Search results for: fluorescence techniques
3530 Migratory Trajectory of Transnational Street Beggars in South Western, Nigeria
Authors: Usman Adekunle Ojedokun, Adeyinka Abideen Aderinto
Abstract:
Migration remains an important course of action often resort-to by human and some other classes of animal for survival in the face of life-threatening conditions. However, the activity of certain group of immigrants, who are exploiting the socio-economic and environmental challenges in their home countries to conduct street begging across different countries in Africa, is fast becoming a major cause for concern. This paper examined the migratory trajectory of transnational street beggars in South Western, Nigeria. Strain and Migration Network Theories were adopted for the study. The methods of data collection were survey questionnaire, in-depth interview, and key informant interview. Convenience and purposive sampling techniques were employed for the selection of 395 transnational street beggars and 4 key informants were purposively chosen. Findings revealed that transnational street beggars immigrated into Nigeria all year round and all of them came by road. Also, while some of them entered the country officially, others gained entry illegally. The majority (29.3%) arrived through Sokoto, a border State to some neighbouring countries. This study calls for more security measures at the Nigerian borders as a way of controlling the influx of this category of beggars into the country.Keywords: transnational street beggars, street begging, migration, Nigeria
Procedia PDF Downloads 2673529 Influence of Atmospheric Pollutants on Child Respiratory Disease in Cartagena De Indias, Colombia
Authors: Jose A. Alvarez Aldegunde, Adrian Fernandez Sanchez, Matthew D. Menden, Bernardo Vila Rodriguez
Abstract:
Up to five statistical pre-processings have been carried out considering the pollutant records of the stations present in Cartagena de Indias, Colombia, also taking into account the childhood asthma incidence surveys conducted in hospitals in the city by the Health Ministry of Colombia for this study. These pre-processings have consisted of different techniques such as the determination of the quality of data collection, determination of the quality of the registration network, identification and debugging of errors in data collection, completion of missing data and purified data, as well as the improvement of the time scale of records. The characterization of the quality of the data has been conducted by means of density analysis of the pollutant registration stations using ArcGis Software and through mass balance techniques, making it possible to determine inconsistencies in the records relating the registration data between stations following the linear regression. The results obtained in this process have highlighted the positive quality in the pollutant registration process. Consequently, debugging of errors has allowed us to identify certain data as statistically non-significant in the incidence and series of contamination. This data, together with certain missing records in the series recorded by the measuring stations, have been completed by statistical imputation equations. Following the application of these prior processes, the basic series of incidence data for respiratory disease and pollutant records have allowed the characterization of the influence of pollutants on respiratory diseases such as, for example, childhood asthma. This characterization has been carried out using statistical correlation methods, including visual correlation, simple linear regression correlation and spectral analysis with PAST Software which identifies maximum periodicity cycles and minimums under the formula of the Lomb periodgram. In relation to part of the results obtained, up to eleven maximums and minimums considered contemporary between the incidence records and the particles have been identified taking into account the visual comparison. The spectral analyses that have been performed on the incidence and the PM2.5 have returned a series of similar maximum periods in both registers, which are at a maximum during a period of one year and another every 25 days (0.9 and 0.07 years). The bivariate analysis has managed to characterize the variable "Daily Vehicular Flow" in the ninth position of importance of a total of 55 variables. However, the statistical correlation has not obtained a favorable result, having obtained a low value of the R2 coefficient. The series of analyses conducted has demonstrated the importance of the influence of pollutants such as PM2.5 in the development of childhood asthma in Cartagena. The quantification of the influence of the variables has been able to determine that there is a 56% probability of dependence between PM2.5 and childhood respiratory asthma in Cartagena. Considering this justification, the study could be completed through the application of the BenMap Software, throwing a series of spatial results of interpolated values of the pollutant contamination records that exceeded the established legal limits (represented by homogeneous units up to the neighborhood level) and results of the impact on the exacerbation of pediatric asthma. As a final result, an economic estimate (in Colombian Pesos) of the monthly and individual savings derived from the percentage reduction of the influence of pollutants in relation to visits to the Hospital Emergency Room due to asthma exacerbation in pediatric patients has been granted.Keywords: Asthma Incidence, BenMap, PM2.5, Statistical Analysis
Procedia PDF Downloads 1183528 Influence of Drying Method in Parts of Alumina Obtained for Rapid Prototyping and Uniaxial Dry Pressing
Authors: N. O. Muniz, F. A. Vechietti, L. Treccani, K. Rezwan, Luis Alberto dos Santos
Abstract:
Developing new technologies in the manufacture of biomaterials is a major challenge for researchers in the tissue engineering area. Many in vitro and in vivo studies have revealed the significance of the porous structure of the biomaterials on the promotion of bone ingrowth. The use of Rapid Prototyping in the manufacture of ceramics in the biomedical area has increased in recent years and few studies are conducted on obtaining alumina pieces. The aim of this work was the study of alumina pieces obtained by 3D printing and uniaxial dry pressing (DP) in order to evaluate porosity achieved by this two different techniques. Also, the influence of the powder drying process was determined. The row alumina powders were drying by freeze drying and oven. Apparent porosity, apparent density, retraction after thermal treatment were evaluated. The porosity values obtained by DP, regardless of method of drying powders, were much lower than those obtained by RP as expected. And for the prototyped samples, the method of powder drying significantly influenced porosities, reached 48% for drying oven versus 65% for freeze-drying. Therefore, the method of 3D printing, using different powder drying, allows a better control over the porosity.Keywords: rapid prototyping, freeze-drying, porosity, alumina
Procedia PDF Downloads 4723527 The Effect of Interfacial Chemistry on Mechanical Properties of Epoxy Composites Containing Poly (Ether Ether Ketone) Grafted Multiwall Carbon Nanotubes
Authors: Prajakta Katti, Suryasarathi Bose, S. Kumar
Abstract:
In this work, carboxyl functionalized multiwall carbon nanotubes (a-MWNTs) covalently grafted with hydroxylated functionalized poly (ether ether ketone), HPEEK, which is miscible with the pre-polymer (epoxy) through the esterification reaction. The functionalized MWNTs were systematically characterized using spectroscopic techniques. The epoxy composites containing a-MWNTs and HPEEK grafted multiwall carbon nanotubes (HPEEK-g-MWNTs) were formulated using mechanical stirring coupled with a bath sonicator to improve the dispersion property of the nanoparticles and were subsequently cured at 80 ̊C and post cured at 180 ̊C. With the addition of 0.5 wt% of HPEEK-g-MWNTs, an impressive 44% enhancement in the storage modulus, 22% increase in tensile strength and 38% increase in fracture toughness was observed with respect to neat epoxy. In addition to these mechanical properties, the epoxy composites displayed significant enhancement in the hardness without reducing thermal stability. These improved properties were attributed to the tailored interface between HPEEK-MWNTs and epoxy matrix.Keywords: epoxy, MWNTs, HPEEK-g-MWNTs, tensile properties, nanoindentation, fracture toughness
Procedia PDF Downloads 3103526 Modeling Usage Patterns of Mobile App Service in App Market Using Hidden Markov Model
Authors: Yangrae Cho, Jinseok Kim, Yongtae Park
Abstract:
Mobile app service ecosystem has been abruptly emerged, explosively grown, and dynamically transformed. In contrast with product markets in which product sales directly cause increment in firm’s income, customer’s usage is less visible but more valuable in service market. Especially, the market situation with cutthroat competition in mobile app store makes securing and keeping of users as vital. Although a few service firms try to manage their apps’ usage patterns by fitting on S-curve or applying other forecasting techniques, the time series approaches based on past sequential data are subject to fundamental limitation in the market where customer’s attention is being moved unpredictably and dynamically. We therefore propose a new conceptual approach for detecting usage pattern of mobile app service with Hidden Markov Model (HMM) which is based on the dual stochastic structure and mainly used to clarify unpredictable and dynamic sequential patterns in voice recognition or stock forecasting. Our approach could be practically utilized for app service firms to manage their services’ lifecycles and academically expanded to other markets.Keywords: mobile app service, usage pattern, Hidden Markov Model, pattern detection
Procedia PDF Downloads 3393525 Performance of Coded Multi-Line Copper Wire for G.fast Communications in the Presence of Impulsive Noise
Authors: Israa Al-Neami, Ali J. Al-Askery, Martin Johnston, Charalampos Tsimenidis
Abstract:
In this paper, we focus on the design of a multi-line copper wire (MLCW) communication system. First, we construct our proposed MLCW channel and verify its characteristics based on the Kolmogorov-Smirnov test. In addition, we apply Middleton class A impulsive noise (IN) to the copper channel for further investigation. Second, the MIMO G.fast system is adopted utilizing the proposed MLCW channel model and is compared to a single line G-fast system. Second, the performance of the coded system is obtained utilizing concatenated interleaved Reed-Solomon (RS) code with four-dimensional trellis-coded modulation (4D TCM), and compared to the single line G-fast system. Simulations are obtained for high quadrature amplitude modulation (QAM) constellations that are commonly used with G-fast communications, the results demonstrate that the bit error rate (BER) performance of the coded MLCW system shows an improvement compared to the single line G-fast systems.Keywords: G.fast, Middleton Class A impulsive noise, mitigation techniques, Copper channel model
Procedia PDF Downloads 1333524 Framework for Implementation of National Electrical Safety Grounding Standards for Communication Infrastructure
Authors: Atif Mahmood, Mohammad Inayatullah Khan Babar
Abstract:
Communication infrastructure has been installed, operated, and maintained all over the world according to defined electrical safety standards for separate or joint structures. These safety standards have been set for the safeguard of public, utility workers (employees and contractors), utility facilities, electrical communication equipment’s connected to the utility facilities and other facilities or premise adjacent to utility facilities. Different communication utilities in Pakistan use standards of different countries due to the absence of Common National Electrical Safety Standards of Pakistan. It is really important to devise a framework for implementation of a uniform standard for strict compliance. In this context, it is important to explore the compliance of safety standards for communication conductors and equipment for separate or joint structures for which NESC standards are taken as reference. Specific reference to grounding techniques including grounding AC/DC systems and its frames, leaving Fences, Messenger wires and special circuits used for the protection for lightning etc, ungrounded so recommendations are also given after in-depth analysis of current technical practices for the installation and maintenance of communication infrastructure.Keywords: utility facilities, grounding electrodes, special circuits, grounding conductor
