Search results for: restricted user story modeling
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7093

Search results for: restricted user story modeling

3733 Narrative Identity Predicts Borderline Personality Disorder Features in Inpatient Adolescents up to Six Months after Admission

Authors: Majse Lind, Carla Sharp, Salome Vanwoerden

Abstract:

Narrative identity is the dynamic and evolving story individuals create about their personal pasts, presents, and presumed futures. This storied sense of self develops in adolescence and is crucial for fostering a sense of self-unity and purpose in life. A growing body of work has shown that several characteristics of narrative identity are disturbed in adults suffering from borderline personality disorder (BPD). Very little research, however, has explored the stories told by adolescents with BPD features. Investigating narrative identity early in the lifespan and in relation to personality pathology is crucial; BPD is a developmental disorder with early signs appearing already in adolescence. In the current study, we examine narrative identity (focusing on themes of agency and communion) coded from self-defining memories derived from the child attachment interview in 174 inpatient adolescents (M = 15.12, SD = 1.52) at the time of admission. The adolescents’ social cognition was further assessed on the basis of their reactions to movie scenes (i.e., the MASC movie task). They also completed a trauma checklist and self-reported BPD features at three different time points (i.e., at admission, at discharge, and 6 months after admission). Preliminary results show that adolescents who told stories containing themes of agency and communion evinced better social cognition, and lower emotional abuse on the trauma checklist. In addition, adolescents who disclosed stories containing lower levels of agency and communion demonstrated more BPD symptoms at all three time points, even when controlling for the occurrence of traumatic life events. Surprisingly, social cognitive abilities were not significantly associated with BPD features. These preliminary results underscore the importance of narrative identity as an indicator, and potential cause, of incipient personality pathology. Thus, focusing on diminished themes of narrative-based agency and communion in early adolescence could be crucial in preventing the development of personality pathology over time.

Keywords: borderline personality disorder, inpatient adolescents, narrative identity, follow-ups

Procedia PDF Downloads 158
3732 Experiences of Social Participation among Community Elderly with Mild Cognitive Impairment: A Qualitative Research

Authors: Xue Li, Hui Xu

Abstract:

Mild cognitive impairment (MCI) is a clinical stage that occurs between normal aging and dementia. Although MCI increases the risk of developing dementia, individuals with MCI may maintain stable cognitive function and even recover to a typical cognitive state. An intervention to prevent or delay the progression to dementia in individuals with MCI may involve promoting social engagement. Social participation is the engagement in socially relevant social exchanges and meaningful activities. Older adults with MCI may encounter restricted cognitive abilities, mood changes, and behavioral difficulties during social participation, influencing their willingness to engage. Therefore, this study aims to employ qualitative research methods to gain an in-depth comprehension of the authentic social participation experiences of older adults with mild cognitive impairment, which will establish a foundation for designing appropriate intervention programs. A phenomenological research was conducted. The study participants were selected using the purposive sampling method in combination with the maximum differentiation sampling strategy. Face-to-face semistructured interviews were conducted among 12 elderly individuals suffering from mild cognitive impairment in a community in Zhengzhou City from May to July 2023. Colaizzi 7-step method was used to analyze the data and extract the theme. The real experience of social participation in older adults with mild cognitive impairment can be summarized into 3 themes: (1) a single social relationship but a strong desire to participate, (2) a dual experience of social participation with both positive and negative aspects, (3) multiple barriers to social participation, including impaired memory capacity, heavy family responsibilities and lack of infrastructure. The study found that elderly individuals with mild cognitive impairment and one social interaction display an increased desire to engage in society. To improve social participation levels and reduce cognitive function decline, healthcare providers should work with relevant government agencies and the community to create a comprehensive social participation system. It is important for healthcare providers to note the social participation status of the elderly with mild cognitive impairment.

Keywords: mild cognitive impairment, the elderly, social participation, qualitative research

Procedia PDF Downloads 96
3731 Excel-VBA as Modelling Platform for Thermodynamic Optimisation of an R290/R600a Cascade Refrigeration System

Authors: M. M. El-Awad

Abstract:

The availability of computers and educational software nowadays helps engineering students acquire better understanding of engineering principles and their applications. With these facilities, students can perform sensitivity and optimisation analyses which were not possible in the past by using slide-rules and hand calculators. Standard textbooks in engineering thermodynamics also use software such as Engineering Equation Solver (EES) and Interactive Thermodynamics (IT) for solving calculation-intensive and design problems. Unfortunately, engineering students in most developing countries do not have access to such applications which are protected by intellectual-property rights. This paper shows how Microsoft ExcelTM and VBA (Visual Basic for Applications), which are normally distributed with personal computers and laptops, can be used as an alternative modelling platform for thermodynamic analyses and optimisation. The paper describes the VBA user-defined-functions developed for determining the refrigerants properties with Excel. For illustration, the combination is used to model and optimise the intermediate temperature for a propane/iso-butane cascade refrigeration system.

