Search results for: method detection limit
17616 Measurement of Convective Heat Transfer from a Vertical Flat Plate Using Mach-Zehnder Interferometer with Wedge Fringe Setting
Authors: Divya Haridas, C. B. Sobhan
Abstract:
Laser interferometric methods have been utilized for the measurement of natural convection heat transfer from a heated vertical flat plate, in the investigation presented here. The study mainly aims at comparing two different fringe orientations in the wedge fringe setting of Mach-Zehnder interferometer (MZI), used for the measurements. The interference fringes are set in horizontal and vertical orientations with respect to the heated surface, and two different fringe analysis methods, namely the stepping method and the method proposed by Naylor and Duarte, are used to obtain the heat transfer coefficients. The experimental system is benchmarked with theoretical results, thus validating its reliability in heat transfer measurements. The interference fringe patterns are analyzed digitally using MATLAB 7 and MOTIC Plus softwares, which ensure improved efficiency in fringe analysis, hence reducing the errors associated with conventional fringe tracing. The work also discuss the relative merits and limitations of the two methods used.Keywords: Mach-Zehnder interferometer (MZI), natural convection, Naylor method, Vertical Flat Plate
Procedia PDF Downloads 37017615 Forensic Challenges in Source Device Identification for Digital Videos
Authors: Mustapha Aminu Bagiwa, Ainuddin Wahid Abdul Wahab, Mohd Yamani Idna Idris, Suleman Khan
Abstract:
Video source device identification has become a problem of concern in numerous domains especially in multimedia security and digital investigation. This is because videos are now used as evidence in legal proceedings. Source device identification aim at identifying the source of digital devices using the content they produced. However, due to affordable processing tools and the influx in digital content generating devices, source device identification is still a major problem within the digital forensic community. In this paper, we discuss source device identification for digital videos by identifying techniques that were proposed in the literature for model or specific device identification. This is aimed at identifying salient open challenges for future research.Keywords: video forgery, source camcorder, device identification, forgery detection
Procedia PDF Downloads 63417614 Protective Efficacy of Curcuma Aromatica Leaf Extract on Liver of Arsenic Intoxicated Albino Rats
Authors: Priya Bajaj, Baby Tabassum
Abstract:
Arsenic is a poisonous metalloid, naturally occurring in soil, air, rocks and ground water. This dreadful metalloid commonly exists as inorganic compound, arsenic trioxide. WHO permitted maximum limit for arsenic in water is 0.01 mg/L, but some affected areas show ground water level of arsenic up to 3 mg/L even. Ground water arsenic pollution has created a number of health problems, viz. keratosis, melanosis, lesions and even skin cancers. The key objective of our nested study was to characterize arsenic induced hepatotoxicity and to find out some herbal protection against it. For the purpose, we selected albino rat (Rattus norvegicus) as model for arsenic induced liver injury and wild turmeric (Curcuma aromatica) leaf extract as remedy for it. The study was performed at acute (1 day) and subacute (7, 14 & 21 days) levels. The LD50 estimated for arsenic trioxide was 14.98 mg/kg body weight. In our investigation, we observed a significant restoration of altered hepatic lipid, cholesterol, protein and glycogen contents as well as liver weight, body-weight and hepato-somatic index by Curcuma aromatica leaf extract before arsenic intoxication. The results reveal excellent protective efficacy of Curcuma aromatica leaf extract that further can be exploited in remediation programme in heavy metal affected areas.Keywords: arsenic, Curcuma aromatica, glycogen, lipids
Procedia PDF Downloads 25817613 Explicit Iterative Scheme for Approximating a Common Solution of Generalized Mixed Equilibrium Problem and Fixed Point Problem for a Nonexpansive Semigroup in Hilbert Space
Authors: Mohammad Farid
Abstract:
In this paper, we introduce and study an explicit iterative method based on hybrid extragradient method to approximate a common solution of generalized mixed equilibrium problem and fixed point problem for a nonexpansive semigroup in Hilbert space. Further, we prove that the sequence generated by the proposed iterative scheme converge strongly to the common solution of generalized mixed equilibrium problem and fixed point problem for a nonexpansive semigroup. This common solution is the unique solution of a variational inequality problem and is the optimality condition for a minimization problem. The results presented in this paper are the supplement, extension and generalization of the previously known results in this area.Keywords: generalized mixed equilibrium problem, fixed-point problem, nonexpansive semigroup, variational inequality problem, iterative algorithms, hybrid extragradient method
Procedia PDF Downloads 47617612 Orbit Determination from Two Position Vectors Using Finite Difference Method
Authors: Akhilesh Kumar, Sathyanarayan G., Nirmala S.
