Search results for: recursive least square algorithm
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5093

Search results for: recursive least square algorithm

1763 Trainees' Perception of Virtual Learning Skills in Setting up the Simulator Welding Technology

Authors: Mohd Afif Md Nasir, Mohd Faizal Amin Nur, Jamaluddin Hasim, Abd Samad Hasan Basari, Mohd Halim Sahelan

Abstract:

This study is aimed to investigate the suitability of Computer-Based Training (CBT) as one of the approaches in skills competency development at the Centre of Instructor and Advanced Skills Training (CIAST) Shah Alam Selangor and National Youth Skills Institute (NYSI) Pagoh Muar Johor. This study has also examined the perception among trainees toward Virtual Learning Environment (VLE) as to realize the development of skills in Welding Technology. The significance of the study is to create a computer-based skills development approach in welding technology among new trainees in CIAST and IKBN as well as to cultivate the element of general skills among them. This study is also important in elevating the number of individual knowledge workers (K-Workers) working in manufacturing industry in order to achieve the national vision which is to be an industrial nation in the year 2020. The design is a survey of research which using questionnaires as the instruments and is conducted towards 136 trainees from CIAST and IKBN. Data from the questionnaires is proceeding in a Statistical Package for Social Science (SPSS) in order to find the frequency, mean and chi-square testing. The findings of the study show the welding technology skills have developed in the trainees as a result of the application of the Virtual Reality simulator at a high level (mean=3.90) and the respondents agreed the skills could be embedded through the application of the Virtual Reality simulator (78.01%). The Study also found that there is a significant difference between trainee skill characteristics through the application of the Virtual Reality simulator (p<0.05). Thereby, the Virtual Reality simulator is suitable to be used in the development of welding skills among trainees through the skills training institute.

Keywords: computer-based training, virtual learning environment, welding technology, virtual reality simulator, virtual learning environment

Procedia PDF Downloads 422
1762 Analysing the Behaviour of Local Hurst Exponent and Lyapunov Exponent for Prediction of Market Crashes

Authors: Shreemoyee Sarkar, Vikhyat Chadha

Abstract:

In this paper, the local fractal properties and chaotic properties of financial time series are investigated by calculating two exponents, the Local Hurst Exponent: LHE and Lyapunov Exponent in a moving time window of a financial series.y. For the purpose of this paper, the Dow Jones Industrial Average (DIJA) and S&P 500, two of the major indices of United States have been considered. The behaviour of the above-mentioned exponents prior to some major crashes (1998 and 2008 crashes in S&P 500 and 2002 and 2008 crashes in DIJA) is discussed. Also, the optimal length of the window for obtaining the best possible results is decided. Based on the outcomes of the above, an attempt is made to predict the crashes and accuracy of such an algorithm is decided.

Keywords: local hurst exponent, lyapunov exponent, market crash prediction, time series chaos, time series local fractal properties

Procedia PDF Downloads 144
1761 Factors Influencing the Use of Psychoactive Substance among Senior Secondary Students in Ibadan South-West Local Government, Oyo State, Nigeria

Authors: Olajumoke Temilola Fatimat, Fasasi Fausat Kikelomo, Ishola Ganiyat Folasayo, Omayeka Mary

Abstract:

Psychoactive substances are chemical substances that affect the normal functioning of the brain and cause changes in behavior, mood, and consciousness. Psychoactive substance abuse constitutes one of the most important risk–taking behavior among adolescents and young adults in secondary schools. The study, therefore, assessed the factors influencing the use of psychoactive substances among senior secondary students in Ibadan South–West Local Government Area, Oyo State. A descriptive non-experimental design was adopted; purposive and simple random sampling techniques were used to select 330 respondents, while questionnaires were used for data collection. The descriptive statistics of frequency count, percentages, inferential statistics of chi-square, and analysis of variance were used for the analysis. The results revealed that the majority of the respondents had heard of the term substance abuse before 226 (75.3%); it was also revealed that the majority of the respondents had good knowledge of psychoactive substances, 67.8%. There was no significant relationship between age and knowledge of psychoactive substances among senior secondary students, with a p-value of 0.199. The outcome of this study indicates that drug abuse is increasing day by day among secondary school students and may have greatly contributed to poor performance in examinations as well as undermining academic ability and performance among students. It was recommended that efforts should be made by the school authorities of the secondary schools in Ibadan South–West Local Government Area, Oyo State, and in Oyo State generally in collaboration with health personnel to educate adolescents on psychoactive substance abuse. This is to ensure that adolescents are adequately educated and updated on knowledge of psychoactive substance abuse.

Keywords: factors, influence, psychoactive substance, secondary school

Procedia PDF Downloads 63
1760 Solving Linear Systems Involved in Convex Programming Problems

Authors: Yixun Shi

Abstract:

Many interior point methods for convex programming solve an (n+m)x(n+m)linear system in each iteration. Many implementations solve this system in each iteration by considering an equivalent mXm system (4) as listed in the paper, and thus the job is reduced into solving the system (4). However, the system(4) has to be solved exactly since otherwise the error would be entirely passed onto the last m equations of the original system. Often the Cholesky factorization is computed to obtain the exact solution of (4). One Cholesky factorization is to be done in every iteration, resulting in higher computational costs. In this paper, two iterative methods for solving linear systems using vector division are combined together and embedded into interior point methods. Instead of computing one Cholesky factorization in each iteration, it requires only one Cholesky factorization in the entire procedure, thus significantly reduces the amount of computation needed for solving the problem. Based on that, a hybrid algorithm for solving convex programming problems is proposed.