Keywords: thermodynamic optimisation, engineering education, excel, VBA, cascade refrigeration system

Procedia PDF Downloads 441
3730 Cellular Architecture of Future Wireless Communication Networks

Authors: Mohammad Yahaghifar

Abstract:

Nowadays Wireless system designers have been facing the continuously increasing demand for high data rates and mobility required by new wireless applications. Evolving future communication network generation cellular wireless networks are envisioned to overcome the fundamental challenges of existing cellular networks, for example, higher data rates, excellent end-to-end performance, and user coverage in hot-spots and crowded areas with lower latency,energy consumption and cost per information transfer. In this paper we propose a potential cellular architecture that separates indoor and outdoor scenarios and discuss various promising technologies for future wireless communication systemssystems, such as massive MIMO, energy-efficient communications,cognitive radio networks, and visible light communications and we disscuse about 5G that is next generation of wireless networks.

Keywords: future challenges in networks, cellur architecture, visible light communication, 5G wireless technologies, spatial modulation, massiva mimo, cognitive radio network, green communications

Procedia PDF Downloads 490
3729 Usability Assessment of a Bluetooth-Enabled Resistance Exercise Band among Young Adults

Authors: Lillian M. Seo, Curtis L. Petersen, Ryan J. Halter, David Kotz, John A. Batsis

Abstract:

Background: Resistance-based exercises effectively enhance muscle strength, which is especially important in older populations as it reduces the risk of disability. Our group developed a Bluetooth-enabled handle for resistance exercise bands that wirelessly transmits relative force data through low-energy Bluetooth to a local smartphone or similar device. The system has the potential to measure home-based exercise interventions, allowing health professionals to monitor compliance. Its feasibility has already been demonstrated in both clinical and field-based settings, but it remained unclear whether the system’s usability persisted upon repeated use. The current study sought to assess the usability of this system and its users’ satisfaction with repeated use by deploying the device among younger adults to gather formative information that can ultimately improve the device’s design for older adults. Methods: A usability study was conducted in which 32 participants used the above system. Participants executed 10 repetitions of four commonly performed exercises: bicep flexion, shoulder abduction, elbow extension, and triceps extension. Each completed three exercise sessions, separated by at least 24 hours to minimize muscle fatigue. At its conclusion, subjects completed an adapted version of the usefulness, satisfaction, and ease (USE) questionnaire – assessing the system across four domains: usability, satisfaction, ease of use, and ease of learning. The 20-item questionnaire examined how strongly a participant agrees with positive statements about the device on a seven-point Likert scale, with one representing ‘strongly disagree’ and seven representing ‘strongly agree.’ Participants’ data were aggregated to calculate mean response values for each question and domain, effectively assessing the device’s performance across different facets of the user experience. Summary force data were visualized using a custom web application. Finally, an optional prompt at the end of the questionnaire allowed for written comments and feedback from participants to elicit qualitative indicators of usability. Results: Of the n=32 participants, 13 (41%) were female; their mean age was 32.4 ± 11.8 years, and no participants had a physical impairment. No usability questions received a mean score < 5 of seven. The four domains’ mean scores were: usefulness 5.66 ± 0.35; satisfaction 6.23 ± 0.06; ease of use 6.25 ± 0.43; and ease of learning 6.50 ± 0.19. Representative quotes of the open-ended feedback include: ‘A non-rigid strap-style handle might be useful for some exercises,’ and, ‘Would need different bands for each exercise as they use different muscle groups with different strength levels.’ General impressions were favorable, supporting the expectation that the device would be a useful tool in exercise interventions. Conclusions: A simple usability assessment of a Bluetooth-enabled resistance exercise band supports a consistent and positive user experience among young adults. This study provides adequate formative data, assuring the next steps can be taken to continue testing and development for the target population of older adults.

Keywords: Bluetooth, exercise, mobile health, mHealth, usability

Procedia PDF Downloads 119
3728 Performance-Based Quality Evaluation of Database Conceptual Schemas

Authors: Janusz Getta, Zhaoxi Pan

Abstract:

Performance-based quality evaluation of database conceptual schemas is an important aspect of database design process. It is evident that different conceptual schemas provide different logical schemas and performance of user applications strongly depends on logical and physical database structures. This work presents the entire process of performance-based quality evaluation of conceptual schemas. First, we show format. Then, the paper proposes a new specification of object algebra for representation of conceptual level database applications. Transformation of conceptual schemas and expression of object algebra into implementation schema and implementation in a particular database system allows for precise estimation of the processing costs of database applications and as a consequence for precise evaluation of performance-based quality of conceptual schemas. Then we describe an experiment as a proof of concept for the evaluation procedure presented in the paper.

Keywords: conceptual schema, implementation schema, logical schema, object algebra, performance evaluation, query processing

Procedia PDF Downloads 295
3727 Factors of Social Network Platform Usage and Privacy Risk: A Unified Theory of Acceptance and Use of Technology2 Model

Authors: Wang Xue, Fan Liwei

Abstract:

The trust and use of social network platforms by users are instrumental factors that contribute to the platform’s sustainable development. Studying the influential factors of the use of social network platforms is beneficial for developing and maintaining a large user base. This study constructed an extended unified theory of acceptance and use of technology (UTAUT2) moderating model with perceived privacy risks to analyze the factors affecting the trust and use of social network platforms. 444 participants completed our 35 surveys, and we verified the survey results by structural equation model. Empirical results reveal the influencing factors that affect the trust and use of social network platforms, and the extended UTAUT2 model with perceived privacy risks increases the applicability of UTAUT2 in social network scenarios. Social networking platforms can increase their use rate by increasing the economics, functionality, entertainment, and privacy security of the platform.