Abstract:
An unusual approach is developed to determine the orbit of satellites/space objects. The determination of orbits is considered a boundary value problem and has been solved using the finite difference method (FDM). Only positions of the satellites/space objects are known at two end times taken as boundary conditions. The technique of finite difference has been used to calculate the orbit between end times. In this approach, the governing equation is defined as the satellite's equation of motion with a perturbed acceleration. Using the finite difference method, the governing equations and boundary conditions are discretized. The resulting system of algebraic equations is solved using Tri Diagonal Matrix Algorithm (TDMA) until convergence is achieved. This methodology test and evaluation has been done using all GPS satellite orbits from National Geospatial-Intelligence Agency (NGA) precise product for Doy 125, 2023. Towards this, two hours of twelve sets have been taken into consideration. Only positions at the end times of each twelve sets are considered boundary conditions. This algorithm is applied to all GPS satellites. Results achieved using FDM compared with the results of NGA precise orbits. The maximum RSS error for the position is 0.48 [m] and the velocity is 0.43 [mm/sec]. Also, the present algorithm is applied on the IRNSS satellites for Doy 220, 2023. The maximum RSS error for the position is 0.49 [m], and for velocity is 0.28 [mm/sec]. Next, a simulation has been done for a Highly Elliptical orbit for DOY 63, 2023, for the duration of 6 hours. The RSS of difference in position is 0.92 [m] and velocity is 1.58 [mm/sec] for the orbital speed of more than 5km/sec. Whereas the RSS of difference in position is 0.13 [m] and velocity is 0.12 [mm/sec] for the orbital speed less than 5km/sec. Results show that the newly created method is reliable and accurate. Further applications of the developed methodology include missile and spacecraft targeting, orbit design (mission planning), space rendezvous and interception, space debris correlation, and navigation solutions.Keywords: finite difference method, grid generation, NavIC system, orbit perturbation
Procedia PDF Downloads 8917611 Arithmetic Operations Based on Double Base Number Systems
Authors: K. Sanjayani, C. Saraswathy, S. Sreenivasan, S. Sudhahar, D. Suganya, K. S. Neelukumari, N. Vijayarangan
Abstract:
Double Base Number System (DBNS) is an imminent system of representing a number using two bases namely 2 and 3, which has its application in Elliptic Curve Cryptography (ECC) and Digital Signature Algorithm (DSA).The previous binary method representation included only base 2. DBNS uses an approximation algorithm namely, Greedy Algorithm. By using this algorithm, the number of digits required to represent a larger number is less when compared to the standard binary method that uses base 2 algorithms. Hence, the computational speed is increased and time being reduced. The standard binary method uses binary digits 0 and 1 to represent a number whereas the DBNS method uses binary digit 1 alone to represent any number (canonical form). The greedy algorithm uses two ways to represent the number, one is by using only the positive summands and the other is by using both positive and negative summands. In this paper, arithmetic operations are used for elliptic curve cryptography. Elliptic curve discrete logarithm problem is the foundation for most of the day to day elliptic curve cryptography. This appears to be a momentous hard slog compared to digital logarithm problem. In elliptic curve digital signature algorithm, the key generation requires 160 bit of data by usage of standard binary representation. Whereas, the number of bits required generating the key can be reduced with the help of double base number representation. In this paper, a new technique is proposed to generate key during encryption and extraction of key in decryption.Keywords: cryptography, double base number system, elliptic curve cryptography, elliptic curve digital signature algorithm
Procedia PDF Downloads 40017610 Determination and Evaluation of the Need of Land Consolidation for Nationalization Purpose with the Survey Results
Authors: Turgut Ayten, Tayfun Çay, Demet Ayten
Abstract:
In this research, nationalization method for obtaining land on the destination of Ankara-Konya High Speed Train in Turkey; Land consolidation for nationalization purpose as an alternative solution on obtaining land; a survey prepared for land owners whose lands were nationalized and institution officials who carries out the nationalization and land consolidation was applied, were investigated and the need for land consolidation for nationalization purpose is tried to be put forth. Study area is located in the Konya city- Kadınhanı district-Kolukısa and Sarikaya neighbourhood in Turkey and land consolidation results of the selected field which is on the destination of the high-speed train route were obtained. The data obtained was shared with the landowners in the research area, their choice between the nationalization method and land consolidation for nationalization method was questioned. In addition, the organization and institution officials who are accepted to used primarily by the state for obtaining land that are needed for the investments of state, and institution officials who make land consolidation were investigated on the issues of the efficiency of the methods they used and if they tried different methods.Keywords: nationalization, land consolidation, land consolidation for nationalization
