Search results for: wireless network
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5155

Search results for: wireless network

1315 Theology of Science and Technology as a Tool for Peace Education

Authors: Jonas Chikelue Ogbuefi

Abstract:

Science and Technology have a major impact on societal peace, it offers support to teaching and learning, cuts costs, and offers solutions to the current agitations and militancy in Nigeria today. Christianity, for instance, did not only change and form the western world in the past 2022 but still has a substantial role to play in society through liquid ecclesiology. This paper interrogated the impact of the theology of Science and Technology as a tool for peace sustainability through peace education in Nigeria. The method adopted is a historical and descriptive method of analysis. It was discovered that a larger number of Nigerian citizens lack almost all the basic things needed for the standard of living, such as Shelter, meaningful employment, and clothing, which is the root course of all agitations in Nigeria. Based on the above findings, the paper contends that the government alone cannot restore Peace in Nigeria. Hence the inability of the government to restore peace calls for all religious actors to be involved. The main thrust and recommendation of this paper are to challenge the religious actors to implement the Theology of Science and Technology as a tool for peace restoration and should network with both the government and the private sectors to make funds available to budding and existing entrepreneurs using Science and Technology as a tool for Peace and economic sustainability. This paper viewed the theology of Science and Technology as a tool for Peace and economic sustainability in Nigeria.

Keywords: theology, science, technology, peace education

Procedia PDF Downloads 83
1314 A Pathway to Financial Inclusion: Mobile Money and Individual Savings in Uganda

Authors: Musa Mayanja Lwanga, Annet Adong

Abstract:

This study provides a micro perspective on the impact of mobile money services on individual’s saving behavior using the 2013 Uganda FinScope data. Results show that although saving through the mobile phone is not a common practice in Uganda, being a registered mobile money user increases the likelihood to save with mobile money. Saving using mobile is more prevalent in urban areas and in Kampala and Central region compared to other regions. This can be explained by: first, rural dwellers tend on average to have lower incomes and thus have lower to saving compared to the urban counterpart. Similarly, residents of Kampala tend to have higher incomes and thus high savings compared to residents of other regions. Secondly, poor infrastructure in rural areas in terms of lack of electricity and poor telecommunication network coverage may limit the use of mobile phones and consequently the use of mobile money as a saving mechanism. Overall, the use of mobile money as a saving mechanism is still very low and this could be partly explained by limitations in the legislation that does not incorporate mobile finance services into mobile money. The absence of interest payments on mobile money savings may act as a disincentive to save through this mechanism. Given the emerging mobile banking services, there is a need to create more awareness and the need for enhanced synergies between telecom companies and commercial banks.

Keywords: financial inclusion, mobile money, savings, Uganda

Procedia PDF Downloads 294
1313 Frequency Modulation Continuous Wave Radar Human Fall Detection Based on Time-Varying Range-Doppler Features

Authors: Xiang Yu, Chuntao Feng, Lu Yang, Meiyang Song, Wenhao Zhou

Abstract:

The existing two-dimensional micro-Doppler features extraction ignores the correlation information between the spatial and temporal dimension features. For the range-Doppler map, the time dimension is introduced, and a frequency modulation continuous wave (FMCW) radar human fall detection algorithm based on time-varying range-Doppler features is proposed. Firstly, the range-Doppler sequence maps are generated from the echo signals of the continuous motion of the human body collected by the radar. Then the three-dimensional data cube composed of multiple frames of range-Doppler maps is input into the three-dimensional Convolutional Neural Network (3D CNN). The spatial and temporal features of time-varying range-Doppler are extracted by the convolution layer and pool layer at the same time. Finally, the extracted spatial and temporal features are input into the fully connected layer for classification. The experimental results show that the proposed fall detection algorithm has a detection accuracy of 95.66%.

Keywords: FMCW radar, fall detection, 3D CNN, time-varying range-doppler features

Procedia PDF Downloads 119
1312 A Cross-Sectional Study on Smartphone Addiction, Sleep Hygiene, and Perceived Stress

Authors: Kriti Singh, Saurabh Tripathi, Pankaj Chaudhary, Abid Ali Ansari, Seema Nigam

Abstract:

Introduction: The introduction of android and iOS has changed our lives dramatically over the past few years. The new generation is more dependent on their mobile phones for carrying out their daily pursuits. Smartphones have revolutionized our lives. The cutdown in rates of mobile network services has been affecting us drastically. A new type of dependence is seen among the people for Smartphones. A cross-sectional study was conducted to determine the state of addiction among the group of medical students, along with its association with sleep hygiene and anxiety. Material and Method: Study included 50 individuals in the age group of 18-35 years. Smartphone Addiction Scale Short Version, Sleep Hygiene Index, and Perceived Stress Scales were used conducting the study. Results: Mean age of 22 years (12%). The majority of subjects were 20-year olds (15 out of 50), the majority were males with few females. Mean Smartphone addiction score 39 (very severe), Mean Sleep Hygiene Index score 26.76 (moderate maladaptive hygiene and Mean Perceived Stress score of 19.92 (moderate stress). Conclusion: In majority students were found to have a very severe Smartphone Addiction with moderate sleep hygiene and a moderate level of perceived stress. The Smartphone was being used was for surfing social media applications.

