Search results for: VR applications
3438 Clinical Study of the Prunus dulcis (Almond) Shell Extract on Tinea capitis Infection
Authors: Nasreen Thebo, W. Shaikh, A. J. Laghari, P. Nangni
Abstract:
Prunus dulcis (Almond) shell extract is demonstrated for its biomedical applications. Shell extract prepared by soxhlet method and further characterized by UV-Visible spectrophotometer, atomic absorption spectrophotometer (AAS), FTIR, GC-MS techniques. In this study, the antifungal activity of almond shell extract was observed against clinically isolated pathogenic fungi by strip method. The antioxidant potential of crude shell extract of was evaluated by using DPPH (2-2-diphenyl-1-picryhydrazyl) and radical scavenging system. The possibility of short term therapy was only 20 days. The total antioxidant activity varied from 94.38 to 95.49% and total phenolic content was found as 4.455 mg/gm in almond shell extract. Finally the results provide a great therapeutic potential against Tinea capitis infection of scalp. Included in this study of shell extract that show scientific evidence for clinical efficacy, as well as found to be more useful in the treatment of dermatologic disorders and without any doubt it can be recommended to be Patent.Keywords: Tinea capitis, DPPH, FTIR, GC-MS therapeutic treatment
Procedia PDF Downloads 3783437 SC-LSH: An Efficient Indexing Method for Approximate Similarity Search in High Dimensional Space
Authors: Sanaa Chafik, Imane Daoudi, Mounim A. El Yacoubi, Hamid El Ouardi
Abstract:
Locality Sensitive Hashing (LSH) is one of the most promising techniques for solving nearest neighbour search problem in high dimensional space. Euclidean LSH is the most popular variation of LSH that has been successfully applied in many multimedia applications. However, the Euclidean LSH presents limitations that affect structure and query performances. The main limitation of the Euclidean LSH is the large memory consumption. In order to achieve a good accuracy, a large number of hash tables is required. In this paper, we propose a new hashing algorithm to overcome the storage space problem and improve query time, while keeping a good accuracy as similar to that achieved by the original Euclidean LSH. The Experimental results on a real large-scale dataset show that the proposed approach achieves good performances and consumes less memory than the Euclidean LSH.Keywords: approximate nearest neighbor search, content based image retrieval (CBIR), curse of dimensionality, locality sensitive hashing, multidimensional indexing, scalability
Procedia PDF Downloads 3213436 Field Application of Reduced Crude Conversion Spent Lime
Authors: Brian H. Marsh, John H. Grove
Abstract:
Gypsum is being applied to ameliorate subsoil acidity and to overcome the problem of very slow lime movement from surface lime applications. Reduced Crude Conversion Spent Lime (RCCSL) containing anhydrite was evaluated for use as a liming material with specific consideration given to the movement of sulfate into the acid subsoil. Agricultural lime and RCCSL were applied at 0, 0.5, 1.0, and 1.5 times the lime requirement of 6.72 Mg ha-1 to an acid Trappist silt loam (Typic Hapuldult). Corn [Zea mays (L.)]was grown following lime material application and soybean [Glycine max (L.) Merr.]was grown in the second year. Soil pH increased rapidly with the addition of the RCCSL material. Over time there was no difference in soil pH between the materials but there was with increasing rate. None of the observed changes in plant nutrient concentration had an impact on yield. Grain yield was higher for the RCCSL amended treatments in the first year but not in the second. There was a significant increase in soybean grain yield from the full lime requirement treatments over no lime.Keywords: soil acidity, corn, soybean, liming materials
Procedia PDF Downloads 3583435 Error Probability of Multi-User Detection Techniques
Authors: Komal Babbar
Abstract:
Multiuser Detection is the intelligent estimation/demodulation of transmitted bits in the presence of Multiple Access Interference. The authors have presented the Bit-error rate (BER) achieved by linear multi-user detectors: Matched filter (which treats the MAI as AWGN), Decorrelating and MMSE. In this work, authors investigate the bit error probability analysis for Matched filter, decorrelating, and MMSE. This problem arises in several practical CDMA applications where the receiver may not have full knowledge of the number of active users and their signature sequences. In particular, the behavior of MAI at the output of the Multi-user detectors (MUD) is examined under various asymptotic conditions including large signal to noise ratio; large near-far ratios; and a large number of users. In the last section Authors also shows Matlab Simulation results for Multiuser detection techniques i.e., Matched filter, Decorrelating, MMSE for 2 users and 10 users.Keywords: code division multiple access, decorrelating, matched filter, minimum mean square detection (MMSE) detection, multiple access interference (MAI), multiuser detection (MUD)
Procedia PDF Downloads 5283434 Robust Optimisation Model and Simulation-Particle Swarm Optimisation Approach for Vehicle Routing Problem with Stochastic Demands
Authors: Mohanad Al-Behadili, Djamila Ouelhadj
Abstract:
In this paper, a specific type of vehicle routing problem under stochastic demand (SVRP) is considered. This problem is of great importance because it models for many of the real world vehicle routing applications. This paper used a robust optimisation model to solve the problem along with the novel Simulation-Particle Swarm Optimisation (Sim-PSO) approach. The proposed Sim-PSO approach is based on the hybridization of the Monte Carlo simulation technique with the PSO algorithm. A comparative study between the proposed model and the Sim-PSO approach against other solution methods in the literature has been given in this paper. This comparison including the Analysis of Variance (ANOVA) to show the ability of the model and solution method in solving the complicated SVRP. The experimental results show that the proposed model and Sim-PSO approach has a significant impact on the obtained solution by providing better quality solutions comparing with well-known algorithms in the literature.Keywords: stochastic vehicle routing problem, robust optimisation model, Monte Carlo simulation, particle swarm optimisation
