Search results for: information value method
23862 Synchronization of a Perturbed Satellite Attitude Motion
Authors: Sadaoui Djaouida
Abstract:
In this paper, the predictive control method is proposed to control the synchronization of two perturbed satellites attitude motion. Based on delayed feedback control of continuous-time systems combines with the prediction-based method of discrete-time systems, this approach only needs a single controller to realize synchronization, which has considerable significance in reducing the cost and complexity for controller implementation.Keywords: predictive control, synchronization, satellite attitude, control engineering
Procedia PDF Downloads 55523861 Method for Auto-Calibrate Projector and Color-Depth Systems for Spatial Augmented Reality Applications
Authors: R. Estrada, A. Henriquez, R. Becerra, C. Laguna
Abstract:
Spatial Augmented Reality is a variation of Augmented Reality where the Head-Mounted Display is not required. This variation of Augmented Reality is useful in cases where the need for a Head-Mounted Display itself is a limitation. To achieve this, Spatial Augmented Reality techniques substitute the technological elements of Augmented Reality; the virtual world is projected onto a physical surface. To create an interactive spatial augmented experience, the application must be aware of the spatial relations that exist between its core elements. In this case, the core elements are referred to as a projection system and an input system, and the process to achieve this spatial awareness is called system calibration. The Spatial Augmented Reality system is considered calibrated if the projected virtual world scale is similar to the real-world scale, meaning that a virtual object will maintain its perceived dimensions when projected to the real world. Also, the input system is calibrated if the application knows the relative position of a point in the projection plane and the RGB-depth sensor origin point. Any kind of projection technology can be used, light-based projectors, close-range projectors, and screens, as long as it complies with the defined constraints; the method was tested on different configurations. The proposed procedure does not rely on a physical marker, minimizing the human intervention on the process. The tests are made using a Kinect V2 as an input sensor and several projection devices. In order to test the method, the constraints defined were applied to a variety of physical configurations; once the method was executed, some variables were obtained to measure the method performance. It was demonstrated that the method obtained can solve different arrangements, giving the user a wide range of setup possibilities.Keywords: color depth sensor, human computer interface, interactive surface, spatial augmented reality
Procedia PDF Downloads 12423860 Perceptions toward Adopting Virtual Reality as a Learning Aid in Information Technology
Authors: S. Alfalah, J. Falah, T. Alfalah, M. Elfalah, O. Falah
Abstract:
The field of education is an ever-evolving area constantly enriched by newly discovered techniques provided by active research in all areas of technologies. The recent years have witnessed the introduction of a number of promising technologies and applications to enhance the teaching and learning experience. Virtual Reality (VR) applications are considered one of the evolving methods that have contributed to enhancing education in many fields. VR creates an artificial environment, using computer hardware and software, which is similar to the real world. This simulation provides a solution to improve the delivery of materials, which facilitates the teaching process by providing a useful aid to instructors, and enhances the learning experience by providing a beneficial learning aid. In order to assure future utilization of such systems, students’ perceptions were examined toward utilizing VR as an educational tool in the Faculty of Information Technology (IT) in The University of Jordan. A questionnaire was administered to IT undergraduates investigating students’ opinions about the potential opportunities that VR technology could offer and its implications as learning and teaching aid. The results confirmed the end users’ willingness to adopt VR systems as a learning aid. The result of this research forms a solid base for investing in a VR system for IT education.Keywords: information, technology, virtual reality, education
Procedia PDF Downloads 29023859 Bayesian Network and Feature Selection for Rank Deficient Inverse Problem
Authors: Kyugneun Lee, Ikjin Lee
Abstract:
Parameter estimation with inverse problem often suffers from unfavorable conditions in the real world. Useless data and many input parameters make the problem complicated or insoluble. Data refinement and reformulation of the problem can solve that kind of difficulties. In this research, a method to solve the rank deficient inverse problem is suggested. A multi-physics system which has rank deficiency caused by response correlation is treated. Impeditive information is removed and the problem is reformulated to sequential estimations using Bayesian network (BN) and subset groups. At first, subset grouping of the responses is performed. Feature selection with singular value decomposition (SVD) is used for the grouping. Next, BN inference is used for sequential conditional estimation according to the group hierarchy. Directed acyclic graph (DAG) structure is organized to maximize the estimation ability. Variance ratio of response to noise is used to pairing the estimable parameters by each response.Keywords: Bayesian network, feature selection, rank deficiency, statistical inverse analysis
Procedia PDF Downloads 31423858 Low Temperature Powders Synthesis of la1-xMgxAlO3 through Sol-Gel Method
Authors: R. Benakcha, M. Omari
Abstract:
Powders of La1-xMgxAlO3 (0 ≤ x ≤ 5) oxides, with large surface areas were synthesized by sol-gel process, utilizing citric acid. Heating of a mixed solution of CA, EtOH, and nitrates of lanthanum, aluminium and magnesium at 70°C gave transparent gel without any precipitation. The formation of pure perovskite La1-xMgxAlO3, occurred when the precursor was heat-treated at 800°C for 6 h. No X-ray diffraction evidence for the presence of crystalline impurities was obtained. The La1-xMgxAlO3 powders prepared by the sol-gel method have a considerably large surface area in the range of 12.9–20 m^2.g^-1 when compared with 0.3 m^2.g^-1 for the conventional solid-state reaction of LaAlO3. The structural characteristics were examined by means of conventional techniques namely X-ray diffraction, infrared spectroscopy, thermogravimetry and differential thermal (TG-DTA) and specific surface SBET. Pore diameters and crystallite sizes are in the 8.8-11.28 nm and 25.4-30.5 nm ranges, respectively. The sol-gel method is a simple technique that has several advantages. In addition to that of not requiring high temperatures, it has the potential to synthesize many kinds of mixed oxides and obtain other materials homogeneous and large purities. It also allows formatting a variety of materials: very fine powders, fibers and films.Keywords: aluminate, lanthan, perovskite, sol-gel
Procedia PDF Downloads 27923857 Preparation and Characterization of Cellulose Based Antimicrobial Food Packaging Materials
Authors: Memet Vezir Kahraman, Ferhat Sen
Abstract:
This study aimed to develop polyelectrolyte structured antimicrobial food packaging materials that do not contain any antimicrobial agents. Cationic hydroxyethyl cellulose was synthesized and characterized by Fourier Transform Infrared, carbon and proton Nuclear Magnetic Resonance spectroscopy. Its nitrogen content was determined by the Kjeldahl method. Polyelectrolyte structured antimicrobial food packaging materials were prepared using hydroxyethyl cellulose, cationic hydroxyethyl cellulose, and sodium alginate. Antimicrobial activity of materials was defined by inhibition zone method (disc diffusion method). Thermal stability of samples was evaluated by thermal gravimetric analysis and differential scanning calorimetry. Surface morphology of samples was investigated by scanning electron microscope. The obtained results prove that produced food packaging materials have good thermal and antimicrobial properties, and they can be used as food packaging material in many industries.Keywords: antimicrobial food packaging, cationic hydroxyethyl cellulose, polyelectrolyte, sodium alginate
Procedia PDF Downloads 16023856 Augmented Reality Using Cuboid Tracking as a Support for Early Stages of Architectural Design
Authors: Larissa Negris de Souza, Ana Regina Mizrahy Cuperschmid, Daniel de Carvalho Moreira
Abstract:
Augmented Reality (AR) alters the elaboration of the architectural project, which relates to project cognition: representation, visualization, and perception of information. Understanding these features from the earliest stages of the design can facilitate the study of relationships, zoning, and overall dimensions of the forms. This paper’s goal was to explore a new approach for information visualization during the early stages of architectural design using Augmented Reality (AR). A three-dimensional marker inspired by the Rubik’s Cube was developed, and its performance, evaluated. This investigation interwovens the acquired knowledge of traditional briefing methods and contemporary technology. We considered the concept of patterns (Alexander et al. 1977) to outline geometric forms and associations using visual programming. The Design Science Research was applied to develop the study. An SDK was used in a game engine to generate the AR app. The tool's functionality was assessed by verifying the readability and precision of the reconfigurable 3D marker. The results indicated an inconsistent response. To use AR in the early stages of architectural design the system must provide consistent information and appropriate feedback. Nevertheless, we conclude that our framework sets the ground for looking deep into AR tools for briefing design.Keywords: augmented reality, cuboid marker, early design stages, graphic representation, patterns
Procedia PDF Downloads 9823855 Topological Sensitivity Analysis for Reconstruction of the Inverse Source Problem from Boundary Measurement
Authors: Maatoug Hassine, Mourad Hrizi
Abstract:
In this paper, we consider a geometric inverse source problem for the heat equation with Dirichlet and Neumann boundary data. We will reconstruct the exact form of the unknown source term from additional boundary conditions. Our motivation is to detect the location, the size and the shape of source support. We present a one-shot algorithm based on the Kohn-Vogelius formulation and the topological gradient method. The geometric inverse source problem is formulated as a topology optimization one. A topological sensitivity analysis is derived from a source function. Then, we present a non-iterative numerical method for the geometric reconstruction of the source term with unknown support using a level curve of the topological gradient. Finally, we give several examples to show the viability of our presented method.Keywords: geometric inverse source problem, heat equation, topological optimization, topological sensitivity, Kohn-Vogelius formulation
Procedia PDF Downloads 30023854 CVOIP-FRU: Comprehensive VoIP Forensics Report Utility
Authors: Alejandro Villegas, Cihan Varol
Abstract:
Voice over Internet Protocol (VoIP) products is an emerging technology that can contain forensically important information for a criminal activity. Without having the user name and passwords, this forensically important information can still be gathered by the investigators. Although there are a few VoIP forensic investigative applications available in the literature, most of them are particularly designed to collect evidence from the Skype product. Therefore, in order to assist law enforcement with collecting forensically important information from variety of Betamax VoIP tools, CVOIP-FRU framework is developed. CVOIP-FRU provides a data gathering solution that retrieves usernames, contact lists, as well as call and SMS logs from Betamax VoIP products. It is a scripting utility that searches for data within the registry, logs and the user roaming profiles in Windows and Mac OSX operating systems. Subsequently, it parses the output into readable text and html formats. One superior way of CVOIP-FRU compared to the other applications that due to intelligent data filtering capabilities and cross platform scripting back end of CVOIP-FRU, it is expandable to include other VoIP solutions as well. Overall, this paper reveals the exploratory analysis performed in order to find the key data paths and locations, the development stages of the framework, and the empirical testing and quality assurance of CVOIP-FRU.Keywords: betamax, digital forensics, report utility, VoIP, VoIPBuster, VoIPWise
Procedia PDF Downloads 29723853 Electrochemical Performance of Carbon Nanotube Based Supercapacitor
Authors: Jafar Khan Kasi, Ajab Khan Kasi, Muzamil Bokhari
Abstract:
Carbon nanotube is one of the most attractive materials for the potential applications of nanotechnology due to its excellent mechanical, thermal, electrical and optical properties. In this paper we report a supercapacitor made of nickel foil electrodes, coated with multiwall carbon nanotubes (MWCNTs) thin film using electrophoretic deposition (EPD) method. Chemical vapor deposition method was used for the growth of MWCNTs and ethanol was used as a hydrocarbon source. High graphitic multiwall carbon nanotube was found at 750 C analyzing by Raman spectroscopy. We observed the electrochemical performance of supercapacitor by cyclic voltammetry. The electrodes of supercapacitor fabricated from MWCNTs exhibit considerably small equivalent series resistance (ESR), and a high specific power density. Electrophoretic deposition is an easy method in fabricating MWCNT electrodes for high performance supercapacitor.Keywords: carbon nanotube, chemical vapor deposition, catalyst, charge, cyclic voltammetry
Procedia PDF Downloads 56323852 Communication Barriers in Midwifery Students in the Field of Perinatal Palliative Care
Authors: Magdalena Hasplova, Katerina Ivanova
Abstract:
Perinatal palliative care is a relatively young and developing field that includes the care of a fetus or newborn with a life-threatening or limiting defect and his family. However, the training of midwives in perinatal palliative care is insufficient and midwives do not feel prepared for this aspect of their work. This fact can affect the barriers to communication with the mother or family of the endangered child. The main aim was to analyze the awareness of midwifery students on the issue of perinatal palliative care in the Czech Republic. Based on the analysis, draw attention to possible communication barriers that may be caused by insufficient information. The research was carried out using a qualitative method, the method of data collection was a semi-structured interview. Eleven female students took part in the research, and the respondents were selected using the Snowballing method. Some methods of grounded theory (open coding and category creation) were used to analyze the data. Based on the results of the research, questions were set in a questionnaire focused on communication barriers between mothers (family) and health care professionals in the care of newborns with life-threatening or limiting disabilities. Based on the analysis of data, categories 1 were determined. Knowledge of perinatal palliative care 2. Education 3. Practical experience 4. Readiness and concerns in the provision of perinatal palliative care 6. Supervision. The questions in the questionnaire were then derived taking into account the data obtained, and the operationalization of health literacy in the field of perinatal palliative care was performed. The analysis of the interviews revealed that the education of midwives in the Czech Republic in the issue of perinatal palliative care is not uniform. The research confirmed the insufficient knowledge and skills of midwifery students preparing to provide perinatal palliative care. Respondents reported feelings of unpreparedness in the areas of communication with a woman after perinatal loss, psychological support for a woman and her family, the care of a stillborn or dying child, or self-coping with death. The questions in the questionnaire then develop these areas. We assumed that by analyzing and interpreting the data obtained from our research, we will help to better understand the concerns and motivations of students in providing holistic perinatal palliative care. We came to the conclusion that it would be appropriate to set up a unified and comprehensive education on this issue in the Czech Republic. Healthcare professionals are in a unique position that can positively or negatively affect the intensity of perinatal loss. Already properly set up education of health professionals leads to overcoming barriers in communication between health professionals and the family, experiencing perinatal loss.Keywords: midwife, perinatal loss, perinatal palliative care, communication, barriers, mothers, family
Procedia PDF Downloads 11623851 Nanocomposite Metal Material: Study of Antimicrobial and Catalytic Properties
Authors: Roman J. Jedrzejczyk, Damian K. Chlebda, Anna Dziedzicka, Rafal Wazny, Agnieszka Domka, Maciej Sitarz, Przemyslaw J. Jodlowski
Abstract:
The aim of this study was to obtain antimicrobial material based on thin zirconium dioxide coatings on structured reactors doped with metal nanoparticles using the sonochemical sol-gel method. As a result, dense, uniform zirconium dioxide films were obtained on the kanthal sheets which can be used as support materials in antimicrobial converters with sophisticated shapes. The material was characterised by physicochemical methods, such as AFM, SEM, EDX, XRF, XRD, XPS and in situ Raman and DRIFT spectroscopy. In terms of antimicrobial activity, the material was tested by ATP/AMP method using model microbes isolated from the real systems. The results show that the material can be potentially used in the market as a good candidate for active package and as active bulkheads of climatic systems. The mechanical tests showed that the developed method is an efficient way to obtain durable converters with high antimicrobial activity against fungi and bacteria.Keywords: antimicrobial properties, kanthal steel, nanocomposite, zirconium oxide
Procedia PDF Downloads 20123850 Information Technology Competences for Professional Accountants in Thai Small to Medium Accounting Practice
Authors: Manirath Wongsim, Chatchawarn Srimontree, Pornpichit Phosri
Abstract:
Today, the majority of the data innovation may be currently majorly influencing business, what more accepted part of the accountant may be evolving. Information Technology elements have been appearing to be crucial in triggering changes of accountants’ roles. Thus, this study aims to investigate IT competencies among professional accountants to enhance firm performance. This research was conducted with 47 respondents at five organizations in Thailand and used quantitative research. The results indicate that the factor IT competencies for professional accountants in Thai small to medium accounting within the organizational issues defines18 factors. Specifically, these new factors, based on the research findings and the literature, then unique to IT competencies for professional accountants, include ERP software skills and accounting law and legal skills. The evidence in this study suggests that Analytical skills, teamwork skills, and accounting software were ranked as much-needed skills to be acquired by accountants while communication skills were ranked as the most required skills and delegation skills as the least required. The findings of the research’s empirical evidence suggest that organizations should understand appropriate in developing information technology influence competencies for knowledge employees in general and professional accountants in particular and provide assistance in all processes of decision making.Keywords: IT competencies, IT competences for professional accountants, IT skills for accounting, IT skills in SMEs
Procedia PDF Downloads 23123849 Providing a Secure Hybrid Method for Graphical Password Authentication to Prevent Shoulder Surfing, Smudge and Brute Force Attack
Authors: Faraji Sepideh
Abstract:
Nowadays, purchase rate of the smart device is increasing and user authentication is one of the important issues in information security. Alphanumeric strong passwords are difficult to memorize and also owners write them down on papers or save them in a computer file. In addition, text password has its own flaws and is vulnerable to attacks. Graphical password can be used as an alternative to alphanumeric password that users choose images as a password. This type of password is easier to use and memorize and also more secure from pervious password types. In this paper we have designed a more secure graphical password system to prevent shoulder surfing, smudge and brute force attack. This scheme is a combination of two types of graphical passwords recognition based and Cued recall based. Evaluation the usability and security of our proposed scheme have been explained in conclusion part.Keywords: brute force attack, graphical password, shoulder surfing attack, smudge attack
Procedia PDF Downloads 16123848 Comprehensive Care and the Right to Autonomy of Children and Adolescents with Cancer
Authors: Sandra Soca Lozano, Teresa Isabel Lozano Pérez, Germain Weber
Abstract:
Cancer is a chronic disease of high prevalence in children and adolescents. Medical care in Cuba is carried out by a multidisciplinary team and family is the mediator between this team and the patient. Around this disease, there are interwoven many stereotypes and taboos by its relation to death. In this research report, we describe the work paradigm of psychological care to patients suffering from these diseases in the University Pediatric Hospital Juan Manuel Márquez of Havana, Cuba. We present the psychosocial factors that must be taken into account to provide comprehensive care and ensuring the quality of life of patients and their families. We also present the factors related to the health team and the management of information done with the patient. This is a descriptive proposal from the working experience accumulated in the named institution and in the review of the literature. As a result of this report we make a proposal of teamwork and the aspects in which psychological intervention should be continue performing in terms of increasing the quality of the care made by the health team. We conclude that it is necessary to continue improving the information management of children and adolescents with theses health problems and took into account their right to autonomy.Keywords: comprehensive care, management of information, psychosocial factors, right to autonomy
Procedia PDF Downloads 33323847 Analysis of the Black Sea Gas Hydrates
Authors: Sukru Merey, Caglar Sinayuc
Abstract:
Gas hydrate deposits which are found in deep ocean sediments and in permafrost regions are supposed to be a fossil fuel reserve for the future. The Black Sea is also considered rich in terms of gas hydrates. It abundantly contains gas hydrates as methane (CH4~80 to 99.9%) source. In this study, by using the literature, seismic and other data of the Black Sea such as salinity, porosity of the sediments, common gas type, temperature distribution and pressure gradient, the optimum gas production method for the Black Sea gas hydrates was selected as mainly depressurization method. Numerical simulations were run to analyze gas production from gas hydrate deposited in turbidites in the Black Sea by depressurization.Keywords: CH4 hydrate, Black Sea hydrates, gas hydrate experiments, HydrateResSim
