Search results for: ubiquitous computing
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1130

Search results for: ubiquitous computing

710 Off-Line Text-Independent Arabic Writer Identification Using Optimum Codebooks

Authors: Ahmed Abdullah Ahmed

Abstract:

The task of recognizing the writer of a handwritten text has been an attractive research problem in the document analysis and recognition community with applications in handwriting forensics, paleography, document examination and handwriting recognition. This research presents an automatic method for writer recognition from digitized images of unconstrained writings. Although a great effort has been made by previous studies to come out with various methods, their performances, especially in terms of accuracy, are fallen short, and room for improvements is still wide open. The proposed technique employs optimal codebook based writer characterization where each writing sample is represented by a set of features computed from two codebooks, beginning and ending. Unlike most of the classical codebook based approaches which segment the writing into graphemes, this study is based on fragmenting a particular area of writing which are beginning and ending strokes. The proposed method starting with contour detection to extract significant information from the handwriting and the curve fragmentation is then employed to categorize the handwriting into Beginning and Ending zones into small fragments. The similar fragments of beginning strokes are grouped together to create Beginning cluster, and similarly, the ending strokes are grouped to create the ending cluster. These two clusters lead to the development of two codebooks (beginning and ending) by choosing the center of every similar fragments group. Writings under study are then represented by computing the probability of occurrence of codebook patterns. The probability distribution is used to characterize each writer. Two writings are then compared by computing distances between their respective probability distribution. The evaluations carried out on ICFHR standard dataset of 206 writers using Beginning and Ending codebooks separately. Finally, the Ending codebook achieved the highest identification rate of 98.23%, which is the best result so far on ICFHR dataset.

Keywords: off-line text-independent writer identification, feature extraction, codebook, fragments

Procedia PDF Downloads 488
709 Synthesis of Biologically Active Heterocyclic Compounds via C-H Bond Activation

Authors: Neeraj Kumar Mishra, In Su Kim

Abstract:

The isoindoline, indazole and indole heterocycles are ubiquitous structural motif found in heterocyclic compounds as they exhibit biological and medicinal applications. For example, isoindoline motif is present in molecules that act as endothelin-A receptor antagonists and dipeptidyl peptidase inhibitors. Moreover, isoindoline derivatives are very crucial constituents in the field of materials science as attractive candidates for organic light-emitting devices. However, compounds containing the indazole motif are known to exhibit to a variety of biological activities, such as estrogen receptor, HIV protease inhibition and anti-tumor activity. The prevalence of indazoles and indoles has led to the development of many useful methods for their preparation. Thus, isoindoline, indazole and indole heterocycles can be new candidates for the next generation of pharmaceuticals. Therefore, the development of highly efficient strategies for the formation of these heterocyclic architectures is an area of great interest in organic synthesis. The past years, transition-metal-catalyzed C−H activation followed by annulation reaction has been frequently used as a powerful tool to construct various heterocycles. Herein, we describe our recent achievements about the transition-metal-catalyzed tandem cyclization reactions of N-benzyltriflamides, 1,2-disubstituted arylhydrazines, acetanilides, etc. via C−H bond activation to access the corresponding bioactive heterocylic scaffolds.

Keywords: biologically active, C-H activation, heterocyclic compounds, transition-metal catalysts

Procedia PDF Downloads 274
708 Regulation of RON-Receptor Tyrosine Kinase Functions by Epstein-Barr-Virus (EBV) Nuclear Antigen 3C

Authors: Roshika Tyagi, Shuvomoy Banerjee

Abstract:

Among various diseases, cancer has become a huge threat to human beings globally. In the context of viral infection, Epstein–Barr virus (EBV) infection is ubiquitous in nature world-wide as well as in India. Recepteur d’Origine Nantais (RON) receptor tyrosine kinase is overexpressed in Lymphoblastoid cell lines (LCLs) but undetectable in primary B-cells. Biologically, RON expression was found to be essential for EBV transformed LCLs proliferation. In our study, we investigated whether EBV latent antigen EBNA3C is playing a crucial role in regulating RON receptor tyrosine kinase function in EBV-induced malignancies. Interestingly, we observed that expression pattern of RON was modulated by EBNA3C in EBV transformed LCLs compared with EBV negative BJAB cell line by PCR and western blot analysis. Moreover, in the absence of EBNA3C, RON expression was found low in western blot and immunofluorescence analysis and cell proliferation rate was significantly reduced in LCLs by cell viability assays. Therefore, our study clearly indicating the potential role of EBNA3C expressed in EBV-infected B-cells for modulating the functions of oncogenic kinases that leads to EBV induced B-cell transformation.

Keywords: apoptosis, cell proliferation, Epstein–barr virus, receptor tyrosine kinase

Procedia PDF Downloads 203
707 Empirical Investigation of Gender Differences in Information Processing Style, Tinkering, and Self-Efficacy for Robot Tele-Operation

Authors: Dilruba Showkat, Cindy Grimm

Abstract:

As robots become more ubiquitous, it is significant for us to understand how different groups of people respond to possible ways of interacting with the robot. In this study, we focused on gender differences while users were tele-operating a humanoid robot that was physically co-located with them. We investigated three factors during the human-robot interaction (1) information processing strategy (2) self-efficacy and (3) tinkering or exploratory behavior. The experimental results show that the information on how to use the robot was processed comprehensively by the female participants whereas males processed them selectively (p < 0.001). Males were more confident when using the robot than females (p = 0.0002). Males tinkered more with the robot than females (p = 0.0021). We found that tinkering was positively correlated (p = 0.0068) with task success and negatively correlated (p = 0.0032) with task completion time. Tinkering might have resulted in greater task success and lower task completion time for males. Findings from this research can be used for making design decisions for robots and open new research directions. Our results show the importance of accounting for gender differences when developing interfaces for interacting with robots and open new research directions.

