Search results for: message passing neural network
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5932

Search results for: message passing neural network

1252 Extraction of Road Edge Lines from High-Resolution Remote Sensing Images Based on Energy Function and Snake Model

Authors: Zuoji Huang, Haiming Qian, Chunlin Wang, Jinyan Sun, Nan Xu

Abstract:

In this paper, the strategy to extract double road edge lines from acquired road stripe image was explored. The workflow is as follows: the road stripes are acquired by probabilistic boosting tree algorithm and morphological algorithm immediately, and road centerlines are detected by thinning algorithm, so the initial road edge lines can be acquired along the road centerlines. Then we refine the results with big variation of local curvature of centerlines. Specifically, the energy function of edge line is constructed by gradient feature and spectral information, and Dijkstra algorithm is used to optimize the initial road edge lines. The Snake model is constructed to solve the fracture problem of intersection, and the discrete dynamic programming algorithm is used to solve the model. After that, we could get the final road network. Experiment results show that the strategy proposed in this paper can be used to extract the continuous and smooth road edge lines from high-resolution remote sensing images with an accuracy of 88% in our study area.

Keywords: road edge lines extraction, energy function, intersection fracture, Snake model

Procedia PDF Downloads 340
1251 Balance Control Mechanisms in Individuals With Multiple Sclerosis in Virtual Reality Environment

Authors: Badriah Alayidi, Emad Alyahya

Abstract:

Background: Most people with Multiple Sclerosis (MS) report worsening balance as the condition progresses. Poor balance control is also well known to be a significant risk factor for both falling and fear of falling. The increased risk of falls with disease progression thus makes balance control an essential target of gait rehabilitation amongst people with MS. Intervention programs have developed various methods to improve balance control, and accumulating evidence suggests that exercise programs may help people with MS improve their balance. Among these methods, virtual reality (VR) is growing in popularity as a balance-training technique owing to its potential benefits, including better compliance and greater user happiness. However, it is not clear if a VR environment will induce different balance control mechanisms in MS as compared to healthy individuals or traditional environments. Therefore, this study aims to examine how individuals with MS control their balance in a VR setting. Methodology: The proposed study takes an empirical approach to estimate and determine the role of balance response in persons with MS using a VR environment. It will use primary data collected through patient observations, physiological and biomechanical evaluation of balance, and data analysis. Results: The preliminary systematic review and meta-analysis indicated that there was variability in terms of the outcome assessing balance response in people with MS. The preliminary results of these assessments have the potential to provide essential indicators of the progression of MS and contribute to the individualization of treatment and evaluation of the interventions’ effectiveness. The literature describes patients who have had the opportunity to experiment in VR settings and then used what they have learned in the real world, suggesting that this VR setting could be more appealing than conditional settings. The findings of the proposed study will be beneficial in estimating and determining the effect of VR on balance control in persons with MS. In previous studies, VR was shown to be an interesting approach to neurological rehabilitation, but more data are needed to support this approach in MS. Conclusions: The proposed study enables an assessment of balance and evaluations of a variety of physiological implications related to neural activity as well as biomechanical implications related to movement analysis.

Keywords: multiple sclerosis, virtual reality, postural control, balance

Procedia PDF Downloads 76
1250 Multiobjective Optimization of a Pharmaceutical Formulation Using Regression Method

Authors: J. Satya Eswari, Ch. Venkateswarlu

Abstract:

The formulation of a commercial pharmaceutical product involves several composition factors and response characteristics. When the formulation requires to satisfy multiple response characteristics which are conflicting, an optimal solution requires the need for an efficient multiobjective optimization technique. In this work, a regression is combined with a non-dominated sorting differential evolution (NSDE) involving Naïve & Slow and ε constraint techniques to derive different multiobjective optimization strategies, which are then evaluated by means of a trapidil pharmaceutical formulation. The analysis of the results show the effectiveness of the strategy that combines the regression model and NSDE with the integration of both Naïve & Slow and ε constraint techniques for Pareto optimization of trapidil formulation. With this strategy, the optimal formulation at pH=6.8 is obtained with the decision variables of micro crystalline cellulose, hydroxypropyl methylcellulose and compression pressure. The corresponding response characteristics of rate constant and release order are also noted down. The comparison of these results with the experimental data and with those of other multiple regression model based multiobjective evolutionary optimization strategies signify the better performance for optimal trapidil formulation.

Keywords: pharmaceutical formulation, multiple regression model, response surface method, radial basis function network, differential evolution, multiobjective optimization

Procedia PDF Downloads 411
1249 Exploring the Activity Fabric of an Intelligent Environment with Hierarchical Hidden Markov Theory

Authors: Chiung-Hui Chen

Abstract:

The Internet of Things (IoT) was designed for widespread convenience. With the smart tag and the sensing network, a large quantity of dynamic information is immediately presented in the IoT. Through the internal communication and interaction, meaningful objects provide real-time services for users. Therefore, the service with appropriate decision-making has become an essential issue. Based on the science of human behavior, this study employed the environment model to record the time sequences and locations of different behaviors and adopted the probability module of the hierarchical Hidden Markov Model for the inference. The statistical analysis was conducted to achieve the following objectives: First, define user behaviors and predict the user behavior routes with the environment model to analyze user purposes. Second, construct the hierarchical Hidden Markov Model according to the logic framework, and establish the sequential intensity among behaviors to get acquainted with the use and activity fabric of the intelligent environment. Third, establish the intensity of the relation between the probability of objects’ being used and the objects. The indicator can describe the possible limitations of the mechanism. As the process is recorded in the information of the system created in this study, these data can be reused to adjust the procedure of intelligent design services.

