Search results for: binary%20compounds
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 663

Search results for: binary%20compounds

333 Indentifying Critical Factors Influencing Timeshare Purchases in India

Authors: Shivam Kushwaha, Veena Bansal

Abstract:

Timeshare refers to real estate that is owned simultaneously by many, for a specified time in a year, for a specified numbers of years and is maintained and managed by an agency. Timeshare falls under the umbrella of tourism and is often used for vacation. Timeshare industry has attracted significantly less number of customers in India as compared to the US and Europe. In more than 40 years of existence of timeshare industry, it has not been able to grow its roots among Indian customers. The purpose of the study: To explore perception of Indian customers towards the adoption of timeshare segment of the hospitality industry and identify the factors. Source of data: Survey has been done on existing owners of holidays memberships, resorts or those who at least tourism experience in their past purchases. Methodology: Logistic Regression is used to predict binary responses of the customers based on identified critical factors which might influence timeshare purchases. Result: The study identified four factors: discretionary income, exchange options, ownership pride, risk, and measured their influence on intention to purchases in India. It is recognized that is all four variables are statistically significant while explaining in purchase intentions of customers in India.

Keywords: timeshare, holiday, tourism, customer perception, intent to use, Indian tourism

Procedia PDF Downloads 296
332 Coronavirus Academic Paper Sorting Application

Authors: Christina A. van Hal, Xiaoqian Jiang, Luyao Chen, Yan Chu, Robert D. Jolly, Yaobin Lin, Jitian Zhao, Kang Lin Hsieh

Abstract:

The COVID-19 Literature Summary App was created for the primary purpose of enabling academicians and clinicians to quickly sort through the vast array of recent coronavirus publications by topics of interest. Multiple methods of summarizing and sorting the manuscripts were created. A summary page introduces the application function and capabilities, while an interactive map provides daily updates on infection, death, and recovery rates. A page with a pivot table allows publication sorting by topic, with an interactive data table that allows sorting topics by columns, as wells as the capability to view abstracts. Additionally, publications may be sorted by the medical topics they cover. We used the CORD-19 database to compile lists of publications. The data table can sort binary variables, allowing the user to pick desired publication topics, such as papers that describe COVID-19 symptoms. The application is primarily designed for use by researchers but can be used by anybody who wants a faster and more efficient means of locating papers of interest.

Keywords: COVID-19, literature summary, information retrieval, Snorkel

Procedia PDF Downloads 149
331 A Characterization of Skew Cyclic Code with Complementary Dual

Authors: Eusebio Jr. Lina, Ederlina Nocon

Abstract:

Cyclic codes are a fundamental subclass of linear codes that enjoy a very interesting algebraic structure. The class of skew cyclic codes (or θ-cyclic codes) is a generalization of the notion of cyclic codes. This a very large class of linear codes which can be used to systematically search for codes with good properties. A linear code with complementary dual (LCD code) is a linear code C satisfying C ∩ C^⊥ = {0}. This subclass of linear codes provides an optimum linear coding solution for a two-user binary adder channel and plays an important role in countermeasures to passive and active side-channel analyses on embedded cryptosystems. This paper aims to identify LCD codes from the class of skew cyclic codes. Let F_q be a finite field of order q, and θ be an automorphism of F_q. Some conditions for a skew cyclic code to be LCD were given. To this end, the properties of a noncommutative skew polynomial ring F_q[x, θ] of automorphism type were revisited, and the algebraic structure of skew cyclic code using its skew polynomial representation was examined. Using the result that skew cyclic codes are left ideals of the ring F_q[x, θ]/〈x^n-1〉, a characterization of a skew cyclic LCD code of length n was derived. A necessary condition for a skew cyclic code to be LCD was also given.

Keywords: LCD cyclic codes, skew cyclic LCD codes, skew cyclic complementary dual codes, theta-cyclic codes with complementary duals

Procedia PDF Downloads 342
330 Prevalence and Spatial Distribution of Anaemia in Ethiopia using 2011 EDHS

Authors: Bedilu A. Ejigu, Eshetu Wencheko, Kiros Berhane

Abstract:

Anaemia is a condition in which the haemoglobin concentration falls below an established cut-off value due to a decrease in the number and size of red blood cells. The current study aimed to assess the spatial pattern and identify predictors related to anaemia using the third Ethiopian demographic health survey which was conducted in 2010. To achieve this objective, this study took into account the clustered nature of the data. As a result, multilevel modeling has been used in the statistical analysis. For analysis purpose, only complete cases from 15,909 females, and 13,903 males were considered. Among all subjects who agreed for haemoglobin test, 5.49 %males, and 19.86% females were anaemic. In both binary and ordinal outcome modeling approaches, educational level, age, wealth index, BMI and HIV status were identified to be significant predictors for anaemia prevalence. Furthermore, it was noted that pregnant women were more anaemic than non-pregnant women. As revealed by Moran's I test, significant spatial autocorrelation was noted across clusters. The risk of anaemia was found to vary across different regions, and higher prevalence was observed in Somali and Affar region.