Keywords: convex programming, interior point method, linear systems, vector division

Procedia PDF Downloads 396
1759 Analyzing the Association between Physical Activity and Sleep Quality in College Students: Cross-Sectional Study

Authors: Fildzah Badzlina, Mega Puspa Sari

Abstract:

To rest the body after a full day of activities, the body needs sleep. During sleep, the body's response to external stimuli will be reduced and relatively inactive so that it is used to optimize the body's biological functions that cannot be done when awake. College students often experience poor sleep quality because of the dense activities carried out during the day. In addition, the level of physical activity of college students is also relatively low. Based on previous research, college students who have low physical activity have poor sleep quality. Therefore, the purpose of this study was to determine the relationship between physical activity and sleep quality in college students of the University of Muhammadiyah Prof. Dr. Hamka. This study used a cross-sectional research design with 107 respondents as research subjects. Samples were taken using the purposive sampling technique. The data was taken using a google form which was distributed to all college students in September 2021. The statistical test used was Chi-square. The results of this study showed that 85 (79.4%) college students experienced poor sleep quality during the Covid-19 Pandemic Period. Most respondents were 96 women (89.7%) and 32.7% (35 people) aged 20 years. In the pocket money category, most college students (71%) got pocket money less than 500.000 rupiahs per month. A total of 52 respondents (48.6%) had a moderate level of physical activity category. Poor sleep quality was more common in male students (90.9%) compared to female students (78.1%) (p>0.05). In the group with poor sleep quality, 88.9% of students were categorized in Rp. 500.001 to Rp. 1.000.000 for pocket money, 80.3% of students included in the category Rp. 500.000 or less, and 61.5% of students are included in the category of Rp. 1.000.000 or more. Poor sleep quality was more common among students in the age category 20 years (84.1%), compared to students in the age category > 20 years (71.1%). For the level of physical activity in the poor sleep quality group, 87% were included in the category of heavy physical activity, 82.7% included in the moderate level of physical activity, and 68.8% included in the category of low-level physical activity. There was no significant relationship between gender, pocket money, age, and physical activity with sleep quality (p>0.05).

Keywords: college students, physical activity, sleep quality, university students

Procedia PDF Downloads 134
1758 A Survey on Countermeasures of Cache-Timing Attack on AES Systems

Authors: Settana M. Abdulh, Naila A. Sadalla, Yaseen H. Taha, Howaida Elshoush

Abstract:

Side channel attacks are based on side channel information, which is information that is leaked from encryption systems. This includes timing information, power consumption as well as electromagnetic or even sound leaking which can exploited by an attacker. Implementing side channel attacks are possible if and only if an attacker has access to a cryptosystem. In this case, the attacker can exploit bad implementation in software or hardware which is not controlled by encryption implementer. Thus, he/she will represent a real threat to the security system. Several countermeasures have been proposed to eliminate side channel information vulnerability.Cache timing attack is a special type of side channel attack. Here, timing information is collected and analyzed by an attacker to guess sensitive information such as encryption key or plaintext. This paper reviews the technique applied in this attack and surveys the countermeasures against it, evaluating the feasibility and usability of each. Based on this evaluation, finally we pose several recommendations about using these countermeasures.

Keywords: AES algorithm, side channel attack, cache timing attack, cache timing countermeasure

Procedia PDF Downloads 296
1757 A Weighted Approach to Unconstrained Iris Recognition

Authors: Yao-Hong Tsai

Abstract:

This paper presents a weighted approach to unconstrained iris recognition. Nowadays, commercial systems are usually characterized by strong acquisition constraints based on the subject’s cooperation. However, it is not always achievable for real scenarios in our daily life. Researchers have been focused on reducing these constraints and maintaining the performance of the system by new techniques at the same time. With large variation in the environment, there are two main improvements to develop the proposed iris recognition system. For solving extremely uneven lighting condition, statistic based illumination normalization is first used on eye region to increase the accuracy of iris feature. The detection of the iris image is based on Adaboost algorithm. Secondly, the weighted approach is designed by Gaussian functions according to the distance to the center of the iris. Furthermore, local binary pattern (LBP) histogram is then applied to texture classification with the weight. Experiment showed that the proposed system provided users a more flexible and feasible way to interact with the verification system through iris recognition.

Keywords: authentication, iris recognition, adaboost, local binary pattern

Procedia PDF Downloads 216
1756 Printed Thai Character Recognition Using Particle Swarm Optimization Algorithm

Authors: Phawin Sangsuvan, Chutimet Srinilta

Abstract:

This Paper presents the applications of Particle Swarm Optimization (PSO) Method for Thai optical character recognition (OCR). OCR consists of the pre-processing, character recognition and post-processing. Before enter into recognition process. The Character must be “Prepped” by pre-processing process. The PSO is an optimization method that belongs to the swarm intelligence family based on the imitation of social behavior patterns of animals. Route of each particle is determined by an individual data among neighborhood particles. The interaction of the particles with neighbors is the advantage of Particle Swarm to determine the best solution. So PSO is interested by a lot of researchers in many difficult problems including character recognition. As the previous this research used a Projection Histogram to extract printed digits features and defined the simple Fitness Function for PSO. The results reveal that PSO gives 67.73% for testing dataset. So in the future there can be explored enhancement the better performance of PSO with improve the Fitness Function.