Procedia PDF Downloads 33017609 Palatability of a Garlic and Citrus Extract Feed Supplement to Enhance Energy Retention and Methane Production in Ruminants in vivo
Authors: Michael Graz, Andrew Shearer, Gareth Evans
Abstract:
Manipulation of rumen bacteria is receiving increasing attention as a way of controlling greenhouse gas (GHG) emissions that are generated by the agricultural sector. Feed supplementation in particular is one of the ways in which this drive is being addressed, in particular with reference to livestock-generated GHG emissions. A blend of naturally occurring chemical extracts obtained from garlic and bitter orange extracts has been identified as a natural, sustainable and non-antibiotic based way of reducing methane production by ruminant livestock. In the current study, the acceptability and impact of this blend of natural extracts on feed rations of beef cattle was trialed in vivo on a commercial farm in Europe. Initial findings have demonstrated acceptable palatability, with all animals accepting the feed supplement into their ration both when it was mixed into the total daily ration and when used as a part of their high energy rations. Measurement of the impact of this feed supplement on productivity weight gain and milk quality is ongoing. In conclusion, this field study confirmed the palatability of the combination of garlic and citrus extracts and hence pointed to possibility of the extract blend to improve digestion, enhance body energy retention and limit CH4 formation in relation to feed intake.Keywords: citrus, garlic, methane reduction, palatability, ruminants
Procedia PDF Downloads 39717608 Analysis of Histogram Asymmetry for Waste Recognition
Authors: Janusz Bobulski, Kamila Pasternak
Abstract:
Despite many years of effort and research, the problem of waste management is still current. So far, no fully effective waste management system has been developed. Many programs and projects improve statistics on the percentage of waste recycled every year. In these efforts, it is worth using modern Computer Vision techniques supported by artificial intelligence. In the article, we present a method of identifying plastic waste based on the asymmetry analysis of the histogram of the image containing the waste. The method is simple but effective (94%), which allows it to be implemented on devices with low computing power, in particular on microcomputers. Such de-vices will be used both at home and in waste sorting plants.Keywords: waste management, environmental protection, image processing, computer vision
Procedia PDF Downloads 12417607 The Transport of Radical Species to Single and Double Strand Breaks in the Liver’s DNA Molecule by a Hybrid Method of Type Monte Carlo - Diffusion Equation
Abstract:
The therapeutic utility of certain Auger emitters such as iodine-125 depends on their position within the cell nucleus . Or diagnostically, and to maintain as low as possible cell damage, it is preferable to have radionuclide localized outside the cell or at least the core. One solution to this problem is to consider markers capable of conveying anticancer drugs to the tumor site regardless of their location within the human body. The objective of this study is to simulate the impact of a complex such as bleomycin on single and double strand breaks in the DNA molecule. Indeed, this simulation consists of the following transactions: - Construction of BLM -Fe- DNA complex. - Simulation of the electron’s transport from the metastable state excitation of Fe 57 by the Monte Carlo method. - Treatment of chemical reactions in the considered environment by the diffusion equation. For physical, physico-chemical and finally chemical steps, the geometry of the complex is considered as a sphere of 50 nm centered on the binding site , and the mathematical method used is called step by step based on Monte Carlo codes.Keywords: concentration, yield, radical species, bleomycin, excitation, DNA
Procedia PDF Downloads 46117606 Variational Evolutionary Splines for Solving a Model of Temporomandibular Disorders
Authors: Alberto Hananel
Abstract:
The aim of this work is to modelize the occlusion of a person with temporomandibular disorders as an evolutionary equation and approach its solution by the construction and characterizing of discrete variational splines. To formulate the problem, certain boundary conditions have been considered. After showing the existence and the uniqueness of the solution of such a problem, a convergence result of a discrete variational evolutionary spline is shown. A stress analysis of the occlusion of a human jaw with temporomandibular disorders by finite elements is carried out in FreeFem++ in order to prove the validity of the presented method.Keywords: approximation, evolutionary PDE, Finite Element Method, temporomandibular disorders, variational spline
Procedia PDF Downloads 38217605 Direct Strength Method Approach for Indian Cold Formed Steel Sections with and Without Perforation for Compression Member
Authors: K. Raghu, Altafhusen P. Pinjar
Abstract:
Cold-formed steel section are extensively used in industry and many other non-industry constructions worldwide, it is relatively a new concept in India. Cold-formed steel sections have been developed as more economical building solutions to the alternative heavier hot-rolled sections in the commercial and residential markets. Cold‐formed steel (CFS) structural members are commonly manufactured with perforations to accommodate plumbing, electrical, and heating conduits in the walls and ceilings of buildings. Current design methods available to engineers for predicting the strength of CFS members with perforations are prescriptive and limited to specific perforation locations, spacing, and sizes. The Direct Strength Method (DSM), a relatively new design method for CFS members validated for members with and without perforations, predicts the ultimate strength of general CFS members with the elastic buckling properties of the member cross section. The design compression strength and flexural strength of Indian (IS 811-1987) standard sections is calculated as per North American Specification (AISI-S100 2007) and software CUFSM 4.05.Keywords: direct strength, cold formed, perforations, CUFSM
Procedia PDF Downloads 38117604 Comparison of Analytical Method and Software for Analysis of Flat Slab Subjected to Various Parametric Loadings
Authors: Hema V. Vanar, R. K. Soni, N. D. Shah
Abstract:
Slabs supported directly on columns without beams are known as Flat slabs. Flat slabs are highly versatile elements widely used in construction, providing minimum depth, fast construction and allowing flexible column grids. The main objective of this thesis is comparison of analytical method and soft ware for analysis of flat slab subjected to various parametric loadings. Study presents analysis of flat slab is performed under different types of gravity.Keywords: fat slab, parametric load, analysis, software
Procedia PDF Downloads 49717603 Enhancing the Network Security with Gray Code
Authors: Thomas Adi Purnomo Sidhi
Abstract:
Nowadays, network is an essential need in almost every part of human daily activities. People now can seamlessly connect to others through the Internet. With advanced technology, our personal data now can be more easily accessed. One of many components we are concerned for delivering the best network is a security issue. This paper is proposing a method that provides more options for security. This research aims to improve network security by focusing on the physical layer which is the first layer of the OSI model. The layer consists of the basic networking hardware transmission technologies of a network. With the use of observation method, the research produces a schematic design for enhancing the network security through the gray code converter.Keywords: network, network security, grey code, physical layer
Procedia PDF Downloads 50717602 Parametric Approach for Reserve Liability Estimate in Mortgage Insurance
Authors: Rajinder Singh, Ram Valluru
Abstract:
Chain Ladder (CL) method, Expected Loss Ratio (ELR) method and Bornhuetter-Ferguson (BF) method, in addition to more complex transition-rate modeling, are commonly used actuarial reserving methods in general insurance. There is limited published research about their relative performance in the context of Mortgage Insurance (MI). In our experience, these traditional techniques pose unique challenges and do not provide stable claim estimates for medium to longer term liabilities. The relative strengths and weaknesses among various alternative approaches revolve around: stability in the recent loss development pattern, sufficiency and reliability of loss development data, and agreement/disagreement between reported losses to date and ultimate loss estimate. CL method results in volatile reserve estimates, especially for accident periods with little development experience. The ELR method breaks down especially when ultimate loss ratios are not stable and predictable. While the BF method provides a good tradeoff between the loss development approach (CL) and ELR, the approach generates claim development and ultimate reserves that are disconnected from the ever-to-date (ETD) development experience for some accident years that have more development experience. Further, BF is based on subjective a priori assumption. The fundamental shortcoming of these methods is their inability to model exogenous factors, like the economy, which impact various cohorts at the same chronological time but at staggered points along their life-time development. This paper proposes an alternative approach of parametrizing the loss development curve and using logistic regression to generate the ultimate loss estimate for each homogeneous group (accident year or delinquency period). The methodology was tested on an actual MI claim development dataset where various cohorts followed a sigmoidal trend, but levels varied substantially depending upon the economic and operational conditions during the development period spanning over many years. The proposed approach provides the ability to indirectly incorporate such exogenous factors and produce more stable loss forecasts for reserving purposes as compared to the traditional CL and BF methods.Keywords: actuarial loss reserving techniques, logistic regression, parametric function, volatility
Procedia PDF Downloads 13517601 STC Parameters versus Real Time Measured Parameters to Determine Cost Effectiveness of PV Panels
Authors: V. E. Selaule, R. M. Schoeman H. C. Z. Pienaar
Abstract:
Research has shown that solar energy is a renewable energy resource with the most potential when compared to other renewable energy resources in South Africa. There are many makes of Photovoltaic (PV) panels on the market and it is difficult to assess which to use. PV panel manufacturers use Standard Test Conditions (STC) to rate their PV panels. STC conditions are different from the actual operating environmental conditions were the PV panels are used. This paper describes a practical method to determine the most cost effective available PV panel. The method shows that PV panel manufacturer STC ratings cannot be used to select a cost effective PV panel.Keywords: PV orientation, PV panel, PV STC, Solar energy
Procedia PDF Downloads 47617600 Solution-Processed Threshold Switching Selectors Based on Highly Flexible, Transparent and Scratchable Silver Nanowires Conductive Films
Authors: Peiyuan Guan, Tao Wan, Dewei Chu
Abstract:
With the flash memory approaching its physical limit, the emerging resistive random-access memory (RRAM) has been considered as one of the most promising candidates for the next-generation non-volatile memory. One selector-one resistor configuration has shown the most promising way to resolve the crosstalk issue without affecting the scalability and high-density integration of the RRAM array. By comparison with other candidates of selectors (such as diodes and nonlinear devices), threshold switching selectors dominated by formation/spontaneous rupture of fragile conductive filaments have been proved to possess low voltages, high selectivity, and ultra-low current leakage. However, the flexibility and transparency of selectors are barely mentioned. Therefore, it is a matter of urgency to develop a selector with highly flexible and transparent properties to assist the application of RRAM for a diversity of memory devices. In this work, threshold switching selectors were designed using a facilely solution-processed fabrication on AgNWs@PDMS composite films, which show high flexibility, transparency and scratch resistance. As-fabricated threshold switching selectors also have revealed relatively high selectivity (~107), low operating voltages (Vth < 1 V) and good switching performance.Keywords: flexible and transparent, resistive random-access memory, silver nanowires, threshold switching selector
Procedia PDF Downloads 13217599 Maintaining User-Level Security in Short Message Service
Authors: T. Arudchelvam, W. W. E. N. Fernando
Abstract:
Mobile phone has become as an essential thing in our life. Therefore, security is the most important thing to be considered in mobile communication. Short message service is the cheapest way of communication via the mobile phones. Therefore, security is very important in the short message service as well. This paper presents a method to maintain the security at user level. Different types of encryption methods are used to implement the user level security in mobile phones. Caesar cipher, Rail Fence, Vigenere cipher and RSA are used as encryption methods in this work. Caesar cipher and the Rail Fence methods are enhanced and implemented. The beauty in this work is that the user can select the encryption method and the key. Therefore, by changing the encryption method and the key time to time, the user can ensure the security of messages. By this work, while users can safely send/receive messages, they can save their information from unauthorised and unwanted people in their own mobile phone as well.Keywords: SMS, user level security, encryption, decryption, short message service, mobile communication
Procedia PDF Downloads 40117598 Factors Associated with Weight Loss Maintenance after an Intervention Program
Authors: Filipa Cortez, Vanessa Pereira
Abstract:
Introduction: The main challenge of obesity treatment is long-term weight loss maintenance. The 3 phases method is a weight loss program that combines a low carb and moderately high-protein diet, food supplements and a weekly one-to-one consultation with a certified nutritionist. Sustained weight control is the ultimate goal of phase 3. Success criterion was the minimum loss of 10% of initial weight and its maintenance after 12 months. Objective: The aim of this study was to identify factors associated with successful weight loss maintenance after 12 months at the end of 3 phases method. Methods: The study included 199 subjects that achieved their weight loss goal (phase 3). Weight and body mass index (BMI) were obtained at the baseline and every week until the end of the program. Therapeutic adherence was measured weekly on a Likert scale from 1 to 5. Subjects were considered in compliance with nutritional recommendation and supplementation when their classification was ≥ 4. After 12 months of the method, the current weight and number of previous weight-loss attempts were collected by telephone interview. The statistical significance was assumed at p-values < 0.05. Statistical analyses were performed using SPSS TM software v.21. Results: 65.3% of subjects met the success criterion. The factors which displayed a significant weight loss maintenance prediction were: greater initial percentage weight loss (OR=1.44) during the weight loss intervention and a higher number of consultations in phase 3 (OR=1.10). Conclusion: These findings suggest that the percentage weight loss during the weight loss intervention and the number of consultations in phase 3 may facilitate maintenance of weight loss after the 3 phases method.Keywords: obesity, weight maintenance, low-carbohydrate diet, dietary supplements
