Search results for: air data system
33168 Impact of Meteorological Factors on Influenza Activity in Pakistan; A Tale of Two Cities
Authors: Nadia Nisar
Abstract:
Background: In the temperate regions Influenza activities occur sporadically all year round with peaks coinciding during cold months. Meteorological and environmental conditions play significant role in the transmission of influenza globally. In this study, we assessed the relationship between meteorological parameters and influenza activity in two geographical areas of Pakistan. Methods: Influenza data were collected from Islamabad (north) and Multan (south) regions of national influenza surveillance system during 2010-2015. Meteorological database was obtained from National Climatic Data Center (Pakistan). Logistic regression model with a stepwise approach was used to explore the relationship between meteorological parameters with influenza peaks. In statistical model, we used the weekly proportion of laboratory-confirmed influenza positive samples to represent Influenza activity with metrological parameters as the covariates (temperature, humidity and precipitation). We also evaluate the link between environmental conditions associated with seasonal influenza epidemics: 'cold-dry' and 'humid-rainy'. Results: We found that temperature and humidity was positively associated with influenza in north and south both locations (OR = 0.927 (0.88-0.97)) & (OR = 0.1.078 (1.027-1.132)) and (OR = 1.023 (1.008-1.037)) & (OR = 0.978 (0.964-0.992)) respectively, whilst precipitation was negatively associated with influenza (OR = 1.054 (1.039-1.070)) & (OR = 0.949 (0.935-0.963)). In both regions, temperature and humidity had the highest contribution to the model as compared to the precipitation. We revealed that the p-value for all of climate parameters is <0.05 by Independent-sample t-test. These results demonstrate that there were significant relationships between climate factors and influenza infection with correlation coefficients: 0.52-0.90. The total contribution of these three climatic variables accounted for 89.04%. The reported number of influenza cases increased sharply during the cold-dry season (i.e., winter) when humidity and temperature are at minimal levels. Conclusion: Our findings showed that measures of temperature, humidity and cold-dry season (winter) can be used as indicators to forecast influenza infections. Therefore integrating meteorological parameters for influenza forecasting in the surveillance system may benefit the public health efforts in reducing the burden of seasonal influenza. More studies are necessary to understand the role of these parameters in the viral transmission and host susceptibility process.Keywords: influenza, climate, metrological, environmental
Procedia PDF Downloads 20033167 Reliability Evaluation of a Payment Model in Mobile E-Commerce Using Colored Petri Net
Authors: Abdolghader Pourali, Mohammad V. Malakooti, Muhammad Hussein Yektaie
Abstract:
A mobile payment system in mobile e-commerce generally have high security so that the user can trust it for doing business deals, sales, paying financial transactions, etc. in the mobile payment system. Since an architecture or payment model in e-commerce only shows the way of interaction and collaboration among users and mortgagers and does not present any evaluation of effectiveness and confidence about financial transactions to stakeholders. In this paper, we try to present a detailed assessment of the reliability of a mobile payment model in the mobile e-commerce using formal models and colored Petri nets. Finally, we demonstrate that the reliability of this system has high value (case study: a secure payment model in mobile commerce.Keywords: reliability, colored Petri net, assessment, payment models, m-commerce
Procedia PDF Downloads 53733166 The Implementation of Teaching and Learning Quality Assurance System at the Chaoyang University of Technology for Academic Year 2013-2015
Authors: Ting Hsiang Chang
Abstract:
Nowadays in Taiwan, higher education, which was previously more emphasized on teaching-oriented approaches, has gradually shifted to an approach more focusing on students learning outcomes. With student employment rate as an important indicator for University Program Evaluation periodically held by the Ministry of Education, it becomes extremely critical for a university to build up a teaching and learning quality assurance system to bridge the gap between learning and practice. Teaching and Learning Quality Assurance System has been built and implemented at Chaoyang University of Technology for years and has received substantial results. By employing various forms of evaluation and performance appraisals, the effectiveness of teaching and learning can consistently be tracked as a means of ensuring teaching and learning quality. This study aims to explore the evaluation system of teaching and learning quality assurance system at the Chaoyang University of Technology by means of content analysis. The study contents the evaluation reports on the teaching and learning quality assurance at the Chaoyang University of Technology in the Academic Year 2013-2015. The quantitative results of the assessment were analyzed using the five-point Likert Scale. Quality assurance Committee meetings were further held for examining and discussions on the results. To the end, the annual evaluation report is to be produced as references used to improve approaches in both teaching and learning. The findings indicate that there is a respective relationship between the overall teaching evaluation items and the teaching goals and core competencies. In addition, graduates’ feedbacks were also collected for further analysis to examine if the current educational planning is able to achieve the university’s teaching goal and cultivation of core competencies.Keywords: core competencies, teaching and learning quality assurance system, teaching goals, university program evaluation
Procedia PDF Downloads 29033165 CMOS Solid-State Nanopore DNA System-Level Sequencing Techniques Enhancement
Authors: Syed Islam, Yiyun Huang, Sebastian Magierowski, Ebrahim Ghafar-Zadeh
Abstract:
This paper presents system level CMOS solid-state nanopore techniques enhancement for speedup next generation molecular recording and high throughput channels. This discussion also considers optimum number of base-pair (bp) measurements through channel as an important role to enhance potential read accuracy. Effective power consumption estimation offered suitable rangeof multi-channel configuration. Nanopore bp extraction model in statistical method could contribute higher read accuracy with longer read-length (200 < read-length). Nanopore ionic current switching with Time Multiplexing (TM) based multichannel readout system contributed hardware savings.Keywords: DNA, nanopore, amplifier, ADC, multichannel