Keywords: character recognition, histogram projection, particle swarm optimization, pattern recognition techniques

Procedia PDF Downloads 467
1755 Analysis and Rule Extraction of Coronary Artery Disease Data Using Data Mining

Authors: Rezaei Hachesu Peyman, Oliyaee Azadeh, Salahzadeh Zahra, Alizadeh Somayyeh, Safaei Naser

Abstract:

Coronary Artery Disease (CAD) is one major cause of disability in adults and one main cause of death in developed. In this study, data mining techniques including Decision Trees, Artificial neural networks (ANNs), and Support Vector Machine (SVM) analyze CAD data. Data of 4948 patients who had suffered from heart diseases were included in the analysis. CAD is the target variable, and 24 inputs or predictor variables are used for the classification. The performance of these techniques is compared in terms of sensitivity, specificity, and accuracy. The most significant factor influencing CAD is chest pain. Elderly males (age > 53) have a high probability to be diagnosed with CAD. SVM algorithm is the most useful way for evaluation and prediction of CAD patients as compared to non-CAD ones. Application of data mining techniques in analyzing coronary artery diseases is a good method for investigating the existing relationships between variables.

Keywords: classification, coronary artery disease, data-mining, knowledge discovery, extract

Procedia PDF Downloads 652
1754 Autonomous Position Control of an Unmanned Aerial Vehicle Based on Accelerometer Response for Indoor Navigation Using Kalman Filtering

Authors: Syed Misbahuddin, Sagufta Kapadia

Abstract:

Autonomous indoor drone navigation has been posed with various challenges, including the inability to use a Global Positioning System (GPS). As of now, Unmanned Aerial Vehicles (UAVs) either rely on 3D mapping systems or utilize external camera arrays to track the UAV in an enclosed environment. The objective of this paper is to develop an algorithm that utilizes Kalman Filtering to reduce noise, allowing the UAV to be navigated indoors using only the flight controller and an onboard companion computer. In this paper, open-source libraries are used to control the UAV, which will only use the onboard accelerometer on the flight controller to estimate the position through double integration. One of the advantages of such a system is that it allows for low-cost and lightweight UAVs to autonomously navigate indoors without advanced mapping of the environment or the use of expensive high-precision-localization sensors.

Keywords: accelerometer, indoor-navigation, Kalman-filtering, position-control

Procedia PDF Downloads 347
1753 Transformational Leadership Style of Principal and Conflict Management in Public Secondary Schools in North Central Nigeria

Authors: Odeh Regina Comfort, Angelina Okewu Ogwuche

Abstract:

The study investigated transformational leadership style of principal and conflict management in secondary schools in North Central Nigeria. A descriptive survey design was adopted. The population of the study comprised 34,473 teachers in 1949 public secondary schools in the study area. Proportionate stratified random sampling and simple random sampling techniques were used to select 39 public secondary schools and 689 respondents, respectively, for the study. The researcher utilized a self-structured questionnaire titled 'Influence of Transformational Leadership Style Questionnaire (ITLSQ)'. Face and content validity were ensured. The reliability index of 0.86 was obtained through Cronbach alpha statistics. The instrument was a modified Likert rating scale of Very High Extent (4), High Extent (3), Low Extent (2) and Very Low Extent (1). Mean, and standard deviation were used to answer 2 research questions, while chi-square goodness of fit was used to test the 2 hypotheses at 0.05 level of significance. The results among others indicate: that intellectual stimulation and individualized components of transformational leadership style of principal in public secondary schools in the study area have significant influence on conflict management in secondary schools. Based on the results, it was recommended that principals of secondary schools should be encouraged to practice the intellectual stimulation component of transformational leadership style that would help to consider teachers' levels of knowledge to decide what suits them to reach high levels of attainment thereby minimizing conflict in school settings; also transformational leadership should be taught to all people at all levels of secondary school especially that which pertains to individualized consideration to have a positive impact on the overall performance of teachers and this would help to minimize conflict in schools.

Keywords: conflict management, individualized consideration, intellectual stimulation, transformational leadership style

Procedia PDF Downloads 126
1752 Application of the MOOD Technique to the Steady-State Euler Equations

Authors: Gaspar J. Machado, Stéphane Clain, Raphael Loubère

Abstract:

The goal of the present work is to numerically study steady-state nonlinear hyperbolic equations in the context of the finite volume framework. We will consider the unidimensional Burgers' equation as the reference case for the scalar situation and the unidimensional Euler equations for the vectorial situation. We consider two approaches to solve the nonlinear equations: a time marching algorithm and a direct steady-state approach. We first develop the necessary and sufficient conditions to obtain the existence and unicity of the solution. We treat regular examples and solutions with a steady shock and to provide very-high-order finite volume approximations we implement a method based on the MOOD technology (Multi-dimensional Optimal Order Detection). The main ingredient consists in using an 'a posteriori' limiting strategy to eliminate non physical oscillations deriving from the Gibbs phenomenon while keeping a high accuracy for the smooth part.