Procedia PDF Downloads 15417597 Monitoring of Humoral Immune Response of Monovalent and Combined PPR and FMD Serotype 'O' Virus Vaccines in Goats
Authors: Mudassar Hameed, Khushi Muhammad, Aamir Ghafoor, Masood Rabbani, Momena Habib, Jawad Nazir
Abstract:
Comparative efficacy of three formulations (non-adjuvant, gel, and oil adjuvant) of monovalent and combined PPR and FMD virus vaccines was evaluated in goats. All kinds of monovalent PPRV vaccines elicited protective antibody titers at one-month post vaccination (PV) that remained so till six months PV. Monovalent non-adjuvant (NA) FMDV vaccine provoked non-protective antibody titers that declined to undetectable levels after three months. In case of combined vaccines, all of the formulations elicited protective antibody titers against PPRV in vaccinated animals which remained above that limit for six months. However, an exceptional immune response against FMDV was observed in combined NA vaccine group where antibody titers were extremely high and remained above protective level till 4 months PV in animals who received a single vaccine shot and till six months PV in booster group. Although, adjuvant or NA combined vaccines can induce protective antibody titers against both of the viruses within one month PV, but a booster vaccine shot is needed to retain protective antibody level for 6 months duration. Immune response elicited by combined vaccines is comparable or superior to the monovalent vaccines. Hence combined vaccine can be effectively used for the control and prevention of both of the diseases.Keywords: antibody titer, protective, combined vaccine, non adjuvant
Procedia PDF Downloads 20617596 Use of Quasi-3D Inversion of VES Data Based on Lateral Constraints to Characterize the Aquifer and Mining Sites of an Area Located in the North-East of Figuil, North Cameroon
Authors: Fofie Kokea Ariane Darolle, Gouet Daniel Hervé, Koumetio Fidèle, Yemele David
Abstract:
The electrical resistivity method is successfully used in this paper in order to have a clearer picture of the subsurface of the North-East ofFiguil in northern Cameroon. It is worth noting that this method is most often used when the objective of the study is to image the shallow subsoils by considering them as a set of stratified ground layers. The problem to be solved is very often environmental, and in this case, it is necessary to perform an inversion of the data in order to have a complete and accurate picture of the parameters of the said layers. In the case of this work, thirty-three (33) Schlumberger VES have been carried out on an irregular grid to investigate the subsurface of the study area. The 1D inversion applied as a preliminary modeling tool and in correlation with the mechanical drillings results indicates a complex subsurface lithology distribution mainly consisting of marbles and schists. Moreover, the quasi-3D inversion with lateral constraint shows that the misfit between the observed field data and the model response is quite good and acceptable with a value low than 10%. The method also reveals existence of two water bearing in the considered area. The first is the schist or weathering aquifer (unsuitable), and the other is the marble or the fracturing aquifer (suitable). The final quasi 3D inversion results and geological models indicate proper sites for groundwaters prospecting and for mining exploitation, thus allowing the economic development of the study area.Keywords: electrical resistivity method, 1D inversion, quasi 3D inversion, groundwaters, mining
Procedia PDF Downloads 15917595 Laban Movement Analysis Using Kinect
Authors: Bernstein Ran, Shafir Tal, Tsachor Rachelle, Studd Karen, Schuster Assaf
Abstract:
Laban Movement Analysis (LMA), developed in the dance community over the past seventy years, is an effective method for observing, describing, notating, and interpreting human movement to enhance communication and expression in everyday and professional life. Many applications that use motion capture data might be significantly leveraged if the Laban qualities will be recognized automatically. This paper presents an automated recognition method of Laban qualities from motion capture skeletal recordings and it is demonstrated on the output of Microsoft’s Kinect V2 sensor.Keywords: Laban movement analysis, multitask learning, Kinect sensor, machine learning
Procedia PDF Downloads 34517594 Potential of Mineral Composition Reconstruction for Monitoring the Performance of an Iron Ore Concentration Plant
Authors: Maryam Sadeghi, Claude Bazin, Daniel Hodouin, Laura Perez Barnuevo
Abstract:
The performance of a separation process is usually evaluated using performance indices calculated from elemental assays readily available from the chemical analysis laboratory. However, the separation process performance is essentially related to the properties of the minerals that carry the elements and not those of the elements. Since elements or metals can be carried by valuable and gangue minerals in the ore and that each mineral responds differently to a mineral processing method, the use of only elemental assays could lead to erroneous or uncertain conclusions on the process performance. This paper discusses the advantages of using performance indices calculated from minerals content, such as minerals recovery, for process performance assessments. A method is presented that uses elemental assays to estimate the minerals content of the solids in various process streams. The method combines the stoichiometric composition of the minerals and constraints of mass conservation for the minerals through the concentration process to estimate the minerals content from elemental assays. The advantage of assessing a concentration process using mineral based performance indices is illustrated for an iron ore concentration circuit.Keywords: data reconciliation, iron ore concentration, mineral composition, process performance assessment
Procedia PDF Downloads 22417593 Realistic Study Discover Some Posture Deformities According to Some Biomechanical Variables for Schoolchildren
Authors: Basman Abdul Jabbar
Abstract:
The researchers aimed to improve the importance of the good posture without any divisions & deformities. The importance of research lied in the discovery posture deformities early so easily treated before its transformation into advanced abnormalities difficult to treat and may need surgical intervention. Research problem was noting that some previous studies were based on the discovery of posture deformities, which was dependent on the (self-evaluation) which this type did not have accuracy to discover deformities. The Samples were (500) schoolchildren aged (9-11 years, males) at Baghdad al Karak. They were students at primary schools. The measure included all posture deformities. The researcher used video camera to analyze the posture deformities according to biomechanical variables by Kinovea software for motion analysis. The researcher recommended the need to use accurate scientific methods for early detection of posture deformities in children which contribute to the prevention and reduction of distortions.Keywords: biomechanics, children, deformities, posture
Procedia PDF Downloads 28917592 Object Recognition Approach Based on Generalized Hough Transform and Color Distribution Serving in Generating Arabic Sentences
Authors: Nada Farhani, Naim Terbeh, Mounir Zrigui
Abstract:
The recognition of the objects contained in images has always presented a challenge in the field of research because of several difficulties that the researcher can envisage because of the variability of shape, position, contrast of objects, etc. In this paper, we will be interested in the recognition of objects. The classical Hough Transform (HT) presented a tool for detecting straight line segments in images. The technique of HT has been generalized (GHT) for the detection of arbitrary forms. With GHT, the forms sought are not necessarily defined analytically but rather by a particular silhouette. For more precision, we proposed to combine the results from the GHT with the results from a calculation of similarity between the histograms and the spatiograms of the images. The main purpose of our work is to use the concepts from recognition to generate sentences in Arabic that summarize the content of the image.Keywords: recognition of shape, generalized hough transformation, histogram, spatiogram, learning
Procedia PDF Downloads 16217591 Conception of a Predictive Maintenance System for Forest Harvesters from Multiple Data Sources
Authors: Lazlo Fauth, Andreas Ligocki
Abstract:
For cost-effective use of harvesters, expensive repairs and unplanned downtimes must be reduced as far as possible. The predictive detection of failing systems and the calculation of intelligent service intervals, necessary to avoid these factors, require in-depth knowledge of the machines' behavior. Such know-how needs permanent monitoring of the machine state from different technical perspectives. In this paper, three approaches will be presented as they are currently pursued in the publicly funded project PreForst at Ostfalia University of Applied Sciences. These include the intelligent linking of workshop and service data, sensors on the harvester, and a special online hydraulic oil condition monitoring system. Furthermore the paper shows potentials as well as challenges for the use of these data in the conception of a predictive maintenance system.Keywords: predictive maintenance, condition monitoring, forest harvesting, forest engineering, oil data, hydraulic data
Procedia PDF Downloads 15417590 Three-Dimensional Computer Graphical Demonstration of Calcified Tissue and Its Clinical Significance
Authors: Itsuo Yokoyama, Rikako Kikuti, Miti Sekikawa, Tosinori Asai, Sarai Tsuyoshi
Abstract:
Introduction: Vascular access for hemodialysis therapy is often difficult, even for experienced medical personnel. Ultrasound guided needle placement have been performed occasionally but is not always helpful in certain cases with complicated vascular anatomy. Obtaining precise anatomical knowledge of the vascular structure is important to prevent access-related complications. With augmented reality (AR) device such as AR glasses, the virtual vascular structure is shown superimposed on the actual patient vessels, thus enabling the operator to maneuver catheter placement easily with free both hands. We herein report our method of AR guided vascular access method in dialysis treatment Methods: Three dimensional (3D) object of the arm with arteriovenous fistula is computer graphically created with 3D software from the data