Keywords: humanoid robots, tele-operation, gender differences, human-robot interaction

Procedia PDF Downloads 144
706 On Adaptive and Auto-Configurable Apps

Authors: Prisa Damrongsiri, Kittinan Pongpianskul, Mario Kubek, Herwig Unger

Abstract:

Apps are today the most important possibility to adapt mobile phones and computers to fulfill the special needs of their users. Location- and context-sensitive programs are hereby the key to support the interaction of the user with his/her environment and also to avoid an overload with a plenty of dispensable information. The contribution shows, how a trusted, secure and really bi-directional communication and interaction among users and their environment can be established and used, e.g. in the field of home automation.

Keywords: apps, context-sensitive, location-sensitive, self-configuration, mobile computing, smart home

Procedia PDF Downloads 372
705 The Role of Mass Sport Guidance in the Health Service Industry of China

Authors: Qiu Jian-Rong, Li Qing-Hui, Zhan Dong, Zhang Lei

Abstract:

Facing the problem of the demand of economic restructuring and risk of social economy stagnation due to the ageing of population, the Health Service Industry will play a very important role in the structure of industry in the future. During the process, the orient of Chinese sports medicine as well as the joint with preventive medicine, and the integration with data bank and cloud computing will be involved.

Keywords: China, the health service industry, mass sport, data bank

Procedia PDF Downloads 599
704 Effect of Capillary Forces on Wet Granular Avalanches

Authors: Ahmed Jarray, Vanessa Magnanimo, Stefan Luding

Abstract:

Granular avalanches are ubiquitous in nature and occur in numerous industrial processes associated with particulate systems. When a small amount of liquid is added to a pile of particles, pendular bridges form and the particles are attracted by capillary forces, creating complex structure and flow behavior. We have performed an extensive series of experiments to investigate the effect of capillary force and particle size on wet granular avalanches, and we established a methodology that ensures the control of the granular flow in a rotating drum. The velocity of the free surface and the angle of repose of the particles in the rotating drum are determined using particle tracking method. The capillary force between the particles is significantly reduced by making the glass beads hydrophobic via chemical silanization. We show that the strength of the capillary forces between two adjacent particles can be deliberately manipulated through surface modification of the glass beads, thus, under the right conditions; we demonstrate that the avalanche dynamics can be controlled. The results show that the avalanche amplitude decreases when increasing the capillary force. We also find that liquid-induced cohesion increases the width of the gliding layer and the dynamic angle of repose, however, it decreases the velocity of the free surface.

Keywords: avalanche dynamics, capillary force, granular material, granular flow

Procedia PDF Downloads 246
703 A Review on Using Executive Function to Understand the Limited Efficacy of Weight-Loss Interventions

Authors: H. Soltani, Kevin Laugero

Abstract:

Obesity is becoming an increasingly critical issue in the United States due to the steady and substantial increase in prevalence over the last 30 years. Existing interventions have been able to help participants achieve short-term weight loss, but have failed to show long-term results. The complex nature of behavioral change remains one of the most difficult barriers in promoting sustainable weight-loss in overweight individuals. Research suggests that the 'intention-behavior gap' can be explained by a person’s ability to regulate higher-order thinking, or Executive Function (EF). A review of 63 research articles was completed in fall of 2017 to identify the role of EF in regulating eating behavior and to identify whether there is a potential for improving dietary quality by enhancing EF. Results showed that poor EF is positively associated with obesogenic behavior, namely increased consumption of highly palatable foods, eating in the absence of hunger, high saturated fat intake and low fruit and vegetable consumption. Recent research has indicated that interventions targeting an improvement in EF can be successful in helping promote healthy behaviors. Furthermore, interventions of longer duration have a more lasting and versatile effect on weight loss and maintenance. This may present an opportunity for the increasingly ubiquitous use of mobile application technology.

Keywords: eating behavior, executive function, nutrition, obesity, weight-loss

Procedia PDF Downloads 142
702 Controlling Interactions and Non-Equilibrium Steady State in Spinning Active Matter Monolayers

Authors: Joshua Paul Steimel, Michael Pappas, Ethan Hall

Abstract:

Particle-particle interactions are critical in determining the state of an active matter system. Unique and ubiquitous non-equilibrium behavior like swarming, vortexing, spiraling, and much more is governed by interactions between active units or particles. In hybrid active-passive matter systems, the attraction between spinning active units in a 2D monolayer of passive particles is controlled by the mechanical behavior of the passive monolayer. We demonstrate here that the range and dynamics of this attraction can be controlled by changing the composition of the passive monolayer by adding dopant passive particles. These dopant passive particles effectively pin the movement of dislocation motion in the passive media and reduce the probability of defect motion required to erode the bridge of passive particles between active spinners, thus reducing the range of attraction. Additionally, by adding an out of plane component to the magnetic moment and creating a top-like motion a short range repulsion emerges between the top-like particle. At inter-top distances less than four particle diameters apart, the tops repel but beyond that, distance attract up to 13 particle diameters apart. The tops were also able to locally and transiently anneal the passive monolayer. Thus we demonstrate that by tuning several parameters of the hybrid active matter system, one can observe very different emergent behavior.