Keywords: perceived privacy risk, social network, trust, use, UTAUT2 model

Procedia PDF Downloads 99
3726 Development of a Wind Resource Assessment Framework Using Weather Research and Forecasting (WRF) Model, Python Scripting and Geographic Information Systems

Authors: Jerome T. Tolentino, Ma. Victoria Rejuso, Jara Kaye Villanueva, Loureal Camille Inocencio, Ma. Rosario Concepcion O. Ang

Abstract:

Wind energy is rapidly emerging as the primary source of electricity in the Philippines, although developing an accurate wind resource model is difficult. In this study, Weather Research and Forecasting (WRF) Model, an open source mesoscale Numerical Weather Prediction (NWP) model, was used to produce a 1-year atmospheric simulation with 4 km resolution on the Ilocos Region of the Philippines. The WRF output (netCDF) extracts the annual mean wind speed data using a Python-based Graphical User Interface. Lastly, wind resource assessment was produced using a GIS software. Results of the study showed that it is more flexible to use Python scripts than using other post-processing tools in dealing with netCDF files. Using WRF Model, Python, and Geographic Information Systems, a reliable wind resource map is produced.

Keywords: wind resource assessment, weather research and forecasting (WRF) model, python, GIS software

Procedia PDF Downloads 444
3725 Grammar as a Logic of Labeling: A Computer Model

Authors: Jacques Lamarche, Juhani Dickinson

Abstract:

This paper introduces a computational model of a Grammar as Logic of Labeling (GLL), where the lexical primitives of morphosyntax are phonological matrixes, the form of words, understood as labels that apply to realities (or targets) assumed to be outside of grammar altogether. The hypothesis is that even though a lexical label relates to its target arbitrarily, this label in a complex (constituent) label is part of a labeling pattern which, depending on its value (i.e., N, V, Adj, etc.), imposes language-specific restrictions on what it targets outside of grammar (in the world/semantics or in cognitive knowledge). Lexical forms categorized as nouns, verbs, adjectives, etc., are effectively targets of labeling patterns in use. The paper illustrates GLL through a computer model of basic patterns in English NPs. A constituent label is a binary object that encodes: i) alignment of input forms so that labels occurring at different points in time are understood as applying at once; ii) endocentric structuring - every grammatical constituent has a head label that determines the target of the constituent, and a limiter label (the non-head) that restricts this target. The N or A values are restricted to limiter label, the two differing in terms of alignment with a head. Consider the head initial DP ‘the dog’: the label ‘dog’ gets an N value because it is a limiter that is evenly aligned with the head ‘the’, restricting application of the DP. Adapting a traditional analysis of ‘the’ to GLL – apply label to something familiar – the DP targets and identifies one reality familiar to participants by applying to it the label ‘dog’ (singular). Consider next the DP ‘the large dog’: ‘large dog’ is nominal by even alignment with ‘the’, as before, and since ‘dog’ is the head of (head final) ‘large dog’, it is also nominal. The label ‘large’, however, is adjectival by narrow alignment with the head ‘dog’: it doesn’t target the head but targets a property of what dog applies to (a property or value of attribute). In other words, the internal composition of constituents determines that a form targets a property or a reality: ‘large’ and ‘dog’ happen to be valid targets to realize this constituent. In the presentation, the computer model of the analysis derives the 8 possible sequences of grammatical values with three labels after the determiner (the x y z): 1- D [ N [ N N ]]; 2- D [ A [ N N ] ]; 3- D [ N [ A N ] ]; 4- D [ A [ A N ] ]; 5- D [ [ N N ] N ]; 5- D [ [ A N ] N ]; 6- D [ [ N A ] N ] 7- [ [ N A ] N ] 8- D [ [ Adv A ] N ]. This approach that suggests that a computer model of these grammatical patterns could be used to construct ontologies/knowledge using speakers’ judgments about the validity of lexical meaning in grammatical patterns.

Keywords: syntactic theory, computational linguistics, logic and grammar, semantics, knowledge and grammar

Procedia PDF Downloads 41
3724 Effects of Incident Angle and Distance on Visible Light Communication

Authors: Taegyoo Woo, Jong Kang Park, Jong Tae Kim

Abstract:

Visible Light Communication (VLC) provides wireless communication features in illumination systems. One of the key applications is to recognize the user location by indoor illuminators such as light emitting diodes. For localization of individual receivers in these systems, we usually assume that receivers and transmitters are placed in parallel. However, it is difficult to satisfy this assumption because the receivers move randomly in real case. It is necessary to analyze the case when transmitter is not placed perfectly parallel to receiver. It is also important to identify changes on optical gain by the tilted angles and distances of them against the illuminators. In this paper, we simulate optical gain for various cases where the tilt of the receiver and the distance change. Then, we identified changing patterns of optical gains according to tilted angles of a receiver and distance. These results can help many VLC applications understand the extent of the location errors with regard to optical gains of the receivers and identify the root cause.

