Search results for: problem posing
4130 Overview of Different Approaches Used in Optimal Operation Control of Hybrid Renewable Energy Systems
Authors: K. Kusakana
Abstract:
A hybrid energy system is a combination of renewable energy sources with back up, as well as a storage system used to respond to given load energy requirements. Given that the electrical output of each renewable source is fluctuating with changes in weather conditions, and since the load demand also varies with time; one of the main attributes of hybrid systems is to be able to respond to the load demand at any time by optimally controlling each energy source, storage and back-up system. The induced optimization problem is to compute the optimal operation control of the system with the aim of minimizing operation costs while efficiently and reliably responding to the load energy requirement. Current optimization research and development on hybrid systems are mainly focusing on the sizing aspect. Thus, the aim of this paper is to report on the state-of-the-art of optimal operation control of hybrid renewable energy systems. This paper also discusses different challenges encountered, as well as future developments that can help in improving the optimal operation control of hybrid renewable energy systems.Keywords: renewable energies, hybrid systems, optimization, operation control
Procedia PDF Downloads 3824129 SCANet: A Workflow for Single-Cell Co-Expression Based Analysis
Authors: Mhaned Oubounyt, Jan Baumbach
Abstract:
Differences in co-expression networks between two or multiple cells (sub)types across conditions is a pressing problem in single-cell RNA sequencing (scRNA-seq). A key challenge is to define those co-variations that differ between or among cell types and/or conditions and phenotypes to examine small regulatory networks that can explain mechanistic differences. To this end, we developed SCANet, an all-in-one Python package that uses state-of-the-art algorithms to facilitate the workflow of a combined single-cell GCN (Gene Correlation Network) and GRN (Gene Regulatory Networks) pipeline, including inference of gene co-expression modules from scRNA-seq, followed by trait and cell type associations, hub gene detection, co-regulatory networks, and drug-gene interactions. In an example case, we illustrate how SCANet can be applied to identify regulatory drivers behind a cytokine storm associated with mortality in patients with acute respiratory illness. SCANet is available as a free, open-source, and user-friendly Python package that can be easily integrated into systems biology pipelines.Keywords: single-cell, co-expression networks, drug-gene interactions, co-regulatory networks
Procedia PDF Downloads 1544128 Research of Amplitude-Frequency Characteristics of Nonlinear Oscillations of the Interface of Two-Layered Liquid
Authors: Win Ko Ko, A. N. Temnov
Abstract:
The problem of nonlinear oscillations of a two-layer liquid completely filling a limited volume is considered. Using two basic asymmetric harmonics excited in two mutually perpendicular planes, ordinary differential equations of nonlinear oscillations of the interface of a two-layer liquid are investigated. In this paper, hydrodynamic coefficients of linear and nonlinear problems in integral relations were determined. As a result, the instability regions of forced oscillations of a two-layered liquid in a cylindrical tank occurring in the plane of action of the disturbing force are constructed, as well as the dynamic instability regions of the parametric resonance for different ratios of densities of the upper and lower liquids depending on the amplitudes of liquids from the excitations frequencies. Steady-state regimes of fluid motion were found in the regions of dynamic instability of the initial oscillation form. The Bubnov-Galerkin method is used to construct instability regions for approximate solution of nonlinear differential equations.Keywords: nonlinear oscillations, two-layered liquid, instability region, hydrodynamic coefficients, resonance frequency
Procedia PDF Downloads 2204127 Semi-Automatic Method to Assist Expert for Association Rules Validation
Authors: Amdouni Hamida, Gammoudi Mohamed Mohsen
Abstract:
In order to help the expert to validate association rules extracted from data, some quality measures are proposed in the literature. We distinguish two categories: objective and subjective measures. The first one depends on a fixed threshold and on data quality from which the rules are extracted. The second one consists on providing to the expert some tools in the objective to explore and visualize rules during the evaluation step. However, the number of extracted rules to validate remains high. Thus, the manually mining rules task is very hard. To solve this problem, we propose, in this paper, a semi-automatic method to assist the expert during the association rule's validation. Our method uses rule-based classification as follow: (i) We transform association rules into classification rules (classifiers), (ii) We use the generated classifiers for data classification. (iii) We visualize association rules with their quality classification to give an idea to the expert and to assist him during validation process.Keywords: association rules, rule-based classification, classification quality, validation
Procedia PDF Downloads 4414126 Securing Health Monitoring in Internet of Things with Blockchain-Based Proxy Re-Encryption
Authors: Jerlin George, R. Chitra
Abstract:
The devices with sensors that can monitor your temperature, heart rate, and other vital signs and link to the internet, known as the Internet of Things (IoT), have completely transformed the way we control health. Providing real-time health data, these sensors improve diagnostics and treatment outcomes. Security and privacy matters when IoT comes into play in healthcare. Cyberattacks on centralized database systems are also a problem. To solve these challenges, the study uses blockchain technology coupled with proxy re-encryption to secure health data. ThingSpeak IoT cloud analyzes the collected data and turns them into blockchain transactions which are safely kept on the DriveHQ cloud. Transparency and data integrity are ensured by blockchain, and secure data sharing among authorized users is made possible by proxy re-encryption. This results in a health monitoring system that preserves the accuracy and confidentiality of data while reducing the safety risks of IoT-driven healthcare applications.Keywords: internet of things, healthcare, sensors, electronic health records, blockchain, proxy re-encryption, data privacy, data security
Procedia PDF Downloads 204125 Spectrum Assignment Algorithms in Optical Networks with Protection
Authors: Qusay Alghazali, Tibor Cinkler, Abdulhalim Fayad
Abstract:
In modern optical networks, the flex grid spectrum usage is most widespread, where higher bit rate streams get larger spectrum slices while lower bit rate traffic streams get smaller spectrum slices. To our practice, under the ITU-T recommendation, G.694.1, spectrum slices of 50, 75, and 100 GHz are being used with central frequency at 193.1 THz. However, when these spectrum slices are not sufficient, multiple spectrum slices can use either one next to another or anywhere in the optical wavelength. In this paper, we propose the analysis of the wavelength assignment problem. We compare different algorithms for this spectrum assignment with and without protection. As a reference for comparisons, we concluded that the Integer Linear Programming (ILP) provides the global optimum for all cases. The most scalable algorithm is the greedy one, which yields results in subsequent ranges even for more significant network instances. The algorithms’ benchmark implemented using the LEMON C++ optimization library and simulation runs based on a minimum number of spectrum slices assigned to lightpaths and their execution time.Keywords: spectrum assignment, integer linear programming, greedy algorithm, international telecommunication union, library for efficient modeling and optimization in networks
Procedia PDF Downloads 1704124 Inferential Reasoning for Heterogeneous Multi-Agent Mission
Authors: Sagir M. Yusuf, Chris Baber
Abstract:
We describe issues bedeviling the coordination of heterogeneous (different sensors carrying agents) multi-agent missions such as belief conflict, situation reasoning, etc. We applied Bayesian and agents' presumptions inferential reasoning to solve the outlined issues with the heterogeneous multi-agent belief variation and situational-base reasoning. Bayesian Belief Network (BBN) was used in modeling the agents' belief conflict due to sensor variations. Simulation experiments were designed, and cases from agents’ missions were used in training the BBN using gradient descent and expectation-maximization algorithms. The output network is a well-trained BBN for making inferences for both agents and human experts. We claim that the Bayesian learning algorithm prediction capacity improves by the number of training data and argue that it enhances multi-agents robustness and solve agents’ sensor conflicts.Keywords: distributed constraint optimization problem, multi-agent system, multi-robot coordination, autonomous system, swarm intelligence
Procedia PDF Downloads 1574123 Infection of Phlebotomus Sergenti with Leishmania Tropica in a Classical Focus of Leishmania Major in Tunisia
Authors: Kaouther Jaouadi, Jihene Bettaieb, Amira Bennour, Ghassen Kharroubi, Sadok Salem, Afif Ben Salah
Abstract:
In Tunisia, chronic cutaneous leishmaniasis due to Leishmania (L) tropica is an important health problem. Its spreading has not been fully elucidated. Information on sandfly vectors, as well as their associated Leishmania species, is of paramount importance since vector dispersion is one of the major factors responsible for pathogen dissemination. In total, 650 sandflies were captured between June and August 2015 using sticky paper traps in the governorate of Sidi Bouzid, a classical focus of L. major in the Central-West of Tunisia. Polymerase chain reaction-restriction fragment length polymorphism analysis of the internal transcribed spacer 1 and sequencing were used for Leishmania detection and identification. Ninety-seven unfed females were tested for the presence of Leishmania parasite DNA. Six Phlebotomus sergenti were found positive for L. tropica. This finding enhances the understanding of the cycle extension of L. tropica outside its original focus of Tataouine in the South-East of the country.Keywords: cutaneous leishmaniasis, Leishmania tropica, sandflies, Tunisia
Procedia PDF Downloads 1574122 Knowledge Representation Based on Interval Type-2 CFCM Clustering
Authors: Lee Myung-Won, Kwak Keun-Chang
Abstract:
This paper is concerned with knowledge representation and extraction of fuzzy if-then rules using Interval Type-2 Context-based Fuzzy C-Means clustering (IT2-CFCM) with the aid of fuzzy granulation. This proposed clustering algorithm is based on information granulation in the form of IT2 based Fuzzy C-Means (IT2-FCM) clustering and estimates the cluster centers by preserving the homogeneity between the clustered patterns from the IT2 contexts produced in the output space. Furthermore, we can obtain the automatic knowledge representation in the design of Radial Basis Function Networks (RBFN), Linguistic Model (LM), and Adaptive Neuro-Fuzzy Networks (ANFN) from the numerical input-output data pairs. We shall focus on a design of ANFN in this paper. The experimental results on an estimation problem of energy performance reveal that the proposed method showed a good knowledge representation and performance in comparison with the previous works.Keywords: IT2-FCM, IT2-CFCM, context-based fuzzy clustering, adaptive neuro-fuzzy network, knowledge representation