Procedia PDF Downloads 45333164 Automatic Detection of Suicidal Behaviors Using an RGB-D Camera: Azure Kinect
Authors: Maha Jazouli
Abstract:
Suicide is one of the most important causes of death in the prison environment, both in Canada and internationally. Rates of attempts of suicide and self-harm have been on the rise in recent years, with hangings being the most frequent method resorted to. The objective of this article is to propose a method to automatically detect in real time suicidal behaviors. We present a gesture recognition system that consists of three modules: model-based movement tracking, feature extraction, and gesture recognition using machine learning algorithms (MLA). Our proposed system gives us satisfactory results. This smart video surveillance system can help assist staff responsible for the safety and health of inmates by alerting them when suicidal behavior is detected, which helps reduce mortality rates and save lives.Keywords: suicide detection, Kinect azure, RGB-D camera, SVM, machine learning, gesture recognition
Procedia PDF Downloads 18833163 Simulation-Based Diversity Management in Human-Robot Collaborative Scenarios
Authors: Titanilla Komenda, Viktorio Malisa
Abstract:
In this paper, the influence of diversity-related factors on the design of collaborative scenarios is analysed. Based on the evaluation, a framework for simulating human-robot-collaboration is presented that considers both human factors as well as the overall system performance. The implementation of the model is shown on a real-life scenario from industry and validated in terms of traceability, safety and physical limitations. By comparing scenarios that consider diversity with those only meeting system performance, an overall understanding of individually adapted human-robot-collaborative workspaces is reached. A diversity-related guideline for human-robot-collaborations provides a summary of the research and aids in optimizing future applications. Finally, limitations and future amendments of the model are discussed.Keywords: diversity, human-machine system, human-robot collaboration, simulation
Procedia PDF Downloads 30433162 Changes in Vocational Teacher Training in Hungary: Challenges and Possibilities
Authors: Anetta Bacsa-Bán
Abstract:
The training of vocational education teachers in Hungary was a special training system before the Bologna system, but under the influence of the Bologna system, the structure and content of the training changed significantly. The training of vocational teachers, including engineering teachers and vocational trainers, is considerably different when compared to the training of public education teachers. This study aims to present these differences and peculiarities, problems and issues of the training as well as to outline the possibilities of further development. During the study, the following methods were implemented: empirical research among students and graduates of vocational teacher training, as well as analysis of the relevant literature. The study summarizes the research and theoretical results related to vocational education and training (VET) teacher training over the past 15 years, with the aim of developing the training and mapping new directions in the field.Keywords: vocational teacher, technical instructors, technical vocational instructors, theoretical aspects
Procedia PDF Downloads 25833161 Impact of Climate Change on Sea Level Rise along the Coastline of Mumbai City, India
Authors: Chakraborty Sudipta, A. R. Kambekar, Sarma Arnab
Abstract:
Sea-level rise being one of the most important impacts of anthropogenic induced climate change resulting from global warming and melting of icebergs at Arctic and Antarctic, the investigations done by various researchers both on Indian Coast and elsewhere during the last decade has been reviewed in this paper. The paper aims to ascertain the propensity of consistency of different suggested methods to predict the near-accurate future sea level rise along the coast of Mumbai. Case studies at East Coast, Southern Tip and West and South West coast of India have been reviewed. Coastal Vulnerability Index of several important international places has been compared, which matched with Intergovernmental Panel on Climate Change forecasts. The application of Geographic Information System mapping, use of remote sensing technology, both Multi Spectral Scanner and Thematic Mapping data from Landsat classified through Iterative Self-Organizing Data Analysis Technique for arriving at high, moderate and low Coastal Vulnerability Index at various important coastal cities have been observed. Instead of data driven, hindcast based forecast for Significant Wave Height, additional impact of sea level rise has been suggested. Efficacy and limitations of numerical methods vis-à-vis Artificial Neural Network has been assessed, importance of Root Mean Square error on numerical results is mentioned. Comparing between various computerized methods on forecast results obtained from MIKE 21 has been opined to be more reliable than Delft 3D model.Keywords: climate change, Coastal Vulnerability Index, global warming, sea level rise
Procedia PDF Downloads 13233160 Addressing Supply Chain Data Risk with Data Security Assurance
Authors: Anna Fowler
Abstract:
When considering assets that may need protection, the mind begins to contemplate homes, cars, and investment funds. In most cases, the protection of those assets can be covered through security systems and insurance. Data is not the first thought that comes to mind that would need protection, even though data is at the core of most supply chain operations. It includes trade secrets, management of personal identifiable information (PII), and consumer data that can be used to enhance the overall experience. Data is considered a critical element of success for supply chains and should be one of the most critical areas to protect. In the supply chain industry, there are two major misconceptions about protecting data: (i) We do not manage or store confidential/personally identifiable information (PII). (ii) Reliance on Third-Party vendor security. These misconceptions can significantly derail organizational efforts to adequately protect data across environments. These statistics can be exciting yet overwhelming at the same time. The first misconception, “We do not manage or store confidential/personally identifiable information (PII)” is dangerous as it implies the organization does not have proper data literacy. Enterprise employees will zero in