Keywords: visible light communication, incident angle, optical gain, light emitting diode

Procedia PDF Downloads 337
3723 Transformer Design Optimization Using Artificial Intelligence Techniques

Authors: Zakir Husain

Abstract:

Main objective of a power transformer design optimization problem requires minimizing the total overall cost and/or mass of the winding and core material by satisfying all possible constraints obligatory by the standards and transformer user requirement. The constraints include appropriate limits on winding fill factor, temperature rise, efficiency, no-load current and voltage regulation. The design optimizations tasks are a constrained minimum cost and/or mass solution by optimally setting the parameters, geometry and require magnetic properties of the transformer. In this paper, present the above design problems have been formulated by using genetic algorithm (GA) and simulated annealing (SA) on the MATLAB platform. The importance of the presented approach is stems for two main features. First, proposed technique provides reliable and efficient solution for the problem of design optimization with several variables. Second, it guaranteed to obtained solution is global optimum. This paper includes a demonstration of the application of the genetic programming GP technique to transformer design.

Keywords: optimization, power transformer, genetic algorithm (GA), simulated annealing technique (SA)

Procedia PDF Downloads 587
3722 Transforming Water-Energy-Gas Industry through Smart Metering and Blockchain Technology

Authors: Khoi A. Nguyen, Rodney A. Stewart, Hong Zhang

Abstract:

Advanced metering technologies coupled with informatics creates an opportunity to form digital multi-utility service providers. These providers will be able to concurrently collect a customers’ medium-high resolution water, electricity and gas demand data and provide user-friendly platforms to feed this information back to customers and supply/distribution utility organisations. With the emergence of blockchain technology, a new research area has been explored which helps bring this multi-utility service provider concept to a much higher level. This study aims at introducing a breakthrough system architecture where smart metering technology in water, energy, and gas (WEG) are combined with blockchain technology to provide customer a novel real-time consumption report and decentralized resource trading platform. A pilot study on 4 properties in Australia has been undertaken to demonstrate this system, where benefits for customers and utilities are undeniable.

Keywords: blockchain, digital multi-utility, end use, demand forecasting

Procedia PDF Downloads 174
3721 Investigation of Damage in Glass Subjected to Static Indentation Using Continuum Damage Mechanics

Authors: J. Ismail, F. Zaïri, M. Naït-Abdelaziz, Z. Azari

Abstract:

In this work, a combined approach of continuum damage mechanics (CDM) and fracture mechanics is applied to model a glass plate behavior under static indentation. A spherical indenter is used and a CDM based constitutive model with an anisotropic damage tensor was selected and implemented into a finite element code to study the damage of glass. Various regions with critical damage values were predicted in good agreement with the experimental observations in the literature. In these regions, the directions of crack propagation, including both cracks initiating on the surface as well as in the bulk, were predicted using the strain energy density factor.

Keywords: finite element modeling, continuum damage mechanics, indentation, cracks

Procedia PDF Downloads 424
3720 Applying Theory of Self-Efficacy in Intelligent Transportation Systems by Potential Usage of Vehicle as a Sensor

Authors: Aby Nesan Raj, Sumil K. Raj, Sumesh Jayan

Abstract:

The objective of the study is to formulate a self-regulation model that shall enhance the usage of Intelligent Transportation Systems by understanding the theory of self-efficacy. The core logic of the self-regulation model shall monitor driver's behavior based on the situations related to the various sources of Self Efficacy like enactive mastery, vicarious experience, verbal persuasion and physiological arousal in addition to the vehicle data. For this study, four different vehicle data, speed, drowsiness, diagnostic data and surround camera views are considered. This data shall be given to the self-regulation model for evaluation. The oddness, which is the output of self-regulation model, shall feed to Intelligent Transportation Systems where appropriate actions are being taken. These actions include warning to the user as well as the input to the related transportation systems. It is also observed that the usage of vehicle as a sensor reduces the wastage of resource utilization or duplication. Altogether, this approach enhances the intelligence of the transportation systems especially in safety, productivity and environmental performance.

Keywords: emergency management, intelligent transportation system, self-efficacy, traffic management

Procedia PDF Downloads 247
3719 Digital Transformation in Fashion System Design: Tools and Opportunities

Authors: Margherita Tufarelli, Leonardo Giliberti, Elena Pucci

Abstract:

The fashion industry's interest in virtuality is linked, on the one hand, to the emotional and immersive possibilities of digital resources and the resulting languages and, on the other, to the greater efficiency that can be achieved throughout the value chain. The interaction between digital innovation and deep-rooted manufacturing traditions today translates into a paradigm shift for the entire fashion industry where, for example, the traditional values of industrial secrecy and know-how give way to experimentation in an open as well as participatory way, and the complete emancipation of virtual reality from actual 'reality'. The contribution aims to investigate the theme of digitisation in the Italian fashion industry, analysing its opportunities and the criticalities that have hindered its diffusion. There are two reasons why the most common approach in the fashion sector is still analogue: (i) the fashion product lives in close contact with the human body, so the sensory perception of materials plays a central role in both the use and the design of the product, but current technology is not able to restore the sense of touch; (ii) volumes are obtained by stitching flat surfaces that once assembled, given the flexibility of the material, can assume almost infinite configurations. Managing the fit and styling of virtual garments involves a wide range of factors, including mechanical simulation, collision detection, and user interface techniques for garment creation. After briefly reviewing some of the salient historical milestones in the resolution of problems related to the digital simulation of deformable materials and the user interface for the procedures for the realisation of the clothing system, the paper will describe the operation and possibilities offered today by the latest generation of specialised software. Parametric avatars and digital sartorial approach; drawing tools optimised for pattern making; materials both from the point of view of simulated physical behaviour and of aesthetic performance, tools for checking wearability, renderings, but also tools and procedures useful to companies both for dialogue with prototyping software and machinery and for managing the archive and the variants to be made. The article demonstrates how developments in technology and digital procedures now make it possible to intervene in different stages of design in the fashion industry. An integrated and additive process in which the constructed 3D models are usable both in the prototyping and communication of physical products and in the possible exclusively digital uses of 3D models in the new generation of virtual spaces. Mastering such tools requires the acquisition of specific digital skills and, at the same time, traditional skills for the design of the clothing system, but the benefits are manifold and applicable to different business dimensions. We are only at the beginning of the global digital transformation: the emergence of new professional figures and design dynamics leaves room for imagination, but in addition to applying digital tools to traditional procedures, traditional fashion know-how needs to be transferred into emerging digital practices to ensure the continuity of the technical-cultural heritage beyond the transformation.