Procedia PDF Downloads 3523523 Sympathetic Cooling of Antiprotons with Molecular Anions
Authors: Sebastian Gerber, Julian Fesel, Christian Zimmer, Pauline Yzombard, Daniel Comparat, Michael Doser
Abstract:
Molecular anions play a central role in a wide range of fields: from atmospheric and interstellar science, anionic superhalogens to the chemistry of highly correlated systems. However, up to now the synthesis of negative ions in a controlled manner at ultracold temperatures, relevant for the processes in which they are involved, is currently limited to a few Kelvin by supersonic beam expansion followed by resistive, buffer gas or electron cooling in cryogenic environments. We present a realistic scheme for laser cooling of C2- molecules to sub-Kelvin temperatures, which has so far only been achieved for a few neutral diatomic molecules. The generation of a pulsed source of C2- and subsequent laser cooling techniques of C2- molecules confined in a Penning trap are reviewed. Further, laser cooling of one anionic species would allow to sympathetically cool other molecular anions, electrons and antiprotons that are confined in the same trapping potential. In this presentation the status of the experiment and the feasibility of C2- sympathetic Doppler laser cooling, photo-detachment cooling and AC-Stark Sisyphus cooling will be reviewed.Keywords: antiprotons, anions, cooling of ions and molecules, Doppler cooling, photo-detachment, penning trap, Sisyphus cooling, sympathetic cooling
Procedia PDF Downloads 3833522 3D Interferometric Imaging Using Compressive Hardware Technique
Authors: Mor Diama L. O., Matthieu Davy, Laurent Ferro-Famil
Abstract:
In this article, inverse synthetic aperture radar (ISAR) is combined with compressive imaging techniques in order to perform 3D interferometric imaging. Interferometric ISAR (InISAR) imaging relies on a two-dimensional antenna array providing diversities in the elevation and azimuth directions. However, the signals measured over several antennas must be acquired by coherent receivers resulting in costly and complex hardware. This paper proposes to use a chaotic cavity as a compressive device to encode the signals arising from several antennas into a single output port. These signals are then reconstructed by solving an inverse problem. Our approach is demonstrated experimentally with a 3-elements L-shape array connected to a metallic compressive enclosure. The interferometric phases estimated from a unique broadband signal are used to jointly estimate the target’s effective rotation rate and the height of the dominant scattering centers of our target. Our experimental results show that the use of the compressive device does not adversely affect the performance of our imaging process. This study opens new perspectives to reduce the hardware complexity of high-resolution ISAR systems.Keywords: interferometric imaging, inverse synthetic aperture radar, compressive device, computational imaging
Procedia PDF Downloads 1623521 Application of Costing System in the Small and Medium Sized Enterprises (SME) in Turkey
Authors: Hamide Özyürek, Metin Yılmaz
Abstract:
Standard processes, similar and limited production lines, the production of high direct costs will be more accurate than the use of parts of the traditional cost systems in the literature. However, direct costs, overhead expenses, in turn, decreases the burden of increasingly sophisticated production facilities, a situation that led the researchers to look for the cost of traditional systems of alternative techniques. Variety cost management approaches for example Total quality management (TQM), just-in-time (JIT), benchmarking, kaizen costing, targeting cost, life cycle costs (LLC), activity-based costing (ABC) value engineering have been introduced. Management and cost applications have changed over the past decade and will continue to change. Modern cost systems can provide relevant and accurate cost information. These methods provide the decisions about customer, product and process improvement. The aim of study is to describe and explain the adoption and application of costing systems in SME. This purpose reports on a survey conducted during 2014 small and medium sized enterprises (SME) in Ankara. The survey results were evaluated using SPSS package program.Keywords: modern costing systems, managerial accounting, cost accounting, costing
Procedia PDF Downloads 5673520 The Use of Hydrocolloid Dressing in the Management of Open Wounds in Big Cats
Authors: Catherine Portelli
Abstract:
Felines, such as Panthera tigris, Panthera leo and Puma concolor, have become common residents in animal parks and zoos. They often sustain injuries from other felines within the same, or adjacent enclosures and from playing with items of enrichment and structures of the enclosure itself. These open wounds, and their treatments, are often challenging in the veterinary practice, where feline-specific studies are lacking. This study is based on the author’s clinical experience gained while working at local animal parks in the past five years, and current evidence of hydrocolloid dressing applied to other species. Hydrocolloid dressing is used for secondary healing of chronic and acute wounds, where there is a considerable amount of tissue loss. The patients included in this study were sedated using medetomidine and ketamine every three to four days, for wound treatment and bandage change. Comparative studies of different techniques of open wound management will improve the healing process of exotic felines in the future by decreasing the time of recovery and incidence of other complications. Such studies will also aid with treatment of injuries sustained in wild felines, such as trap and bite wounds, found in natural conservation areas and wild animal sanctuaries.Keywords: felines, hydrocolloid dressing, open wound, secondary healing
Procedia PDF Downloads 1023519 Development of a Forecast-Supported Approach for the Continuous Pre-Planning of Mandatory Transportation Capacity for the Design of Sustainable Transport Chains: A Literature Review
Authors: Georg Brunnthaller, Sandra Stein, Wilfried Sihn
Abstract:
Transportation service providers are facing increasing volatility concerning future transport demand. Short-term planning horizons and planning uncertainties lead to reduced capacity utilization and increasing empty mileage. To overcome these challenges, a model is proposed to continuously pre-plan future transportation capacity in order to redesign and adjust the intermodal fleet accordingly. It is expected that the model will enable logistics service providers to organize more economically and ecologically sustainable transport chains in a more flexible way. To further describe these planning aspects, this paper gives an overview on transportation planning problems in a structured way. The focus is on strategic and tactical planning levels, comprising relevant fleet-sizing, service-network-design and choice-of-carriers-problems. Models and their developed solution techniques are presented, and the literature review is concluded with an outlook to our future research directions.Keywords: freight transportation planning, multimodal, fleet-sizing, service network design, choice of transportation mode, review
Procedia PDF Downloads 3193518 Tutankhamen’s Shrines (Naoses): Scientific Identification of Wood Species and Technology
Authors: Medhat Abdallah, Ahmed Abdrabou
Abstract:
Tutankhamen tomb was discovered on November 1922 by Howard carter, the grave was relatively intact and crammed full of the most beautiful burial items and furniture, the black shrine-shaped boxes on sleds studied here founded in treasury chamber. This study aims to identify the wood species used in making those shrines, illustrate technology of manufacture. Optical Microscope (OM), 3D software and Imaging Processes including; Visible light, Raking light and Visible-induced infrared luminescence were effective in illustrating wooden joints and techniques of manufacture. The results revealed that cedar of Lebanon Cedrus libani and sycamore fig Ficus sycomorus had been used for making the shrines’ boards and sleds while tamarisk Tamarix sp., Turkey Oak Quercus cerris L., and Sidder (nabk) Zizyphus spina christi used for making dowels. The wooden joint of mortise and tenon was used to connect the body of the shrine to the sled, while wooden pegs used to connect roof and cornice to the shrine body.Keywords: Tutankhamen, wood species, optical microscope, Cedrus libani, Ficus sycomorus
Procedia PDF Downloads 2103517 The Use of Classifiers in Image Analysis of Oil Wells Profiling Process and the Automatic Identification of Events
Authors: Jaqueline Maria Ribeiro Vieira
Abstract:
Different strategies and tools are available at the oil and gas industry for detecting and analyzing tension and possible fractures in borehole walls. Most of these techniques are based on manual observation of the captured borehole images. While this strategy may be possible and convenient with small images and few data, it may become difficult and suitable to errors when big databases of images must be treated. While the patterns may differ among the image area, depending on many characteristics (drilling strategy, rock components, rock strength, etc.). Previously we developed and proposed a novel strategy capable of detecting patterns at borehole images that may point to regions that have tension and breakout characteristics, based on segmented images. In this work we propose the inclusion of data-mining classification strategies in order to create a knowledge database of the segmented curves. These classifiers allow that, after some time using and manually pointing parts of borehole images that correspond to tension regions and breakout areas, the system will indicate and suggest automatically new candidate regions, with higher accuracy. We suggest the use of different classifiers methods, in order to achieve different knowledge data set configurations.Keywords: image segmentation, oil well visualization, classifiers, data-mining, visual computer
Procedia PDF Downloads 3043516 Geovisualization of Human Mobility Patterns in Los Angeles Using Twitter Data
Authors: Linna Li
Abstract:
The capability to move around places is doubtless very important for individuals to maintain good health and social functions. People’s activities in space and time have long been a research topic in behavioral and socio-economic studies, particularly focusing on the highly dynamic urban environment. By analyzing groups of people who share similar activity patterns, many socio-economic and socio-demographic problems and their relationships with individual behavior preferences can be revealed. Los Angeles, known for its large population, ethnic diversity, cultural mixing, and entertainment industry, faces great transportation challenges such as traffic congestion, parking difficulties, and long commuting. Understanding people’s travel behavior and movement patterns in this metropolis sheds light on potential solutions to complex problems regarding urban mobility. This project visualizes people’s trajectories in Greater Los Angeles (L.A.) Area over a period of two months using Twitter data. A Python script was used to collect georeferenced tweets within the Greater L.A. Area including Ventura, San Bernardino, Riverside, Los Angeles, and Orange counties. Information associated with tweets includes text, time, location, and user ID. Information associated with users includes name, the number of followers, etc. Both aggregated and individual activity patterns are demonstrated using various geovisualization techniques. Locations of individual Twitter users were aggregated to create a surface of activity hot spots at different time instants using kernel density estimation, which shows the dynamic flow of people’s movement throughout the metropolis in a twenty-four-hour cycle. In the 3D geovisualization interface, the z-axis indicates time that covers 24 hours, and the x-y plane shows the geographic space of the city. Any two points on the z axis can be selected for displaying activity density surface within a particular time period. In addition, daily trajectories of Twitter users were created using space-time paths that show the continuous movement of individuals throughout the day. When a personal trajectory is overlaid on top of ancillary layers including land use and road networks in 3D visualization, the vivid representation of a