Search results for: early detection of violence
3371 Botnet Detection with ML Techniques by Using the BoT-IoT Dataset
Authors: Adnan Baig, Ishteeaq Naeem, Saad Mansoor
Abstract:
The Internet of Things (IoT) gadgets have advanced quickly in recent years, and their use is steadily rising daily. However, cyber-attackers can target these gadgets due to their distributed nature. Additionally, many IoT devices have significant security flaws in their implementation and design, making them vulnerable to security threats. Hence, these threats can cause important data security and privacy loss from a single attack on network devices or systems. Botnets are a significant security risk that can harm the IoT network; hence, sophisticated techniques are required to mitigate the risk. This work uses a machine learning-based method to identify IoT orchestrated by botnets. The proposed technique identifies the net attack by distinguishing between legitimate and malicious traffic. This article proposes a hyperparameter tuning model to improvise the method to improve the accuracy of existing processes. The results demonstrated an improved and more accurate indication of botnet-based cyber-attacks.Keywords: Internet of Things, Botnet, BoT-IoT dataset, ML techniques
Procedia PDF Downloads 213370 Automatic Diagnosis of Electrical Equipment Using Infrared Thermography
Authors: Y. Laib Dit Leksir, S. Bouhouche
Abstract:
Analysis and processing of data bases resulting from infrared thermal measurements made on the electrical installation requires the development of new tools in order to obtain correct and additional information to the visual inspections. Consequently, the methods based on the capture of infrared digital images show a great potential and are employed increasingly in various fields. Although, there is an enormous need for the development of effective techniques to analyse these data base in order to extract relevant information relating to the state of the equipments. Our goal consists in introducing recent techniques of modeling based on new methods, image and signal processing to develop mathematical models in this field. The aim of this work is to capture the anomalies existing in electrical equipments during an inspection of some machines using A40 Flir camera. After, we use binarisation techniques in order to select the region of interest and we make comparison between these methods of thermal images obtained to choose the best one.Keywords: infrared thermography, defect detection, troubleshooting, electrical equipment
Procedia PDF Downloads 4783369 Process Modified Geopolymer Concrete: A Sustainable Material for Green Construction Technology
Authors: Dibyendu Adak, Saroj Mandal
Abstract:
The fly ash based geopolymer concrete generally requires heat activation after casting, which has been considered as an important limitation for its practical application. Such limitation can be overcome by a modification in the process at the time of mixing of ingredients (fly and activator fluid) for geopolymer concrete so that curing can be made at ambient temperature. This process modified geopolymer concrete shows an appreciable improvement in structural performance compared to conventional heat cured geopolymer concrete and control cement concrete. The improved durability performance based on water absorption, sulphate test, and RCPT is also noted. The microstructural properties analyzed through Field Emission Scanning Electron Microscope (FESEM) with Energy Dispersive X-ray Spectroscopy (EDS) and X-ray Diffraction (XRD) techniques show the better interaction of fly ash and activator solution at early ages for the process modified geopolymer concrete. This accelerates the transformation of the amorphous phase of fly ash to the crystalline phase.Keywords: fly ash, geopolymer concrete, process modification, structural properties, durability, micro-structures
Procedia PDF Downloads 1663368 Risking Injury: Exploring the Relationship between Risk Propensity and Injuries among an Australian Rules Football Team
Authors: Sarah A. Harris, Fleur L. McIntyre, Paola T. Chivers, Benjamin G. Piggott, Fiona H. Farringdon
Abstract:
Australian Rules Football (ARF) is an invasion based, contact field sport with over one million participants. The contact nature of the game increases exposure to all injuries, including head trauma. Evidence suggests that both concussion and sub-concussive traumas such as head knocks may damage the brain, in particular the prefrontal cortex. The prefrontal cortex may not reach full maturity until a person is in their early twenties with males taking longer to mature than females. Repeated trauma to the pre-frontal cortex during maturation may lead to negative social, cognitive and emotional effects. It is also during this period that males exhibit high levels of risk taking behaviours. Risk propensity and the incidence of injury is an unexplored area of research. Little research has considered if the level of player’s (especially younger players) risk propensity in everyday life places them at an increased risk of injury. Hence the current study, investigated if a relationship exists between risk propensity and self-reported injuries including diagnosed concussion and head knocks, among male ARF players aged 18 to 31 years. Method: The study was conducted over 22 weeks with one West Australian Football League (WAFL) club during the 2015 competition. Pre-season risk propensity was measured using the 7-item self-report Risk Propensity Scale. Possible scores ranged from 9 to 63, with higher scores indicating higher risk propensity. Players reported their self-perceived injuries (concussion, head knocks, upper body and lower body injuries) fortnightly using the WAFL Injury Report Survey (WIRS). A unique ID code was used to ensure player