Search results for: handwritten signature verification
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 800

Search results for: handwritten signature verification

470 The Influence of Silica on the Properties of Cementitious Composites

Authors: Eva Stefanovska, Estefania Cuenca, Aleksandra Momirov, Monika Fidanchevska, Liberato Ferrara, Emilija Fidanchevski

Abstract:

Silica is used in construction materials as a part of natural raw materials or as an additive in powder form (micro and nano dimensions). SiO₂ particles in cement act as centers of nucleation, as a filler or as pozzolan material. In this regard, silica improves the microstructure of cementitious composites, increases the mechanical properties, and finally also results into improved durability of the final products. Improved properties of cementitious composites may lead to better structural efficiency, which, together with increased durability, results into increased sustainability signature of structures made with this kind of materials. The aim of the present work was to investigate the influence of silica on the properties of cement. Fly ash (as received and mechanically activated) and synthetized silica (sol-gel method using TEOS as precursor) was used in the investigation as source of silica. Four types of cement mixtures were investigated (reference cement paste, cement paste with addition of 15wt.% as-received fly ash, cement paste with 15 wt.% mechanically activated fly ash and cement paste with 14wt.% mechanically activated fly ash and 1 wt.% silica). The influence of silica on setting time and mechanical properties (2, 7 and 28 days) was followed. As a matter of fact it will be shown that cement paste with composition 85 wt. % cement, 14 wt.% mechanically activated fly ash and 1 wt. % SiO₂ obtained by the sol-gel method was the best performing one, with increased compressive and flexure strength by 9 and 10 % respectively, as compared to the reference mixture. Acknowledgements: 'COST Action CA15202, www.sarcos.eng.cam.ac.uk'

Keywords: cement, fly ash, mechanical properties, silica, sol-gel

Procedia PDF Downloads 146
469 Gaze Patterns of Skilled and Unskilled Sight Readers Focusing on the Cognitive Processes Involved in Reading Key and Time Signatures

Authors: J. F. Viljoen, Catherine Foxcroft

Abstract:

Expert sight readers rely on their ability to recognize patterns in scores, their inner hearing and prediction skills in order to perform complex sight reading exercises. They also have the ability to observe deviations from expected patterns in musical scores. This increases the “Eye-hand span” (reading ahead of the point of playing) in order to process the elements in the score. The study aims to investigate the gaze patterns of expert and non-expert sight readers focusing on key and time signatures. 20 musicians were tasked with playing 12 sight reading examples composed for one hand and five examples composed for two hands to be performed on a piano keyboard. These examples were composed in different keys and time signatures and included accidentals and changes of time signature to test this theory. Results showed that the experts fixate more and for longer on key and time signatures as well as deviations in examples for two hands than the non-expert group. The inverse was true for the examples for one hand, where expert sight readers showed fewer and shorter fixations on key and time signatures as well as deviations. This seems to suggest that experts focus more on the key and time signatures as well as deviations in complex scores to facilitate sight reading. The examples written for one appeared to be too easy for the expert sight readers, compromising gaze patterns.

Keywords: cognition, eye tracking, musical notation, sight reading

Procedia PDF Downloads 139
468 The Methodology of Flip Chip Using Astro Place and Route Tool

Authors: Rohaya Abdul Wahab, Raja Mohd Fuad Tengku Aziz, Nazaliza Othman, Sharifah Saleh, Nabihah Razali, Rozaimah Baharim, Md Hanif Md Nasir

Abstract:

This paper will discuss flip chip methodology, in which I/O pads, standard cells, macros and bump cells array are placed in the floorplan, then routed using Astro place and route tool. Final DRC and LVS checking is done using Calibre verification tool. The design vehicle to run this methodology is an OpenRISC design targeted to Silterra 0.18 micrometer technology with 6 metal layers for routing. Astro has extensive support for flip chip placement and routing. Astro tool commands for flip chip are straightforward approach like the conventional standard wire bond packaging. However since we do not have flip chip commands in our Astro tool, no LEF file for bump cell and no LEF file for flip chip I/O pad, we create our own methodology to prepare for future flip chip tapeout. 

Keywords: methodology, flip chip, bump cell, LEF, astro, calibre, SCHEME, TCL

Procedia PDF Downloads 489
467 Collaboration of Game Based Learning with Models Roaming the Stairs Using the Tajribi Method on the Eye PAI Lessons at the Ummul Mukminin Islamic Boarding School, Makassar South Sulawesi

Authors: Ratna Wulandari, Shahidin

Abstract:

This article aims to see how the Game Based Learning learning model with the Roaming The Stairs game makes a tajribi method can make PAI lessons active and interactive learning. This research uses a qualitative approach with a case study type of research. Data collection methods were carried out using interviews, observation, and documentation. Data analysis was carried out through the stages of data reduction, data display, and verification and drawing conclusions. The data validity test was carried out using the triangulation method. and drawing conclusions. The results of the research show that (1) children in grades 9A, 9B, and 9C like learning PAI using the Roaming The Stairs game (2) children in grades 9A, 9B, and 9C are active and can work in groups to solve problems in the Roaming The Stairs game (3) the class atmosphere becomes fun with learning method, namely learning while playing.

