Search results for: RLS identification algorithm
2040 Tape-Shaped Multiscale Fiducial Marker: A Design Prototype for Indoor Localization
Authors: Marcell Serra de Almeida Martins, Benedito de Souza Ribeiro Neto, Gerson Lima Serejo, Carlos Gustavo Resque Dos Santos
Abstract:
Indoor positioning systems use sensors such as Bluetooth, ZigBee, and Wi-Fi, as well as cameras for image capture, which can be fixed or mobile. These computer vision-based positioning approaches are low-cost to implement, mainly when it uses a mobile camera. The present study aims to create a design of a fiducial marker for a low-cost indoor localization system. The marker is tape-shaped to perform a continuous reading employing two detection algorithms, one for greater distances and another for smaller distances. Therefore, the location service is always operational, even with variations in capture distance. A minimal localization and reading algorithm were implemented for the proposed marker design, aiming to validate it. The accuracy tests consider readings varying the capture distance between [0.5, 10] meters, comparing the proposed marker with others. The tests showed that the proposed marker has a broader capture range than the ArUco and QRCode, maintaining the same size. Therefore, reducing the visual pollution and maximizing the tracking since the ambient can be covered entirely.Keywords: multiscale recognition, indoor localization, tape-shaped marker, fiducial marker
Procedia PDF Downloads 1342039 Elder Abuse: An Exploration of China, the United States, and Israel’s Perspectives on Elder Abuse and What Their Differences Reveal about Its Underreported Nature
Authors: Sydney Burnett
Abstract:
The history of the relationship between elder abuse and its tendency to go underreported is rooted in the oppressive nature of ageism and victimization. Approximately 8% of the world's population was aged sixty or over in 1950, whereas, in 2020, the number more than doubled to 16.9%. By 2050, that number is expected to reach 22%. Although difficult for individuals of any age to feel completely supported in society, this task proves especially difficult for the elderly demographic. And as the elderly population continues to grow, the systemic abuse and neglect that this group encounters, and thus its underreported nature, multiply at a similar rate. Although a recent increase in awareness has initiated stronger efforts towards addressing the meager resources, processes, and personnel present to manage elder abuse, both reported and unreported, the destructive complexities of ageism and victimization persist. Examining the byproducts of the rapidly growing elderly demographic in China, the United States, and Israel, in cohesion with the inherent challenges in the context of terminology, definition, and typologies of elder abuse should provide insight into the pernicious influences of elder abuse that contribute to the non-identification and non-recognition of elder maltreatment present in these three countries in different stages of development. This investigation aims to understand the intricacy of elder abuse and its correlation to a lack of acknowledgment as well as its consequences in society by exploring the variation between China, the United States, and Israel's attitudes surrounding the subject. Furthermore, the systemic abuse and neglect embedded in global ageism can be revealed by the differences between the three countries' approaches to reporting elder abuse.Keywords: elder abuse, ageism, mistreatment, underreported
Procedia PDF Downloads 912038 On the Construction of Some Optimal Binary Linear Codes
Authors: Skezeer John B. Paz, Ederlina G. Nocon
Abstract:
Finding an optimal binary linear code is a central problem in coding theory. A binary linear code C = [n, k, d] is called optimal if there is no linear code with higher minimum distance d given the length n and the dimension k. There are bounds giving limits for the minimum distance d of a linear code of fixed length n and dimension k. The lower bound which can be taken by construction process tells that there is a known linear code having this minimum distance. The upper bound is given by theoretic results such as Griesmer bound. One way to find an optimal binary linear code is to make the lower bound of d equal to its higher bound. That is, to construct a binary linear code which achieves the highest possible value of its minimum distance d, given n and k. Some optimal binary linear codes were presented by Andries Brouwer in his published table on bounds of the minimum distance d of binary linear codes for 1 ≤ n ≤ 256 and k ≤ n. This was further improved by Markus Grassl by giving a detailed construction process for each code exhibiting the lower bound. In this paper, we construct new optimal binary linear codes by using some construction processes on existing binary linear codes. Particularly, we developed an algorithm applied to the codes already constructed to extend the list of optimal binary linear codes up to 257 ≤ n ≤ 300 for k ≤ 7.Keywords: bounds of linear codes, Griesmer bound, construction of linear codes, optimal binary linear codes
Procedia PDF Downloads 7552037 Effect of Biostimulants on Downstream Processing of Endophytic Fungi Hosted in Aromatic Plant, Ocimum basicilium
Authors: Kanika Chowdhary, Satyawati Sharma
Abstract:
Endophytic microbes are hosted inside plants in a symbiotic and hugely benefitting relationship. Exploring agriculturally beneficial endophytes is quite a prospective field of research. In the present work fungal endophytes associated with aromatic plant Ocimum basicilium L. were investigated for biocontrol potential. The anti-plant pathogenic activity of fungal endophytes was tested against causal agent of stem rot Sclerotinia sclerotiorum. 75 endophytic fungi were recovered through culture-dependent approach. Fungal identification was performed both microscopically and by rDNA ITS sequencing. Curvuaria lunata (Sb-6) and Colletotrichum lindemuthianum (Sb-8) inhibited 86% and 72% mycelia growth of S. sclerotinia on Sabouraud dextrose agar medium at 7.4 pH. Small-scale fermentation was carried out on sterilised oatmeal grain medium. In another set of experiment, fungi were grown in oatmeal grain medium amended with certain biostimulants such as aqueous seaweed extract (10% v/w); methanolic seaweed extract (5% v/w); cow urine (20% v/w); biochar (10% w/w) in triplicate along with control of each to ascertain the degree of metabolic difference and anti-plant pathogenic activity induced. Phytochemically extracts of both the fungal isolates showed the presence of flavanoids, phenols, tannins, alkaloids and terpenoids. Ethylacetate extract of C. lunata and C. lindemuthianum suppressed S. sclerotinia conidial germination at IC50 values of 0.514± 0.02 and 0.913± 0.04 mg/ml. Therefore, fungal endophytes of O. basicilium are highly promising bio-resource agent, which can be developed further for sustainable agriculture.Keywords: endophytic fungi, ocimum basicilium, sclerotinia sclerotiorum, biostimulants
