 The Projection Methods for Computing the Pseudospectra of Large Scale Matrices

Authors: Zhengsheng Wang, Xiangyong Ji, Yong Du

Abstract:

The projection methods, usually viewed as the methods for computing eigenvalues, can also be used to estimate pseudospectra. This paper proposes a kind of projection methods for computing the pseudospectra of large scale matrices, including orthogonalization projection method and oblique projection method respectively. This possibility may be of practical importance in applications involving large scale highly nonnormal matrices. Numerical algorithms are given and some numerical experiments illustrate the efficiency of the new algorithms.

Keywords: Pseudospectra, eigenvalue, projection method, Arnoldi, IOM(q)

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1315
2694 Multiple Criteria Decision Making for Turkish Air Force Stealth Fighter Aircraft Selection

Authors: C. Ardil

Abstract:

Neutrosophic logic decision analysis is proposed as a method of stealth fighter aircraft selection for Turkish Air Force. The opinion of experts is employed to rank the alternatives across a set of criteria. The analyst uses neutrosophic logic numbers to describe the experts' preferences. This approach can handle the situation in the case of unavailability of precise data, which is most commonly the case in stealth fighter aircraft selection. Neutrosophic logic numbers can consider the imprecision of the factors affecting decision making such as stealth analysis, survivability analysis, and performance analysis. Neutrosophic logic ranking is achieved using weighted arithmetic operator and weighted geometric operator and the alternatives are ranked from best to worst. An example is also presented to illustrate the applicability and effectiveness of the proposed method. 

Keywords: Neutrosophic set theory, stealth fighter aircraft selection, multiple criteria decision-making, neutrosophic logic decision making, Turkish Air Force, MCDM

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 478
2693 Strengthening of RC Beams Containing Large Opening at Flexure with CFRP laminates

Authors: S.C. Chin, N. Shafiq, M.F. Nuruddin

Abstract:

This paper presents the study of strengthening R/C beams with large circular and square opening located at flexure zone by Carbon Fiber Reinforced Polymer (CFRP) laminates. A total of five beams were tested to failure under four point loading to investigate the structural behavior including crack patterns, failure mode, ultimate load and load deflection behaviour. Test results show that large opening at flexure reduces the beam capacity and stiffness; and increases cracking and deflection. A strengthening configuration was designed for each un-strengthened beams based on their respective crack patterns. CFRP laminates remarkably restore the beam capacity of beam with large circular opening at flexure location while 10% re-gain of beam capacity with square opening. The use of CFRP laminates with the designed strengthening configuration could significantly reduce excessive cracking and deflection and increase the ultimate capacity and stiffness of beam.

Keywords: CFRP, large opening, R/C beam, strengthening

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3762
2692 Numerical Investigation of Heat Transfer in a Channel with Delta Winglet Vortex Generators at Different Reynolds Numbers

Authors: N. K. Singh

Abstract:

In this study the augmentation of heat transfer in a rectangular channel with triangular vortex generators is evaluated. The span wise averaged Nusselt number, mean temperature and total heat flux are compared with and without vortex generators in the channel at a blade angle of 30° for Reynolds numbers 800, 1200, 1600, and 2000. The use of vortex generators increases the span wise averaged Nusselt number compared to the case without vortex generators considerably. At a particular blade angle, increasing the Reynolds number results in an enhancement in the overall performance and span wise averaged Nusselt number was found to be greater at particular location for larger Reynolds number. The total heat flux from the bottom wall with vortex generators was found to be greater than that without vortex generators and the difference increases with increase in Reynolds number.

Keywords: Heat transfer, channel with vortex generators, numerical simulation, effect of Reynolds number on heat transfer.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2430
2691 Effects of a Recreational Workout Program on Task-Analyzed Exercise Performance of Adults with Severe Cognitive Impairments

Authors: Jiabei Zhang, Amanda Rapelje, Christopher Farr, Kristin Colwell, Zezhao Chen

Abstract:

The purpose of this study was to investigate the effectiveness of a recreational workout program for adults with disabilities over two semesters. This investigation was an action study conducted in a naturalistic setting. Participants included equal numbers of adults with severe cognitive impairments (n = 35) and adults without disabilities (n = 35). Adults with disabilities severe cognitive impairments were trained 6 self-initiated workout activities over two semesters by adults without disabilities. The numbers of task-analyzed steps of each activity performed correctly by each participant at the first and last weeks of each semester were used for data analysis. Results of the paired t-tests indicate that across two semesters, significant differences between the first and last weeks were found on 4 out of the 6 task-analyzed workout activities at a statistical level of significance p < .05. The recreational workout program developed in this study was effective.