Keywords: addiction perceived stress, sleep hygiene index, smartphone

Procedia PDF Downloads 133
1311 Speed Breaker/Pothole Detection Using Hidden Markov Models: A Deep Learning Approach

Authors: Surajit Chakrabarty, Piyush Chauhan, Subhasis Panda, Sujoy Bhattacharya

Abstract:

A large proportion of roads in India are not well maintained as per the laid down public safety guidelines leading to loss of direction control and fatal accidents. We propose a technique to detect speed breakers and potholes using mobile sensor data captured from multiple vehicles and provide a profile of the road. This would, in turn, help in monitoring roads and revolutionize digital maps. Incorporating randomness in the model formulation for detection of speed breakers and potholes is crucial due to substantial heterogeneity observed in data obtained using a mobile application from multiple vehicles driven by different drivers. This is accomplished with Hidden Markov Models, whose hidden state sequence is found for each time step given the observables sequence, and are then fed as input to LSTM network with peephole connections. A precision score of 0.96 and 0.63 is obtained for classifying bumps and potholes, respectively, a significant improvement from the machine learning based models. Further visualization of bumps/potholes is done by converting time series to images using Markov Transition Fields where a significant demarcation among bump/potholes is observed.

Keywords: deep learning, hidden Markov model, pothole, speed breaker

Procedia PDF Downloads 143
1310 Groundwater Monitoring Using a Community: Science Approach

Authors: Shobha Kumari Yadav, Yubaraj Satyal, Ajaya Dixit

Abstract:

In addressing groundwater depletion, it is important to develop evidence base so to be used in assessing the state of its degradation. Groundwater data is limited compared to meteorological data, which impedes the groundwater use and management plan. Monitoring of groundwater levels provides information base to assess the condition of aquifers, their responses to water extraction, land-use change, and climatic variability. It is important to maintain a network of spatially distributed, long-term monitoring wells to support groundwater management plan. Monitoring involving local community is a cost effective approach that generates real time data to effectively manage groundwater use. This paper presents the relationship between rainfall and spring flow, which are the main source of freshwater for drinking, household consumptions and agriculture in hills of Nepal. The supply and withdrawal of water from springs depends upon local hydrology and the meteorological characteristics- such as rainfall, evapotranspiration and interflow. The study offers evidence of the use of scientific method and community based initiative for managing groundwater and springshed. The approach presents a method to replicate similar initiative in other parts of the country for maintaining integrity of springs.

Keywords: citizen science, groundwater, water resource management, Nepal

Procedia PDF Downloads 200
1309 Determination of Measurement Uncertainty of the Diagnostic Meteorological Model CALMET

Authors: Nina Miklavčič, Urška Kugovnik, Natalia Galkina, Primož Ribarič, Rudi Vončina

Abstract:

Today, the need for weather predictions is deeply rooted in the everyday life of people as well as it is in industry. The forecasts influence final decision-making processes in multiple areas, from agriculture and prevention of natural disasters to air traffic regulations and solutions on a national level for health, security, and economic problems. Namely, in Slovenia, alongside other existing forms of application, weather forecasts are adopted for the prognosis of electrical current transmission through powerlines. Meteorological parameters are one of the key factors which need to be considered in estimations of the reliable supply of electrical energy to consumers. And like for any other measured value, the knowledge about measurement uncertainty is also critical for the secure and reliable supply of energy. The estimation of measurement uncertainty grants us a more accurate interpretation of data, a better quality of the end results, and even a possibility of improvement of weather forecast models. In the article, we focused on the estimation of measurement uncertainty of the diagnostic microscale meteorological model CALMET. For the purposes of our research, we used a network of meteorological stations spread in the area of our interest, which enables a side-by-side comparison of measured meteorological values with the values calculated with the help of CALMET and the measurement uncertainty estimation as a final result.

Keywords: uncertancy, meteorological model, meteorological measurment, CALMET

Procedia PDF Downloads 79
1308 Interference Management in Long Term Evolution-Advanced System

Authors: Selma Sbit, Mohamed Bechir Dadi, Belgacem Chibani Rhaimi

Abstract:

Incorporating Home eNodeB (HeNB) in cellular networks, e.g. Long Term Evolution Advanced (LTE-A), is beneficial for extending coverage and enhancing capacity at low price especially within the non-line-of sight (NLOS) environments such as homes. HeNB or femtocell is a small low powered base station which provides radio coverage to the mobile users in an indoor environment. This deployment results in a heterogeneous network where the available spectrum becomes shared between two layers. Therefore, a problem of Inter Cell Interference (ICI) appears. This issue is the main challenge in LTE-A. To deal with this challenge, various techniques based on frequency, time and power control are proposed. This paper deals with the impact of carrier aggregation and higher order MIMO (Multiple Input Multiple Output) schemes on the LTE-Advanced performance. Simulation results show the advantages of these schemes on the system capacity (4.109 b/s/Hz when bandwidth B=100 MHz and when applying MIMO 8x8 for SINR=30 dB), maximum theoretical peak data rate (more than 4 Gbps for B=100 MHz and when MIMO 8x8 is used) and spectral efficiency (15 b/s/Hz and 30b/s/Hz when MIMO 4x4 and MIMO 8x8 are applying respectively for SINR=30 dB).