Procedia PDF Downloads 62323846 Web Quest as the Tool for Business Writing Skills Enhancement at Technical University EFL Classes
Authors: Nadezda Kobzeva
Abstract:
Under the current trend of globalization, economic and technological dynamics information and the means by which it is delivered and renewed becomes out-of-date rapidly. Thus, educational systems as well as higher education are being seriously tested. New strategies’ developing that is supported by Information and Communication Technology is urgently required. The essential educators’ mission is to meet the demands of the future by preparing our young learners with proper knowledge, skills and innovation capabilities necessary to advance our competitiveness globally. In response to the modern society and future demands, the oldest Siberian Tomsk Polytechnic University has wisely proposed several initiatives to promote the integration of Information and Communication Technology (ICT) in education, and increase the competitiveness of graduates by emphasizing inquiry-based learning, higher order thinking and problem solving. This paper gives a brief overview of how Web Quest as ICT device is being used for language teaching and describes its use advantages for teaching English as a Foreign Language (EFL), in particular business writing skills. This study proposes to use Web Quest to promote higher order thinking and ICT integration in the process of engineers training in Tomsk Polytechnic University, Russia.Keywords: web quest, web quest in pedagogy, resume (CVs) and cover letter writing skills, ICT integration
Procedia PDF Downloads 37923845 A New Modification of Nonlinear Conjugate Gradient Coefficients with Global Convergence Properties
Authors: Ahmad Alhawarat, Mustafa Mamat, Mohd Rivaie, Ismail Mohd
Abstract:
Conjugate gradient method has been enormously used to solve large scale unconstrained optimization problems due to the number of iteration, memory, CPU time, and convergence property, in this paper we find a new class of nonlinear conjugate gradient coefficient with global convergence properties proved by exact line search. The numerical results for our new βK give a good result when it compared with well-known formulas.Keywords: conjugate gradient method, conjugate gradient coefficient, global convergence
Procedia PDF Downloads 46323844 Literature Review on the Barriers to Access Credit for Small Agricultural Producers and Policies to Mitigate Them in Developing Countries
Authors: Margarita Gáfaro, Karelys Guzmán, Paola Poveda
Abstract:
This paper establishes the theoretical aspects that explain the barriers to accessing credit for small agricultural producers in developing countries and identifies successful policy experiences to mitigate them. We will test two hypotheses. The first one is that information asymmetries, high transaction costs and high-risk exposure limit the supply of credit to small agricultural producers in developing countries. The second hypothesis is that low levels of financial education and productivity and high uncertainty about the returns of agricultural activity limit the demand for credit. To test these hypotheses, a review of the theoretical and empirical literature on access to rural credit in developing countries will be carried out. The first part of this review focuses on theoretical models that incorporate information asymmetries in the credit market and analyzes the interaction between these asymmetries and the characteristics of the agricultural sector in developing countries. Some of the characteristics we will focus on are the absence of collateral, the underdevelopment of the judicial systems and insurance markets, and the high dependence on climatic factors of production technologies. The second part of this review focuses on the determinants of credit demand by small agricultural producers, including the profitability of productive projects, security conditions, risk aversion or loss, financial education, and cognitive biases, among others. There are policies that focus on resolving these supply and demand constraints and managing to improve credit access. Therefore, another objective of this paper is to present a review of effective policies that have promoted access to credit for smallholders in the world. For this, information available in policy documents will be collected. This information will be complemented by interviews with officials in charge of the design and execution of these policies in a subset of selected countries. The information collected will be analyzed in light of the conceptual framework proposed in the first two parts of this section. The barriers to access to credit that each policy attempts to resolve and the factors that could explain its effectiveness will be identified.Keywords: agricultural economics, credit access, smallholder, developing countries
Procedia PDF Downloads 6923843 Simulation of a Pressure Driven Based Subsonic Steady Gaseous Flow inside a Micro Channel Using Direct Simulation Monte-Carlo Method
Authors: Asghar Ebrahimi, Elyas Lakzian
Abstract:
For the analysis of flow inside micro geometries, classical CFD methods can not accurately predict the behavior of flow. Alternatively, the gas flow through micro geometries can be investigated precisely using the direct simulation Monte Carlo (DSMC) method. In the present paper, a pressure boundary condition is utilized to simulate a gaseous flow inside a micro channel using the DSMC method. Accuracy of simulation is guaranteed by choosing proper cell dimension and number of particle per cell analysis. Also, results of simulation are compared with the results of reliable references. Good agreement with results certifies the correctness of new boundary condition implemented on the micro channel.Keywords: pressure boundary condition, DSMC, micro channel, cell dimension, particle per cell