Keywords: behavior, big data, hierarchical hidden Markov model, intelligent object

Procedia PDF Downloads 234
1248 Clique and Clan Analysis of Patient-Sharing Physician Collaborations

Authors: Shahadat Uddin, Md Ekramul Hossain, Arif Khan

Abstract:

The collaboration among physicians during episodes of care for a hospitalised patient has a significant contribution towards effective health outcome. This research aims at improving this health outcome by analysing the attributes of patient-sharing physician collaboration network (PCN) on hospital data. To accomplish this goal, we present a research framework that explores the impact of several types of attributes (such as clique and clan) of PCN on hospitalisation cost and hospital length of stay. We use electronic health insurance claim dataset to construct and explore PCNs. Each PCN is categorised as ‘low’ and ‘high’ in terms of hospitalisation cost and length of stay. The results from the proposed model show that the clique and clan of PCNs affect the hospitalisation cost and length of stay. The clique and clan of PCNs show the difference between ‘low’ and ‘high’ PCNs in terms of hospitalisation cost and length of stay. The findings and insights from this research can potentially help the healthcare stakeholders to better formulate the policy in order to improve quality of care while reducing cost.

Keywords: clique, clan, electronic health records, physician collaboration

Procedia PDF Downloads 142
1247 AI Software Algorithms for Drivers Monitoring within Vehicles Traffic - SiaMOTO

Authors: Ioan Corneliu Salisteanu, Valentin Dogaru Ulieru, Mihaita Nicolae Ardeleanu, Alin Pohoata, Bogdan Salisteanu, Stefan Broscareanu

Abstract:

Creating a personalized statistic for an individual within the population using IT systems, based on the searches and intercepted spheres of interest they manifest, is just one 'atom' of the artificial intelligence analysis network. However, having the ability to generate statistics based on individual data intercepted from large demographic areas leads to reasoning like that issued by a human mind with global strategic ambitions. The DiaMOTO device is a technical sensory system that allows the interception of car events caused by a driver, positioning them in time and space. The device's connection to the vehicle allows the creation of a source of data whose analysis can create psychological, behavioural profiles of the drivers involved. The SiaMOTO system collects data from many vehicles equipped with DiaMOTO, driven by many different drivers with a unique fingerprint in their approach to driving. In this paper, we aimed to explain the software infrastructure of the SiaMOTO system, a system designed to monitor and improve driver driving behaviour, as well as the criteria and algorithms underlying the intelligent analysis process.

Keywords: artificial intelligence, data processing, driver behaviour, driver monitoring, SiaMOTO

Procedia PDF Downloads 94
1246 Microfluidic Fluid Shear Mechanotransduction Device Using Linear Optimization of Hydraulic Channels

Authors: Sanat K. Dash, Rama S. Verma, Sarit K. Das

Abstract:

A logarithmic microfluidic shear device was designed and fabricated for cellular mechanotransduction studies. The device contains four cell culture chambers in which flow was modulated to achieve a logarithmic increment. Resistance values were optimized to make the device compact. The network of resistances was developed according to a unique combination of series and parallel resistances as found via optimization. Simulation results done in Ansys 16.1 matched the analytical calculations and showed the shear stress distribution at different inlet flow rates. Fabrication of the device was carried out using conventional photolithography and PDMS soft lithography. Flow profile was validated taking DI water as working fluid and measuring the volume collected at all four outlets. Volumes collected at the outlets were in accordance with the simulation results at inlet flow rates ranging from 1 ml/min to 0.1 ml/min. The device can exert fluid shear stresses ranging four orders of magnitude on the culture chamber walls which will cover shear stress values from interstitial flow to blood flow. This will allow studying cell behavior in the long physiological range of shear stress in a single run reducing number of experiments.

Keywords: microfluidics, mechanotransduction, fluid shear stress, physiological shear

Procedia PDF Downloads 132
1245 Chairussyuhur Arman, Totti Tjiptosumirat, Muhammad Gunawan, Mastur, Joko Priyono, Baiq Tri Ratna Erawati

Authors: Maria M. Giannakou, Athanasios K. Ziliaskopoulos

Abstract:

Transmission pipelines carrying natural gas are often routed through populated cities, industrial and environmentally sensitive areas. While the need for these networks is unquestionable, there are serious concerns about the risk these lifeline networks pose to the people, to their habitat and to the critical infrastructures, especially in view of natural disasters such as earthquakes. This work presents an Integrated Pipeline Risk Management methodology (IPRM) for assessing the hazard associated with a natural gas pipeline failure due to natural or manmade disasters. IPRM aims to optimize the allocation of the available resources to countermeasures in order to minimize the impacts of pipeline failure to humans, the environment, the infrastructure and the economic activity. A proposed knapsack mathematical programming formulation is introduced that optimally selects the proper mitigation policies based on the estimated cost – benefit ratios. The proposed model is demonstrated with a small numerical example. The vulnerability analysis of these pipelines and the quantification of consequences from such failures can be useful for natural gas industries on deciding which mitigation measures to implement on the existing pipeline networks with the minimum cost in an acceptable level of hazard.