Keywords: Euler equations, finite volume, MOOD, steady-state

Procedia PDF Downloads 270
1751 Error Correction Method for 2D Ultra-Wideband Indoor Wireless Positioning System Using Logarithmic Error Model

Authors: Phornpat Chewasoonthorn, Surat Kwanmuang

Abstract:

Indoor positioning technologies have been evolved rapidly. They augment the Global Positioning System (GPS) which requires line-of-sight to the sky to track the location of people or objects. This study developed an error correction method for an indoor real-time location system (RTLS) based on an ultra-wideband (UWB) sensor from Decawave. Multiple stationary nodes (anchor) were installed throughout the workspace. The distance between stationary and moving nodes (tag) can be measured using a two-way-ranging (TWR) scheme. The result has shown that the uncorrected ranging error from the sensor system can be as large as 1 m. To reduce ranging error and thus increase positioning accuracy, This study purposes an online correction algorithm using the Kalman filter. The results from experiments have shown that the system can reduce ranging error down to 5 cm.

Keywords: indoor positioning, ultra-wideband, error correction, Kalman filter

Procedia PDF Downloads 153
1750 Development of an Automatic Control System for ex vivo Heart Perfusion

Authors: Pengzhou Lu, Liming Xin, Payam Tavakoli, Zhonghua Lin, Roberto V. P. Ribeiro, Mitesh V. Badiwala

Abstract:

Ex vivo Heart Perfusion (EVHP) has been developed as an alternative strategy to expand cardiac donation by enabling resuscitation and functional assessment of hearts donated from marginal donors, which were previously not accepted. EVHP parameters, such as perfusion flow (PF) and perfusion pressure (PP) are crucial for optimal organ preservation. However, with the heart’s constant physiological changes during EVHP, such as coronary vascular resistance, manual control of these parameters is rendered imprecise and cumbersome for the operator. Additionally, low control precision and the long adjusting time may lead to irreversible damage to the myocardial tissue. To solve this problem, an automatic heart perfusion system was developed by applying a Human-Machine Interface (HMI) and a Programmable-Logic-Controller (PLC)-based circuit to control PF and PP. The PLC-based control system collects the data of PF and PP through flow probes and pressure transducers. It has two control modes: the RPM-flow mode and the pressure mode. The RPM-flow control mode is an open-loop system. It influences PF through providing and maintaining the desired speed inputted through the HMI to the centrifugal pump with a maximum error of 20 rpm. The pressure control mode is a closed-loop system where the operator selects a target Mean Arterial Pressure (MAP) to control PP. The inputs of the pressure control mode are the target MAP, received through the HMI, and the real MAP, received from the pressure transducer. A PID algorithm is applied to maintain the real MAP at the target value with a maximum error of 1mmHg. The precision and control speed of the RPM-flow control mode were examined by comparing the PLC-based system to an experienced operator (EO) across seven RPM adjustment ranges (500, 1000, 2000 and random RPM changes; 8 trials per range) tested in a random order. System’s PID algorithm performance in pressure control was assessed during 10 EVHP experiments using porcine hearts. Precision was examined through monitoring the steady-state pressure error throughout perfusion period, and stabilizing speed was tested by performing two MAP adjustment changes (4 trials per change) of 15 and 20mmHg. A total of 56 trials were performed to validate the RPM-flow control mode. Overall, the PLC-based system demonstrated the significantly faster speed than the EO in all trials (PLC 1.21±0.03, EO 3.69±0.23 seconds; p < 0.001) and greater precision to reach the desired RPM (PLC 10±0.7, EO 33±2.7 mean RPM error; p < 0.001). Regarding pressure control, the PLC-based system has the median precision of ±1mmHg error and the median stabilizing times in changing 15 and 20mmHg of MAP are 15 and 19.5 seconds respectively. The novel PLC-based control system was 3 times faster with 60% less error than the EO for RPM-flow control. In pressure control mode, it demonstrates a high precision and fast stabilizing speed. In summary, this novel system successfully controlled perfusion flow and pressure with high precision, stability and a fast response time through a user-friendly interface. This design may provide a viable technique for future development of novel heart preservation and assessment strategies during EVHP.

Keywords: automatic control system, biomedical engineering, ex-vivo heart perfusion, human-machine interface, programmable logic controller

Procedia PDF Downloads 168
1749 Characterization of Electrical Transport across Ultra-Thin SrTiO₃ and BaTiO₃ Barriers in Tunnel Junctions

Authors: Henry Navarro, Martin Sirena, Nestor Haberkorn

Abstract:

We report the electrical transport through voltage-current curves (I-V) in tunnels junction GdBa₂Cu₃O₇-d/ insulator/ GdBa₂Cu₃O₇-d, and Nb/insulator/ GdBa₂Cu₃O₇-d is analyzed using a conducting atomic force microscope (CAFM) at room temperature. The measurements were obtained on tunnel junctions with different areas (900 μm², 400 μm² and 100 μm²). Trilayers with GdBa₂Cu₃O₇-d (GBCO) as the bottom electrode, SrTiO₃ (STO) or BaTiO₃ (BTO) as the insulator barrier (thicknesses between 1.6 nm and 4 nm), and GBCO or Nb as the top electrode were grown by DC sputtering on (100) SrTiO₃ substrates. For STO and BTO barriers, asymmetric IV curves at positive and negative polarization can be obtained using electrodes with different work function. The main difference is that the BTO is a ferroelectric material, while in the STO the ferroelectricity can be produced by stress or deformation at the interfaces. In addition, hysteretic IV curves are obtained for BTO barriers, which can be ascribed to a combined effect of the FE reversal switching polarization and an oxygen vacancy migration. For GBCO/ BTO/ GBCO heterostructures, the IV curves correspond to that expected for asymmetric interfaces, which indicates that the disorder affects differently the properties at the bottom and top interfaces. Our results show the role of the interface disorder on the electrical transport of conducting/ insulator/ conduction heterostructures, which is relevant for different applications, going from resistive switching memories (at room temperature) to Josephson junctions (at low temperatures). The superconducting transition of the GBCO electrode was characterized by electrical transport using the 4-prong configuration with low density of topological defects and with Tc over liquid N₂ can be obtained for thicknesses of 16 nm, our results demonstrate that GBCO films with an average root-mean-square (RMS) smaller than 1 nm and areas (up 100 um²) free of 3-D topological defects can be obtained.