Keywords: game based learning, Roaming The Stairs, Tajribi PAI

Procedia PDF Downloads 23
466 Prediction of Mechanical Strength of Multiscale Hybrid Reinforced Cementitious Composite

Authors: Salam Alrekabi, A. B. Cundy, Mohammed Haloob Al-Majidi

Abstract:

Novel multiscale hybrid reinforced cementitious composites based on carbon nanotubes (MHRCC-CNT), and carbon nanofibers (MHRCC-CNF) are new types of cement-based material fabricated with micro steel fibers and nanofilaments, featuring superior strain hardening, ductility, and energy absorption. This study focused on established models to predict the compressive strength, and direct and splitting tensile strengths of the produced cementitious composites. The analysis was carried out based on the experimental data presented by the previous author’s study, regression analysis, and the established models that available in the literature. The obtained models showed small differences in the predictions and target values with experimental verification indicated that the estimation of the mechanical properties could be achieved with good accuracy.

Keywords: multiscale hybrid reinforced cementitious composites, carbon nanotubes, carbon nanofibers, mechanical strength prediction

Procedia PDF Downloads 162
465 Exploring the Potential of Blockchain to Improve Higher Education

Authors: Tony Cripps, Larry Kimber

Abstract:

This paper will begin by briefly explaining how blockchain technology works. Then, after highlighting a few of the ways it promises to heavily impact all aspects of the digital landscape, the focus will shift to Blockchain in the field of education, with specific emphasis placed on practical applications in foreign language education. Blockchain is a decentralized Internet-based software application that guarantees truth in transactions. This means whenever two parties engage in a transaction using Blockchain, it is time-stamped, added to a block of other transactions, and then permanently attached to an unalterable ‘chain’ of blocks. The potential for developing applications with Blockchain is therefore immense, since software systems that ensure the impossibility of outside tampering are invaluable. Innovative ideas in every imaginable domain are presently being entertained and Blockchain in education is no exception. For instance, records kept within and between institutions of students’ grade performance, academic achievement and verification of assignment/course completion are just a few examples of how this new technology might potentially be used to revolutionize education. It is hoped that this paper will be of use to all educators interested in the application of technology in the field of education.

Keywords: blockchain, disruption, potential, technology

Procedia PDF Downloads 138
464 TRACE/FRAPTRAN Analysis of Kuosheng Nuclear Power Plant Dry-Storage System

Authors: J. R. Wang, Y. Chiang, W. Y. Li, H. T. Lin, H. C. Chen, C. Shih, S. W. Chen

Abstract:

The dry-storage systems of nuclear power plants (NPPs) in Taiwan have become one of the major safety concerns. There are two steps considered in this study. The first step is the verification of the TRACE by using VSC-17 experimental data. The results of TRACE were similar to the VSC-17 data. It indicates that TRACE has the respectable accuracy in the simulation and analysis of the dry-storage systems. The next step is the application of TRACE in the dry-storage system of Kuosheng NPP (BWR/6). Kuosheng NPP is the second BWR NPP of Taiwan Power Company. In order to solve the storage of the spent fuels, Taiwan Power Company developed the new dry-storage system for Kuosheng NPP. In this step, the dry-storage system model of Kuosheng NPP was established by TRACE. Then, the steady state simulation of this model was performed and the results of TRACE were compared with the Kuosheng NPP data. Finally, this model was used to perform the safety analysis of Kuosheng NPP dry-storage system. Besides, FRAPTRAN was used tocalculate the transient performance of fuel rods.

Keywords: BWR, TRACE, FRAPTRAN, dry-storage

Procedia PDF Downloads 519
463 Face Tracking and Recognition Using Deep Learning Approach

Authors: Degale Desta, Cheng Jian

Abstract:

The most important factor in identifying a person is their face. Even identical twins have their own distinct faces. As a result, identification and face recognition are needed to tell one person from another. A face recognition system is a verification tool used to establish a person's identity using biometrics. Nowadays, face recognition is a common technique used in a variety of applications, including home security systems, criminal identification, and phone unlock systems. This system is more secure because it only requires a facial image instead of other dependencies like a key or card. Face detection and face identification are the two phases that typically make up a human recognition system.The idea behind designing and creating a face recognition system using deep learning with Azure ML Python's OpenCV is explained in this paper. Face recognition is a task that can be accomplished using deep learning, and given the accuracy of this method, it appears to be a suitable approach. To show how accurate the suggested face recognition system is, experimental results are given in 98.46% accuracy using Fast-RCNN Performance of algorithms under different training conditions.