Keywords: cost benefit analysis, knapsack problem, natural gas distribution network, risk management, risk mitigation

Procedia PDF Downloads 296
1244 Application of Italian Guidelines for Existing Bridge Management

Authors: Giovanni Menichini, Salvatore Giacomo Morano, Gloria Terenzi, Luca Salvatori, Maurizio Orlando

Abstract:

The “Guidelines for Risk Classification, Safety Assessment, and Structural Health Monitoring of Existing Bridges” were recently approved by the Italian Government to define technical standards for managing the national network of existing bridges. These guidelines provide a framework for risk mitigation and safety assessment of bridges, which are essential elements of the built environment and form the basis for the operation of transport systems. Within the guideline framework, a workflow based on three main points was proposed: (1) risk-based, i.e., based on typical parameters of hazard, vulnerability, and exposure; (2) multi-level, i.e., including six assessment levels of increasing complexity; and (3) multirisk, i.e., assessing structural/foundational, seismic, hydrological, and landslide risks. The paper focuses on applying the Italian Guidelines to specific case studies, aiming to identify the parameters that predominantly influence the determination of the “class of attention”. The significance of each parameter is determined via sensitivity analysis. Additionally, recommendations for enhancing the process of assigning the class of attention are proposed.

Keywords: bridge safety assessment, Italian guidelines implementation, risk classification, structural health monitoring

Procedia PDF Downloads 60
1243 Synthesis and Electromagnetic Wave Absorbing Property of Amorphous Carbon Nanotube Networks on a 3D Graphene Aerogel/BaFe₁₂O₁₉ Nanorod Composite

Authors: Tingkai Zhao, Jingtian Hu, Xiarong Peng, Wenbo Yang, Tiehu Li

Abstract:

Homogeneous amorphous carbon nanotube (ACNT) networks have been synthesized using floating catalyst chemical vapor deposition method on a three-dimensional (3D) graphene aerogel (GA)/BaFe₁₂O₁₉ nanorod (BNR) composite which prepared by a self-propagating combustion process. The as-synthesized ACNT/GA/BNR composite which has 3D network structures could be directly used as a good absorber in the electromagnetic wave absorbent materials. The experimental results indicated that the maximum absorbing peak of ACNT/GA/BNR composite with a thickness of 2 mm was -18.35 dB at 10.64 GHz in the frequency range of 2-18 GHz. The bandwidth of the reflectivity below -10 dB is 3.32 GHz. The 3D graphene aerogel structures which composed of dense interlined tubes and amorphous structure of ACNTs bearing quantities of dihedral angles could consume the incident waves through multiple reflection and scattering inside the 3D web structures. The interlinked ACNTs have both the virtues of amorphous CNTs (multiple reflections inside the wall) and crystalline CNTs (high conductivity), consuming the electromagnetic wave as resistance heat. ACNT/GA/BNR composite has a good electromagnetic wave absorbing performance.

Keywords: amorphous carbon nanotubes, graphene aerogel, barium ferrite nanorod, electromagnetic wave absorption

Procedia PDF Downloads 282
1242 Modeling of Micro-Grid System Components Using MATLAB/Simulink

Authors: Mahmoud Fouad, Mervat Badr, Marwa Ibrahim

Abstract:

Micro-grid system is presently considered a reliable solution for the expected deficiency in the power required from future power systems. Renewable power sources such as wind, solar and hydro offer high potential of benign power for future micro-grid systems. Micro-Grid (MG) is basically a low voltage (LV) or medium voltage (MV) distribution network which consists of a number of called distributed generators (DG’s); micro-sources such as photovoltaic array, fuel cell, wind turbine etc. energy storage systems and loads; operating as a single controllable system, that could be operated in both grid-connected and islanded mode. The capacity of the DG’s is sufficient to support all; or most, of the load connected to the micro-grid. This paper presents a micro-grid system based on wind and solar power sources and addresses issues related to operation, control, and stability of the system. Using Matlab/Simulink, the system is modeled and simulated to identify the relevant technical issues involved in the operation of a micro-grid system based on renewable power generation units.

Keywords: micro-grid system, photovoltaic, wind turbine, energy storage, distributed generation, modeling

Procedia PDF Downloads 437
1241 Crow Search Algorithm-Based Task Offloading Strategies for Fog Computing Architectures

Authors: Aniket Ganvir, Ritarani Sahu, Suchismita Chinara

Abstract:

The rapid digitization of various aspects of life is leading to the creation of smart IoT ecosystems, where interconnected devices generate significant amounts of valuable data. However, these IoT devices face constraints such as limited computational resources and bandwidth. Cloud computing emerges as a solution by offering ample resources for offloading tasks efficiently despite introducing latency issues, especially for time-sensitive applications like fog computing. Fog computing (FC) addresses latency concerns by bringing computation and storage closer to the network edge, minimizing data travel distance, and enhancing efficiency. Offloading tasks to fog nodes or the cloud can conserve energy and extend IoT device lifespan. The offloading process is intricate, with tasks categorized as full or partial, and its optimization presents an NP-hard problem. Traditional greedy search methods struggle to address the complexity of task offloading efficiently. To overcome this, the efficient crow search algorithm (ECSA) has been proposed as a meta-heuristic optimization algorithm. ECSA aims to effectively optimize computation offloading, providing solutions to this challenging problem.