Procedia PDF Downloads 1762036 Improving Cryptographically Generated Address Algorithm in IPv6 Secure Neighbor Discovery Protocol through Trust Management
Authors: M. Moslehpour, S. Khorsandi
Abstract:
As transition to widespread use of IPv6 addresses has gained momentum, it has been shown to be vulnerable to certain security attacks such as those targeting Neighbor Discovery Protocol (NDP) which provides the address resolution functionality in IPv6. To protect this protocol, Secure Neighbor Discovery (SEND) is introduced. This protocol uses Cryptographically Generated Address (CGA) and asymmetric cryptography as a defense against threats on integrity and identity of NDP. Although SEND protects NDP against attacks, it is computationally intensive due to Hash2 condition in CGA. To improve the CGA computation speed, we parallelized CGA generation process and used the available resources in a trusted network. Furthermore, we focused on the influence of the existence of malicious nodes on the overall load of un-malicious ones in the network. According to the evaluation results, malicious nodes have adverse impacts on the average CGA generation time and on the average number of tries. We utilized a Trust Management that is capable of detecting and isolating the malicious node to remove possible incentives for malicious behavior. We have demonstrated the effectiveness of the Trust Management System in detecting the malicious nodes and hence improving the overall system performance.Keywords: CGA, ICMPv6, IPv6, malicious node, modifier, NDP, overall load, SEND, trust management
Procedia PDF Downloads 1842035 Spacio-Temporal Variation of the Zooplanktonic Community of Esa-Odo Reservoir, Esa-Odo, Osun State, Nigeria
Authors: Helen Yetunde Omoboye, Adebukola Adenike Adedeji, Israel Funso Adeniyi
Abstract:
This study of the biodiversity, community structure, and production capacity of the zooplankton community is an aspect of bio-monitoring of the aquatic ecosystem. Samples were selected horizontally and vertically from Esa-Odo Reservoir using improvised Meyer’s water sampler. Planktonic samples were collected at two months intervals for two years. Net and total plankton were sampled by filtration and sedimentation methods. Planktonic samples were preserved as 5% formalin and 1% Lugol’s solution. Measurement, enumeration, and scaled pictures of the recorded zooplankton were taken using a photomicrograph. The taxonomic composition of zooplankton biota was determined using identification keys. Eighty three (83) species of zooplankton recorded in this study belong to 4 groups: Rotifera, Cladocera, Copepoda, and Insecta. Rotifera was the most represented group (61.21%). Horizontally, 24 species with the highest mean abundance characterized the lacustrine; while 12 species and 10 species were unique to the transition and riverine zones, respectively. Vertically, most species had their mean abundance decreased from the surface to the bottom of the reservoir. A total of nine (9), two (2), and one (1) species were peculiar to the surface, bottom and mid-depth, respectively. Zooplankton was most abundant during the dry season. In conclusion, Esa-Odo Reservoir comprised highly diversified zooplankton fauna with great potential to support a rich aquatic community and fishery production. The reservoir can be classified as fairly clean based on the abundance of the rotifer group. However, the lake should be subjected to regular proper monitoring because of the presence of some pollution tolerant copepod species identified among the zooplankton fauna.Keywords: zooplankton, spatial, temporal, abundance, biodiversity, reservoir
Procedia PDF Downloads 972034 Steepest Descent Method with New Step Sizes
Authors: Bib Paruhum Silalahi, Djihad Wungguli, Sugi Guritman
Abstract:
Steepest descent method is a simple gradient method for optimization. This method has a slow convergence in heading to the optimal solution, which occurs because of the zigzag form of the steps. Barzilai and Borwein modified this algorithm so that it performs well for problems with large dimensions. Barzilai and Borwein method results have sparked a lot of research on the method of steepest descent, including alternate minimization gradient method and Yuan method. Inspired by previous works, we modified the step size of the steepest descent method. We then compare the modification results against the Barzilai and Borwein method, alternate minimization gradient method and Yuan method for quadratic function cases in terms of the iterations number and the running time. The average results indicate that the steepest descent method with the new step sizes provide good results for small dimensions and able to compete with the results of Barzilai and Borwein method and the alternate minimization gradient method for large dimensions. The new step sizes have faster convergence compared to the other methods, especially for cases with large dimensions.Keywords: steepest descent, line search, iteration, running time, unconstrained optimization, convergence
Procedia PDF Downloads 5402033 Criticality Assessment of Power Transformer by Using Entropy Weight Method
Authors: Rattanakorn Phadungthin, Juthathip Haema
Abstract:
This research presents an assessment of the criticality of the substation's power transformer using the Entropy Weight method to enable more effective maintenance planning. Typically, transformers fail due to heat, electricity, chemical reactions, mechanical stress, and extreme climatic conditions. Effective monitoring of the insulating oil is critical to prevent transformer failure. However, finding appropriate weights for dissolved gases is a major difficulty due to the lack of a defined baseline and the requirement for subjective expert opinion. To decrease expert prejudice and subjectivity, the Entropy Weight method is used to optimise the weightings of eleven key dissolved gases. The algorithm to assess the criticality operates through five steps: create a decision matrix, normalise the decision matrix, compute the entropy, calculate the weight, and calculate the criticality score. This study not only optimises gas weighing but also greatly minimises the need for expert judgment in transformer maintenance. It is expected to improve the efficiency and reliability of power transformers so failures and related economic costs are minimized. Furthermore, maintenance schemes and ranking are accomplished appropriately when the assessment of criticality is reached.Keywords: criticality assessment, dissolved gas, maintenance scheme, power transformer