Keywords: capacity, carrier aggregation, LTE-Advanced, MIMO (Multiple Input Multiple Output), peak data rate, spectral efficiency

Procedia PDF Downloads 256
1307 Microfluidized Fiber Based Oleogels for Encapsulation of Lycopene

Authors: Behic Mert

Abstract:

This study reports a facile approach to structure soft solids from microfluidizer lycopene-rich plant based structure and oil. First carotenoid-rich plant material (pumpkin was used in this study) processed with high-pressure microfluidizer to release lycopene molecules, then an emulsion was formed by mixing processed plant material and oil. While, in emulsion state lipid soluble carotenoid molecules were allowed to dissolve in the oil phase, the fiber material of plant material provided the network which was required for emulsion stabilization. Additional hydrocolloids (gelatin, xhantan, and pectin) up to 0.5% were also used to reinforce the emulsion stability and their impact on final product properties were evaluated via rheological, textural and oxidation studies. Finally, water was removed from emulsion phase by drying in a tray dryer at 40°C for 36 hours, and subsequent shearing resulted in soft solid (ole gel) structures. The microstructure of these systems was revealed by cryo-scanning electron microscopy. Effect of hydrocolloids on total lycopene and surface lycopene contents were also evaluated. The surface lycopene was lowest in gelatin containing oleo gels and highest in pectin-containing oleo gels. This study outlines the novel emulsion-based structuring method that can be used to encapsulate lycopene without the need of separate extraction of them.

Keywords: lycopene, encapsulation, fiber, oleo gel

Procedia PDF Downloads 265
1306 Microseismicity of the Tehran Region Based on Three Seismic Networks

Authors: Jamileh Vasheghani Farahani

Abstract:

The main purpose of this research is to show the current active faults and active tectonic of the area by three seismic networks in Tehran region: 1-Tehran Disaster Mitigation and Management Organization (TDMMO), 2-Broadband Iranian National Seismic Network Center (BIN), 3-Iranian Seismological Center (IRSC). In this study, we analyzed microearthquakes happened in Tehran city and its surroundings using the Tehran networks from 1996 to 2015. We found some active faults and trends in the region. There is a 200-year history of historical earthquakes in Tehran. Historical and instrumental seismicity show that the east of Tehran is more active than the west. The Mosha fault in the North of Tehran is one of the active faults of the central Alborz. Moreover, other major faults in the region are Kahrizak, Eyvanakey, Parchin and North Tehran faults. An important seismicity region is an intersection of the Mosha and North Tehran fault systems (Kalan village in Lavasan). This region shows a cluster of microearthquakes. According to the historical and microseismic events analyzed in this research, there is a seismic gap in SE of Tehran. The empirical relationship is used to assess the Mmax based on the rupture length. There is a probability of occurrence of a strong motion of 7.0 to 7.5 magnitudes in the region (based on the assessed capability of the major faults such as Parchin and Eyvanekey faults and historical earthquakes).

Keywords: Iran, major faults, microseismicity, Tehran

Procedia PDF Downloads 365
1305 Blockchain-Resilient Framework for Cloud-Based Network Devices within the Architecture of Self-Driving Cars

Authors: Mirza Mujtaba Baig

Abstract:

Artificial Intelligence (AI) is evolving rapidly, and one of the areas in which this field has influenced is automation. The automobile, healthcare, education, and robotic industries deploy AI technologies constantly, and the automation of tasks is beneficial to allow time for knowledge-based tasks and also introduce convenience to everyday human endeavors. The paper reviews the challenges faced with the current implementations of autonomous self-driving cars by exploring the machine learning, robotics, and artificial intelligence techniques employed for the development of this innovation. The controversy surrounding the development and deployment of autonomous machines, e.g., vehicles, begs the need for the exploration of the configuration of the programming modules. This paper seeks to add to the body of knowledge of research assisting researchers in decreasing the inconsistencies in current programming modules. Blockchain is a technology of which applications are mostly found within the domains of financial, pharmaceutical, manufacturing, and artificial intelligence. The registering of events in a secured manner as well as applying external algorithms required for the data analytics are especially helpful for integrating, adapting, maintaining, and extending to new domains, especially predictive analytics applications.