Keywords: IoT, fog computing, task offloading, efficient crow search algorithm

Procedia PDF Downloads 59
1240 Transnational Educators in Japan, Russia, and America: Historical Trends in Global Education in the 1990’s and Early 2000’s

Authors: Peter J. Glinos

Abstract:

The Alternative Education Resource Organization (AERO), one of the largest international hubs for alternative educators led by Jerry Mintz, has had a major impact on the global alternative education movement. The organization’s publications, like the AERO-Gramme Newsletter and its successor, the Education Revolution Magazine, allowed members across the globe to discuss issues, share support, and submit writings on policies and reforms. Stored on AERO's online digital archive, this work uses these publications from 1989 to 2011 to investigate the network's entanglements with America, Canada, Russia, Ukraine, Israel, Palestine, Japan, India, and Guatemala. Inspired by Reinhart Koselleck, this historical analysis will trace AERO’s entanglements within the United States, Japan, and Russia, contextualizing each of these multiple temporalities within the history of each nation’s education system, the developments within AERO, and the global geo-political climate at the time of AERO’s expansion. To help remedy the lack of attention paid by global historians to the role state organizations play supporting global networks, as noted in What is Global History? by Sebastian Conrad, this work will focus on the relationship between AERO and state actors.

Keywords: global history, history of education, neoliberalism, transnational history, alternative education

Procedia PDF Downloads 30
1239 Enhancing Internet of Things Security: A Blockchain-Based Approach for Preventing Spoofing Attacks

Authors: Salha Abdullah Ali Al-Shamrani, Maha Muhammad Dhaher Aljuhani, Eman Ali Ahmed Aldhaheri

Abstract:

With the proliferation of Internet of Things (IoT) devices in various industries, there has been a concurrent rise in security vulnerabilities, particularly spoofing attacks. This study explores the potential of blockchain technology in enhancing the security of IoT systems and mitigating these attacks. Blockchain's decentralized and immutable ledger offers significant promise for improving data integrity, transaction transparency, and tamper-proofing. This research develops and implements a blockchain-based IoT architecture and a reference network to simulate real-world scenarios and evaluate a blockchain-integrated intrusion detection system. Performance measures including time delay, security, and resource utilization are used to assess the system's effectiveness, comparing it to conventional IoT networks without blockchain. The results provide valuable insights into the practicality and efficacy of employing blockchain as a security mechanism, shedding light on the trade-offs between speed and security in blockchain deployment for IoT. The study concludes that despite minor increases in time consumption, the security benefits of incorporating blockchain technology into IoT systems outweigh potential drawbacks, demonstrating a significant potential for blockchain in bolstering IoT security.

Keywords: internet of things, spoofing, IoT, access control, blockchain, raspberry pi

Procedia PDF Downloads 75
1238 Measuring and Evaluating the Effectiveness of Mobile High Efficiency Particulate Air Filtering on Particulate Matter within the Road Traffic Network of a Sample of Non-Sparse and Sparse Urban Environments in the UK

Authors: Richard Maguire

Abstract:

This research evaluates the efficiency of using mobile HEPA filters to reduce localized Particulate Matter (PM), Total Volatile Organic Chemical (TVOC) and Formaldehyde (HCHO) Air Pollution. The research is being performed using a standard HEPA filter that is tube fitted and attached to a motor vehicle. The velocity of the vehicle is used to generate the pressure difference that allows the filter to remove PM, VOC and HCOC pollution from the localized atmosphere of a road transport traffic route. The testing has been performed on a sample of traffic routes in Non-Sparse and Sparse urban environments within the UK. Pre and Post filter measuring of the PM2.5 Air Quality has been carried out along with demographics of the climate environment, including live filming of the traffic conditions. This provides a base line for future national and international research. The effectiveness measurement is generated through evaluating the difference in PM2.5 Air Quality measured pre- and post- the mobile filter test equipment. A series of further research opportunities and future exploitation options are made based on the results of the research.

Keywords: high efficiency particulate air, HEPA filter, particulate matter, traffic pollution

Procedia PDF Downloads 125
1237 Review of the Legislative and Policy Issues in Promoting Infrastructure Development to Promote Automation in Telecom Industry

Authors: Marvin Ricardo Awarab

Abstract:

There has never been a greater need for telecom services. The Internet of Things (IoT), 5G networking, and edge computing are the driving forces behind this increased demand. The fierce demand offers communications service providers significant income opportunities. The telecom sector is centered on automation, and realizing a digital operation that functions as a real-time business will be crucial for the industry as a whole. Automation in telecom refers to the application of technology to create a more effective, quick, and scalable alternative to the conventional method of operating the telecom industry. With the promotion of 5G and the Internet of Things (IoT), telecom companies will continue to invest extensively in telecom automation technology. Automation offers benefits in the telecom industry; developing countries such as Namibia may not fully tap into such benefits because of the lack of funds and infrastructural resources to invest in automation. This paper fully investigates the benefits of automation in the telecom industry. Furthermore, the paper identifies hiccups that developing countries such as Namibia face in their quest to fully introduce automation in the telecom industry. Additionally, the paper proposes possible avenues that Namibia, as a developing country, adopt investing in automation infrastructural resources with the aim of reaping the full benefits of automation in the telecom industry.