anonymity, which also enabled linkage of survey responses and injury data tracking over the season. A General Linear Model (GLM) was used to analyse whether there was a relationship between risk propensity score and total number of injuries for each injury type. Results: Seventy one players (N=71) with an age range of 18.40 to 30.48 years and a mean age of 21.92 years (±2.96 years) participated in the study. Player’s mean risk propensity score was 32.73, SD ±8.38. Four hundred and ninety five (495) injuries were reported. The most frequently reported injury was head knocks representing 39.19% of total reported injuries. The GLM identified a significant relationship between risk propensity and head knocks (F=4.17, p=.046). No other injury types were significantly related to risk propensity. Discussion: A positive relationship between risk propensity and head trauma in contact sports (specifically WAFL) was discovered. Assessing player’s risk propensity therefore, may identify those more at risk of head injuries. Potentially leading to greater monitoring and education of these players throughout the season, regarding self-identification of head knocks and symptoms that may indicate trauma to the brain. This is important because many players involved in WAFL are in their late teens or early 20’s hence, may be at greater risk of negative outcomes if they experience repeated head trauma. Continued education and research into the risks associated with head injuries has the potential to improve player well-being.Keywords: football, head injuries, injury identification, risk
Procedia PDF Downloads 3363367 Biosensors for Parathion Based on Au-Pd Nanoparticles Modified Electrodes
Authors: Tian-Fang Kang, Chao-Nan Ge, Rui Li
Abstract:
An electrochemical biosensor for the determination of organophosphorus pesticides was developed based on electrochemical co-deposition of Au and Pd nanoparticles on glassy carbon electrode (GCE). Energy disperse spectroscopy (EDS) analysis was used for characterization of the surface structure. Scanning electron micrograph (SEM) demonstrates that the films are uniform and the nanoclusters are homogeneously distributed on the GCE surface. Acetylcholinesterase (AChE) was immobilized on the Au and Pd nanoparticle modified electrode (Au-Pd/GCE) by cross-linking with glutaraldehyde. The electrochemical behavior of thiocholine at the biosensor (AChE/Au-Pd/GCE) was studied. The biosensors exhibited substantial electrocatalytic effect on the oxidation of thiocholine. The peak current of linear scan voltammetry (LSV) of thiocholine at the biosensor is proportional to the concentration of acetylthiocholine chloride (ATCl) over the range of 2.5 × 10-6 to 2.5 × 10-4 M in 0.1 M phosphate buffer solution (pH 7.0). The percent inhibition of acetylcholinesterase was proportional to the logarithm of parathion concentration in the range of 4.0 × 10-9 to 1.0 × 10-6 M. The detection limit of parathion was 2.6 × 10-9 M. The proposed method exhibited high sensitivity and good reproducibility.Keywords: acetylcholinesterase, Au-Pd nanoparticles, electrochemical biosensors, parathion
Procedia PDF Downloads 4103366 Infodemic and Misinformation in the Era of Coronavirus: An Analysis of Selected Rhetoric from Africa
Authors: Kunle Oparinde
Abstract:
The Covid-19 pandemic has seen several rumors and conspiracy theories overtake the truth in many online platforms across several African countries. Just as the coronavirus has travelled widely, misinformation has equally spread. Thus, it is important to launch investigations into these conspiracy theories in order to detect them early and as a result, implore health practitioners and agencies to be more proactive in repelling misinformation while at the same time provide the general populace with purely undiluted information regarding the virus. Through social media posts on platforms such as Twitter, Facebook, and WhatsApp, as well as online platforms such as Google, this study intends to draw as many instances as possible of infodemic and misinformation by reviewing and analyzing these texts and the resulting implication if the misinformation continues to gain popularity. The study discovers the use of conspiracy theories, rumors, hyperbolism, and unverified claims as elements of infodemic used during the coronavirus pandemic. Importantly, the findings of the study will assist the public to be cautious and vigilant against false information that are being peddled as original.Keywords: infodemic, miscommunication, accuracy, social media, rumors, conspiracy
Procedia PDF Downloads 1953365 Collaborative Learning Aspect for Training Hip and Knee Joint Anatomy
Authors: Nasir Mustafa
Abstract:
One of the prerequisites required for an efficient diagnosis in a medical practice is to have a strong command of both functional and clinical anatomy. In this study, we introduce a new collaborative approach to the effective teaching of the knee and hip joints. In the present teaching model, anatomists, orthopedists and physical therapists present the anatomy of the hip and knee joints in small groups. Courses for the hip and knee joints were scheduled during the early stages of the medical curriculum. Students of nursing and physical therapy were grouped together to sensitize to the importance of a collaborative effort. The study results clearly demonstrate that nursing students and physical therapy students appreciated this teaching approach. The collaborative approach further proved to be a suitable method to teach both functional and clinical anatomy of the hip and knee joints. Aside from this training, a collaborative approach between medical students and physical therapy students was also successful for a healthcare organization.Keywords: hip and knee joint anatomy, collaborative, Anatomy teaching, Nursing students, Physiotherapy students