Keywords: active matter, colloids, ferromagnetic, annealing

Procedia PDF Downloads 85
701 Data Confidentiality in Public Cloud: A Method for Inclusion of ID-PKC Schemes in OpenStack Cloud

Authors: N. Nalini, Bhanu Prakash Gopularam

Abstract:

The term data security refers to the degree of resistance or protection given to information from unintended or unauthorized access. The core principles of information security are the confidentiality, integrity and availability, also referred as CIA triad. Cloud computing services are classified as SaaS, IaaS and PaaS services. With cloud adoption the confidential enterprise data are moved from organization premises to untrusted public network and due to this the attack surface has increased manifold. Several cloud computing platforms like OpenStack, Eucalyptus, Amazon EC2 offer users to build and configure public, hybrid and private clouds. While the traditional encryption based on PKI infrastructure still works in cloud scenario, the management of public-private keys and trust certificates is difficult. The Identity based Public Key Cryptography (also referred as ID-PKC) overcomes this problem by using publicly identifiable information for generating the keys and works well with decentralized systems. The users can exchange information securely without having to manage any trust information. Another advantage is that access control (role based access control policy) information can be embedded into data unlike in PKI where it is handled by separate component or system. In OpenStack cloud platform the keystone service acts as identity service for authentication and authorization and has support for public key infrastructure for auto services. In this paper, we explain OpenStack security architecture and evaluate the PKI infrastructure piece for data confidentiality. We provide method to integrate ID-PKC schemes for securing data while in transit and stored and explain the key measures for safe guarding data against security attacks. The proposed approach uses JPBC crypto library for key-pair generation based on IEEE P1636.3 standard and secure communication to other cloud services.

Keywords: data confidentiality, identity based cryptography, secure communication, open stack key stone, token scoping

Procedia PDF Downloads 352
700 Genetic Characteristics of Chicken Anemia Virus Circulating in Northern Vietnam

Authors: Hieu Van Dong, Giang Thi Huong Tran, Giap Van Nguyen, Tung Duy Dao, Vuong Nghia Bui, Le Thi My Huynh, Yohei Takeda, Haruko Ogawa, Kunitoshi Imai

Abstract:

Chicken anemia virus (CAV) has a ubiquitous and worldwide distribution in chicken production. Our group previously reported high seroprevalence of CAV in chickens in northern Vietnam. In the present study, 330 tissue samples collected from commercial and breeder chicken farms in eleven provinces in northern Vietnam were tested for the CAV infection. We found that 157 out of 330 (47.58%) chickens were positive with CAV genes by real-time PCR method. Nine CAV strains obtained from the different location and time were forwarded to the full-length sequence of CAV VP1 gene. Phylogenetic analysis of the Vietnamese CAV vp1 gene indicated that the CAVs circulating in northern Vietnam were divided into three distinct genotypes, II, III, and V, but not clustered with the vaccine strains. Among the three genotypes, genotype III was the major one widely spread in Vietnam, and that included three sub-genotypes, IIIa, IIIb, and IIIc. The Vietnamese CAV strains were closely related to the Chinese, Taiwanese, and USA strains. All the CAV isolates had glutamine at amino acid position 394 in the VP1 gene, suggesting that they might be highly pathogenic strains. One strain was defined to be genotype V, which had not been reported for Vietnamese CAVs. Additional studies are required to further evaluate the pathogenicity of CAV strains circulating in Vietnam.

Keywords: chicken anemia virus, genotype, genetic characteristics, Vietnam

Procedia PDF Downloads 138
699 Developing a Framework for Open Source Software Adoption in a Higher Education Institution in Uganda. A case of Kyambogo University

Authors: Kafeero Frank

Abstract:

This study aimed at developing a frame work for open source software adoption in an institution of higher learning in Uganda, with the case of KIU as a study area. There were mainly four research questions based on; individual staff interaction with open source software forum, perceived FOSS characteristics, organizational characteristics and external characteristics as factors that affect open source software adoption. The researcher used causal-correlation research design to study effects of these variables on open source software adoption. A quantitative approach was used in this study with self-administered questionnaire on a purposively and randomly sampled sample of university ICT staff. Resultant data was analyzed using means, correlation coefficients and multivariate multiple regression analysis as statistical tools. The study reveals that individual staff interaction with open source software forum and perceived FOSS characteristics were the primary factors that significantly affect FOSS adoption while organizational and external factors were secondary with no significant effect but significant correlation to open source software adoption. It was concluded that for effective open source software adoption to occur there must be more effort on primary factors with subsequent reinforcement of secondary factors to fulfill the primary factors and adoption of open source software. Lastly recommendations were made in line with conclusions for coming up with Kyambogo University frame work for open source software adoption in institutions of higher learning. Areas of further research recommended include; Stakeholders’ analysis of open source software adoption in Uganda; Challenges and way forward. Evaluation of Kyambogo University frame work for open source software adoption in institutions of higher learning. Framework development for cloud computing adoption in Ugandan universities. Framework for FOSS development in Uganda IT industry