Procedia PDF Downloads 82032 Occurrence of Foreign Matter in Food: Applied Identification Method - Association of Official Agricultural Chemists (AOAC) and Food and Drug Administration (FDA)
Authors: E. C. Mattos, V. S. M. G. Daros, R. Dal Col, A. L. Nascimento
Abstract:
The aim of this study is to present the results of a retrospective survey on the foreign matter found in foods analyzed at the Adolfo Lutz Institute, from July 2001 to July 2015. All the analyses were conducted according to the official methods described on Association of Official Agricultural Chemists (AOAC) for the micro analytical procedures and Food and Drug Administration (FDA) for the macro analytical procedures. The results showed flours, cereals and derivatives such as baking and pasta products were the types of food where foreign matters were found more frequently followed by condiments and teas. Fragments of stored grains insects, its larvae, nets, excrement, dead mites and rodent excrement were the most foreign matter found in food. Besides, foreign matters that can cause a physical risk to the consumer’s health such as metal, stones, glass, wood were found but rarely. Miscellaneous (shell, sand, dirt and seeds) were also reported. There are a lot of extraneous materials that are considered unavoidable since are something inherent to the product itself, such as insect fragments in grains. In contrast, there are avoidable extraneous materials that are less tolerated because it is preventable with the Good Manufacturing Practice. The conclusion of this work is that although most extraneous materials found in food are considered unavoidable it is necessary to keep the Good Manufacturing Practice throughout the food processing as well as maintaining a constant surveillance of the production process in order to avoid accidents that may lead to occurrence of these extraneous materials in food.Keywords: extraneous materials, food contamination, foreign matter, surveillance
Procedia PDF Downloads 3592031 Identification of Spam Keywords Using Hierarchical Category in C2C E-Commerce
Authors: Shao Bo Cheng, Yong-Jin Han, Se Young Park, Seong-Bae Park
Abstract:
Consumer-to-Consumer (C2C) E-commerce has been growing at a very high speed in recent years. Since identical or nearly-same kinds of products compete one another by relying on keyword search in C2C E-commerce, some sellers describe their products with spam keywords that are popular but are not related to their products. Though such products get more chances to be retrieved and selected by consumers than those without spam keywords, the spam keywords mislead the consumers and waste their time. This problem has been reported in many commercial services like e-bay and taobao, but there have been little research to solve this problem. As a solution to this problem, this paper proposes a method to classify whether keywords of a product are spam or not. The proposed method assumes that a keyword for a given product is more reliable if the keyword is observed commonly in specifications of products which are the same or the same kind as the given product. This is because that a hierarchical category of a product in general determined precisely by a seller of the product and so is the specification of the product. Since higher layers of the hierarchical category represent more general kinds of products, a reliable degree is differently determined according to the layers. Hence, reliable degrees from different layers of a hierarchical category become features for keywords and they are used together with features only from specifications for classification of the keywords. Support Vector Machines are adopted as a basic classifier using the features, since it is powerful, and widely used in many classification tasks. In the experiments, the proposed method is evaluated with a golden standard dataset from Yi-han-wang, a Chinese C2C e-commerce, and is compared with a baseline method that does not consider the hierarchical category. The experimental results show that the proposed method outperforms the baseline in F1-measure, which proves that spam keywords are effectively identified by a hierarchical category in C2C e-commerce.Keywords: spam keyword, e-commerce, keyword features, spam filtering
Procedia PDF Downloads 2942030 Assessment of Delirium, It's Possible Risk Factors and Outcome in Patient Admitted in Medical Intensive Care Unit
Authors: Rupesh K. Chaudhary, Narinder P. Jain, Rajesh Mahajan, Rajat Manchanda
Abstract:
Introduction: Delirium is a complex, multifactorial neuropsychiatric syndrome comprising a broad range of cognitive and neurobehavioral symptoms. In critically ill patients, it may develop secondary to multiple predisposing factors. Although it can be transient and irreversible but if left untreated may lead to long term cognitive dysfunction. Early identification and assessment of risk factors usually help in appropriate management of delirium which in turn leads to decreased hospital stay, cost of therapy and mortality. Aim and Objective: Aim of the present study was to estimate the incidence of delirium using a validated scale in medical ICU patients and to determine the associated risk factors and outcomes. Material and Method: A prospective study in an 18-bed medical-intensive care unit (ICU) was undertaken. A total of 357 consecutive patients admitted to ICU for more than 24 hours were assessed. These patients were screened with the help of Confusion Assessment Method for Intensive Care Unit -CAM-ICU, Richmond Agitation and Sedation Scale, Screening Checklist for delirium and APACHE II. Appropiate statistical analysis was done to evaluate the risk factors influencing mortality in delirium. Results: Delirium occurred in 54.6% of 194 patients. Risk of delirium was independently associated with a history of hypertension, diabetes but not with severity of illness APACHE II score. Delirium was linked to longer ICU stay 13.08 ± 9.6 ver 7.07 ± 4.98 days, higher ICU mortality (35.8% % vs. 17.0%). Conclusion: Our study concluded that delirium poses a great risk factor in the outcome of the patient and carries high mortality, so a timely intervention helps in addressing these issues.Keywords: delirium, risk factors, outcome, intervention