Procedia PDF Downloads 993364 Development of a One-Window Services Model for Accessing Cancer Immunotherapies
Authors: Rizwan Arshad, Alessio Panza, Nimra Inayat, Syeda Mariam Batool Kazmi, Shawana Azmat
Abstract:
The rapidly expanding use of immunotherapy for a wide range of cancers from late to early stages has, predictably, been accompanied by evidence of inequities in access to these highly effective but costly treatments. In this survey-based case study, we aimed to develop a One-window services model (OWSM) based on Anderson’s behavioral model to enhance competence in accessing cancer medications, particularly immunotherapies, through the analysis of 20 patient surveys conducted in the Armed forces bone marrow transplant center of the district, Rawalpindi from November to December 2022. The purposive sampling technique was used. Cronbach’s alpha coefficient was found to be 0.71. It was analyzed using SPSS version 26 with descriptive analysis, and results showed that the majority of the cancer patients were non-competent to access their prescribed cancer immunotherapy because of individual-level, socioeconomic, and organizational barriers.Keywords: cancer immunotherapy, one-window services model, accessibility, competence
Procedia PDF Downloads 823363 Use of Predictive Food Microbiology to Determine the Shelf-Life of Foods
Authors: Fatih Tarlak
Abstract:
Predictive microbiology can be considered as an important field in food microbiology in which it uses predictive models to describe the microbial growth in different food products. Predictive models estimate the growth of microorganisms quickly, efficiently, and in a cost-effective way as compared to traditional methods of enumeration, which are long-lasting, expensive, and time-consuming. The mathematical models used in predictive microbiology are mainly categorised as primary and secondary models. The primary models are the mathematical equations that define the growth data as a function of time under a constant environmental condition. The secondary models describe the effects of environmental factors, such as temperature, pH, and water activity (aw) on the parameters of the primary models, including the maximum specific growth rate and lag phase duration, which are the most critical growth kinetic parameters. The combination of primary and secondary models provides valuable information to set limits for the quantitative detection of the microbial spoilage and assess product shelf-life.Keywords: shelf-life, growth model, predictive microbiology, simulation
Procedia PDF Downloads 2203362 Face Tracking and Recognition Using Deep Learning Approach
Authors: Degale Desta, Cheng Jian
Abstract:
The most important factor in identifying a person is their face. Even identical twins have their own distinct faces. As a result, identification and face recognition are needed to tell one person from another. A face recognition system is a verification tool used to establish a person's identity using biometrics. Nowadays, face recognition is a common technique used in a variety of applications, including home security systems, criminal identification, and phone unlock systems. This system is more secure because it only requires a facial image instead of other dependencies like a key or card. Face detection and face identification are the two phases that typically make up a human recognition system.The idea behind designing and creating a face recognition system using deep learning with Azure ML Python's OpenCV is explained in this paper. Face recognition is a task that can be accomplished using deep learning, and given the accuracy of this method, it appears to be a suitable approach. To show how accurate the suggested face recognition system is, experimental results are given in 98.46% accuracy using Fast-RCNN Performance of algorithms under different training conditions.Keywords: deep learning, face recognition, identification, fast-RCNN
Procedia PDF Downloads 1443361 Mental Health Conditions and Their Risk Factors Among Women in Garissa County, Kenya
Authors: Njoroge Margaret W., Johnson Deborah
Abstract:
Gender-specific risk factors for common mental disorders that disproportionately affect women include but are not limited to gender-based violence, socioeconomic disadvantage, sociocultural factors and unrelenting responsibility for the care of others. The overall objective of this study was to assess mental health conditions and their risk factors among women in Garissa County, Kenya. The study adopted both quantitative and qualitative research designs. The study participants were 100 adult women and 20 key informants from different sectors in the region. Data was collected using DSM-5 (PCL-5) and Kessler Psychological Distress, interviews schedule and focus group discussions. Analysis of quantitative data was done using univariate analysis, while qualitative data was analyzed using thematic analysis. The results revealed that about 60% of women presented with moderate to severe psychological distress (PD), while 53% presented with PTSD. Additionally, women who have undergone female genital mutilation had higher PTSD and PD scores. They also presented with low self-esteem, depressive symptoms, sex anxiety, avoidance of reminders and intrusive memories of the event, especially those who developed fistula. The risk factors for poor mental health outcomes include lack of awareness/knowledge of mental health, retrogressive cultural practices (child marriage and female genital mutilation), as well as beliefs about the causes of mental disorders. The study also established that people with mental illness are neglected, abused and stigmatized. Preferred treatment approaches include prayers and the use of witch doctors and traditional healers. The study recommends gendered and culturally responsive interventions geared towards increasing community awareness and knowledge on mental health, reducing stigma and improving mental-health-seeking behaviors for women and girls in the region. Supported by the Ministry of Health, the approach should be spearheaded by trained community lay counselors.Keywords: women, mental health conditions, cultural beliefs/practices, stigma, poverty, psychological distress, PTSD