Keywords: open source software., organisational characteristics, external characteristics, cloud computing adoption

Procedia PDF Downloads 42
698 Conceptualising Queercide: A Quantitative Desktop Exploration of the Technical Frames Used in Online Repors of Lesbian Killings in South Africa

Authors: Marchant Van Der Schyff

Abstract:

South Africa remains one of the most dangerous places for women – lesbians in particular – to live freely and safely, where a culture of patriarchy and a lack of socio-economic opportunity are ubiquitous throughout its communities. While the Internet has given a wider platform to provide insights to issues plaguing lesbians, very little information exists regarding the elements used in the construction of these online reports. This is not only due to the lack of language required to contextualise lesbian issues, but also persistent institutional and societal homophobia. This article describes the technical frames used in the online news reporting of four case studies of ‘queercide’. Through using a thematic coding sheet, data was collected from 70 online articles purposively selected based on priori population characteristics. The study found technical elements, such as the length of online reports, credible sources used, ‘code driven’-, and ‘user driven’ elements which were identified in the coded online articles. From the conclusions some clear trends emerged enabling the construction of a Venn-type diagram which present insights to how the murder of lesbians (referred to as ‘queercide’ in the article) is being reported on by online news media compared to the contemporary theoretical discussions on how these cases should be reported on.

Keywords: journalism, lesbian murder, queercide, technical frames, reporting, online

Procedia PDF Downloads 52
697 Information and Communication Technologies-Based Urban Spaces: From Planning and Design to Implementation

Authors: Yountaik Leem, Kwang Woo Nam, Sang Ho Lee, Tae Heon Moon

Abstract:

As to the development of the capitalist economy, local governments put their focuses on economic growth and quality of life including the management of declined urban area. Together with the rapid advances in ICTs (information and communication technologies) Korean government tried to adapt ICTs to urban spaces to catch these two goals. Ubiquitous city, concept introduced by Mark Weiser in 1988, is a kind of ICTs based urban space which can provide IT services anytime and anywhere. This paper introduces the experience of developing ICTs-based urban planning and it’s implementation process and discusses the effect of the R&D based U-City test-bed project. For a community center of a residential zone in a newly developing city, spatial problems and citizen’s needs were identified to plan IT-based urban services. The paper also describes the structure and functions of Community O/S (COS) as an IT platform which controls data and urban devices such as media facades and U-poles. Not only one-way information but also Interactive services were included. Public creating activities using this platform also added –CO2 emission management and citizen making safety map, etc. The effects of the comprehensive U-City planning in S/W, H/W and human-ware were discussed on the case study of similar individual projects.

Keywords: ICTs-based urban planning, implementation, public IT service, U-City

Procedia PDF Downloads 298
696 A Survey on Constraint Solving Approaches Using Parallel Architectures

Authors: Nebras Gharbi, Itebeddine Ghorbel

Abstract:

In the latest years and with the advancements of the multicore computing world, the constraint programming community tried to benefit from the capacity of new machines and make the best use of them through several parallel schemes for constraint solving. In this paper, we propose a survey of the different proposed approaches to solve Constraint Satisfaction Problems using parallel architectures. These approaches use in a different way a parallel architecture: the problem itself could be solved differently by several solvers or could be split over solvers.

Keywords: constraint programming, parallel programming, constraint satisfaction problem, speed-up

Procedia PDF Downloads 291
695 Discerning Divergent Nodes in Social Networks

Authors: Mehran Asadi, Afrand Agah

Abstract:

In data mining, partitioning is used as a fundamental tool for classification. With the help of partitioning, we study the structure of data, which allows us to envision decision rules, which can be applied to classification trees. In this research, we used online social network dataset and all of its attributes (e.g., Node features, labels, etc.) to determine what constitutes an above average chance of being a divergent node. We used the R statistical computing language to conduct the analyses in this report. The data were found on the UC Irvine Machine Learning Repository. This research introduces the basic concepts of classification in online social networks. In this work, we utilize overfitting and describe different approaches for evaluation and performance comparison of different classification methods. In classification, the main objective is to categorize different items and assign them into different groups based on their properties and similarities. In data mining, recursive partitioning is being utilized to probe the structure of a data set, which allow us to envision decision rules and apply them to classify data into several groups. Estimating densities is hard, especially in high dimensions, with limited data. Of course, we do not know the densities, but we could estimate them using classical techniques. First, we calculated the correlation matrix of the dataset to see if any predictors are highly correlated with one another. By calculating the correlation coefficients for the predictor variables, we see that density is strongly correlated with transitivity. We initialized a data frame to easily compare the quality of the result classification methods and utilized decision trees (with k-fold cross validation to prune the tree). The method performed on this dataset is decision trees. Decision tree is a non-parametric classification method, which uses a set of rules to predict that each observation belongs to the most commonly occurring class label of the training data. Our method aggregates many decision trees to create an optimized model that is not susceptible to overfitting. When using a decision tree, however, it is important to use cross-validation to prune the tree in order to narrow it down to the most important variables.

