Search results for: Chen Yuan
1084 The Establishment of Probabilistic Risk Assessment Analysis Methodology for Dry Storage Concrete Casks Using SAPHIRE 8
Authors: J. R. Wang, W. Y. Cheng, J. S. Yeh, S. W. Chen, Y. M. Ferng, J. H. Yang, W. S. Hsu, C. Shih
Abstract:
To understand the risk for dry storage concrete casks in the cask loading, transfer, and storage phase, the purpose of this research is to establish the probabilistic risk assessment (PRA) analysis methodology for dry storage concrete casks by using SAPHIRE 8 code. This analysis methodology is used to perform the study of Taiwan nuclear power plants (NPPs) dry storage system. The process of research has three steps. First, the data of the concrete casks and Taiwan NPPs are collected. Second, the PRA analysis methodology is developed by using SAPHIRE 8. Third, the PRA analysis is performed by using this methodology. According to the analysis results, the maximum risk is the multipurpose canister (MPC) drop case.Keywords: PRA, dry storage, concrete cask, SAPHIRE
Procedia PDF Downloads 2101083 Auricular-Magnet Therapy for Treating Diabetes Mellitus, Food Craving, Insomnia, Nausea and Bell’s Palsy
Authors: Yu Chen
Abstract:
Auricular-magnet therapy is the development of auricular acupuncture. It is a powerful, convenient, and quick result-achieving therapeutic method. This therapy works by using magnetic discs to be placed on acupuncture points on the ears to treat diseases and improve health. In this study, the fundamental principles, indications, and contraindications of this therapy are discussed. Five examples, including reducing blood glucose levels, healing gangrene for diabetes patients, and treating Bell's palsy, are presented. Auricular-magnet therapy is a powerful development in acupuncture.Keywords: auricular-magnet therapy, Bell’s palsy, diabetes mellitus, food craving, insomnia, nausea, obesity
Procedia PDF Downloads 1241082 A Concept Analysis of Self-Efficacy for Cancer Pain Management
Authors: Yi-Fung Lin, Yuan-Mei Liao
Abstract:
Background: Pain is common among patients with cancer and is also one of the most disturbing symptoms. As this suffering is subjective, if patients proactively participate in their pain self-management, pain could be alleviated effectively. However, not everyone can carry out self-management very well because human behavior is a product of the cognition process. In this process, we can see that "self-efficacy" plays an essential role in affecting human behaviors. Methods: We used the eight steps of concept analysis proposed by Walker and Avant to clarify the concept of “self-efficacy for cancer pain management.” A comprehensive literature review was conducted for relevant publications that were published during the period of 1977 to 2021. We used several keywords, including self-efficacy, self-management, concept analysis, conceptual framework, and cancer pain, to search the following databases: PubMed, CINAHL, Web of Science, and Embase. Results: We identified three defining attributes for the concept of self-efficacy for cancer pain management, including pain management abilities, confidence, and continuous pain monitoring, and recognized six skills related to pain management abilities: problem-solving, decision-making, resource utilization, forming partnerships between medical professionals and patients, planning actions, and self-regulation. Five antecedents for the concept of self-efficacy for cancer pain management were identified: pain experience, existing cancer pain, pain-related knowledge, a belief in pain management, and physical/mental state. Consequences related to self-efficacy for cancer pain management were achievement of pain self-management, well pain control, satisfying quality of life, and containing motivation. Conclusions: This analysis provides researchers with a clearer understanding of the concept of “self-efficacy for cancer pain management.” The findings presented here provide a foundation for future research and nursing interventions to enhance self-efficacy for cancer pain management.Keywords: cancer pain, concept analysis, self-efficacy, self-management
Procedia PDF Downloads 701081 Investigating Citizens’ Perceptions and Attitudes toward China’s National Determined Contribution's Energy Restructuring Plan in Linfen City
Authors: Yuan Zhao, Phimsupha Kokchang
Abstract:
As a responsible nation, China has outlined its Nationally Determined Contributions (NDCs) of reaching peak carbon by 2030 and carbon neutrality by 2060. Peak and carbon neutrality are tough goals to achieve, and China must undertake a shift to green energy. In contrast, China's existing energy consumption structure is unsustainable and heavily dependent on coal supplies. China must revise its energy mix planning in order to strengthen energy security and satisfy the requirement for low-carbon energy generation to mitigate climate change. Shanxi Province is one of China's most important coal-producing regions, and Linfen is one of the province's key economic towns. However, Shanxi Province's economic development is severely hampered by the region's high levels of pollution and energy consumption. The purpose of this study is to investigate Linfen citizens' perceptions and attitudes toward China's NDC's energy restructuring plan through questionnaires. The majority of respondents were aware of China's NDCs, as indicated by 402 valid responses to an online questionnaire. Furthermore, respondents' perceptions and attitudes toward renewable energy initiatives are growing. To ensure that the results were dependable and consistent, reliability and validity were examined. According to the findings, the majority of Linfen's citizens believe that renewable energy projects such as solar and wind, which are consistent with China's NDCs, may improve their quality of life, public health, and the nation's economy.Keywords: China’s NDC, perceptions, attitudes, Linfen, energy restructuring
Procedia PDF Downloads 751080 A Nonlocal Means Algorithm for Poisson Denoising Based on Information Geometry
Authors: Dongxu Chen, Yipeng Li
Abstract:
This paper presents an information geometry NonlocalMeans(NLM) algorithm for Poisson denoising. NLM estimates a noise-free pixel as a weighted average of image pixels, where each pixel is weighted according to the similarity between image patches in Euclidean space. In this work, every pixel is a Poisson distribution locally estimated by Maximum Likelihood (ML), all distributions consist of a statistical manifold. A NLM denoising algorithm is conducted on the statistical manifold where Fisher information matrix can be used for computing distribution geodesics referenced as the similarity between patches. This approach was demonstrated to be competitive with related state-of-the-art methods.Keywords: image denoising, Poisson noise, information geometry, nonlocal-means
Procedia PDF Downloads 2841079 Failure Localization of Bipolar Integrated Circuits by Implementing Active Voltage Contrast
Authors: Yiqiang Ni, Xuanlong Chen, Enliang Li, Linting Zheng, Shizheng Yang
Abstract:
Bipolar ICs are playing an important role in military applications, mainly used in logic gates, such as inverter and NAND gate. The defect of metal break located on the step is one of the main failure mechanisms of bipolar ICs, resulting in open-circuit or functional failure. In this situation, general failure localization methods like optical beam-induced resistance change (OBIRCH) and photon emission microscopy (PEM) might not be fully effective. However, active voltage contrast (AVC) can be used as a voltage probe, which may pinpoint the incorrect potential and thus locate the failure position. Two case studies will be present in this paper on how to implement AVC for failure localization, and the detailed failure mechanism will be discussed.Keywords: bipolar IC, failure localization, metal break, open failure, voltage contrast
Procedia PDF Downloads 2881078 Security Design of Root of Trust Based on RISC-V
Authors: Kang Huang, Wanting Zhou, Shiwei Yuan, Lei Li
Abstract:
Since information technology develops rapidly, the security issue has become an increasingly critical for computer system. In particular, as cloud computing and the Internet of Things (IoT) continue to gain widespread adoption, computer systems need to new security threats and attacks. The Root of Trust (RoT) is the foundation for providing basic trusted computing, which is used to verify the security and trustworthiness of other components. Design a reliable Root of Trust and guarantee its own security are essential for improving the overall security and credibility of computer systems. In this paper, we discuss the implementation of self-security technology based on the RISC-V Root of Trust at the hardware level. To effectively safeguard the security of the Root of Trust, researches on security safeguard technology on the Root of Trust have been studied. At first, a lightweight and secure boot framework is proposed as a secure mechanism. Secondly, two kinds of memory protection mechanism are built to against memory attacks. Moreover, hardware implementation of proposed method has been also investigated. A series of experiments and tests have been carried on to verify to effectiveness of the proposed method. The experimental results demonstrated that the proposed approach is effective in verifying the integrity of the Root of Trust’s own boot rom, user instructions, and data, ensuring authenticity and enabling the secure boot of the Root of Trust’s own system. Additionally, our approach provides memory protection against certain types of memory attacks, such as cache leaks and tampering, and ensures the security of root-of-trust sensitive information, including keys.Keywords: root of trust, secure boot, memory protection, hardware security