Procedia PDF Downloads 563360 Hardware Error Analysis and Severity Characterization in Linux-Based Server Systems
Authors: Nikolaos Georgoulopoulos, Alkis Hatzopoulos, Konstantinos Karamitsios, Konstantinos Kotrotsios, Alexandros I. Metsai
Abstract:
In modern server systems, business critical applications run in different types of infrastructure, such as cloud systems, physical machines and virtualization. Often, due to high load and over time, various hardware faults occur in servers that translate to errors, resulting to malfunction or even server breakdown. CPU, RAM and hard drive (HDD) are the hardware parts that concern server administrators the most regarding errors. In this work, selected RAM, HDD and CPU errors, that have been observed or can be simulated in kernel ring buffer log files from two groups of Linux servers, are investigated. Moreover, a severity characterization is given for each error type. Better understanding of such errors can lead to more efficient analysis of kernel logs that are usually exploited for fault diagnosis and prediction. In addition, this work summarizes ways of simulating hardware errors in RAM and HDD, in order to test the error detection and correction mechanisms of a Linux server.Keywords: hardware errors, Kernel logs, Linux servers, RAM, hard disk, CPU
Procedia PDF Downloads 1613359 Human Values and Morality of Adolescents Who Have Broken the Law: A Multi-Method Study in a Socioeducational Institutional Environment
Authors: Luiz Nolasco Jr. Rezende, Antonio Villar M. Sá, Claudia Marcia L. Pato
Abstract:
The increasing urban violence in Brazil involves more and more infractions committed by children and youths. The challenges faced by the institutional environments responsible for the education and resocialization of adolescents in conflict with the law are enormous, especially of those deprived of their liberty. These institutions have an inadequate educational structure. They are characterized by a dirty and unhealthy environment without the minimum basic conditions for their activities, by frequent practices of degradation, humiliation, and the physical and psychological punishment of inmates. This mixed-method study investigated the personal values of adolescents with restriction of freedom in a socio-educational institutional environment aiming to contribute to the development of their morality through an educational process. For that, we used a survey and transdisciplinary play workshops involving thirty-two boys aged between 15 and 19 years old and at least two years out of school. To evaluate the survey the reduced version of the Portrait Questionnaire—PQ21—was used. The workshops happened once a week, lasting 80 minutes each, totaling twelve meetings. By using the game of chess and its metaphors, participants produced texts and engaged in critical brainstorming about their lives. The survey results pointed out that these young people showed a predominance of values of openness to change and self-transcendence, dissatisfaction with one's own reality and surroundings, not considering the consequences of their actions on themselves and others, difficulties in speaking and writing, and desire for changes in their lives. After the pedagogical interventions, these adolescents demonstrated an understanding of the implications of their actions for themselves, for their families, especially for the mothers, with whom they demonstrated stronger bonds. It was possible to observe evidence of improvement in the capacity of linguistic expression, more autonomy and critical vision, including about themselves and their respective contexts. These results demonstrated the educational potential of lively, symbolic, dynamic and playful activities that favor the mediation and identification of these adolescents with their lives, and contribute to the projection of dreams.Keywords: adolescents arrested, human values, moral development, playful workshops
Procedia PDF Downloads 2693358 Data Quality Enhancement with String Length Distribution
Authors: Qi Xiu, Hiromu Hota, Yohsuke Ishii, Takuya Oda
Abstract:
Recently, collectable manufacturing data are rapidly increasing. On the other hand, mega recall is getting serious as a social problem. Under such circumstances, there are increasing needs for preventing mega recalls by defect analysis such as root cause analysis and abnormal detection utilizing manufacturing data. However, the time to classify strings in manufacturing data by traditional method is too long to meet requirement of quick defect analysis. Therefore, we present String Length Distribution Classification method (SLDC) to correctly classify strings in a short time. This method learns character features, especially string length distribution from Product ID, Machine ID in BOM and asset list. By applying the proposal to strings in actual manufacturing data, we verified that the classification time of strings can be reduced by 80%. As a result, it can be estimated that the requirement of quick defect analysis can be fulfilled.Keywords: string classification, data quality, feature selection, probability distribution, string length
Procedia PDF Downloads 3213357 Rapid Method for the Determination of Acid Dyes by Capillary Electrophoresis
Authors: Can Hu, Huixia Shi, Hongcheng Mei, Jun Zhu, Hongling Guo
Abstract:
Textile fibers are important trace evidence and frequently encountered in criminal investigations. A significant aspect of fiber evidence examination is the determination of fiber dyes. Although several instrumental methods have been developed for dyes detection, the analysis speed is not fast enough yet. A rapid dye analysis method is still needed to further improve the efficiency of case handling. Capillary electrophoresis has the advantages of high separation speed and high separation efficiency and is an ideal method for the rapid analysis of fiber dyes. In this paper, acid dyes used for protein fiber dyeing were determined by a developed short-end injection capillary electrophoresis technique. Five acid red dyes with similar structures were successfully baseline separated within 5 min. The separation reproducibility is fairly good for the relative standard deviation of retention time is 0.51%. The established method is rapid and accurate which has great potential to be applied in forensic setting.Keywords: acid dyes, capillary electrophoresis, fiber evidence, rapid determination
Procedia PDF Downloads 1533356 A Comparative Research on the Development Level of Left-Behind and Non-Left-Behind Children in Rural Areas of Henan Province
Authors: Yuying Zhu
Abstract:
Left-behind children in rural areas are vulnerable groups with the course of our country’s urbanization. Left-behind young children in rural area separate from their parents in their early childhood, vicegerent guardian’s care are less sensitive and careful than children’s parents; they give less concern to children’s verbal development, this makes the verbal problem of the left-behind children to be ubiquitous problem. This study chooses four kindergartens from the east the middle and the west of the Henan Province, explore the verbal development differences between the left-behind young children and the non-left-behind young rural children through the McCarthy Scales of Children's Abilities (MSCA) and self-made questionnaires. The study shows that there is no significant difference between the left-behind young children and the non-left-behind young rural children in the verbal development, though the marks in primary class and middle class the non-left-behind young rural children is higher, but, the top class in the kindergarten is not. What’s more, the emergent reading and the economy have significant influence on young children’s verbal ability.Keywords: left-behind children, non-left-behind children, regional difference, verbal development
Procedia PDF Downloads 2693355 Gender Justice and Empowerment: A Study of Chhara Bootlegger Women of Ahmedabad
Authors: Neeta Khurana, Ritu Sharma
Abstract:
This paper is an impact assessment study of the rehabilitation work done for Chhara women in the rural precincts of Ahmedabad. The Chharas constitute a denotified tribe and live in abject poverty. The women of this community are infamous absconders of law and active bootleggers of locally made liquor. As part of a psychological study with a local NGO, the authors headed a training program aimed at rehabilitating and providing these women alternate modes of employment, thereby driving them away from a life of crime. The paper centers on the idea of women entrepreneurship and women empowerment. It notes the importance of handholding in a conflict situation. Most of the research on Chharas is either focused on victimising them for state-sponsored violence or mostly makes a plea on reconditioning them in the mainstream. Going against this trend, this paper which documents the study argues that making these poor women self-dependent is a panacea for their sluggish development. The alienation caused due to the demonisation of the community has made them abandon traditional modes of employment. This has further led the community astray into making illegal country liquor causing further damage to their reputation. Women are at the centre of this vicious circle facing much repression and ostracisation. The study conducted by the PDPU team was an attempt to change this dogmatic alienation of these poor women. It was found that with consistent support and reformist approach towards law, it is possible to drive these women away from a life of penury repression and crime. The aforementioned study uses empirical tools to verify this claim. Placed at the confluence of the sociology of gender and psychology, this paper is a good way to argue that law enforcement cannot be effective without sensitisation to the ground realities of conflict. The study conducted from which the paper borrows was a scientific survey focused on markers of gender and caste realities of the Chharas. The paper mentions various dynamics involved in the training program that paved the way for the successful employment of the women. In an attempt to explain its uniqueness, the paper also has a section on comparing similar social experiments.Keywords: employment, gender, handholding, rehabilitation
Procedia PDF Downloads 1333354 A Network-Theorical Perspective on Music Analysis
Authors: Alberto Alcalá-Alvarez, Pablo Padilla-Longoria
Abstract:
The present paper describes a framework for constructing mathematical networks encoding relevant musical information from a music score for structural analysis. These graphs englobe statistical information about music elements such as notes, chords, rhythms, intervals, etc., and the relations among them, and so become helpful in visualizing and understanding important stylistic features of a music fragment. In order to build such networks, musical data is parsed out of a digital symbolic music file. This data undergoes different analytical procedures from Graph Theory, such as measuring the centrality of nodes, community detection, and entropy calculation. The resulting networks reflect important structural characteristics of the fragment in question: predominant elements, connectivity between them, and complexity of the information contained in it. Music pieces in different styles are analyzed, and the results are contrasted with the traditional analysis outcome in order to show the consistency and potential utility of this method for music analysis.Keywords: computational musicology, mathematical music modelling, music analysis, style classification