Keywords: online social networks, data mining, social cloud computing, interaction and collaboration

Procedia PDF Downloads 124
694 Simulation of the FDA Centrifugal Blood Pump Using High Performance Computing

Authors: Mehdi Behbahani, Sebastian Rible, Charles Moulinec, Yvan Fournier, Mike Nicolai, Paolo Crosetto

Abstract:

Computational Fluid Dynamics blood-flow simulations are increasingly used to develop and validate blood-contacting medical devices. This study shows that numerical simulations can provide additional and accurate estimates of relevant hemodynamic indicators (e.g., recirculation zones or wall shear stresses), which may be difficult and expensive to obtain from in-vivo or in-vitro experiments. The most recent FDA (Food and Drug Administration) benchmark consisted of a simplified centrifugal blood pump model that contains fluid flow features as they are commonly found in these devices with a clear focus on highly turbulent phenomena. The FDA centrifugal blood pump study is composed of six test cases with different volumetric flow rates ranging from 2.5 to 7.0 liters per minute, pump speeds, and Reynolds numbers ranging from 210,000 to 293,000. Within the frame of this study different turbulence models were tested including RANS models, e.g. k-omega, k-epsilon and a Reynolds Stress Model (RSM) and, LES. The partitioners Hilbert, METIS, ParMETIS and SCOTCH were used to create an unstructured mesh of 76 million elements and compared in their efficiency. Computations were performed on the JUQUEEN BG/Q architecture applying the highly parallel flow solver Code SATURNE and typically using 32768 or more processors in parallel. Visualisations were performed by means of PARAVIEW. Different turbulence models including all six flow situations could be successfully analysed and validated against analytical considerations and from comparison to other data-bases. It showed that an RSM represents an appropriate choice with respect to modeling high-Reynolds number flow cases. Especially, the Rij-SSG (Speziale, Sarkar, Gatzki) variant turned out to be a good approach. Visualisation of complex flow features could be obtained and the flow situation inside the pump could be characterized.

Keywords: blood flow, centrifugal blood pump, high performance computing, scalability, turbulence

Procedia PDF Downloads 365
693 Landslide Susceptibility Mapping Using Soft Computing in Amhara Saint

Authors: Semachew M. Kassa, Africa M Geremew, Tezera F. Azmatch, Nandyala Darga Kumar

Abstract:

Frequency ratio (FR) and analytical hierarchy process (AHP) methods are developed based on past landslide failure points to identify the landslide susceptibility mapping because landslides can seriously harm both the environment and society. However, it is still difficult to select the most efficient method and correctly identify the main driving factors for particular regions. In this study, we used fourteen landslide conditioning factors (LCFs) and five soft computing algorithms, including Random Forest (RF), Support Vector Machine (SVM), Logistic Regression (LR), Artificial Neural Network (ANN), and Naïve Bayes (NB), to predict the landslide susceptibility at 12.5 m spatial scale. The performance of the RF (F1-score: 0.88, AUC: 0.94), ANN (F1-score: 0.85, AUC: 0.92), and SVM (F1-score: 0.82, AUC: 0.86) methods was significantly better than the LR (F1-score: 0.75, AUC: 0.76) and NB (F1-score: 0.73, AUC: 0.75) method, according to the classification results based on inventory landslide points. The findings also showed that around 35% of the study region was made up of places with high and very high landslide risk (susceptibility greater than 0.5). The very high-risk locations were primarily found in the western and southeastern regions, and all five models showed good agreement and similar geographic distribution patterns in landslide susceptibility. The towns with the highest landslide risk include Amhara Saint Town's western part, the Northern part, and St. Gebreal Church villages, with mean susceptibility values greater than 0.5. However, rainfall, distance to road, and slope were typically among the top leading factors for most villages. The primary contributing factors to landslide vulnerability were slightly varied for the five models. Decision-makers and policy planners can use the information from our study to make informed decisions and establish policies. It also suggests that various places should take different safeguards to reduce or prevent serious damage from landslide events.

Keywords: artificial neural network, logistic regression, landslide susceptibility, naïve Bayes, random forest, support vector machine

Procedia PDF Downloads 44
692 Cytotoxic Effect of Neem Seed Extract (Azadirachta indica) in Comparison with Artificial Insecticide Novastar on Haemocytes (THC and DHC) of Musca domestica

Authors: Muhammad Zaheer Awan, Adnan Qadir, Zeeshan Anjum

Abstract:

Housefly, Musca domestica Linnaeus is ubiquitous and hazardous for Homo sapiens and livestock in sundry venerations. Musca domestica cart 100 different pathogens, such as typhoid, salmonella, bacillary dysentery, tuberculosis, anthrax and parasitic worms. The flies in rural areas usually carry more pathogens. Houseflies feed on liquid or semi-liquid substances besides solid materials which are softened by saliva. Neem botanically known as Azadirachta indica belongs to the family Meliaceae and is an indigenous tree to Pakistan. The neem tree is also one such tree which has been revered by the Pakistanis and Kashmiris for its medicinal properties. Present study showed neem seed extract has potentially toxic ability that affect Total Haemocyte Count (THC) and Differential Haemocytes Count (DHC) in insect’s blood cells, of the housefly. A significant variation in haemolymph density was observed just after application, 30 minutes and 60 minutes post treatment in term of THC and DHC in comparison with novastar. The study strappingly acclaim use of neem seed extract as insecticide as compare to artificial insecticides.