Keywords: automation, development, internet, internet of things, network, telecom, telecommunications policy, 5G

Procedia PDF Downloads 65
1236 A Modeling Approach for Blockchain-Oriented Information Systems Design

Authors: Jiaqi Yan, Yani Shi

Abstract:

The blockchain technology is regarded as the most promising technology that has the potential to trigger a technological revolution. However, besides the bitcoin industry, we have not yet seen a large-scale application of blockchain in those domains that are supposed to be impacted, such as supply chain, financial network, and intelligent manufacturing. The reasons not only lie in the difficulties of blockchain implementation, but are also root in the challenges of blockchain-oriented information systems design. As the blockchain members are self-interest actors that belong to organizations with different existing information systems. As they expect different information inputs and outputs of the blockchain application, a common language protocol is needed to facilitate communications between blockchain members. Second, considering the decentralization of blockchain organization, there is not any central authority to organize and coordinate the business processes. Thus, the information systems built on blockchain should support more adaptive business process. This paper aims to address these difficulties by providing a modeling approach for blockchain-oriented information systems design. We will investigate the information structure of distributed-ledger data with conceptual modeling techniques and ontology theories, and build an effective ontology mapping method for the inter-organization information flow and blockchain information records. Further, we will study the distributed-ledger-ontology based business process modeling to support adaptive enterprise on blockchain.

Keywords: blockchain, ontology, information systems modeling, business process

Procedia PDF Downloads 451
1235 Effect on Physicochemical and Sensory Attributes of Bread Substituted with Different Levels of Matured Soursop (Anona muricata) Flour

Authors: Mardiana Ahamad Zabidi, Akmalluddin Md. Yunus

Abstract:

Soursop (Anona muricata) is one of the underutilized tropical fruits containing nutrients, particularly dietary fibre and antioxidant properties that are beneficial to human health. This objective of this study is to investigate the feasibility of matured soursop pulp flour (SPF) to be substituted with high-protein wheat flour in bread. Bread formulation was substituted with different levels of SPF (0%, 5%, 10% and 15%). The effect on physicochemical properties and sensory attributes were evaluated. Higher substitution level of SPF resulted in significantly higher (p<0.05) fibre, protein and ash content, while fat and carbohydrate content reduced significantly (p<0.05). FESEM showed that the bread crumb surface of control and 5% SPF appeared to distribute evenly and coalesced by thin gluten film. However, higher SPF substitution level in bread formulation exhibited a deleterious effect by formation of discontinuous gluten network. For texture profile analysis, 5% SPF bread resulted in the lowest value of hardness. The score of sensory evaluation showed that 5% SPF bread received good acceptability and is comparable with control bread.

Keywords: soursop pulp flour, bread, physicochemical properties, sensory attributes, scanning electron microscopy (SEM)

Procedia PDF Downloads 324
1234 In-Vitro Evaluation of the Long-Term Stability of PEDOT:PSS Coated Microelectrodes for Chronic Recording and Electrical Stimulation

Authors: A. Schander, T. Tessmann, H. Stemmann, S. Strokov, A. Kreiter, W. Lang

Abstract:

For the chronic application of neural prostheses and other brain-computer interfaces, long-term stable microelectrodes for electrical stimulation are essential. In recent years many developments were done to investigate different appropriate materials for these electrodes. One of these materials is the electrical conductive polymer poly(3,4-ethylenedioxythiophene) (PEDOT), which has lower impedance and higher charge injection capacity compared to noble metals like gold and platinum. However the long-term stability of this polymer is still unclear. Thus this paper reports on the in-vitro evaluation of the long-term stability of PEDOT coated gold microelectrodes. For this purpose a highly flexible electrocorticography (ECoG) electrode array, based on the polymer polyimide, is used. This array consists of circular gold electrodes with a diameter of 560 µm (0.25 mm2). In total 25 electrodes of this array were coated simultaneously with the polymer PEDOT:PSS in a cleanroom environment using a galvanostatic electropolymerization process. After the coating the array is additionally sterilized using a steam sterilization process (121°C, 1 bar, 20.5 min) to simulate autoclaving prior to the implantation of such an electrode array. The long-term measurements were performed in phosphate-buffered saline solution (PBS, pH 7.4) at the constant body temperature of 37°C. For the in-vitro electrical stimulation a one channel bipolar current stimulator is used. The stimulation protocol consists of a bipolar current amplitude of 5 mA (cathodal phase first), a pulse duration of 100 µs per phase, a pulse pause of 50 µs and a frequency of 1 kHz. A PEDOT:PSS coated gold electrode with an area of 1 cm2 serves as the counter electrode. The electrical stimulation is performed continuously with a total amount of 86.4 million bipolar current pulses per day. The condition of the PEDOT coated electrodes is monitored in between with electrical impedance spectroscopy measurements. The results of this study demonstrate that the PEDOT coated electrodes are stable for more than 3.6 billion bipolar current pulses. Also the unstimulated electrodes show currently no degradation after the time period of 5 months. These results indicate an appropriate long-term stability of this electrode coating for chronic recording and electrical stimulation. The long-term measurements are still continuing to investigate the life limit of this electrode coating.

Keywords: chronic recording, electrical stimulation, long-term stability, microelectrodes, PEDOT

Procedia PDF Downloads 589
1233 In silico Analysis of Differentially Expressed Genes in High-Grade Squamous Intraepithelial Lesion and Squamous Cell Carcinomas Stages of Cervical Cancer

Authors: Rahul Agarwal, Ashutosh Singh

Abstract:

Cervical cancer is one of the women related cancers which starts from the pre-cancerous cells and a fraction of women with pre-cancers of the cervix will develop cervical cancer. Cervical pre-cancers if treated in pre-invasive stage can prevent almost all true cervical squamous cell carcinoma. The present study investigates the genes and pathways that are involved in the progression of cervical cancer and are responsible in transition from pre-invasive stage to other advanced invasive stages. The study used GDS3292 microarray data to identify the stage specific genes in cervical cancer and further to generate the network of the significant genes. The microarray data GDS3292 consists of the expression profiling of 10 normal cervices, 7 HSILs and 21 SCCs samples. The study identifies 70 upregulated and 37 downregulated genes in HSIL stage while 95 upregulated and 60 downregulated genes in SCC stages. Biological process including cell communication, signal transduction are highly enriched in both HSIL and SCC stages of cervical cancer. Further, the ppi interaction of genes involved in HSIL and SCC stages helps in identifying the interacting partners. This work may lead to the identification of potential diagnostic biomarker which can be utilized for early stage detection.