Keywords: artificial intelligence, automation, big data, self-driving cars, machine learning, neural networking algorithm, blockchain, business intelligence

Procedia PDF Downloads 117
1304 Exploring Social Impact of Emerging Technologies from Futuristic Data

Authors: Heeyeul Kwon, Yongtae Park

Abstract:

Despite the highly touted benefits, emerging technologies have unleashed pervasive concerns regarding unintended and unforeseen social impacts. Thus, those wishing to create safe and socially acceptable products need to identify such side effects and mitigate them prior to the market proliferation. Various methodologies in the field of technology assessment (TA), namely Delphi, impact assessment, and scenario planning, have been widely incorporated in such a circumstance. However, literatures face a major limitation in terms of sole reliance on participatory workshop activities. They unfortunately missed out the availability of a massive untapped data source of futuristic information flooding through the Internet. This research thus seeks to gain insights into utilization of futuristic data, future-oriented documents from the Internet, as a supplementary method to generate social impact scenarios whilst capturing perspectives of experts from a wide variety of disciplines. To this end, network analysis is conducted based on the social keywords extracted from the futuristic documents by text mining, which is then used as a guide to produce a comprehensive set of detailed scenarios. Our proposed approach facilitates harmonized depictions of possible hazardous consequences of emerging technologies and thereby makes decision makers more aware of, and responsive to, broad qualitative uncertainties.

Keywords: emerging technologies, futuristic data, scenario, text mining

Procedia PDF Downloads 491
1303 Effect of Natural Molecular Crowding on the Structure and Stability of DNA Duplex

Authors: Chaudhari S. G., Saxena, S.

Abstract:

We systematically and quantitatively investigated the effect of glucose as a model of natural molecular crowding agent on the structure and thermodynamics of Watson-Crick base paired three duplexes (named as D1, D2 and D3) of different base compositions and lengths. Structural analyses demonstrated that duplexes (D1 and D2) folded into B-form with different cations in the absence and presence of glucose while duplex (D3) folded into mixed A and B-form. Moreover, we demonstrated that the duplex was more stable in the absence of glucose, and marginally destabilized in its presence because glucose act as a weak structure breaker on the tetrahedral network of water. In the absence of glucose, the values of ΔG°25 for duplex (D1) were -13.56, -13.76, -12.46, and -12.36 kcal/mol, for duplex (D2) were -13.64, -12.93, -12.86, and -12.30 kcal/mol, for duplex (D3) were -10.05, -11.76, -9.91, -9.70 kcal/mol in the presence of Na+, K+, Na+ + Mg++ and K+ + Mg++ respectively. At high concentration of glucose (1:10000), there was increase in ΔG°25 for duplex (D1) -12.47, -12.37, -11.96, -11.55 kcal/mol, for duplex (D2) -12.37, -11.47, -11.98, -11.01 kcal/mol and for duplex (D3) -8.47, -9.17, -9.16, -8.66 kcal/mol. Our results provide the information that structure and stability of DNA duplex depends on the structure of molecular crowding agent present in its close vicinity. In this study, I have taken the hydration of simple sugar as an essential model for understanding interactions between hydrophilic groups and interfacial water molecules and its effect on hydrogen bonded DNA duplexes. On the basis of these relatively simple building blocks I hope to gain some insights for understanding more generally the properties of sugar–water–salt systems with DNA duplexes.

Keywords: natural molecular crowding, DNA Duplex, structure of DNA, bioengineering and life sciences

Procedia PDF Downloads 465
1302 Mesoscopic Defects of Forming and Induced Properties on the Impact of a Composite Glass/Polyester

Authors: Bachir Kacimi, Fatiha Teklal, Arezki Djebbar

Abstract:

Forming processes induce residual deformations on the reinforcement and sometimes lead to mesoscopic defects, which are more recurrent than macroscopic defects during the manufacture of complex structural parts. This study deals with the influence of the fabric shear and buckles defects, which appear during draping processes of composite, on the impact behavior of a glass fiber reinforced polymer. To achieve this aim, we produced several specimens with different amplitude of deformations (shear) and defects on the fabric using a specific bench. The specimens were manufactured using the contact molding and tested with several impact energies. The results and measurements made on tested specimens were compared to those of the healthy material. The results showed that the buckle defects have a negative effect on elastic parameters and revealed a larger damage with significant out-of-plane mode relatively to the healthy composite material. This effect is the consequence of a local fiber impoverishment and a disorganization of the fibrous network, with a reorientation of the fibers following the out-of-plane buckling of the yarns, in the area where the defects are located. For the material with calibrated shear of the reinforcement, the increased local fiber rate due to the shear deformations and the contribution to stiffness of the transverse yarns led to an increase in mechanical properties.

Keywords: Defects, Forming, Impact, Induced properties, Textiles

Procedia PDF Downloads 138
1301 Polyacrylates in Poly (Lactic Acid) Matrix, New Biobased Polymer Material

Authors: Irena Vuković-Kwiatkowska, Halina Kaczmarek

Abstract:

Poly (lactic acid) is well known polymer, often called green material because of its origin (renewable resources) and biodegradability. This biopolymer can be used in the packaging industry very often. Poor resistance to permeation of gases is the disadvantage of poly (lactic acid). The permeability of gases and vapor through the films applied for packages and bottles generally should be very low to prolong products shelf-life. We propose innovation method of PLA gas barrier modification using electromagnetic radiation in ultraviolet range. Poly (lactic acid) (PLA) and multifunctional acrylate monomers were mixed in different composition. Final films were obtained by photochemical reaction (photocrosslinking). We tested permeability to water vapor and carbon dioxide through these films. Also their resistance to UV radiation was also studied. The samples were conditioned in the activated sludge and in the natural soil to test their biodegradability. An innovative method of PLA modification allows to expand its usage, and can reduce the future costs of waste management what is the result of consuming such materials like PET and HDPE. Implementation of our material for packaging will contribute to the protection of the environment from the harmful effects of extremely difficult to biodegrade materials made from PET or other plastic