Procedia PDF Downloads 2131077 Statistical Modeling of Mandarin Tone Sandhi: Neutralization of Underlying Pitch Targets
Authors: Si Chen, Caroline Wiltshire, Bin Li
Abstract:
This study statistically models the surface f0 contour and the underlying pitch target of a well-studied third sandhi tone of Mandarin Chinese. Although the growth curve analysis on the surface f0 contours indicates non-neutralization of this sandhi tone (T3) and the base T2, their underlying pitch targets do show neutralization. These results in Mandarin are also consistent with the perception of native speakers, where they cannot distinguish the third T3 from the base T2, compensating contextual variation. It is possible to use the proposed statistical procedure of testing underlying pitch targets to verify tone sandhi processes in other tonal languages.Keywords: growth curve analysis, Mandarin Chinese, tone sandhi, underlying pitch target
Procedia PDF Downloads 3351076 Exploring Chinese Nurses’ Views on Alternative Medicine
Authors: Hui Chen, Huping Gong, Yalin Mao
Abstract:
This paper mainly focuses on the Chinese registered nurses as the research object, and studies the role of Chinese registered nurses in the cognition and application experience of alternative medicine. In this study, nurses were interviewed, focusing on their views and exchanging experiences on the use of alternative medicine in their work. The researchers will use Colaizzi to analyze the collected data. Four main themes emerged from the interviews, namely: 1) the current state of alternative medicine in China, 2) Challenges faced by nurses, 3) How nurses overcome various difficulties, 4) Development of alternative medicine in China. Through the exchange of knowledge and practical experience of alternative medicine, registered nurses in China are not only participants in the application of alternative medicine but also play an active role in promoting its development.Keywords: traditional Chinese medicine, alternative medicine, nurse, qualitative research
Procedia PDF Downloads 161075 Preparation of Heterogeneous Ferrite Catalysts and Their Application for Fenton-Like Oxidation of Radioactive Organic Wastewater
Authors: Hsien T. Hsieh, Chao R. Chen, Li C. Chuang, Chin C. Shen
Abstract:
Fenton oxidation technology is the general strategy for the treatment of organic compounds-contained wastewater. However, a considerable amount of ferric sludge was produced during the Fenton process as secondary wastes, which were needed to be further removed from the effluent and treated. In this study, heterogeneous catalysts based on ferrite oxide (Cu-Fe-Ce-O) were synthesized and characterized, and their application for Fenton-like oxidation of simulated and actual radioactive organic wastewater was investigated. The results of TOC decomposition efficiency around 54% ~ 99% were obtained when the catalyst loading, H2O2 loading, pH, temperature, and reaction time were controlled. In this case, no secondary wastes formed and the given catalysts were able to be separated by magnetic devices and reused again.Keywords: fenton, oxidation, heterogeneous catalyst, wastewater
Procedia PDF Downloads 3601074 Image Segmentation of Visual Markers in Robotic Tracking System Based on Differential Evolution Algorithm with Connected-Component Labeling
Authors: Shu-Yu Hsu, Chen-Chien Hsu, Wei-Yen Wang
Abstract:
Color segmentation is a basic and simple way for recognizing the visual markers in a robotic tracking system. In this paper, we propose a new method for color segmentation by incorporating differential evolution algorithm and connected component labeling to autonomously preset the HSV threshold of visual markers. To evaluate the effectiveness of the proposed algorithm, a ROBOTIS OP2 humanoid robot is used to conduct the experiment, where five most commonly used color including red, purple, blue, yellow, and green in visual markers are given for comparisons.Keywords: color segmentation, differential evolution, connected component labeling, humanoid robot
Procedia PDF Downloads 6031073 Thermoplastic Composites with Reduced Discoloration and Enhanced Fire-Retardant Property
Authors: Peng Cheng, Liqing Wei, Hongyu Chen, Ruomiao Wang
Abstract:
This paper discusses a light-weight reinforced thermoplastic (LWRT) composite with superior fire retardancy. This porous LWRT composite is manufactured using polyolefin, fiberglass, and fire retardant additives via a wet-lay process. However, discoloration of the LWRT can be induced by various mechanisms, which may be a concern in the building and construction industry. It is commonly understood that discoloration is strongly associated with the presence of phenolic antioxidant(s) and NOx. The over-oxidation of phenolic antioxidant(s) is probably the root-cause of the discoloration (pinking/yellowing). Hanwha Azdel, Inc. developed a LWRT with fire-retardant property of ASTM E84-Class A specification, as well as negligible discoloration even under harsh conditions. In addition, this thermoplastic material is suitable for secondary processing (e.g. compression molding) if necessary.Keywords: discoloration, fire-retardant, thermoplastic composites, wet-lay process