Procedia PDF Downloads 1632029 Evaluation of Cyclic Thermo-Mechanical Responses of an Industrial Gas Turbine Rotor
Authors: Y. Rae, A. Benaarbia, J. Hughes, Wei Sun
Abstract:
This paper describes an elasto-visco-plastic computational modelling method which can be used to assess the cyclic plasticity responses of high temperature structures operating under thermo-mechanical loadings. The material constitutive equation used is an improved unified multi-axial Chaboche-Lemaitre model, which takes into account non-linear kinematic and isotropic hardening. The computational methodology is a three-dimensional framework following an implicit formulation and based on a radial return mapping algorithm. The associated user material (UMAT) code is developed and calibrated across isothermal hold-time low cycle fatigue tests for a typical turbine rotor steel for use in finite element (FE) implementation. The model is applied to a realistic industrial gas turbine rotor, where the study focuses its attention on the deformation heterogeneities and critical high stress areas within the rotor structure. The potential improvements of such FE visco-plastic approach are discussed. An integrated life assessment procedure based on R5 and visco-plasticity modelling, is also briefly addressed.Keywords: unified visco-plasticity, thermo-mechanical, turbine rotor, finite element modelling
Procedia PDF Downloads 1302028 Optimal Scheduling of Load and Operational Strategy of a Load Aggregator to Maximize Profit with PEVs
Authors: Md. Shafiullah, Ali T. Al-Awami
Abstract:
This project proposes optimal scheduling of imported power of a load aggregator with the utilization of EVs to maximize its profit. As with the increase of renewable energy resources, electricity price in competitive market becomes more uncertain and, on the other hand, with the penetration of renewable distributed generators in the distribution network the predicted load of a load aggregator also becomes uncertain in real time. Though there is uncertainties in both load and price, the use of EVs storage capacity can make the operation of load aggregator flexible. LA submits its offer to day-ahead market based on predicted loads and optimized use of its EVs to maximize its profit, as well as in real time operation it uses its energy storage capacity in such a way that it can maximize its profit. In this project, load aggregators profit maximization algorithm is formulated and the optimization problem is solved with the help of CVX. As in real time operation the forecasted loads differ from actual load, the mismatches are settled in real time balancing market. Simulation results compare the profit of a load aggregator with a hypothetical group of 1000 EVs and without EVs.Keywords: CVX, electricity market, load aggregator, load and price uncertainties, profit maximization, real time balancing operation
Procedia PDF Downloads 4162027 Assessment of Forage Utilization for Pasture-Based Livestock Production in Udubo Grazing Reserve, Bauchi State
Authors: Mustapha Saidu, Bilyaminu Mohammed
Abstract:
The study was conducted in Udubo Grazing Reserve between July 2019 and October 2019 to assess forage utilization for pasture-based livestock production in reserve. The grazing land was cross-divided into grids, where 15 coordinates were selected as the sample points. Grids of one-kilometer interval were made. The grids were systematically selected 1 grid after 7 grids. 1 × 1-meter quadrat was made at the coordinate of the selected grids for measurement, estimation, and sample collection. The results of the study indicated that Zornia glochidiatah has the highest percent of species composition (42%), while Mitracarpus hirtus has the lowest percent (0.1%). Urochloa mosambicensis has 48 percent of height removed and 27 percent used by weight, Zornia glochidiata 60 percent of height removed and 57 percent used by weight, Alysicapus veginalis has 55 percent of height removed, and 40 percent used by weight, and Cenchrus biflorus has 40 percent of height removed and 28 percent used by weight. The target is 50 percent utilization of forage by weight during a grazing period as well as at the end of the grazing season. The study found that Orochloa mosambicensis, Alysicarpus veginalis, and Cenchrus biflorus had lower percent by weight which is normal, while Zornia glochidiata had a higher percent by weight which is an indication of danger. The study recommends that the identification of key plant species in pasture and rangeland is critical to implementing a successful grazing management plan. There should be collective action and promotion of historically generated grazing knowledge through public and private advocacies.Keywords: forage, grazing reserve, live stock, pasture, plant species
Procedia PDF Downloads 892026 Introduction to Various Innovative Techniques Suggested for Seismic Hazard Assessment
Authors: Deepshikha Shukla, C. H. Solanki, Mayank K. Desai
Abstract:
Amongst all the natural hazards, earthquakes have the potential for causing the greatest damages. Since the earthquake forces are random in nature and unpredictable, the quantification of the hazards becomes important in order to assess the hazards. The time and place of a future earthquake are both uncertain. Since earthquakes can neither be prevented nor be predicted, engineers have to design and construct in such a way, that the damage to life and property are minimized. Seismic hazard analysis plays an important role in earthquake design structures by providing a rational value of input parameter. In this paper, both mathematical, as well as computational methods adopted by researchers globally in the past five years, will be discussed. Some mathematical approaches involving the concepts of Poisson’s ratio, Convex Set Theory, Empirical Green’s Function, Bayesian probability estimation applied for seismic hazard and FOSM (first-order second-moment) algorithm methods will be discussed. Computational approaches and numerical model SSIFiBo developed in MATLAB to study dynamic soil-structure interaction problem is discussed in this paper. The GIS-based tool will also be discussed which is predominantly used in the assessment of seismic hazards.Keywords: computational methods, MATLAB, seismic hazard, seismic measurements
Procedia PDF Downloads 3402025 Assessment of Airtightness Through a Standardized Procedure in a Nearly-Zero Energy Demand House
