Search results for: medical device security
3528 A Study on Social and Economic Conditions of Street Vendors Using Field Survey Data
Authors: Ruchika Yadav
Abstract:
Street vendors are the integral component of urban economies of the world. They are the distributors of affordable goods and services and provide convenient and accessible retail options to the customers and form a vital part of the social and economic life of a city. A street vendor as an occupation existed for hundreds of years and considered to be as a cornerstone of many cities. In this paper, our objective is to analyze the socio-economic profile of street vendors, identification of their problems and to suggest remedial measures for the betterment based on the observation and suggestions of the street vendors. To conduct this study, primary data has been collected with the help of field survey and direct questionnaire to the respondents in Aligarh City which contains all the information relevant to social and economic conditions. The overall analysis of this study reveals street vendors are the backward sections of the society possess medium to the low-level standard of living due to illiteracy; their working environment and social security issues are not addressed properly. They are unaware of many of the governmental schemes launched for poverty alleviation and their poor accessibility in basic amenities leads to the backward socio-economic status in the society. The results found in this study can be very useful and helping tool for the policymakers to know the socio-economic conditions of the street vendors in detail.Keywords: abject poverty, socio-economic conditions, street vendors, vulnerability
Procedia PDF Downloads 1403527 Revolutionizing Healthcare Communication: The Transformative Role of Natural Language Processing and Artificial Intelligence
Authors: Halimat M. Ajose-Adeogun, Zaynab A. Bello
Abstract:
Artificial Intelligence (AI) and Natural Language Processing (NLP) have transformed computer language comprehension, allowing computers to comprehend spoken and written language with human-like cognition. NLP, a multidisciplinary area that combines rule-based linguistics, machine learning, and deep learning, enables computers to analyze and comprehend human language. NLP applications in medicine range from tackling issues in electronic health records (EHR) and psychiatry to improving diagnostic precision in orthopedic surgery and optimizing clinical procedures with novel technologies like chatbots. The technology shows promise in a variety of medical sectors, including quicker access to medical records, faster decision-making for healthcare personnel, diagnosing dysplasia in Barrett's esophagus, boosting radiology report quality, and so on. However, successful adoption requires training for healthcare workers, fostering a deep understanding of NLP components, and highlighting the significance of validation before actual application. Despite prevailing challenges, continuous multidisciplinary research and collaboration are critical for overcoming restrictions and paving the way for the revolutionary integration of NLP into medical practice. This integration has the potential to improve patient care, research outcomes, and administrative efficiency. The research methodology includes using NLP techniques for Sentiment Analysis and Emotion Recognition, such as evaluating text or audio data to determine the sentiment and emotional nuances communicated by users, which is essential for designing a responsive and sympathetic chatbot. Furthermore, the project includes the adoption of a Personalized Intervention strategy, in which chatbots are designed to personalize responses by merging NLP algorithms with specific user profiles, treatment history, and emotional states. The synergy between NLP and personalized medicine principles is critical for tailoring chatbot interactions to each user's demands and conditions, hence increasing the efficacy of mental health care. A detailed survey corroborated this synergy, revealing a remarkable 20% increase in patient satisfaction levels and a 30% reduction in workloads for healthcare practitioners. The poll, which focused on health outcomes and was administered to both patients and healthcare professionals, highlights the improved efficiency and favorable influence on the broader healthcare ecosystem.Keywords: natural language processing, artificial intelligence, healthcare communication, electronic health records, patient care
Procedia PDF Downloads 763526 Coupling Static Multiple Light Scattering Technique With the Hansen Approach to Optimize Dispersibility and Stability of Particle Dispersions
Authors: Guillaume Lemahieu, Matthias Sentis, Giovanni Brambilla, Gérard Meunier
Abstract:
Static Multiple Light Scattering (SMLS) has been shown to be a straightforward technique for the characterization of colloidal dispersions without dilution, as multiply scattered light in backscattered and transmitted mode is directly related to the concentration and size of scatterers present in the sample. In this view, the use of SMLS for stability measurement of various dispersion types has already been widely described in the literature. Indeed, starting from a homogeneous dispersion, the variation of backscattered or transmitted light can be attributed to destabilization phenomena, such as migration (sedimentation, creaming) or particle size variation (flocculation, aggregation). In a view to investigating more on the dispersibility of colloidal suspensions, an experimental set-up for “at the line” SMLS experiment has been developed to understand the impact of the formulation parameters on particle size and dispersibility. The SMLS experiment is performed with a high acquisition rate (up to 10 measurements per second), without dilution, and under direct agitation. Using such experimental device, SMLS detection can be combined with the Hansen approach to optimize the dispersing and stabilizing properties of TiO₂ particles. It appears that the dispersibility and the stability spheres generated are clearly separated, arguing that lower stability is not necessarily a consequence of poor dispersibility. Beyond this clarification, this combined SMLS-Hansen approach is a major step toward the optimization of dispersibility and stability of colloidal formulations by finding solvents having the best compromise between dispersing and stabilizing properties. Such study can be intended to find better dispersion media, greener and cheaper solvents to optimize particles suspensions, reduce the content of costly stabilizing additives or satisfy product regulatory requirements evolution in various industrial fields using suspensions (paints & inks, coatings, cosmetics, energy).Keywords: dispersibility, stability, Hansen parameters, particles, solvents
Procedia PDF Downloads 1103525 Potential of the Bri and the Indo-Pacific in South Asia: A Comparative Case Study
Authors: Nahian Salsabeel, Faria Leera
Abstract:
—“Whoever controls the Indian Ocean, dominates Asia. This ocean is the key to the seven seas. In the 21st century, the destiny of the world will be decided on its waters” -Alfred Mahan South Asia is increasingly becoming a hub for international politics. Numerous ventures are taking place in the strategic region. Of them, the most prominent is the Belt and Road Initiative (BRI). Originating from the concept of ancient Silk Route, the Chinese Xi Jin Ping regime looks to reestablish the vast connectivity project to connect the world through infrastructure and trade. On the other hand, the US, teamed up with India, Australia and Japan, thereby forming the Quad, have launched their own foreign policy, the Indo-Pacific Strategy. The ambitious 21st century initiative for the development of maritime trade, security and governance focuses critical importance to the Indo-Pacific region, especially to South Asia. Against the backdrop of contemporary political scenario, both the Quad and China airs to establish their own footprint across the region through respective mega projects, the Indo-Pacific Strategy and the BRI. This research employs a comparative case study research method, using a secondary research design. The paper looks at the variety of opportunities and challenges posed by the BRI and the Indo Pacific, and gives the comparative study on both ends.Keywords: BRI, Foreign Policy, Indo-Pacific, South Asia
Procedia PDF Downloads 1543524 Study of Mini Steel Re-Rolling and Pickling Mills for the Reduction of Accidents and Health Hazards
Authors: S. P. Rana
Abstract:
Objectives: For the manufacture of a very thin strip or a strip with a high-quality finish, the stainless steel sheet that is called billet is re-rolled in re-rolling mill to make stainless steel sheet of 18 gauges. The rolls of re-rolling mill exert tremendous pressure over the sheet and there is likely chance of breaking of stainless steel strip from the sheet. The objective of the study was to minimise the number of accidents in steel re-rolling mills due to ejection of stainless steel strip and to minimize the pollution caused by the pickling process used in these units. Methods: Looking into the high rate of frequency and severity of accidents as well as pollution hazard in re-rolling and pickling mills, it becomes essential to make necessary arrangements for prevention of accidents in such type of industry. The author carried out survey/inspections of a large number of re-rolling and pickling mills and allied units. During the course of inspection, the working of these steel re-rolling and pickling mills was closely studied and monitored. A number of accidents involving re-rolling mills were investigated and subsequently remedial measures to prevent the occurrence of such accidents were suggested. Assessment of occupational safety and health system of these units was carried out and compliance level of the statutory requirements was checked. The workers were medically examined and monitored to ascertain their health conditions. Results: Proper use of safety gadgets by workers, machine guarding and regular training brought down the risk to an acceptable level and discharged effluent pollution was brought down to permissible limits. The fatal accidents have been reduced by 83%. Conclusions: Effective enforcement and implementation of the directions/suggestions given to the managements of such units brought down the no. of accidents to a rational level. The number of fatal accidents has reduced by 83% during the study period. The effective implementation of pollution control device curtailed the pollution level to an acceptable level.Keywords: re-rolling mill, hazard, accident, health hazards
Procedia PDF Downloads 4433523 Hybrid Bee Ant Colony Algorithm for Effective Load Balancing and Job Scheduling in Cloud Computing
Authors: Thomas Yeboah
Abstract:
Cloud Computing is newly paradigm in computing that promises a delivery of computing as a service rather than a product, whereby shared resources, software, and information are provided to computers and other devices as a utility (like the electricity grid) over a network (typically the Internet). As Cloud Computing is a newly style of computing on the internet. It has many merits along with some crucial issues that need to be resolved in order to improve reliability of cloud environment. These issues are related with the load balancing, fault tolerance and different security issues in cloud environment.In this paper the main concern is to develop an effective load balancing algorithm that gives satisfactory performance to both, cloud users and providers. This proposed algorithm (hybrid Bee Ant Colony algorithm) is a combination of two dynamic algorithms: Ant Colony Optimization and Bees Life algorithm. Ant Colony algorithm is used in this hybrid Bee Ant Colony algorithm to solve load balancing issues whiles the Bees Life algorithm is used for optimization of job scheduling in cloud environment. The results of the proposed algorithm shows that the hybrid Bee Ant Colony algorithm outperforms the performances of both Ant Colony algorithm and Bees Life algorithm when evaluated the proposed algorithm performances in terms of Waiting time and Response time on a simulator called CloudSim.Keywords: ant colony optimization algorithm, bees life algorithm, scheduling algorithm, performance, cloud computing, load balancing
Procedia PDF Downloads 6283522 Fulani Herdsmen and the Threat to Grassroots Security in Rural Nigeria
Authors: Akachi Odoemene
Abstract:
There is an ongoing grassroots war in Nigeria, particularly in its north central zone, as well as all through its southern parts, which have been most bloody. The war is between Fulani herdsmen and farming communities – an age-long problem which has escalated in the last decade and has assumed a very deadly dimension. In a typical scenario, Fulani herdsmen move into non-Fulani homelands with their cattle which graze on local farmlands, destroying farmers’ crops. This provokes their victims – the farmers – to acts of resistance, preventing the Fulani and their cattle from entering into farmlands. In some cases, there have been incidences of killing and/or stealing cattle, or poisoning of fields. In response, the herders wedge deadly attacks on farming communities, leading to the death of thousands of people. To be sure, this has been a major factor of instability in the rural areas of Nigeria. This paper aims at engaging the issues and cross-cutting issues of interest, as well as providing context and perspectives to the violent conflicts between Fulani herders and local communities in Nigeria. It particularly interrogates four central issues: (1) the nature and dynamics of the crisis, (2) the positions and stakes of the parties to the crisis, (3) the remedies available for containing/managing the conflicts and their desirability, and (4) perspectives on the positions of government(s) (and the African Union) on this conflict. Both primary and secondary sources were used for the purposes of this essay.Keywords: Fulani Herdsmen, violent conflicts and insecurity, sustainable remedies, Nigeria
Procedia PDF Downloads 2543521 Process Integration of Natural Gas Hydrate Production by CH₄-CO₂/H₂ Replacement Coupling Steam Methane Reforming
Authors: Mengying Wang, Xiaohui Wang, Chun Deng, Bei Liu, Changyu Sun, Guangjin Chen, Mahmoud El-Halwagi
Abstract:
Significant amounts of natural gas hydrates (NGHs) are considered potential new sustainable energy resources in the future. However, common used methods for methane gas recovery from hydrate sediments require high investment but with low gas production efficiency, and may cause potential environment and security problems. Therefore, there is a need for effective gas production from hydrates. The natural gas hydrate production method by CO₂/H₂ replacement coupling steam methane reforming can improve the replacement effect and reduce the cost of gas separation. This paper develops a simulation model of the gas production process integrated with steam reforming and membrane separation. The process parameters (i.e., reactor temperature, pressure, H₂O/CH₄ ratio) and the composition of CO₂ and H₂ in the feed gas are analyzed. Energy analysis is also conducted. Two design scenarios with different composition of CO₂ and H₂ in the feed gas are proposed and evaluated to assess the energy efficiency of the novel system. Results show that when the composition of CO₂ in the feed gas is between 43 % and 72 %, there is a certain composition that can meet the requirement that the flow rate of recycled gas is equal to that of feed gas, so as to ensure that the subsequent production process does not need to add feed gas or discharge recycled gas. The energy efficiency of the CO₂ in feed gas at 43 % and 72 % is greater than 1, and the energy efficiency is relatively higher when the CO₂ mole fraction in feed gas is 72 %.Keywords: Gas production, hydrate, process integration, steam reforming
Procedia PDF Downloads 1833520 Controlled Growth of Au Hierarchically Ordered Crystals Architectures for Electrochemical Detection of Traces of Molecules
Authors: P. Bauer, K. Mougin, V. Vignal, A. Buch, P. Ponthiaux, D. Faye
Abstract:
Nowadays, noble metallic nanostructures with unique morphology are widely used as new sensors due to their fascinating optical, electronic and catalytic properties. Among various shapes, dendritic nanostructures have attracted much attention because of their large surface-to-volume ratio, high sensitivity and special texture with sharp tips and nanoscale junctions. Several methods have been developed to fabricate those specific structures such as electrodeposition, photochemical way, seed-mediated growth or wet chemical method. The present study deals with a novel approach for a controlled growth pattern-directed organisation of Au flower-like crystals (NFs) deposited onto stainless steel plates to achieve large-scale functional surfaces. This technique consists in the deposition of a soft nanoporous template on which Au NFs are grown by electroplating and seed-mediated method. Size, morphology, and interstructure distance have been controlled by a site selective nucleation process. Dendritic Au nanostructures have appeared as excellent Raman-active candidates due to the presence of very sharp tips of multi-branched Au nanoparticles that leads to a large local field enhancement and a good SERS sensitivity. In addition, these structures have also been used as electrochemical sensors to detect traces of molecules present in a solution. A correlation of the number of active sites on the surface and the current charge by both colorimetric method and cyclic voltammetry of gold structures have allowed a calibration of the system. This device represents a first step for the fabrication of MEMs platform that could ultimately be integrated into a lab-on-chip system. It also opens pathways to several technologically large-scale nanomaterials fabrication such as hierarchically ordered crystal architectures for sensor applications.Keywords: dendritic, electroplating, gold, template
Procedia PDF Downloads 1863519 An Intelligent Steerable Drill System for Orthopedic Surgery
Authors: Wei Yao
Abstract:
A steerable and flexible drill is needed in orthopaedic surgery. For example, osteoarthritis is a common condition affecting millions of people for which joint replacement is an effective treatment which improves the quality and duration of life in elderly sufferers. Conventional surgery is not very accurate. Computer navigation and robotics can help increase the accuracy. For example, In Total Hip Arthroplasty (THA), robotic surgery is currently practiced mainly on acetabular side helping cup positioning and orientation. However, femoral stem positioning mostly uses hand-rasping method rather than robots for accurate positioning. The other case for using a flexible drill in surgery is Anterior Cruciate Ligament (ACL) Reconstruction. The majority of ACL Reconstruction failures are primarily caused by technical mistakes and surgical errors resulting from drilling the anatomical bone tunnels required to accommodate the ligament graft. The proposed new steerable drill system will perform orthopedic surgery through curved tunneling leading to better accuracy and patient outcomes. It may reduce intra-operative fractures, dislocations, early failure and leg length discrepancy by making possible a new level of precision. This technology is based on a robotically assisted, steerable, hand-held flexible drill, with a drill-tip tracking device and a multi-modality navigation system. The critical differentiator is that this robotically assisted surgical technology now allows the surgeon to prepare 'patient specific' and more anatomically correct 'curved' bone tunnels during orthopedic surgery rather than drilling straight holes as occurs currently with existing surgical tools. The flexible and steerable drill and its navigation system for femoral milling in total hip arthroplasty had been tested on sawbones to evaluate the accuracy of the positioning and orientation of femoral stem relative to the pre-operative plan. The data show the accuracy of the navigation system is better than traditional hand-rasping method.Keywords: navigation, robotic orthopedic surgery, steerable drill, tracking
Procedia PDF Downloads 1673518 Development and Validation of a Carbon Dioxide TDLAS Sensor for Studies on Fermented Dairy Products
Authors: Lorenzo Cocola, Massimo Fedel, Dragiša Savić, Bojana Danilović, Luca Poletto
Abstract:
An instrument for the detection and evaluation of gaseous carbon dioxide in the headspace of closed containers has been developed in the context of Packsensor Italian-Serbian joint project. The device is based on Tunable Diode Laser Absorption Spectroscopy (TDLAS) with a Wavelength Modulation Spectroscopy (WMS) technique in order to accomplish a non-invasive measurement inside closed containers of fermented dairy products (yogurts and fermented cheese in cups and bottles). The purpose of this instrument is the continuous monitoring of carbon dioxide concentration during incubation and storage of products over a time span of the whole shelf life of the product, in the presence of different microorganisms. The instrument’s optical front end has been designed to be integrated in a thermally stabilized incubator. An embedded computer provides processing of spectral artifacts and storage of an arbitrary set of calibration data allowing a properly calibrated measurement on many samples (cups and bottles) of different shapes and sizes commonly found in the retail distribution. A calibration protocol has been developed in order to be able to calibrate the instrument on the field also on containers which are notoriously difficult to seal properly. This calibration protocol is described and evaluated against reference measurements obtained through an industry standard (sampling) carbon dioxide metering technique. Some sets of validation test measurements on different containers are reported. Two test recordings of carbon dioxide concentration evolution are shown as an example of instrument operation. The first demonstrates the ability to monitor a rapid yeast growth in a contaminated sample through the increase of headspace carbon dioxide. Another experiment shows the dissolution transient with a non-saturated liquid medium in presence of a carbon dioxide rich headspace atmosphere.Keywords: TDLAS, carbon dioxide, cups, headspace, measurement