Keywords: deep learning, face recognition, identification, fast-RCNN

Procedia PDF Downloads 140
462 Nonlinear Analysis of Reinforced Concrete Arched Structures Considering Soil-Structure Interaction

Authors: Mohamed M. El Gendy, Ibrahim A. El Arabi, Rafeek W. Abdel-Missih, Omar A. Kandil

Abstract:

Nonlinear analysis is one of the most important design and safety tools in structural engineering. Based on the finite-element method, a geometrical and material nonlinear analysis of large span reinforced concrete arches is carried out considering soil-structure interaction. The concrete section details and reinforcement distribution are taken into account. The behavior of soil is considered via Winkler's and continuum models. A computer program (NARC II) is specially developed in order to follow the structural behavior of large span reinforced concrete arches up to failure. The results obtained by the proposed model are compared with available literature for verification. This work confirmed that the geometrical and material nonlinearities, as well as soil structure interaction, have considerable influence on the structural response of reinforced concrete arches.

Keywords: nonlinear analysis, reinforced concrete arched structure, soil-structure interaction, geotechnical engineering

Procedia PDF Downloads 439
461 Fault Detection and Diagnosis of Broken Bar Problem in Induction Motors Base Wavelet Analysis and EMD Method: Case Study of Mobarakeh Steel Company in Iran

Authors: M. Ahmadi, M. Kafil, H. Ebrahimi

Abstract:

Nowadays, induction motors have a significant role in industries. Condition monitoring (CM) of this equipment has gained a remarkable importance during recent years due to huge production losses, substantial imposed costs and increases in vulnerability, risk, and uncertainty levels. Motor current signature analysis (MCSA) is one of the most important techniques in CM. This method can be used for rotor broken bars detection. Signal processing methods such as Fast Fourier transformation (FFT), Wavelet transformation and Empirical Mode Decomposition (EMD) are used for analyzing MCSA output data. In this study, these signal processing methods are used for broken bar problem detection of Mobarakeh steel company induction motors. Based on wavelet transformation method, an index for fault detection, CF, is introduced which is the variation of maximum to the mean of wavelet transformation coefficients. We find that, in the broken bar condition, the amount of CF factor is greater than the healthy condition. Based on EMD method, the energy of intrinsic mode functions (IMF) is calculated and finds that when motor bars become broken the energy of IMFs increases.

Keywords: broken bar, condition monitoring, diagnostics, empirical mode decomposition, fourier transform, wavelet transform

Procedia PDF Downloads 150
460 Computational Modeling of Perpendicular to Grain Stress in a Non-Standard Glulam Beam

Authors: Wojciech Gilewski, Anna Al Sabouni-Zawadzka, Jan Pelczynski

Abstract:

This paper focuses on the analysis of tensile stresses perpendicular to the grain in simply supported beams with different geometry made of glued laminated timber. Two types of beams are considered: standard double-tapered beams described in Eurocode 5 and non-standard glulam beams with a flattened apex. The beams are analyzed using two methodology approaches: a code design verification method and a finite element method (FEM) in terms of the linear theory of elasticity with plane stress assumption. The performed analyses proved that both methodologies lead to consistent results in case of standard glulam beams and therefore, the FEM can be used in case of non-standard structures, which are not included in Eurocode 5. Moreover, the FE analysis of the glulam beam with a flattened apex showed that it can be treated as a structure with two apex zones.

Keywords: double-tapered beams, finite element analysis, glued laminated timber, perpendicular to grain stress

Procedia PDF Downloads 236
459 Experimental and Finite Element Analysis for Mechanics of Soil-Tool Interaction

Authors: A. Armin, R. Fotouhi, W. Szyszkowski

Abstract:

In this paper a 3-D finite element (FE) investigation of soil-blade interaction is described. The effects of blade’s shape and rake angle are examined both numerically and experimentally. The soil is considered as an elastic-plastic granular material with non-associated Drucker-Prager material model. Contact elements with different properties are used to mimic soil-blade sliding and soil-soil cutting phenomena. A separation criterion is presented and a procedure to evaluate the forces acting on the blade is given and discussed in detail. Experimental results were derived from tests using soil bin facility and instruments at the University of Saskatchewan. During motion of the blade, load cells collect data and send them to a computer. The measured forces using load cells had noisy signals which are needed to be filtered. The FE results are compared with experimental results for verification. This technique can be used in blade shape optimization and design of more complicated blade’s shape.