Keywords: interpenetrating polymer network, packaging films, photocrosslinking, polyacrylates dipentaerythritol pentaacrylate DPEPA, poly (lactic acid), polymer biodegradation

Procedia PDF Downloads 477
1300 Integrated Waste-to-Energy Approach: An Overview

Authors: Tsietsi J. Pilusa, Tumisang G. Seodigeng

Abstract:

This study evaluates the benefits of advanced waste management practices in unlocking waste-to-energy opportunities within the solid waste industry. The key drivers of sustainable waste management practices, specifically with respect to packaging waste-to-energy technology options are discussed. The success of a waste-to-energy system depends significantly on the appropriateness of available technologies, including those that are well established as well as those that are less so. There are hard and soft interventions to be considered when packaging an integrated waste treatment solution. Technology compatibility with variation in feedstock (waste) quality and quantities remains a key factor. These factors influence the technology reliability in terms of production efficiencies and product consistency, which in turn, drives the supply and demand network. Waste treatment technologies rely on the waste material as feedstock; the feedstock varies in quality and quantities depending on several factors; hence, the technology fails, as a result. It is critical to design an advanced waste treatment technology in an integrated approach to minimize the possibility of technology failure due to unpredictable feedstock quality, quantities, conversion efficiencies, and inconsistent product yield or quality. An integrated waste-to-energy approach offers a secure system design that considers sustainable waste management practices.

Keywords: emerging markets, evaluation tool, interventions, waste treatment technologies

Procedia PDF Downloads 270
1299 Artificial Bee Colony Optimization for SNR Maximization through Relay Selection in Underlay Cognitive Radio Networks

Authors: Babar Sultan, Kiran Sultan, Waseem Khan, Ijaz Mansoor Qureshi

Abstract:

In this paper, a novel idea for the performance enhancement of secondary network is proposed for Underlay Cognitive Radio Networks (CRNs). In Underlay CRNs, primary users (PUs) impose strict interference constraints on the secondary users (SUs). The proposed scheme is based on Artificial Bee Colony (ABC) optimization for relay selection and power allocation to handle the highlighted primary challenge of Underlay CRNs. ABC is a simple, population-based optimization algorithm which attains global optimum solution by combining local search methods (Employed and Onlooker Bees) and global search methods (Scout Bees). The proposed two-phase relay selection and power allocation algorithm aims to maximize the signal-to-noise ratio (SNR) at the destination while operating in an underlying mode. The proposed algorithm has less computational complexity and its performance is verified through simulation results for a different number of potential relays, different interference threshold levels and different transmit power thresholds for the selected relays.

Keywords: artificial bee colony, underlay spectrum sharing, cognitive radio networks, amplify-and-forward

Procedia PDF Downloads 581
1298 Legal Regulation of Personal Information Data Transmission Risk Assessment: A Case Study of the EU’s DPIA

Authors: Cai Qianyi

Abstract:

In the midst of global digital revolution, the flow of data poses security threats that call China's existing legislative framework for protecting personal information into question. As a preliminary procedure for risk analysis and prevention, the risk assessment of personal data transmission lacks detailed guidelines for support. Existing provisions reveal unclear responsibilities for network operators and weakened rights for data subjects. Furthermore, the regulatory system's weak operability and a lack of industry self-regulation heighten data transmission hazards. This paper aims to compare the regulatory pathways for data information transmission risks between China and Europe from a legal framework and content perspective. It draws on the “Data Protection Impact Assessment Guidelines” to empower multiple stakeholders, including data processors, controllers, and subjects, while also defining obligations. In conclusion, this paper intends to solve China's digital security shortcomings by developing a more mature regulatory framework and industry self-regulation mechanisms, resulting in a win-win situation for personal data protection and the development of the digital economy.

Keywords: personal information data transmission, risk assessment, DPIA, internet service provider, personal information data transimission, risk assessment

Procedia PDF Downloads 58
1297 Metabolomics Profile Recognition for Cancer Diagnostics

Authors: Valentina L. Kouznetsova, Jonathan W. Wang, Igor F. Tsigelny

Abstract:

Metabolomics has become a rising field of research for various diseases, particularly cancer. Increases or decreases in metabolite concentrations in the human body are indicative of various cancers. Further elucidation of metabolic pathways and their significance in cancer research may greatly spur medicinal discovery. We analyzed the metabolomics profiles of lung cancer. Thirty-three metabolites were selected as significant. These metabolites are involved in 37 metabolic pathways delivered by MetaboAnalyst software. The top pathways are glyoxylate and dicarboxylate pathway (its hubs are formic acid and glyoxylic acid) along with Citrate cycle pathway followed by Taurine and hypotaurine pathway (the hubs in the latter are taurine and sulfoacetaldehyde) and Glycine, serine, and threonine pathway (the hubs are glycine and L-serine). We studied interactions of the metabolites with the proteins involved in cancer-related signaling networks, and developed an approach to metabolomics biomarker use in cancer diagnostics. Our analysis showed that a significant part of lung-cancer-related metabolites interacts with main cancer-related signaling pathways present in this network: PI3K–mTOR–AKT pathway, RAS–RAF–ERK1/2 pathway, and NFKB pathway. These results can be employed for use of metabolomics profiles in elucidation of the related cancer proteins signaling networks.