Keywords: digital fashion, digital technology and couture, digital fashion communication, 3D garment simulation

Procedia PDF Downloads 76
3718 The Theology of a Muslim Artist: Tawfiq al-Hakim

Authors: Abdul Rahman Chamseddine

Abstract:

Tawfiq al-Hakim remains one of the most prominent playwrights in his native in Egypt, and in the broader Arab world. His works, at the time of their release, drew international attention and acclaim. His first 1933 masterpiece Ahl al-Kahf (The People of the Cave) especially, garnered fame and recognition in both Europe and the Arab world. Borrowing its title from the Qur’anic Sura, al-Hakim’s play relays the untold story of the life of those 'three saints' after they wake up from their prolonged sleep. The playwright’s selection of topics upon which to base his works displays a deep appreciation of Arabic and Islamic heritage. Al-Hakim was clearly influenced by Islam, to such a degree that he wrote the biography of the Prophet Muhammad in 1936 very early in his career. Knowing that Al-Hakim was preceded by many poets and creative writers in writing the Prophet Muhammad’s biography. Notably like Al-Barudi, Ahmad Shawqi, Haykal, Al-‘Aqqad, and Taha Husayn who have had their own ways in expressing their views of the Prophet Muhammad. The attempt to understand the concern of all those renaissance men and others in the person of the Prophet would be indispensable in this study. This project will examine the reasons behind al-Hakim’s choice to draw upon these particular texts, embedded as they are in the context of Arabic and Islamic heritage, and how the use of traditional texts serves his contemporary goals. The project will also analyze the image of Islam in al-Hakim’s imagination. Elsewhere, he envisions letters or conversations between God and himself, which offers a window into understanding the powerful impact of the Divine on Tawfiq al-Hakim, one that informs his literature and merits further scholarly attention. His works occupying a major rank in Arabic literature, does not reveal Al-Hakim solely but the unquestioned assumptions operative in the life of his community, its mental make-up and its attitudes. Furthermore, studying the reception of works that touch on sensitive issues, like writing a letter to God, in Al-Hakim’s historical context would be of a great significance in the process of comprehending the mentality of the Muslim community at that time.

Keywords: Arabic language, Arabic literature, Arabic theology, modern Arabic literature

Procedia PDF Downloads 368
3717 Mobile Application Set to Empower SME Farmers in Peri-Urban Sydney Region

Authors: A. Hol

Abstract:

Even in the well developed countries like Australia, Small to Medium Farmers do not often have the power over the market prices as they are more often than not set by the farming agents. This in turn creates problems as farmers only get to know for how much their produce has been sold for by the agents three to four weeks after the sale has taken the place. To see and identify if and how peri-urban Sydney farmers could be assisted, carefully selected group of peri-urban Sydney farmers of the stone fruit has been interviewed. Following the case based interviews collected data was analyzed in detail using the Scenario Based Transformation principles. Analyzed data was then used to create a most common transformation case. The case identified that a mobile web based system could be develop so that framers can monitor agent earnings and in turn gain more power over the markets. It is expected that after the system has been in action for six months to a year, farmers will become empowered and they will gain means to monitor the market and negotiate agent prices.

Keywords: mobile applications, farming, scenario-based analysis, scenario-based transformation, user empowerment

Procedia PDF Downloads 383
3716 Remarkable Difference in Neurotoxicity Between Two Phospholipases from Russell's Viper Venom: Insight Through Molecular Approach

Authors: Kalyan S. Ghosh, B. L. Dhananjaya

Abstract:

Snake bite causes fatal injuries in multi-organs and even many deaths due to several adverse physiological effects of various phospholipases (PLA2s) present in snake venom. Though these PLA2s bear highly homologues sequences and also structure but exhibit a different extent of those pharmacological effects. In this study, we have explored the difference in the neurotoxicity of two PLA2 namely PLA2-V, PLA2-VIIIa present in the venom from Vipera russellii. Bioinformatics studies on sequences of these two proteins along with detailed structural comparison enable us to explore the differences unambiguously. The identification of the residues involved in neurotoxicity will further lead towards proper designing of inhibitors against such killing effects of the venom.