Keywords: thin film, sputtering, conductive atomic force microscopy, tunnel junctions

Procedia PDF Downloads 149
1748 Main Chaos-Based Image Encryption Algorithm

Authors: Ibtissem Talbi

Abstract:

During the last decade, a variety of chaos-based cryptosystems have been investigated. Most of them are based on the structure of Fridrich, which is based on the traditional confusion-diffusion architecture proposed by Shannon. Compared with traditional cryptosystems (DES, 3DES, AES, etc.), the chaos-based cryptosystems are more flexible, more modular and easier to be implemented, which make them suitable for large scale-data encyption, such as images and videos. The heart of any chaos-based cryptosystem is the chaotic generator and so, a part of the efficiency (robustness, speed) of the system depends greatly on it. In this talk, we give an overview of the state of the art of chaos-based block ciphers and we describe some of our schemes already proposed. Also we will focus on the essential characteristics of the digital chaotic generator, The needed performance of a chaos-based block cipher in terms of security level and speed of calculus depends on the considered application. There is a compromise between the security and the speed of the calculation. The security of these block block ciphers will be analyzed.

Keywords: chaos-based cryptosystems, chaotic generator, security analysis, structure of Fridrich

Procedia PDF Downloads 676
1747 A Strategy of Direct Power Control for PWM Rectifier Reducing Ripple in Instantaneous Power

Authors: T. Mohammed Chikouche, K. Hartani

Abstract:

Based on the analysis of basic direct torque control, a parallel master slave for four in-wheel permanent magnet synchronous motors (PMSM) fed by two three phase inverters used in electric vehicle is proposed in this paper. A conventional system with multi-inverter and multi-machine comprises a three phase inverter for each machine to be controlled. Another approach consists in using only one three-phase inverter to supply several permanent magnet synchronous machines. A modified direct torque control (DTC) algorithm is used for the control of the bi-machine traction system. Simulation results show that the proposed control strategy is well adapted for the synchronism of this system and provide good speed tracking performance.

Keywords: electric vehicle, multi-machine single-inverter system, multi-machine multi-inverter control, in-wheel motor, master-slave control

Procedia PDF Downloads 213
1746 Bit Error Rate Monitoring for Automatic Bias Control of Quadrature Amplitude Modulators

Authors: Naji Ali Albakay, Abdulrahman Alothaim, Isa Barshushi

Abstract:

The most common quadrature amplitude modulator (QAM) applies two Mach-Zehnder Modulators (MZM) and one phase shifter to generate high order modulation format. The bias of MZM changes over time due to temperature, vibration, and aging factors. The change in the biasing causes distortion to the generated QAM signal which leads to deterioration of bit error rate (BER) performance. Therefore, it is critical to be able to lock MZM’s Q point to the required operating point for good performance. We propose a technique for automatic bias control (ABC) of QAM transmitter using BER measurements and gradient descent optimization algorithm. The proposed technique is attractive because it uses the pertinent metric, BER, which compensates for bias drifting independently from other system variations such as laser source output power. The proposed scheme performance and its operating principles are simulated using OptiSystem simulation software for 4-QAM and 16-QAM transmitters.

Keywords: automatic bias control, optical fiber communication, optical modulation, optical devices

Procedia PDF Downloads 183
1745 Data Poisoning Attacks on Federated Learning and Preventive Measures

Authors: Beulah Rani Inbanathan

Abstract:

In the present era, it is vivid from the numerous outcomes that data privacy is being compromised in various ways. Machine learning is one technology that uses the centralized server, and then data is given as input which is being analyzed by the algorithms present on this mentioned server, and hence outputs are predicted. However, each time the data must be sent by the user as the algorithm will analyze the input data in order to predict the output, which is prone to threats. The solution to overcome this issue is federated learning, where the models alone get updated while the data resides on the local machine and does not get exchanged with the other local models. Nevertheless, even on these local models, there are chances of data poisoning, and it is crystal clear from various experiments done by many people. This paper delves into many ways where data poisoning occurs and the many methods through which it is prevalent that data poisoning still exists. It includes the poisoning attacks on IoT devices, Edge devices, Autoregressive model, and also, on Industrial IoT systems and also, few points on how these could be evadible in order to protect our data which is personal, or sensitive, or harmful when exposed.