Keywords: finite element analysis, experimental results, blade force, soil-blade contact modeling

Procedia PDF Downloads 321
458 Application and Verification of Regression Model to Landslide Susceptibility Mapping

Authors: Masood Beheshtirad

Abstract:

Identification of regions having potential for landslide occurrence is one of the basic measures in natural resources management. Different landslide hazard mapping models are proposed based on the environmental condition and goals. In this research landslide hazard map using multiple regression model were provided and applicability of this model is investigated in Baghdasht watershed. Dependent variable is landslide inventory map and independent variables consist of information layers as Geology, slope, aspect, distance from river, distance from road, fault and land use. For doing this, existing landslides have been identified and an inventory map made. The landslide hazard map is based on the multiple regression provided. The level of similarity potential hazard classes and figures of this model were compared with the landslide inventory map in the SPSS environments. Results of research showed that there is a significant correlation between the potential hazard classes and figures with area of the landslides. The multiple regression model is suitable for application in the Baghdasht Watershed.

Keywords: landslide, mapping, multiple model, regression

Procedia PDF Downloads 326
457 A Study on the Functional Safety Analysis of Stage Control System Based on International Electronical Committee 61508-2

Authors: Youn-Sung Kim, Hye-Mi Kim, Sang-Hoon Seo, Jaden Cha

Abstract:

This International standard IEC 61508 sets out a generic approach for all safety lifecycle activities for systems comprised of electrical/electronic/programmable electronic (E/E/PE) elements that are used to perform safety functions. The control unit in stage control system is safety related facilities to control state and speed for stage system running, and it performs safety-critical function by stage control system. The controller unit is part of safety loops corresponding to the IEC 61508 and classified as logic part in the safety loop. In this paper, we analyze using FMEDA (Failure Mode Effect and Diagnostic Analysis) to verification for fault tolerance methods and functional safety of control unit. Moreover, we determined SIL (Safety Integrity Level) for control unit according to the safety requirements defined in IEC 61508-2 based on an analyzed functional safety.

Keywords: safety function, failure mode effect, IEC 61508-2, diagnostic analysis, stage control system

Procedia PDF Downloads 279
456 Elemental and Magnetic Properties of Bed Sediment of Siang River, a Major River of Brahmaputra Basin

Authors: Abhishek Dixit, Sandip S. Sathe, Chandan Mahanta

Abstract:

The Siang river originates in Angsi glacier in southern Tibet (there known as the Yarlung Tsangpo). After traveling through Indus-Tsangpo suture zone and deep gorges near Namcha Barwa peak, it takes a south-ward turn and enters India, where it is known as Siang river and becomes a major tributary of the Brahmaputra in Assam plains. In this study, we have analyzed the bed sediment of the Siang river at two locations (one at extreme upstream near the India-China border and one downstream before Siang Brahmaputra confluence). We have also sampled bed sediment at the remote location of Yammeng river, an eastern tributary of Siang. The magnetic hysteresis properties show the combination of paramagnetic and weak ferromagnetic behavior with a multidomain state. Moreover, curie temperature analysis shows titanomagnetite solid solution series, which is causing the weak ferromagnetic signature. Given that the magnetic mineral was in a multidomain state, the presence of Ti, Fe carrying heave mineral, may be inferred. The Chemical index of alteration shows less weathered sediment. However, the Yammeng river sample being close to source shows fresh grains subjected to physical weathering and least chemically alteration. Enriched Ca and K and depleted Na and Mg with respect to upper continental crust concentration also points toward the less intense chemical weathering along with the dominance of calcite weathering.

Keywords: bed sediment, magnetic properties, Siang, weathering

Procedia PDF Downloads 120
455 On-Line Impulse Buying and Cognitive Dissonance: The Moderating Role of the Positive Affective State

Authors: G. Mattia, A. Di Leo, L. Principato

Abstract:

The purchase impulsiveness is preceded by a lack of self-control: consequently, it is legitimate to believe that a consumer with a low level of self-control can result in a higher probability of cognitive dissonance. Moreover, the process of purchase is influenced by the pre-existing affective state in a considerable way. With reference to on-line purchases, digital behavior cannot be merely ascribed to the rational sphere, given the speed and ease of transactions and the hedonistic dimension of purchases. To our knowledge, this research is among the first cases of verification of the effect of moderation exerted by the positive affective state in the on-line impulse purchase of products with a high expressive value such as a smartphone on the occurrence of cognitive dissonance. To this aim, a moderation analysis was conducted on a sample of 212 impulsive millennials buyers. Three scales were adopted to measure the constructs of interest: IBTS for impulsivity, PANAS for the affective state, Sweeney for cognitive dissonance. The analysis revealed that positive affective state does not affect the onset of cognitive dissonance.