Keywords: neem, Azadirachta indica, Musca domestica, differential haemocyte count (DHC), total haemocytes count (DHC), novastar

Procedia PDF Downloads 178
691 Investigation of Complexity Dynamics in a DC Glow Discharge Magnetized Plasma Using Recurrence Quantification Analysis

Authors: Vramori Mitra, Bornali Sarma, Arun K. Sarma

Abstract:

Recurrence is a ubiquitous feature of any real dynamical system. The states in phase space trajectory of a system have an inherent tendency to return to the same state or its close state after certain time laps. Recurrence quantification analysis technique, based on this fundamental feature of a dynamical system, detects evaluation of state under variation of control parameter of the system. The paper presents the investigation of nonlinear dynamical behavior of plasma floating potential fluctuations obtained by using a Langmuir probe in different magnetic field under the variation of discharge voltages. The main measures of recurrence quantification analysis are considered as determinism, linemax and entropy. The increment of the DET and linemax variables asserts that the predictability and periodicity of the system is increasing. The variable linemax indicates that the chaoticity is being diminished with the slump of magnetic field while increase of magnetic field enhancing the chaotic behavior. Fractal property of the plasma time series estimated by DFA technique (Detrended fluctuation analysis) reflects that long-range correlation of plasma fluctuations is decreasing while fractal dimension is increasing with the enhancement of magnetic field which corroborates the RQA analysis.

Keywords: detrended fluctuation analysis, chaos, phase space, recurrence

Procedia PDF Downloads 302
690 The Ugliness of Eating: Resistance to Depicting Consumption in Visual Arts

Authors: Constance Kirker

Abstract:

While there is general agreement that food itself can be beautiful, thousands of still-life masterpieces over the years attest to this, depicting the act of eating, actually placing food in one’s mouth and chewing is seemingly taboo. The environment created around consumption -dining rooms, linens, china, flowers- is consciously choreographed to provide a pleasing aesthetic experience. Yet artists, from Roman frescoes painters to contemporary photographers, create images from feasts to solitary subjects that rarely show food or drink touching lips, chewing, or swallowing. Of the countless paintings of the Last Supper, the food remains on the table. Rarely is Adam or Eve shown taking a bite of the apple, initiating Original Sin. In the few examples that do depict food-in-mouth, Goya’s Saturn Devouring His Son, or the ubiquitous photos of the “wedding smash” with brides and grooms pushing wedding cake into each other’s mouths, the images are seemingly intended to be particularly ugly or humorous in a distasteful way. This paper will explore theories that include the rules of etiquette, some determined hundreds of years ago and still followed today, that imply eating is a metaphor for gluttony, implicit sexuality of eating, the distortion of the face while eating and the simple practicality of the difficulty of an artist’s model maintaining a chewing position. If art is a reflection of society, what drives the universal impulse to hide this very human function?

Keywords: aesthetics, senses, taboo, consumption

Procedia PDF Downloads 50
689 Creating Smart and Healthy Cities by Exploring the Potentials of Emerging Technologies and Social Innovation for Urban Efficiency: Lessons from the Innovative City of Boston

Authors: Mohammed Agbali, Claudia Trillo, Yusuf Arayici, Terrence Fernando

Abstract:

The wide-spread adoption of the Smart City concept has introduced a new era of computing paradigm with opportunities for city administrators and stakeholders in various sectors to re-think the concept of urbanization and development of healthy cities. With the world population rapidly becoming urban-centric especially amongst the emerging economies, social innovation will assist greatly in deploying emerging technologies to address the development challenges in core sectors of the future cities. In this context, sustainable health-care delivery and improved quality of life of the people is considered at the heart of the healthy city agenda. This paper examines the Boston innovation landscape from the perspective of smart services and innovation ecosystem for sustainable development, especially in transportation and healthcare. It investigates the policy implementation process of the Healthy City agenda and eHealth economy innovation based on the experience of Massachusetts’s City of Boston initiatives. For this purpose, three emerging areas are emphasized, namely the eHealth concept, the innovation hubs, and the emerging technologies that drive innovation. This was carried out through empirical analysis on results of public sector and industry-wide interviews/survey about Boston’s current initiatives and the enabling environment. The paper highlights few potential research directions for service integration and social innovation for deploying emerging technologies in the healthy city agenda. The study therefore suggests the need to prioritize social innovation as an overarching strategy to build sustainable Smart Cities in order to avoid technology lock-in. Finally, it concludes that the Boston example of innovation economy is unique in view of the existing platforms for innovation and proper understanding of its dynamics, which is imperative in building smart and healthy cities where quality of life of the citizenry can be improved.