Keywords: cervical cancer, HSIL, microarray, SCC

Procedia PDF Downloads 234
1232 Circular Tool and Dynamic Approach to Grow the Entrepreneurship of Macroeconomic Metabolism

Authors: Maria Areias, Diogo Simões, Ana Figueiredo, Anishur Rahman, Filipa Figueiredo, João Nunes

Abstract:

It is expected that close to 7 billion people will live in urban areas by 2050. In order to improve the sustainability of the territories and its transition towards circular economy, it’s necessary to understand its metabolism and promote and guide the entrepreneurship answer. The study of a macroeconomic metabolism involves the quantification of the inputs, outputs and storage of energy, water, materials and wastes for an urban region. This quantification and analysis representing one opportunity for the promotion of green entrepreneurship. There are several methods to assess the environmental impacts of an urban territory, such as human and environmental risk assessment (HERA), life cycle assessment (LCA), ecological footprint assessment (EF), material flow analysis (MFA), physical input-output table (PIOT), ecological network analysis (ENA), multicriteria decision analysis (MCDA) among others. However, no consensus exists about which of those assessment methods are best to analyze the sustainability of these complex systems. Taking into account the weaknesses and needs identified, the CiiM - Circular Innovation Inter-Municipality project aims to define an uniform and globally accepted methodology through the integration of various methodologies and dynamic approaches to increase the efficiency of macroeconomic metabolisms and promoting entrepreneurship in a circular economy. The pilot territory considered in CiiM project has a total area of 969,428 ha, comprising a total of 897,256 inhabitants (about 41% of the population of the Center Region). The main economic activities in the pilot territory, which contribute to a gross domestic product of 14.4 billion euros, are: social support activities for the elderly; construction of buildings; road transport of goods, retailing in supermarkets and hypermarkets; mass production of other garments; inpatient health facilities; and the manufacture of other components and accessories for motor vehicles. The region's business network is mostly constituted of micro and small companies (similar to the Central Region of Portugal), with a total of 53,708 companies identified in the CIM Region of Coimbra (39 large companies), 28,146 in the CIM Viseu Dão Lafões (22 large companies) and 24,953 in CIM Beiras and Serra da Estrela (13 large companies). For the construction of the database was taking into account data available at the National Institute of Statistics (INE), General Directorate of Energy and Geology (DGEG), Eurostat, Pordata, Strategy and Planning Office (GEP), Portuguese Environment Agency (APA), Commission for Coordination and Regional Development (CCDR) and Inter-municipal Community (CIM), as well as dedicated databases. In addition to the collection of statistical data, it was necessary to identify and characterize the different stakeholder groups in the pilot territory that are relevant to the different metabolism components under analysis. The CIIM project also adds the potential of a Geographic Information System (GIS) so that it is be possible to obtain geospatial results of the territorial metabolisms (rural and urban) of the pilot region. This platform will be a powerful visualization tool of flows of products/services that occur within the region and will support the stakeholders, improving their circular performance and identifying new business ideas and symbiotic partnerships.

Keywords: circular economy tools, life cycle assessment macroeconomic metabolism, multicriteria decision analysis, decision support tools, circular entrepreneurship, industrial and regional symbiosis

Procedia PDF Downloads 103
1231 Providing a Secure, Reliable and Decentralized Document Management Solution Using Blockchain by a Virtual Identity Card

Authors: Meet Shah, Ankita Aditya, Dhruv Bindra, V. S. Omkar, Aashruti Seervi

Abstract:

In today's world, we need documents everywhere for a smooth workflow in the identification process or any other security aspects. The current system and techniques which are used for identification need one thing, that is ‘proof of existence’, which involves valid documents, for example, educational, financial, etc. The main issue with the current identity access management system and digital identification process is that the system is centralized in their network, which makes it inefficient. The paper presents the system which resolves all these cited issues. It is based on ‘blockchain’ technology, which is a 'decentralized system'. It allows transactions in a decentralized and immutable manner. The primary notion of the model is to ‘have everything with nothing’. It involves inter-linking required documents of a person with a single identity card so that a person can go anywhere without having the required documents with him/her. The person just needs to be physically present at a place wherein documents are necessary, and using a fingerprint impression and an iris scan print, the rest of the verification will progress. Furthermore, some technical overheads and advancements are listed. This paper also aims to layout its far-vision scenario of blockchain and its impact on future trends.