Keywords: electrostatic potential, homology modeling, hydrophobicity, neurotoxicity, Phospholipase A2

Procedia PDF Downloads 444
3715 Implementing Zero-Trust Security with Passwordless Authentication Gateways for Privacy-Oriented Organizations Using Keycloak

Authors: Andrei Bogdan Stanescu, Laura Diaconescu

Abstract:

With the increasing concerns about data breaches and privacy violations, organizations seek robust security measures to protect sensitive information. This research paper highlights the importance of implementing the Zero-Trust Security methodology using Passwordless Authentication Gateways that leverage Keycloak, an open-source Identity and Access Management (IAM) software, as a solution to address the security challenges these organizations face. The paper presents the successful implementation and deployment of such a solution in a mid-size, privacy-oriented organization. The implementation resulted in significant security improvements, reducing the risk of unauthorized access and potential data breaches. Moreover, user feedback indicated enhanced convenience and streamlined authentication experiences. The results of this study bring solid contributions in the field of cybersecurity and provide practical insights for organizations aiming to strengthen their security practices.

Keywords: identity and access management, passwordless authentication, privacy, zero-trust security

Procedia PDF Downloads 93
3714 Generative AI: A Comparison of Conditional Tabular Generative Adversarial Networks and Conditional Tabular Generative Adversarial Networks with Gaussian Copula in Generating Synthetic Data with Synthetic Data Vault

Authors: Lakshmi Prayaga, Chandra Prayaga. Aaron Wade, Gopi Shankar Mallu, Harsha Satya Pola

Abstract:

Synthetic data generated by Generative Adversarial Networks and Autoencoders is becoming more common to combat the problem of insufficient data for research purposes. However, generating synthetic data is a tedious task requiring extensive mathematical and programming background. Open-source platforms such as the Synthetic Data Vault (SDV) and Mostly AI have offered a platform that is user-friendly and accessible to non-technical professionals to generate synthetic data to augment existing data for further analysis. The SDV also provides for additions to the generic GAN, such as the Gaussian copula. We present the results from two synthetic data sets (CTGAN data and CTGAN with Gaussian Copula) generated by the SDV and report the findings. The results indicate that the ROC and AUC curves for the data generated by adding the layer of Gaussian copula are much higher than the data generated by the CTGAN.

Keywords: synthetic data generation, generative adversarial networks, conditional tabular GAN, Gaussian copula

Procedia PDF Downloads 85
3713 Analysis and Modeling of Graphene-Based Percolative Strain Sensor

Authors: Heming Yao

Abstract:

Graphene-based percolative strain gauges could find applications in many places such as touch panels, artificial skins or human motion detection because of its advantages over conventional strain gauges such as flexibility and transparency. These strain gauges rely on a novel sensing mechanism that depends on strain-induced morphology changes. Once a compression or tension strain is applied to Graphene-based percolative strain gauges, the overlap area between neighboring flakes becomes smaller or larger, which is reflected by the considerable change of resistance. Tiny strain change on graphene-based percolative strain sensor can act as an important leverage to tremendously increase resistance of strain sensor, which equipped graphene-based percolative strain gauges with higher gauge factor. Despite ongoing research in the underlying sensing mechanism and the limits of sensitivity, neither suitable understanding has been obtained of what intrinsic factors play the key role in adjust gauge factor, nor explanation on how the strain gauge sensitivity can be enhanced, which is undoubtedly considerably meaningful and provides guideline to design novel and easy-produced strain sensor with high gauge factor. We here simulated the strain process by modeling graphene flakes and its percolative networks. We constructed the 3D resistance network by simulating overlapping process of graphene flakes and interconnecting tremendous number of resistance elements which were obtained by fractionizing each piece of graphene. With strain increasing, the overlapping graphenes was dislocated on new stretched simulation graphene flake simulation film and a new simulation resistance network was formed with smaller flake number density. By solving the resistance network, we can get the resistance of simulation film under different strain. Furthermore, by simulation on possible variable parameters, such as out-of-plane resistance, in-plane resistance, flake size, we obtained the changing tendency of gauge factor with all these variable parameters. Compared with the experimental data, we verified the feasibility of our model and analysis. The increase of out-of-plane resistance of graphene flake and the initial resistance of sensor, based on flake network, both improved gauge factor of sensor, while the smaller graphene flake size gave greater gauge factor. This work can not only serve as a guideline to improve the sensitivity and applicability of graphene-based strain sensors in the future, but also provides method to find the limitation of gauge factor for strain sensor based on graphene flake. Besides, our method can be easily transferred to predict gauge factor of strain sensor based on other nano-structured transparent optical conductors, such as nanowire and carbon nanotube, or of their hybrid with graphene flakes.

Keywords: graphene, gauge factor, percolative transport, strain sensor

Procedia PDF Downloads 418
3712 Modelisation of a Full-Scale Closed Cement Grinding

Authors: D. Touil, L. Ouadah

Abstract:

An industrial model of cement grinding circuit is proposed on the basis of sampling surveys undertaken in the Meftah cement plant in Algiers, Algeria. The ball mill is described by a series of equal fully mixed stages that incorporates the effect of air sweeping. The kinetic parameters of this material in the energy normalized form obtained using the data of batch dry ball milling are taken into account in developing the present scale-up procedure. The dynamic separator is represented by the air classifier selectivity equation corrected by empirical factors. The model is incorporated in computer program that predict full size distributions and mass flow rates for all streams in a circuit under a particular set of operating conditions.