Procedia PDF Downloads 1093353 A Passive Digital Video Authentication Technique Using Wavelet Based Optical Flow Variation Thresholding
Authors: R. S. Remya, U. S. Sethulekshmi
Abstract:
Detecting the authenticity of a video is an important issue in digital forensics as Video is used as a silent evidence in court such as in child pornography, movie piracy cases, insurance claims, cases involving scientific fraud, traffic monitoring etc. The biggest threat to video data is the availability of modern open video editing tools which enable easy editing of videos without leaving any trace of tampering. In this paper, we propose an efficient passive method for inter-frame video tampering detection, its type and location by estimating the optical flow of wavelet features of adjacent frames and thresholding the variation in the estimated feature. The performance of the algorithm is compared with the z-score thresholding and achieved an efficiency above 95% on all the tested databases. The proposed method works well for videos with dynamic (forensics) as well as static (surveillance) background.Keywords: discrete wavelet transform, optical flow, optical flow variation, video tampering
Procedia PDF Downloads 3623352 Effect of Structure on Properties of Incrementally Formed Titanium Alloy Sheets
Authors: Lucie Novakova, Petr Homola, Vaclav Kafka
Abstract:
Asymmetric incremental sheet forming (AISF) could significantly reduce costs incurred by the fabrication of complex industrial components with a minimal environmental impact. The AISF experiments were carried out on commercially pure titanium (Ti-Gr2), Timetal (15-3-3-3) alloy, and Ti-6Al-4V (Ti-Gr5) alloy. A special testing geometry was used to characterize the titanium alloys properties from the point of view of the forming zone and titanium structure effect. The structure and properties of the materials were assessed by means of metallographic analyses and microhardness measurements.The highest differences in the parameters assessed as a function of the sampling zone were observed in the case of alpha-phase Ti-Gr2at the expense of the most substantial sheet thinning occurrence. A springback causes a smaller stored deformation in Timetal (β alloy) resulting in less pronounced microstructure refinement and microhardness increase. Ti-6Al-4V alloy exhibited early failure due to its poor formability at ambient temperature.Keywords: incremental forming, metallography, hardness, titanium alloys
Procedia PDF Downloads 4533351 A Network Approach to Analyzing Financial Markets
Authors: Yusuf Seedat
Abstract:
The necessity to understand global financial markets has increased following the unfortunate spread of the recent financial crisis around the world. Financial markets are considered to be complex systems consisting of highly volatile move-ments whose indexes fluctuate without any clear pattern. Analytic methods of stock prices have been proposed in which financial markets are modeled using common network analysis tools and methods. It has been found that two key components of social network analysis are relevant to modeling financial markets, allowing us to forecast accurate predictions of stock prices within the financial market. Financial markets have a number of interacting components, leading to complex behavioral patterns. This paper describes a social network approach to analyzing financial markets as a viable approach to studying the way complex stock markets function. We also look at how social network analysis techniques and metrics are used to gauge an understanding of the evolution of financial markets as well as how community detection can be used to qualify and quantify in-fluence within a network.Keywords: network analysis, social networks, financial markets, stocks, nodes, edges, complex networks
Procedia PDF Downloads 1973350 Artificial Intelligence-Based Detection of Individuals Suffering from Vestibular Disorder
Authors: Dua Hişam, Serhat İkizoğlu
Abstract:
Identifying the problem behind balance disorder is one of the most interesting topics in the medical literature. This study has considerably enhanced the development of artificial intelligence (AI) algorithms applying multiple machine learning (ML) models to sensory data on gait collected from humans to classify between normal people and those suffering from Vestibular System (VS) problems. Although AI is widely utilized as a diagnostic tool in medicine, AI models have not been used to perform feature extraction and identify VS disorders through training on raw data. In this study, three machine learning (ML) models, the Random Forest Classifier (RF), Extreme Gradient Boosting (XGB), and K-Nearest Neighbor (KNN), have been trained to detect VS disorder, and the performance comparison of the algorithms has been made using accuracy, recall, precision, and f1-score. With an accuracy of 95.28 %, Random Forest Classifier (RF) was the most accurate model.Keywords: vestibular disorder, machine learning, random forest classifier, k-nearest neighbor, extreme gradient boosting
Procedia PDF Downloads 743349 GPU Based High Speed Error Protection for Watermarked Medical Image Transmission
Authors: Md Shohidul Islam, Jongmyon Kim, Ui-pil Chong
Abstract:
Medical image is an integral part of e-health care and e-diagnosis system. Medical image watermarking is widely used to protect patients’ information from malicious alteration and manipulation. The watermarked medical images are transmitted over the internet among patients, primary and referred physicians. The images are highly prone to corruption in the wireless transmission medium due to various noises, deflection, and refractions. Distortion in the received images leads to faulty watermark detection and inappropriate disease diagnosis. To address the issue, this paper utilizes error correction code (ECC) with (8, 4) Hamming code in an existing watermarking system. In addition, we implement the high complex ECC on a graphics processing units (GPU) to accelerate and support real-time requirement. Experimental results show that GPU achieves considerable speedup over the sequential CPU implementation, while maintaining 100% ECC efficiency.Keywords: medical image watermarking, e-health system, error correction, Hamming code, GPU
Procedia PDF Downloads 2933348 Comparison of Concentration of Heavy Metals in PM2.5 Analyzed in Three Different Global Research Institutions Using X-Ray Fluorescence
Authors: Sungroul Kim, Yeonjin Kim
Abstract:
This study was conducted by comparing the concentrations of heavy metals analyzed from the same samples with three X-Ray fluorescence (XRF) spectrometer in three different global research institutions, including PAN (A Branch of Malvern Panalytical, Seoul, South Korea), RTI (Research Triangle Institute, NC, U.S.A), and aerosol laboratory in Harvard University, Boston, U.S.A. To achieve our research objectives, the indoor air filter samples were collected at homes (n=24) of adults or child asthmatics then analyzed in PAN followed by Harvard University and RTI consecutively. Descriptive statistics were conducted for data comparison as well as correlation and simple regression analysis using R version 4.0.3. As a result, detection rates of most heavy metals analyzed in three institutions were about 90%. Of the 25 elements commonly analyzed among those institutions, 16 elements showed an R² (coefficient of determination) of 0.7 or higher (10 components were 0.9 or higher). The findings of this study demonstrated that XRF was a useful device ensuring reproducibility and compatibility for measuring heavy metals in PM2.5 collected from indoor air of asthmatics’ home.Keywords: heavy metals, indoor air quality, PM2.5, X-ray fluorescence
Procedia PDF Downloads 2053347 A Review of HVDC Modular Multilevel Converters Subjected to DC and AC Faults
Authors: Jude Inwumoh, Adam P. R. Taylor, Kosala Gunawardane
Abstract:
Modular multilevel converters (MMC) exhibit a highly scalable and modular characteristic with good voltage/power expansion, fault tolerance capability, low output harmonic content, good redundancy, and a flexible front-end configuration. Fault detection, location, and isolation, as well as maintaining fault ride-through (FRT), are major challenges to MMC reliability and power supply sustainability. Different papers have been reviewed to seek the best MMC configuration with fault capability. DC faults are the most common fault, while the probability that AC fault occurs in a modular multilevel converter (MCC) is low; though, AC faults consequence are severe. This paper reviews several MMC topologies and modulation techniques in tackling faults. These fault control strategies are compared based on cost, complexity, controllability, and power loss. A meshed network of half-bridge (HB) MMC topology was optimal in rendering fault ride through than any other MMC topologies but only when combined with DC circuit breakers (CBS), AC CBS, and fault current limiters (FCL).Keywords: MMC-HVDC, DC faults, fault current limiters, control scheme
Procedia PDF Downloads 1433346 Net Zero Energy Schools: The Starting Block for the Canadian Energy Neutral K-12 Schools
Authors: Hamed Hakim, Roderic Archambault, Charles J. Kibert, Maryam Mirhadi Fard
Abstract:
Changes in the patterns of life in the late 20th and early 21st century have created new challenges for educational systems. Greening the physical environment of school buildings has emerged as a response to some of those challenges and led to the design of energy efficient K-12 school buildings. With the advancement in knowledge and technology, the successful construction of Net Zero Energy Schools, such as the Lady Bird Johnson Middle School demonstrates a cutting edge generation of sustainable schools, and solves the former challenge of attaining energy self-sufficient educational facilities. There are approximately twenty net zero energy K-12 schools in the U.S. of which about six are located in Climate Zone 5 and 6 based on ASHRAE climate zone classification. This paper aims to describe and analyze the current status of energy efficient and NZE schools in Canada. An attempt is made to study existing U.S. energy neutral strategies closest to the climate zones in Canada (zones 5 and 6) and identify the best practices for Canadian schools.Keywords: Canada K-12 schools, green school, energy efficient, net-zero energy schools
Procedia PDF Downloads 4103345 Providing Support for Minority LGBTQ Students: Developing a Queer Studies Course
Authors: Karen Butler
Abstract:
The LGBTQ youth of color face stigma related to both race and gender identity. Effectively dealing with racial/ethnic discrimination requires strong connections to family and one’s racial/ethnic group. However, LGBTQ youth of color seldom receive support from family, peer groups or church groups. Moreover, ethnic communities often perceive LGBTQ identities as a rejection of ethnic heritage. Thus, stigma places these young people at greater risk for substance use, violence, risky sexual behaviors, suicide, and homelessness. Offering a Queer Studies (QS) class is one way to facilitate a safer and more inclusive environment for LGBTQ students, faculty and staff. The discipline of Queer Studies encompasses theories and thinkers from numerous fields: cultural studies, gay and lesbian studies, race studies, women's studies, media, postmodernism, post-colonialism, psychoanalysis and more. We began our course development by researching existing programs and classes. Several course syllabi were examined and course materials such as readings, videos, and guest speakers were assessed for possible inclusion. We also employed informal survey methods with students and faculty in order to gauge interest in the course. We then developed a sample course syllabus and began the process of new course approval. Feedback thus far indicates that students of various sexual orientations and gender identities are interested in the course and understand the need to offer it; faculty in Psychology, Social Work, and Interdisciplinary Studies are interested in cross-listing the course; library staff is willing to assist with course material acquisition, and the administration is supportive. The purpose of this session is to 1) explore the various health and wellness issues facing LGBTQ students of color and 2) share our experience of developing a QS course in health education in order to address these needs. This process, from initial recognition of the need to a course offering, will be described and discussed in the hopes that participants will increase their awareness of the issues. A QS course would be an appropriate requirement for any number of majors as well as an elective for any major.Keywords: black colleges, health education, LGBTQ, queer studies
Procedia PDF Downloads 1453344 Discerning Beginning Teachers' Conceptions of Competence through a Phenomenographic Investigation
Authors: Pauline Swee Choo Goh, Kung Teck Wong
Abstract:
The research reported here investigates variation in beginning teachers’ early experiences of their own teaching competency. A phenomenographic research approach was used to show the qualitatively different ways teacher competence was understood amongst beginning teachers in Malaysia. Phenomenographic interviews were conducted with 18 beginning teachers who had started full time teaching for between 1-3 years. Analysis revealed that beginning teachers ‘saw’, ‘understood’ the conceptions of competency in five different ways: i) the ability to manage classroom and student behavior, ii) a strong knowledge of the subject content, iii) the ability to reach out for assistance and support, iv) understanding the students they teach, and v) possessing values of professionalism. The relationships between these different ways are represented diagrammatically. This investigation gives an insider’s perspective a strong voice of what constitutes teacher competence, as well as illustrates that if teacher competence is to be used for any articulation of teacher standards, the term must be carefully defined through the help of the group most affected by any judgements of their competency to avoid misunderstandings, unhappiness and discontent.Keywords: pre-service teachers, phenomenology, competency, teacher education
Procedia PDF Downloads 3283343 A Rare Atypical Presentation of Iichthyosis Follicularis, Alopecia, and Photophobia Syndrome
Authors: D. R. Apoorva
Abstract:
Ichthyosis follicularis, alopecia, and photophobia (IFAP) syndrome is a rare oculocutaneous disorder of genetic origin. This disorder results from mutations in the membrane-bound transcription factor protease site, two genes that impair cholesterol homeostasis, and the ability to cope with endoplasmic reticulum stress. We report a rare case of IFAP syndrome with an atypical presentation, and it was interesting to note that the child had patchy non-scarring alopecia over the scalp along with unilateral madarosis. To our best knowledge, this unique presentation has not been described earlier. The child presented with photophobia and unilateral ptosis. The child also had short stature and intellectual disability. Skin histopathology was nonspecific and consisted of dilated hair follicles with keratin plugs extending above the skin surface. This rare oculocutaneous disorder requires proper documentation so that identification of its variants may be possible in the future. Early recognition of atypical presentations can help in preventing cardiovascular complications, which remain the major cause of death.Keywords: alopecia, photophobia, ichthyosis follicularis, IFAP syndrome
Procedia PDF Downloads 823342 Evaluation of Fetal brain using Magnetic Resonance Imaging
Authors: Mahdi Farajzadeh Ajirlou
Abstract:
Ordinary fetal brain development can be considered by in vivo attractive reverberation imaging (MRI) from the 18th gestational week (GW) to term and depends fundamentally on T2-weighted and diffusion-weighted (DW) arrangements. The foremost commonly suspected brain pathologies alluded to fetal MRI for assist assessment are ventriculomegaly, lost corpus callosum, and anomalies of the posterior fossa. Brain division could be a crucial to begin with step in neuroimage examination. Within the case of fetal MRI it is especially challenging and critical due to the subjective introduction of the hatchling, organs that encompass the fetal head, and irregular fetal movement. A few promising strategies have been proposed but are constrained in their execution in challenging cases and in realtime division. Fetal MRI is routinely performed on a 1.5-Tesla scanner without maternal or fetal sedation. The mother lies recumbent amid the course of the examination, the length of which is ordinarily 45 to 60 minutes. The accessibility and continuous approval of standardizing fetal brain development directions will give critical devices for early discovery of impeded fetal brain development upon which to oversee high-risk pregnancies.Keywords: brain, fetal, MRI, imaging
Procedia PDF Downloads 83