on the aspect of PII while neglecting trade secret theft and the complete breakdown of information sharing. To circumvent the first bullet point, the second bullet point forges an ideology that “Reliance on Third-Party vendor security” will absolve the company from security risk. Instead, third-party risk has grown over the last two years and is one of the major causes of data security breaches. It is important to understand that a holistic approach should be considered when protecting data which should not involve purchasing a Data Loss Prevention (DLP) tool. A tool is not a solution. To protect supply chain data, start by providing data literacy training to all employees and negotiating the security component of contracts with vendors to highlight data literacy training for individuals/teams that may access company data. It is also important to understand the origin of the data and its movement to include risk identification. Ensure processes effectively incorporate data security principles. Evaluate and select DLP solutions to address specific concerns/use cases in conjunction with data visibility. These approaches are part of a broader solutions framework called Data Security Assurance (DSA). The DSA Framework looks at all of the processes across the supply chain, including their corresponding architecture and workflows, employee data literacy, governance and controls, integration between third and fourth-party vendors, DLP as a solution concept, and policies related to data residency. Within cloud environments, this framework is crucial for the supply chain industry to avoid regulatory implications and third/fourth party risk.Keywords: security by design, data security architecture, cybersecurity framework, data security assurance
Procedia PDF Downloads 8933159 A Literature Review of Precision Agriculture: Applications of Diagnostic Diseases in Corn, Potato, and Rice Based on Artificial Intelligence
Authors: Carolina Zambrana, Grover Zurita
Abstract:
The food loss production that occurs in deficient agricultural production is one of the major problems worldwide. This puts the population's food security and the efficiency of farming investments at risk. It is to be expected that this food security will be achieved with the own and efficient production of each country. It will have an impact on the well-being of its population and, thus, also on food sovereignty. The production losses in quantity and quality occur due to the lack of efficient detection of diseases at an early stage. It is very difficult to solve the agriculture efficiency using traditional methods since it takes a long time to be carried out due to detection imprecision of the main diseases, especially when the production areas are extensive. Therefore, the main objective of this research study is to perform a systematic literature review, of the latest five years, of Precision Agriculture (PA) to be able to understand the state of the art of the set of new technologies, procedures, and optimization processes with Artificial Intelligence (AI). This study will focus on Corns, Potatoes, and Rice diagnostic diseases. The extensive literature review will be performed on Elsevier, Scopus, and IEEE databases. In addition, this research will focus on advanced digital imaging processing and the development of software and hardware for PA. The convolution neural network will be handling special attention due to its outstanding diagnostic results. Moreover, the studied data will be incorporated with artificial intelligence algorithms for the automatic diagnosis of crop quality. Finally, precision agriculture with technology applied to the agricultural sector allows the land to be exploited efficiently. This system requires sensors, drones, data acquisition cards, and global positioning systems. This research seeks to merge different areas of science, control engineering, electronics, digital image processing, and artificial intelligence for the development, in the near future, of a low-cost image measurement system that allows the optimization of crops with AI.Keywords: precision agriculture, convolutional neural network, deep learning, artificial intelligence
Procedia PDF Downloads 7933158 A Qualitative Assessment of the Internal Communication of the College of Comunication: Basis for a Strategic Communication Plan
Authors: Edna T. Bernabe, Joshua Bilolo, Sheila Mae Artillero, Catlicia Joy Caseda, Liezel Once, Donne Ynah Grace Quirante
Abstract:
Internal communication is significant for an organization to function to its full extent. A strategic communication plan builds an organization’s structure and makes it more systematic. Information is a vital part of communication inside the organization as this lays every possible outcome—be it positive or negative. It is, therefore, imperative to assess the communication structure of a particular organization to secure a better and harmonious communication environment in any organization. Thus, this research was intended to identify the internal communication channels used in Polytechnic University of the Philippines-College of Communication (PUP-COC) as an organization, to identify the flow of information specifically in downward, upward, and horizontal communication, to assess the accuracy, consistency, and timeliness of its internal communication channels; and to come up with a proposed strategic communication plan of information dissemination to improve the existing communication flow in the college. The researchers formulated a framework from Input-Throughout-Output-Feedback-Goal of General System Theory and gathered data to assess the PUP-COC’s internal communication. The communication model links the objectives of the study to know the internal organization of the college. The qualitative approach and case study as the tradition of inquiry were used to gather deeper understanding of the internal organizational communication in PUP-COC, using Interview, as the primary methods for the study. This was supported with a quantitative data which were gathered through survey from the students of the college. The researchers interviewed 17 participants: the College dean, the 4 chairpersons of the college departments, the 11 faculty members and staff, and the acting Student Council president. An interview guide and a standardized questionnaire were formulated as instruments to generate the data. After a thorough analysis of the study, it was found out that two-way communication flow exists in PUP-COC. The type of communication channel the internal stakeholders use varies as to whom a particular person is communicating with. The members of the PUP-COC community also use different types of communication channels depending