Keywords: cancer, metabolites, metabolic pathway, signaling pathway

Procedia PDF Downloads 399
1296 Old Community Spatial Integration: Discussion on the Mechanism of Aging Space System Replacement

Authors: Wan-I Chen, Tsung-I Pai

Abstract:

Future the society aging of population will create the social problem has not had the good mechanism solution in the Asian country, especially in Taiwan. In the future ten year the people in Taiwan must facing the condition which is localization aging social problem. In this situation, how to use the spatial in eco way to development space use to solve the old age spatial demand is the way which might develop in the future Taiwan society. Over the next 10 years, taking care of the aging people will become part of the social problem of aging phenomenon. The research concentrate in the feasibility of spatial substitution, secondary use of spatial might solve out of spatial problem for aging people. In order to prove the space usable, the research required to review the project with the support system and infill system for space experiment, by using network grid way. That defined community level of space elements location relationship, make new definitions of space and return to cooperation. Research to innovation in the the appraisal space causes the possibility, by spatial replacement way solution on spatial insufficient suitable condition. To evaluation community spatial by using the support system and infill system in order to see possibilities of use in replacement inner space and modular architecture into housing. The study is discovering the solution on the Eco way to develop space use to figure out the old age spatial demand.

Keywords: sustainable use, space conversion, integration, replacement


Procedia PDF Downloads 175
1295 Optimal Location of Unified Power Flow Controller (UPFC) for Transient Stability: Improvement Using Genetic Algorithm (GA)

Authors: Basheer Idrees Balarabe, Aminu Hamisu Kura, Nabila Shehu

Abstract:

As the power demand rapidly increases, the generation and transmission systems are affected because of inadequate resources, environmental restrictions and other losses. The role of transient stability control in maintaining the steady-state operation in the occurrence of large disturbance and fault is to describe the ability of the power system to survive serious contingency in time. The application of a Unified power flow controller (UPFC) plays a vital role in controlling the active and reactive power flows in a transmission line. In this research, a genetic algorithm (GA) method is applied to determine the optimal location of the UPFC device in a power system network for the enhancement of the power-system Transient Stability. Optimal location of UPFC has Significantly Improved the transient stability, the damping oscillation and reduced the peak over shoot. The GA optimization Technique proposed was iteratively searches the optimal location of UPFC and maintains the unusual bus voltages within the satisfy limits. The result indicated that transient stability is improved and achieved the faster steady state. Simulations were performed on the IEEE 14 Bus test systems using the MATLAB/Simulink platform.

Keywords: UPFC, transient stability, GA, IEEE, MATLAB and SIMULINK

Procedia PDF Downloads 11
1294 Design of Direct Power Controller for a High Power Neutral Point Clamped Converter Using Real-Time Simulator

Authors: Amin Zabihinejad, Philippe Viarouge

Abstract:

In this paper, a direct power control (DPC) strategies have been investigated in order to control a high power AC/DC converter with time variable load. This converter is composed of a three level three phase neutral point clamped (NPC) converter as rectifier and an H-bridge four quadrant current control converter. In the high power application, controller not only must adjust the desired outputs but also decrease the level of distortions which are injected to the network from the converter. Regarding this reason and nonlinearity of the power electronic converter, the conventional controllers cannot achieve appropriate responses. In this research, the precise mathematical analysis has been employed to design the appropriate controller in order to control the time variable load. A DPC controller has been proposed and simulated using Matlab/Simulink. In order to verify the simulation result, a real-time simulator- OPAL-RT- has been employed. In this paper, the dynamic response and stability of the high power NPC with variable load has been investigated and compared with conventional types using a real-time simulator. The results proved that the DPC controller is more stable and has more precise outputs in comparison with the conventional controller.

Keywords: direct power control, three level rectifier, real time simulator, high power application

Procedia PDF Downloads 515
1293 The Determinant Factors of Technology Adoption for Improving Firm’s Performance; Toward a Conceptual Model

Authors: Zainal Arifin, Avanti Fontana

Abstract:

Considering that TOE framework is the most useful instrument for studying technology adoption in firm context, this paper will analyze the influence of technological, organizational and environmental (TOE) factors to the Dynamic capabilities (DCs) associated with technology adoption strategy for improving the firm’s performance. Focusing on the determinant factors of technology adoption at the firm level, the study will contribute to the broader study of resource base view (RBV) and dynamic capability (DC). There is no study connecting directly the TOE factors to the DCs, this paper proposes technology adoption as a functional competence/capability which mediates a relationship between technology adoptions with firm’s performance. The study wants to show a conceptual model of the indirect effects of DCs at the firm level, which can be key predictors of firm performance in dynamic business environment. The results of this research is mostly relevant to top corporate executives (BOD) or top management team (TMT) who seek to provide some supporting ‘hardware’ content and condition such as technological factors, organizational factors, environmental factors, and to improve firm's ‘software ‘ ability such as adaptive capability, absorptive capability and innovative capability, in order to achieve a successful technology adoption in organization. There are also mediating factors which are elaborated at this paper; timing and external network. A further research for showing its empirical results is highly recommended.