Keywords: computing paradigm, emerging technologies, equitable healthcare, healthy cities, open data, smart city, social innovation

Procedia PDF Downloads 310
688 Determining Components of Deflection of the Vertical in Owerri West Local Government, Imo State Nigeria Using Least Square Method

Authors: Chukwu Fidelis Ndubuisi, Madufor Michael Ozims, Asogwa Vivian Ndidiamaka, Egenamba Juliet Ngozi, Okonkwo Stephen C., Kamah Chukwudi David

Abstract:

Deflection of the vertical is a quantity used in reducing geodetic measurements related to geoidal networks to the ellipsoidal plane; and it is essential in Geoid modeling processes. Computing the deflection of the vertical component of a point in a given area is necessary in evaluating the standard errors along north-south and east-west direction. Using combined approach for the determination of deflection of the vertical component provides improved result but labor intensive without appropriate method. Least square method is a method that makes use of redundant observation in modeling a given sets of problem that obeys certain geometric condition. This research work is aimed to computing the deflection of vertical component of Owerri West local government area of Imo State using geometric method as field technique. In this method combination of Global Positioning System on static mode and precise leveling observation were utilized in determination of geodetic coordinate of points established within the study area by GPS observation and the orthometric heights through precise leveling. By least square using Matlab programme; the estimated deflections of vertical component parameters for the common station were -0.0286 and -0.0001 arc seconds for the north-south and east-west components respectively. The associated standard errors of the processed vectors of the network were computed. The computed standard errors of the North-south and East-west components were 5.5911e-005 and 1.4965e-004 arc seconds, respectively. Therefore, including the derived component of deflection of the vertical to the ellipsoidal model will yield high observational accuracy since an ellipsoidal model is not tenable due to its far observational error in the determination of high quality job. It is important to include the determined deflection of the vertical component for Owerri West Local Government in Imo State, Nigeria.

Keywords: deflection of vertical, ellipsoidal height, least square, orthometric height

Procedia PDF Downloads 183
687 Proposed Framework based on Classification of Vertical Handover Decision Strategies in Heterogeneous Wireless Networks

Authors: Shidrokh Goudarzi, Wan Haslina Hassan

Abstract:

Heterogeneous wireless networks are converging towards an all-IP network as part of the so-called next-generation network. In this paradigm, different access technologies need to be interconnected; thus, vertical handovers or vertical handoffs are necessary for seamless mobility. In this paper, we conduct a review of existing vertical handover decision-making mechanisms that aim to provide ubiquitous connectivity to mobile users. To offer a systematic comparison, we categorize these vertical handover measurement and decision structures based on their respective methodology and parameters. Subsequently, we analyze several vertical handover approaches in the literature and compare them according to their advantages and weaknesses. The paper compares the algorithms based on the network selection methods, complexity of the technologies used and efficiency in order to introduce our vertical handover decision framework. We find that vertical handovers on heterogeneous wireless networks suffer from the lack of a standard and efficient method to satisfy both user and network quality of service requirements at different levels including architectural, decision-making and protocols. Also, the consolidation of network terminal, cross-layer information, multi packet casting and intelligent network selection algorithm appears to be an optimum solution for achieving seamless service continuity in order to facilitate seamless connectivity.

Keywords: heterogeneous wireless networks, vertical handovers, vertical handover metric, decision-making algorithms

Procedia PDF Downloads 369
686 Maternal Request: A Minor but Important Contributor to the Rising Rates of Caesarean Section: A Retrospective Observational Study

Authors: Katherine Russell

Abstract:

Background: Over recent decades the number of caesarean sections performed in the UK has continued to rise. The cause of the rising caesarean rate (CSR) is not well understood. However, one of the most heavily cited reasons is an increase in maternal request for caesarean section. Maternal request for caesarean section (CDMR) refers to a caesarean section performed on maternal request with no medical indication. The true rate of caesarean delivery on maternal request in the UK and its contribution to the caesarean section rate is not known. Methods: To elucidate current understanding of the cause of the rising caesarean section rate and the role of CDMR we conducted a systematic review of the literature. To determine the role of CDMR in the CSR at the PRH we conducted a retrospective observational study of the caesarean section rates and CDMR from 2009-2015. Results: We demonstrated a negative correlation between rates of elective sections and CDMR over the study period (-0.123). On average, there were more elective sections performed after 2011 (15.10% of all deliveries) than before 2011 (12.41% of all deliveries); this difference was statistically significant (p = < 0.001). There were more cases of CDMR after 2011 (1.39% of all deliveries) than before 2011 (0.85% of all deliveries). The difference in average rates of CDMR before and after 2011 was statistically significant (p ≤ 0.001). Conclusions: CDMR is only a minor contributor to the CSR at the PRH. However, it remains an important factor because it represents a target for the reduction of the CSR that is more manageable than other, more complex and ubiquitous causes of the rising CSR.

Keywords: cesarean section, maternal request for cesarean section, obstetrics, pre-natal health

Procedia PDF Downloads 80
685 Cognitive Footprints: Analytical and Predictive Paradigm for Digital Learning

Authors: Marina Vicario, Amadeo Argüelles, Pilar Gómez, Carlos Hernández

Abstract:

In this paper, the Computer Research Network of the National Polytechnic Institute of Mexico proposes a paradigmatic model for the inference of cognitive patterns in digital learning systems. This model leads to metadata architecture useful for analysis and prediction in online learning systems; especially on MOOc's architectures. The model is in the design phase and expects to be tested through an institutional of courses project which is going to develop for the MOOc.