Procedia PDF Downloads 3243517 Perceptions of Cybersecurity in Government Organizations: Case Study of Bhutan
Authors: Pema Choejey, David Murray, Chun Che Fung
Abstract:
Bhutan is becoming increasingly dependent on Information and Communications Technologies (ICTs), especially the Internet for performing the daily activities of governments, businesses, and individuals. Consequently, information systems and networks are becoming more exposed and vulnerable to cybersecurity threats. This paper highlights the findings of the survey study carried out to understand the perceptions of cybersecurity implementation among government organizations in Bhutan. About 280 ICT personnel were surveyed about the effectiveness of cybersecurity implementation in their organizations. A questionnaire based on a 5 point Likert scale was used to assess the perceptions of respondents. The questions were asked on cybersecurity practices such as cybersecurity policies, awareness and training, and risk management. The survey results show that less than 50% of respondents believe that the cybersecurity implementation is effective: cybersecurity policy (40%), risk management (23%), training and awareness (28%), system development life cycle (34%); incident management (26%), and communications and operational management (40%). The findings suggest that many of the cybersecurity practices are inadequately implemented and therefore, there exist a gap in achieving a required cybersecurity posture. This study recommends government organizations to establish a comprehensive cybersecurity program with emphasis on cybersecurity policy, risk management, and awareness and training. In addition, the research study has practical implications to both government and private organizations for implementing and managing cybersecurity.Keywords: awareness and training, cybersecurity policy, risk management, security risks
Procedia PDF Downloads 3453516 TomoTherapy® System Repositioning Accuracy According to Treatment Localization
Authors: Veronica Sorgato, Jeremy Belhassen, Philippe Chartier, Roddy Sihanath, Nicolas Docquiere, Jean-Yves Giraud
Abstract:
We analyzed the image-guided radiotherapy method used by the TomoTherapy® System (Accuray Corp.) for patient repositioning in clinical routine. The TomoTherapy® System computes X, Y, Z and roll displacements to match the reference CT, on which the dosimetry has been performed, with the pre-treatment MV CT. The accuracy of the repositioning method has been studied according to the treatment localization. For this, a database of 18774 treatment sessions, performed during 2 consecutive years (2016-2017 period) has been used. The database includes the X, Y, Z and roll displacements proposed by TomoTherapy® System as well as the manual correction of these proposals applied by the radiation therapist. This manual correction aims to further improve the repositioning based on the clinical situation and depends on the structures surrounding the target tumor tissue. The statistical analysis performed on the database aims to define repositioning limits to be used as security and guiding tool for the manual adjustment implemented by the radiation therapist. This tool will participate not only to notify potential repositioning errors but also to further improve patient positioning for optimal treatment.Keywords: accuracy, IGRT MVCT, image-guided radiotherapy megavoltage computed tomography, statistical analysis, tomotherapy, localization
Procedia PDF Downloads 2263515 Water-Controlled Fracturing with Fuzzy-Ball Fluid in Tight Gas Reservoirs of Deep Coal Measures in Sulige
Authors: Xiangchun Wang, Lihui Zheng, Maozong Gan, Peng Zhang, Tong Wu, An Chang
Abstract:
The deep coal measure tight gas reservoir in Sulige is usually reformed by fracturing, because the reservoir thickness is small, the water layers can be easily communicated during fracturing, which will lead to water production of gas wells and lower production of gas wells. Therefore, it is necessary to control water during fracturing in deep coal measure tight gas reservoir. Using fuzzy-ball fluid to control water fracturing can not only increase the output but also reduce the water output. The fuzzy-ball fluid was prepared indoors to carry out evaluation experiments. The fuzzy ball fluid was mixed in equal volume with the pre-fluid and formation water to test its compatibility. The core displacement device was used to test the gas and water breaking through the matrix and fractured cores blocked by fuzzy-ball fluid. The breakthrough pressure of the plunger tests its water blocking performance. The experimental results show that there is no precipitation after the fuzzy-ball fluid is mixed with the pad fluid and the formation water, respectively. The breakthrough pressure gradients of gas and water after the fuzzy-ball fluid plugged the cracks were 0.02MPa/cm and 0.04MPa/cm, respectively, and the breakthrough pressure gradients of gas and water after the matrix was plugged were 0.03MPa/cm and 0.2MPa/cm, respectively, which meet the requirements of field operation. Two wells A and B in the Sulige Gas Field were used on site to implement water control fracturing. After the pre-fluid was injected into the two wells, 50m3 of fuzzy-ball fluid was pumped to plug the water. The construction went smoothly. After water control and fracturing, the average daily output in 161 days was increased by 13.71% and 6.99% compared with that of adjacent wells in the same layer. The adjacent wells were bubbled for 3 times and 63 times respectively, while there was no effusion in A and B construction wells. The results show that fuzzy-ball fluid is a water plugging material suitable for water control fracturing in tight gas wells, and its water control mechanism can also provide a new idea for the development of water control fracturing materials.Keywords: coal seam, deep layer, fracking, fuzzy-ball fluid, reservoir reconstruction
Procedia PDF Downloads 2293514 A Distributed Cryptographically Generated Address Computing Algorithm for Secure Neighbor Discovery Protocol in IPv6
Authors: M. Moslehpour, S. Khorsandi
Abstract:
Due to shortage in IPv4 addresses, transition to IPv6 has gained significant momentum in recent years. Like Address Resolution Protocol (ARP) in IPv4, Neighbor Discovery Protocol (NDP) provides some functions like address resolution in IPv6. Besides functionality of NDP, it is vulnerable to some attacks. To mitigate these attacks, Internet Protocol Security (IPsec) was introduced, but it was not efficient due to its limitation. Therefore, SEND protocol is proposed to automatic protection of auto-configuration process. It is secure neighbor discovery and address resolution process. To defend against threats on NDP’s integrity and identity, Cryptographically Generated Address (CGA) and asymmetric cryptography are used by SEND. Besides advantages of SEND, its disadvantages like the computation process of CGA algorithm and sequentially of CGA generation algorithm are considerable. In this paper, we parallel this process between network resources in order to improve it. In addition, we compare the CGA generation time in self-computing and distributed-computing process. We focus on the impact of the malicious nodes on the CGA generation time in the network. According to the result, although malicious nodes participate in the generation process, CGA generation time is less than when it is computed in a one-way. By Trust Management System, detecting and insulating malicious nodes is easier.Keywords: NDP, IPsec, SEND, CGA, modifier, malicious node, self-computing, distributed-computing