Keywords: Workout program, exercise performance, adults, sever cognitive impairment.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1266
2690 Reflections on Opportunities and Challenges for Systems Engineering

Authors: Ali E. Abbas

Abstract:

This paper summarizes some of the discussions that occurred in a workshop in West Virginia, U.S.A which was sponsored by the National Science Foundation (NSF) in February 2016. The goal of the workshop was to explore the opportunities and challenges for applying systems engineering in large enterprises, and some of the issues that still persist. The main topics of the discussion included challenges with elaboration and abstraction in large systems, interfacing physical and social systems, and the need for axiomatic frameworks for large enterprises. We summarize these main points of discussion drawing parallels with decision making in organizations to instigate research in these discussion areas.

Keywords: Decision analysis, systems engineering, framing, value creation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 926
2689 Effect of Inertia on the Fractal Dimension of Particle Line in three-dimensional Turbulent Flows using Kinematic Simulation

Authors: A. Abou El-Azm Aly, F. Nicolleau, T. M. Michelitsch, A. F. Nowakowski

Abstract:

The dispersion of heavy particles line in an isotropic and incompressible three-dimensional turbulent flow has been studied using the Kinematic Simulation techniques to find out the evolution of the line fractal dimension. In this study, the fractal dimension of the line is found for different cases of heavy particles inertia (different Stokes numbers) in the absence of the particle gravity with a comparison with the fractal dimension obtained in the diffusion case of material line at the same Reynolds number. It can be concluded for the dispersion of heavy particles line in turbulent flow that the particle inertia affect the fractal dimension of a line released in a turbulent flow for Stokes numbers 0.02 < St < 2. At the beginning for small times, most of the different cases are not affected by the inertia until a certain time, the particle response time τa, with larger time as the particles inertia increases, the fractal dimension of the line increases owing to the particles becoming more sensitive to the small scales which cause the change in the line shape during its journey.

Keywords: Heavy particles, two-phase flow, Kinematic Simulation, Fractal dimension.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1255
2688 Deterministic Random Number Generator Algorithm for Cryptosystem Keys

Authors: Adi A. Maaita, Hamza A. A. Al_Sewadi

Abstract:

One of the crucial parameters of digital cryptographic systems is the selection of the keys used and their distribution. The randomness of the keys has a strong impact on the system’s security strength being difficult to be predicted, guessed, reproduced, or discovered by a cryptanalyst. Therefore, adequate key randomness generation is still sought for the benefit of stronger cryptosystems. This paper suggests an algorithm designed to generate and test pseudo random number sequences intended for cryptographic applications. This algorithm is based on mathematically manipulating a publically agreed upon information between sender and receiver over a public channel. This information is used as a seed for performing some mathematical functions in order to generate a sequence of pseudorandom numbers that will be used for encryption/decryption purposes. This manipulation involves permutations and substitutions that fulfill Shannon’s principle of “confusion and diffusion”. ASCII code characters were utilized in the generation process instead of using bit strings initially, which adds more flexibility in testing different seed values. Finally, the obtained results would indicate sound difficulty of guessing keys by attackers.

Keywords: Cryptosystems, Information Security agreement, Key distribution, Random numbers.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3424
2687 Design and Implementation of Secure Electronic Payment System (Client)

Authors: Pyae Pyae Hun

Abstract:

Secure electronic payment system is presented in this paper. This electronic payment system is to be secure for clients such as customers and shop owners. The security architecture of the system is designed by RC5 encryption / decryption algorithm. This eliminates the fraud that occurs today with stolen credit card numbers. The symmetric key cryptosystem RC5 can protect conventional transaction data such as account numbers, amount and other information. This process can be done electronically using RC5 encryption / decryption program written by Microsoft Visual Basic 6.0. There is no danger of any data sent within the system being intercepted, and replaced. The alternative is to use the existing network, and to encrypt all data transmissions. The system with encryption is acceptably secure, but that the level of encryption has to be stepped up, as computing power increases. Results In order to be secure the system the communication between modules is encrypted using symmetric key cryptosystem RC5. The system will use simple user name, password, user ID, user type and cipher authentication mechanism for identification, when the user first enters the system. It is the most common method of authentication in most computer system.

Keywords: A 128-bit block cipher, Microsoft visual basic 6.0, RC5 encryption /decryption algorithm and TCP/IP protocol.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2364
2686 Current Status of Industry 4.0 in Material Handling Automation and In-house Logistics

Authors: Orestis Κ. Efthymiou, Stavros T. Ponis

Abstract:

In the last decade, a new industrial revolution seems to be emerging, supported -once again- by the rapid advancements of Information Technology in the areas of Machine-to-Machine (M2M) communication permitting large numbers of intelligent devices, e.g. sensors to communicate with each other and take decisions without any or minimum indirect human intervention. The advent of these technologies have triggered the emergence of a new category of hybrid (cyber-physical) manufacturing systems, combining advanced manufacturing techniques with innovative M2M applications based on the Internet of Things (IoT), under the umbrella term Industry 4.0. Even though the topic of Industry 4.0 has attracted much attention during the last few years, the attempts of providing a systematic literature review of the subject are scarce. In this paper, we present the authors’ initial study of the field with a special focus on the use and applications of Industry 4.0 principles in material handling automations and in-house logistics. Research shows that despite the vivid discussion and attractiveness of the subject, there are still many challenges and issues that have to be addressed before Industry 4.0 becomes standardized and widely applicable.

