Search results for: Deep Neural Network
2261 Dental Fluorosis in Domestic Animals Inhabiting Industrial Area of Udaipur, Rajasthan, India
Authors: Lalita Panchal, Zulfiya Sheikh
Abstract:
Fluoride is essential for teeth and bones development not only for human beings but also for animals. But excess intake of fluoride causes harmful effects on health. Fluorosis is a worldwide health hazard and India is also one of the endemic countries. Udaipur district of Rajasthan is also prone to fluorosis and superphosphate industries are aggravating fluoride toxicity in this area. Grazing fields for animals in the close vicinity of the industries, fodder and water are fluoride contaminated. Fluoride toxicity in the form of dental fluorosis was observed in domestic animals, inhabiting industrial area near Udaipur, where superphosphate fertilizer plants are functioning and releasing fluoride and fumes and effluents into the surroundings. These fumes and gases directly affect the vegetation of grazing field, thus allowing entry of fluoride into the food chain. A survey was conducted in this area to assess the severity of fluorosis, in 2015-16. It was a house to house survey and animal owners were asked for their fodder and water supply. Anterior teeth of the animal were observed. Domestic animals exhibited mild to severe signs of dental fluorosis. Teeth showed deep brown staining, patches, lines and abrasions. Even immature animals were affected badly. Most of the domestic animals were affected, but goats of this area showed chronic symptoms of fluorosis. Due to abrasion of teeth and paining teeth their chewing or grazing capacity and appetite reduced. Eventually, it reduced the life span of animals and increased the mortality rate.Keywords: domestic animals, fluoride toxicity, industrial fluorosis, superphosphate fertilizers
Procedia PDF Downloads 2952260 Feasibility Assessment of High-Temperature Superconducting AC Cable Lines Implementation in Megacities
Authors: Andrey Kashcheev, Victor Sytnikov, Mikhail Dubinin, Elena Filipeva, Dmitriy Sorokin
Abstract:
Various variants of technical solutions aimed at improving the reliability of power supply to consumers of 110 kV substation are considered. For each technical solution, the results of calculation and analysis of electrical modes and short-circuit currents in the electrical network are presented. The estimation of electric energy consumption for losses within the boundaries of substation reconstruction was carried out in accordance with the methodology for determining the standards of technological losses of electricity during its transmission through electric networks. The assessment of the technical and economic feasibility of the use of HTS CL compared with the complex reconstruction of the 110 kV substation was carried out. It is shown that the use of high-temperature superconducting AC cable lines is a possible alternative to traditional technical solutions used in the reconstruction of substations.Keywords: superconductivity, cable lines, superconducting cable, AC cable, feasibility
Procedia PDF Downloads 962259 Timely Screening for Palliative Needs in Ambulatory Oncology
Authors: Jaci Mastrandrea
Abstract:
Background: The National Comprehensive Cancer Network (NCCN) recommends that healthcare institutions have established processes for integrating palliative care (PC) into cancer treatment and that all cancer patients be screened for PC needs upon initial diagnosis as well as throughout the entire continuum of care (National Comprehensive Cancer Network, 2021). Early PC screening is directly correlated with improved patient outcomes. The Sky Lakes Cancer Treatment Center (SLCTC) is an institution that has access to PC services yet does not have protocols in place for identifying patients with palliative needs or a standardized referral process. The aim of this quality improvement project is to improve early access to PC services by establishing a standardized screening and referral process for outpatient oncology patients. Method: The sample population included all adult patients with an oncology diagnosis who presented to the SLCTC for treatment during the project timeline from March 15th, 2022, to April 29th, 2022. The “Palliative and Supportive Needs Assessment'' (PSNA) screening tool was developed from validated and evidence-based PC referral criteria. The tool was initially implemented using paper forms and later was integrated into the Epic-Beacon EHR system. Patients were screened by registered nurses on the SLCTC treatment team. Nurses responsible for screening patients received an educational inservice prior to implementation. Patients with a PSNA score of three or higher were considered to be a positive screen. Scores of five or higher triggered a PC referral order in the patient’s EHR for the oncologist to review and approve. All patients with a positive screen received an educational handout on the topic of PC, and the EHR was flagged for follow-up. Results: Prior to implementation of the PSCNA screening tool, the SLCTC had zero referrals to PC in the past year, excluding referrals to hospice. Data was collected from the first 100 patient screenings completed within the eight-week data collection period. Seventy-three percent of patients met criteria for PC referral with a score greater than or equal to three. Of those patients who met referral criteria, 53.4% (39 patients) were referred for a palliative and supportive care consultation. Patients that were not referred to PC upon meeting the criteria were flagged in the EHR for re-screening within one to three months. Patients with lung cancer, chronic hematologic malignancies, breast cancer, and gastrointestinal malignancy most frequently met criteria for PC referral and scored highest overall on the scale of 0-12. Conclusion: The implementation of a standardized PC screening tool at the SLCTC significantly increased awareness of PC needs among cancer patients in the outpatient setting. Additionally, data derived from this quality improvement project supports the national recommendation for PC to be an integral component of cancer treatment across the entire continuum of care.Keywords: oncology, palliative care, symptom management, symptom screening, ambulatory oncology, cancer, supportive care
Procedia PDF Downloads 762258 Investigation of Different Control Stratgies for UPFC Decoupled Model and the Impact of Location on Control Parameters
Authors: S. A. Al-Qallaf, S. A. Al-Mawsawi, A. Haider
Abstract:
In order to evaluate the performance of a unified power flow controller (UPFC), mathematical models for steady state and dynamic analysis are to be developed. The steady state model is mainly concerned with the incorporation of the UPFC in load flow studies. Several load flow models for UPFC have been introduced in literature, and one of the most reliable models is the decoupled UPFC model. In spite of UPFC decoupled load flow model simplicity, it is more robust compared to other UPFC load flow models and it contains unique capabilities. Some shortcoming such as additional set of nonlinear equations are to be solved separately after the load flow solution is obtained. The aim of this study is to investigate the different control strategies that can be realized in the decoupled load flow model (individual control and combined control), and the impact of the location of the UPFC in the network on its control parameters.Keywords: UPFC, decoupled model, load flow, control parameters
Procedia PDF Downloads 5552257 IACOP - Route Optimization in Wireless Networks Using Improved Ant Colony Optimization Protocol
Authors: S. Vasundra, D. Venkatesh
Abstract:
Wireless networks have gone through an extraordinary growth in the past few years, and will keep on playing a crucial role in future data communication. The present wireless networks aim to make communication possible anywhere and anytime. With the converging of mobile and wireless communications with Internet services, the boundary between mobile personal telecommunications and wireless computer networks is disappearing. Wireless networks of the next generation need the support of all the advances on new architectures, standards, and protocols. Since an ad hoc network may consist of a large number of mobile hosts, this imposes a significant challenge on the design of an effective and efficient routing protocol that can work well in an environment with frequent topological changes. This paper proposes improved ant colony optimization (IACO) technique. It also maintains load balancing in wireless networks. The simulation results show that the proposed IACO performs better than existing routing techniques.Keywords: wireless networks, ant colony optimization, load balancing, architecture
Procedia PDF Downloads 4212256 Geophysical and Laboratory Evaluation of Aquifer Position, Aquifer Protective Capacity and Groundwater Quality in Selected Dumpsites in Calabar Municipal Local Government Area, South Eastern Nigeria
Authors: Egor Atan Obeten, Abong Augustine Agwul, Bissong A. Samson
Abstract:
The position of the aquifer, its protective capability, and the quality of the groundwater beneath the dumpsite were all investigated. The techniques employed were laboratory, tritium tagging, electrical resistivity tomography (ERT), and vertical electrical sounding (VES). With a maximum electrode spacing of 500 meters, fifteen VES stations were used, and IPI2win software was used to analyze the data collected. The resistivity map of the dumpsite was determined by deploying six ERT stations for the 2 D survey. To ascertain the degree of soil infiltration beneath the dumpsite, the tritium tagging method was used. Using a conventional laboratory procedure, groundwater samples were taken from neighboring boreholes and examined. The findings showed that there were three to five geoelectric layers, with the aquifer position being inferred to be between 24.2 and 75.1 meters deep in the third, fourth, and fifth levels. Siemens with values in the range of 0.0235 to 0.1908 for the load protection capacity were deemed to be, at most, weakly and badly protected. The obtained porosity values ranged from 44.45 to 89.75. Strong calculated values for transmissivity and porosity indicate a permeable aquifer system with considerable storativity. The area has an infiltration value between 8 and 22 percent, according to the results of the tritium tagging technique, which was used to evaluate the level of infiltration from the dumpsite. Groundwater samples that have been analyzed reveal levels of NO2, DO, Pb2+, magnesium, and cadmium that are higher than what the NSDWQ has approved. Overall analysis of the results from the above-described methodologies shows that the study area's aquifer system is porous and that contaminants will circulate through it quickly if they are contaminated.Keywords: aquifer, transmissivity, dumpsite, groundwater
Procedia PDF Downloads 472255 Unleashing Potential in Pedagogical Innovation for STEM Education: Applying Knowledge Transfer Technology to Guide a Co-Creation Learning Mechanism for the Lingering Effects Amid COVID-19
Authors: Lan Cheng, Harry Qin, Yang Wang
Abstract:
Background: COVID-19 has induced the largest digital learning experiment in history. There is also emerging research evidence that students have paid a high cost of learning loss from virtual learning. University-wide survey results demonstrate that digital learning remains difficult for students who struggle with learning challenges, isolation, or a lack of resources. Large-scale efforts are therefore increasingly utilized for digital education. To better prepare students in higher education for this grand scientific and technological transformation, STEM education has been prioritized and promoted as a strategic imperative in the ongoing curriculum reform essential for unfinished learning needs and whole-person development. Building upon five key elements identified in the STEM education literature: Problem-based Learning, Community and Belonging, Technology Skills, Personalization of Learning, Connection to the External Community, this case study explores the potential of pedagogical innovation that integrates computational and experimental methodologies to support, enrich, and navigate STEM education. Objectives: The goal of this case study is to create a high-fidelity prototype design for STEM education with knowledge transfer technology that contains a Cooperative Multi-Agent System (CMAS), which has the objectives of (1) conduct assessment to reveal a virtual learning mechanism and establish strategies to facilitate scientific learning engagement, accessibility, and connection within and beyond university setting, (2) explore and validate an interactional co-creation approach embedded in project-based learning activities under the STEM learning context, which is being transformed by both digital technology and student behavior change,(3) formulate and implement the STEM-oriented campaign to guide learning network