Search results for: enhanced data encryption
26883 A Simulation Study for Potential Natural Gas Liquids Recovery Processes under Various Upstream Conditions
Authors: Mesfin Getu Woldetensay
Abstract:
Representatives and commercially viable natural gas liquids (NGLs) recovery processes were studied under various feed conditions that are classified as lean and rich. The conventional turbo- expander process scheme (ISS) was taken as a base case. The performance of this scheme was compared against with the gas sub-cooled process (GSP), cold residue-gas (CRR) and recycle split-vapor (RSV), enhanced NGL recovery process (IPSI-1) and enhanced NGL recovery process with internal refrigeration (IPSI-2). The development made for the GSP, CRR and RSV are at the top section of the demethanizer column whereas the IPSI-1 and IPSI-2 improvement focus in the lower section. HYSYS process flowsheet was initially developed for all the processes including the ISS under a common criteria that could help to demonstrate the performance comparison. Accordingly, a number of simulation runs were made for the selected eight types of feed. Results show that the reboiler duty requirement using rich feeds for GSP, CRR and RSV is quite high compared to IPSI-1 and IPSI-2. The latter shows relatively lower duty due to the presence of self-refrigeration system that allows the inlet feed to be used for achieving cooling without the need to use propane refrigerant. The energy consumption for lean feed is much lower than that of the rich feed in all process schemes.Keywords: composition, lean, rich, duty
Procedia PDF Downloads 21726882 Students’ Perceptions of Well-Being and School-Based Well-Being Programs and Interventions
Authors: Amanda Madden
Abstract:
The purpose of this research was to identify students understanding of well-being and perceptions of the effective components of school-based well-being programs they have participated in during their time in secondary school. With one in four adolescents suffering from some form of mental health disorder, which has the potential to directly impact their academic ability, schools have moved towards a more holistic approach to education, resulting in the growth of school-based well-being programs. There is limited research on the effectiveness of school-based well-being programs, with fewer studies examining students’ perspectives on their well-being. A mixed-method design was utilized, framed by a social constructivist methodology. Quantitative data was collected through a researcher-developed self-report survey, and qualitative data were collected through one-on-one interviews and a semi-structured focus group undertaken with Year 12 students from three independent co-educational schools in Western Australia. Preliminary findings indicate that participants have experienced a minimal impact, either positively or negatively, on their well-being from school-based well-being programs. The data detailed that adolescents consider happiness, positive attitude, good physical health, balance, emotional fulfillment and confidence components of well-being. The findings also highlighted sports, positive family relationships, positive friendships, and pets positively enhanced well-being. This research suggests that researchers and educational leaders should consider students’ understanding of well-being in the development of school-based well-being assessments and interventions. Students are the recipients of school-based well-being programs and are best placed to inform what they will and will not respond to in the determination of appropriate well-being content.Keywords: wellbeing, school based wellbeing, adolescents, wellbeing interventions
Procedia PDF Downloads 7226881 Analysis of Lightweight Register Hardware Threat
Authors: Yang Luo, Beibei Wang
Abstract:
In this paper, we present a design methodology of lightweight register transfer level (RTL) hardware threat implemented based on a MAX II FPGA platform. The dynamic power consumed by the toggling of the various bit of registers as well as the dynamic power consumed per unit of logic circuits were analyzed. The hardware threat was designed taking advantage of the differences in dynamic power consumed per unit of logic circuits to hide the transfer information. The experiment result shows that the register hardware threat was successfully implemented by using different dynamic power consumed per unit of logic circuits to hide the key information of DES encryption module. It needs more than 100000 sample curves to reduce the background noise by comparing the sample space when it completely meets the time alignment requirement. In additional, an external trigger signal is playing a very important role to detect the hardware threat in this experiment.Keywords: side-channel analysis, hardware Trojan, register transfer level, dynamic power
Procedia PDF Downloads 27926880 The Impact of Sign Language on Generating and Maintaining a Mental Image
Authors: Yi-Shiuan Chiu
Abstract:
Deaf signers have been found to have better mental image performance than hearing nonsigners. The goal of this study was to investigate the ability to generate mental images, to maintain them, and to manipulate them in deaf signers of Taiwanese Sign Language (TSL). In the visual image task, participants first memorized digits formed in a cell of 4 × 5 grids. After presenting a cue of Chinese digit character shown on the top of a blank cell, participants had to form a corresponding digit. When showing a probe, which was a grid containing a red circle, participants had to decide as quickly as possible whether the probe would have been covered by the mental image of the digit. The ISI (interstimulus interval) between cue and probe was manipulated. In experiment 1, 24 deaf signers and 24 hearing nonsigners were asked to perform image generation tasks (ISI: 200, 400 ms) and image maintenance tasks (ISI: 800, 2000 ms). The results showed that deaf signers had had an enhanced ability to generate and maintain a mental image. To explore the process of mental image, in experiment 2, 30 deaf signers and 30 hearing nonsigners were asked to do visual searching when maintaining a mental image. Between a digit image cue and a red circle probe, participants were asked to search a visual search task to see if a target triangle apex was directed to the right or left. When there was only one triangle in the searching task, the results showed that both deaf signers and hearing non-signers had similar visual searching performance in which the searching targets in the mental image locations got facilitates. However, deaf signers could maintain better and faster mental image performance than nonsigners. In experiment 3, we increased the number of triangles to 4 to raise the difficulty of the visual search task. The results showed that deaf participants performed more accurately in visual search and image maintenance tasks. The results suggested that people may use eye movements as a mnemonic strategy to maintain the mental image. And deaf signers had enhanced abilities to resist the interference of eye movements in the situation of fewer distractors. In sum, these findings suggested that deaf signers had enhanced mental image processing.Keywords: deaf signers, image maintain, mental image, visual search
Procedia PDF Downloads 15426879 Research on Ultrafine Particles Classification Using Hydrocyclone with Annular Rinse Water
Authors: Tao Youjun, Zhao Younan
Abstract:
The separation effect of fine coal can be improved by the process of pre-desliming. It was significantly enhanced when the fine coal was processed using Falcon concentrator with the removal of -45um coal slime. Ultrafine classification tests using Krebs classification cyclone with annular rinse water showed that increasing feeding pressure can effectively avoid the phenomena of heavy particles passing into overflow and light particles slipping into underflow. The increase of rinse water pressure could reduce the content of fine-grained particles while increasing the classification size. The increase in feeding concentration had a negative effect on the efficiency of classification, meanwhile increased the classification size due to the enhanced hindered settling caused by high underflow concentration. As a result of optimization experiments with response indicator of classification efficiency which based on orthogonal design using Design-Expert software indicated that the optimal classification efficiency reached 91.32% with the feeding pressure of 0.03MPa, the rinse water pressure of 0.02MPa and the feeding concentration of 12.5%. Meanwhile, the classification size was 49.99 μm which had a good agreement with the predicted value.Keywords: hydrocyclone, ultrafine classification, slime, classification efficiency, classification size
Procedia PDF Downloads 16726878 Two-Phase Flow Modelling and Numerical Simulation for Waterflooding in Enhanced Oil Recovery
Authors: Peña A. Roland R., Lozano P. Jean P.
Abstract:
The waterflooding process is an enhanced oil recovery (EOR) method that appears tremendously successful. This paper shows the importance of the role of the numerical modelling of waterflooding and how to provide a better description of the fluid flow during this process. The mathematical model is based on the mass conservation equations for the oil and water phases. Rock compressibility and capillary pressure equations are coupled to the mathematical model. For discretizing and linearizing the partial differential equations, we used the Finite Volume technique and the Newton-Raphson method, respectively. The results of three scenarios for waterflooding in porous media are shown. The first scenario was estimating the water saturation in the media without rock compressibility and without capillary pressure. The second scenario was estimating the front of the water considering the rock compressibility and capillary pressure. The third case is to compare different fronts of water saturation for three fluids viscosity ratios without and with rock compressibility and without and with capillary pressure. Results of the simulation indicate that the rock compressibility and the capillary pressure produce changes in the pressure profile and saturation profile during the displacement of the oil for the water.Keywords: capillary pressure, numerical simulation, rock compressibility, two-phase flow
Procedia PDF Downloads 12426877 Influence of Electrode Assembly on Catalytic Activation and Deactivation of a PT Film Immobilized H+ Conducting Solid Electrolyte in Electrocatalytic Reduction Reactions
Authors: M. A. Hasnat, M. Amirul Islam, M. A. Rashed, Jamil. Safwan, M. Mahabubul Alam
Abstract:
Symmetric (Cu–Pt|Nafion|Pt–Cu) and asymmetric(Pt|Nafion|Pt–Cu) assemblies were fabricated to study the nitrate reduction processes at the cathode. The electrocatalytic nitrate reduction reactions were performed in these assemblies in order to investigate the prerequisite for the enhanced catalytic activity, electrochemical cell durability as well as preferable product selectivity resulting from the reduction of nitrate at the cathode. It has been observed for the symmetric assembly that Cu particles were oxidized on the anode surface under an applied potential and the resulting copper ions migrated to the cathode surface through the Nafion membrane, which deposited as copper oxide on the cathode surface. The formation of this copper oxide covering layer on the Pt–Cu cathode surface is attributed as the reason for the deactivation of the cathode that governed the reduced nitrate reduction along with increasing nitrite selectivity. These problems were addressed and resolved with the asymmetric design of the electrocatalytic reactor, where enhanced hydrogen evolution activates the surface by eroding the CuO over layer as well as speeding up the slow rate determining hydrogenation reactions.Keywords: membrane, nitrate, electrocatalysis, voltammetry, electrolysis