Authors: Mar Cañada Soriano, Rafael Royo-Pastor, Carolina Aparicio-Fernández, Jose-Luis Vivancos
Abstract:
The lack of insulation, along with the existence of air leakages, constitute a meaningful impact on the energy performance of buildings. Both of them lead to increases in the energy demand through additional heating and/or cooling loads. Additionally, they cause thermal discomfort. In order to quantify these uncontrolled air currents, pressurization and depressurization tests can be performed. Among them, the Blower Door test is a standardized procedure to determine the airtightness of a space which characterizes the rate of air leakages through the envelope surface, calculating to this purpose an air flow rate indicator. In this sense, the low-energy buildings complying with the Passive House design criteria are required to achieve high levels of airtightness. Due to the invisible nature of air leakages, additional tools are often considered to identify where the infiltrations take place. Among them, the infrared thermography entails a valuable technique to this purpose since it enables their detection. The aim of this study is to assess the airtightness of a typical Mediterranean dwelling house located in the Valencian orchad (Spain) restored under the Passive House standard using to this purpose the blower-door test. Moreover, the building energy performance modelling tools TRNSYS (TRaNsient System Simulation program) and TRNFlow (TRaNsient Flow) have been used to determine its energy performance, and the infiltrations’ identification was carried out by means of infrared thermography. The low levels of infiltrations obtained suggest that this house may comply with the Passive House standard.Keywords: airtightness, blower door, trnflow, infrared thermography
Procedia PDF Downloads 1232024 Quantum Decision Making with Small Sample for Network Monitoring and Control
Authors: Tatsuya Otoshi, Masayuki Murata
Abstract:
With the development and diversification of applications on the Internet, applications that require high responsiveness, such as video streaming, are becoming mainstream. Application responsiveness is not only a matter of communication delay but also a matter of time required to grasp changes in network conditions. The tradeoff between accuracy and measurement time is a challenge in network control. We people make countless decisions all the time, and our decisions seem to resolve tradeoffs between time and accuracy. When making decisions, people are known to make appropriate choices based on relatively small samples. Although there have been various studies on models of human decision-making, a model that integrates various cognitive biases, called ”quantum decision-making,” has recently attracted much attention. However, the modeling of small samples has not been examined much so far. In this paper, we extend the model of quantum decision-making to model decision-making with a small sample. In the proposed model, the state is updated by value-based probability amplitude amplification. By analytically obtaining a lower bound on the number of samples required for decision-making, we show that decision-making with a small number of samples is feasible.Keywords: quantum decision making, small sample, MPEG-DASH, Grover's algorithm
Procedia PDF Downloads 792023 Synthesis and Characterization of Cellulose-Based Halloysite-Carbon Adsorbent
Authors: Laura Frydel, Piotr M. Slomkiewicz, Beata Szczepanik
Abstract:
Triclosan has been used as a disinfectant in many medical products, such as: hand disinfectant soaps, creams, mouthwashes, pastes and household cleaners. Due to its strong antimicrobial activity, triclosan is becoming more and more popular and the consumption of disinfectants with triclosan in it is increasing. As a result, this compound increasingly finds its way into waters and soils in an unchanged form, pollutes the environment and may have a negative effect on organisms. The aim of this study was to investigate the synthesis of cellulose-based halloysite-carbon adsorbent and perform its characterization. The template in the halloysite-carbon adsorbent was halloysite nanotubes and the carbon precursor was microcrystalline cellulose. Scanning electron microscope (SEM) images were obtained and the elementary composition (qualitative and quantitative) of the sample was determined by energy dispersion spectroscopy (EDS). The identification of the crystallographic composition of the halloysite nanotubes and the sample of the halloysite-carbon composite was carried out using the X-ray powder diffraction (XRPD) method. The FTIR spectra were acquired before and after the adsorption process in order to determine the functional groups on the adsorbent surface and confirm the interactions between adsorbent and adsorbate molecules. The parameters of the porous structure of the adsorbent, such as the specific surface area (Brunauer-Emmett-Teller method), the total pore volume and the volume of mesopores and micropores were determined. Total carbon and total organic carbon were also determined in the samples. A cellulose-based halloysite-carbon adsorbent was used to remove triclosan from water. The degree of removal of triclosan from water was approximately 90%. The results indicate that the halloysite-carbon composite can be successfully used as an effective adsorbent for removing triclosan from water.Keywords: Adsorption, cellulose, halloysite, triclosan
Procedia PDF Downloads 1282022 Pride and Prejudice in Higher Education: Countering Elitist Perspectives in the Curriculum at Imperial College London
Authors: Mark R. Skopec, Hamdi M. Issa, Henock B. Taddese, Kate Ippolito, Matthew J. Harris
Abstract:
In peer review, there is a skew toward research from high-income countries, otherwise known as geographic bias. Research from well-known and prestigious institutions is often favored in the peer review process and is more frequently cited in biomedical research. English clinicians have been found to rate research from low-income countries worse compared to the same research presented as if from high-income countries. This entrenched bias, which is rooted in the perceived superiority of academic institutions in high-income countries is damaging in many regards. Crucially, it reinforces colonial roots by strengthening the dominance of knowledge bases in high-income contexts and perpetuates the perceived inferiority of research from low-income settings. We report on the interventions that Imperial College London is conducting to “decolonize” the higher education curriculum – a root and branch review of reading material in the Masters of Public Health course; identification of unconscious bias against low-income country research in faculty and staff; in-depth interviews with faculty members on their experiences and practices with respect to inclusion of low-income country research in their own teaching and learning practice; and exploring issues surrounding entrenched biases and structural impediments for enabling desirable changes. We intend to use these findings to develop frameworks and approaches, including workshops and online resources, to effect sustainable changes to diversify the curriculum at Imperial College London.Keywords: curriculum design, diversity, geographic bias, higher education, implicit associations, inclusivity
Procedia PDF Downloads 1712021 Relationship between Strategic Management and Organizational Culture in Sport Organization (Case Study: Selected Sport Federations of Islamic Republic of Iran)
Authors: Mohammad Ali Ghareh, Habib Honari, Alireza Ahmadi
Abstract:
The aim of this study was to investigate the relationship between strategic management and organizational culture in sport federations of Islamic Republic of Iran. Strategic management is a set of decisions and actions which define the long term performance of an organization. Organizational culture can be considered as an identity for every organization and somehow gives an identification to organization members. Organizational culture result in a certain commitments in organization members which is more valuable than individual profits and interests. The method of research was descriptive and correlational, conducted as a field study. The statistical population consisted of the employees of 10 sports federations and 170 persons were selected as sample. For data gathering, Barringer and Bluedorn’s strategic management questionnaire (1999) and Sakyn’s organizational culture questionnaire (2001) were used. The reliability of the questionnaires were 0.82 and 0.80 respectively, and the validity was approved by 8 experienced professors in sport management. To analyze data, KS (Kolmogorov–Smirnov) test and Pearson's coefficient were used. The results have shown that there is a significant meaningful relationship between strategic management and organizational culture (p < 0.05, r= 0.62). Beside this, there is a positive relationship between strategic management variables including scanning intensity, planning flexibility, locus of planning, planning horizon, strategic controls, and organizational culture (p < 0.05). Based on this research result it can be derived that strategic management planning and operation in terms of appropriate organizational culture is more applicable. By agreeing on their values and beliefs, adaptation to changes, caring about the individualities, coordination in tasks, modifying the individual and organizational goals, the federations will be able to achieve their strategic goals.Keywords: strategic management, organizational culture, sports federations, Islamic Republic of Iran
Procedia PDF Downloads 3742020 Adaptive Anchor Weighting for Improved Localization with Levenberg-Marquardt Optimization
Authors: Basak Can
Abstract:
This paper introduces an iterative and weighted localization method that utilizes a unique cost function formulation to significantly enhance the performance of positioning systems. The system employs locators, such as Gateways (GWs), to estimate and track the position of an End Node (EN). Performance is evaluated relative to the number of locators, with known locations determined through calibration. Performance evaluation is presented utilizing low cost single-antenna Bluetooth Low Energy (BLE) devices. The proposed approach can be applied to alternative Internet of Things (IoT) modulation schemes, as well as Ultra WideBand (UWB) or millimeter-wave (mmWave) based devices. In non-line-of-sight (NLOS) scenarios, using four or eight locators yields a 95th percentile localization performance of 2.2 meters and 1.5 meters, respectively, in a 4,305 square feet indoor area with BLE 5.1 devices. This method outperforms conventional RSSI-based techniques, achieving a 51% improvement with four locators and a 52 % improvement with eight locators. Future work involves modeling interference impact and implementing data curation across multiple channels to mitigate such effects.Keywords: lateration, least squares, Levenberg-Marquardt algorithm, localization, path-loss, RMS error, RSSI, sensors, shadow fading, weighted localization
Procedia PDF Downloads 252019 Assessment of Lactic Acid Bacteria of Probiotic Potentials in Dairy Produce in Saudi Arabia
Authors: Rashad R. Al-Hindi
Abstract:
The aim of this study was to isolate and identify lactic acid bacteria and evaluate their therapeutic and food preservation importance. Ninety-three suspected lactic acid bacteria (LAB) were isolated from thirteen different raw and fermented milk of indigenous sources in the Kingdom of Saudi Arabia. The identification of forty-six selected LAB strains and genetic relatedness were performed based on 16S rDNA gene sequence comparison. The LAB counts in certain samples were higher under microaerobic than anaerobic conditions. The identified LAB belonged to genera Enterococcus (16 strains), Lactobacillus (9 strains), Weissella (10 strains), Streptococcus (8 strains) and Lactococcus (3 strains). Phylogenetic tree generated from the full-length (~1.6 kb) sequences confirmed previous findings. Utilization of shorter 16S rDNA sequences (~1.0 kb) also discriminated among strains of which V2 region was the most effective. None of the strains exhibited resistance to clinically relevant antibiotics or undesirable hemolytic activity, while they differed in other probiotic characteristics, e.g., tolerance to acidic pH, resistance to bile salt, and antibacterial activity. In conclusion, the isolates Lactobacillus casei MSJ1, Lactobacillus casei Dwan5, Lactobacillus plantarum EyLan2 and Enterococcus faecium Gail-BawZir8 are likely the best probiotic LAB and we speculate that studying the synergistic effects of bacterial combinations might result in the occurrence of more effective probiotic potential. We argue that the raw and fermented milk of animals hosted in Saudi Arabia, especially stirred yogurt (Laban) made from camel milk, are rich in LAB with promising probiotics potential.Keywords: fermented foods, lactic acid bacteria, probiotics, Saudi Arabia