Keywords: blockchain, decentralized system, fingerprint impression, identity management, iris scan

Procedia PDF Downloads 130
1230 Optimizing Pediatric Pneumonia Diagnosis with Lightweight MobileNetV2 and VAE-GAN Techniques in Chest X-Ray Analysis

Authors: Shriya Shukla, Lachin Fernando

Abstract:

Pneumonia, a leading cause of mortality in young children globally, presents significant diagnostic challenges, particularly in resource-limited settings. This study presents an approach to diagnosing pediatric pneumonia using Chest X-Ray (CXR) images, employing a lightweight MobileNetV2 model enhanced with synthetic data augmentation. Addressing the challenge of dataset scarcity and imbalance, the study used a Variational Autoencoder-Generative Adversarial Network (VAE-GAN) to generate synthetic CXR images, improving the representation of normal cases in the pediatric dataset. This approach not only addresses the issues of data imbalance and scarcity prevalent in medical imaging but also provides a more accessible and reliable diagnostic tool for early pneumonia detection. The augmented data improved the model’s accuracy and generalization, achieving an overall accuracy of 95% in pneumonia detection. These findings highlight the efficacy of the MobileNetV2 model, offering a computationally efficient yet robust solution well-suited for resource-constrained environments such as mobile health applications. This study demonstrates the potential of synthetic data augmentation in enhancing medical image analysis for critical conditions like pediatric pneumonia.

Keywords: pneumonia, MobileNetV2, image classification, GAN, VAE, deep learning

Procedia PDF Downloads 127
1229 Social Networking Sites: A Platform for Communication and Collaboration for Visually Impaired

Authors: Sufia Khowaja, Nishat Fatima

Abstract:

Social networking sites are significant for visually impaired to overcome the unique challenges they face and access the resources they need to succeed in their education and beyond which might be difficult to obtain through traditional means. It provides them an opportunity to build relationships, stay connected with their support network as well as to develop social skills which give them emotional support to fell less isolated. In this connection the study is conducted with the aim to determine the use of social networking sites, purpose of using and activities performed by visually impaired at Delhi University, Delhi, Jawaharlal Nehru University, Delhi and Jamia Milia Islamia, Delhi. The study followed survey technique in which structured interview is followed to collect data from 137 visually impaired students and analysed using ‘SPSS ver23’. The findings of the study revealed that mostly used social networking sites are whatsapp by 89.23% students of DU, 95.12% of JNU, 87.09% of JMI, followed by e-mail by 78.46% of DU, 78.04% of JNU, 64.51%; youtube by 73.84% DU, 90.24% JNU, 80.64% JMI. Purpose for using these sites is for academics mentioned by 96.92% DU, 100% JNU, 93.54% JMI. Activities performed on sites are sending and receiving messaging 96.92% DU, 92.68% JNU, 93.55% JMI, communicating with friends and family as well as getting academic information. Findings of the study will be helpful for libraries to disseminate their services and resources as well as latest updates to their visually impaired users with the help of most used tools.

Keywords: social networking sites, visually impaired, Delhi University, Jawaharlal Nehru University, Jamia Milia Islamia

Procedia PDF Downloads 93
1228 Recovery the Regeneration Gas from Liquefied Petroleum Gas Dryer to Off Gas Compressors

Authors: Hassan Hussin Zwida

Abstract:

The liquified LPG (Liquefied Petroleum Gas) drying system at the Complex is designed to remove water and mercaptans from the LPG stream. Upon saturation of the desiccant beds, a regeneration cycle becomes necessary. The original design routed the regeneration gas, produced during the LPG dryer heating cycle, to the sulfur recovery unit to the incineration. However, concerns regarding high temperatures and potential unit disruptions led to a modification where the gas is currently vented to the acid flare for the initial hour before being diverted to the LP network fuel gas system. While this addresses the temperature concerns, it generates significant smoke due to the presence of liquid hydrocarbons. This paper proposes an approach to recover the regeneration gas and redirect it back to the gas plant's (off-gas compressors) instead of sending it to the AC (Acid Flare), by utilizing the existing pipe 6” and connected to off gas compressor KO (Knock-Out ) Drums . This option is simple to operate, flexible, environment-friendly solution as long-term solution, lower in capital expenditure and increase the company's profitability. The feasibility of this proposal is supported by dynamic simulations. The simulations suggest the possibility of operating two out of the three off-gas compressors and LPG (Liquefied petroleum gas) as a liquid phase, is foreseen to be carried over and gathered at the bottom level of the KO (Knock-Out) Drum.

Keywords: thermal incinerator, off-gas compressors, environment, knock-out drums, acid flare

Procedia PDF Downloads 54
1227 The Potential of Sentiment Analysis to Categorize Social Media Comments Using German Libraries

Authors: Felix Boehnisch, Alexander Lutz

Abstract:

Based on the number of users and the amount of content posted daily, Facebook is considered the largest social network in the world. This content includes images or text posts from companies but also private persons, which are also commented on by other users. However, it can sometimes be difficult for companies to keep track of all the posts and the reactions to them, especially when there are several posts a day that contain hundreds to thousands of comments. To facilitate this, the following paper deals with the possible applications of sentiment analysis to social media comments in order to be able to support the work in social media marketing. In a first step, post comments were divided into positive and negative by a subjective rating, then the same comments were checked for their polarity value by the two german python libraries TextBlobDE and SentiWS and also grouped into positive, negative, or even neutral. As a control, the subjective classifications were compared with the machine-generated ones by a confusion matrix, and relevant quality criteria were determined. The accuracy of both libraries was not really meaningful, with 60% to 66%. However, many words or sentences were not evaluated at all, so there seems to be room for optimization to possibly get more accurate results. In future studies, the use of these specific German libraries can be optimized to gain better insights by either applying them to stricter cleaned data or by adding a sentiment value to emojis, which have been removed from the comments in advance, as they are not contained in the libraries.