Procedia PDF Downloads 1231072 Development of an Appropriate Method for the Determination of Multiple Mycotoxins in Pork Processing Products by UHPLC-TCFLD
Authors: Jason Gica, Yi-Hsieng Samuel Wu, Deng-Jye Yang, Yi-Chen Chen
Abstract:
Mycotoxins, harmful secondary metabolites produced by certain fungi species, pose significant risks to animals and humans worldwide. Their stable properties lead to contamination during grain harvesting, transportation, and storage, as well as in processed food products. The prevalence of mycotoxin contamination has attracted significant attention due to its adverse impact on food safety and global trade. The secondary contamination pathway from animal products has been identified as an important route of exposure, posing health risks for livestock and humans consuming contaminated products. Pork, one of the highly consumed meat products in Taiwan according to the National Food Consumption Database, plays a critical role in the nation's diet and economy. Given its substantial consumption, pork processing products are a significant component of the food supply chain and a potential source of mycotoxin contamination. This study is paramount for formulating effective regulations and strategies to mitigate mycotoxin-related risks in the food supply chain. By establishing a reliable analytical method, this research contributes to safeguarding public health and enhancing the quality of pork processing products. The findings will serve as valuable guidance for policymakers, food industries, and consumers to ensure a safer food supply chain in the face of emerging mycotoxin challenges. An innovative and efficient analytical approach is proposed using Ultra-High Performance Liquid Chromatography coupled with Temperature Control Fluorescence Detector Light (UHPLC-TCFLD) to determine multiple mycotoxins in pork meat samples due to its exceptional capacity to detect multiple mycotoxins at the lowest levels of concentration, making it highly sensitive and reliable for comprehensive mycotoxin analysis. Additionally, its ability to simultaneously detect multiple mycotoxins in a single run significantly reduces the time and resources required for analysis, making it a cost-effective solution for monitoring mycotoxin contamination in pork processing products. The research aims to optimize the efficient mycotoxin QuEChERs extraction method and rigorously validate its accuracy and precision. The results will provide crucial insights into mycotoxin levels in pork processing products.Keywords: multiple-mycotoxin analysis, pork processing products, QuEChERs, UHPLC-TCFLD, validation
Procedia PDF Downloads 671071 11-Round Impossible Differential Attack on Midori64
Authors: Zhan Chen, Wenquan Bi
Abstract:
This paper focuses on examining the strength of Midori against impossible differential attack. The Midori family of light weight block cipher orienting to energy-efficiency is proposed in ASIACRYPT2015. Using a 6-round property, the authors implement an 11-round impossible differential attack on Midori64 by extending two rounds on the top and three rounds on the bottom. There is enough key space to consider pre-whitening keys in this attack. An impossible differential path that minimises the key bits involved is used to reduce computational complexity. Several additional observations such as partial abort technique are used to further reduce data and time complexities. This attack has data complexity of 2 ⁶⁹·² chosen plaintexts, requires 2 ¹⁴·⁵⁸ blocks of memory and 2 ⁹⁴·⁷ 11- round Midori64 encryptions.Keywords: cryptanalysis, impossible differential, light weight block cipher, Midori
Procedia PDF Downloads 2741070 Research on High Dielectric HfO₂ Stack Structure Applied to Field Effect Transistors
Authors: Kuan Yu Lin, Shih Chih Chen
Abstract:
This study focuses on the Al/HfO₂/Si/Al structure to explore the electrical properties of the structure. This experiment uses a radio frequency magnetron sputtering system to deposit high dielectric materials on p-type silicon substrates of 1~10 Ω-cm (100). Consider the hafnium dioxide film as a dielectric layer. Post-deposition annealing at 750°C in nitrogen atmosphere. Electron beam evaporation of metallic aluminum is then used to complete the top/bottom electrodes. The metal is post-annealed at 450°C for 20 minutes in a nitrogen environment to complete the MOS component. Its dielectric constant, equivalent oxide layer thickness, oxide layer defects, and leakage current mechanism are discussed. At PDA 750°C-5s, the maximum k value was found to be 21.2, and the EOT was 3.68nm.Keywords: high-k gate dielectrics, HfO₂, post deposition annealing, RF magnetic