Procedia PDF Downloads 2773433 An Experimental Study on the Effect of Heat Input on the Weld Efficiency of TIG-MIG Hybrid Welding of Type-304 Austenitic Stainless Steel
Authors: Emmanuel Ogundimu, Esther Akinlabi, Mutiu Erinosho
Abstract:
Welding is described as the process of joining metals so that bonding can be created as a result of inter-atomic penetration. This study investigated the influence of heat input on the efficiency of the welded joints of 304 stainless steel. Three welds joint were made from two similar 304 stainless steel plates of thickness 6 mm. The tensile results obtained showed that the maximum average tensile strength of 672 MPa is possessed by the sample A1 with low heat input. It was discovered that the tensile strength, % elongation and weld joint efficiency decreased with the increase in heat input into the weld. The average % elongation for the entire samples ranged from 28.4% to 36.5%. Sample A1 had the highest joint efficiency of 94.5%. However, the optimum welding current of 190 for TIG- MIG hybrid welding of type-304 austenite stainless steel can be recommended for advanced technological applications such as aircraft manufacturing, nuclear industry, automobile industry, and processing industry.Keywords: microhardness, microstructure, tensile, MIG welding, process, tensile, shear stress TIG welding, TIG-MIG welding
Procedia PDF Downloads 1993432 Digital Holographic Interferometric Microscopy for the Testing of Micro-Optics
Authors: Varun Kumar, Chandra Shakher
Abstract:
Micro-optical components such as microlenses and microlens array have numerous engineering and industrial applications for collimation of laser diodes, imaging devices for sensor system (CCD/CMOS, document copier machines etc.), for making beam homogeneous for high power lasers, a critical component in Shack-Hartmann sensor, fiber optic coupling and optical switching in communication technology. Also micro-optical components have become an alternative for applications where miniaturization, reduction of alignment and packaging cost are necessary. The compliance with high-quality standards in the manufacturing of micro-optical components is a precondition to be compatible on worldwide markets. Therefore, high demands are put on quality assurance. For quality assurance of these lenses, an economical measurement technique is needed. For cost and time reason, technique should be fast, simple (for production reason), and robust with high resolution. The technique should provide non contact, non-invasive and full field information about the shape of micro- optical component under test. The interferometric techniques are noncontact type and non invasive and provide full field information about the shape of the optical components. The conventional interferometric technique such as holographic interferometry or Mach-Zehnder interferometry is available for characterization of micro-lenses. However, these techniques need more experimental efforts and are also time consuming. Digital holography (DH) overcomes the above described problems. Digital holographic microscopy (DHM) allows one to extract both the amplitude and phase information of a wavefront transmitted through the transparent object (microlens or microlens array) from a single recorded digital hologram by using numerical methods. Also one can reconstruct the complex object wavefront at different depths due to numerical reconstruction. Digital holography provides axial resolution in nanometer range while lateral resolution is limited by diffraction and the size of the sensor. In this paper, Mach-Zehnder based digital holographic interferometric microscope (DHIM) system is used for the testing of transparent microlenses. The advantage of using the DHIM is that the distortions due to aberrations in the optical system are avoided by the interferometric comparison of reconstructed phase with and without the object (microlens array). In the experiment, first a digital hologram is recorded in the absence of sample (microlens array) as a reference hologram. Second hologram is recorded in the presence of microlens array. The presence of transparent microlens array will induce a phase change in the transmitted laser light. Complex amplitude of object wavefront in presence and absence of microlens array is reconstructed by using Fresnel reconstruction method. From the reconstructed complex amplitude, one can evaluate the phase of object wave in presence and absence of microlens array. Phase difference between the two states of object wave will provide the information about the optical path length change due to the shape of the microlens. By the knowledge of the value of the refractive index of microlens array material and air, the surface profile of microlens array is evaluated. The Sag of microlens and radius of curvature of microlens are evaluated and reported. The sag of microlens agrees well within the experimental limit as provided in the specification by the manufacturer.Keywords: micro-optics, microlens array, phase map, digital holographic interferometric microscopy
Procedia PDF Downloads 4983431 Testing of Small Local Zones by Means of Small Punch Test at Room and Creep Temperatures
Authors: Vaclav Mentl, Josef Volak
Abstract:
In many industrial applications, materials are subjected to degradation of mechanical properties as a result of real service conditions, temperature, cyclic loading, humidity or other corrosive media, irradiation, their combination etc. The assessment of the remaining lifetime of components and structures is commonly based on correlated procedures including numerous destructive, non-destructive and mathematical techniques that should guarantee reasonably precise assessment of the current damage extent of materials in question and the remaining lifetime evaluation of the component under consideration. The answers to demands of customers to extend the lifetime of existing components beyond their original design life must be based on detailed assessment of the current degradation extent, what can be rarely realised by means of traditional mechanical (standardised) tests that need relatively large volumes of representative material for the test specimen manufacturing. This fact accelerated the research of miniaturised test specimen that can be sampled non-invasively from the component.Keywords: small punch test, correlation, creep, mechanical properties
Procedia PDF Downloads 2753430 Enhancement of Visual Comfort Using Parametric Double Skin Façade
Authors: Ahmed A. Khamis, Sherif A. Ibrahim, Mahmoud El Khatieb, Mohamed A. Barakat
Abstract:
Parametric design is an icon of the modern architectural that facilitate taking complex design decisions counting on altering various design parameters. Double skin facades are one of the parametric applications for using parametric designs. This paper opts to enhance different daylight parameters of a selected case study office building in Cairo using parametric double skin facade. First, the design and optimization process executed utilizing Grasshopper parametric design software which is a plugin in rhino. The daylighting performance of the base case building model was compared with the one used the double façade showing an enhancement in daylighting performance indicators like glare and task illuminance in the modified model, execution drawings are made for the optimized design to be executed through Revit, followed by computerized digital fabrication stages of the designed model with various scales to reach the final design decisions using Simplify 3D for mock-up digital fabricationKeywords: parametric design, double skin facades, digital fabrication, grasshopper, simplify 3D
Procedia PDF Downloads 1183429 Impact Evaluation of Discriminant Analysis on Epidemic Protocol in Warships’s Scenarios
Authors: Davi Marinho de Araujo Falcão, Ronaldo Moreira Salles, Paulo Henrique Maranhão
Abstract:
Disruption Tolerant Networks (DTN) are an evolution of Mobile Adhoc Networks (MANET) and work good in scenarioswhere nodes are sparsely distributed, with low density, intermittent connections and an end-to-end infrastructure is not possible to guarantee. Therefore, DTNs are recommended for high latency applications that can last from hours to days. The maritime scenario has mobility characteristics that contribute to a DTN network approach, but the concern with data security is also a relevant aspect in such scenarios. Continuing the previous work, which evaluated the performance of some DTN protocols (Epidemic, Spray and Wait, and Direct Delivery) in three warship scenarios and proposed the application of discriminant analysis, as a classification technique for secure connections, in the Epidemic protocol, thus, the current article proposes a new analysis of the directional discriminant function with opening angles smaller than 90 degrees, demonstrating that the increase in directivity influences the selection of a greater number of secure connections by the directional discriminant Epidemic protocol.Keywords: DTN, discriminant function, epidemic protocol, security, tactical messages, warship scenario
Procedia PDF Downloads 1913428 Physicochemical Characteristics of Rice Starch Chainat 1 Variety by Physical Modification
Authors: Orose Rugchati, Sarawut Wattanawongpitak
Abstract:
The Chainat 1 variety (CN1) of rice, which generally has high amylose starch, is distributed in the lower part of Northern Thailand. CN1 rice starch can be used in both food and non-food products. In this research, the CN1 rice starch from the wet-milling process was prepared by Pre-Gelatinization (Heat-Moisture Treatments, HMT) under different conditions: percentage of moisture contents (20% and 30%) and duration time in minutes (0, 30, 60, and 90) at a specific temperature 110°C. The physicochemical characteristics of CN1 rice starch modification, such as amylose content, viscosity, swelling, and solubility property, were evaluated and compared with native CN1 rice starch. The results showed that modification CN1 rice starch tends to have some characteristics better than native starch. The appearance color and starch granule of modified CN1 by HMT have more effective characteristics than native starch when increased duration time. The duration time and moisture content are significant factors to the CN1 starch characteristic by HMT. Moreover, physical modification of CN1 starch by HMT can be described as a modified rice starch providing in many applications and the advantage of biodegradability development.Keywords: physicochemical characteristics, physical modification, pre-gelatinization, Heat-Moisture Treatments, rice starch, Chainat 1 variety (CN1)
Procedia PDF Downloads 1553427 The Experimental Measurement of the LiBr Concentration of a Solar Absorption Machine
Authors: N. Hatraf, L. Merabti, Z. Neffah, W. Taane
Abstract:
The excessive consumption of fossil energies (electrical energy) during summer caused by the technological development involves more and more climate warming. In order to reduce the worst impact of gas emissions produced from classical air conditioning, heat driven solar absorption chiller is pretty promising; it consists on using solar as motive energy which is clean and environmentally friendly to provide cold. Solar absorption machine is composed by four components using Lithium Bromide /water as a refrigerating couple. LiBr- water is the most promising in chiller applications due to high safety, high volatility ratio, high affinity, high stability and its high latent heat. The lithium bromide solution is constitute by the salt lithium bromide which absorbs water under certain conditions of pressure and temperature however if the concentration of the solution is high in the absorption chillers; which exceed 70%, the solution will crystallize. The main aim of this article is to study the phenomena of the crystallization and to evaluate how the dependence between the electric conductivity and the concentration which should be controlled.Keywords: absorption, crystallization, experimental results, lithium bromide solution
Procedia PDF Downloads 3103426 A Collaborative Teaching and Learning Model between Academy and Industry for Multidisciplinary Engineering Education
Authors: Moon-Soo Kim
Abstract:
In order to cope with the increasing demand for multidisciplinary learning between academy and industry, a collaborative teaching and learning model and related operational tools enabling applications to engineering education are essential. This study proposes a web-based collaborative framework for interactive teaching and learning between academy and industry as an initial step for the development of a web- and mobile-based integrated system for both engineering students and industrial practitioners. The proposed web-based collaborative teaching and learning framework defines several entities such as learner, solver and supporter or sponsor for industrial problems, and also has a systematic architecture to build information system including diverse functions enabling effective interaction among the defined entities regardless of time and places. Furthermore, the framework, which includes knowledge and information self-reinforcing mechanism, focuses on the previous problem-solving records as well as subsequent learners’ creative reusing in solving process of new problems.Keywords: collaborative teaching and learning model, academy and industry, web-based collaborative framework, self-reinforcing mechanism
Procedia PDF Downloads 3263425 Study of Magnetic Nanoparticles’ Endocytosis in a Single Cell Level
Authors: Jefunnie Matahum, Yu-Chi Kuo, Chao-Ming Su, Tzong-Rong Ger
Abstract:
Magnetic cell labeling is of great importance in various applications in biomedical fields such as cell separation and cell sorting. Since analytical methods for quantification of cell uptake of magnetic nanoparticles (MNPs) are already well established, image analysis on single cell level still needs more characterization. This study reports an alternative non-destructive quantification methods of single-cell uptake of positively charged MNPs. Magnetophoresis experiments were performed to calculate the number of MNPs in a single cell. Mobility of magnetic cells and the area of intracellular MNP stained by Prussian blue were quantified by image processing software. ICP-MS experiments were also performed to confirm the internalization of MNPs to cells. Initial results showed that the magnetic cells incubated at 100 µg and 50 µg MNPs/mL concentration move at 18.3 and 16.7 µm/sec, respectively. There is also an increasing trend in the number and area of intracellular MNP with increasing concentration. These results could be useful in assessing the nanoparticle uptake in a single cell level.Keywords: magnetic nanoparticles, single cell, magnetophoresis, image analysis
Procedia PDF Downloads 3333424 A Near-Optimal Domain Independent Approach for Detecting Approximate Duplicates
Authors: Abdelaziz Fellah, Allaoua Maamir
Abstract:
We propose a domain-independent merging-cluster filter approach complemented with a set of algorithms for identifying approximate duplicate entities efficiently and accurately within a single and across multiple data sources. The near-optimal merging-cluster filter (MCF) approach is based on the Monge-Elkan well-tuned algorithm and extended with an affine variant of the Smith-Waterman similarity measure. Then we present constant, variable, and function threshold algorithms that work conceptually in a divide-merge filtering fashion for detecting near duplicates as hierarchical clusters along with their corresponding representatives. The algorithms take recursive refinement approaches in the spirit of filtering, merging, and updating, cluster representatives to detect approximate duplicates at each level of the cluster tree. Experiments show a high effectiveness and accuracy of the MCF approach in detecting approximate duplicates by outperforming the seminal Monge-Elkan’s algorithm on several real-world benchmarks and generated datasets.Keywords: data mining, data cleaning, approximate duplicates, near-duplicates detection, data mining applications and discovery
Procedia PDF Downloads 3873423 Effect of Defect Dipoles And Microstructure Engineering in Energy Storage Performance of Co-doped Barium Titanate Ceramics
Authors: Mahmoud Saleh Mohammed Alkathy
Abstract:
Electricity generated from renewable resources may help the transition to clean energy. A reliable energy storage system is required to use this energy properly. To do this, a high breakdown strength (Eb) and a significant difference between spontaneous polarization (Pmax) and remnant polarization (Pr) are required. To achieve this, the defect dipoles in lead free BaTiO3 ferroelectric ceramics are created using Mg2+ and Ni2+ ions as acceptor co-doping in the Ti site. According to the structural analyses, the co-dopant ions were effectively incorporated into the BTO unit cell. According to the ferroelectric study, the co-doped samples display a double hysteresis loop, stronger polarization, and high breakdown strength. The formation of oxygen vacancies and defect dipoles prevent domains' movement, resulting in hysteresis loop pinching. This results in increased energy storage density and efficiency. The defect dipoles mechanism effect can be considered a fascinating technology that can guide the researcher working on developing energy storage for next-generation applications.Keywords: microstructure, defect, energy storage, effciency