Procedia PDF Downloads 3234121 Opportunities and Optimization of the Our Eyes Initiative as the Strategy for Counter-Terrorism in ASEAN
Authors: Chastiti Mediafira Wulolo, Tri Legionosuko, Suhirwan, Yusuf
Abstract:
Terrorism and radicalization have become a common threat to every nation in this world. As a part of the asymmetric warfare threat, terrorism and radicalization need a complex strategy as the problem solver. One such way is by collaborating with the international community. The Our Eyes Initiative (OEI), for example, is a cooperation pact in the field of intelligence information exchanges related to terrorism and radicalization initiated by the Indonesian Ministry of Defence. The pact has been signed by Indonesia, Philippines, Malaysia, Brunei Darussalam, Thailand, and Singapore. This cooperation mostly engages military acts as a central role, but it still requires the involvement of various parties such as the police, intelligence agencies and other government institutions. This paper will use a qualitative content analysis method to address the opportunity and enhance the optimization of OEI. As the result, it will explain how OEI takes the opportunities as the strategy for counter-terrorism by building it up as the regional cooperation, building the legitimacy of government and creating the legal framework of the information sharing system.Keywords: our eyes initiative, terrorism, counter-terrorism, ASEAN, cooperation, strategy
Procedia PDF Downloads 1844120 Screening of New Antimicrobial Agents from Heterocyclic Derivatives
Authors: W. Mazari, K. Boucherit, Z. Boucherit-Otmani, M. N. Rahmoun, M. Benabdallah
Abstract:
The hospital or any other establishment of care can be considered as an ecosystem where the patient comes into contact with a frightening microbial universe and a risk to contract infection that is referred to as nosocomial or health care-associated. In these last years, the incidence of these infections has risen sharply. Several microorganisms are the cause of these nosocomial infections and the emergence of resistance of the microbial strains against antibiotics creates a danger to public health. The search for new antimicrobial agents to overcome this problem has produced interesting compounds through chemical synthesis, which plays a very important role in the research and discovery of new drugs. It is in this framework that our study was conducted at our laboratory and it involves evaluating the antibacterial activity of thirteen 2-pyridone derivatives synthesized by two methods, the diffusion disc method and the dilution method against eight Gram negative bacterial strains. The results seem interesting especially for two products that have shown the best activities against Escherichia coli ATCC 25922 and Enterobacter cloacae ATCC 13047 with CMI of 512µg/ml.Keywords: heterocyclic derivatives, chemical synthesis, antimicrobial activity, biotechnology
Procedia PDF Downloads 3704119 Study on the Treatment of Waste Water Containing Nitrogen Heterocyclic Aromatic Hydrocarbons by Phenol-Induced Microbial Communities
Authors: Zhichao Li
Abstract:
This project has treated the waste-water that contains the nitrogen heterocyclic aromatic hydrocarbons, by using the phenol-induced microbial communities. The treatment of nitrogen heterocyclic aromatic hydrocarbons is a difficult problem for coking waste-water treatment. Pyridine, quinoline and indole are three kinds of most common nitrogen heterocyclic compounds in the f, and treating these refractory organics biologically has always been a research focus. The phenol-degrading bacteria can be used in the enhanced biological treatment effectively, and has a good treatment effect. Therefore, using the phenol-induced microbial communities to treat the coking waste-water can remove multiple pollutants concurrently, and improve the treating efficiency of coking waste-water. Experiments have proved that the phenol-induced microbial communities can degrade the nitrogen heterocyclic ring aromatic hydrocarbon efficiently.Keywords: phenol, nitrogen heterocyclic aromatic hydrocarbons, phenol-degrading bacteria, microbial communities, biological treatment technology
Procedia PDF Downloads 2094118 An Improved Dynamic Window Approach with Environment Awareness for Local Obstacle Avoidance of Mobile Robots
Authors: Baoshan Wei, Shuai Han, Xing Zhang
Abstract:
Local obstacle avoidance is critical for mobile robot navigation. It is a challenging task to ensure path optimality and safety in cluttered environments. We proposed an Environment Aware Dynamic Window Approach in this paper to cope with the issue. The method integrates environment characterization into Dynamic Window Approach (DWA). Two strategies are proposed in order to achieve the integration. The local goal strategy guides the robot to move through openings before approaching the final goal, which solves the local minima problem in DWA. The adaptive control strategy endows the robot to adjust its state according to the environment, which addresses path safety compared with DWA. Besides, the evaluation shows that the path generated from the proposed algorithm is safer and smoother compared with state-of-the-art algorithms.Keywords: adaptive control, dynamic window approach, environment aware, local obstacle avoidance, mobile robots
Procedia PDF Downloads 1594117 The End Justifies the Means: Using Programmed Mastery Drill to Teach Spoken English to Spanish Youngsters, without Relying on Homework
Authors: Robert Pocklington
Abstract:
Most current language courses expect students to be ‘vocational’, sacrificing their free time in order to learn. However, pupils with a full-time job, or bringing up children, hardly have a spare moment. Others just need the language as a tool or a qualification, as if it were book-keeping or a driving license. Then there are children in unstructured families whose stressful life makes private study almost impossible. And the countless parents whose evenings and weekends have become a nightmare, trying to get the children to do their homework. There are many arguments against homework being a necessity (rather than an optional extra for more ambitious or dedicated students), making a clear case for teaching methods which facilitate full learning of the key content within the classroom. A methodology which could be described as Programmed Mastery Learning has been used at Fluency Language Academy (Spain) since 1992, to teach English to over 4000 pupils yearly, with a staff of around 100 teachers, barely requiring homework. The course is structured according to the tenets of Programmed Learning: small manageable teaching steps, immediate feedback, and constant successful activity. For the Mastery component (not stopping until everyone has learned), the memorisation and practice are entrusted to flashcard-based drilling in the classroom, leading all students to progress together and develop a permanently growing knowledge base. Vocabulary and expressions are memorised using flashcards as stimuli, obliging the brain to constantly recover words from the long-term memory and converting them into reflex knowledge, before they are deployed in sentence building. The use of grammar rules is practised with ‘cue’ flashcards: the brain refers consciously to the grammar rule each time it produces a phrase until it comes easily. This automation of lexicon and correct grammar use greatly facilitates all other language and conversational activities. The full B2 course consists of 48 units each of which takes a class an average of 17,5 hours to complete, allowing the vast majority of students to reach B2 level in 840 class hours, which is corroborated by an 85% pass-rate in the Cambridge University B2 exam (First Certificate). In the past, studying for qualifications was just one of many different options open to young people. Nowadays, youngsters need to stay at school and obtain qualifications in order to get any kind of job. There are many students in our classes who have little intrinsic interest in what they are studying; they just need the certificate. In these circumstances and with increasing government pressure to minimise failure, teachers can no longer think ‘If they don’t study, and fail, its their problem’. It is now becoming the teacher’s problem. Teachers are ever more in need of methods which make their pupils successful learners; this means assuring learning in the classroom. Furthermore, homework is arguably the main divider between successful middle-class schoolchildren and failing working-class children who drop out: if everything important is learned at school, the latter will have a much better chance, favouring inclusiveness in the language classroom.Keywords: flashcard drilling, fluency method, mastery learning, programmed learning, teaching English as a foreign language
Procedia PDF Downloads 1104116 Political will in Fighting Corruption in Vietnam
Authors: Anh Dao Vu, Bill Ryan
Abstract:
The Vietnamese government struggles to grapple with the problem of rampant corruption, one of the most challenging difficulties the country faces. According to Transparency International’s Corruption Perceptions Index (CPI) 2014, Vietnam ranks 119 out of 175 countries. The CPI gives Vietnam a score of 31 on a scale from 0 to 100, where 0 indicates ‘highly corrupt’ and 100 represents ‘very clean’. Corruption eats into the national GDP of Vietnam, causing a loss of 3% to 4% of GDP per annum. In general, the Vietnamese people’s trust in their government to wage an effective fight against corruption, especially in the public sector, has been greatly eroded in recent years. Some substantial public demonstrations persuaded the government to implement strong anti-corruption measures. However, so far those measures have not been particularly successful. One of the main reasons for this shortcoming is that neither the Communist Party of Vietnam nor the government has demonstrated sufficiently strong ‘political will’ in fighting corruption. There remains a large gap between rhetoric and reality. This paper will examine the reasons why insufficient ‘political will’ is displayed in the ostensible fight against public sector corruption, and how certain anti-corruption strategies will both strengthen levels of political commitment to the fight against corruption while enhancing the effectiveness of that essential national endeavor.Keywords: corruption, political will, Vietnam, anti-corruption
Procedia PDF Downloads 3284115 In-silico Design of Riboswitch Based Potent Inhibitors for Vibrio cholera
Authors: Somdutt Mujwar, Kamal Raj Pardasani
Abstract:
Cholera pandemics are caused by facultative pathogenic Vibrio cholera bacteria persisting in the countries having warmer climatic conditions as well as the presence of large water bodies with huge amount of organic matter, it is responsible for the millions of deaths annually. Presently the available therapy for cholera is Oral Rehydration Therapy (ORT) with an antibiotic drug. Excessive utilization of life saving antibiotics drugs leads to the development of resistance by the infectious micro-organism against the antibiotic drugs resulting in loss of effectiveness of these drugs. Also, many side effects are also associated with the use of these antibiotic drugs. This riboswitch is explored as an alternative drug target for Vibrio cholera bacteria to overcome the problem of drug resistance as well as side effects associated with the antibiotics drugs. The bacterial riboswitch is virtually screened with 24407 legends to get possible drug candidates. The 10 ligands showing best binding with the riboswitch are selected to design a pharmacophore, which can be utilized to design lead molecules by using the phenomenon of bioisosterism.Keywords: cholera, drug design, ligand, riboswitch, pharmacophore