mapping, mitigate the loss of learning, enhance the learning experience, scale-up inclusive participation. Methods: This study applied a case study strategy and a methodology informed by Social Network Analysis Theory within a cross-disciplinary communication paradigm (students, peers, educators). Knowledge transfer technology is introduced to address learning challenges and to increase the efficiency of Reinforcement Learning (RL) algorithms. A co-creation learning framework was identified and investigated in a context-specific way with a learning analytic tool designed in this study. Findings: The result shows that (1) CMAS-empowered learning support reduced students’ confusion, difficulties, and gaps during problem-solving scenarios while increasing learner capacity empowerment, (2) The co-creation learning phenomenon have examined through the lens of the campaign and reveals that an interactive virtual learning environment fosters students to navigate scientific challenge independently and collaboratively, (3) The deliverables brought from the STEM educational campaign provide a methodological framework both within the context of the curriculum design and external community engagement application. Conclusion: This study brings a holistic and coherent pedagogy to cultivates students’ interest in STEM and develop them a knowledge base to integrate and apply knowledge across different STEM disciplines. Through the co-designing and cross-disciplinary educational content and campaign promotion, findings suggest factors to empower evidence-based learning practice while also piloting and tracking the impact of the scholastic value of co-creation under the dynamic learning environment. The data nested under the knowledge transfer technology situates learners’ scientific journey and could pave the way for theoretical advancement and broader scientific enervators within larger datasets, projects, and communities.Keywords: co-creation, cross-disciplinary, knowledge transfer, STEM education, social network analysis
Procedia PDF Downloads 1142254 Geothermal Energy Potential Estimates of Niger Delta Basin from Recent Studies
Authors: Olumide J. Adedapo
Abstract:
In this work, geothermal energy resource maps of the Niger Delta Basin were constructed using borehole thermal log data from over 300 deep wells. Three major geothermal anomalies were delineated and quantitatively interpreted in both onshore and offshore parts of the Niger Delta. The geothermal maps present the distribution of geothermal energy stored in the sedimentary rock mass in two ways: the accessible resources in depth interval 0-4000 m and static geothermal energy resources stored in the complete sedimentary infill of the basin (from the ground surface to the basement). The first map shows two major onshore anomalies, one in the north (with maximum energy values, 800 GJ/m2), another in the east to northeastern part (maximum energy values of 1250–1500 GJ/m2). Another two major anomalies occur offshore, one in the south with values of 750-1000 GJ/m2, occurring at about 100 km seawards and the other, in the southwest offshore with values 750-1250 GJ/m2, still at about 100 km from the shore. A second map of the Niger Delta shows a small anomaly in the northern part with the maximum value of 1500 GJ/m2 and a major anomaly occurring in the eastern part of the basin, onshore, with values of 2000-3500 GJ/m2. Offshore in the south and southwest anomalies in the total sedimentary rock mass occur with highest values up to 4000GJ/m2, with the southwestern anomaly extending west to the shore. It is much of interest to note the seaward–westward extension of these anomalies both in size, configuration, and magnitude for the geothermal energy in the total sedimentary thickness to the underlying basement. These anomalous fields show the most favourable locations and areas for further work on geothermal energy resources.Keywords: geothermal energy, offshore, Niger delta, basin
Procedia PDF Downloads 2132253 High Aspect Ratio Sio2 Capillary Based On Silicon Etching and Thermal Oxidation Process for Optical Modulator
Authors: Nguyen Van Toan, Suguru Sangu, Tetsuro Saito, Naoki Inomata, Takahito Ono
Abstract:
This paper presents the design and fabrication of an optical window for an optical modulator toward image sensing applications. An optical window consists of micrometer-order SiO2 capillaries (porous solid) that can modulate transmission light intensity by moving the liquid in and out of porous solid. A high optical transmittance of the optical window can be achieved due to refractive index matching when the liquid is penetrated into the porous solid. Otherwise, its light transmittance is lower because of light reflection and scattering by air holes and capillary walls. Silicon capillaries fabricated by deep reactive ion etching (DRIE) process are completely oxidized to form the SiO2 capillaries. Therefore, high aspect ratio SiO2 capillaries can be achieved based on silicon capillaries formed by DRIE technique. Large compressive stress of the oxide causes bending of the capillary structure, which is reduced by optimizing the design of device structure. The large stress of the optical window can be released via thin supporting beams. A 7.2 mm x 9.6 mm optical window area toward a fully integrated with the image sensor format is successfully fabricated and its optical transmittance is evaluated with and without inserting liquids (ethanol and matching oil). The achieved modulation range is approximately 20% to 35% with and without liquid penetration in visible region (wavelength range from 450 nm to 650 nm).Keywords: thermal oxidation process, SiO2 capillaries, optical window, light transmittance, image sensor, liquid penetration
Procedia PDF Downloads 4922252 Wavelength Conversion of Dispersion Managed Solitons at 100 Gbps through Semiconductor Optical Amplifier
Authors: Kadam Bhambri, Neena Gupta
Abstract:
All optical wavelength conversion is essential in present day optical networks for transparent interoperability, contention resolution, and wavelength routing. The incorporation of all optical wavelength convertors leads to better utilization of the network resources and hence improves the efficiency of optical networks. Wavelength convertors that can work with Dispersion Managed (DM) solitons are attractive due to their superior transmission capabilities. In this paper, wavelength conversion for dispersion managed soliton signals was demonstrated at 100 Gbps through semiconductor optical amplifier and an optical filter. The wavelength conversion was achieved for a 1550 nm input signal to1555nm output signal. The output signal was measured in terms of BER, Q factor and system margin.Keywords: all optical wavelength conversion, dispersion managed solitons, semiconductor optical amplifier, cross gain modultation