on the flow of communication being used. Moreover, the most common types of internal communication are the letters and memoranda for downward communication, while letters, text messages, and interpersonal communication are often used in upward communication. Various forms of social media have been found out to be of use in horizontal communication. Accuracy, consistency, and timeliness play a significant role in information dissemination within the college. However, some problems have also been found out in the communication system. The most common problem are the delay in the dissemination of memoranda and letters and the uneven distribution of information and instruction to faculty, staff, and students. This has led the researchers to formulate a strategic communication plan which aims to propose strategies that will solve the communication problems that are being experienced by the internal stakeholders.Keywords: communication plan, downward communication, internal communication, upward communication
Procedia PDF Downloads 51833157 The Challenge of Assessing Social AI Threats
Authors: Kitty Kioskli, Theofanis Fotis, Nineta Polemi
Abstract:
The European Union (EU) directive Artificial Intelligence (AI) Act in Article 9 requires that risk management of AI systems includes both technical and human oversight, while according to NIST_AI_RFM (Appendix C) and ENISA AI Framework recommendations, claim that further research is needed to understand the current limitations of social threats and human-AI interaction. AI threats within social contexts significantly affect the security and trustworthiness of the AI systems; they are interrelated and trigger technical threats as well. For example, lack of explainability (e.g. the complexity of models can be challenging for stakeholders to grasp) leads to misunderstandings, biases, and erroneous decisions. Which in turn impact the privacy, security, accountability of the AI systems. Based on the NIST four fundamental criteria for explainability it can also classify the explainability threats into four (4) sub-categories: a) Lack of supporting evidence: AI systems must provide supporting evidence or reasons for all their outputs. b) Lack of Understandability: Explanations offered by systems should be comprehensible to individual users. c) Lack of Accuracy: The provided explanation should accurately represent the system's process of generating outputs. d) Out of scope: The system should only function within its designated conditions or when it possesses sufficient confidence in its outputs. Biases may also stem from historical data reflecting undesired behaviors. When present in the data, biases can permeate the models trained on them, thereby influencing the security and trustworthiness of the of AI systems. Social related AI threats are recognized by various initiatives (e.g., EU Ethics Guidelines for Trustworthy AI), standards (e.g. ISO/IEC TR 24368:2022 on AI ethical concerns, ISO/IEC AWI 42105 on guidance for human oversight of AI systems) and EU legislation (e.g. the General Data Protection Regulation 2016/679, the NIS 2 Directive 2022/2555, the Directive on the Resilience of Critical Entities 2022/2557, the EU AI Act, the Cyber Resilience Act). Measuring social threats, estimating the risks to AI systems associated to these threats and mitigating them is a research challenge. In this paper it will present the efforts of two European Commission Projects (FAITH and THEMIS) from the HorizonEurope programme that analyse the social threats by building cyber-social exercises in order to study human behaviour, traits, cognitive ability, personality, attitudes, interests, and other socio-technical profile characteristics. The research in these projects also include the development of measurements and scales (psychometrics) for human-related vulnerabilities that can be used in estimating more realistically the vulnerability severity, enhancing the CVSS4.0 measurement.Keywords: social threats, artificial Intelligence, mitigation, social experiment
Procedia PDF Downloads 6533156 A Review of Farmer Participation in Information and Communication Technology through Mobile Banking and Mobile Marketing in Rural Agricultural Systems
Authors: J. Cadby, K. Miyazawa
Abstract:
Information and Communication Technology (ICT) has been widely adopted into the agricultural landscape with advancements of mobile connectivity and data accessibility. In developed nations, mobile-technology is well integrated into marketing transactions, and also plays a crucial role in making data-driven decisions on-farm. In developing nations, mobile banking and access to agricultural extension services allow for informed decision-making and smoother transactions. In addition, the availability of updated and readily available market and climate data provides a negotiation platform, reducing economic risks for farmers worldwide. The total usage of mobile technology has risen over the past 20 years, and almost three-quarters of the world’s population subscribes to mobile technology. This study reviewed mobile technology integration into agricultural systems in developing and developed nations. Data from secondary sources were collected and investigated. The objectives of the study include a review of the success of mobile banking transactions in developing nations, and a review of application and SMS based services for direct marketing in both developed and developing nations. Rural farmers in developing countries with access to diverse m-banking options experienced increased access to farm investment resources with the use of mobile banking technology. Rural farmers involved in perishable crop production were also more likely to benefit from mobile platform sales participation. ICT programs reached through mobile application and SMS increased access to agricultural extension materials and marketing tools for demographics that faced literacy-challenges and isolated markets. As mobile technology becomes more ubiquitous in the global agricultural system, training and market opportunities to facilitate mobile usage in developing agricultural systems are necessary. Digital skills training programs are necessary in order to improve equal global adoption of ICT in agriculture.Keywords: market participation, mobile banking, mobile technology, rural farming
Procedia PDF Downloads 25533155 VeriFy: A Solution to Implement Autonomy Safely and According to the Rules
Authors: Michael Naderhirn, Marco Pavone
Abstract:
Problem statement, motivation, and aim of work: So far, the development of control algorithms was done by control engineers in a way that the controller would fit a specification by testing. When it comes to the certification of an autonomous car in highly complex scenarios, the challenge is much higher since such a controller must mathematically guarantee to implement the rules of the road while on the other side guarantee aspects like safety and real time executability. What if it becomes reality to solve this demanding problem by combining Formal Verification and System Theory? The aim of this work is to present a workflow to solve the above mentioned problem. Summary of the presented results / main outcomes: We show the usage of an English like language to transform the rules of the road into system specification for an autonomous car. The language based specifications are used to define system functions and interfaces. Based on that a formal model is developed which formally correctly models the specifications. On the other side, a mathematical model describing the systems dynamics is used to calculate the systems reachability set which is further used to determine the system input boundaries. Then a motion planning algorithm is applied inside the system boundaries to find an optimized trajectory in combination with the formal specification model while satisfying the specifications. The result is a control strategy which can be applied in real time independent of the scenario with a mathematical guarantee to satisfy a predefined specification. We demonstrate the applicability of the method in simulation driving scenarios and a potential certification. Originality, significance, and benefit: To the authors’ best knowledge, it is the first time that it is possible to show an automated workflow which combines a specification in an English like language and a mathematical model in a mathematical formal verified way to synthesizes a controller for potential real time applications like autonomous driving.Keywords: formal system verification, reachability, real time controller, hybrid system
Procedia PDF Downloads 24133154 Stabilizing Effect of Magnetic Field in a Thermally Modulated Porous Layer
Authors: M. Meenasaranya, S. Saravanan
Abstract:
Nonlinear stability analysis is carried out to determine the effect of surface temperature modulation in an infinite horizontal porous layer heated from below. The layer is saturated by an electrically conducting, viscous, incompressible and Newtonian fluid. The Brinkman model is used for momentum equation, and the Boussinesq approximation is invoked. The system is assumed to be bounded by rigid boundaries. The energy theory is implemented to find the global exponential stability region of the considered system. The results are analysed for arbitrary values of modulation frequency and amplitude. The existence of subcritical instability region is confirmed by comparing the obtained result with the known linear result. The vertical magnetic field is found to stabilize the system.Keywords: Brinkman model, energy method, magnetic field, surface temperature modulation
Procedia PDF Downloads 39533153 Data Security: An Enhancement of E-mail Security Algorithm to Secure Data Across State Owned Agencies
Authors: Lindelwa Mngomezulu, Tonderai Muchenje
Abstract:
Over the decades, E-mails provide easy, fast and timely communication enabling businesses and state owned agencies to communicate with their stakeholders and with their own employees in real-time. Moreover, since the launch of Microsoft office 365 and many other clouds based E-mail services, many businesses have been migrating from the on premises E-mail services to the cloud and more precisely since the beginning of the Covid-19 pandemic, there has been a significant increase of E-mails utilization, which then leads to the increase of cyber-attacks. In that regard, E-mail security has become very important in the E-mail transportation to ensure that the E-mail gets to the recipient without the data integrity being compromised. The classification of the features to enhance E-mail security for further from the enhanced cyber-attacks as we are aware that since the technology is advancing so at the cyber-attacks. Therefore, in order to maximize the data integrity we need to also maximize security of the E-mails such as enhanced E-mail authentication. The successful enhancement of E-mail security in the future may lessen the frequency of information thefts via E-mails, resulting in the data of South African State-owned agencies not being compromised.Keywords: e-mail security, cyber-attacks, data integrity, authentication
Procedia PDF Downloads 13633152 Removal of Nitrate and Phosphates from Waste Water Using Activated Bio-Carbon Produced from Agricultural Waste
Authors: Kgomotso Matobole, Natania De Wet, Tefo Mbambo, Hilary Rutto, Tumisang Seodigeng
Abstract:
Nitrogen and phosphorus are nutrients which are required in the ecosystem, however, at high levels, these nutrients contribute to the process of eutrophication in the receiving water bodies, which threatens aquatic organisms. Hence it is vital that they are removed before the water is discharged. This phenomenon increases the cost related to wastewater treatment. This raises the need for the development of processes that are cheaper. Activated biocarbon was used in batch and filtration system to remove nitrates and phosphates. The batch system has higher nutrients removal capabilities than the filtration system. For phosphate removal, 93 % removal is achieved at the adsorbent of 300 g while for nitrates, 84 % removal is achieved when 200 g of activated carbon is loaded.Keywords: waste water treatment, phosphates, nitrates, activated carbon, agricultural waste
Procedia PDF Downloads 41833151 Semi-Supervised Outlier Detection Using a Generative and Adversary Framework
Authors: Jindong Gu, Matthias Schubert, Volker Tresp
Abstract:
In many outlier detection tasks, only training data belonging to one class, i.e., the positive class, is available. The task is then to predict a new data point as belonging either to the positive class or to the negative class, in which case the data point is considered an outlier. For this task, we propose a novel corrupted Generative Adversarial Network (CorGAN). In the adversarial process of training CorGAN, the Generator generates outlier samples for the negative class, and the Discriminator is trained to distinguish the positive training data from the generated negative data. The proposed framework is evaluated using an image dataset and a real-world network intrusion dataset. Our outlier-detection method achieves state-of-the-art performance on both tasks.Keywords: one-class classification, outlier detection, generative adversary networks, semi-supervised learning
Procedia PDF Downloads 15133150 Do Women with Endometriosis Have Higher Perceived Stress Levels than Healthy Women?