Keywords: technology adoption, TOE framework, dynamic capability, resources based view

Procedia PDF Downloads 332
1292 Applicability of Fuzzy Logic for Intrusion Detection in Mobile Adhoc Networks

Authors: Ruchi Makani, B. V. R. Reddy

Abstract:

Mobile Adhoc Networks (MANETs) are gaining popularity due to their potential of providing low-cost mobile connectivity solutions to real-world communication problems. Integrating Intrusion Detection Systems (IDS) in MANETs is a tedious task by reason of its distinctive features such as dynamic topology, de-centralized authority and highly controlled/limited resource environment. IDS primarily use automated soft-computing techniques to monitor the inflow/outflow of traffic packets in a given network to detect intrusion. Use of machine learning techniques in IDS enables system to make decisions on intrusion while continuous keep learning about their dynamic environment. An appropriate IDS model is essential to be selected to expedite this application challenges. Thus, this paper focused on fuzzy-logic based machine learning IDS technique for MANETs and presented their applicability for achieving effectiveness in identifying the intrusions. Further, the selection of appropriate protocol attributes and fuzzy rules generation plays significant role for accuracy of the fuzzy-logic based IDS, have been discussed. This paper also presents the critical attributes of MANET’s routing protocol and its applicability in fuzzy logic based IDS.

Keywords: AODV, mobile adhoc networks, intrusion detection, anomaly detection, fuzzy logic, fuzzy membership function, fuzzy inference system

Procedia PDF Downloads 176
1291 Novel IPN Hydrogel Beads as pH Sensitive Drug Delivery System for an Anti-Ulcer Drug

Authors: Vishal Kumar Gupta

Abstract:

Purpose: This study has been undertaken to develop novel pH sensitive interpenetrating network hydrogel beads. Methods: The pH sensitive PAAM-g-Guar gum copolymer was synthesized by free radical polymerization followed by alkaline hydrolysis. Beads of guar gum-grafted-polyacrylamide and sodium Carboxy methyl cellulose (Na CMC) loaded with Pantoprazole sodium were prepared and evaluated for pH sensitivity, swelling properties, drug entrapment efficiency and in vitro drug release characteristics. Seven formulations were prepared for the drug with varying polymer and cross linker concentrations. Results: The grafting and alkaline hydrolysis reactions were confirmed by FT-IR spectroscopy. Differential scanning calorimetry was carried out to know the compatibility of encapsulated drug with the polymers. Scanning electron microscopic study revealed that the IPN beads were spherical. The entrapment efficiency was found to be in the range of 85-92%. Particle size analysis was carried out by optical microscopy. As the pH of the medium was changed from 1.2 to 7.4, a considerable increase in swelling was observed for all beads. Increase in the copolymer concentration showed sustained the drug release up to 12 hrs. Drug release from the beads followed super case II transport mechanism. Conclusion: It was concluded that guar gum-acrylamide beads, cross-linked with aluminum chloride offer an opportunity for controlled drug release of pantoprazole sodium.

Keywords: IPN, hydrogels, DSC, SEM

Procedia PDF Downloads 266
1290 Menopause Cultural Research: A Comparative Study of National and Diasporic Chinese Menopausal Women’s Perceptions and Lived Experience of Menopause

Authors: Yilin Wang, Ayumi Goto

Abstract:

Although most females will experience menopause due to social value habits of cultural factors, some Chinese women may lack the confidence to talk about the problems they are experiencing while going through menopause. Also, sometimes the inappropriateness of medical terminology leads to panic when women face the symptoms associated with menopause. On top of that, when women avoid discussing menopause as a topic, others are less likely to pay attention to the needs of menopausal women as their bodies change. This research will compare the experience of Chinese menopausal women and diasporic Chinese women's perceptions of menopause. A qualitative study will be conducted by collecting and analyzing experiences and perceptions to compare differences in women's perceptions of menopause, considering cultural and social factors. In addition, the study will gather information on the differences in the conceptualization of menopause between the Chinese and Canadian medical fields. Co-design sessions will be held to establish how to bring menopause to the attention of people other than women. Furthermore, a support network for menopause women will be created through these co-design sessions. It is hoped that this research will contribute to a proper understanding of menopause and provide support for Chinese women. This research is built upon feminist standpoint theory and inclusive design theory. The results of this study will be presented in this paper.