Keywords: anaemia, Moran's I test, multilevel models, spatial pattern

Procedia PDF Downloads 423
329 Enhanced Modification Effect of CeO2 on Pt-Pd Binary Catalysts for Formic Acid Oxidation

Authors: Azeem Ur Rehman, Asma Tayyaba

Abstract:

This article deals with the promotional effects of CeO2 on PtPd/CeO2-OMC electro catalysts. The synthesized catalysts are characterized using different physico chemical techniques and evaluated in a formic acid oxidation fuel cell. N2 adsorption/desorption analysis shows that CeO2 modification increases the surface area of OMC from 1005 m2/g to 1119 m2/g. SEM, XRD and TEM analysis reveal that the presence of CeO2 enhances the active metal(s) dispersion on the CeO2-OMC surface. The average particle size of the dispersed metal decreases with the increase of Pt/Pd ratio on CeO2-OMC support. Cyclic voltametry measurement of Pd/CeO2-OMC gives 12 % higher anodic current activity with 83 mV negative shift of the peak potential as compared to unmodified Pd/OMC. In bimetallic catalysts, the addition of Pt improves the activity and stability of the catalysts significantly. Among the bimetallic samples, Pd3Pt1/CeO2-OMC displays superior current density (74.6 mA/cm2), which is 28.3 times higher than that of Pt/CeO2-OMC. It also shows higher stability in extended period of runs with least indication of CO poisoning effects.

Keywords: CeO2, ordered mesoporous carbon (OMC), electro catalyst, formic acid fuel cell

Procedia PDF Downloads 490
328 A Neuron Model of Facial Recognition and Detection of an Authorized Entity Using Machine Learning System

Authors: J. K. Adedeji, M. O. Oyekanmi

Abstract:

This paper has critically examined the use of Machine Learning procedures in curbing unauthorized access into valuable areas of an organization. The use of passwords, pin codes, user’s identification in recent times has been partially successful in curbing crimes involving identities, hence the need for the design of a system which incorporates biometric characteristics such as DNA and pattern recognition of variations in facial expressions. The facial model used is the OpenCV library which is based on the use of certain physiological features, the Raspberry Pi 3 module is used to compile the OpenCV library, which extracts and stores the detected faces into the datasets directory through the use of camera. The model is trained with 50 epoch run in the database and recognized by the Local Binary Pattern Histogram (LBPH) recognizer contained in the OpenCV. The training algorithm used by the neural network is back propagation coded using python algorithmic language with 200 epoch runs to identify specific resemblance in the exclusive OR (XOR) output neurons. The research however confirmed that physiological parameters are better effective measures to curb crimes relating to identities.

Keywords: biometric characters, facial recognition, neural network, OpenCV

Procedia PDF Downloads 254
327 High Frequency Memristor-Based BFSK and 8QAM Demodulators

Authors: Nahla Elazab, Mohamed Aboudina, Ghada Ibrahim, Hossam Fahmy, Ahmed Khalil

Abstract:

This paper presents the developed memristor based demodulators for eight circular Quadrature Amplitude Modulation (QAM) and Binary Frequency Shift Keying (BFSK) operating at relatively high frequency. In our implementations, the experimental-based ‘nonlinear’ dopant drift model is adopted along with the proposed circuits providing incorporation of all known non-idealities of practically realized memristor and gaining high operation frequency. The suggested designs leverage the distinctive characteristics of the memristor device, definitely, its changeable average memristance versus the frequency, phase and amplitude of the periodic excitation input. The proposed demodulators feature small integration area, low power consumption, and easy implementation. Moreover, the proposed QAM demodulator precludes the requirement for the carrier recovery circuits. In doing so, the designs were validated by transient simulations using the nonlinear dopant drift memristor model. The simulations results show high agreement with the theory presented.

Keywords: BFSK, demodulator, high frequency memristor applications, memristor based analog circuits, nonlinear dopant drift model, QAM

Procedia PDF Downloads 167
326 Religiosity and Social Factors on Alcohol Use among South African University Students

Authors: Godswill Nwabuisi Osuafor, Sonto Maria Maputle

Abstract:

Background: Abounding studies found that religiosity and social factors modulate alcohol use among university students. However, there is a scarcity of empirical studies examining the protective effects of religiosity and other social factors on alcohol use and abuse in South African universities. The aim of this study was therefore to assess the protective effects of religiosity and roles of social factors on alcohol use among university students. Methodology: A survey on the use of alcohol among 416 university students was conducted using structured questionnaire in 2014. Data were sourced on religiosity and contextual variables. Students were classified as practicing intrinsic religiosity or extrinsic religiosity based on the response to the measures of religiosity. Descriptive, chi square and binary logistic analyses were used in processing the data. Result: Results revealed that alcohol use was associated with religiosity, religion, sex, family history of alcohol use and experimenting with alcohol. Reporting alcohol abuse was significantly predicted by sex, family history of alcohol use and experimenting with alcohol. Religiosity mediated lower alcohol use whereas family history of alcohol use and experimenting with alcohol promoted alcohol use and abuse. Conclusion: Families, religious groups and societal factors may be the specific niches for intervention on alcohol use among university students.