realistic view of the urban environment boosts situational awareness of the map reader. A comparison of the same individual’s paths on different days shows some regular patterns on weekdays for some Twitter users, but for some other users, their daily trajectories are more irregular and sporadic. This research makes contributions in two major areas: geovisualization of spatial footprints to understand travel behavior using the big data approach and dynamic representation of activity space in the Greater Los Angeles Area. Unlike traditional travel surveys, social media (e.g., Twitter) provides an inexpensive way of data collection on spatio-temporal footprints. The visualization techniques used in this project are also valuable for analyzing other spatio-temporal data in the exploratory stage, thus leading to informed decisions about generating and testing hypotheses for further investigation. The next step of this research is to separate users into different groups based on gender/ethnic origin and compare their daily trajectory patterns.Keywords: geovisualization, human mobility pattern, Los Angeles, social media
Procedia PDF Downloads 1213515 Establishment of Aquaculture Cooperative for Sustainable Local People Economic Welfare in Jatiluhur, West Java, Indonesia
Authors: Aisyah Nurfitria, Alifa Rahmadia Putri, Andini Lestari, Kartika Sukmatullahi Hasanah, Mutiara Mayang Oktavia
Abstract:
The research aims to describe and analyze the background and condition of Jatiluhur Dam, West Java, Indonesia. The Jatiluhur Dam as known as the biggest dam in West Java has huge fisheries resource, which is supposed to assure the local people appropriateness of living. Unfortunately based on this field research, the local people are living a life in under poverty line. This study focuses on increasing local people economic welfare through “Aquaculture Cooperative” implementation. Empower and diversify income of local people is the purpose of this study. In the same way, this study also focuses on the sustainable local people’s livelihoods. In order to obtain the sustainability of them, recovering the fisheries of Jatiluhur Dam is the part of “Aquaculture Cooperative” program. Method that is used in this research is a qualitative approach by literature review and in-depth interview through direct observation as data collecting techniques. Factors such as social and economic condition are also considered in order to know how “Aquaculture Cooperative” able to accepted by local people.Keywords: aquaculture cooperative, economic welfare, Jatiluhur fisheries, West Java
Procedia PDF Downloads 4513514 Mitochondrial Energy Utilization is Unchanged with Age in the Trophocytes and Oenocytes of Queen Honeybees (Apis mellifera)
Authors: Chia-Ying Yen, Chin-Yuan Hsu
Abstract:
The lifespans of queen honeybees (Apis mellifera) are much longer than those of worker bees. The expression, concentration, and activity of mitochondrial energy-utilized molecules decreased with age in the trophocytes and oenocytes of worker bees, but they are unknown in queen bees. In this study, the expression, concentration, and activity of mitochondrial energy-utilized molecules were evaluated in the trophocytes and oenocytes of young and old queen bees by biochemical techniques. The results showed that mitochondrial density and mitochondrial membrane potential; nicotinamide adenine dinucleotide (NAD+), nicotinamide adenine dinucleotide reduced form (NADH), and adenosine triphosphate (ATP) levels; the NAD+/NADH ratio; and relative expression of NADH dehydrogenase 1 and ATP synthase normalized against mitochondrial density were not significantly different between young and old queen bees. These findings reveal that mitochondrial energy utilization maintains a young status in the trophocytes and oenocytes of old queen bees and that trophocytes and oenocytes have aging-delaying mechanisms and can be used to study cellular longevity.Keywords: aging, longevity, mitochondrial energy, queen bees
Procedia PDF Downloads 4863513 Hate Speech Detection Using Machine Learning: A Survey
Authors: Edemealem Desalegn Kingawa, Kafte Tasew Timkete, Mekashaw Girmaw Abebe, Terefe Feyisa, Abiyot Bitew Mihretie, Senait Teklemarkos Haile
Abstract:
Currently, hate speech is a growing challenge for society, individuals, policymakers, and researchers, as social media platforms make it easy to anonymously create and grow online friends and followers and provide an online forum for debate about specific issues of community life, culture, politics, and others. Despite this, research on identifying and detecting hate speech is not satisfactory performance, and this is why future research on this issue is constantly called for. This paper provides a systematic review of the literature in this field, with a focus on approaches like word embedding techniques, machine learning, deep learning technologies, hate speech terminology, and other state-of-the-art technologies with challenges. In this paper, we have made a systematic review of the last six years of literature from Research Gate and Google Scholar. Furthermore, limitations, along with algorithm selection and use challenges, data collection, and cleaning challenges, and future research directions, are discussed in detail.Keywords: Amharic hate speech, deep learning approach, hate speech detection review, Afaan Oromo hate speech detection
Procedia PDF Downloads 1823512 Product Feature Modelling for Integrating Product Design and Assembly Process Planning
Authors: Baha Hasan, Jan Wikander
Abstract:
This paper describes a part of the integrating work between assembly design and assembly process planning domains (APP). The work is based, in its first stage, on modelling assembly features to support APP. A multi-layer architecture, based on feature-based modelling, is proposed to establish a dynamic and adaptable link between product design using CAD tools and APP. The proposed approach is based on deriving “specific function” features from the “generic” assembly and form features extracted from the CAD tools. A hierarchal structure from “generic” to “specific” and from “high level geometrical entities” to “low level geometrical entities” is proposed in order to integrate geometrical and assembly data extracted from geometrical and assembly modelers to the required processes and resources in APP. The feature concept, feature-based modelling, and feature recognition techniques are reviewed.Keywords: assembly feature, assembly process planning, feature, feature-based modelling, form feature, ontology