Keywords: grinding circuit, clinker, cement, modeling, population balance, energy

Procedia PDF Downloads 528
3711 Settlement of Group of Stone Columns

Authors: Adel Hanna, Tahar Ayadat, Mohammad Etezad, Cyrille Cros

Abstract:

A number of theoretical methods have been developed over the years to calculate the amount settlement of the soil reinforced with group of stone columns. The results deduced from these methods sometimes show large disagreement with the experimental observations. The reason of this divergence might be due to the fact that many of the previous methods assumed the deform shape of the columns which is different with the actual case. A new method to calculate settlement of the ground reinforced with group of stone columns is presented in this paper which overcomes the restrictions made by previous theories. This method is based on results deduced from numerical modeling. Results obtained from the model are validated.

Keywords: stone columns, group, soft soil, settlement, prediction

Procedia PDF Downloads 509
3710 Analysis of the Homogeneous Turbulence Structure in Uniformly Sheared Bubbly Flow Using First and Second Order Turbulence Closures

Authors: Hela Ayeb Mrabtini, Ghazi Bellakhal, Jamel Chahed

Abstract:

The presence of the dispersed phase in gas-liquid bubbly flow considerably alters the liquid turbulence. The bubbles induce turbulent fluctuations that enhance the global liquid turbulence level and alter the mechanisms of turbulence. RANS modeling of uniformly sheared flows on an isolated sphere centered in a control volume is performed using first and second order turbulence closures. The sphere is placed in the production-dissipation equilibrium zone where the liquid velocity is set equal to the relative velocity of the bubbles. The void fraction is determined by the ratio between the sphere volume and the control volume. The analysis of the turbulence statistics on the control volume provides numerical results that are interpreted with regard to the effect of the bubbles wakes on the turbulence structure in uniformly sheared bubbly flow. We assumed for this purpose that at low void fraction where there is no hydrodynamic interaction between the bubbles, the single-phase flow simulation on an isolated sphere is representative on statistical average of a sphere network. The numerical simulations were firstly validated against the experimental data of bubbly homogeneous turbulence with constant shear and then extended to produce numerical results for a wide range of shear rates from 0 to 10 s^-1. These results are compared with our turbulence closure proposed for gas-liquid bubbly flows. In this closure, the turbulent stress tensor in the liquid is split into a turbulent dissipative part produced by the gradient of the mean velocity which also contains the turbulence generated in the bubble wakes and a pseudo-turbulent non-dissipative part induced by the bubbles displacements. Each part is determined by a specific transport equation. The simulations of uniformly sheared flows on an isolated sphere reproduce the mechanisms related to the turbulent part, and the numerical results are in perfect accordance with the modeling of the transport equation of the turbulent part. The reduction of second order turbulence closure provides a description of the modification of turbulence structure by the bubbles presence using a dimensionless number expressed in terms of two-time scales characterizing the turbulence induced by the shear and that induced by bubbles displacements. The numerical simulations carried out in the framework of a comprehensive analysis reproduce particularly the attenuation of the turbulent friction showed in the experimental results of bubbly homogeneous turbulence subjected to a constant shear.

Keywords: gas-liquid bubbly flows, homogeneous turbulence, turbulence closure, uniform shear

Procedia PDF Downloads 464
3709 Flow Characterization in Complex Terrain for Aviation Safety

Authors: Adil Rasheed, Mandar Tabib

Abstract:

The paper describes the ability of a high-resolution Computational Fluid Dynamics model to predict terrain-induced turbulence and wind shear close to the ground. Various sensitivity studies to choose the optimal simulation setup for modeling the flow characteristics in a complex terrain are presented. The capabilities of the model are demonstrated by applying it to the Sandnessjøen Airport, Stokka in Norway, an airport that is located in a mountainous area. The model is able to forecast turbulence in real time and trigger an alert when atmospheric conditions might result in high wind shear and turbulence.

Keywords: aviation safety, terrain-induced turbulence, atmospheric flow, alert system

Procedia PDF Downloads 418
3708 Rethinking Africa's 'Great Runner': Authoritarianism and Development in Post-Cold War Ethiopia

Authors: Frew Yirgalem Mane

Abstract:

This study has examined Africa’s experiment with authoritarian model of development drawing from the experience of Ethiopia. With the tectonic crisis of neoliberal ideology, the dominant policy agenda in Africa pertains to bringing the state back to development. More concretely, countries epitomized by Ethiopia, Rwanda and Uganda have been constructing a highly interventionist state with authoritarian character. The central motive appears to facilitate development and salvage people out of appalling and grinding poverty. Each country warrants closer inspection. However, this study focuses on Ethiopia- a country often applauded as ‘Africa’s Great Run’ for delivering socio-economic success over the past two decades. In fact, inspired by East Asia’s including Chinese model of authoritarian development, Ethiopia orchestrated a vanguard party, centralized rent control system with politicized bureaucracy and militaristic mobilization resources for development. This arrangement may explain Ethiopia economic success story as one the fastest growing countries in the world. However, this paper detected, Ethiopia’s attempt to bring the state back in development has precipitated institutionalization of a new breed of authoritarianism and informalization of public institutions. Ethiopia’s model of state-led development may constitute a noticeable shift away from the vengeful adherence to neoliberal policies. However, the manner the model has been practiced proved to be neither smooth nor appears to address Ethiopia’s aspiration for political and economic transformation. Partly, this can be illustrated by recent widespread grievances that fed into the popular uprising and animated opposition against the state. Sources of the grievance are complex, but they are highly ingrained with the way the authoritarian model of development is functioning and also the model’s dis-functioning in terms of benefiting people. In light of these findings, the study has arrived at the following conclusion. Africa’s attempt to emulate development models from other countries is not such a ‘bad’ thing. However, emulation makes sense if it is contextualized and sensitive to complex local socio-economic interests.