Procedia PDF Downloads 561069 Spatial Behavioral Model-Based Dynamic Data-Driven Diagram Information Model
Authors: Chiung-Hui Chen
Abstract:
Diagram and drawing are important ways to communicate and the reproduce of architectural design, Due to the development of information and communication technology, the professional thinking of architecture and interior design are also change rapidly. In development process of design, diagram always play very important role. This study is based on diagram theories, observe and record interaction between man and objects, objects and space, and space and time in a modern nuclear family. Construct a method for diagram to systematically and visualized describe the space plan of a modern nuclear family toward a intelligent design, to assist designer to retrieve information and check/review event pattern of past and present.Keywords: digital diagram, information model, context aware, data analysis
Procedia PDF Downloads 3311068 A Rapid and Cost-Effective Approach to Manufacturing Modeling Platform for Fused Deposition Modeling
Authors: Chil-Chyuan Kuo, Chen-Hsuan Tsai
Abstract:
This study presents a cost-effective approach for rapid fabricating modeling platforms utilized in fused deposition modeling system. A small-batch production of modeling platforms about 20 pieces can be obtained economically through silicone rubber mold using vacuum casting without applying the plastic injection molding. The air venting systems is crucial for fabricating modeling platform using vacuum casting. Modeling platforms fabricated can be used for building rapid prototyping model after sandblasting. This study offers industrial value because it has both time-effectiveness and cost-effectiveness.Keywords: vacuum casting, fused deposition modeling, modeling platform, sandblasting, surface roughness
Procedia PDF Downloads 3801067 A 3D Bioprinting System for Engineering Cell-Embedded Hydrogels by Digital Light Processing
Authors: Jimmy Jiun-Ming Su, Yuan-Min Lin
Abstract:
Bioprinting has been applied to produce 3D cellular constructs for tissue engineering. Microextrusion printing is the most common used method. However, printing low viscosity bioink is a challenge for this method. Herein, we developed a new 3D printing system to fabricate cell-laden hydrogels via a DLP-based projector. The bioprinter is assembled from affordable equipment including a stepper motor, screw, LED-based DLP projector, open source computer hardware and software. The system can use low viscosity and photo-polymerized bioink to fabricate 3D tissue mimics in a layer-by-layer manner. In this study, we used gelatin methylacrylate (GelMA) as bioink for stem cell encapsulation. In order to reinforce the printed construct, surface modified hydroxyapatite has been added in the bioink. We demonstrated the silanization of hydroxyapatite could improve the crosslinking between the interface of hydroxyapatite and GelMA. The results showed that the incorporation of silanized hydroxyapatite into the bioink had an enhancing effect on the mechanical properties of printed hydrogel, in addition, the hydrogel had low cytotoxicity and promoted the differentiation of embedded human bone marrow stem cells (hBMSCs) and retinal pigment epithelium (RPE) cells. Moreover, this bioprinting system has the ability to generate microchannels inside the engineered tissues to facilitate diffusion of nutrients. We believe this 3D bioprinting system has potential to fabricate various tissues for clinical applications and regenerative medicine in the future.Keywords: bioprinting, cell encapsulation, digital light processing, GelMA hydrogel
Procedia PDF Downloads 1801066 E-Learning in Primary Science: Teachers versus Students
Authors: Winnie Wing Mui So, Yu Chen
Abstract:
This study investigated primary school teachers’ and students’ perceptions of science learning in an e-learning environment. This study used a multiple case study design and involved eight science teachers and their students from four Hong Kong primary schools. The science topics taught included ‘season and weather’ ‘force and movement’, ‘solar and lunar eclipse’ and ‘living things and habitats’. Data were collected through lesson observations, interviews with teachers, and interviews with students. Results revealed some differences between the teachers’ and the students’ perceptions regarding the usefulness of e-learning resources, the organization of student-centred activities, and the impact on engagement and interactions in lessons. The findings have implications for the more effective creation of e-learning environments for science teaching and learning in primary schools.Keywords: e-learning, science education, teacher' and students' perceptions, primary schools
Procedia PDF Downloads 2001065 The Analysis of TRACE/PARCS in the Simulation of Ultimate Response Guideline for Lungmen ABWR
Authors: J. R. Wang, W. Y. Li, H. T. Lin, B. H. Lee, C. Shih, S. W. Chen