Keywords: religiosity, alcohol use, protective factors, university students

Procedia PDF Downloads 395
325 Robust Data Image Watermarking for Data Security

Authors: Harsh Vikram Singh, Ankur Rai, Anand Mohan

Abstract:

In this paper, we propose secure and robust data hiding algorithm based on DCT by Arnold transform and chaotic sequence. The watermark image is scrambled by Arnold cat map to increases its security and then the chaotic map is used for watermark signal spread in middle band of DCT coefficients of the cover image The chaotic map can be used as pseudo-random generator for digital data hiding, to increase security and robustness .Performance evaluation for robustness and imperceptibility of proposed algorithm has been made using bit error rate (BER), normalized correlation (NC), and peak signal to noise ratio (PSNR) value for different watermark and cover images such as Lena, Girl, Tank images and gain factor .We use a binary logo image and text image as watermark. The experimental results demonstrate that the proposed algorithm achieves higher security and robustness against JPEG compression as well as other attacks such as addition of noise, low pass filtering and cropping attacks compared to other existing algorithm using DCT coefficients. Moreover, to recover watermarks in proposed algorithm, there is no need to original cover image.

Keywords: data hiding, watermarking, DCT, chaotic sequence, arnold transforms

Procedia PDF Downloads 513
324 LGBT+ Migrants: A Cultural and Legislative Comparison in Canada, Italy and Egypt

Authors: Andreas Aceranti, Simonetta Vernocchi, Federica Brondoni, Marco Colorato, Marta Primatesta

Abstract:

This study entitled “LGBT+ migrants: a cultural and legislative comparison in Canada, Italy and Egypt” suggests an analysis of the living conditions of migrants who are members of the LGBT+ community in Canada, Italy and Egypt. The acronym LGBT+ refers to lesbian, gay, bisexual, transgender and all other gender identities and sexual orientations that do not fit into the male and female binary. This study aims at reflecting on the living conditions of LGBT+ migrants and the relatable difficulties they may face due to the culture and laws of their countries. Migratory flows were examined by providing a definition of "migrant" and the choices that drive a person to migrate elsewhere explained, followed by a focus on the recognition of refugee status related to sexual orientation and gender identity. Furthermore, we will deal with Canada, Italy and Egypt respectively, by analyzing for each country the history and rise of the LGBT+ community, the different laws and especially the migrants’ rights. Finally, the services and associations designed to provide a response to the needs of these people will be analyzed, highlighting the branches which nowadays operate in those areas and the importance of the cultural mediator.

Keywords: LGBTQ+, migrants, international rights, discrimination

Procedia PDF Downloads 110
323 Semi-Supervised Learning Using Pseudo F Measure

Authors: Mahesh Balan U, Rohith Srinivaas Mohanakrishnan, Venkat Subramanian

Abstract:

Positive and unlabeled learning (PU) has gained more attention in both academic and industry research literature recently because of its relevance to existing business problems today. Yet, there still seems to be some existing challenges in terms of validating the performance of PU learning, as the actual truth of unlabeled data points is still unknown in contrast to a binary classification where we know the truth. In this study, we propose a novel PU learning technique based on the Pseudo-F measure, where we address this research gap. In this approach, we train the PU model to discriminate the probability distribution of the positive and unlabeled in the validation and spy data. The predicted probabilities of the PU model have a two-fold validation – (a) the predicted probabilities of reliable positives and predicted positives should be from the same distribution; (b) the predicted probabilities of predicted positives and predicted unlabeled should be from a different distribution. We experimented with this approach on a credit marketing case study in one of the world’s biggest fintech platforms and found evidence for benchmarking performance and backtested using historical data. This study contributes to the existing literature on semi-supervised learning.