Procedia PDF Downloads 2783513 2D Ferromagnetism in Van der Waals Bonded Fe₃GeTe₂
Authors: Ankita Tiwari, Jyoti Saini, Subhasis Ghosh
Abstract:
For many years, researchers have been fascinated by the subject of how properties evolve as dimensionality is lowered. Early on, it was shown that the presence of a significant magnetic anisotropy might compensate for the lack of long-range (LR) magnetic order in a low-dimensional system (d < 3) with continuous symmetry, as proposed by Hohenberg-Mermin and Wagner (HMW). Strong magnetic anisotropy allows an LR magnetic order to stabilize in two dimensions (2D) even in the presence of stronger thermal fluctuations which is responsible for the absence of Heisenberg ferromagnetism in 2D. Van der Waals (vdW) ferromagnets, including CrI₃, CrTe₂, Cr₂X₂Te₆ (X = Si and Ge) and Fe₃GeTe₂, offer a nearly ideal platform for studying ferromagnetism in 2D. Fe₃GeTe₂ is the subject of extensive investigation due to its tunable magnetic properties, high Curie temperature (Tc ~ 220K), and perpendicular magnetic anisotropy. Many applications in the field of spintronics device development have been quite active due to these appealing features of Fe₃GeTe₂. Although it is known that LR-driven ferromagnetism is necessary to get around the HMW theorem in 2D experimental realization, Heisenberg 2D ferromagnetism remains elusive in condensed matter systems. Here, we show that Fe₃GeTe₂ hosts both localized and delocalized spins, resulting in itinerant and local-moment ferromagnetism. The presence of LR itinerant interaction facilitates to stabilize Heisenberg ferromagnet in 2D. With the help of Rhodes-Wohlfarth (RW) and generalized RW-based analysis, Fe₃GeTe₂ has been shown to be a 2D ferromagnet with itinerant magnetism that can be modulated by an external magnetic field. Hence, the presence of both local moment and itinerant magnetism has made this system interesting in terms of research in low dimensions. We have also rigorously performed critical analysis using an improvised method. We show that the variable critical exponents are typical signatures of 2D ferromagnetism in Fe₃GeTe₂. The spontaneous magnetization exponent β changes the universality class from mean-field to 2D Heisenberg with field. We have also confirmed the range of interaction via the renormalization group (RG) theory. According to RG theory, Fe₃GeTe₂ is a 2D ferromagnet with LR interactions.Keywords: Van der Waal ferromagnet, 2D ferromagnetism, phase transition, itinerant ferromagnetism, long range order
Procedia PDF Downloads 713512 Robust Recognition of Locomotion Patterns via Data-Driven Machine Learning in the Cloud Environment
Authors: Shinoy Vengaramkode Bhaskaran, Kaushik Sathupadi, Sandesh Achar
Abstract:
Human locomotion recognition is important in a variety of sectors, such as robotics, security, healthcare, fitness tracking and cloud computing. With the increasing pervasiveness of peripheral devices, particularly Inertial Measurement Units (IMUs) sensors, researchers have attempted to exploit these advancements in order to precisely and efficiently identify and categorize human activities. This research paper introduces a state-of-the-art methodology for the recognition of human locomotion patterns in a cloud environment. The methodology is based on a publicly available benchmark dataset. The investigation implements a denoising and windowing strategy to deal with the unprocessed data. Next, feature extraction is adopted to abstract the main cues from the data. The SelectKBest strategy is used to abstract optimal features from the data. Furthermore, state-of-the-art ML classifiers are used to evaluate the performance of the system, including logistic regression, random forest, gradient boosting and SVM have been investigated to accomplish precise locomotion classification. Finally, a detailed comparative analysis of results is presented to reveal the performance of recognition models.Keywords: artificial intelligence, cloud computing, IoT, human locomotion, gradient boosting, random forest, neural networks, body-worn sensors
Procedia PDF Downloads 113511 Applying Multiple Kinect on the Development of a Rapid 3D Mannequin Scan Platform
Authors: Shih-Wen Hsiao, Yi-Cheng Tsao
Abstract:
In the field of reverse engineering and creative industries, applying 3D scanning process to obtain geometric forms of the objects is a mature and common technique. For instance, organic objects such as faces and nonorganic objects such as products could be scanned to acquire the geometric information for further application. However, although the data resolution of 3D scanning device is increasing and there are more and more abundant complementary applications, the penetration rate of 3D scanning for the public is still limited by the relative high price of the devices. On the other hand, Kinect, released by Microsoft, is known for its powerful functions, considerably low price, and complete technology and database support. Therefore, related studies can be done with the applying of Kinect under acceptable cost and data precision. Due to the fact that Kinect utilizes optical mechanism to extracting depth information, limitations are found due to the reason of the straight path of the light. Thus, various angles are required sequentially to obtain the complete 3D information of the object when applying a single Kinect for 3D scanning. The integration process which combines the 3D data from different angles by certain algorithms is also required. This sequential scanning process costs much time and the complex integration process often encounter some technical problems. Therefore, this paper aimed to apply multiple Kinects simultaneously on the field of developing a rapid 3D mannequin scan platform and proposed suggestions on the number and angles of Kinects. In the content, a method of establishing the coordination based on the relation between mannequin and the specifications of Kinect is proposed, and a suggestion of angles and number of Kinects is also described. An experiment of applying multiple Kinect on the scanning of 3D mannequin is constructed by Microsoft API, and the results show that the time required for scanning and technical threshold can be reduced in the industries of fashion and garment design.Keywords: 3D scan, depth sensor, fashion and garment design, mannequin, multiple Kinect sensor
Procedia PDF Downloads 3663510 The Effect of Artificial Intelligence on Human Rights Regulations
Authors: Karam Aziz Hamdy Fahmy
Abstract:
Although human rights protection in the industrial sector has increased, human rights violations continue to occur. Although the government has passed human rights laws, labor laws, and an international treaty ratified by the United States, human rights crimes continue to occur and go undetected. The growing number of textile companies in Bekasi is also leading to an increase in human rights violations as the government has no obligation to protect them. The United States government and business leaders should respect, protect and defend the human rights of workers. The article discusses the human rights violations faced by garment factory workers in the context of the law, as well as ideas for improving the protection of workers' rights. The connection between development and human rights has long been the subject of academic debate. Therefore, to understand the dynamics between these two concepts, a number of principles have been adopted, ranging from the right to development to a human rights-based approach to development. Despite these attempts, the precise connection between development and human rights is not yet fully understood. However, the inherent interdependence between these two concepts and the idea that development efforts must respect human rights guarantees has gained momentum in recent years. It will then be examined whether the right to sustainable development is recognized.Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security