Keywords: cognitive dissonance, impulsive buying, online shopping, online consumer behavior

Procedia PDF Downloads 155
454 Adapting Inclusive Residential Models to Match Universal Accessibility and Fire Protection

Authors: Patricia Huedo, Maria José Ruá, Raquel Agost-Felip

Abstract:

Ensuring sustainable development of urban environments means guaranteeing adequate environmental conditions, being resilient and meeting conditions of safety and inclusion for all people, regardless of their condition. All existing buildings should meet basic safety conditions and be equipped with safe and accessible routes, along with visual, acoustic and tactile signals to protect their users or potential visitors, and regardless of whether they undergo rehabilitation or change of use processes. Moreover, from a social perspective, we consider the need to prioritize buildings occupied by the most vulnerable groups of people that currently do not have specific regulations tailored to their needs. Some residential models in operation are not only outside the scope of application of the regulations in force; they also lack a project or technical data that would allow knowing the fire behavior of the construction materials. However, the difficulty and cost involved in adapting the entire building stock to current regulations can never justify the lack of safety for people. Hence, this work develops a simplified model to assess compliance with the basic safety conditions in case of fire and its compatibility with the specific accessibility needs of each user. The purpose is to support the designer in decision making, as well as to contribute to the development of a basic fire safety certification tool to be applied in inclusive residential models. This work has developed a methodology to support designers in adapting Social Services Centers, usually intended to vulnerable people. It incorporates a checklist of 9 items and information from sources or standards that designers can use to justify compliance or propose solutions. For each item, the verification system is justified, and possible sources of consultation are provided, considering the possibility of lacking technical documentation of construction systems or building materials. The procedure is based on diagnosing the degree of compliance with fire conditions of residential models used by vulnerable groups, considering the special accessibility conditions required by each user group. Through visual inspection and site surveying, the verification model can serve as a support tool, significantly streamlining the diagnostic phase and reducing the number of tests to be requested by over 75%. This speeds up and simplifies the diagnostic phase. To illustrate the methodology, two different buildings in the Valencian Region (Spain) have been selected. One case study is a mental health facility for residential purposes, located in a rural area, on the outskirts of a small town; the other one, is a day care facility for individuals with intellectual disabilities, located in a medium-sized city. The comparison between the case studies allow to validate the model in distinct conditions. Verifying compliance with a basic security level can allow a quality seal and a public register of buildings adapted to fire regulations to be established, similarly to what is being done with other types of attributes such as energy performance.

Keywords: fire safety, inclusive housing, universal accessibility, vulnerable people

Procedia PDF Downloads 24
453 Suggestion of Reasonable Analysis Model for T-Girder Modular Bridge

Authors: Soonwon Kang, Jinwoong Choi, Sungnam Hong, Seung-Kyung Kye, Sun-Kyu Park

Abstract:

The modular bridge is to be constructed by assembling standardized precast segments. This bridge is classified as a slab type and T-girder type. The T-girder bridge has transverse joint. However, it did not perform the verification on the transverse joint, but the slab type was done on the analytic study on the joint. Therefore, it is necessary for precast modular T-girder bridge that has a transverse joint to propose an appropriated model. In this study, specimens and analysis models compared integrated type with segmented type. Results of the integrated and segmented specimens, each of the deflection was 98.40mm and 74.66mm when the maximum load was 269.71kN and 248.29kN, in case of the modeling the specimens, each of the deflection was 84.04mm, 69.39mm when the maximum load was 269.71kN, 248.29kN, therefore, the precast T-girder modular bridges form the analytic model proposed appropriate.

Keywords: precast, T-girder modular bridge, finite element analysis, joint

Procedia PDF Downloads 421
452 Using Autoencoder as Feature Extractor for Malware Detection

Authors: Umm-E-Hani, Faiza Babar, Hanif Durad

Abstract:

Malware-detecting approaches suffer many limitations, due to which all anti-malware solutions have failed to be reliable enough for detecting zero-day malware. Signature-based solutions depend upon the signatures that can be generated only when malware surfaces at least once in the cyber world. Another approach that works by detecting the anomalies caused in the environment can easily be defeated by diligently and intelligently written malware. Solutions that have been trained to observe the behavior for detecting malicious files have failed to cater to the malware capable of detecting the sandboxed or protected environment. Machine learning and deep learning-based approaches greatly suffer in training their models with either an imbalanced dataset or an inadequate number of samples. AI-based anti-malware solutions that have been trained with enough samples targeted a selected feature vector, thus ignoring the input of leftover features in the maliciousness of malware just to cope with the lack of underlying hardware processing power. Our research focuses on producing an anti-malware solution for detecting malicious PE files by circumventing the earlier-mentioned shortcomings. Our proposed framework, which is based on automated feature engineering through autoencoders, trains the model over a fairly large dataset. It focuses on the visual patterns of malware samples to automatically extract the meaningful part of the visual pattern. Our experiment has successfully produced a state-of-the-art accuracy of 99.54 % over test data.