Keywords: PU learning, semi-supervised learning, pseudo f measure, classification

Procedia PDF Downloads 233
322 Machine Learning Assisted Prediction of Sintered Density of Binary W(MO) Alloys

Authors: Hexiong Liu

Abstract:

Powder metallurgy is the optimal method for the consolidation and preparation of W(Mo) alloys, which exhibit excellent application prospects at high temperatures. The properties of W(Mo) alloys are closely related to the sintered density. However, controlling the sintered density and porosity of these alloys is still challenging. In the past, the regulation methods mainly focused on time-consuming and costly trial-and-error experiments. In this study, the sintering data for more than a dozen W(Mo) alloys constituted a small-scale dataset, including both solid and liquid phases of sintering. Furthermore, simple descriptors were used to predict the sintered density of W(Mo) alloys based on the descriptor selection strategy and machine learning method (ML), where the ML algorithm included the least absolute shrinkage and selection operator (Lasso) regression, k-nearest neighbor (k-NN), random forest (RF), and multi-layer perceptron (MLP). The results showed that the interpretable descriptors extracted by our proposed selection strategy and the MLP neural network achieved a high prediction accuracy (R>0.950). By further predicting the sintered density of W(Mo) alloys using different sintering processes, the error between the predicted and experimental values was less than 0.063, confirming the application potential of the model.

Keywords: sintered density, machine learning, interpretable descriptors, W(Mo) alloy

Procedia PDF Downloads 79
321 Worst-Case Load Shedding in Electric Power Networks

Authors: Fu Lin

Abstract:

We consider the worst-case load-shedding problem in electric power networks where a number of transmission lines are to be taken out of service. The objective is to identify a prespecified number of line outages that lead to the maximum interruption of power generation and load at the transmission level, subject to the active power-flow model, the load and generation capacity of the buses, and the phase-angle limit across the transmission lines. For this nonlinear model with binary constraints, we show that all decision variables are separable except for the nonlinear power-flow equations. We develop an iterative decomposition algorithm, which converts the worst-case load shedding problem into a sequence of small subproblems. We show that the subproblems are either convex problems that can be solved efficiently or nonconvex problems that have closed-form solutions. Consequently, our approach is scalable for large networks. Furthermore, we prove the convergence of our algorithm to a critical point, and the objective value is guaranteed to decrease throughout the iterations. Numerical experiments with IEEE test cases demonstrate the effectiveness of the developed approach.

Keywords: load shedding, power system, proximal alternating linearization method, vulnerability analysis

Procedia PDF Downloads 138
320 Emotion Recognition with Occlusions Based on Facial Expression Reconstruction and Weber Local Descriptor

Authors: Jadisha Cornejo, Helio Pedrini

Abstract:

Recognition of emotions based on facial expressions has received increasing attention from the scientific community over the last years. Several fields of applications can benefit from facial emotion recognition, such as behavior prediction, interpersonal relations, human-computer interactions, recommendation systems. In this work, we develop and analyze an emotion recognition framework based on facial expressions robust to occlusions through the Weber Local Descriptor (WLD). Initially, the occluded facial expressions are reconstructed following an extension approach of Robust Principal Component Analysis (RPCA). Then, WLD features are extracted from the facial expression representation, as well as Local Binary Patterns (LBP) and Histogram of Oriented Gradients (HOG). The feature vector space is reduced using Principal Component Analysis (PCA) and Linear Discriminant Analysis (LDA). Finally, K-Nearest Neighbor (K-NN) and Support Vector Machine (SVM) classifiers are used to recognize the expressions. Experimental results on three public datasets demonstrated that the WLD representation achieved competitive accuracy rates for occluded and non-occluded facial expressions compared to other approaches available in the literature.

Keywords: emotion recognition, facial expression, occlusion, fiducial landmarks

Procedia PDF Downloads 180
319 Logistic Model Tree and Expectation-Maximization for Pollen Recognition and Grouping

Authors: Endrick Barnacin, Jean-Luc Henry, Jack Molinié, Jimmy Nagau, Hélène Delatte, Gérard Lebreton

Abstract:

Palynology is a field of interest for many disciplines. It has multiple applications such as chronological dating, climatology, allergy treatment, and even honey characterization. Unfortunately, the analysis of a pollen slide is a complicated and time-consuming task that requires the intervention of experts in the field, which is becoming increasingly rare due to economic and social conditions. So, the automation of this task is a necessity. Pollen slides analysis is mainly a visual process as it is carried out with the naked eye. That is the reason why a primary method to automate palynology is the use of digital image processing. This method presents the lowest cost and has relatively good accuracy in pollen retrieval. In this work, we propose a system combining recognition and grouping of pollen. It consists of using a Logistic Model Tree to classify pollen already known by the proposed system while detecting any unknown species. Then, the unknown pollen species are divided using a cluster-based approach. Success rates for the recognition of known species have been achieved, and automated clustering seems to be a promising approach.