Procedia PDF Downloads 3143511 Thick Data Analytics for Learning Cataract Severity: A Triplet Loss Siamese Neural Network Model
Authors: Jinan Fiaidhi, Sabah Mohammed
Abstract:
Diagnosing cataract severity is an important factor in deciding to undertake surgery. It is usually conducted by an ophthalmologist or through taking a variety of fundus photography that needs to be examined by the ophthalmologist. This paper carries out an investigation using a Siamese neural net that can be trained with small anchor samples to score cataract severity. The model used in this paper is based on a triplet loss function that takes the ophthalmologist best experience in rating positive and negative anchors to a specific cataract scaling system. This approach that takes the heuristics of the ophthalmologist is generally called the thick data approach, which is a kind of machine learning approach that learn from a few shots. Clinical Relevance: The lens of the eye is mostly made up of water and proteins. A cataract occurs when these proteins at the eye lens start to clump together and block lights causing impair vision. This research aims at employing thick data machine learning techniques to rate the severity of the cataract using Siamese neural network.Keywords: thick data analytics, siamese neural network, triplet-loss model, few shot learning
Procedia PDF Downloads 1143510 Multi-Criteria Decision Approach to Performance Measurement Techniques Data Envelopment Analysis: Case Study of Kerman City’s Parks
Authors: Ali A. Abdollahi
Abstract:
During the last several decades, scientists have consistently applied Multiple Criteria Decision-Making methods in making decisions about multi-faceted, complicated subjects. While making such decisions and in order to achieve more accurate evaluations, they have regularly used a variety of criteria instead of applying just one Optimum Evaluation Criterion. The method presented here utilizes both ‘quantity’ and ‘quality’ to assess the function of the Multiple-Criteria method. Applying Data envelopment analysis (DEA), weighted aggregated sum product assessment (WASPAS), Weighted Sum Approach (WSA), Analytic Network Process (ANP), and Charnes, Cooper, Rhodes (CCR) methods, we have analyzed thirteen parks in Kerman city. It further indicates that the functions of WASPAS and WSA are compatible with each other, but also that their deviation from DEA is extensive. Finally, the results for the CCR technique do not match the results of the DEA technique. Our study indicates that the ANP method, with the average rate of 1/51, ranks closest to the DEA method, which has an average rate of 1/49.Keywords: multiple criteria decision making, Data envelopment analysis (DEA), Charnes Cooper Rhodes (CCR), Weighted Sum Approach (WSA)
Procedia PDF Downloads 2233509 Simulation-Based Optimization Approach for an Electro-Plating Production Process Based on Theory of Constraints and Data Envelopment Analysis
Authors: Mayada Attia Ibrahim
Abstract:
Evaluating and developing the electroplating production process is a key challenge in this type of process. The process is influenced by several factors such as process parameters, process costs, and production environments. Analyzing and optimizing all these factors together requires extensive analytical techniques that are not available in real-case industrial entities. This paper presents a practice-based framework for the evaluation and optimization of some of the crucial factors that affect the costs and production times associated with this type of process, energy costs, material costs, and product flow times. The proposed approach uses Design of Experiments, Discrete-Event Simulation, and Theory of Constraints were respectively used to identify the most significant factors affecting the production process and simulate a real production line to recognize the effect of these factors and assign possible bottlenecks. Several scenarios are generated as corrective strategies for improving the production line. Following that, data envelopment analysis CCR input-oriented DEA model is used to evaluate and optimize the suggested scenarios.Keywords: electroplating process, simulation, design of experiment, performance optimization, theory of constraints, data envelopment analysis
Procedia PDF Downloads 1013508 Advancing in Cricket Analytics: Novel Approaches for Pitch and Ball Detection Employing OpenCV and YOLOV8
Authors: Pratham Madnur, Prathamkumar Shetty, Sneha Varur, Gouri Parashetti
Abstract:
In order to overcome conventional obstacles, this research paper investigates novel approaches for cricket pitch and ball detection that make use of cutting-edge technologies. The research integrates OpenCV for pitch inspection and modifies the YOLOv8 model for cricket ball detection in order to overcome the shortcomings of manual pitch assessment and traditional ball detection techniques. To ensure flexibility in a range of pitch environments, the pitch detection method leverages OpenCV’s color space transformation, contour extraction, and accurate color range defining features. Regarding ball detection, the YOLOv8 model emphasizes the preservation of minor object details to improve accuracy and is specifically trained to the unique properties of cricket balls. The methods are more reliable because of the careful preparation of the datasets, which include novel ball and pitch information. These cutting-edge methods not only improve cricket analytics but also set the stage for flexible methods in more general sports technology applications.Keywords: OpenCV, YOLOv8, cricket, custom dataset, computer vision, sports
Procedia PDF Downloads 873507 Reliability Analysis of Computer Centre at Yobe State University Using LRU Algorithm
Authors: V. V. Singh, Yusuf Ibrahim Gwanda, Rajesh Prasad
Abstract:
In this paper, we focus on the reliability and performance analysis of Computer Centre (CC) at Yobe State University, Damaturu, Nigeria. The CC consists of three servers: one database mail server, one redundant and one for sharing with the client computers in the CC (called as a local server). Observing the different possibilities of the functioning of the CC, the analysis has been done to evaluate the various popular measures of reliability such as availability, reliability, mean time to failure (MTTF), profit analysis due to the operation of the system. The system can ultimately fail due to the failure of router, redundant server before repairing the mail server and switch failure. The system can also partially fail when a local server fails. The failed devices have restored according to Least Recently Used (LRU) techniques. The system can also fail entirely due to a cooling failure of the server, electricity failure or some natural calamity like earthquake, fire tsunami, etc. All the failure rates are assumed to be constant and follow exponential time distribution, while the repair follows two types of distributions: i.e. general and Gumbel-Hougaard family copula distribution.Keywords: reliability, availability Gumbel-Hougaard family copula, MTTF, internet data centre
Procedia PDF Downloads 5333506 Hyperspectral Image Classification Using Tree Search Algorithm
Authors: Shreya Pare, Parvin Akhter
Abstract:
Remotely sensing image classification becomes a very challenging task owing to the high dimensionality of hyperspectral images. The pixel-wise classification methods fail to take the spatial structure information of an image. Therefore, to improve the performance of classification, spatial information can be integrated into the classification process. In this paper, the multilevel thresholding algorithm based on a modified fuzzy entropy function is used to perform the segmentation of hyperspectral images. The fuzzy parameters of the MFE function have been optimized by using a new meta-heuristic algorithm based on the Tree-Search algorithm. The segmented image is classified by a large distribution machine (LDM) classifier. Experimental results are shown on a hyperspectral image dataset. The experimental outputs indicate that the proposed technique (MFE-TSA-LDM) achieves much higher classification accuracy for hyperspectral images when compared to state-of-art classification techniques. The proposed algorithm provides accurate segmentation and classification maps, thus becoming more suitable for image classification with large spatial structures.Keywords: classification, hyperspectral images, large distribution margin, modified fuzzy entropy function, multilevel thresholding, tree search algorithm, hyperspectral image classification using tree search algorithm
Procedia PDF Downloads 1823505 An Intelligence-Led Methodologly for Detecting Dark Actors in Human Trafficking Networks
Authors: Andrew D. Henshaw, James M. Austin
Abstract:
Introduction: Human trafficking is an increasingly serious transnational criminal enterprise and social security issue. Despite ongoing efforts to mitigate the phenomenon and a significant expansion of security scrutiny over past decades, it is not receding. This is true for many nations in Southeast Asia, widely recognized as the global hub for trafficked persons, including men, women, and children. Clearly, human trafficking is difficult to address because there are numerous drivers, causes, and motivators for it to persist, such as non-military and non-traditional security challenges, i.e., climate change, global warming displacement, and natural disasters. These make displaced persons and refugees particularly vulnerable. The issue is so large conservative estimates put a dollar value at around $150 billion-plus per year (Niethammer, 2020) spanning sexual slavery and exploitation, forced labor, construction, mining and in conflict roles, and forced marriages of girls and women. Coupled with corruption throughout military, police, and civil authorities around the world, and the active hands of powerful transnational criminal organizations, it is likely that such figures are grossly underestimated as human trafficking is misreported, under-detected, and deliberately obfuscated to protect those profiting from it. For example, the 2022 UN report on human trafficking shows a 56% reduction in convictions in that year alone (UNODC, 2022). Our Approach: To better understand this, our research utilizes a bespoke methodology. Applying a JAM (Juxtaposition Assessment Matrix), which we previously developed to detect flows of dark money around the globe (Henshaw, A & Austin, J, 2021), we now focus on the human trafficking paradigm. Indeed, utilizing a JAM methodology has identified key indicators of human trafficking not previously explored in depth. Being a set of structured analytical techniques that provide panoramic interpretations of the subject matter, this iteration of the JAM further incorporates behavioral and driver indicators, including the employment of Open-Source Artificial Intelligence (OS-AI) across multiple collection points. The extracted behavioral data was then applied to identify non-traditional indicators as they contribute to human trafficking. Furthermore, as the JAM OS-AI analyses data from the inverted position, i.e., the viewpoint of the traffickers, it examines the behavioral and physical traits required to succeed. This transposed examination of the requirements of success delivers potential leverage points for exploitation in the fight against human trafficking in a new and novel way. Findings: Our approach identified new innovative datasets that have previously been overlooked or, at best, undervalued. For example, the JAM OS-AI approach identified critical 'dark agent' lynchpins within human trafficking that are difficult to detect and harder to connect to actors and agents within a network. Our preliminary data suggests this is in part due to the fact that ‘dark agents’ in extant research have been difficult to detect and potentially much harder to directly connect to the actors and organizations in human trafficking networks. Our research demonstrates that using new investigative techniques such as OS-AI-aided JAM introduces a powerful toolset to increase understanding of human trafficking and transnational crime and illuminate networks that, to date, avoid global law enforcement scrutiny.Keywords: human trafficking, open-source intelligence, transnational crime, human security, international human rights, intelligence analysis, JAM OS-AI, Dark Money