Keywords: Facebook, German libraries, polarity, sentiment analysis, social media comments

Procedia PDF Downloads 184
1226 The Phatic Function and the Socializing Element of Personal Blogs

Authors: Emelia Noronha, Milind Malshe

Abstract:

The phatic function of communication is a vital element of any conversation. This research paper looks into this function with respect to personal blogs maintained by Indian bloggers. This paper is a study into the phenomenon of phatic communication maintained by bloggers through their blogs. Based on a linguistic analysis of the posts of twenty eight Indian bloggers, writing in English, studied over a period of three years, the study indicates that though the blogging phenomenon is not conversational in the same manner as face-to-face communication, it does make ample provision for feedback that is conversational in nature. Ordinary day to day offline conversations use conventionalized phatic utterances; those on the social media are in a perpetual mode of innovation and experimentation in order to sustain contact with its readers. These innovative methods and means are the focus of this study. Though the personal blogger aims to chronicle his/her personal life through the blog, the socializing function is crucial to these bloggers. In comparison to the western personal blogs which focus on the presentation of the ‘bounded individual self’, we find Indian personal bloggers engage in the presentation of their ‘social selves’. These bloggers yearn to reach out to the readers on the internet and the phatic function serves to initiate, sustain and renew social ties on the blogosphere thereby consolidating the social network of readers and bloggers.

Keywords: personal blogs, phatic, social-selves, blog readers

Procedia PDF Downloads 363
1225 Towards the Management of Cybersecurity Threats in Organisations

Authors: O. A. Ajigini, E. N. Mwim

Abstract:

Cybersecurity is the protection of computers, programs, networks, and data from attack, damage, unauthorised, unintended access, change, or destruction. Organisations collect, process and store their confidential and sensitive information on computers and transmit this data across networks to other computers. Moreover, the advent of internet technologies has led to various cyberattacks resulting in dangerous consequences for organisations. Therefore, with the increase in the volume and sophistication of cyberattacks, there is a need to develop models and make recommendations for the management of cybersecurity threats in organisations. This paper reports on various threats that cause malicious damage to organisations in cyberspace and provides measures on how these threats can be eliminated or reduced. The paper explores various aspects of protection measures against cybersecurity threats such as handling of sensitive data, network security, protection of information assets and cybersecurity awareness. The paper posits a model and recommendations on how to manage cybersecurity threats in organisations effectively. The model and the recommendations can then be utilised by organisations to manage the threats affecting their cyberspace. The paper provides valuable information to assist organisations in managing their cybersecurity threats and hence protect their computers, programs, networks and data in cyberspace. The paper aims to assist organisations to protect their information assets and data from cyberthreats as part of the contributions toward community engagement.

Keywords: confidential information, cyberattacks, cybersecurity, cyberspace, sensitive information

Procedia PDF Downloads 260
1224 Virtual Container Yard: Assessing the Perceived Impact of Legal Implications to Container Carriers

Authors: L. Edirisinghe, P. Mukherjee, H. Edirisinghe

Abstract:

Virtual Container Yard (VCY) is a modern concept that helps to reduce the empty container repositioning cost of carriers. The concept of VCY is based on container interchange between shipping lines. Although this mechanism has been theoretically accepted by the shipping community as a feasible solution, it has not yet achieved the necessary momentum among container shipping lines (CSL). This paper investigates whether there is any legal influence on this industry myopia about the VCY. It is believed that this is the first publication that focuses on the legal aspects of container exchange between carriers. Not much literature on this subject is available. This study establishes with statistical evidence that there is a phobia prevailing in the shipping industry that exchanging containers with other carriers may lead to various legal implications. The complexity of exchange is two faceted. CSLs assume that offering a container to another carrier (obviously, a competitor in terms of commercial context) or using a container offered by another carrier may lead to undue legal implications. This research reveals that this fear is reflected through four types of perceived components, namely: shipping associate; warehouse associate; network associate; and trading associate. These components carry eighteen subcomponents that comprehensively cover the entire process of a container shipment. The statistical explanation has been supported through regression analysis; INCO terms were used to illustrate the shipping process.

Keywords: virtual container yard, legal, maritime law, inventory

Procedia PDF Downloads 166
1223 Comprehensive Review of Ultralightweight Security Protocols

Authors: Prashansa Singh, Manjot Kaur, Rohit Bajaj

Abstract:

The proliferation of wireless sensor networks and Internet of Things (IoT) devices in the quickly changing digital landscape has highlighted the urgent need for strong security solutions that can handle these systems’ limited resources. A key solution to this problem is the emergence of ultralightweight security protocols, which provide strong security features while respecting the strict computational, energy, and memory constraints imposed on these kinds of devices. This in-depth analysis explores the field of ultralightweight security protocols, offering a thorough examination of their evolution, salient features, and the particular security issues they resolve. We carefully examine and contrast different protocols, pointing out their advantages and disadvantages as well as the compromises between resource limitations and security resilience. We also study these protocols’ application domains, including the Internet of Things, RFID systems, and wireless sensor networks, to name a few. In addition, the review highlights recent developments and advancements in the field, pointing out new trends and possible avenues for future research. This paper aims to be a useful resource for researchers, practitioners, and developers, guiding the design and implementation of safe, effective, and scalable systems in the Internet of Things era by providing a comprehensive overview of ultralightweight security protocols.

Keywords: wireless sensor network, machine-to-machine, MQTT broker, server, ultralightweight, TCP/IP

Procedia PDF Downloads 84