Keywords: pollen recognition, logistic model tree, expectation-maximization, local binary pattern

Procedia PDF Downloads 180
318 A QoE-driven Cross-layer Resource Allocation Scheme for High Traffic Service over Open Wireless Network Downlink

Authors: Liya Shan, Qing Liao, Qinyue Hu, Shantao Jiang, Tao Wang

Abstract:

In this paper, a Quality of Experience (QoE)-driven cross-layer resource allocation scheme for high traffic service over Open Wireless Network (OWN) downlink is proposed, and the related problem about the users in the whole cell including the users in overlap region of different cells has been solved.A method, in which assess models of the BestEffort service and the no-reference assess algorithm for video service are adopted, to calculate the Mean Opinion Score (MOS) value for high traffic service has been introduced. The cross-layer architecture considers the parameters in application layer, media access control layer and physical layer jointly. Based on this architecture and the MOS value, the Binary Constrained Particle Swarm Optimization (B_CPSO) algorithm is used to solve the cross-layer resource allocation problem. In addition,simulationresults show that the proposed scheme significantly outperforms other schemes in terms of maximizing average users’ MOS value for the whole system as well as maintaining fairness among users.

Keywords: high traffic service, cross-layer resource allocation, QoE, B_CPSO, OWN

Procedia PDF Downloads 537
317 Comparative Study in Dentinal Tubuli Occlusion Using Bioglass and Copper-Bromide Laser

Authors: Sun Woo Lee, Tae Bum Lee, Yoon Hwa Park, Yoo Jeong Kim

Abstract:

Cervical dentinal hypersensitivity (CDH) affects 8-30% of adults and nearly 85% of perio-treated patients. Various treatment schemes have been applied for treating CDH, among them being fluoride application, laser irradiation, and, recently, bioglass. The purpose of this study was to investigate the influence of bioglass, copper-bromide (Cu-Br) laser irradiation and their combination on dentinal tubule occlusion as a potential dentinal hypersensitivity treatment for CDH. 45 human dentin surfaces were organized into three equal groups: group A received Cu-Br laser only; group B received bioglass only; group C received bioglass followed by Cu-Br laser irradiation. Specimens were evaluated with regard to dentinal tubule occlusion under environmental scanning electron microscope. Treatment modality significantly affected dentinal tubule occlusion (p<0.001). Groups B and C scored higher dentinal tubule occlusion than group A. Binary logistic regression showed that bioglass application significantly (p<0.001) contributed to dentinal tubule occlusion, compared with other variables. Under the conditions used herein and within the limitations of this study, bioglass application, alone or combined with Cu-Br laser irradiation, is a superior method for producing dentinal tubule occlusion, and may lead to an effective treatment modality for CDH.

Keywords: bioglass, Cu-Br laser, cervical dentinal hypersensitivity, dentinal tubule occlusion

Procedia PDF Downloads 353
316 Catalytic Decomposition of High Energy Materials Using Nanoparticles of Copper Chromite

Authors: M. Sneha Reddy, M. Arun Kumar, V. Kameswara Rao

Abstract:

Chromites are binary transition metal oxides with a general formula of ACr₂O₄, where A = Mn²⁺, Fe²⁺, Co²⁺, Ni²⁺, and Cu²⁺. Chromites have a normal-type spinel structure with interesting applications in the areas of applied physics, material sciences, and geophysics. They have attracted great consideration because of their unique physicochemical properties and tremendous technological applications in nanodevices, sensor elements, and high-temperature ceramics with useful optical properties. Copper chromite is one of the most efficient spinel oxides, having pronounced commercial application as a catalyst in various chemical reactions like oxidation, hydrogenation, alkylation, dehydrogenation, decomposition of organic compounds, and hydrogen production. Apart from its usage in chemical industries, CuCr₂O₄ finds its major application as a burn rate modifier in solid propellant processing for space launch vehicles globally. Herein we synthesized the nanoparticles of copper chromite using the co-precipitation method. The synthesized nanoparticles were characterized by XRD, TEM, SEM, BET, and TG-DTA. The synthesized nanoparticles of copper chromites were used as a catalyst for the thermal decomposition of various high-energy materials.

Keywords: copper chromite, coprecipitation method, high energy materials, catalytic thermal decomposition

Procedia PDF Downloads 73
315 Generalized Extreme Value Regression with Binary Dependent Variable: An Application for Predicting Meteorological Drought Probabilities

Authors: Retius Chifurira

Abstract:

Logistic regression model is the most used regression model to predict meteorological drought probabilities. When the dependent variable is extreme, the logistic model fails to adequately capture drought probabilities. In order to adequately predict drought probabilities, we use the generalized linear model (GLM) with the quantile function of the generalized extreme value distribution (GEVD) as the link function. The method maximum likelihood estimation is used to estimate the parameters of the generalized extreme value (GEV) regression model. We compare the performance of the logistic and the GEV regression models in predicting drought probabilities for Zimbabwe. The performance of the regression models are assessed using the goodness-of-fit tests, namely; relative root mean square error (RRMSE) and relative mean absolute error (RMAE). Results show that the GEV regression model performs better than the logistic model, thereby providing a good alternative candidate for predicting drought probabilities. This paper provides the first application of GLM derived from extreme value theory to predict drought probabilities for a drought-prone country such as Zimbabwe.