Keywords: malware, auto encoders, automated feature engineering, classification

Procedia PDF Downloads 72
451 PUF-Based Lightweight Iot Secure Authentication Chip Design

Authors: Wenxuan Li, Lei Li, Jin Li, Yuanhang He

Abstract:

This paper designed a secure chip for IoT communication security integrated with the PUF-based firmware protection scheme. Then, the Xilinx Kintex-7 and STM-32 were used for the prototype verification. Firmware protection worked well on FPGA and embedded platforms. For the ASIC implementation of the PUF module, contact PUF is chosen. The post-processing method and its improvement are analyzed with emphasis. This paper proposed a more efficient post-processing method for contact PUF named SXOR, which has practical value for realizing lightweight security modules in IoT devices. The analysis was carried out under the hypothesis that the contact holes are independent and combine the existing data in the open literature. The post-processing effects of SXOR and XOR are basically the same under the condition that the proposed post-processing circuit occupies only 50.6% of the area of XOR. The average Hamming weight of the PUF output bit sequence obtained by the proposed post-processing method is 0.499735, and the average Hamming weight obtained by the XOR-based post-processing method is 0.499999.

Keywords: PUF, IoT, authentication, secure communication, encryption, XOR

Procedia PDF Downloads 142
450 Adherence of Trauma and Orthopaedics Surgery Operative Notes to the RCS Good Surgical Practice Guidelines in Ashford and St. Peter's Hospital

Authors: Maryam Risla Shahul Hameed, Tharsiga Yogarajah, Fritzy Mathew, Tayyaba Syed, Shalin Shaunak

Abstract:

Aim: Auditing the adherence of Trauma and Orthopaedics Operative notes to the RCS Good Surgical Practice Guidelines. Method: Clinical audit conducted on 150 operative notes over a period of 2 months April- May 2023, including emergency and elective surgeries performed in Ashford and St. Peter’s Hospital. The RCS Good Practice Surgical Guidelines for an ideal operative note were used to compare.Results: Date of the procedure and signature of the surgeon were mentioned in all the notes by default in the electronic template being used. Title of the operation performed and whether elective or emergency were mentioned by 92% and 45%, respectively. Name of theatre anaesthetist and operating surgeons were mentioned by 73% and 93% respectively. Time of surgery mentioned by 26%. Operative findings and operative diagnosis mentioned by 83% and 53% respectively. Incision and complications of surgery mentioned in 80% and 53%, respectively. Details of tissue added/ altered/ removed mentioned by 46%. Information on prosthesis or implant used is mentioned by 54%. Details of closure and anticipated blood loss mentioned in 91% and 45% respectively. Antibiotic prophylaxis was mentioned by 63%, out of which only 23% mentioned the name and duration of the antibiotic. VTE prophylaxis was mentioned by 84%, out of which only 23% and 29% mentioned the name and duration of the prophylaxis, respectively. Conclusion: There is more for improvement in the operative notes for better continuity of care between the operating surgeons and other doctors in the wards taking care of the patients post operatively. We recommend to follow a standardized guidelines by all the nationwide and a standard template to be followed by all.

Keywords: surgery, notes, RCS, guidelines

Procedia PDF Downloads 166
449 Simulation of Red Blood Cells in Complex Micro-Tubes

Authors: Ting Ye, Nhan Phan-Thien, Chwee Teck Lim, Lina Peng, Huixin Shi

Abstract:

In biofluid flow systems, often the flow problems of fluids of complex structures, such as the flow of red blood cells (RBCs) through complex capillary vessels, need to be considered. In this paper, we aim to apply a particle-based method, Smoothed Dissipative Particle Dynamics (SDPD), to simulate the motion and deformation of RBCs in complex micro-tubes. We first present the theoretical models, including SDPD model, RBC-fluid interaction model, RBC deformation model, RBC aggregation model, and boundary treatment model. After that, we show the verification and validation of these models, by comparing our numerical results with the theoretical, experimental and previously-published numerical results. Finally, we provide some simulation cases, such as the motion and deformation of RBCs in rectangular, cylinder, curved, bifurcated, and constricted micro-tubes, respectively.