Keywords: Africa, authoritarianism, development, Ethiopia, neoliberalism

Procedia PDF Downloads 207
3707 The Dual Catastrophe of Behçet’s Disease Visual Loss Followed by Acute Spinal Shock After Lumbar Drain Removal

Authors: Naim Izet Kajtazi

Abstract:

Context: Increased intracranial pressure and associated symptoms such as headache, papilledema, motor or sensory deficits, seizures, and conscious disturbance are well-known in acute CVT. However, visual loss is not commonly associated with this disease, except in the case of secondary IIH associated with it. Process: We report a case of a 40-year-old male with Behçet’s disease and cerebral venous thrombosis, and other multiple comorbidities admitted with a four-day history of increasing headache and rapidly progressive visual loss bilaterally. The neurological examination was positive for bilateral papilledema of grade 3 with light perception on the left eye and counting fingers on the right eye. Brain imaging showed old findings of cerebral venous thrombosis without any intraparenchymal lesions to suggest a flare-up of Behçet’s disease. The lumbar puncture, followed by the lumbar drain insertion, gave no benefit in headache or vision. However, he completely lost sight. The right optic nerve sheath fenestration did not result in vision improvement. The acute spinal shock complicated the lumbar drain removal due to epidural hematoma. An urgent lumbar laminectomy with hematoma evacuation undertook. Intra-operatively, the neurosurgeon noted suspicious abnormal vessels at conus medullaris with the possibility of an arteriovenous malformation. Outcome: In a few days following the spinal surgery, the patient vision started to improve. Further improvement was achieved after plasma exchange sessions followed by cyclophosphamide. In the recent follow-up in the clinic, he reported better vision, drove, and completed his Ph.D. studies. Relevance: Visual loss in patients with Behçet’s disease should always be anticipated and taken reasonable care of, ensuring that they receive well-combined immunosuppression with anticoagulation and agents to reduce intracranial pressure. This patient’s story is significant for a high disease burden and complicated hospital course by acute spinal shock due to spinal lumbar drain removal with a possible underlying spinal arteriovenous malformation.

Keywords: Behcet disease, optic neuritis, IIH, CVT

Procedia PDF Downloads 75
3706 Installing Cloud Computing Model for E-Businesses in Small Organizations

Authors: Khader Titi

Abstract:

Information technology developments have changed the way how businesses are working. Organizations are required to become visible online and stay connected to take advantages of costs reduction and improved operation of existing resources. The approval and the application areas of the cloud computing has significantly increased since it was presented by Google in 2007. Internet Cloud computing has attracted the IT enterprise attention especially the e-business enterprise. At this time, there is a great issue of environmental costs during the enterprises apply the e- business, but with the coming of cloud computing, most of the problem will be solved. Organizations around the world are facing with the continued budget challenges and increasing in the size of their computational data so, they need to find a way to deliver their services to clients as economically as possible without negotiating the achievement of anticipated outcomes. E- business companies need to provide better services to satisfy their clients. In this research, the researcher proposed a paradigm that use and deploy cloud computing technology environment to be used for e-business in small enterprises. Cloud computing might be a suitable model for implementing e-business and e-commerce architecture to improve efficiency and user satisfaction.

Keywords: E-commerce, cloud computing, B2C, SaaS

Procedia PDF Downloads 319
3705 Enhancing Rural Agricultural Value Chains through Electric Mobility Services in Ethiopia

Authors: Clemens Pizzinini, Philipp Rosner, David Ziegler, Markus Lienkamp

Abstract:

Transportation is a constitutional part of most supply and value chains in modern economies. Smallholder farmers in rural Ethiopia face severe challenges along their supply and value chains. In particular, suitable, affordable, and available transport services are in high demand. To develop a context-specific technical solutions, a problem-to-solution methodology based on the interaction with technology is developed. With this approach, we fill the gap between proven transportation assessment frameworks and general user-centered techniques. Central to our approach is an electric test vehicle that is implemented in rural supply and value chains for research, development, and testing. Based on our objective and the derived methodological requirements, a set of existing methods is selected. Local partners are integrated into an organizational framework that executes major parts of this research endeavour in the Arsi Zone, Oromia Region, Ethiopia.

Keywords: agricultural value chain, participatory methods, agile methods, sub-Saharan Africa, Ethiopia, electric vehicle, transport service

Procedia PDF Downloads 76
3704 Discrete Element Modeling on Bearing Capacity Problems

Authors: N. Li, Y. M. Cheng

Abstract:

In this paper, the classical bearing capacity problem is re-considered from discrete element analysis. In the discrete element approach, the bearing capacity problem is considered from the elastic stage to plastic stage to rupture stage (large displacement). The bearing capacity failure mechanism of a strip footing on soil is investigated, and the influence of micro-parameters on the bearing capacity of soil is also observed. It is found that the distinct element method (DEM) gives very good visualized results, and basically coincides well with that derived by the classical methods.

Keywords: bearing capacity, distinct element method, failure mechanism, large displacement

Procedia PDF Downloads 368