Keywords: data poisoning, federated learning, Internet of Things, edge computing

Procedia PDF Downloads 82
1744 Factors Related to Oncology Ward Nurses’ Job Stress Adaptation Needs in Southern Taiwan Regional Hospital

Authors: Minhui Chiu

Abstract:

According to relevant studies, clinical nurses have high work pressure and relatively high job adaptation needs. The nurses who work in oncology wards have more adaptation needs when they face repeating hospitalization patients. The aims of this study were to investigate the job stress adaptation and related factors of nurses in oncology wards and to understand the predictors of job stress adaptation needs. Convenience sampling was used in this study. The nurses in the oncology specialist ward of a regional teaching hospital in southern Taiwan were selected as the research objects. A cross-sectional survey was conducted using a structured questionnaire, random sampling, and the questionnaires were filled out by the participating nurses. A total of 68 people were tested, and 65 valid questionnaires (95.6%). One basic data questionnaire and nurses’ job stress adaptation needs questionnaire were used. The data was archived with Microsoft Excel, and statistical analysis was performed with JMP12.0. The results showed that the average age was 28.8 (±6.7) years old, most of them were women, 62 (95.38%), and the average clinical experience in the hospital was 5.7 years (±5.9), and 62 (95.38%) were university graduates. 39 people (60.0%) had no work experience. 39 people (60.0%) liked nursing work very much, and 23 people (35.3%) just “liked”. 47 (72.3%) people were supported to be oncology nurses by their families. The nurses' job stress adaptation needs were 119.75 points (±17.24). The t-test and variance analysis of the impact of nurses' job pressure adaptation needs were carried out. The results showed that the score of college graduates was 121.10 (±16.39), which was significantly higher than that of master graduates 96.67 (±22.81), and the degree of liking for nursing work also reached a Significant difference. These two variables are important predictors of job adaptation needs, and the R Square is 24.15%. Conclusion: Increasing the love of clinical nurses in nursing and encouraging university graduation to have positive effects on job pressure adaptation needs and can be used as a reference for the management of human resources hospitals for oncology nurses.

Keywords: oncology nurse, job stress, job stress adaptation needs, manpower

Procedia PDF Downloads 109
1743 A Blockchain-Based Privacy-Preserving Physical Delivery System

Authors: Shahin Zanbaghi, Saeed Samet

Abstract:

The internet has transformed the way we shop. Previously, most of our purchases came in the form of shopping trips to a nearby store. Now, it’s as easy as clicking a mouse. But with great convenience comes great responsibility. We have to be constantly vigilant about our personal information. In this work, our proposed approach is to encrypt the information printed on the physical packages, which include personal information in plain text, using a symmetric encryption algorithm; then, we store that encrypted information into a Blockchain network rather than storing them in companies or corporations centralized databases. We present, implement and assess a blockchain-based system using Ethereum smart contracts. We present detailed algorithms that explain the details of our smart contract. We present the security, cost, and performance analysis of the proposed method. Our work indicates that the proposed solution is economically attainable and provides data integrity, security, transparency, and data traceability.

Keywords: blockchain, Ethereum, smart contract, commit-reveal scheme

Procedia PDF Downloads 145
1742 Phylogenetic Relationships of the Malaysian Primates Cercopithecine Based on COI Gene Sequences

Authors: B. M. Md-Zain, N. A. Rahman, M. A. B. Abdul-Latiff, W. M. R. Idris

Abstract:

We conducted molecular research to portray phylogenetic relationships of Malaysian primates particularly in the genus of Macaca. We have sequenced cytochrome C oxidase subunit I (COI) of mitochondrial DNA of several individuals from M. fascicularis and M. arctoides. PCR amplifications were performed and COI DNA sequences were aligned using ClustalW. Phylogenetic trees were constructed using distance analyses by employing neighbor-joining algorithm (NJ). We managed to sequence 700 bp of COI DNA sequences. The tree topology showed that M. fascicularis did not clump based on phyleogeography division in Peninsular Malaysia. Individuals from Negeri Sembilan merged together with samples from Perak and Penang into one clade. In addition, phylogenetic analyses indicated that M. arctoides was classified into sinica group instead of fascicularis group supported by genetic distance data. COI gene is an effective locus to clarify phylogenetic position of M. arctoides but not in discriminating M. fascicularis population in Peninsular Malaysia.

Keywords: cercopithecine, long-tailed macaque, Macaca fascicularis, Macaca arctoides

Procedia PDF Downloads 351
1741 Study of Photonic Crystal Band Gap and Hexagonal Microcavity Based on Elliptical Shaped Holes

Authors: A. Benmerkhi, A. Bounouioua, M. Bouchemat, T. Bouchemat

Abstract:

In this paper, we present a numerical optical properties of a triangular periodic lattice of elliptical air holes. We report the influence of the ratio (semi-major axis length of elliptical hole to the filling ratio) on the photonic band gap. Then by using the finite difference time domain (FDTD) algorithm, the resonant wavelength of the point defect microcavities in a two-dimensional photonic crystal (PC) shifts towards the low wavelengths with significantly increased filing ratio. It can be noted that the Q factor is gradually changed to higher when the filling ratio increases. It is due to an increase in reflectivity of the PC mirror. Also we theoretically investigate the H1 cavity, where the value of semi-major axis (Rx) of the six holes surrounding the cavity are fixed at 0.5a and the Rx of the two edge air holes are fixed at the optimum value of 0.52a. The highest Q factor of 4.1359 × 106 is achieved at the resonant mode located at λ = 1.4970 µm.