Abstract:
In this research, the TRACE/PARCS model of Lungmen ABWR has been developed for verification of ultimate response guideline (URG) efficiency. This ultimate measure was named as DIVing plan, abbreviated from system depressurization, water injection and containment venting. The simulation initial condition is 100% rated power/100% rated core flow. This research focuses on the estimation of the time when the fuel might be damaged with no water injection by using TRACE/PARCS first. Then, the effect of the reactor core isolation system (RCIC), control depressurization and ac-independent water addition system (ACIWA), which can provide the injection with 950 gpm are also estimated for the station blackout (SBO) transient.Keywords: ABWR, TRACE, safety analysis, PARCS
Procedia PDF Downloads 4541064 A Schema of Building an Efficient Quality Gate throughout the Software Development with Tools
Authors: Le Chen
Abstract:
This paper presents an efficient tool platform scheme to ensure quality protection throughout the software development process. The main principle is to manage the information of requirements, design, development, testing, operation and maintenance process with proper tools, and to set up the quality standards of each process. Through the tools’ display and summary of quality standards, the quality standards can be visualizad and ready for policy decision, which is called Quality Gate in this paper. In addition, the tools are also integrated to achieve the exchange and relation of information which highly improving operational efficiency. In this paper, the feasibility of the scheme is verified by practical application of development projects, and the overall information display and data mining are proposed to be further improved.Keywords: efficiency, quality gate, software process, tools
Procedia PDF Downloads 3561063 Impacts of Financial Development and Operational Scale on Bank Efficiencies in Taiwan
Authors: Ying-Hsiu Chen, Pao-Peng Hsu
Abstract:
This paper adopts a two-stage data envelopment analysis to explore the impacts of financial development and bank operational scale on bank efficiencies. The sample comprises of unbalanced panel data of 32 Taiwanese enlisted in domestic commercial banks over the period 1998 to 2013. Empirical results show that technical efficiency is positively related to financial development, whereas the effect of financial development on scale efficiency is insignificant. The effect of operational scale exerts a significantly positive effect on bank efficiencies, but the gain of efficiency is decreased gradually when operational scale increases. Furthermore, increase in capital adequacy ratio and market power of banks leads to a growth of bank efficiencies.Keywords: financial development, operational scale, efficiency, DEA
Procedia PDF Downloads 5231062 A Fast Community Detection Algorithm
Authors: Chung-Yuan Huang, Yu-Hsiang Fu, Chuen-Tsai Sun
Abstract:
Community detection represents an important data-mining tool for analyzing and understanding real-world complex network structures and functions. We believe that at least four criteria determine the appropriateness of a community detection algorithm: (a) it produces useable normalized mutual information (NMI) and modularity results for social networks, (b) it overcomes resolution limitation problems associated with synthetic networks, (c) it produces good NMI results and performance efficiency for Lancichinetti-Fortunato-Radicchi (LFR) benchmark networks, and (d) it produces good modularity and performance efficiency for large-scale real-world complex networks. To our knowledge, no existing community detection algorithm meets all four criteria. In this paper, we describe a simple hierarchical arc-merging (HAM) algorithm that uses network topologies and rule-based arc-merging strategies to identify community structures that satisfy the criteria. We used five well-studied social network datasets and eight sets of LFR benchmark networks to validate the ground-truth community correctness of HAM, eight large-scale real-world complex networks to measure its performance efficiency, and two synthetic networks to determine its susceptibility to resolution limitation problems. Our results indicate that the proposed HAM algorithm is capable of providing satisfactory performance efficiency and that HAM-identified communities were close to ground-truth communities in social and LFR benchmark networks while overcoming resolution limitation problems.Keywords: complex network, social network, community detection, network hierarchy
Procedia PDF Downloads 2261061 An Exploratory Research of Human Character Analysis Based on Smart Watch Data: Distinguish the Drinking State from Normal State
Authors: Lu Zhao, Yanrong Kang, Lili Guo, Yuan Long, Guidong Xing
Abstract:
Smart watches, as a handy device with rich functionality, has become one of the most popular wearable devices all over the world. Among the various function, the most basic is health monitoring. The monitoring data can be provided as an effective evidence or a clue for the detection of crime cases. For instance, the step counting data can help to determine whether the watch wearer was quiet or moving during the given time period. There is, however, still quite few research on the analysis of human character based on these data. The purpose of this research is to analyze the health monitoring data to distinguish the drinking state from normal state. The analysis result may play a role in cases involving drinking, such as drunk driving. The experiment mainly focused on finding the figures of smart watch health monitoring data that change with drinking and figuring up the change scope. The chosen subjects are mostly in their 20s, each of whom had been wearing the same smart watch for a week. Each subject drank for several times during the week, and noted down the begin and end time point of the drinking. The researcher, then, extracted and analyzed the health monitoring data from the watch. According to the descriptive statistics analysis, it can be found that the heart rate change when drinking. The average heart rate is about 10% higher than normal, the coefficient of variation is less than about 30% of the normal state. Though more research is needed to be carried out, this experiment and analysis provide a thought of the application of the data from smart watches.Keywords: character analysis, descriptive statistics analysis, drink state, heart rate, smart watch
Procedia PDF Downloads 1661060 Research on Fuzzy Test Framework Based on Concolic Execution
Authors: Xiong Xie, Yuhang Chen
Abstract:
Vulnerability discovery technology is a significant field of the current. In this paper, a fuzzy framework based on concolic execution has been proposed. Fuzzy test and symbolic execution are widely used in the field of vulnerability discovery technology. But each of them has its own advantages and disadvantages. During the path generation stage, path traversal algorithm based on generation is used to get more accurate path. During the constraint solving stage, dynamic concolic execution is used to avoid the path explosion. If there is external call, the concolic based on function summary is used. Experiments show that the framework can effectively improve the ability of triggering vulnerabilities and code coverage.Keywords: concolic execution, constraint solving, fuzzy test, vulnerability discovery
Procedia PDF Downloads 2281059 Urban Rail Transit CBTC Computer Interlocking Subsystem Relying on Multi-Template Pen Point Tracking Algorithm
Authors: Xinli Chen, Xue Su
Abstract:
In the urban rail transit CBTC system, interlocking is considered one of the most basic sys-tems, which has the characteristics of logical complexity and high-security requirements. The development and verification of traditional interlocking subsystems are entirely manual pro-cesses and rely too much on the designer, which often hides many uncertain factors. In order to solve this problem, this article is based on the multi-template nib tracking algorithm for model construction and verification, achieving the main safety attributes and using SCADE for formal verification. Experimental results show that this method helps to improve the quality and efficiency of interlocking software.Keywords: computer interlocking subsystem, penpoint tracking, communication-based train control system, multi-template tip tracking
Procedia PDF Downloads 1591058 Investigating Gender Differences in M-Learning Gameplay Adoption
Authors: Chih-Ping Chen
Abstract:
Despite the increasing popularity of and interest in mobile games, there has been little research that evaluates gender differences in users’ actual preferences for mobile game content, and the factors that influence entertainment and mobile-learning habits. To fill this void, this study examines different gender users’ experience of mobile English learning game adoption in order to identify the areas of development in Taiwan, using Uses and Gratification Theory, Expectation Confirmation Theory and experiential value. The integration of these theories forms the basis of an extended research concept. Users’ responses to questions about cognitive perceptions, confirmation, gratifications and continuous use were collected and analyzed with various factors derived from the theories.Keywords: expectation confirmation theory, experiential value, gender difference, mobile game, uses and gratification
Procedia PDF Downloads 3301057 Organizational Ideologies and Their Embeddedness in Fashion Show Productions in Shanghai and London Fashion Week: International-Based-Chinese Independent Designers' Participatory Behaviors in Different Fashion Cities
Authors: Zhe Wang
Abstract:
The fashion week, as a critical international fashion event in shaping world fashion cities, is one of the most significant world events that serves as the core medium for designers to stage new collections. However, its role in bringing about and shaping design ideologies of major fashion cities have long been neglected from a fashion ecosystem perspective. With the expanding scale of international fashion weeks in terms of culture and commerce, the organizational structures of these fashion weeks are becoming more complex. In the emerging fashion city, typified by Shanghai, a newly-formed 'hodgepodge' transforming the current global fashion ecosystem. A city’s legitimate fashion institutions, typically the organizers of international fashion weeks, have cultivated various cultural characteristics via rules and regulations pertaining to international fashion weeks. Under these circumstances, designers’ participatory behaviors, specifically show design and production, are influenced by the cultural ideologies of official organizers and institutions. This research compares international based Chinese (IBC) independent designers’ participatory behavior in London and Shanghai Fashion Weeks: specifically, the way designers present their clothing and show production. both of which are found to be profoundly influenced by cultural and design ideologies of fashion weeks. They are, to a large degree, manipulated by domestic institutions and organizers. Shanghai fashion week has given rise to a multiple, mass-ended entertainment carnival design and cultural ideology in Shanghai, thereby impacting the explicit cultural codes or intangible rules that IBC designers must adhere to when designing and producing fashion shows. Therefore, influenced by various cultural characteristics in the two cities, IBC designers’ show design and productions, in turn, play an increasingly vital role in shaping the design characteristic of an international fashion week. Through researching the organizational systems and design preferences of organizers of London and Shanghai fashion weeks, this paper demonstrates the embeddedness of design systems in the forming of design ideologies under various cultural and institutional contexts. The core methodology utilized in this research is ethnography. As a crucial part of a Ph.D. project on innovations in fashion shows under a cross-cultural context run by Edinburgh College of Art, School of Design, the fashion week’s organizational culture in various cultural contexts is investigated in London and Shanghai for approximately six months respectively. Two IBC designers, Angel Chen and Xuzhi Chen were followed during their participation of London and Shanghai Fashion Weeks from September 2016 to June 2017, during which two consecutive seasons were researched in order to verify the consistency of design ideologies’ associations with organizational system and culture.Keywords: institutional ideologies, international fashion weeks, IBC independent designers; fashion show
Procedia PDF Downloads 1151056 Computational Fluid Dynamics of a Bubbling Fluidized Bed in Wood Pellets
Authors: Opeyemi Fadipe, Seong Lee, Guangming Chen, Steve Efe
Abstract:
In comparison to conventional combustion technologies, fluidized bed combustion has several advantages, such as superior heat transfer characteristics due to homogeneous particle mixing, lower temperature needs, nearly isothermal process conditions, and the ability to operate continuously. Computational fluid dynamics (CFD) can help anticipate the intricate combustion process and the hydrodynamics of a fluidized bed thoroughly by using CFD techniques. Bubbling Fluidized bed was model using the Eulerian-Eulerian model, including the kinetic theory of the flow. The model was validated by comparing it with other simulation of the fluidized bed. The effects of operational gas velocity, volume fraction, and feed rate were also investigated numerically. A higher gas velocity and feed rate cause an increase in fluidization of the bed.Keywords: fluidized bed, operational gas velocity, volume fraction, computational fluid dynamics
Procedia PDF Downloads 811055 Combining Shallow and Deep Unsupervised Machine Learning Techniques to Detect Bad Actors in Complex Datasets
Authors: Jun Ming Moey, Zhiyaun Chen, David Nicholson
Abstract:
Bad actors are often hard to detect in data that imprints their behaviour patterns because they are comparatively rare events embedded in non-bad actor data. An unsupervised machine learning framework is applied here to detect bad actors in financial crime datasets that record millions of transactions undertaken by hundreds of actors (<0.01% bad). Specifically, the framework combines ‘shallow’ (PCA, Isolation Forest) and ‘deep’ (Autoencoder) methods to detect outlier patterns. Detection performance analysis for both the individual methods and their combination is reported.Keywords: detection, machine learning, deep learning, unsupervised, outlier analysis, data science, fraud, financial crime
Procedia PDF Downloads 94