Authors: Jodie Hughes
Abstract:
Endometriosis affects 1 in 10 individuals that were born female globally. Endometriosis incidence rates peak between 30-40 year of age, in young women and adolescents it is a rarely suspected and often ill-diagnosed. The average cost of endometriosis is €9,579 per woman. More than 75% of women have reported being absent from work due to endometriosis, with 40% of women becoming unemployed due to the disease. 46% of patients with endometriosis need to have appointments with upward of five doctors to gain a correct diagnosis. Quantitative data were collected by way of an online PSS-10 survey that included demographic questions from two sample groups of females, group 1 was females with endometriosis, group 2 were healthy women. The data were scored using Cohens scoring system, overall scores were input to SPSS. A non-parametric Mann-Whitney U test and ANOVA was used to ascertain any differences between the PSS-10 scores of the two groups. A significance level of P<0.05 was adopted. Four women were invited to take part in a semi structured interview that was recorded, transcribed and coded using interpretive phenomenological analysis (IPA) using NVivo 12. Results showed that the PSS-10 scores were significantly higher in women with endometriosis compared to healthy women with a p=<0.005. Endometriosis affects all aspects of a patient’s life, to adequately diagnose and treat the condition and improve HRQoL there needs to be better understanding of the clinical symptoms and how they impact the lives of patients.Keywords: endometriosis, HRQoL, perceived stress, women
Procedia PDF Downloads 13633149 Design and Control of a Knee Rehabilitation Device Using an MR-Fluid Brake
Authors: Mina Beheshti, Vida Shams, Mojtaba Esfandiari, Farzaneh Abdollahi, Abdolreza Ohadi
Abstract:
Most of the people who survive a stroke need rehabilitation tools to regain their mobility. The core function of these devices is a brake actuator. The goal of this study is to design and control a magnetorheological brake which can be used as a rehabilitation tool. In fact, the fluid used in this brake is called magnetorheological fluid or MR that properties can change by variation of the magnetic field. The braking properties can be set as control by using this feature of the fluid. In this research, different MR brake designs are first introduced in each design, and the dimensions of the brake have been determined based on the required torque for foot movement. To calculate the brake dimensions, it is assumed that the shear stress distribution in the fluid is uniform and the fluid is in its saturated state. After designing the rehabilitation brake, the mathematical model of the healthy movement of a healthy person is extracted. Due to the nonlinear nature of the system and its variability, various adaptive controllers, neural networks, and robust have been implemented to estimate the parameters and control the system. After calculating torque and control current, the best type of controller in terms of error and control current has been selected. Finally, this controller is implemented on the experimental data of the patient's movements, and the control current is calculated to achieve the desired torque and motion.Keywords: rehabilitation, magnetorheological fluid, knee, brake, adaptive control, robust control, neural network control, torque control
Procedia PDF Downloads 15133148 Solar Photovoltaic Driven Air-Conditioning for Commercial Buildings: A Case of Botswana
Authors: Taboka Motlhabane, Pradeep Sahoo
Abstract:
The global demand for cooling has grown exponentially over the past century to meet economic development and social needs, accounting for approximately 10% of the global electricity consumption. As global temperatures continue to rise, the demand for cooling and heating, ventilation and air-conditioning (HVAC) equipment is set to rise with it. The increased use of HVAC equipment has significantly contributed to the growth of greenhouse gas (GHG) emissions which aid the climate crisis- one of the biggest challenges faced by the current generation. The need to address emissions caused directly by HVAC equipment and electricity generated to meet the cooling or heating demand is ever more pressing. Currently, developed countries account for the largest cooling and heating demand, however developing countries are anticipated to experience a huge increase in population growth in 10 years, resulting in a shift in energy demand. Developing countries, which are projected to account for nearly 60% of the world's GDP by 2030, are rapidly building infrastructure and economies to meet their growing needs and meet these projections. Cooling, a very energy-intensive process that can account for 20 % to 75% of a building's energy, depending on the building's use. Solar photovoltaic (PV) driven air-conditioning offers a great cost-effective alternative for adoption in both residential and non-residential buildings to offset grid electricity, particularly in countries with high irradiation, such as Botswana. This research paper explores the potential of a grid-connected solar photovoltaic vapor-compression air-conditioning system for the Peter-Smith herbarium at the Okavango Research Institute (ORI) University of Botswana campus in Maun, Botswana. The herbarium plays a critical role in the collection and preservation of botanical data, dating back over 100 years, with pristine collection from the Okavango Delta, a UNESCO world heritage site and serves as a reference and research site. Due to the herbarium’s specific needs, it operates throughout the day and year in an attempt to maintain a constant herbarium temperature of 16°?. The herbarium model studied simulates a variable-air-volume HVAC system with a system rating of 30 kW. Simulation results show that the HVAC system accounts for 68.9% of the building's total electricity at 296 509.60 kWh annually. To offset the grid electricity, a 175.1 kWp nominal power rated PV system requiring 416 modules to match the required power, covering an area of 928 m2 is used to meet the HVAC system annual needs. An economic assessment using PVsyst found that for an installation priced with average solar PV prices in Botswana totalled to be 787 090.00 BWP, with annual operating costs of 30 500 BWP/year. With self-project financing, the project is estimated to have recouped its initial investment within 6.7 years. At an estimated project lifetime of 20 years, the Net Present Value is projected at 1 565 687.00 BWP with a ROI of 198.9%, with 74 070.67 tons of CO2 saved at the end of the project lifetime. This study investigates the performance of the HVAC system to meet the indoor air comfort requirements, the annual PV system performance, and the building model has been simulated using DesignBuilder Software.Keywords: vapor compression refrigeration, solar cooling, renewable energy, herbarium