Keywords: generalized extreme value distribution, general linear model, mean annual rainfall, meteorological drought probabilities

Procedia PDF Downloads 198
314 Identification and Quantification of Acid Sites of M(X)X Zeolites (M= Cu2+ and/or Zn2+,X = Level of Exchange): An In situ FTIR Study Using Pyridine Adsorption/Desorption

Authors: H. Hammoudi, S. Bendenia, I. Batonneau-Gener, J. Comparot, K. Marouf-Khelifa, A. Khelifa

Abstract:

X zeolites were prepared by ion-exchange with Cu2+ and/or Zn2+ cations, at different concentrations of the exchange solution, and characterised by thermal analysis and nitrogen adsorption. The acidity of the samples was investigated by pyridine adsorption–desorption followed by in situ Fourier transform infrared (FTIR) spectroscopy. Desorption was carried out at 150, 250 and 350 °C. The objective is to estimate the nature and concentration of acid sites. A comparison between the binary (Cu(x)X, Zn(x)X) and ternary (CuZn(x)X) exchanges was also established (x = level of exchange) through the Cu(43)X, Zn(48)X and CuZn(50)X samples. Lewis acidity decreases overall with desorption temperature and the level of exchange. As the latter increases, there is a conversion of some Lewis sites into those of Brønsted during thermal treatment. In return, the concentration of Brønsted sites increases with the degree of exchange. The Brønsted acidity of CuZn(50)X at 350 °C is more important than the sum of those of Cu(43)X and Zn(48)X. The found values were 73, 32 and 15 μmol g-1, respectively. Besides, the concentration of Brønsted sites for CuZn(50)X increases with desorption temperature. These features indicate the presence of a synergistic effect amplifying the strength of these sites when Cu2+ and Zn2+ cations compete for the occupancy of sites distributed inside zeolitic cavities.

Keywords: acidity, adsorption, pyridine, zeolites

Procedia PDF Downloads 226
313 Assessment of Association Between Microalbuminuria and Lung Function Test Among the Community of Jimma Town

Authors: Diriba Dereje

Abstract:

Background: Cardiac and renal disease are the most prevalent chronic non-communicable diseases (CNCD) affecting the community in a significant manner. The best and recommended method in halting CNCD is by working on prevention as early as possible. This is only possible if early surrogate markers are identified. As part of the stated solution, this study will identify an association between microalbuminuria (an early surrogate marker of renal and cardiac disease) and lung function test among adult in the community. Objective: The main aim of this study was to assess an association between microalbuminuria (an early surrogate marker of renal and cardiac disease) and lung function test among adult in the community. Methodology: Community based cross sectional study was conducted among 384 adult in Jimma town. A systematic sampling technique was used in selecting participants to the study. In searching for the possible association, binary and multivariate logistic regression and t-test was conducted. Finally, the association between microalbuminuria and lung function test was well stated in the form of figures and written description. Result and Conclusion: A significant association was found between microalbuminuria and different lung function test parameters.

Keywords: microalbuminuria, lung function, association, test

Procedia PDF Downloads 190
312 Bubble Point Pressures of CO2+Ethyl Palmitate by a Cubic Equation of State and the Wong-Sandler Mixing Rule

Authors: M. A. Sedghamiz, S. Raeissi

Abstract:

This study presents three different approaches to estimate bubble point pressures for the binary system of CO2 and ethyl palmitate fatty acid ethyl ester. The first method involves the Peng-Robinson (PR) Equation of State (EoS) with the conventional mixing rule of Van der Waals. The second approach involves the PR EOS together with the Wong Sandler (WS) mixing rule, coupled with the Uniquac Ge model. In order to model the bubble point pressures with this approach, the volume and area parameter for ethyl palmitate were estimated by the Hansen group contribution method. The last method involved the Peng-Robinson, combined with the Wong-Sandler Method, but using NRTL as the GE model. Results using the Van der Waals mixing rule clearly indicated that this method has the largest errors among all three methods, with errors in the range of 3.96–6.22 %. The Pr-Ws-Uniquac method exhibited small errors, with average absolute deviations between 0.95 to 1.97 percent. The Pr-Ws-Nrtl method led to the least errors where average absolute deviations ranged between 0.65-1.7%.