Procedia PDF Downloads 47823842 The Audience’s Satisfaction through Radio Channel Broadcasting of Suan Sunandha Rajabhat University
Authors: Piyakarn Apichaikul, Thep Muanfoo
Abstract:
This research study aimed to survey the audience’s satisfaction of the radio channel broadcasting of Suan Sunandha Rajabhat University and to investigate the relationship between the satisfaction and the usage of the listeners to the news program. The study was a quantitative research using a survey research method and a cross-sectional description study to examine the satisfaction and the usage of the listeners. The instrument of the research was questionnaires which were delivered to 300 respondents by simple random sampling. For the analytical part, descriptive statistics and inferential statistic were used in this research. The result found that respondents agreed that they were satisfied with the news program (mean = 3.60). Moreover, respondents agreed that they used information from the news program in their daily life (mean = 3.47). However, the relationship between the satisfaction and the usage of the respondents were contrary.Keywords: news program, radio channel broadcasting, Suan Sunandha Rajabhat University, audience satisfaction
Procedia PDF Downloads 25223841 Microfluidic Method for Measuring Blood Viscosity
Authors: Eunseop Yeom
Abstract:
Many cardiovascular diseases, such as thrombosis and atherosclerosis, can change biochemical molecules in plasma and red blood cell. These alterations lead to excessive increase of blood viscosity contributing to peripheral vascular diseases. In this study, a simple microfluidic-based method is used to measure blood viscosity. Microfluidic device is composed of two parallel side channels and a bridge channel. To estimate blood viscosity, blood samples and reference fluid are separately delivered into each inlet of two parallel side channels using pumps. An interfacial line between blood samples and reference fluid occurs by blocking the outlet of one side-channel. Since width for this interfacial line is determined by pressure ratio between blood and reference flows, blood viscosity can be estimated by measuring width for this interfacial line. This microfluidic-based method can be used for evaluating variations in the viscosity of animal models with cardiovascular diseases under flow conditions.Keywords: blood viscosity, microfluidic chip, pressure, shear rate
Procedia PDF Downloads 37223840 Biodiversity Conservation Practices Among Indigenous Peoples in Caraga Region, Mindanao, Philippines
Authors: Milagros S. Salibad, Levita B. Grana
Abstract:
The presence and role of Indigenous Peoples residing in key biodiversity, protected, and watershed areas within the ancestral domain in the Caraga Region hold immense significance. This study aimed to determine the level of biodiversity conservation practices among the Mamanwas, Manobos, and Higaonons, and identify facilitating or hindering factors. Employing a mixed-method research design, 421 respondents participated through a researcher-made questionnaire. Focus group discussions, key informant interviews, researcher field notes, community immersions, and secondary sources were done. The three groups have demonstrated a high level of biodiversity conservation practices manifesting their commitment to conserving their natural resources and ecosystems. Evidently, selecting and cutting only mature trees for shelter and tribal usage, and preservation of large trees that harbor ancestors’ spirits and worship through rituals (Mambabaja). Each group exhibited unique environmental practices shaped by their distinct cultures, traditions, customary knowledge, and access to information. The Mamanwa practiced traditional hunting and gathering by using traps while Manobo practiced shifting cultivation to maintain soil fertility and biodiversity, and Higaonon managed forest resources through traditional forest management (establishment of sacred forests and conservation areas). Various facilitating and hindering factors influenced their conservation efforts. Their traditional knowledge and practices, partnership and collaboration, legal recognition and support, access to information, and biodiversity monitoring system facilitate practices. Insufficient government assistance, political and social issues, scarce financial support, inadequate policy enforcement, lack of livelihood opportunities, and land use conflicts hinder them. Monitoring the sustainability of IPs' local biodiversity conservation practices is essential as they contribute to conservation endeavors.Keywords: biodiversity, conservation, indigenous peoples, traditional knowledge
Procedia PDF Downloads 7723839 Off-Line Text-Independent Arabic Writer Identification Using Optimum Codebooks
Authors: Ahmed Abdullah Ahmed
Abstract:
The task of recognizing the writer of a handwritten text has been an attractive research problem in the document analysis and recognition community with applications in handwriting forensics, paleography, document examination and handwriting recognition. This research presents an automatic method for writer recognition from digitized images of unconstrained writings. Although a great effort has been made by previous studies to come out with various methods, their performances, especially in terms of accuracy, are fallen short, and room for improvements is still wide open. The proposed technique employs optimal codebook based writer characterization where each writing sample is represented by a set of features computed from two codebooks, beginning and ending. Unlike most of the classical codebook based approaches which segment the writing into graphemes, this study is based on fragmenting a particular area of writing which are beginning and ending strokes. The proposed method starting with contour detection to extract significant information from the handwriting and the curve fragmentation is then employed to categorize the handwriting into Beginning and Ending zones into small fragments. The similar fragments of beginning strokes are grouped together to create Beginning cluster, and similarly, the ending strokes are grouped to create the ending cluster. These two clusters lead to the development of two codebooks (beginning and ending) by choosing the center of every similar fragments group. Writings under study are then represented by computing the probability of occurrence of codebook patterns. The probability distribution is used to characterize each writer. Two writings are then compared by computing distances between their respective probability distribution. The evaluations carried out on ICFHR standard dataset of 206 writers using Beginning and Ending codebooks separately. Finally, the Ending codebook achieved the highest identification rate of 98.23%, which is the best result so far on ICFHR dataset.Keywords: off-line text-independent writer identification, feature extraction, codebook, fragments
Procedia PDF Downloads 51223838 Cyber-Social Networks in Preventing Terrorism: Topological Scope
Authors: Alessandra Rossodivita, Alexei Tikhomirov, Andrey Trufanov, Nikolay Kinash, Olga Berestneva, Svetlana Nikitina, Fabio Casati, Alessandro Visconti, Tommaso Saporito
Abstract:
It is well known that world and national societies are exposed to diverse threats: anthropogenic, technological, and natural. Anthropogenic ones are of greater risks and, thus, attract special interest to researchers within wide spectrum of disciplines in efforts to lower the pertinent risks. Some researchers showed by means of multilayered, complex network models how media promotes the prevention of disease spread. To go further, not only are mass-media sources included in scope the paper suggests but also personificated social bots (socbots) linked according to reflexive theory. The novel scope considers information spread over conscious and unconscious agents while counteracting both natural and man-made threats, i.e., infections and terrorist hazards. Contrary to numerous publications on misinformation disseminated by ‘bad’ bots within social networks, this study focuses on ‘good’ bots, which should be mobilized to counter the former ones. These social bots deployed mixture with real social actors that are engaged in concerted actions at spreading, receiving and analyzing information. All the contemporary complex network platforms (multiplexes, interdependent networks, combined stem networks et al.) are comprised to describe and test socbots activities within competing information sharing tools, namely mass-media hubs, social networks, messengers, and e-mail at all phases of disasters. The scope and concomitant techniques present evidence that embedding such socbots into information sharing process crucially change the network topology of actor interactions. The change might improve or impair robustness of social network environment: it depends on who and how controls the socbots. It is demonstrated that the topological approach elucidates techno-social processes within the field and outline the roadmap to a safer world.Keywords: complex network platform, counterterrorism, information sharing topology, social bots
Procedia PDF Downloads 16423837 A Comparative Study of Modern Trends in Traditional Farming Methods of Paddy Cultivation
Authors: Prasansha Kumari
Abstract:
This research intends to identify and analyze the new trends of usage the traditional farming methods to modern paddy cultivation. Information gathered through conducting interviews with total of 200 farmers in selected paddy cultivation areas in Kurunegalla district. As well as this research utilized by case study and observation in Ulpotha Traditional Village, Galgamuwa of Sri Lanka. Secondary data collected from books, articles, relevant websites and other relevant documents. Collected data analyzed by descriptive research methodology. Outcomes are there is growing interest in usage the traditional farming methods to the small consumption level paddy lands that have emerged during the last few decades as well as the research revealed that traditional farming method has identified the ecofriendly farming practices to restrict long term side effects inherited from the modern methods. The study finds out the demand of traditional rice varieties has been growing among the community as health and nutrition purpose.Keywords: traditional farming, organic, inorganic, paddy cultivation
Procedia PDF Downloads 28823836 A Study of Secondary Particle Production from Carbon Ion Beam for Radiotherapy
Authors: Shaikah Alsubayae, Gianluigi Casse, Carlos Chavez, Jon Taylor, Alan Taylor, Mohammad Alsulimane
Abstract:
Achieving precise radiotherapy through carbon therapy necessitates the accurate monitoring of radiation dose distribution within the patient's body. This process is pivotal for targeted tumor treatment, minimizing harm to healthy tissues, and enhancing overall treatment effectiveness while reducing the risk of side effects. In our investigation, we adopted a methodological approach to monitor secondary proton doses in carbon therapy using Monte Carlo (MC) simulations. Initially, Geant4 simulations were employed to extract the initial positions of secondary particles generated during interactions between carbon ions and water, including protons, gamma rays, alpha particles, neutrons, and tritons. Subsequently, we explored the relationship between the carbon ion beam and these secondary particles. Interaction vertex imaging (IVI) proves valuable for monitoring dose distribution during carbon therapy, providing information about secondary particle locations and abundances, particularly protons. The IVI method relies on charged particles produced during ion fragmentation to gather range information by reconstructing particle trajectories back to their point of origin, known as the vertex. In the context of carbon ion therapy, our simulation results indicated a strong correlation between some secondary particles and the range of carbon ions. However, challenges arose due to the unique elongated geometry of the target, hindering the straightforward transmission of forward-generated protons. Consequently, the limited protons that did emerge predominantly originated from points close to the target entrance. Fragment (protons) trajectories were approximated as straight lines, and a beam back-projection algorithm, utilizing interaction positions recorded in Si detectors, was developed to reconstruct vertices. The analysis revealed a correlation between the reconstructed and actual positions.Keywords: radiotherapy, carbon therapy, monitor secondary proton doses, interaction vertex imaging
Procedia PDF Downloads 7823835 Integrated On-Board Diagnostic-II and Direct Controller Area Network Access for Vehicle Monitoring System
Authors: Kavian Khosravinia, Mohd Khair Hassan, Ribhan Zafira Abdul Rahman, Syed Abdul Rahman Al-Haddad
Abstract:
The CAN (controller area network) bus is introduced as a multi-master, message broadcast system. The messages sent on the CAN are used to communicate state information, referred as a signal between different ECUs, which provides data consistency in every node of the system. OBD-II Dongles that are based on request and response method is the wide-spread solution for extracting sensor data from cars among researchers. Unfortunately, most of the past researches do not consider resolution and quantity of their input data extracted through OBD-II technology. The maximum feasible scan rate is only 9 queries per second which provide 8 data points per second with using ELM327 as well-known OBD-II dongle. This study aims to develop and design a programmable, and latency-sensitive vehicle data acquisition system that improves the modularity and flexibility to extract exact, trustworthy, and fresh car sensor data with higher frequency rates. Furthermore, the researcher must break apart, thoroughly inspect, and observe the internal network of the vehicle, which may cause severe damages to the expensive ECUs of the vehicle due to intrinsic vulnerabilities of the CAN bus during initial research. Desired sensors data were collected from various vehicles utilizing Raspberry Pi3 as computing and processing unit with using OBD (request-response) and direct CAN method at the same time. Two types of data were collected for this study. The first, CAN bus frame data that illustrates data collected for each line of hex data sent from an ECU and the second type is the OBD data that represents some limited data that is requested from ECU under standard condition. The proposed system is reconfigurable, human-readable and multi-task telematics device that can be fitted into any vehicle with minimum effort and minimum time lag in the data extraction process. The standard operational procedure experimental vehicle network test bench is developed and can be used for future vehicle network testing experiment.Keywords: CAN bus, OBD-II, vehicle data acquisition, connected cars, telemetry, Raspberry Pi3
Procedia PDF Downloads 20423834 Proposed Pattern for Fitted Men's Suit Jacket Using the Method of Draping on the Mannequin
Authors: Hazem A. Abdelfattah, Salia H. Khafaji
Abstract:
Apparel industry needs to direct scientific researches to develop it , and because of the importance of a men’s suit jacket industry, the study of the basics of men’s jacket pattern making requires a high degree of accuracy and efficiency which contain a lot of technical and skill aspects to give the jacket a drape, comfort and good fitting , prompting researchers to think about the use of men’s mannequin with sizes (M-L-XL) to devise a method to draft a paper pattern for the men's suit jacket to use it in the industry easily and quickly and achieve the required good fitting.Keywords: draping, pattern, men, jacket
Procedia PDF Downloads 34623833 Attribute Analysis of Quick Response Code Payment Users Using Discriminant Non-negative Matrix Factorization
Authors: Hironori Karachi, Haruka Yamashita
Abstract:
Recently, the system of quick response (QR) code is getting popular. Many companies introduce new QR code payment services and the services are competing with each other to increase the number of users. For increasing the number of users, we should grasp the difference of feature of the demographic information, usage information, and value of users between services. In this study, we conduct an analysis of real-world data provided by Nomura Research Institute including the demographic data of users and information of users’ usages of two services; LINE Pay, and PayPay. For analyzing such data and interpret the feature of them, Nonnegative Matrix Factorization (NMF) is widely used; however, in case of the target data, there is a problem of the missing data. EM-algorithm NMF (EMNMF) to complete unknown values for understanding the feature of the given data presented by matrix shape. Moreover, for comparing the result of the NMF analysis of two matrices, there is Discriminant NMF (DNMF) shows the difference of users features between two matrices. In this study, we combine EMNMF and DNMF and also analyze the target data. As the interpretation, we show the difference of the features of users between LINE Pay and Paypay.Keywords: data science, non-negative matrix factorization, missing data, quality of services
Procedia PDF Downloads 131