Keywords: photonic crystal, microcavity, filling ratio, elliptical holes

Procedia PDF Downloads 128
1740 Frame Camera and Event Camera in Stereo Pair for High-Resolution Sensing

Authors: Khen Cohen, Daniel Yankelevich, David Mendlovic, Dan Raviv

Abstract:

We present a 3D stereo system for high-resolution sensing in both the spatial and the temporal domains by combining a frame-based camera and an event-based camera. We establish a method to merge both devices into one unite system and introduce a calibration process, followed by a correspondence technique and interpolation algorithm for 3D reconstruction. We further provide quantitative analysis about our system in terms of depth resolution and additional parameter analysis. We show experimentally how our system performs temporal super-resolution up to effectively 1ms and can detect fast-moving objects and human micro-movements that can be used for micro-expression analysis. We also demonstrate how our method can extract colored events for an event-based camera without any degradation in the spatial resolution, compared to a colored filter array.

Keywords: DVS-CIS stereo vision, micro-movements, temporal super-resolution, 3D reconstruction

Procedia PDF Downloads 292
1739 Application of a Confirmatory Composite Model for Assessing the Extent of Agricultural Digitalization: A Case of Proactive Land Acquisition Strategy (PLAS) Farmers in South Africa

Authors: Mazwane S., Makhura M. N., Ginege A.

Abstract:

Digitalization in South Africa has received considerable attention from policymakers. The support for the development of the digital economy by the South African government has been demonstrated through the enactment of various national policies and strategies. This study sought to develop an index for agricultural digitalization by applying composite confirmatory analysis (CCA). Another aim was to determine the factors that affect the development of digitalization in PLAS farms. Data on the indicators of the three dimensions of digitalization were collected from 300 Proactive Land Acquisition Strategy (PLAS) farms in South Africa using semi-structured questionnaires. Confirmatory composite analysis (CCA) was employed to reduce the items into three digitalization dimensions and ultimately to a digitalization index. Standardized digitalization index scores were extracted and fitted to a linear regression model to determine the factors affecting digitalization development. The results revealed that the model shows practical validity and can be used to measure digitalization development as measures of fit (geodesic distance, standardized root mean square residual, and squared Euclidean distance) were all below their respective 95%quantiles of bootstrap discrepancies (HI95 values). Therefore, digitalization is an emergent variable that can be measured using CCA. The average level of digitalization in PLAS farms was 0.2 and varied significantly across provinces. The factors that significantly influence digitalization development in PLAS land reform farms were age, gender, farm type, network type, and cellular data type. This should enable researchers and policymakers to understand the level of digitalization and patterns of development, as well as correctly attribute digitalization development to the contributing factors.

Keywords: agriculture, digitalization, confirmatory composite model, land reform, proactive land acquisition strategy, South Africa

Procedia PDF Downloads 52
1738 Optimization of Vertical Axis Wind Turbine Based on Artificial Neural Network

Authors: Mohammed Affanuddin H. Siddique, Jayesh S. Shukla, Chetan B. Meshram

Abstract:

The neural networks are one of the power tools of machine learning. After the invention of perceptron in early 1980's, the neural networks and its application have grown rapidly. Neural networks are a technique originally developed for pattern investigation. The structure of a neural network consists of neurons connected through synapse. Here, we have investigated the different algorithms and cost function reduction techniques for optimization of vertical axis wind turbine (VAWT) rotor blades. The aerodynamic force coefficients corresponding to the airfoils are stored in a database along with the airfoil coordinates. A forward propagation neural network is created with the input as aerodynamic coefficients and output as the airfoil co-ordinates. In the proposed algorithm, the hidden layer is incorporated into cost function having linear and non-linear error terms. In this article, it is observed that the ANNs (Artificial Neural Network) can be used for the VAWT’s optimization.

Keywords: VAWT, ANN, optimization, inverse design

Procedia PDF Downloads 314
1737 Optimization of Loudspeaker Part Design Parameters by Air Viscosity Damping Effect

Authors: Yue Hu, Xilu Zhao, Takao Yamaguchi, Manabu Sasajima, Yoshio Koike, Akira Hara

Abstract:

This study optimized the design parameters of a cone loudspeaker as an example of high flexibility of the product design. We developed an acoustic analysis software program that considers the impact of damping caused by air viscosity. In sound reproduction, it is difficult to optimize each parameter of the loudspeaker design. To overcome the limitation of the design problem in practice, this study presents an acoustic analysis algorithm to optimize the design parameters of the loudspeaker. The material character of cone paper and the loudspeaker edge were the design parameters, and the vibration displacement of the cone paper was the objective function. The results of the analysis showed that the design had high accuracy as compared to the predicted value. These results suggested that although the parameter design is difficult, with experience and intuition, the design can be performed easily using the optimized design found with the acoustic analysis software.