Procedia PDF Downloads 4532251 Research on Construction of Subject Knowledge Base Based on Literature Knowledge Extraction
Authors: Yumeng Ma, Fang Wang, Jinxia Huang
Abstract:
Researchers put forward higher requirements for efficient acquisition and utilization of domain knowledge in the big data era. As literature is an effective way for researchers to quickly and accurately understand the research situation in their field, the knowledge discovery based on literature has become a new research method. As a tool to organize and manage knowledge in a specific domain, the subject knowledge base can be used to mine and present the knowledge behind the literature to meet the users' personalized needs. This study designs the construction route of the subject knowledge base for specific research problems. Information extraction method based on knowledge engineering is adopted. Firstly, the subject knowledge model is built through the abstraction of the research elements. Then under the guidance of the knowledge model, extraction rules of knowledge points are compiled to analyze, extract and correlate entities, relations, and attributes in literature. Finally, a database platform based on this structured knowledge is developed that can provide a variety of services such as knowledge retrieval, knowledge browsing, knowledge q&a, and visualization correlation. Taking the construction practices in the field of activating blood circulation and removing stasis as an example, this study analyzes how to construct subject knowledge base based on literature knowledge extraction. As the system functional test shows, this subject knowledge base can realize the expected service scenarios such as a quick query of knowledge, related discovery of knowledge and literature, knowledge organization. As this study enables subject knowledge base to help researchers locate and acquire deep domain knowledge quickly and accurately, it provides a transformation mode of knowledge resource construction and personalized precision knowledge services in the data-intensive research environment.Keywords: knowledge model, literature knowledge extraction, precision knowledge services, subject knowledge base
Procedia PDF Downloads 1632250 The Effect of a Three-Month Training Program on the Back Kyphosis of Former Male Addicts
Authors: M. J. Pourvaghar, Sh. Khoshemehry
Abstract:
Adopting inappropriate body posture during addiction can cause muscular and skeletal deformities. This study is aimed at investigating the effects of a program of the selected corrective exercises on the kyphosis of addicted male patients. Materials and methods: This was a quasi-experimental study. This study has been carried out using the semi-experimental method. The subjects of the present study included 104 addicted men between 25 to 45 years of age. In 2014, these men were referred to one of the NA (Narcotic Anonymous) centres in Kashan in 2015. A total of 24 people suffering from drug withdrawal, who had abnormal kyphosis, were purposefully selected as a sample. The sample was randomly divided into two groups, experimental and control; each group consisted of 12 people. The experimental group participated in a training program for 12 weeks consisting of three 60 minute sessions per week. That includes strengthening, stretching and PNF exercises (deep stretching of the muscle). The control group did no exercise or corrective activity. The Kolmogorov-Smirnov test was used to assess normal distribution of data; and a paired t-test and covariance analysis test were used to assess the effectiveness of the exercises, with a significance level of P≤0.05 by using SPSS18. The results showed that three months of the selected corrective exercises had a significant effect (P≤ 0.005) on the correction of the kyphosis of the addicted male patients after three months of rehabilitation (drug withdrawal) in the experimental group, while there was no significant difference recorded in the control group (P≥0.05). The results show that exercise and corrective activities can be used as non-invasive and non-pharmacological methods to rehabilitate kyphosis abnormalities after drug withdrawal and treatment for addiction.Keywords: kyphosis, exercise-rehabilitation, addict, addiction
Procedia PDF Downloads 2802249 Comparison of Security Challenges and Issues of Mobile Computing and Internet of Things
Authors: Aabiah Nayeem, Fariha Shafiq, Mustabshra Aftab, Rabia Saman Pirzada, Samia Ghazala
Abstract:
In this modern era of technology, the concept of Internet of Things is very popular in every domain. It is a widely distributed system of things in which the data collected from sensory devices is transmitted, analyzed locally/collectively then broadcasted to network where action can be taken remotely via mobile/web apps. Today’s mobile computing is also gaining importance as the services are provided during mobility. Through mobile computing, data are transmitted via computer without physically connected to a fixed point. The challenge is to provide services with high speed and security. Also, the data gathered from the mobiles must be processed in a secured way. Mobile computing is strongly influenced by internet of things. In this paper, we have discussed security issues and challenges of internet of things and mobile computing and we have compared both of them on the basis of similarities and dissimilarities.Keywords: embedded computing, internet of things, mobile computing, wireless technologies
Procedia PDF Downloads 3162248 Patrimonial Politics in 21ˢᵗ Century Central Africa, Evolution and Progress
Authors: Collins Nkapnwo Formella
Abstract:
The democratic wave of the 1980s and 1990s brought a lot of hopes to the politics of African states as many nation-states adopted ‘democracy.’ The end of the Cold War ushered in, with a lot of rush, pro-democracy movements, which led to multi-party politics, following constitutional reviews. For the very first time since independence, Africans revolted against personalized dictatorship and adopted the idea of limited office terms for the presidents. This paper dives deep into the history of Africa post-independence with the aim of allowing the readers to understand the nature of the differences in the political setups that currently govern the continent and the central region in particular. Time has proven the euphoria that characterized post-Cold War African politics at least for many countries short-lived, as their leaders were unable to re-design the institutions of governance from the compromise and interest-oriented structures handed down after independence. The result has been that politics in many of the countries have been tailored down along the lines of winner takes all approach, with the accumulation of state power being the sole objective of the leaders. The paper contends that 21ˢᵗ Century African politics is exactly the politics of inclusion/exclusion based on ethnic and interest groups, leading to the flourishing of patrimonial authoritarian regimes. It also puts to the test, whether authoritarian responses to delivering growth (economic, political, social) and peace as has been the model adopted by many leaders is superior compared to democracy. This paper then concludes by adding that the practice of democracy in the Central African region in its current form is inherently flawed from its foundations, thus incapable of rooting out the crises faced in the region.Keywords: authoritarianism, democracy, development, power, institutions
Procedia PDF Downloads 1902247 A Review of the Parameters Used in Gateway Selection Schemes for Internet Connected MANETs
Authors: Zainab S. Mahmood, Aisha H. Hashim, Wan Haslina Hassan, Farhat Anwar
Abstract:
The wide use of the internet-based applications bring many challenges to the researchers to guarantee the continuity of the connections needed by the mobile hosts and provide reliable Internet access for them. One of proposed solutions by Internet Engineering Task Force (IETF) is to connect the local, multi-hop, and infrastructure-less Mobile Ad hoc Network (MANET) with Internet structure. This connection is done through multi-interface devices known as Internet Gateways. Many issues are related to this connection like gateway discovery, hand off, address auto-configuration and selecting the optimum gateway when multiple gateways exist. Many studies were done proposing gateway selection schemes with a single selection criterion or weighted multiple criteria. In this research, a review of some of these schemes is done showing the differences, the features, the challenges and the drawbacks of each of them.Keywords: Internet Gateway, MANET, mobility, selection criteria
Procedia PDF Downloads 4242246 Optimal MPPT Charging Battery System for Photovoltaic Standalone Applications
Authors: Kelaiaia Mounia Samira, Labar Hocine, Mesbah Tarek, Kelaiaia samia
Abstract:
The photovoltaic panel produces green power, and because of its availability across the globe, it can supply isolated loads (site away of the electrical network or difficult of access). Unfortunately this energy remains very expensive. The most application of these types of power needs storage devices, the Lithium batteries are commonly used because of its powerful storage capability. Using a solar panel or an array of panels without a controller that can perform MPPT will often result in wasted power, which results in the need to install more panels for the same power requirement. For devices that have the battery connected directly to the panel, this will also result in premature battery failure or capacity loss. In this paper it is proposed a modified P&O algorithm for the MPPT which takes in account the battery’s internal resistance vs temperature and stage of charging. Of course the temperature variation and irradiation of the PV panel are also introduced.Keywords: modeling, battery, MPPT, charging, PV Panel
Procedia PDF Downloads 5252245 Developing the Skills of Reading Comprehension of Learners of English as a Second Language
Authors: Indu Gamage
Abstract:
Though commonly utilized as a language improvement technique, reading has not been fully employed by both language teachers and learners to develop reading comprehension skills in English as a second language. In a Sri Lankan context, this area has to be delved deep into as the learners’ show more propensity to analyze. Reading comprehension is an area that most language teachers and learners struggle with though it appears easy. Most ESL learners engage in reading tasks without being properly aware of the objective of doing reading comprehension. It is observed that when doing reading tasks, the language learners’ concern is more on the meanings of individual words than on the overall comprehension of the given text. The passiveness with which the ESL learners engage themselves in reading comprehension makes reading a tedious task for the learner thereby giving the learner a sense of disappointment at the end. Certain reading tasks take the form of translations. The active cognitive participation of the learner in the mode of using productive strategies for predicting, employing schemata and using contextual clues seems quite less. It was hypothesized that the learners’ lack of knowledge of the productive strategies of reading was the major obstacle that makes reading comprehension a tedious task for them. This study is based on a group of 30 tertiary students who read English only as a fundamental requirement for their degree. They belonged to the Faculty of Humanities and Social Sciences of the University of Ruhuna, Sri Lanka. Almost all learners hailed from areas where English was hardly utilized in their day to day conversations. The study is carried out in the mode of a questionnaire to check their opinions on reading and a test to check whether the learners are using productive strategies of reading when doing reading comprehension tasks. The test comprised reading questions covering major productive strategies for reading. Then the results were analyzed to see the degree of their active engagement in comprehending the text. The findings depicted the validity of the hypothesis as grounds behind the difficulties related to reading comprehension.Keywords: reading, comprehension, skills, reading strategies
Procedia PDF Downloads 1752244 A New Approach for PE100 Characterization; An in-Reactor HDPE Alloy with Semi Hard and Soft Segments
Authors: Sasan Talebnezhad, Parviz Hamidia
Abstract:
GPC and RMS analysis showed no distinct difference between PE 100 On, Off, and Reference grade. But FTIR spectra and multiple endothermic peaks obtained from SSA analysis, attributed to heterogeneity of ethylene sequence length, lamellar thickness and also the non-uniformity of short chain branching, showed sharp discrepancy and proposed a blend structure of high-density polyethylenes in PE 100 grade. Catalysis along with process parameters dictates poly blend PE 100 structure. This in-reactor blend is a mixture of compatible co-crystallized phases with different crystalinity, forming a physical semi hard and soft segment network responsible for improved impact properties in PE 100 pipe grade. We propose a new approach for PE100 evaluation that is more efficient than normal microstructure characterization.Keywords: HDPE, pipe grade, in-reactor blend, hard and soft segments
Procedia PDF Downloads 4462243 Post-Quantum Resistant Edge Authentication in Large Scale Industrial Internet of Things Environments Using Aggregated Local Knowledge and Consistent Triangulation
Authors: C. P. Autry, A. W. Roscoe, Mykhailo Magal
Abstract:
We discuss the theoretical model underlying 2BPA (two-band peer authentication), a practical alternative to conventional authentication of entities and data in IoT. In essence, this involves assembling a virtual map of authentication assets in the network, typically leading to many paths of confirmation between any pair of entities. This map is continuously updated, confirmed, and evaluated. The value of authentication along multiple disjoint paths becomes very clear, and we require analogues of triangulation to extend authentication along extended paths and deliver it along all possible paths. We discover that if an attacker wants to make an honest node falsely believe she has authenticated another, then the length of the authentication paths is of little importance. This is because optimal attack strategies correspond to minimal cuts in the authentication graph and do not contain multiple edges on the same path. The authentication provided by disjoint paths normally is additive (in entropy).Keywords: authentication, edge computing, industrial IoT, post-quantum resistance
Procedia PDF Downloads 1972242 Design and Construction Validation of Pile Performance through High Strain Pile Dynamic Tests for both Contiguous Flight Auger and Drilled Displacement Piles
Authors: S. Pirrello
Abstract:
Sydney’s booming real estate market has pushed property developers to invest in historically “no-go” areas, which were previously too expensive to develop. These areas are usually near rivers where the sites are underlain by deep alluvial and estuarine sediments. In these ground conditions, conventional bored pile techniques are often not competitive. Contiguous Flight Auger (CFA) and Drilled Displacement (DD) Piles techniques are on the other hand suitable for these ground conditions. This paper deals with the design and construction challenges encountered with these piling techniques for a series of high-rise towers in Sydney’s West. The advantages of DD over CFA piles such as reduced overall spoil with substantial cost savings and achievable rock sockets in medium strength bedrock are discussed. Design performances were assessed with PIGLET. Pile performances are validated in two stages, during constructions with the interpretation of real-time data from the piling rigs’ on-board computer data, and after construction with analyses of results from high strain pile dynamic testing (PDA). Results are then presented and discussed. High Strain testing data are presented as Case Pile Wave Analysis Program (CAPWAP) analyses.Keywords: contiguous flight auger (CFA) , DEFPIG, case pile wave analysis program (CAPWAP), drilled displacement piles (DD), pile dynamic testing (PDA), PIGLET, PLAXIS, repute, pile performance
Procedia PDF Downloads 2822241 Fabrication of Chitosan/Polyacrylonitrile Blend and SEMI-IPN Hydrogel with Epichlorohydrin
Authors: Muhammad Omer Aijaz, Sajjad Haider, Fahad S. Al Mubddal, Yousef Al-Zeghayer, Waheed A. Al Masry
Abstract:
The present study is focused on the preparation of chitosan-based blend and Semi-Interpenetrating Polymer Network (SEMI-IPN) with polyacrylonitrile (PAN). Blend Chitosan/Polyacrylonitrile (PAN) hydrogel films were prepared by solution blending and casting technique. Chitosan in the blend was cross-linked with epichlorohydrin (ECH) to prepare SEMI-IPN. The developed Chitosan/PAN blend and SEMI-IPN hydrogels were characterized with SEM, FTIR, TGA, and DSC. The result showed good miscibility between chitosan and PAN, crosslinking of chitosan in the blend, and improved thermal properties for SEMI-IPN. The swelling of the different blended and SEMI-IPN hydrogels samples were examined at room temperature. Blend (C80/P20) sample showed highest swelling (2400%) and fair degree of stability (28%) whereas SEMI-IPN hydrogel exhibited relatively low degree of swelling (244%) and high degree of aqueous stability (85.5%).Keywords: polymer hydrogels, chitosan, SEMI-IPN, polyacrylonitrile, epichlorohydrin
Procedia PDF Downloads 3732240 Mnemotopic Perspectives: Communication Design as Stabilizer for the Memory of Places
Authors: C. Galasso
Abstract:
The ancestral relationship between humans and geographical environment has long been at the center of an interdisciplinary dialogue, which sees one of its main research nodes in the relationship between memory and places. Given its deep complexity, this symbiotic connection continues to look for a proper definition that appears increasingly negotiated by different disciplines. Numerous fields of knowledge are involved, from anthropology to semiotics of space, from photography to architecture, up to subjects traditionally far from these reasonings. This is the case of Design of Communication, a young discipline, now confident in itself and its objectives, aimed at finding and investigating original forms of visualization and representation, between sedimented knowledge and new technologies. In particular, Design of Communication for the Territory offers an alternative perspective to the debate, encouraging the reactivation and reconstruction of the memory of places. Recognizing mnemotopes as a cultural object of vertical interpretation of the memory-place relationship, design can become a real mediator of the territorial fixation of memories, making them increasingly accessible and perceptible, contributing to build a topography of memory. According to a mnemotopic vision, Communication Design can support the passage from a memory in which the observer participates only as an individual to a collective form of memory. A mnemotopic form of Communication Design can, through geolocation and content map-based systems, make chronology a topography rooted in the territory and practicable; it can be useful to understand how the perception of the memory of places changes over time, considering how to insert them in the contemporary world. Mnemotopes can be materialized in different format of translation, editing and narration and then involved in complex systems of communication. The memory of places, therefore, if stabilized by the tools offered by Communication Design, can make visible ruins and territorial stratifications, illuminating them with new communicative interests that can be shared and participated.Keywords: memory of places, design of communication, territory, mnemotope, topography of memory