Procedia PDF Downloads 943504 Public Wi-Fi Security Threat Evil Twin Attack Detection Based on Signal Variant and Hop Count
Authors: Said Abdul Ahad Ahadi, Elyas Baray, Nitin Rakesh, Sudeep Varshney
Abstract:
Wi-Fi is a widely used internet source that is used to provide internet access in many areas such as Stores, Cafes, University campuses, Restaurants and so on. This technology brought more facilities in communication and networking. On the other hand, due to the transmission of data over the air, which makes the network vulnerable, so it becomes prone to various threats such as Evil Twin and etc. The Evil Twin is a kind of adversary which impersonates a legitimate access point (LAP) as it can happen by spoofing the name (SSID) and MAC address (BSSID) of a legitimate access point (LAP). And this attack can cause many threats such as MITM, Service Interruption, Access point service blocking. Various Evil Twin Attack Detection Techniques are proposed, but they require additional hardware, or they require protocol modification. In this paper, we proposed a new technique based on Access Point’s two fingerprints, Received Signal Strength Indicator (RSSI) and Hop Count, that is hard to copy by an adversary. And we implemented the technique in a system called “ETDetector,” which can detect and prevent the attack.Keywords: evil twin, LAP, SSID, Wi-Fi security, signal variation, ETAD, kali linux, scapy, python
Procedia PDF Downloads 1463503 The Effect of Artificial Intelligence on Accounting and Finance
Authors: Evrime Fawzy Ishak Gadelsayed
Abstract:
This paper presents resource intake accounting as an inventive manner to cope with control accounting, which concentrates on administrators as the crucial customers of the information and offers satisfactory statistics of conventional control accounting. This machine underscores that the association's asset motivates prices; as a consequence, in costing frameworks, the emphasis ought to be on assets and their usage. Resource consumption accounting consolidates two costing methodologies, action-based totally and the German cost accounting approach called GPK. This methodology, however, is a danger to managers when making the management accounting undertaking operational. The motive for this article is to clarify the concept of resource intake accounting, its elements and highlights and use of this approach in associations. Inside the first area, we present useful resource consumption accounting, the basis, reasons for its improvement, and the issues that are faced beyond costing frameworks. At that point, we deliver the requirements and presumptions of this approach; ultimately, we depict the execution of this approach in associations and its preferences over other costing techniques.Keywords: financial statement fraud, forensic accounting, fraud prevention and detection, auditing, audit expectation gap, corporate governance resource consumption accounting, management accounting, action based method, German cost accounting method
Procedia PDF Downloads 203502 The Dynamic of Decentralization of Education Policy in Post-Reform Indonesia: Local Perspectives
Authors: Mudiyati Rahmatunnisa
Abstract:
This study is about the implementation of decentralization of education policy in today’s Indonesia’s reform era. The policy has made education as one of the basic public services that must be performed by the local governments. After more than a decade of implementing the policy, what have been achieved? Has the implementation of educational affairs in the region been able to improve the quality of education services in the region? What obstacles or challenges faced by the region in the implementation of the educational affairs? How does region overcome obstacles or challenges? In answering those strategic questions, this study will particularly investigate the implementation of educational affairs in the city and District of Cirebon, the two district level of governments in West Java Province. The two loci of study provide interesting insight, given the range of previous studies did not specifically investigate using a local perspective (city and district level). This study employs a qualitative research method through case studies. Operationally, this study is sustained by several data collection techniques, i.e. interviews, documentary method, and systematic observation. Needless to say, there have been many factors distorting the ideal construction of decentralization of education policy.Keywords: decentralization, decentralization of education, policy implementation, public service
Procedia PDF Downloads 3803501 The Association between Self-Efficacy and Hypertension Self-Care Behavior among Patients with Hypertension
Authors: Fazel Zinat Motlagh, Reza Chaman, Rashid Ghafari, Zahra Behzad, Ahmad Ali Eslami
Abstract:
Background: Chronic disease management requires the individual to perform several self-care behaviors. Self-efficacy, a widely used psychosocial concept, is associated with the ability to manage chronic disease. In this study, we examine the association between self-efficacy and self-care behaviors related to hypertension. Methods: In this cross-sectional study, conducted in Kohgiluye Boyer Ahmad province, the south of Iran, a total of 1836 hypertension patients, were randomly selected and participated in the study. Self-care behavior was measured with using H-SCALE (Hypertension Self-Care Activity Level Effects). Logistic regression conducted to detect correlation between self-efficacy and adherence to hypertension self-care behaviors. Results: Less than half (40.8%) of the participants reported that they have good self-efficacy to manage hypertension. Good self-efficacy was significantly associated with improve in adherence to medication (95% CI: 1.68, 1.83), eating a low-salt diet (95% CI: 1.44–1.73), physical activity (95% CI: 1.39–1.55), quit smoking (95% CI: 0.38–0.47), and weight management techniques (95% CI: 0.66–0.82). Conclusion: Hypertension self-efficacy was associated with adherence to self-care behaviors among adult with hypertension. According to our finding hypertension is a manageable condition. Self-efficacy is important factor in adherence with self-care behaviors related with hypertension.Keywords: self-efficacy, hypertension, self-care, Iran
Procedia PDF Downloads 548