Keywords: menopause, feminist standpoint theory, Chinese national & diasporic women, inclusive design

Procedia PDF Downloads 107
1289 A Machine Learning Approach for Anomaly Detection in Environmental IoT-Driven Wastewater Purification Systems

Authors: Giovanni Cicceri, Roberta Maisano, Nathalie Morey, Salvatore Distefano

Abstract:

The main goal of this paper is to present a solution for a water purification system based on an Environmental Internet of Things (EIoT) platform to monitor and control water quality and machine learning (ML) models to support decision making and speed up the processes of purification of water. A real case study has been implemented by deploying an EIoT platform and a network of devices, called Gramb meters and belonging to the Gramb project, on wastewater purification systems located in Calabria, south of Italy. The data thus collected are used to control the wastewater quality, detect anomalies and predict the behaviour of the purification system. To this extent, three different statistical and machine learning models have been adopted and thus compared: Autoregressive Integrated Moving Average (ARIMA), Long Short Term Memory (LSTM) autoencoder, and Facebook Prophet (FP). The results demonstrated that the ML solution (LSTM) out-perform classical statistical approaches (ARIMA, FP), in terms of both accuracy, efficiency and effectiveness in monitoring and controlling the wastewater purification processes.

Keywords: environmental internet of things, EIoT, machine learning, anomaly detection, environment monitoring

Procedia PDF Downloads 148
1288 Analysis of Risks of Adopting Integrated Project Delivery: Application of Bayesian Theory

Authors: Shan Li, Qiuwen Ma

Abstract:

Integrated project delivery (IPD) is a project delivery method distinguished by a shared risk/rewards mechanism and multiparty agreement. IPD has drawn increasing attention from construction industry due to its reliability to deliver high-performing buildings. However, unavailable IPD specific insurance concerns the industry participants who are interested in IPD implementation. Even though the risk management capability can be enhanced using shared risk mechanism, some risks may occur when the partners do not commit themselves into the integrated practices in a desired manner. This is because the intense collaboration and close integration can not only create added value but bring new opportunistic behaviors and disputes. The study is aimed to investigate the risks of implementing IPD using Bayesian theory. IPD risk taxonomy is presented to identify all potential risks of implementing IPD and a risk network map is developed to capture the interdependencies between IPD risks. The conditional relations between risk occurrences and the impacts of IPD risks on project performances are evaluated and simulated based on Bayesian theory. The probability of project outcomes is predicted by simulation. In addition, it is found that some risks caused by integration are most possible occurred risks. This study can help the IPD project participants identify critical risks of adopting IPD to improve project performances. In addition, it is helpful to develop IPD specific insurance when the pertinent risks can be identified.

Keywords: Bayesian theory, integrated project delivery, project risks, project performances

Procedia PDF Downloads 298
1287 JaCoText: A Pretrained Model for Java Code-Text Generation

Authors: Jessica Lopez Espejel, Mahaman Sanoussi Yahaya Alassan, Walid Dahhane, El Hassane Ettifouri

Abstract:

Pretrained transformer-based models have shown high performance in natural language generation tasks. However, a new wave of interest has surged: automatic programming language code generation. This task consists of translating natural language instructions to a source code. Despite the fact that well-known pre-trained models on language generation have achieved good performance in learning programming languages, effort is still needed in automatic code generation. In this paper, we introduce JaCoText, a model based on Transformer neural network. It aims to generate java source code from natural language text. JaCoText leverages the advantages of both natural language and code generation models. More specifically, we study some findings from state of the art and use them to (1) initialize our model from powerful pre-trained models, (2) explore additional pretraining on our java dataset, (3) lead experiments combining the unimodal and bimodal data in training, and (4) scale the input and output length during the fine-tuning of the model. Conducted experiments on CONCODE dataset show that JaCoText achieves new state-of-the-art results.

Keywords: java code generation, natural language processing, sequence-to-sequence models, transformer neural networks

Procedia PDF Downloads 283
1286 Basics of SCADA Security: A Technical Approach

Authors: Michał Witas

Abstract:

This paper presents a technical approach to analysis of security of SCADA systems. Main goal of the paper is to make SCADA administrators aware of risks resulting from SCADA systems usage and to familiarize with methods that can be adopt to existing or planned system, to increase overall system security level. Because SCADA based systems become a industrial standard, more attention should be paid to the security of that systems. Industrial Control Systems (ICS) like SCADA are responsible for controlling crucial aspects of wide range of industrial processes. In pair with that responsibility, goes a lot of money that can be earned or lost – this fact is main reason of increased interest of attackers. Additionally ICS are often responsible for maintaining resources strategic from the point of view of national economy, like electricity (including nuclear power plants), heating, water resources or military facilities, so they can be targets of terrorist cybernetic attacks. Without proper risk analysis and management, vulnerabilities resulting from the usage of SCADA can be easily exploited by potential attacker. Paper is based mostly on own experience in systems security, gathered during academic studies and professional work in international company. As title suggests, it will cover only basics of topic, because every of points mentioned in the document can be base for additional research and papers.

Keywords: denial of service, SCADA, security policy, distributed network

Procedia PDF Downloads 370