Procedia PDF Downloads 1982018 Minimizing Students' Learning Difficulties in Mathematics
Authors: Hari Sharan Pandit
Abstract:
Mathematics teaching in Nepal has been centralized and guided by the notion of transfer of knowledge and skills from teachers to students. The overemphasis on the ‘algorithm-centric’ approach to mathematics teaching and the focus on ‘role–learning’ as the ultimate way of solving mathematical problems since the early years of schooling have been creating severe problems in school-level mathematics in Nepal. In this context, the author argues that students should learn real-world mathematical problems through various interesting, creative and collaborative, as well as artistic and alternative ways of knowing. The collaboration-incorporated pedagogy is a distinct pedagogical approach that offers a better alternative as an integrated and interdisciplinary approach to learning that encourages students to think more broadly and critically about real-world problems. The paper, as a summarized report of action research designed, developed and implemented by the author, focuses on the needs and usefulness of collaboration-incorporated pedagogy in the Nepali context to make mathematics teaching more meaningful for producing creative and critical citizens. This paper is useful for mathematics teachers, teacher educators and researchers who argue on arts integration in mathematics teaching.Keywords: peer teaching, metacognitive approach, mitigating, action research
Procedia PDF Downloads 262017 Analyzing Medical Workflows Using Market Basket Analysis
Authors: Mohit Kumar, Mayur Betharia
Abstract:
Healthcare domain, with the emergence of Electronic Medical Record (EMR), collects a lot of data which have been attracting Data Mining expert’s interest. In the past, doctors have relied on their intuition while making critical clinical decisions. This paper presents the means to analyze the Medical workflows to get business insights out of huge dumped medical databases. Market Basket Analysis (MBA) which is a special data mining technique, has been widely used in marketing and e-commerce field to discover the association between products bought together by customers. It helps businesses in increasing their sales by analyzing the purchasing behavior of customers and pitching the right customer with the right product. This paper is an attempt to demonstrate Market Basket Analysis applications in healthcare. In particular, it discusses the Market Basket Analysis Algorithm ‘Apriori’ applications within healthcare in major areas such as analyzing the workflow of diagnostic procedures, Up-selling and Cross-selling of Healthcare Systems, designing healthcare systems more user-friendly. In the paper, we have demonstrated the MBA applications using Angiography Systems, but can be extrapolated to other modalities as well.Keywords: data mining, market basket analysis, healthcare applications, knowledge discovery in healthcare databases, customer relationship management, healthcare systems
Procedia PDF Downloads 1722016 Algorithmic Generation of Carbon Nanochimneys
Authors: Sorin Muraru
Abstract:
Computational generation of carbon nanostructures is still a very demanding process. This work provides an alternative to manual molecular modeling through an algorithm meant to automate the design of such structures. Specifically, carbon nanochimneys are obtained through the bonding of a carbon nanotube with the smaller edge of an open carbon nanocone. The methods of connection rely on mathematical, geometrical and chemical properties. Non-hexagonal rings are used in order to perform the correct bonding of dangling bonds. Once obtained, they are useful for thermal transport, gas storage or other applications such as gas separation. The carbon nanochimneys are meant to produce a less steep connection between structures such as the carbon nanotube and graphene sheet, as in the pillared graphene, but can also provide functionality on its own. The method relies on connecting dangling bonds at the edges of the two carbon nanostructures, employing the use of two different types of auxiliary structures on a case-by-case basis. The code is implemented in Python 3.7 and generates an output file in the .pdb format containing all the system’s coordinates. Acknowledgment: This work was supported by a grant of the Executive Agency for Higher Education, Research, Development and innovation funding (UEFISCDI), project number PN-III-P1-1.1-TE-2016-24-2, contract TE 122/2018.Keywords: carbon nanochimneys, computational, carbon nanotube, carbon nanocone, molecular modeling, carbon nanostructures
Procedia PDF Downloads 1702015 Genome Analysis of Lactobacillus Plantarum and Lactobacillus Brevis Isolated From Traditionally Fermented Ethiopian Kocho and Their Probiotic Properties
Authors: Guesh Mulaw, Haile Beruhulay, Anteneh Tesfaye, Tesfaye Sisay Diriba Muleta
Abstract:
Probiotics are live microorganisms that, when administered in adequate amounts, promote the health of a consumer. The present work aims to study the whole genome sequence of probiotic strains of lactic acid bacteria (LAB) isolated from traditional Ethiopian fermented kocho for bacteriocin production and to evaluate their probiotic properties. LAB were isolated from traditionally fermented kocho samples and characterized following standard methods. Accordingly, a total of 150 LAB were isolated, of which 7 (4.67%) isolates showed 50.52-74.05% and 33.33-62.40% survival rates at pH 2 for 3 and 6 h, respectively. The 7 acid-tolerant isolates were also tolerated 0.3% bile salt for 24 h with 88.96 to 98.10% survival. The acid and bile salt-tolerant LAB isolates also inhibited some reference foodborne pathogenic bacteria to varying degrees. All 7 acid- and bile salt-tolerant isolates were susceptible to ampicillin, tetracycline and erythromycin. However, the potent isolates showed remarkable resistance to kanamycin. Likewise, four of the 7 isolates were resistant to streptomycin, but three of the 7 isolates were sensitive to streptomycin. The identification of the seven selected probiotic LAB isolates and their genetic relatedness was performed based on whole-genome sequence comparisons. Consequently, these isolates belonged to Lactobacillus species, including 6 Lb. plantarum, 1 Lb. brevis. Among the 7 potential probiotic LAB strains, BAGEL predicted 2 bacteriocin for class II in the genome of 7 strains. The 7 Lactobacillus strains were found to be potentially useful for producing functional products and could be suitable probiotic candidates for food processing industriesKeywords: ferneted foods, kocho, probiotics, lactic acid bacteria