Procedia PDF Downloads 12633147 Testing the Change in Correlation Structure across Markets: High-Dimensional Data
Authors: Malay Bhattacharyya, Saparya Suresh
Abstract:
The Correlation Structure associated with a portfolio is subjected to vary across time. Studying the structural breaks in the time-dependent Correlation matrix associated with a collection had been a subject of interest for a better understanding of the market movements, portfolio selection, etc. The current paper proposes a methodology for testing the change in the time-dependent correlation structure of a portfolio in the high dimensional data using the techniques of generalized inverse, singular valued decomposition and multivariate distribution theory which has not been addressed so far. The asymptotic properties of the proposed test are derived. Also, the performance and the validity of the method is tested on a real data set. The proposed test performs well for detecting the change in the dependence of global markets in the context of high dimensional data.Keywords: correlation structure, high dimensional data, multivariate distribution theory, singular valued decomposition
Procedia PDF Downloads 12533146 Teachers’ Attitudes and Techniques in EFL Writing in Secondary Schools in Egypt
Authors: Hosam Mohamed Darwish
Abstract:
In 2008, the Egyptian Ministry of Education introduced a new national coursebook ‘Hello for Secondary Schools, which recommends a shift in EFL teachers’ instructional practices. Since then, very little attention has been paid to teachers’ techniques in EFL writing classes. Hence, this study aimed at investigating teaching writing practices in secondary schools and exploring the teachers’ attitudes towards EFL writing skill in addition to exploring the difficulties that teachers encountered in EFL writing lessons. The study depended on data triangulation through administering two questionnaires: one to 44 teachers and the other to 24 students, and conducting semi-structured interviews with 11 teachers. Both teachers and students were asked to describe teaching practices in EFL writing classes while the open-ended questions and interviews collected data about the teachers’ difficulties in writing lessons. The questionnaires indicate that teachers have negative attitudes towards teaching writing, and most of their practices are still traditional. Five factors have influenced teachers’ practices: backwash of the test, teachers’ professional development, students’ culture of reading and large classes. The study recommends there has to be a necessary change in the students’ examination system, and ongoing teachers’ professional development should be considered. Finally, a teaching model and implications are suggested.Keywords: EFL writing, Egyptian secondary schools, teachers’ attitudes, teachers’ techniques
Procedia PDF Downloads 42133145 A Method Development for Improving the Efficiency of Solid Waste Collection System Using Network Analyst
Authors: Dhvanidevi N. Jadeja, Daya S. Kaul, Anurag A. Kandya
Abstract:
Municipal Solid Waste (MSW) collection in a city is performed in less effective manner which results in the poor management of the environment and natural resources. Municipal corporation does not possess efficient waste management and recycling programs because of the complex task involving many factors. Solid waste collection system depends upon various factors such as manpower, number and size of vehicles, transfer station size, dustbin size and weight, on-road traffic, and many others. These factors affect the collection cost, energy and overall municipal tax for the city. Generally, different types of waste are scattered throughout the city in a heterogeneous way that poses changes for efficient collection of solid waste. Efficient waste collection and transportation strategy must be effectively undertaken which will include optimization of routes, volume of waste, and manpower. Being these optimized, the overall cost can be reduced as the fuel and energy requirements would be less and also the municipal waste taxes levied will be less. To carry out the optimization study of collection system various data needs to be collected from the Ahmedabad municipal corporation such as amount of waste generated per day, number of workers, collection schedule, road maps, number of transfer station, location of transfer station, number of equipment (tractors, machineries), number of zones, route of collection etc. The ArcGis Network Analyst is introduced for the best routing identification applied in municipal waste collection. The simulation consists of scenarios of visiting loading spots in the municipality of Ahmedabad, considering dynamic factors like network traffic changes, closed roads due to natural or technical causes. Different routes were selected in a particular area of Ahmedabad city, and present routes were optimized to reduce the length of the routes, by using ArcGis Network Analyst. The result indicates up to 35% length minimization in the routes.Keywords: collection routes, efficiency, municipal solid waste, optimization
Procedia PDF Downloads 13633144 Friction Calculation and Simulation of Column Electric Power Steering System
Authors: Seyed Hamid Mirmohammad Sadeghi, Raffaella Sesana, Daniela Maffiodo
Abstract:
This study presents a procedure for friction calculation of column electric power steering (C-EPS) system which affects handling and comfort in driving. The friction losses estimation is obtained from experimental tests and mathematical calculation. Parts in C-EPS mainly involved in friction losses are bearings and worm gear. In the theoretical approach, the gear geometry and Hertz law were employed to measure the normal load and the sliding velocity and contact areas from the worm gears driving conditions. The viscous friction generated in the worm gear was obtained with a theoretical approach and the result was applied to model the friction in the steering system. Finally, by viscous friction coefficient and Coulomb friction coefficient, values of friction in worm gear were calculated. According to the Bearing Company and the characteristics of each bearing, the friction torques due to load and due to speed were calculated. A MATLAB Simulink model for calculating the friction in bearings and worm gear in C-EPS were done and the total friction value was estimated.Keywords: friction, worm gear, column electric power steering system, simulink, bearing, EPS
Procedia PDF Downloads 35833143 Development and Evaluation of a Portable Ammonia Gas Detector