Procedia PDF Downloads 663509 Forensic Nursing in the Emergency Department: The Overlooked Roles
Authors: E. Tugba Topcu
Abstract:
The emergency services are usually the first places to encounter forensic cases. Hence, it is important to consider forensics from the perspective of the emergency services staff and the physiological and psychological consequences that may arise as a result of behaviour by itself or another person. Accurate and detailed documentation of the situation in which the patient first arrives at the emergency service and preservation of the forensic findings is pivotal for the subsequent forensic investigation. The first step in determining whether or not a forensic case exists is to perform a medical examination of the patient. For each individual suspected to be part of a forensic case, police officers should be informed at the same time as the medical examination is being conducted. Violent events are increasing every year and with an increase in the number of forensic cases, emergency service workers have increasing responsibility and consequently play a key role in protecting, collecting and arranging the forensic evidence. In addition, because the emergency service workers involved in forensic events typically have information about the accused and/or victim, as well as evidence related to the events and the cause of injuries, police officers often require their testimony. However, both nurses and other health care personnel do not typically have adequate expertise in forensic medicine. Emergency nurses should take an active role for determining that whether any patient admitted to the emergency services is a clinical forensic patient the emergency service with injury and requiring possible punishment and knowing of their roles and responsibilities in this area provides legal protection as well as the protection of the judicial affair. Particularly, in emergency services, where rapid patient turnover and high workload exists, patient registration and case reporting may not exist. In such instances, the witnesses, typically the nurses, are often consulted for information. Knowledge of forensic medical matters plays a vital role in achieving justice. According to the Criminal Procedure Law, Article 75, Paragraph 3, ‘an internal body examination or the taking of blood or other biological samples from the body can be performed only by a doctor or other health professional member’. In favour of this item, the clinic nurse and doctor are mainly responsible for evaluating forensic cases in emergency departments, performing the examination, collecting evidence, and storing and reporting data. The courts place considerable importance on determining whether a suspect is the victim or accused and, thus, in terms of illuminating events, it is crucial that any evidence is gathered carefully and appropriately. All the evidence related to the forensic case including the forensic report should be handed over to the police officers. In instances where forensic evidence cannot be collected and the only way to obtain the evidence is the hospital environment, health care personnel in emergency services need to have knowledge about the diagnosis of forensic evidence, the collection of evidence, hiding evidence and provision of the evidence delivery chain.Keywords: emergency department, emergency nursing, forensic cases, forensic nursing
Procedia PDF Downloads 2523508 Designing and Implementation of MPLS Based VPN
Authors: Muhammad Kamran Asif
Abstract:
MPLS stands for Multi-Protocol Label Switching. It is the technology which replaces ATM (Asynchronous Transfer Mode) and frame relay. In this paper, we have designed a full fledge small scale MPLS based service provider network core network model, which provides communication services (e.g. voice, video and data) to the customer more efficiently using label switching technique. Using MPLS VPN provides security to the customers which are either on LAN or WAN. It protects its single customer sites from being attacked by any intruder from outside world along with the provision of concept of extension of a private network over an internet. In this paper, we tried to implement a service provider network using minimum available resources i.e. five 3800 series CISCO routers comprises of service provider core, provider edge routers and customer edge routers. The customers on the one end of the network (customer side) is capable of sending any kind of data to the customers at the other end using service provider cloud which is MPLS VPN enabled. We have also done simulation and emulation for the model using GNS3 (Graphical Network Simulator-3) and achieved the real time scenarios. We have also deployed a NMS system which monitors our service provider cloud and generates alarm in case of any intrusion or malfunctioning in the network. Moreover, we have also provided a video help desk facility between customers and service provider cloud to resolve the network issues more effectively.Keywords: MPLS, VPN, NMS, ATM, asynchronous transfer mode
Procedia PDF Downloads 3313507 Integrated On-Board Diagnostic-II and Direct Controller Area Network Access for Vehicle Monitoring System
Authors: Kavian Khosravinia, Mohd Khair Hassan, Ribhan Zafira Abdul Rahman, Syed Abdul Rahman Al-Haddad
Abstract:
The CAN (controller area network) bus is introduced as a multi-master, message broadcast system. The messages sent on the CAN are used to communicate state information, referred as a signal between different ECUs, which provides data consistency in every node of the system. OBD-II Dongles that are based on request and response method is the wide-spread solution for extracting sensor data from cars among researchers. Unfortunately, most of the past researches do not consider resolution and quantity of their input data extracted through OBD-II technology. The maximum feasible scan rate is only 9 queries per second which provide 8 data points per second with using ELM327 as well-known OBD-II dongle. This study aims to develop and design a programmable, and latency-sensitive vehicle data acquisition system that improves the modularity and flexibility to extract exact, trustworthy, and fresh car sensor data with higher frequency rates. Furthermore, the researcher must break apart, thoroughly inspect, and observe the internal network of the vehicle, which may cause severe damages to the expensive ECUs of the vehicle due to intrinsic vulnerabilities of the CAN bus during initial research. Desired sensors data were collected from various vehicles utilizing Raspberry Pi3 as computing and processing unit with using OBD (request-response) and direct CAN method at the same time. Two types of data were collected for this study. The first, CAN bus frame data that illustrates data collected for each line of hex data sent from an ECU and the second type is the OBD data that represents some limited data that is requested from ECU under standard condition. The proposed system is reconfigurable, human-readable and multi-task telematics device that can be fitted into any vehicle with minimum effort and minimum time lag in the data extraction process. The standard operational procedure experimental vehicle network test bench is developed and can be used for future vehicle network testing experiment.Keywords: CAN bus, OBD-II, vehicle data acquisition, connected cars, telemetry, Raspberry Pi3