Keywords: aggregation, deformation, red blood cell, smoothed dissipative particle dynamics

Procedia PDF Downloads 174
448 Development and Validation of Research Process for Enhancing Humanities Competence of Medical Students

Authors: S. J. Yune, K. H. Park

Abstract:

The purpose of this study was to examine the validity of the research process for enhancing the humanities competence of the medical students. The research process was developed to be operated as a core subject course of 3 semesters. Among them, the research process for enhancing humanities capacity consisted of humanities and societies (6 teams) and education-psychology (2teams). The subjects of this study were 88-second grade students and 22 professors who participated in the research process. Among them, 13 professors participated in the study of humanities and 37 students. In the validity test, the professors were more likely to have more validity in the research process than the students in all areas of logic (p = .001), influence (p = .037), process (p = .001). The validity of the professor was higher than that of the students. The professors highly evaluated the students' learning outcomes and showed the most frequency to the prize group. As a result of analyzing the agreement between the students and the professors through the Kappa coefficient, the agreement degree of communication and cooperation competence was moderate to .430. Problem-solving ability was .340, which showed a fair degree of agreement. However, other factors showed only a slight degree of agreement of less than .20.

Keywords: research process, medical school, humanities competence, validity verification

Procedia PDF Downloads 195
447 Failure Analysis of a Medium Duty Vehicle Leaf Spring

Authors: Gül Çevik

Abstract:

This paper summarizes the work conducted to assess the root cause of the failure of a medium commercial vehicle leaf spring failed in service. Macro- and micro-fractographic analyses by scanning electron microscope as well as material verification tests were conducted in order to understand the failure mechanisms and root cause of the failure. Findings from the fractographic analyses indicated that failure mechanism is fatigue. Crack initiation was identified to have occurred from a point on the top surface near to the front face and to the left side. Two other crack initiation points were also observed, however, these cracks did not propagate. The propagation mode of the fatigue crack revealed that the cyclic loads resulting in crack initiation and propagation were unidirectional bending. Fractographic analyses have also showed that the root cause of the fatigue crack initiation and propagation was loading the part above design stress. Material properties of the part were also verified by chemical composition analysis, microstructural analysis by optical microscopy and hardness tests.

Keywords: leaf spring, failure analysis, fatigue, fractography

Procedia PDF Downloads 134
446 Clutter Suppression Based on Singular Value Decomposition and Fast Wavelet Algorithm

Authors: Ruomeng Xiao, Zhulin Zong, Longfa Yang

Abstract:

Aiming at the problem that the target signal is difficult to detect under the strong ground clutter environment, this paper proposes a clutter suppression algorithm based on the combination of singular value decomposition and the Mallat fast wavelet algorithm. The method first carries out singular value decomposition on the radar echo data matrix, realizes the initial separation of target and clutter through the threshold processing of singular value, and then carries out wavelet decomposition on the echo data to find out the target location, and adopts the discard method to select the appropriate decomposition layer to reconstruct the target signal, which ensures the minimum loss of target information while suppressing the clutter. After the verification of the measured data, the method has a significant effect on the target extraction under low SCR, and the target reconstruction can be realized without the prior position information of the target and the method also has a certain enhancement on the output SCR compared with the traditional single wavelet processing method.

Keywords: clutter suppression, singular value decomposition, wavelet transform, Mallat algorithm, low SCR

Procedia PDF Downloads 120
445 The Extension of Monomeric Computational Results to Polymeric Measurable Properties: An Introductory Computational Chemistry Experiment

Authors: Jing Zhao, Yongqing Bai, Qiaofang Shi, Huaihao Zhang

Abstract:

Advances in software technology enable computational chemistry to be commonly applied in various research fields, especially in pedagogy. Thus, in order to expand and improve experimental instructions of computational chemistry for undergraduates, we designed an introductory experiment—research on acrylamide molecular structure and physicochemical properties. Initially, students construct molecular models of acrylamide and polyacrylamide in Gaussian and Materials Studio software respectively. Then, the infrared spectral data, atomic charge and molecular orbitals of acrylamide as well as solvation effect of polyacrylamide are calculated to predict their physicochemical performance. At last, rheological experiments are used to validate these predictions. Through the combination of molecular simulation (performed on Gaussian, Materials Studio) with experimental verification (rheology experiment), learners have deeply comprehended the chemical nature of acrylamide and polyacrylamide, achieving good learning outcomes.