Procedia PDF Downloads 963422 Wideband Performance Analysis of C-FDTD Based Algorithms in the Discretization Impoverishment of a Curved Surface
Authors: Lucas L. L. Fortes, Sandro T. M. Gonçalves
Abstract:
In this work, it is analyzed the wideband performance with the mesh discretization impoverishment of the Conformal Finite Difference Time-Domain (C-FDTD) approaches developed by Raj Mittra, Supriyo Dey and Wenhua Yu for the Finite Difference Time-Domain (FDTD) method. These approaches are a simple and efficient way to optimize the scattering simulation of curved surfaces for Dielectric and Perfect Electric Conducting (PEC) structures in the FDTD method, since curved surfaces require dense meshes to reduce the error introduced due to the surface staircasing. Defined, on this work, as D-FDTD-Diel and D-FDTD-PEC, these approaches are well-known in the literature, but the improvement upon their application is not quantified broadly regarding wide frequency bands and poorly discretized meshes. Both approaches bring improvement of the accuracy of the simulation without requiring dense meshes, also making it possible to explore poorly discretized meshes which bring a reduction in simulation time and the computational expense while retaining a desired accuracy. However, their applications present limitations regarding the mesh impoverishment and the frequency range desired. Therefore, the goal of this work is to explore the approaches regarding both the wideband and mesh impoverishment performance to bring a wider insight over these aspects in FDTD applications. The D-FDTD-Diel approach consists in modifying the electric field update in the cells intersected by the dielectric surface, taking into account the amount of dielectric material within the mesh cells edges. By taking into account the intersections, the D-FDTD-Diel provides accuracy improvement at the cost of computational preprocessing, which is a fair trade-off, since the update modification is quite simple. Likewise, the D-FDTD-PEC approach consists in modifying the magnetic field update, taking into account the PEC curved surface intersections within the mesh cells and, considering a PEC structure in vacuum, the air portion that fills the intersected cells when updating the magnetic fields values. Also likewise to D-FDTD-Diel, the D-FDTD-PEC provides a better accuracy at the cost of computational preprocessing, although with a drawback of having to meet stability criterion requirements. The algorithms are formulated and applied to a PEC and a dielectric spherical scattering surface with meshes presenting different levels of discretization, with Polytetrafluoroethylene (PTFE) as the dielectric, being a very common material in coaxial cables and connectors for radiofrequency (RF) and wideband application. The accuracy of the algorithms is quantified, showing the approaches wideband performance drop along with the mesh impoverishment. The benefits in computational efficiency, simulation time and accuracy are also shown and discussed, according to the frequency range desired, showing that poorly discretized mesh FDTD simulations can be exploited more efficiently, retaining the desired accuracy. The results obtained provided a broader insight over the limitations in the application of the C-FDTD approaches in poorly discretized and wide frequency band simulations for Dielectric and PEC curved surfaces, which are not clearly defined or detailed in the literature and are, therefore, a novelty. These approaches are also expected to be applied in the modeling of curved RF components for wideband and high-speed communication devices in future works.Keywords: accuracy, computational efficiency, finite difference time-domain, mesh impoverishment
Procedia PDF Downloads 1343421 An Enhanced AODV Routing Protocol for Wireless Sensor and Actuator Networks
Authors: Apidet Booranawong, Wiklom Teerapabkajorndet
Abstract:
An enhanced ad-hoc on-demand distance vector routing (E-AODV) protocol for control system applications in wireless sensor and actuator networks (WSANs) is proposed. Our routing algorithm is designed by considering both wireless network communication and the control system aspects. Control system error and network delay are the main selection criteria in our routing protocol. The control and communication performance is evaluated on multi-hop IEEE 802.15.4 networks for building-temperature control systems. The Gilbert-Elliott error model is employed to simulate packet loss in wireless networks. The simulation results demonstrate that the E-AODV routing approach can significantly improve the communication performance better than an original AODV routing under various packet loss rates. However, the control performance result by our approach is not much improved compared with the AODV routing solution.Keywords: WSANs, building temperature control, AODV routing protocol, control system error, settling time, delay, delivery ratio
Procedia PDF Downloads 3393420 Enhancing Early Detection of Coronary Heart Disease Through Cloud-Based AI and Novel Simulation Techniques
Authors: Md. Abu Sufian, Robiqul Islam, Imam Hossain Shajid, Mahesh Hanumanthu, Jarasree Varadarajan, Md. Sipon Miah, Mingbo Niu
Abstract:
Coronary Heart Disease (CHD) remains a principal cause of global morbidity and mortality, characterized by atherosclerosis—the build-up of fatty deposits inside the arteries. The study introduces an innovative methodology that leverages cloud-based platforms like AWS Live Streaming and Artificial Intelligence (AI) to early detect and prevent CHD symptoms in web applications. By employing novel simulation processes and AI algorithms, this research aims to significantly mitigate the health and societal impacts of CHD. Methodology: This study introduces a novel simulation process alongside a multi-phased model development strategy. Initially, health-related data, including heart rate variability, blood pressure, lipid profiles, and ECG readings, were collected through user interactions with web-based applications as well as API Integration. The novel simulation process involved creating synthetic datasets that mimic early-stage CHD symptoms, allowing for the refinement and training of AI algorithms under controlled conditions without compromising patient privacy. AWS Live Streaming was utilized to capture real-time health data, which was then processed and analysed using advanced AI techniques. The novel aspect of our methodology lies in the simulation of CHD symptom progression, which provides a dynamic training environment for our AI models enhancing their predictive accuracy and robustness. Model Development: it developed a machine learning model trained on both real and simulated datasets. Incorporating a variety of algorithms including neural networks and ensemble learning model to identify early signs of CHD. The model's continuous learning mechanism allows it to evolve adapting to new data inputs and improving its predictive performance over time. Results and Findings: The deployment of our model yielded promising results. In the validation phase, it achieved an accuracy of 92% in predicting early CHD symptoms surpassing existing models. The precision and recall metrics stood at 89% and 91% respectively, indicating a high level of reliability in identifying at-risk individuals. These results underscore the effectiveness of combining live data streaming with AI in the early detection of CHD. Societal Implications: The implementation of cloud-based AI for CHD symptom detection represents a significant step forward in preventive healthcare. By facilitating early intervention, this approach has the potential to reduce the incidence of CHD-related complications, decrease healthcare costs, and improve patient outcomes. Moreover, the accessibility and scalability of cloud-based solutions democratize advanced health monitoring, making it available to a broader population. This study illustrates the transformative potential of integrating technology and healthcare, setting a new standard for the early detection and management of chronic diseases.Keywords: coronary heart disease, cloud-based ai, machine learning, novel simulation techniques, early detection, preventive healthcare
Procedia PDF Downloads 643419 Neurofeedback Applications for Dealing With Depression for Illegitimate Pregnant Teens: A Thesis Proposal
Authors: Mohamad Sharif bin Mustaffa, Maizatul Akmam binti Abu Bakar, Mohd Harriszamani bin Abu Bakar
Abstract:
Most teens who gave birth to an illegitimate child will suffer from depression. This depression issues arising from the incident itself which contains the teen will feel ashamed because labeled as immoral, apart from that most teenagers go through this episode without support from their spouse or family. Teens also face the possibility of a large part with the will be born babies because the issue of too young and needs to go back to school. Teens also can not make a decision on the future of the baby later because they are too immature and no baby care skills other than financial issues, where young people themselves are still dependent on their family. This paper will look at how to apply neurofeedback can be used to see the level of depression experienced by teenagers who get pregnant out of wedlock. Play therapy that will help improve adolescent focus will be used for this purpose. Each level experienced by teenagers going through the phase of easy-to-high difficulty level. Apart from that a recovery module will also be developed as a whole to reduce the level of depression to enable the youth to perform routine healthy activities and can go back to school with cheerful feeling, motivated and active.Keywords: neurofeedback, depression, pregnant, adolescent, illegitimate
Procedia PDF Downloads 4373418 Design of a Virtual Reality Application Based Digital Heritage Mediation: The Case of 'Djerba View VR'
Authors: Hela Ben Maallem
Abstract:
Applications based on virtual reality offer many benefits to the heritage and tourism sector. Digital heritage mediation is a constantly emerging field that aims to reconstruct the history of heritage items and sites, while at the same time highlighting the identity of a community or region and encouraging public engagement. This research focuses on the analysis of a virtual reality application used in a heritage digital mediation project. The modality introduced is examined through a case study of Djerba View VR application. The aim of this study is to understand the nature and potential uses of this immersive technology and to focus on the study of the possibilities of this medium. The goal of this article is to analyze how 3D reconstruction and immersive storytelling can offer an immersive, interactive and engaging user experience, while meeting the expectations and needs of visitors in a context of technological transition and user-centred design.Keywords: digital heritage mediation, technological transition, virtual reality, 3D reconstruction, immersive storytelling, user experience, user centered design, interactivity, immersion
Procedia PDF Downloads 533417 Classification of Echo Signals Based on Deep Learning
Authors: Aisulu Tileukulova, Zhexebay Dauren
Abstract:
Radar plays an important role because it is widely used in civil and military fields. Target detection is one of the most important radar applications. The accuracy of detecting inconspicuous aerial objects in radar facilities is lower against the background of noise. Convolutional neural networks can be used to improve the recognition of this type of aerial object. The purpose of this work is to develop an algorithm for recognizing aerial objects using convolutional neural networks, as well as training a neural network. In this paper, the structure of a convolutional neural network (CNN) consists of different types of layers: 8 convolutional layers and 3 layers of a fully connected perceptron. ReLU is used as an activation function in convolutional layers, while the last layer uses softmax. It is necessary to form a data set for training a neural network in order to detect a target. We built a Confusion Matrix of the CNN model to measure the effectiveness of our model. The results showed that the accuracy when testing the model was 95.7%. Classification of echo signals using CNN shows high accuracy and significantly speeds up the process of predicting the target.Keywords: radar, neural network, convolutional neural network, echo signals
Procedia PDF Downloads 3533416 VANETs: Security Challenges and Future Directions
Authors: Jared Oluoch
Abstract:
Connected vehicles are equipped with wireless sensors that aid in Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I) communication. These vehicles will in the near future provide road safety, improve transport efficiency, and reduce traffic congestion. One of the challenges for connected vehicles is how to ensure that information sent across the network is secure. If security of the network is not guaranteed, several attacks can occur, thereby compromising the robustness, reliability, and efficiency of the network. This paper discusses existing security mechanisms and unique properties of connected vehicles. The methodology employed in this work is exploratory. The paper reviews existing security solutions for connected vehicles. More concretely, it discusses various cryptographic mechanisms available, and suggests areas of improvement. The study proposes a combination of symmetric key encryption and public key cryptography to improve security. The study further proposes message aggregation as a technique to overcome message redundancy. This paper offers a comprehensive overview of connected vehicles technology, its applications, its security mechanisms, open challenges, and potential areas of future research.Keywords: VANET, connected vehicles, 802.11p, WAVE, DSRC, trust, security, cryptography
Procedia PDF Downloads 3123415 Flexural Response of Glass Fiber Reinforced Polymer Sandwich Panels with 3D Woven Honeycomb Core
Authors: Elif Kalkanli, Constantinos Soutis
Abstract:
The use of textile preform in the advanced fields including aerospace, automotive and marine has exponentially grown in recent years. These preforms offer excellent advantages such as being lightweight and low-cost, and also, their suitability for creating different fiber architectures with different materials whilst improved mechanical properties in certain aspects. In this study, a novel honeycomb core is developed by a 3Dweaving process. The assembly of the layers is achieved thanks to innovative weaving design. Polyester yarn is selected for the 3D woven honeycomb core (3DWHC). The core is used to manufacture a sandwich panel with 2x2 twill glass fiber composite face sheets. These 3DWHC sandwich panels will be tested in three-point bending. The in-plane and out-of-plane (through-the-thickness) mechanical response of the core will be examined as a function of cell size in addition to the flexural response of the sandwich panel. The failure mechanisms of the core and the sandwich skins will be reported in addition to flexural strength and stiffness. Possible engineering applications will be identified.Keywords: 3D woven, assembly, failure modes, honeycomb sandwich panel
Procedia PDF Downloads 2063414 Nonlinear Modelling and Analysis of Piezoelectric Smart Thin-Walled Structures in Supersonic Flow
Authors: Shu-Yang Zhang, Shun-Qi Zhang, Zhan-Xi Wang, Xian-Sheng Qin
Abstract:
Thin-walled structures are used more and more widely in modern aircrafts and some other structures in aerospace field nowadays. Accompanied by the wider applications, the vibration of the structures has been a bigger problem. Because of the direct and converse piezoelectric effect, piezoelectric materials combined to host thin-walled structures, named as piezoelectric smart structures, can be an effective way to suppress the vibration. So, an accurate model for piezoelectric thin-walled structures in air flow is necessary and important. In our recent work, an electromechanical coupling nonlinear aerodynamic finite element model of piezoelectric smart thin-walled structures is built based on the Reissner-Mindlin plate theory and first-order piston theory for aerodynamic pressure of supersonic flow. Von Kármán type nonlinearity is considered in the present model. Finally, the model is validated by experimental and numerical results from the literature, which can describe the vibration of the structures in supersonic flow precisely.Keywords: piezoelectric smart structures, aerodynamic, geometric nonlinearity, finite element analysis
Procedia PDF Downloads 3893413 Anomaly Detection with ANN and SVM for Telemedicine Networks
Authors: Edward Guillén, Jeisson Sánchez, Carlos Omar Ramos
Abstract:
In recent years, a wide variety of applications are developed with Support Vector Machines -SVM- methods and Artificial Neural Networks -ANN-. In general, these methods depend on intrusion knowledge databases such as KDD99, ISCX, and CAIDA among others. New classes of detectors are generated by machine learning techniques, trained and tested over network databases. Thereafter, detectors are employed to detect anomalies in network communication scenarios according to user’s connections behavior. The first detector based on training dataset is deployed in different real-world networks with mobile and non-mobile devices to analyze the performance and accuracy over static detection. The vulnerabilities are based on previous work in telemedicine apps that were developed on the research group. This paper presents the differences on detections results between some network scenarios by applying traditional detectors deployed with artificial neural networks and support vector machines.Keywords: anomaly detection, back-propagation neural networks, network intrusion detection systems, support vector machines