Keywords: Industry 4.0, internet of things, manufacturing systems, material handling, logistics.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1648
2685 Numerical Study of Transient Laminar Natural Convection Cooling of high Prandtl Number Fluids in a Cubical Cavity: Influence of the Prandtl Number

Authors: O. Younis, J. Pallares, F. X. Grau

Abstract:

This paper presents and discusses the numerical simulations of transient laminar natural convection cooling of high Prandtl number fluids in cubical cavities, in which the six walls of the cavity are subjected to a step change in temperature. The effect of the fluid Prandtl number on the heat transfer coefficient is studied for three different fluids (Golden Syrup, Glycerin and Glycerin-water solution 50%). The simulations are performed at two different Rayleigh numbers (5·106 and 5·107) and six different Prandtl numbers (3 · 105 ≥Pr≥ 50). Heat conduction through the cavity glass walls is also considered. The propsed correlations of the averaged heat transfer coefficient (N u) showed that it is dependant on the initial Ra and almost independent on P r. The instantaneous flow patterns, temperature contours and time evolution of volume averaged temperature and heat transfer coefficient are presented and analyzed.

Keywords: Transient natural convection, High Prandtl number, variable viscosity.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2446
2684 3D Liver Segmentation from CT Images Using a Level Set Method Based on a Shape and Intensity Distribution Prior

Authors: Nuseiba M. Altarawneh, Suhuai Luo, Brian Regan, Guijin Tang

Abstract:

Liver segmentation from medical images poses more challenges than analogous segmentations of other organs. This contribution introduces a liver segmentation method from a series of computer tomography images. Overall, we present a novel method for segmenting liver by coupling density matching with shape priors. Density matching signifies a tracking method which operates via maximizing the Bhattacharyya similarity measure between the photometric distribution from an estimated image region and a model photometric distribution. Density matching controls the direction of the evolution process and slows down the evolving contour in regions with weak edges. The shape prior improves the robustness of density matching and discourages the evolving contour from exceeding liver’s boundaries at regions with weak boundaries. The model is implemented using a modified distance regularized level set (DRLS) model. The experimental results show that the method achieves a satisfactory result. By comparing with the original DRLS model, it is evident that the proposed model herein is more effective in addressing the over segmentation problem. Finally, we gauge our performance of our model against matrices comprising of accuracy, sensitivity, and specificity.

Keywords: Bhattacharyya distance, distance regularized level set (DRLS) model, liver segmentation, level set method.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2333
2683 Assessment of Performance Measures of Large-Scale Power Systems

Authors: Mohamed A. El-Kady, Badr M. Alshammari

Abstract:

In a recent major industry-supported research and development study, a novel framework was developed and applied for assessment of reliability and quality performance levels in reallife power systems with practical large-scale sizes. The new assessment methodology is based on three metaphors (dimensions) representing the relationship between available generation capacities and required demand levels. The paper shares the results of the successfully completed stud and describes the implementation of the new methodology on practical zones in the Saudi electricity system.

Keywords: Power systems; large-scale analysis, reliability; performance assessment, linear programming.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1837
2682 Experimental Study on Using the Aluminum Sacrificial Anode as a Cathodic Protection for Marine Structures

Authors: A. Radwan, A. Elbatran, A. Mehanna, M. Shehadeh

Abstract:

The corrosion is natural chemical phenomenon that is applied in many engineering structures. Hence, it is one of the important topics to study in the engineering research. Ship and offshore structures are most exposed to corrosion due to the presence of corrosive medium of air and the seawater. Consequently, investigation of the corrosion behavior and properties over ship and offshore hulls is one of the important topics to study in the marine engineering research. Using sacrificial anode is the most popular solution for protecting marine structures from corrosion. Hence, this research investigates the extent of corrosion between the composite ship model and relative velocity of water, along with the sacrificial aluminum anode consumption and its degree of protection in seawater. In this study, the consumption rate of sacrificial aluminum anode with respect to relative velocity at different Reynold’s numbers was studied experimentally, and it was found that, the degree of cathodic protection represented by the cathode potential at a given distance from the aluminum anode was decreased slightly with increment of the relative velocity.

Keywords: Corrosion, Reynold’s numbers, sacrificial anode, velocity.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1985