Procedia PDF Downloads 292014 A Character Detection Method for Ancient Yi Books Based on Connected Components and Regressive Character Segmentation
Authors: Xu Han, Shanxiong Chen, Shiyu Zhu, Xiaoyu Lin, Fujia Zhao, Dingwang Wang
Abstract:
Character detection is an important issue for character recognition of ancient Yi books. The accuracy of detection directly affects the recognition effect of ancient Yi books. Considering the complex layout, the lack of standard typesetting and the mixed arrangement between images and texts, we propose a character detection method for ancient Yi books based on connected components and regressive character segmentation. First, the scanned images of ancient Yi books are preprocessed with nonlocal mean filtering, and then a modified local adaptive threshold binarization algorithm is used to obtain the binary images to segment the foreground and background for the images. Second, the non-text areas are removed by the method based on connected components. Finally, the single character in the ancient Yi books is segmented by our method. The experimental results show that the method can effectively separate the text areas and non-text areas for ancient Yi books and achieve higher accuracy and recall rate in the experiment of character detection, and effectively solve the problem of character detection and segmentation in character recognition of ancient books.Keywords: CCS concepts, computing methodologies, interest point, salient region detections, image segmentation
Procedia PDF Downloads 1322013 Investigation of Extreme Gradient Boosting Model Prediction of Soil Strain-Shear Modulus
Authors: Ehsan Mehryaar, Reza Bushehri
Abstract:
One of the principal parameters defining the clay soil dynamic response is the strain-shear modulus relation. Predicting the strain and, subsequently, shear modulus reduction of the soil is essential for performance analysis of structures exposed to earthquake and dynamic loadings. Many soil properties affect soil’s dynamic behavior. In order to capture those effects, in this study, a database containing 1193 data points consists of maximum shear modulus, strain, moisture content, initial void ratio, plastic limit, liquid limit, initial confining pressure resulting from dynamic laboratory testing of 21 clays is collected for predicting the shear modulus vs. strain curve of soil. A model based on an extreme gradient boosting technique is proposed. A tree-structured parzan estimator hyper-parameter tuning algorithm is utilized simultaneously to find the best hyper-parameters for the model. The performance of the model is compared to the existing empirical equations using the coefficient of correlation and root mean square error.Keywords: XGBoost, hyper-parameter tuning, soil shear modulus, dynamic response
Procedia PDF Downloads 2012012 Survey and Identification of Coinfecting Botryosphaeriales Causing Stem Canker Diseases of Eucalyptus camaldulensis in Ethiopia
Authors: Wendu Admasu, Assefa Sintayehu, Alemu Gezahgne, Zewdu Terefework
Abstract:
Eucalyptus is the most widely planted forest tree species in the world. In Ethiopia, pathogenic fungi pose an increasing threat to Eucalyptus species. Due to limited research, there is insufficient information on the associated diseases and pathogens. This study investigated Eucalyptus diseases, the extent of their damage, and the causal fungal pathogens. A Eucalyptus disease survey was conducted in the Eucalyptus forestry areas of Ethiopia during the growth years 2019/20 and 2020/21. Disease assessment and sampling were carried out in eighteen plantations at nine locations. E. camaldulensis was the most dominant species planted in the surveyed areas. The field study shows a high incidence and severity of canker diseases. Diseased stem and branch samples were collected, cultured on malt extract agar media and studied. The results of morphological and ITS sequence analysis confirmed that the fungal species Neofusicoccum parvum, Lasiodiplodia theobromae, and Aplosporella hesperidica caused the observed canker symptoms. This is the first report of Lasiodiplodia theobromae and Aplosporella hesperidica causing diseases in Eucalyptus plants in Ethiopia. Changes in global climate and environmental factors, such as altitude, are believed to have a strong impact on the susceptibility of Eucalyptus plants to diseases. Strict quarantine practices and continuous monitoring of pathogenic and endophytic fungal species associated with Eucalyptus trees are issued to be prioritized to effectively control and manage the disease.Keywords: Neofusicoccum, Lasiodiplodia, Aplosporella, pathogenicity, phylogeny, severity
Procedia PDF Downloads 692011 Automatic Detection and Filtering of Negative Emotion-Bearing Contents from Social Media in Amharic Using Sentiment Analysis and Deep Learning Methods
Authors: Derejaw Lake Melie, Alemu Kumlachew Tegegne
Abstract:
The increasing prevalence of social media in Ethiopia has exacerbated societal challenges by fostering the proliferation of negative emotional posts and comments. Illicit use of social media has further exacerbated divisions among the population. Addressing these issues through manual identification and aggregation of emotions from millions of users for swift decision-making poses significant challenges, particularly given the rapid growth of Amharic language usage on social platforms. Consequently, there is a critical need to develop an intelligent system capable of automatically detecting and categorizing negative emotional content into social, religious, and political categories while also filtering out toxic online content. This paper aims to leverage sentiment analysis techniques to achieve automatic detection and filtering of negative emotional content from Amharic social media texts, employing a comparative study of deep learning algorithms. The study utilized a dataset comprising 29,962 comments collected from social media platforms using comment exporter software. Data pre-processing techniques were applied to enhance data quality, followed by the implementation of deep learning methods for training, testing, and evaluation. The results showed that CNN, GRU, LSTM, and Bi-LSTM classification models achieved accuracies of 83%, 50%, 84%, and 86%, respectively. Among these models, Bi-LSTM demonstrated the highest accuracy of 86% in the experiment.Keywords: negative emotion, emotion detection, social media filtering sentiment analysis, deep learning.
Procedia PDF Downloads 23