Procedia PDF Downloads 3524114 Thailand and Procession of Trafficking Human Beings (Women and Children)
Authors: Kawinphat Lertpongmanee
Abstract:
The problems of trafficking human beings were continuously violent in Thailand. The problems occurred from a variety of factors such as unemployment, agricultural workers’ urban immigration, sex tour, attitude of materialism society, divorced family, unsavourily effected law, and officers’ ignorance. The purposes of this study were to study the structure, connection, a number of trafficking human beings in Thailand. Qualitative and quantitative and results of previous research were used in this research. The previous procurers, interested persons, experienced people, human beings-aiding organization, and women-children rights organization were interviewed in depth. The field was used in a variety of regions. The findings showed that the structure and connection of trafficking human beings and their values are $8,750 million. There are 240,000 people in trafficked human beings. The trend of trafficking human beings grows continuously. It is changed according to economic circumstance, society and culture, and law. The state must be aware of its problem. The law is enacted by adding high penalty for serious fear.Keywords: human trade, prostitution trafficking, trafficking in women and children, Thailand
Procedia PDF Downloads 3614113 Effect of Bamboo Chips in Cemented Sand Soil on Permeability and Mechanical Properties in Triaxial Compression
Authors: Sito Ismanti, Noriyuki Yasufuku
Abstract:
Cement utilization to improve the properties of soil is a well-known method applied in field. However, its addition in large quantity must be controlled. This study presents utilization of natural and environmental-friendly material mixed with small amount of cement content in soil improvement, i.e. bamboo chips. Absorbability, elongation, and flatness ratio of bamboo chips were examined to investigate and understand the influence of its characteristics in the mixture. Improvement of dilation behavior as a problem of loose and poorly graded sand soil is discussed. Bamboo chips are able to improve the permeability value that affects the dilation behavior of cemented sand soil. It is proved by the stress path as the result of triaxial compression test in the undrained condition. The effect of size and content variation of bamboo chips, as well as the curing time variation are presented and discussed.Keywords: bamboo chips, permeability, mechanical properties, triaxial compression
Procedia PDF Downloads 3354112 Hermeneutical Attitudes to Islamic Art
Authors: Mohammad Hasan Kakizadeh
Abstract:
It is a matter of philosophical hermeneutics according to specifications, we can hand to his hermeneutic, hermeneutical approaches can be analyzed with Islamic art, Islamic art hermeneutical approaches can be of two types: one is to "Islamic Art" Art is considered the analogies and metaphors and mysteries using Nmvdgarha and tried to express spiritual or religious ideology that demonstrates the truth of Islam, and other efforts is that "art" is basically a way inconsistent with the interpretation that or "sharia," Islamic law, not be considered a way to recognize and praise God, his creation, and therefore, the "art" is a tool for reform or knowledge to Nfs.az these two efforts, the first modern effort to try and of course preceded by the second. However, the first attempt is sometimes forgotten that the early centuries AD, with respect to the nature of hermeneutic thinkers for the arts could not resist the assaults of "art" in general, or specifically some legitimacy to the "art" of business and Knnd.dyn art at the stage of its history, which distinguishes them from each other are united with each other so easily possible. However, with the rise of the monotheistic religions and leave the Pagan religions, religion, and art renewed bond becomes a difficult problem. Much of the efforts of Muslim scholars have focused on the legitimacy back to the art. These attempts without a hermeneutic approach to the "art" does not correlate with success. The findings and conclusion in this study is that the hermeneutic approach to Islamic art, whether or Mshrvsazanh Mnakavanh what Bazsazanh or deconstructive, can not ignore the fact that Islamic art has been shaped by Mabdaltbyhay.Keywords: art, Islamic art, hermeneutics, art, religion
Procedia PDF Downloads 3704111 Markov Switching of Conditional Variance
Authors: Josip Arneric, Blanka Skrabic Peric
Abstract:
Forecasting of volatility, i.e. returns fluctuations, has been a topic of interest to portfolio managers, option traders and market makers in order to get higher profits or less risky positions. Based on the fact that volatility is time varying in high frequency data and that periods of high volatility tend to cluster, the most common used models are GARCH type models. As standard GARCH models show high volatility persistence, i.e. integrated behaviour of the conditional variance, it is difficult the predict volatility using standard GARCH models. Due to practical limitations of these models different approaches have been proposed in the literature, based on Markov switching models. In such situations models in which the parameters are allowed to change over time are more appropriate because they allow some part of the model to depend on the state of the economy. The empirical analysis demonstrates that Markov switching GARCH model resolves the problem of excessive persistence and outperforms uni-regime GARCH models in forecasting volatility for selected emerging markets.Keywords: emerging markets, Markov switching, GARCH model, transition probabilities
Procedia PDF Downloads 4564110 Vitamin C Status and Nitric Oxide in Buffalo Ovarian Follicular Fluid in Relation to Seasonal Heat Stress and Phase of Estrous Cycle
Authors: H. F. Hozyen, A. M. Abo-El Maaty
Abstract:
Heat stress is a recognized problem causing huge economic losses to the buffalo breeders as well as dairy industry. The aim of the present work was to study the pattern of vitamin C and nitric oxide in follicular fluid of buffalo during different seasons of the year considering phase of estrous cycle. This study was conducted on 208 cyclic buffaloes slaughtered at Al-Qaliobia governorate, Egypt, over one year. The obtained results revealed that vitamin C in follicular fluid was significantly lower in summer than winter and spring. On the other hand, nitric oxide (NO) was significantly higher in summer and autumn than winter and spring. Both vitamin C and NO did not differ significantly between follicular and luteal phases. In conclusion, the present study revealed that alterations in concentrations of follicular fluid vitamin C and NO that occur in summer could be related to low summer fertility in buffalo.Keywords: Buffalo, follicular fluid, vitamin C, nitric oxide, heat stress
Procedia PDF Downloads 3334109 Digital Watermarking Using Fractional Transform and (k,n) Halftone Visual Cryptography (HVC)
Authors: R. Rama Kishore, Sunesh Malik
Abstract:
Development in the usage of internet for different purposes in recent times creates great threat for the copy right protection of the digital images. Digital watermarking is the best way to rescue from the said problem. This paper presents detailed review of the different watermarking techniques, latest trends in the field and categorized like spatial and transform domain, blind and non-blind methods, visible and non visible techniques etc. It also discusses the different optimization techniques used in the field of watermarking in order to improve the robustness and imperceptibility of the method. Different measures are discussed to evaluate the performance of the watermarking algorithm. At the end, this paper proposes a watermarking algorithm using (k.n) shares of halftone visual cryptography (HVC) instead of (2, 2) share cryptography. (k,n) shares visual cryptography improves the security of the watermark. As halftone is a method of reprographic, it helps in improving the visual quality of watermark image. The proposed method uses fractional transformation to improve the robustness of the copyright protection of the method.Keywords: digital watermarking, fractional transform, halftone, visual cryptography
Procedia PDF Downloads 3584108 Dissocial Personality in Adolescents
Authors: Tsirekidze M., Aprasidze T.
Abstract:
Introduction: The problem of dissocial behavior is at the heart of the social sciences and psychiatry; however, it should be noted that its psychiatric aspect is little studied, and some issues of the problem are still controversial. This is complicated by the diversity of terminological concepts in defining “dissocial behavior”, “behavioral disorder”, “abnormal behavior”, “deviant behavior”, “delinquent behavior”, etc. In literature, there is no comprehensive definition of the essence of dissociative behavior. Numerous attempts to systematize dissociative disorders should also be considered unsatisfactory, which is primarily related to the lack of solid criteria for defining this group of disorders. According to the clinical classification, dissocial behavior is divided into psychotic and non-psychotic forms. Such differentiation is conditional in nature since it is not always possible to draw precise, clear distinctions between these forms, and in addition, there is a transition of a behavior disorder or so-called intermediate forms. One group of authors distinguishes two main forms of deviant behavior in terms of both theoretical and practical significance - non-pathological and pathological. In recent years, especially, the non-pathological form of behavior disorder has become topical. It refers to a large group of forms of deviant behavior, the emergence of which is associated with psychologically full-fledged reactions of children and adolescents to stressful situations and extreme conditions. According to the authors, its concept is understandable-it is difficult to draw a line between psychologically understandable reactions and psychogenically induced reactive states. In addition, the concept of "normal" child and adolescent is, to some extent, a vague concept, as in medicine, any definition of the norm. From a practical (more precisely, pragmatic) point of view, the term "abnormal behavioral disorder" undoubtedly makes sense, especially for the purpose of forensic psychiatric examination. Non-pathological deviation mainly includes transient situational reactions, microsocial-pedagogical backwardness, and character accentuation.Deviant behavior was predominantly manifested in a non-pathological form, which, in our opinion, is due to the difficult socio-economic situation of the country, moral-ethical deprivation, and expressed frustration. By itself, society is an indicator of deviation. Add to this situation complicated factors such as micro-social-pedagogical leave, unfavorable family environment, and parenting defects. Consideration is also given to the connection of acceptable deviation with the personal structural features of the adolescent. Aim: The topic of our discussion is the dissocial behavior of the non-psychotic register. Methods: We surveyed 120 adolescents with deviant behaviors. 61% of them were diagnosed with various neuropsychiatric disorders. Results: Abnormal forms of deviant behavior were observed in 13%, and non-pathological forms in -69%. A combination of non-pathological and pathological forms was present in 10% of cases. In the case of non-pathological deviation, microsocial-pedagogical acceptance was revealed in 62%, character accentuation in 22%; during the pathological forms, pathological reactions were observed in 21%, and abnormal formation of the person -21%. Conclusion: It should be emphasized that in case of any of the above defects, if the so-called family psychosis, and medical and pedagogical habilitation measures for the adolescent, it is quite possible to prevent the abnormal development of the child's personality, correct his character, regulate behavior and develop positive labor-social relations.Keywords: dissocial personality, deviant behavior, dissocial, delinquent behavior