Procedia PDF Downloads 3573412 Flywheel Energy Storage Control Using SVPWM for Small Satellites Application
Authors: Noha El-Gohary, Thanaa El-Shater, A. A. Mahfouz, M. M. Sakr
Abstract:
Searching for high power conversion efficiency and long lifetime are important goals when designing a power supply subsystem for satellite applications. To fulfill these goals, this paper presents a power supply subsystem for small satellites in which flywheel energy storage system is used as a secondary power source instead of chemical battery. In this paper, the model of flywheel energy storage system is introduced; a DC bus regulation control algorithm for charging and discharging of flywheel based on space vector pulse width modulation technique and motor current control is also introduced. Simulation results showed the operation of the flywheel for charging and discharging mode during illumination and shadowed period. The advantages of the proposed system are confirmed by the simulation results of the power supply system.Keywords: small-satellites, flywheel energy storage system, space vector pulse width modulation, power conversion
Procedia PDF Downloads 4003411 An Efficient and Provably Secure Three-Factor Authentication Scheme with Key Agreement
Authors: Mohan Ramasundaram, Amutha Prabakar Muniyandi
Abstract:
Remote user authentication is one of the important tasks for any kind of remote server applications. Several remote authentication schemes are proposed by the researcher for Telecare Medicine Information System (TMIS). Most of the existing techniques have limitations, vulnerable to various kind attacks, lack of functionalities, information leakage, no perfect forward security and ineffectiveness. Authentication is a process of user verification mechanism for allows him to access the resources of a server. Nowadays, most of the remote authentication protocols are using two-factor authentications. We have made a survey of several remote authentication schemes using three factors and this survey shows that the most of the schemes are inefficient and subject to several attacks. We observed from the experimental evaluation; the proposed scheme is very secure against various known attacks that include replay attack, man-in-the-middle attack. Furthermore, the analysis based on the communication cost and computational cost estimation of the proposed scheme with related schemes shows that our proposed scheme is efficient.Keywords: Telecare Medicine Information System, elliptic curve cryptography, three-factor, biometric, random oracle
Procedia PDF Downloads 2193410 Application of Western and Islamic Philosophy to Business Ethics
Authors: Elmamy Ahmedsalem
Abstract:
The world has witnessed the collapse of many corporate giants as a result of unethical behavior in recent decades. This has induced a series of questions by the global community on why such occurrences could happen, even with corporate governance in place. This paper attempts to propose a philosophical approach from an Islamic perspective to be consolidated with current corporate governance in order to confront contemporary dilemmas. In this paper, ethical theories are presented as a discussion followed by their applications to modern cases of financial collapses. Virtue ethics by Aristotle, justice and fairness by John Rawls, deontology by Immanuel Kant, and utilitarianism by John Stuart Mill, are the four theories which can then be contrasted with the paradigm of Muslim scholars. Despite the differences between the fundamental principles of Islamic and Western worldviews, their ethical theories are aimed at making right decisions and solving ethical dilemmas based on what is good for society. Therefore, Islamic principles should be synthesized with Western philosophy to form a more coherent framework. The integration of Islamic and western ethical theories into business is important for sound corporate governance.Keywords: business ethics, Islamic philosophy, western philosophy, Western and Islamic worldview of ethics
Procedia PDF Downloads 4723409 Optimal Feature Extraction Dimension in Finger Vein Recognition Using Kernel Principal Component Analysis
Authors: Amir Hajian, Sepehr Damavandinejadmonfared
Abstract:
In this paper the issue of dimensionality reduction is investigated in finger vein recognition systems using kernel Principal Component Analysis (KPCA). One aspect of KPCA is to find the most appropriate kernel function on finger vein recognition as there are several kernel functions which can be used within PCA-based algorithms. In this paper, however, another side of PCA-based algorithms -particularly KPCA- is investigated. The aspect of dimension of feature vector in PCA-based algorithms is of importance especially when it comes to the real-world applications and usage of such algorithms. It means that a fixed dimension of feature vector has to be set to reduce the dimension of the input and output data and extract the features from them. Then a classifier is performed to classify the data and make the final decision. We analyze KPCA (Polynomial, Gaussian, and Laplacian) in details in this paper and investigate the optimal feature extraction dimension in finger vein recognition using KPCA.Keywords: biometrics, finger vein recognition, principal component analysis (PCA), kernel principal component analysis (KPCA)
Procedia PDF Downloads 365