Keywords: cognitive footprints, learning analytics, predictive learning, digital learning, educational computing, educational informatics

Procedia PDF Downloads 453
684 An Intelligent Cloud Radio Access Network (RAN) Architecture for Future 5G Heterogeneous Wireless Network

Authors: Jin Xu

Abstract:

5G network developers need to satisfy the necessary requirements of additional capacity from massive users and spectrally efficient wireless technologies. Therefore, the significant amount of underutilized spectrum in network is motivating operators to combine long-term evolution (LTE) with intelligent spectrum management technology. This new LTE intelligent spectrum management in unlicensed band (LTE-U) has the physical layer topology to access spectrum, specifically the 5-GHz band. We proposed a new intelligent cloud RAN for 5G.

Keywords: cloud radio access network, wireless network, cloud computing, multi-agent

Procedia PDF Downloads 397
683 Distributed Key Management With Less Transmitted Messaged In Rekeying Process To Secure Iot Wireless Sensor Networks In Smart-Agro

Authors: Safwan Mawlood Hussien

Abstract:

Internet of Things (IoT) is a promising technology has received considerable attention in different fields such as health, industry, defence, and agro, etc. Due to the limitation capacity of computing, storage, and communication, IoT objects are more vulnerable to attacks. Many solutions have been proposed to solve security issues, such as key management using symmetric-key ciphers. This study provides a scalable group distribution key management based on ECcryptography; with less transmitted messages The method has been validated through simulations in OMNeT++.

Keywords: elliptic curves, Diffie–Hellman, discrete logarithm problem, secure key exchange, WSN security, IoT security, smart-agro

Procedia PDF Downloads 100
682 The On-Board Critical Message Transmission Design for Navigation Satellite Delay/Disruption Tolerant Network

Authors: Ji-yang Yu, Dan Huang, Guo-ping Feng, Xin Li, Lu-yuan Wang

Abstract:

The navigation satellite network, especially the Beidou MEO Constellation, can relay data effectively with wide coverage and is applied in navigation, detection, and position widely. But the constellation has not been completed, and the amount of satellites on-board is not enough to cover the earth, which makes the data-relay disrupted or delayed in the transition process. The data-relay function needs to tolerant the delay or disruption in some extension, which make the Beidou MEO Constellation a delay/disruption-tolerant network (DTN). The traditional DTN designs mainly employ the relay table as the basic of data path schedule computing. But in practical application, especially in critical condition, such as the war-time or the infliction heavy losses on the constellation, parts of the nodes may become invalid, then the traditional DTN design could be useless. Furthermore, when transmitting the critical message in the navigation system, the maximum priority strategy is used, but the nodes still inquiry the relay table to design the path, which makes the delay more than minutes. Under this circumstances, it needs a function which could compute the optimum data path on-board in real-time according to the constellation states. The on-board critical message transmission design for navigation satellite delay/disruption-tolerant network (DTN) is proposed, according to the characteristics of navigation satellite network. With the real-time computation of parameters in the network link, the least-delay transition path is deduced to retransmit the critical message in urgent conditions. First, the DTN model for constellation is established based on the time-varying matrix (TVM) instead of the time-varying graph (TVG); then, the least transition delay data path is deduced with the parameters of the current node; at last, the critical message transits to the next best node. For the on-board real-time computing, the time delay and misjudges of constellation states in ground stations are eliminated, and the residual information channel for each node can be used flexibly. Compare with the minute’s delay of traditional DTN; the proposed transmits the critical message in seconds, which improves the re-transition efficiency. The hardware is implemented in FPGA based on the proposed model, and the tests prove the validity.

Keywords: critical message, DTN, navigation satellite, on-board, real-time

Procedia PDF Downloads 314
681 Polyethylene Terephthalate Plastic Degradation by Fungus Rasamsonia Emersonii

Authors: Naveen Kumar

Abstract:

Microplastics, tiny plastic particles less than 5 mm in size formed by the disposal and breakdown of industrial and consumer products, have become a primary environmental concern due to their ubiquitous presence and application in the environment and their potential to cause harm to the ecosystem, wildlife and human health. In this, we study the ability of the fungus Rasamsonia emersonii IMI 393752 to degrade the rigid microplastics of Coke bottles. Microplastics were extracted from Coke bottles and incubated with Rasamsonia emersonii in Sabouraud dextrose agar media. Microplastics were pre-sterilized without altering the chemistry of microplastic. Preliminary analysis was performed by observing radial growth assessment of microplastic-containing media enriched with fungi vs. control. The assay confirmed no impedance or change in the fungi's growth pattern and rate by introducing microplastics. The degradation of the microplastics was monitored over time using microscopy and FTIR, and biodegradation/deterioration on the plastic surface was observed. Furthermore, the liquid assay was performed. HPLC and GCMS will be conducted to check the biodegradation and presence of enzyme release by fungi to counteract the presence of microplastics. These findings have important implications for managing plastic waste, as they suggest that fungi such as Rasamsonia emersonii can potentially degrade microplastics safely and effectively. However, further research to optimise the conditions for microplastic degradation by Rasamsonia emersonii and to develop strategies for scaling up the process for industrial applications will be beneficial.

Keywords: bioremediation, mycoremediation, plastic degradtion, polyethylene terephthalate

Procedia PDF Downloads 60