Keywords: bubble pressure, Gibbs excess energy model, mixing rule, CO2 solubility, ethyl palmitate

Procedia PDF Downloads 473
311 Microfinance and Women Empowerment in Bangladesh: Impact in Economic Dimension

Authors: Abm Mostafa, Rumbidzai Mukono, Peijie Wang

Abstract:

Using 285 respondents from two microfinance institutions, this research aims to assess the impact of microfinance on women’s economic empowerment in Bangladesh. Empirical measures of economic empowerment used in this paper are underpinned by a bargaining theory of household. Questionnaire is used for data collection following purposive sampling. Descriptive statistics, chi-square test, Kruskal-Wallis test, binary, and ordinal logistic regressions are deployed for data analysis. The findings of this study show that around three quarters of respondents have increased household income. They have increased their savings overwhelmingly; nonetheless, many of them are found to have a very small amount of savings. Still, more than half of the respondents are reported to have increased their savings when it is checked against at least 500 BDT per month. On the contrary, the percentage of women is moderate in terms of increasing control over finances. Empirical findings demonstrate the evidence of a relationship between the amount of loan and women’s household income, their savings, and control over finances. Nonetheless, no relationship is found in women’s areas. This study infers that women’s access to financial resources is fundamental to empower them in economic dimension.

Keywords: microfinance, women, economic, empowerment, Bangladesh

Procedia PDF Downloads 131
310 Active Contours for Image Segmentation Based on Complex Domain Approach

Authors: Sajid Hussain

Abstract:

The complex domain approach for image segmentation based on active contour has been designed, which deforms step by step to partition an image into numerous expedient regions. A novel region-based trigonometric complex pressure force function is proposed, which propagates around the region of interest using image forces. The signed trigonometric force function controls the propagation of the active contour and the active contour stops on the exact edges of the object accurately. The proposed model makes the level set function binary and uses Gaussian smoothing kernel to adjust and escape the re-initialization procedure. The working principle of the proposed model is as follows: The real image data is transformed into complex data by iota (i) times of image data and the average iota (i) times of horizontal and vertical components of the gradient of image data is inserted in the proposed model to catch complex gradient of the image data. A simple finite difference mathematical technique has been used to implement the proposed model. The efficiency and robustness of the proposed model have been verified and compared with other state-of-the-art models.

Keywords: image segmentation, active contour, level set, Mumford and Shah model

Procedia PDF Downloads 112
309 A Character Detection Method for Ancient Yi Books Based on Connected Components and Regressive Character Segmentation

Authors: Xu Han, Shanxiong Chen, Shiyu Zhu, Xiaoyu Lin, Fujia Zhao, Dingwang Wang

Abstract:

Character detection is an important issue for character recognition of ancient Yi books. The accuracy of detection directly affects the recognition effect of ancient Yi books. Considering the complex layout, the lack of standard typesetting and the mixed arrangement between images and texts, we propose a character detection method for ancient Yi books based on connected components and regressive character segmentation. First, the scanned images of ancient Yi books are preprocessed with nonlocal mean filtering, and then a modified local adaptive threshold binarization algorithm is used to obtain the binary images to segment the foreground and background for the images. Second, the non-text areas are removed by the method based on connected components. Finally, the single character in the ancient Yi books is segmented by our method. The experimental results show that the method can effectively separate the text areas and non-text areas for ancient Yi books and achieve higher accuracy and recall rate in the experiment of character detection, and effectively solve the problem of character detection and segmentation in character recognition of ancient books.

Keywords: CCS concepts, computing methodologies, interest point, salient region detections, image segmentation

Procedia PDF Downloads 130
308 Gynocentrism and Self-Orientalization: A Visual Trend in Chinese Fashion Photography

Authors: Zhen Sun

Abstract:

The study adopts the method of visual social semiotics to analyze a sample of fashion photos that were recently published in Chinese fashion magazines that target towards both male and female readers. It identifies a new visual trend in fashion photography, which is characterized by two features. First, the photos represent young, confident, and stylish female models with lower-class sloppy old men. The visual inharmony between the sexually desirable women and the aged men has suggested an impossibly accomplished sexuality and eroticism. Though the women are still under the male gaze, they are depicted as unreachable objects of voyeurism other than sexual objects subordinated to men. Second, the represented people are usually put in the backdrop of tasteless or vulgar Chinese town life, which is congruent with the images of men but makes the modern city girls out of place. The photographers intentionally contrast the images of women with that of men and with the background, which implies an imaginary binary division of modern Orientalism and the photographers’ self-orientalization strategy. Under the theoretical umbrella of neoliberal postfeminism, this study defines a new kind of gynocentric stereotype in Chinese fashion photography, which challenges the previous observations on gender portrayals in fashion magazines.