Procedia PDF Downloads 2264107 Malaria Menace in Pregnancy; Hard to Ignore
Authors: Nautiyal Ruchira, Nautiyal Hemant, Chaudhury Devnanda, Bhargava Surbhi, Chauhan Nidhi
Abstract:
Introduction: South East Asian region contributes 2.5 million cases of malaria each year to the global burden of 300 to 500 million of which 76% is reported from India. Government of India launched a national program almost half a century ago, still malaria remains a major public health challenge. Pregnant women are more susceptible to severe malaria and its fetomaternal complications. Inadequate surveillance and under-reporting underestimates the problem. Aim: Present study aimed to analyze the clinical course and pattern of malaria during pregnancy and to study the feto-maternal outcome. Methodology: This is a prospective observational study carried out at Himalayan Institute of Medical Sciences – a tertiary care center in the sub-Himalayan state of Uttarakhand, Northern India. All the pregnant women with malaria and its complications were recruited in the study during 2009 to 2014 which included referred cases from the state of western Uttar Pradesh. A thorough history and clinical examination were carried out to assess maternal and fetal condition. Relevant investigations including haemogram, platelet count, LFT, RFT, and USG was done. Blood slides and rapid diagnostic tests were done to diagnose the type of malaria.The primary outcomes measured were the type of malaria infection, maternal complications associated with malaria, outcome of pregnancy and effect on the fetus. Results: 67 antenatal cases with malaria infection were studied. 71% patients were diagnosed with plasmodium vivax infection, 25% cases were plasmodium falciparum positive and in 3% cases mixed infection was found. 38(56%) patients were primigravida and 29(43%) were multiparous. Most of the patients had already received some treatment from their local doctors and presented with severe malaria with the complications. Thrombocytopenia was the commonest manifestation seen in 35(52%) patients, jaundice in 28%, severe anemia in 18%, and severe oligohydramnios in 10% and renal failure in 6% cases. Regarding pregnancy outcome there were 44 % preterm deliveries, 22% had IUFD and abortions in 6% cases.20% of newborn were low birth weight and 6% were IUGR. There was only one maternal death which occurred due to ARDS in falciparum malaria. Although Plasmodium vivax was the main parasite considering the severity of clinical presentation, all the patients received intensive care. As most of the patients had received chloroquine therapy hence they were treated with IV artesunate followed by oral artemesinin combination therapy. Other therapies in the form of packed RBC’s and platelet transfusions, dialysis and ventilator support were provided when required. Conclusion: Even in areas with annual parasite index (API) less than 2 like ours, malaria in pregnancy could be an alarming problem. Vivax malaria cannot be considered benign in pregnancy because of high incidence of morbidity. Prompt diagnosis and aggressive treatment can reduce morbidity and mortality significantly. Increased community level research, integrating ANC checkups with the distribution of insecticide-treated nets in areas of high endemicity, imparting education and awareness will strengthen the existing control strategies.Keywords: severe malaria, pregnancy, plasmodium vivax, plasmodium falciparum
Procedia PDF Downloads 2814106 Early Detection of Lymphedema in Post-Surgery Oncology Patients
Authors: Sneha Noble, Rahul Krishnan, Uma G., D. K. Vijaykumar
Abstract:
Breast-Cancer related Lymphedema is a major problem that affects many women. Lymphedema is the swelling that generally occurs in the arms or legs caused by the removal of or damage to lymph nodes as a part of cancer treatment. Treating it at the earliest possible stage is the best way to manage the condition and prevent it from leading to pain, recurrent infection, reduced mobility, and impaired function. So, this project aims to focus on the multi-modal approaches to identify the risks of Lymphedema in post-surgical oncology patients and prevent it at the earliest. The Kinect IR Sensor is utilized to capture the images of the body and after image processing techniques, the region of interest is obtained. Then, performing the voxelization method will provide volume measurements in pre-operative and post-operative periods in patients. The formation of a mathematical model will help in the comparison of values. Clinical pathological data of patients will be investigated to assess the factors responsible for the development of lymphedema and its risks.Keywords: Kinect IR sensor, Lymphedema, voxelization, lymph nodes
Procedia PDF Downloads 1404105 An Algorithm to Find Fractional Edge Domination Number and Upper Fractional Edge Domination Number of an Intuitionistic Fuzzy Graph
Authors: Karunambigai Mevani Govindasamy, Sathishkumar Ayyappan
Abstract:
In this paper, we formulate the algorithm to find out the dominating function parameters of Intuitionistic Fuzzy Graphs(IFG). The methodology we adopted here is converting any physical problem into an IFG, and that has been transformed into Intuitionistic Fuzzy Matrix. Using Linear Program Solver software (LiPS), we found the defined parameters for the given IFG. We obtained these parameters for a path and cycle IFG. This study can be extended to other varieties of IFG. In particular, we obtain the definition of edge dominating function, minimal edge dominating function, fractional edge domination number (γ_if^') and upper fractional edge domination number (Γ_if^') of an intuitionistic fuzzy graph. Also, we formulated an algorithm which is appropriate to work on LiPS to find fractional edge domination number and upper fractional edge domination number of an IFG.Keywords: fractional edge domination number, intuitionistic fuzzy cycle, intuitionistic fuzzy graph, intuitionistic fuzzy path