Keywords: upper-division undergraduate, computer-based learning, laboratory instruction, molecular modeling

Procedia PDF Downloads 133
444 Stability of Composite Struts Using the Modified Newmark Method

Authors: Seyed Amin Vakili, Sahar Sadat Vakili, Seyed Ehsan Vakili, Nader Abdoli Yazdi

Abstract:

The aim of this paper is to examine the behavior of elastic stability of reinforced and composite concrete struts with axial loads. The objective of this study is to verify the ability of the Modified Newmark Method to include geometric non-linearity in addition to non-linearity due to cracking, and also to show the advantage of the established method to reconsider an ignored minor parameter in mathematical modeling, such as the effect of the cracking by extra geometric bending moment Ny on cross-section properties. The purpose of this investigation is not to present some new results for the instability of reinforced or composite concrete columns. Therefore, no kinds of non-linearity involved in the problem are considered here. Only as mentioned, it is a part of the verification of the new established method to solve two kinds of non-linearity P- δ effect and cracking together simultaneously. However, the Modified Newmark Method can be used to solve non-linearity of materials and time-dependent behavior of concrete. However, since it is out of the scope of this article, it is not considered.

Keywords: stability, buckling, modified newmark method, reinforced

Procedia PDF Downloads 336
443 Bile Salt Induced Microstructural Changes of Gemini Surfactant Micelles

Authors: Vijaykumar Patel, P. Bahadur

Abstract:

Microstructural evolution of a cationic gemini surfactant 12-4-12 micelles in the presence of bile salts has been investigated using different techniques. A negative value of interaction parameter evaluated from surface tension measurements is a signature of strong synergistic interaction between oppositely charged surfactants. Both the bile salts compete with each other in inducing the micellar transition of 12-4-12 micelles depending on their hydrophobicity. Viscosity measurements disclose that loading of bile salts induces morphological changes in 12-4-12 micelles; sodium deoxycholate is more efficient in altering the aggregation behaviour of 12-4-12 micelles compared to sodium cholate and presents pronounced increase in viscosity and micellar growth which is suppressed at elevated temperatures. A remarkable growth of 12-4-12 micelles in the presence of sodium deoxycholate at low pH has been ascribed to the solubilization of bile acids formed in acidic medium. Small angle neutron scattering experiments provided size and shape of 12-4-12/bile salt mixed micelles are explicated on the basis of hydrophobicity of bile salts. The location of bile salts in micelle was determined from nuclear overhauser effect spectroscopy. The present study characterizes 12-4-12 gemini-bile salt mixed systems which significantly enriches our knowledge, and such a structural transition provides an opportunity to use these bioamphiphiles as delivery vehicles and in some pharmaceutical formulations.

Keywords: gemini surfactants, bile salts, SANS (small angle neutron scattering), NOESY (nuclear overhauser effect spectroscopy)

Procedia PDF Downloads 151
442 WebAppShield: An Approach Exploiting Machine Learning to Detect SQLi Attacks in an Application Layer in Run-time

Authors: Ahmed Abdulla Ashlam, Atta Badii, Frederic Stahl

Abstract:

In recent years, SQL injection attacks have been identified as being prevalent against web applications. They affect network security and user data, which leads to a considerable loss of money and data every year. This paper presents the use of classification algorithms in machine learning using a method to classify the login data filtering inputs into "SQLi" or "Non-SQLi,” thus increasing the reliability and accuracy of results in terms of deciding whether an operation is an attack or a valid operation. A method Web-App auto-generated twin data structure replication. Shielding against SQLi attacks (WebAppShield) that verifies all users and prevents attackers (SQLi attacks) from entering and or accessing the database, which the machine learning module predicts as "Non-SQLi" has been developed. A special login form has been developed with a special instance of data validation; this verification process secures the web application from its early stages. The system has been tested and validated, up to 99% of SQLi attacks have been prevented.

Keywords: SQL injection, attacks, web application, accuracy, database

Procedia PDF Downloads 153
441 Social Accountability: Persuasion and Debate to Contain Corruption

Authors: A. Lambert-Mogiliansky

Abstract:

In this paper, we investigate the properties of simple rules for reappointment aimed at holding a public official accountable and monitor his activity. The public official allocates budget resources to various activities which results in the delivery of public services to citizens. He has discretion over the use of resource so he can divert some of them for private ends. Because of a liability constraint, zero diversion can never be secured in all states. The optimal reappointment mechanism under complete information is shown to exhibit some leniency thus departing from the zero tolerance principle. Under asymmetric information (about the state), a rule with random verification in a pre-announced subset is shown to be optimal in a class of common rules. Surprisingly, those common rules make little use of hard information about service delivery when available. Similarly, PO's claim about his record is of no value to improve the performance of the examined rules. In contrast requesting that the PO defends his records publicly can be very useful if the service users are given the chance to refute false claims with cheap talk complaints: the first best complete information outcome can be approached in the absence of any observation by the manager of the accountability mechanism.

Keywords: accountability, corruption, persuasion, debate

Procedia PDF Downloads 382