Procedia PDF Downloads 1322239 A Low-Power, Low-Noise and High Linearity 60 GHz LNA for WPAN Applications
Authors: Noha Al Majid, Said Mazer, Moulhime El Bekkali, Catherine Algani, Mahmoud Mehdi
Abstract:
A low noise figure (NF) and high linearity V-band Low Noise Amplifier (LNA) is reported in this article. The LNA compromises a three-stage cascode configuration. This LNA will be used as a part of a WPAN (Wireless Personal Area Network) receiver in the millimeter-wave band at 60 GHz. It is designed according to the MMIC technology (Monolithic Microwave Integrated Circuit) in PH 15 process from UMS foundry and uses a 0.15 μm GaAs PHEMT (Pseudomorphic High Electron Mobility Transistor). The particularity of this LNA compared to other LNAs in literature is its very low noise figure which is equal to 1 dB and its high linearity (IIP3 is about 22 dB). The LNA consumes 0.24 Watts, achieving a high gain which is about 23 dB, an input return loss better than -10 dB and an output return loss better than -8 dB.Keywords: low noise amplifier, V-band, MMIC technology, LNA, amplifier, cascode, pseudomorphic high electron mobility transistor (PHEMT), high linearity
Procedia PDF Downloads 5152238 Toxicological Interactions of Silver Nanoparticles and Non-Essential Metals in Human Hepatocarcinoma Cell Line
Authors: Renata Rank Miranda, Arandi Ginane Bezerra, Ciro Alberto Oliveira Ribeiro, Marco AntôNio Ferreira Randi, Carmen Lúcia Voigt, Lilian Skytte, Kaare Lund Rasmussen, Francisco Filipak Neto, Frank Kjeldsen
Abstract:
Synergetic and antagonistic effects of drugs are well-known concerns in pharmacological assessments of dose and toxicity. Similar approach should be used in assessing cellular uptake and cytotoxicity of nanoparticles. Since nanoparticles are released into the aquatic environment they may interact with existing xenobiotics. Here we used biochemical assays and quantitative proteomics to assess the cytotoxicity of silver nanoparticles (AgNP) when human hepatoma HepG2 cells were co-exposed to 2 nm AgNP together with either Cd2+ or Hg2+ ions. Time-course experiments (2h, 4h, and 24h) were conducted to assess the first response to the exposure studies. The general trend was that a synergetic toxicological response was observed in cells exposed to both AgNP and Cd2+ or Hg2+, with AgNP and Cd2+ being more toxic. This was observed by a significant increase in the ROS and superoxide level of >35% in the case of AgNP+Cd2+ compared to the sum of responses of AgNP and Cd2+, individually. Metabolic activity and viability also dropped more for AgNP+Cd2+ (>10%) than for AgNP and Cd2+ combined. We used inductively coupled plasma mass spectrometry to investigate if AgNP facilitates larger influx of toxic metal ions into HepG2 cells. Only Hg2+ ions was found to be more efficiently engulfed as the concentration of Hg2+ was found 2.8 times larger compared to exposure experiments with only Hg2+. This effect was not observed for Cd2+. We now continue with deep proteomics studies to obtain wider details on the mechanism of the toxicity related to AgNP, Cd2+, and AgNP+Cd2+, respectively.Keywords: nanotoxicology, silver nanoparticles, proteomics, human cell line
Procedia PDF Downloads 3482237 Implementation of Distributed Randomized Algorithms for Resilient Peer-to-Peer Networks
Authors: Richard Tanaka, Ying Zhu
Abstract:
This paper studies a few randomized algorithms in application-layer peer-to-peer networks. The significant gain in scalability and resilience that peer-to-peer networks provide has made them widely used and adopted in many real-world distributed systems and applications. The unique properties of peer-to-peer networks make them particularly suitable for randomized algorithms such as random walks and gossip algorithms. Instead of simulations of peer-to-peer networks, we leverage the Docker virtual container technology to develop implementations of the peer-to-peer networks and these distributed randomized algorithms running on top of them. We can thus analyze their behaviour and performance in realistic settings. We further consider the problem of identifying high-risk bottleneck links in the network with the objective of improving the resilience and reliability of peer-to-peer networks. We propose a randomized algorithm to solve this problem and evaluate its performance by simulations.Keywords: distributed randomized algorithms, peer-to-peer networks, virtual container technology, resilient networks
Procedia PDF Downloads 2162236 Analysis and Forecasting of Bitcoin Price Using Exogenous Data
Authors: J-C. Leneveu, A. Chereau, L. Mansart, T. Mesbah, M. Wyka
Abstract:
Extracting and interpreting information from Big Data represent a stake for years to come in several sectors such as finance. Currently, numerous methods are used (such as Technical Analysis) to try to understand and to anticipate market behavior, with mixed results because it still seems impossible to exactly predict a financial trend. The increase of available data on Internet and their diversity represent a great opportunity for the financial world. Indeed, it is possible, along with these standard financial data, to focus on exogenous data to take into account more macroeconomic factors. Coupling the interpretation of these data with standard methods could allow obtaining more precise trend predictions. In this paper, in order to observe the influence of exogenous data price independent of other usual effects occurring in classical markets, behaviors of Bitcoin users are introduced in a model reconstituting Bitcoin value, which is elaborated and tested for prediction purposes.Keywords: big data, bitcoin, data mining, social network, financial trends, exogenous data, global economy, behavioral finance