Keywords: air viscosity, design parameters, loudspeaker, optimization

Procedia PDF Downloads 507
1736 Evaluating the Dosimetric Performance for 3D Treatment Planning System for Wedged and Off-Axis Fields

Authors: Nashaat A. Deiab, Aida Radwan, Mohamed S. Yahiya, Mohamed Elnagdy, Rasha Moustafa

Abstract:

This study is to evaluate the dosimetric performance of our institution's 3D treatment planning system for wedged and off-axis 6MV photon beams, guided by the recommended QA tests documented in the AAPM TG53; NCS report 15 test packages, IAEA TRS 430 and ESTRO booklet no.7. The study was performed for Elekta Precise linear accelerator designed for clinical range of 4, 6 and 15 MV photon beams with asymmetric jaws and fully integrated multileaf collimator that enables high conformance to target with sharp field edges. Ten tests were applied on solid water equivalent phantom along with 2D array dose detection system. The calculated doses using 3D treatment planning system PrecisePLAN were compared with measured doses to make sure that the dose calculations are accurate for simple situations such as square and elongated fields, different SSD, beam modifiers e.g. wedges, blocks, MLC-shaped fields and asymmetric collimator settings. The QA results showed dosimetric accuracy of the TPS within the specified tolerance limits. Except for large elongated wedged field, the central axis and outside central axis have errors of 0.2% and 0.5%, respectively, and off- planned and off-axis elongated fields the region outside the central axis of the beam errors are 0.2% and 1.1%, respectively. The dosimetric investigated results yielded differences within the accepted tolerance level as recommended. Differences between dose values predicted by the TPS and measured values at the same point are the result from limitations of the dose calculation, uncertainties in the measurement procedure, or fluctuations in the output of the accelerator.

Keywords: quality assurance, dose calculation, wedged fields, off-axis fields, 3D treatment planning system, photon beam

Procedia PDF Downloads 434
1735 High-Resolution Flood Hazard Mapping Using Two-Dimensional Hydrodynamic Model Anuga: Case Study of Jakarta, Indonesia

Authors: Hengki Eko Putra, Dennish Ari Putro, Tri Wahyu Hadi, Edi Riawan, Junnaedhi Dewa Gede, Aditia Rojali, Fariza Dian Prasetyo, Yudhistira Satya Pribadi, Dita Fatria Andarini, Mila Khaerunisa, Raditya Hanung Prakoswa

Abstract:

Catastrophe risk management can only be done if we are able to calculate the exposed risks. Jakarta is an important city economically, socially, and politically and in the same time exposed to severe floods. On the other hand, flood risk calculation is still very limited in the area. This study has calculated the risk of flooding for Jakarta using 2-Dimensional Model ANUGA. 2-Dimensional model ANUGA and 1-Dimensional Model HEC-RAS are used to calculate the risk of flooding from 13 major rivers in Jakarta. ANUGA can simulate physical and dynamical processes between the streamflow against river geometry and land cover to produce a 1-meter resolution inundation map. The value of streamflow as an input for the model obtained from hydrological analysis on rainfall data using hydrologic model HEC-HMS. The probabilistic streamflow derived from probabilistic rainfall using statistical distribution Log-Pearson III, Normal and Gumbel, through compatibility test using Chi Square and Smirnov-Kolmogorov. Flood event on 2007 is used as a comparison to evaluate the accuracy of model output. Property damage estimations were calculated based on flood depth for 1, 5, 10, 25, 50, and 100 years return period against housing value data from the BPS-Statistics Indonesia, Centre for Research and Development of Housing and Settlements, Ministry of Public Work Indonesia. The vulnerability factor was derived from flood insurance claim. Jakarta's flood loss estimation for the return period of 1, 5, 10, 25, 50, and 100 years, respectively are Rp 1.30 t; Rp 16.18 t; Rp 16.85 t; Rp 21.21 t; Rp 24.32 t; and Rp 24.67 t of the total value of building Rp 434.43 t.

Keywords: 2D hydrodynamic model, ANUGA, flood, flood modeling

Procedia PDF Downloads 270
1734 Comparison of Two Neural Networks To Model Margarine Age And Predict Shelf-Life Using Matlab

Authors: Phakamani Xaba, Robert Huberts, Bilainu Oboirien

Abstract:

The present study was aimed at developing & comparing two neural-network-based predictive models to predict shelf-life/product age of South African margarine using free fatty acid (FFA), water droplet size (D3.3), water droplet distribution (e-sigma), moisture content, peroxide value (PV), anisidine valve (AnV) and total oxidation (totox) value as input variables to the model. Brick margarine products which had varying ages ranging from fresh i.e. week 0 to week 47 were sourced. The brick margarine products which had been stored at 10 & 25 °C and were characterized. JMP and MATLAB models to predict shelf-life/ margarine age were developed and their performances were compared. The key performance indicators to evaluate the model performances were correlation coefficient (CC), root mean square error (RMSE), and mean absolute percentage error (MAPE) relative to the actual data. The MATLAB-developed model showed a better performance in all three performance indicators. The correlation coefficient of the MATLAB model was 99.86% versus 99.74% for the JMP model, the RMSE was 0.720 compared to 1.005 and the MAPE was 7.4% compared to 8.571%. The MATLAB model was selected to be the most accurate, and then, the number of hidden neurons/ nodes was optimized to develop a single predictive model. The optimized MATLAB with 10 neurons showed a better performance compared to the models with 1 & 5 hidden neurons. The developed models can be used by margarine manufacturers, food research institutions, researchers etc, to predict shelf-life/ margarine product age, optimize addition of antioxidants, extend shelf-life of products and proactively troubleshoot for problems related to changes which have an impact on shelf-life of margarine without conducting expensive trials.

Keywords: margarine shelf-life, predictive modelling, neural networks, oil oxidation

Procedia PDF Downloads 188