Procedia PDF Downloads 1774104 A Novel Gateway Location Algorithm for Wireless Mesh Networks
Authors: G. M. Komba
Abstract:
The Internet Gateway (IGW) has extra ability than a simple Mesh Router (MR) and the responsibility to route mostly the all traffic from Mesh Clients (MCs) to the Internet backbone however, IGWs are more expensive. Choosing strategic locations for the Internet Gateways (IGWs) best location in Backbone Wireless Mesh (BWM) precarious to the Wireless Mesh Network (WMN) and the location of IGW can improve a quantity of performance related problem. In this paper, we propose a novel algorithm, namely New Gateway Location Algorithm (NGLA), which aims to achieve four objectives, decreasing the network cost effective, minimizing delay, optimizing the throughput capacity, Different from existing algorithms, the NGLA increasingly recognizes IGWs, allocates mesh routers (MRs) to identify IGWs and promises to find a feasible IGW location and install minimum as possible number of IGWs while regularly conserving the all Quality of Service (QoS) requests. Simulation results showing that the NGLA outperforms other different algorithms by comparing the number of IGWs with a large margin and it placed 40% less IGWs and 80% gain of throughput. Furthermore the NGLA is easy to implement and could be employed for BWM.Keywords: Wireless Mesh Network, Gateway Location Algorithm, Quality of Service, BWM
Procedia PDF Downloads 3734103 Optimization of Carbon Nanotube Content of Asphalt Nanocomposites with Regard to Resistance to Permanent Deformation
Authors: João V. Staub de Melo, Glicério Trichês, Liseane P. Thives
Abstract:
This paper presents the results of the development of asphalt nanocomposites containing carbon nanotubes (CNTs) with high resistance to permanent deformation, aiming to increase the performance of asphalt surfaces in relation to the rutting problem. Asphalt nanocomposites were prepared with the addition of different proportions of CNTs (1%, 2% and 3%) in relation to the weight of asphalt binder. The base binder used was a conventional binder (50-70 penetration) classified as PG 58-22. The optimum percentage of CNT addition in the asphalt binder (base) was determined through the evaluation of the rheological and empirical characteristics of the nanocomposites produced. In order to evaluate the contribution and the effects of the nanocomposite (optimized) in relation to the rutting, the conventional and nanomodified asphalt mixtures were tested in a French traffic simulator (Orniéreur). The results obtained demonstrate the efficient contribution of the asphalt nanocomposite containing CNTs to the resistance to permanent deformation of the asphalt mixture.Keywords: asphalt nanocomposites, asphalt mixtures, carbon nanotubes, nanotechnology, permanent deformation
Procedia PDF Downloads 2854102 Stability and Performance Improvement of a Two-Degree-of-Freedom Robot under Interaction Using the Impedance Control
Authors: Seyed Reza Mirdehghan, Mohammad Reza Haeri Yazdi
Abstract:
In this paper, the stability and the performance of a two-degree-of-freedom robot under an interaction with a unknown environment has been investigated. The time when the robot returns to its initial position after an interaction and the primary resistance of the robot against the impact must be reduced. Thus, the applied torque on the motor will be reduced. The impedance control is an appropriate method for robot control in these conditions. The stability of the robot at interaction moment was transformed to be a robust stability problem. The dynamic of the unknown environment was modeled as a weight function and the stability of the robot under an interaction with the environment has been investigated using the robust control concept. To improve the performance of the system, a force controller has been designed which the normalized impedance after interaction has been reduced. The resistance of the robot has been considered as a normalized cost function and its value was 0.593. The results has showed reduction of resistance of the robot against impact and the reduction of convergence time by lower than one second.Keywords: impedance control, control system, robots, interaction
Procedia PDF Downloads 4324101 Clutter Suppression Based on Singular Value Decomposition and Fast Wavelet Algorithm
Authors: Ruomeng Xiao, Zhulin Zong, Longfa Yang
Abstract:
Aiming at the problem that the target signal is difficult to detect under the strong ground clutter environment, this paper proposes a clutter suppression algorithm based on the combination of singular value decomposition and the Mallat fast wavelet algorithm. The method first carries out singular value decomposition on the radar echo data matrix, realizes the initial separation of target and clutter through the threshold processing of singular value, and then carries out wavelet decomposition on the echo data to find out the target location, and adopts the discard method to select the appropriate decomposition layer to reconstruct the target signal, which ensures the minimum loss of target information while suppressing the clutter. After the verification of the measured data, the method has a significant effect on the target extraction under low SCR, and the target reconstruction can be realized without the prior position information of the target and the method also has a certain enhancement on the output SCR compared with the traditional single wavelet processing method.Keywords: clutter suppression, singular value decomposition, wavelet transform, Mallat algorithm, low SCR
Procedia PDF Downloads 121