Procedia PDF Downloads 2053506 Breakfast Eating Pattern Associated with Nutritional Status of Urban Primary Schoolchildren in Iran and India
Authors: Sahar Hooshmand, Mohammad Reza Bagherzadeh Anasari
Abstract:
The aim of this study was to examine the effect of breakfast eating pattern (between frequencies of breakfast consumers and non-consumers) on nutritional status (weight for age, height for age and weight for height). A total 4570 primary school children aged 6-9 years old constituted the sample. From these, 2234 Iranian school children (1218 girls and 1016 boys) and 2336 Indian school children (1096 girls and 1240 boys) were included in a cross sectional study. Breakfast frequency consumption was recorded through an interview with mothers of children. Height and wight of children were taken and body mass index were calculated. The World Health Organization’s (WHO) AnthroPlus software used to assess the nutritional status of the children. Weight for age z-scores were slightly associated with frequency of consuming breakfast in both India (χ2 = 60.083, p=0.000) and Iran (χ2 = 18.267, p=0.032). A significant association was seen between frequency of child‘s breakfast intake and the height z-scores in both India (χ2 = 31.334, p=0.000) and Iran (χ2 = 19.443, p=0.022). Most of children with normal height had breakfast daily in both countries. A significant association was seen with children‘s BMI z-scores of Indian children (χ2 = 31.247, p=0.000) but it was not significant in Iran (χ2 = 10.791, p=0.095). The present study confirms the observations of other studies that showed more frequency in having breakfast is associated with better nutritional status.Keywords: breakfast, schoolchildren, nutritional status, global food security
Procedia PDF Downloads 5163505 Determination of Measurement Uncertainty of the Diagnostic Meteorological Model CALMET
Authors: Nina Miklavčič, Urška Kugovnik, Natalia Galkina, Primož Ribarič, Rudi Vončina
Abstract:
Today, the need for weather predictions is deeply rooted in the everyday life of people as well as it is in industry. The forecasts influence final decision-making processes in multiple areas, from agriculture and prevention of natural disasters to air traffic regulations and solutions on a national level for health, security, and economic problems. Namely, in Slovenia, alongside other existing forms of application, weather forecasts are adopted for the prognosis of electrical current transmission through powerlines. Meteorological parameters are one of the key factors which need to be considered in estimations of the reliable supply of electrical energy to consumers. And like for any other measured value, the knowledge about measurement uncertainty is also critical for the secure and reliable supply of energy. The estimation of measurement uncertainty grants us a more accurate interpretation of data, a better quality of the end results, and even a possibility of improvement of weather forecast models. In the article, we focused on the estimation of measurement uncertainty of the diagnostic microscale meteorological model CALMET. For the purposes of our research, we used a network of meteorological stations spread in the area of our interest, which enables a side-by-side comparison of measured meteorological values with the values calculated with the help of CALMET and the measurement uncertainty estimation as a final result.Keywords: uncertancy, meteorological model, meteorological measurment, CALMET
Procedia PDF Downloads 813504 Investigating Message Timing Side Channel Attacks on Networks on Chip with Ring Topology
Authors: Mark Davey
Abstract:
Communications on a Network on Chip (NoC) produce timing information, i.e., network injection delays, packet traversal times, throughput metrics, and other attributes relating to the traffic being sent across the chip. The security requirements of a platform encompass each node to operate with confidentiality, integrity, and availability (ISO 27001). Inherently, a shared NoC interconnect is exposed to analysis of timing patterns created by contention for the network components, i.e., links and switches/routers. This phenomenon is defined as information leakage, which represents a ‘side channel’ of sensitive information that can be correlated to platform activity. The key algorithm presented in this paper evaluates how an adversary can control two platform neighbouring nodes of a target node to obtain sensitive information about communication with the target node. The actual information obtained is the period value of a periodic task communication. This enacts a breach of the expected confidentiality of a node operating in a multiprocessor platform. An experimental investigation of the side channel is undertaken to judge the level and significance of inferred information produced by access times to the NoC. Results are presented with a series of expanding task set scenarios to evaluate the efficacy of the side channel detection algorithm as the network load increases.Keywords: embedded systems, multiprocessor, network on chip, side channel
Procedia PDF Downloads 713503 The Comparative Electroencephalogram Study: Children with Autistic Spectrum Disorder and Healthy Children Evaluate Classical Music in Different Ways
Authors: Galina Portnova, Kseniya Gladun
Abstract:
In our EEG experiment participated 27 children with ASD with the average age of 6.13 years and the average score for CARS 32.41 and 25 healthy children (of 6.35 years). Six types of musical stimulation were presented, included Gluck, Javier-Naida, Kenny G, Chopin and other classic musical compositions. Children with autism showed orientation reaction to the music and give behavioral responses to different types of music, some of them might assess stimulation by scales. The participants were instructed to remain calm. Brain electrical activity was recorded using a 19-channel EEG recording device, 'Encephalan' (Russia, Taganrog). EEG epochs lasting 150 s were analyzed using EEGLab plugin for MatLab (Mathwork Inc.). For EEG analysis we used Fast Fourier Transform (FFT), analyzed Peak alpha frequency (PAF), correlation dimension D2 and Stability of rhythms. To express the dynamics of desynchronizing of different rhythms we've calculated the envelope of the EEG signal, using the whole frequency range and a set of small narrowband filters using Hilbert transformation. Our data showed that healthy children showed similar EEG spectral changes during musical stimulation as well as described the feelings induced by musical fragments. The exception was the ‘Chopin. Prelude’ fragment (no.6). This musical fragment induced different subjective feeling, behavioral reactions and EEG spectral changes in children with ASD and healthy children. The correlation dimension D2 was significantly lower in autists compared to healthy children during musical stimulation. Hilbert envelope frequency was reduced in all group of subjects during musical compositions 1,3,5,6 compositions compared to the background. During musical fragments 2 and 4 (terrible) lower Hilbert envelope frequency was observed only in children with ASD and correlated with the severity of the disease. Alfa peak frequency was lower compared to the background during this musical composition in healthy children and conversely higher in children with ASD.Keywords: electroencephalogram (EEG), emotional perception, ASD, musical perception, childhood Autism rating scale (CARS)