Procedia PDF Downloads 3552235 Fake News Detection Based on Fusion of Domain Knowledge and Expert Knowledge
Authors: Yulan Wu
Abstract:
The spread of fake news on social media has posed significant societal harm to the public and the nation, with its threats spanning various domains, including politics, economics, health, and more. News on social media often covers multiple domains, and existing models studied by researchers and relevant organizations often perform well on datasets from a single domain. However, when these methods are applied to social platforms with news spanning multiple domains, their performance significantly deteriorates. Existing research has attempted to enhance the detection performance of multi-domain datasets by adding single-domain labels to the data. However, these methods overlook the fact that a news article typically belongs to multiple domains, leading to the loss of domain knowledge information contained within the news text. To address this issue, research has found that news records in different domains often use different vocabularies to describe their content. In this paper, we propose a fake news detection framework that combines domain knowledge and expert knowledge. Firstly, it utilizes an unsupervised domain discovery module to generate a low-dimensional vector for each news article, representing domain embeddings, which can retain multi-domain knowledge of the news content. Then, a feature extraction module uses the domain embeddings discovered through unsupervised domain knowledge to guide multiple experts in extracting news knowledge for the total feature representation. Finally, a classifier is used to determine whether the news is fake or not. Experiments show that this approach can improve multi-domain fake news detection performance while reducing the cost of manually labeling domain labels.Keywords: fake news, deep learning, natural language processing, multiple domains
Procedia PDF Downloads 732234 Study of Heat Transfer through the Ground and its Accumulation Properties to Increase the Energy Efficiency of Underground Buildings
Authors: Sandeep Bandarwadkar, Tadas Zdankus
Abstract:
To maintain a comfortable indoor temperature for its residents in the colder season, heating a building is necessary. Due to the expansion in the construction sectors, the consumption of heating energy is increasing. According to Eurostat data, in the European Union, the share of energy consumption of heating energy for space and cooling in residential buildings was around 63% in 2019. These figures indicate that heating energy still accounts for a significant portion of total energy consumption in Europe. Innovation is crucial to reduce energy consumption in buildings and achieve greater energy efficiency and sustainability. It can bring about new solutions that are smarter and more natural energy generation to reduce greenhouse gas emissions. The ground can serve as an effective and sustainable heat accumulator for heating and cooling. The temperature of the ground is higher than that of the ambient air in the colder period and lower in the warmer period. The building deep in the soil could use less thermal energy compared to the above-ground buildings that provide the same amount of thermal comfort. The temperature difference between the soil and the air inside the building decreases as the temperature of the soil increases. In progress, this process generates the condition that acts against heat loss. However, heat dissipates further to the consecutive layers and reaches thermal equilibrium. The charging of the ground by heat and its dissipation through the adjacent soil layers was investigated experimentally. The results of this research showed that 9% of the energy savings in partially underground buildings and 44.4% in completely underground buildings were derived from heating the space. Heat loss to the ground is treated as a charge of the soil by thermal energy. The dependence of the intensity of the charge on time was analysed and presented.Keywords: heat transfer, accumulation of heat, underground building, soil charge
Procedia PDF Downloads 712233 Urban Poor: The Situations and Characteristics of the Problem and Social Welfare Service of Bangkok Metropolis
Authors: Sanchai Ratthanakwan
Abstract:
This research aims to study situations and characteristics of the problems facing the urban poor. The data and information are collected by focus group and in-depth interview leader and members of Four Regions Slum Network, community representatives and the social welfare officer. The research can be concluded that the problems of the urban poor faced with three major problems: Firstly, the shortage of housing and stability issues in housing; secondly, the problem of substandard quality of life; and thirdly, the debt problem. The study found that a solution will be found in two ways: First way is the creation of housing for the urban poor in slums or community intrusion by the state. Second way is the stability in the housing and subsistence provided by the community center called “housing stability”.Keywords: urban poor, social welfare, Bangkok metropolis, housing stability
Procedia PDF Downloads 4242232 NFC Communications with Mutual Authentication Based on Limited-Use Session Keys
Authors: Chalee Thammarat
Abstract:
Mobile phones are equipped with increased short-range communication functionality called Near Field Communication (or NFC for short). NFC needs no pairing between devices but suitable for little amounts of data in a very restricted area. A number of researchers presented authentication techniques for NFC communications, however, they still lack necessary authentication, particularly mutual authentication and security qualifications. This paper suggests a new authentication protocol for NFC communication that gives mutual authentication between devices. The mutual authentication is a one of property, of security that protects replay and man-in-the-middle (MitM) attack. The proposed protocols deploy a limited-use offline session key generation and use of distribution technique to increase security and make our protocol lightweight. There are four sub-protocols: NFCAuthv1 is suitable for identification and access control and NFCAuthv2 is suitable for the NFC-enhanced phone by a POS terminal for digital and physical goods and services.Keywords: cryptographic protocols, NFC, near field communications, security protocols, mutual authentication, network security
Procedia PDF Downloads 430