Authors: Jaheon Gu, Wooyong Chung, Mijung Koo, Seonbok Lee, Gyoutae Park, Sangguk Ahn, Hiesik Kim, Jungil Park
Abstract:
In this paper, we present a portable ammonia gas detector for performing the gas safety management efficiently. The display of the detector is separated from its body. The display module is received the data measured from the detector using ZigBee. The detector has a rechargeable li-ion battery which can be use for 11~12 hours, and a Bluetooth module for sending the data to the PC or the smart devices. The data are sent to the server and can access using the web browser or mobile application. The range of the detection concentration is 0~100ppm.Keywords: ammonia, detector, gas, portable
Procedia PDF Downloads 41733142 5iD Viewer: Observation of Fish School Behaviour in Labyrinths and Use of Semantic and Syntactic Entropy for School Structure Definition
Authors: Dalibor Štys, Kryštof M. Stys, Maryia Chkalova, Petr Kouba, Aliaxandr Pautsina, Dalibor Štys Jr., Jana Pečenková, Denis Durniev, Tomáš Náhlík, Petr Císař
Abstract:
In this article, a construction and some properties of the 5iD viewer, the system recording simultaneously five views of a given experimental object is reported. Properties of the system are demonstrated on the analysis of fish schooling behavior. It is demonstrated the method of instrument calibration which allows inclusion of image distortion and it is proposed and partly tested also the method of distance assessment in the case that only two opposite cameras are available. Finally, we demonstrate how the state trajectory of the behavior of the fish school may be constructed from the entropy of the system.Keywords: 3D positioning, school behavior, distance calibration, space vision, space distortion
Procedia PDF Downloads 39033141 Modeling Route Selection Using Real-Time Information and GPS Data
Authors: William Albeiro Alvarez, Gloria Patricia Jaramillo, Ivan Reinaldo Sarmiento
Abstract:
Understanding the behavior of individuals and the different human factors that influence the choice when faced with a complex system such as transportation is one of the most complicated aspects of measuring in the components that constitute the modeling of route choice due to that various behaviors and driving mode directly or indirectly affect the choice. During the last two decades, with the development of information and communications technologies, new data collection techniques have emerged such as GPS, geolocation with mobile phones, apps for choosing the route between origin and destination, individual service transport applications among others, where an interest has been generated to improve discrete choice models when considering the incorporation of these developments as well as psychological factors that affect decision making. This paper implements a discrete choice model that proposes and estimates a hybrid model that integrates route choice models and latent variables based on the observation on the route of a sample of public taxi drivers from the city of Medellín, Colombia in relation to its behavior, personality, socioeconomic characteristics, and driving mode. The set of choice options includes the routes generated by the individual service transport applications versus the driver's choice. The hybrid model consists of measurement equations that relate latent variables with measurement indicators and utilities with choice indicators along with structural equations that link the observable characteristics of drivers with latent variables and explanatory variables with utilities.Keywords: behavior choice model, human factors, hybrid model, real time data
Procedia PDF Downloads 15233140 Development of a Shape Based Estimation Technology Using Terrestrial Laser Scanning
Authors: Gichun Cha, Byoungjoon Yu, Jihwan Park, Minsoo Park, Junghyun Im, Sehwan Park, Sujung Sin, Seunghee Park
Abstract:
The goal of this research is to estimate a structural shape change using terrestrial laser scanning. This study proceeds with development of data reduction and shape change estimation algorithm for large-capacity scan data. The point cloud of scan data was converted to voxel and sampled. Technique of shape estimation is studied to detect changes in structure patterns, such as skyscrapers, bridges, and tunnels based on large point cloud data. The point cloud analysis applies the octree data structure to speed up the post-processing process for change detection. The point cloud data is the relative representative value of shape information, and it used as a model for detecting point cloud changes in a data structure. Shape estimation model is to develop a technology that can detect not only normal but also immediate structural changes in the event of disasters such as earthquakes, typhoons, and fires, thereby preventing major accidents caused by aging and disasters. The study will be expected to improve the efficiency of structural health monitoring and maintenance.Keywords: terrestrial laser scanning, point cloud, shape information model, displacement measurement
Procedia PDF Downloads 23533139 Self-Calibration of Fish-Eye Camera for Advanced Driver Assistance Systems
Authors: Atef Alaaeddine Sarraj, Brendan Jackman, Frank Walsh
Abstract:
Tomorrow’s car will be more automated and increasingly connected. Innovative and intuitive interfaces are essential to accompany this functional enrichment. For that, today the automotive companies are competing to offer an advanced driver assistance system (ADAS) which will be able to provide enhanced navigation, collision avoidance, intersection support and lane keeping. These vision-based functions require an accurately calibrated camera. To achieve such differentiation in ADAS requires sophisticated sensors and efficient algorithms. This paper explores the different calibration methods applicable to vehicle-mounted fish-eye cameras with arbitrary fields of view and defines the first steps towards a self-calibration method that adequately addresses ADAS requirements. In particular, we present a self-calibration method after comparing different camera calibration algorithms in the context of ADAS requirements. Our method gathers data from unknown scenes while the car is moving, estimates the camera intrinsic and extrinsic parameters and corrects the wide-angle distortion. Our solution enables continuous and real-time detection of objects, pedestrians, road markings and other cars. In contrast, other camera calibration algorithms for ADAS need pre-calibration, while the presented method calibrates the camera without prior knowledge of the scene and in real-time.Keywords: advanced driver assistance system (ADAS), fish-eye, real-time, self-calibration
Procedia PDF Downloads 252