obtained by computer tomography, ultrasound echogram, and image scanner. The 3D vascular object thus created is viewed on the screen of the AR digital display device (such as AR glass or iPad). The picture of the vascular anatomical structure becomes visible, which is superimposed over the real patient’s arm, thereby the needle insertion be performed under the guidance of AR visualization with ease. By this method, technical difficulty in catheter placement for dialysis can be lessened and performed safely. Considerations: Virtual reality technology has been applied in various fields and medical use is not an exception. Yet AR devices have not been widely used among medical professions. Visualization of the virtual vascular object can be achieved by creation of accurate three dimensional object with the help of computer graphical technique. Although our experience is limited, this method is applicable with relative easiness and our accumulating evidence has suggested that our method of vascular access with the use of AR can be promising.Keywords: abdominal-aorta, calcification, extraskeletal, dialysis, computer graphics, 3DCG, CT, calcium, phosphorus
Procedia PDF Downloads 16817589 Dynamic Test for Sway-Mode Buckling of Columns
Authors: Boris Blostotsky, Elia Efraim
Abstract:
Testing of columns in sway mode is performed in order to determine the maximal allowable load limited by plastic deformations or their end connections and a critical load limited by columns stability. Motivation to determine accurate value of critical force is caused by its using as follow: - critical load is maximal allowable load for given column configuration and can be used as criterion of perfection; - it is used in calculation prescribed by standards for design of structural elements under combined action of compression and bending; - it is used for verification of theoretical analysis of stability at various end conditions of columns. In the present work a new non-destructive method for determination of columns critical buckling load in sway mode is proposed. The method allows performing measurements during the tests under loads that exceeds the columns critical load without losing its stability. The possibility of such loading is achieved by structure of the loading system. The system is performed as frame with rigid girder, one of the columns is the tested column and the other is additional two-hinged strut. Loading of the frame is carried out by the flexible traction element attached to the girder. The load applied on the tested column can achieve a values that exceed the critical load by choice of parameters of the traction element and the additional strut. The system lateral stiffness and the column critical load are obtained by the dynamic method. The experiment planning and the comparison between the experimental and theoretical values were performed based on the developed dependency of lateral stiffness of the system on vertical load, taking into account a semi-rigid connections of the column's ends. The agreement between the obtained results was established. The method can be used for testing of real full-size columns in industrial conditions.Keywords: buckling, columns, dynamic method, semi-rigid connections, sway mode
Procedia PDF Downloads 31617588 RBS Characteristic of Cd1−xZnxS Thin Film Fabricated by Vacuum Deposition Method
Authors: N. Dahbi, D. E. Arafah
Abstract:
Cd1−xZnxS thins films have been fabricated from ZnS/CdS/ZnS multilayer thin film systems, by using the vacuum deposition method; the Rutherford back-scattering (RBS) technique have been applied in order to determine the: structure, composition, depth profile, and stoichiometric of these films. The influence of the chemical and heat treatments on the produced films also have been investigated; the RBS spectra of the films showed that homogenous Cd1−xZnxS can be synthesized with x=0.45.Keywords: Cd1−xZnxS, chemical treatment, depth profile, heat treatment, RBS, RUMP simulation, thin film, vacuum deposition, ZnS/CdS/ZnS
Procedia PDF Downloads 22617587 Functionalization of Nanomaterials for Bio-Sensing Applications: Current Progress and Future Prospective
Authors: Temesgen Geremew Tefery
Abstract:
Nanomaterials, due to their unique properties, have revolutionized the field of biosensing. Their functionalization, or modification with specific molecules, is crucial for enhancing their biocompatibility, selectivity, and sensitivity. This review explores recent advancements in nanomaterial functionalization for biosensing applications. We discuss various strategies, including covalent and non-covalent modifications, and their impact on biosensor performance. The use of biomolecules like antibodies, enzymes, and nucleic acids for targeted detection is highlighted. Furthermore, the integration of nanomaterials with different sensing modalities, such as electrochemical, optical, and mechanical, is examined. The future outlook for nanomaterial-based biosensing is promising, with potential applications in healthcare, environmental monitoring, and food safety. However, challenges related to biocompatibility, scalability, and cost-effectiveness need to be addressed. Continued research and development in this area will likely lead to even more sophisticated and versatile biosensing technologies.Keywords: biosensing, nanomaterials, biotechnology, nanotechnology
Procedia PDF Downloads 32