Procedia PDF Downloads 2843502 The Effects of Different Parameters of Wood Floating Debris on Scour Rate Around Bridge Piers
Authors: Muhanad Al-Jubouri
Abstract:
A local scour is the most important of the several scours impacting bridge performance and security. Even though scour is widespread in bridges, especially during flood seasons, the experimental tests could not be applied to many standard highway bridges. A computational fluid dynamics numerical model was used to solve the problem of calculating local scouring and deposition for non-cohesive silt and clear water conditions near single and double cylindrical piers with the effect of floating debris. When FLOW-3D software is employed with the Rang turbulence model, the Nilsson bed-load transfer equation and fine mesh size are considered. The numerical findings of single cylindrical piers correspond pretty well with the physical model's results. Furthermore, after parameter effectiveness investigates the range of outcomes based on predicted user inputs such as the bed-load equation, mesh cell size, and turbulence model, the final numerical predictions are compared to experimental data. When the findings are compared, the error rate for the deepest point of the scour is equivalent to 3.8% for the single pier example.Keywords: local scouring, non-cohesive, clear water, computational fluid dynamics, turbulence model, bed-load equation, debris
Procedia PDF Downloads 693501 The Place of Herbal Teas Based on Medicinal Plants in the Treatment and Comfort of Infants
Authors: Metahri Leyla, Helali Amal, Dali Yahia Mustapha Kamel
Abstract:
Herbal medicine is one of the oldest medicines in the world. It constitutes an interesting alternative to treat and cure without creating new diseases. Despite the progress of medicine, the increase in the number of doctors, the creation of social security, many parents have resorted to herbal medicine for their children; they are increasingly asking for "natural remedies", "without risk" for their children. Herbal tea is a very accessible way to enjoy the benefits of herbal medicine. Accordingly; the objective of our study is to obtain detailed information on the composition and mode of administration of these herbal teas and to identify the different plants used; their beneficial effects, as well as their possible toxicity. The current research work represents an ethnobotanical survey spread over one month (from January 6, 2021 to February 19, 2021) carried out by means of an electronic questionnaire concerning 753 respondents, involving single or multiparous mothers. The obtained results reveal that a total of 684 mothers used herbal teas for their infants, which revealed the use of 55 herbal remedies for several indications, the most sought after are the carminative effect and relief of colic, and which 9% of users noticed undesirable effects linked to the administration of herbal teas to their infants. As a conclusion, it has been asserted that the use of herbal teas as a natural remedy by Algerian mothers is a widely accepted practice, however the "natural" nature of the plants does not mean that they are harmless.Keywords: Keywords: Herbal medicine, Herbal teas, Children, Mothers, Medicinal plants.
Procedia PDF Downloads 983500 Nutritional Quality Assessment and Safety Evaluation of Food Crops
Authors: Olawole Emmanuel Aina, Liziwe Lizbeth Mugivhisa, Joshua Oluwole Olowoyo, Chikwela Lawrence Obi
Abstract:
In sustained and consistent efforts to improve food security, numerous and different methods are proposed and used in the production of food crops, and farm produce to meet the demands of consumers. However, unregulated and indiscriminate methods of production present another problem that may expose consumers of these food crops to potential health risks. Therefore, it is imperative that a thorough assessment of farm produce is carried out due to the growing trend of health-conscious consumers preference for minimally processed or raw farm produce. This study evaluated the safety and nutritional quality of food crops. The objectives were to compare the nutritional quality of organic and inorganic farm produce in one hand and, on the other, evaluate the safety of farm produce with respect to trace metal and pathogenic contamination. We conducted a broad systematic search of peer-reviewed published literatures from databases and search engines such as science direct, web-of-science, Google scholar, and Scopus. This study concluded that there is no conclusive evidence to support the notion of nutritional superiority of organic food crops over their inorganic counterparts and there are documented reports of pathogenic and metal contaminations of food crops.Keywords: food crops, fruits and vegetables, pathogens, nutrition, trace metals
Procedia PDF Downloads 803499 Use of Smartphones in 6th and 7th Grade (Elementary Schools) in Istria: Pilot Study
Authors: Maja Ruzic-Baf, Vedrana Keteles, Andrea Debeljuh
Abstract:
Younger and younger children are now using a smartphone, a device which has become ‘a must have’ and the life of children would be almost ‘unthinkable’ without one. Devices are becoming lighter and lighter but offering an array of options and applications as well as the unavoidable access to the Internet, without which it would be almost unusable. Numerous features such as taking of photographs, listening to music, information search on the Internet, access to social networks, usage of some of the chatting and messaging services, are only some of the numerous features offered by ‘smart’ devices. They have replaced the alarm clock, home phone, camera, tablet and other devices. Their use and possession have become a part of the everyday image of young people. Apart from the positive aspects, the use of smartphones has also some downsides. For instance, free time was usually spent in nature, playing, doing sports or other activities enabling children an adequate psychophysiological growth and development. The greater usage of smartphones during classes to check statuses on social networks, message your friends, play online games, are just some of the possible negative aspects of their application. Considering that the age of the population using smartphones is decreasing and that smartphones are no longer ‘foreign’ to children of pre-school age (smartphones are used at home or in coffee shops or shopping centers while waiting for their parents, playing video games often inappropriate to their age), particular attention must be paid to a very sensitive group, the teenagers who almost never separate from their ‘pets’. This paper is divided into two sections, theoretical and empirical ones. The theoretical section gives an overview of the pros and cons of the usage of smartphones, while the empirical section presents the results of a research conducted in three elementary schools regarding the usage of smartphones and, specifically, their usage during classes, during breaks and to search information on the Internet, check status updates and 'likes’ on the Facebook social network.Keywords: education, smartphone, social networks, teenagers
Procedia PDF Downloads 453