Keywords: fashion photography, gynocentrism, neoliberal postfeminism, self-orientalization

Procedia PDF Downloads 421
307 An Analysis of Fertility Decline in India: Evidences from Tamil Nadu and Uttar Pradesh

Authors: Ajay Kumar

Abstract:

Using data from census of India, sample registration system and national family health survey (NFHS-3), this paper traces spatial pattern, trends and the factors which have played their role differently in fertility transition in Uttar Pradesh and Tamil Nadu. For the purpose spatial variation analysis, trend line and binary logistic regression analysis has been carried out. There exist considerable regional disparities in terms of fertility decline in northern and southern states. The pace of fertility decline has been faster in southern and coastal regions, and at a slow pace in backward northern state. In Tamil Nadu fertility declined substantially among the women of lower and higher age groups in comparison to Uttar Pradesh characterized by low literacy, low female age at marriage, poor health infrastructure and low status of women. The Study shows that Fertility rates have been higher among the most vulnerable and deprived sections of the society like Illiterate women, women belong to scheduled caste, scheduled tribe and women residing in rural areas.

Keywords: age specific fertility rate, fertility transition, replacement level, total fertility rate

Procedia PDF Downloads 284
306 An Automated System for the Detection of Citrus Greening Disease Based on Visual Descriptors

Authors: Sidra Naeem, Ayesha Naeem, Sahar Rahim, Nadia Nawaz Qadri

Abstract:

Citrus greening is a bacterial disease that causes considerable damage to citrus fruits worldwide. Efficient method for this disease detection must be carried out to minimize the production loss. This paper presents a pattern recognition system that comprises three stages for the detection of citrus greening from Orange leaves: segmentation, feature extraction and classification. Image segmentation is accomplished by adaptive thresholding. The feature extraction stage comprises of three visual descriptors i.e. shape, color and texture. From shape feature we have used asymmetry index, from color feature we have used histogram of Cb component from YCbCr domain and from texture feature we have used local binary pattern. Classification was done using support vector machines and k nearest neighbors. The best performances of the system is Accuracy = 88.02% and AUROC = 90.1% was achieved by automatic segmented images. Our experiments validate that: (1). Segmentation is an imperative preprocessing step for computer assisted diagnosis of citrus greening, and (2). The combination of shape, color and texture features form a complementary set towards the identification of citrus greening disease.

Keywords: citrus greening, pattern recognition, feature extraction, classification

Procedia PDF Downloads 183
305 Improved Hash Value Based Stream CipherUsing Delayed Feedback with Carry Shift Register

Authors: K. K. Soundra Pandian, Bhupendra Gupta

Abstract:

In the modern era, as the application data’s are massive and complex, it needs to be secured from the adversary attack. In this context, a non-recursive key based integrated spritz stream cipher with the circulant hash function using delayed feedback with carry shift register (d-FCSR) is proposed in this paper. The novelty of this proposed stream cipher algorithm is to engender the improved keystream using d-FCSR. The proposed algorithm is coded using Verilog HDL to produce dynamic binary key stream and implemented on commercially available FPGA device Virtex 5 xc5vlx110t-2ff1136. The implementation of stream cipher using d-FCSR on the FPGA device operates at a maximum frequency of 60.62 MHz. It achieved the data throughput of 492 Mbps and improved in terms of efficiency (throughput/area) compared to existing techniques. This paper also briefs the cryptanalysis of proposed circulant hash value based spritz stream cipher using d-FCSR is against the adversary attack on a hardware platform for the hardware based cryptography applications.

Keywords: cryptography, circulant function, field programmable gated array, hash value, spritz stream cipher

Procedia PDF Downloads 247
304 Aggregation of Butanediyl-1,4-Bis(Tetradecyldimethylammonium Bromide) (14–4–14) Gemini Surfactants in Presence of Ethylene Glycol and Propylene Glycol

Authors: P. Ajmal Koya, Tariq Ahmad Wagay, K. Ismail

Abstract:

One of the fundamental property of surfactant molecules are their ability to aggregate in water or binary mixtures of water and organic solvents as an effort to minimize their unfavourable interaction with the medium. In this work, influence two co-solvents (ethylene glycol (EG) and propylene glycol (PG)) on the aggregation properties of a cationic gemini surfactant, butanediyl-1,4-bis(tetradecyldimethylammonium bromide) (14–4–14), has been studied by conductance and steady state fluorescence at 298 K. The weight percentage of two co-solvents varied in between 0 and 50 % at an interval of 5 % up to 20 % and then 10 % up to 50 %. It was found that micellization process is delayed by the inclusion of both the co-solvents; consequently, a progressive increase was observed in critical micelle concentration (cmc) and Gibbs free energy of micellization (∆G0m), whereas a rough increase was observed in the values of degree of counter ion dissociation (α) and a decrease was obtained in values of average aggregation number (Nagg) and Stern-Volmer constant (KSV). At low weight percentage (up to 15 %) of co-solvents, 14–4–14 geminis were found to be almost equally prone to micellization both in EG–water (EG–WR) and in PG–water (PG–WR) mixed media while at high weight percentages they are more prone to micellization in EG–WR than in PG–WR mixed media.

Keywords: aggregation number, gemini surfactant, micellization, non aqueous solvent

Procedia PDF Downloads 323