Procedia PDF Downloads 26726876 Imputation Technique for Feature Selection in Microarray Data Set
Authors: Younies Saeed Hassan Mahmoud, Mai Mabrouk, Elsayed Sallam
Abstract:
Analysing DNA microarray data sets is a great challenge, which faces the bioinformaticians due to the complication of using statistical and machine learning techniques. The challenge will be doubled if the microarray data sets contain missing data, which happens regularly because these techniques cannot deal with missing data. One of the most important data analysis process on the microarray data set is feature selection. This process finds the most important genes that affect certain disease. In this paper, we introduce a technique for imputing the missing data in microarray data sets while performing feature selection.Keywords: DNA microarray, feature selection, missing data, bioinformatics
Procedia PDF Downloads 57426875 PDDA: Priority-Based, Dynamic Data Aggregation Approach for Sensor-Based Big Data Framework
Authors: Lutful Karim, Mohammed S. Al-kahtani
Abstract:
Sensors are being used in various applications such as agriculture, health monitoring, air and water pollution monitoring, traffic monitoring and control and hence, play the vital role in the growth of big data. However, sensors collect redundant data. Thus, aggregating and filtering sensors data are significantly important to design an efficient big data framework. Current researches do not focus on aggregating and filtering data at multiple layers of sensor-based big data framework. Thus, this paper introduces (i) three layers data aggregation and framework for big data and (ii) a priority-based, dynamic data aggregation scheme (PDDA) for the lowest layer at sensors. Simulation results show that the PDDA outperforms existing tree and cluster-based data aggregation scheme in terms of overall network energy consumptions and end-to-end data transmission delay.Keywords: big data, clustering, tree topology, data aggregation, sensor networks
Procedia PDF Downloads 34526874 Influence of Shield Positions on Thermo/Fluid Performance of Pin Fin Heat Sink
Authors: Ramy H. Mohammed
Abstract:
In heat sinks, the flow within the core exhibits separation and hence does not lend itself to simple analytical boundary layer or duct flow analysis of the wall friction. In this paper, I present some findings from an experimental and numerical study aimed to obtain physical insight into the influence of the presence of the shield and its position on the hydraulic and thermal performance of square pin fin heat sink without top by-pass. The variations of the Nusselt number and friction factor are obtained under varied parameters, such as the Reynolds number and the shield position. The numerical code is validated by comparing the numerical results with the available experimental data. It is shown that, there is a good agreement between the temperature predictions based on the model and the experimental data. Results show that, as the presence of the shield, the heat transfer of fin array is enhanced and the flow resistance increased. The surface temperature distribution of the heat sink base is more uniform when the dimensionless shield position equals to 1/3 or 2/3. The comprehensive performance evaluation approach based on identical pumping power criteria is adopted and shows that the optimum shield position is at x/l=0.43 where energy is saved.Keywords: shield, fin array, performance evaluation, heat transfer, energy
Procedia PDF Downloads 30626873 Identification of Genes Regulating Differentiation and Stemness of Human Mesenchymal Stem Cells for Gene Therapy in Regenerative Medicine
Authors: Tong Ming Liu
Abstract:
Human mesenchymal stem cells (MSCs) represent the most used stem cells for clinical application, which have been used in over 1000 clinical trials to treat over 30 diseases due to multilineage differentiation potential, secretome and immunosuppression. Gene therapies of MSCs hold great promise in the treatment of many diseases due to enhanced MSC-based clinical outcomes. To identify genes for gene therapy of MSCs, by comparing gene expression profile before and after MSC differentiation following by functional screening, we have identified ZNF145 that regulated MSC differentiation. Forced expression of ZNF145 resulted in enhanced in vitro chondrogenesis of MSCs as an upstream factor of SOX9 and improved osteochondral repair upon implant into osteochondral defects in rodents. By comparing gene expression profile during differentiation of iPSCs toward MSCs, we also identified gene HOX regulating MSC stemness, which was much downregulated in late-passaged MSCs. Knockdown of this gene greatly compromised MSC stemness including abolished proliferation, decreased CFU-F, promoted senescence and reduced expression of cell surface antigens linked to the MSC phenotype. In addition, multi-linage differentiation was also greatly impaired. Notably, HOX overexpression resulted in improved multi-lineage differentiation. In the mechanism, HOX expression significantly deceased in late passage of MSCs compared with early passage of MSCs, correlating with MSC important genes. ChIP-seq data shown that HOX binds to genes related to MSC self-renewal and differentiation. Most importantly, most HOX binding sites are lost in late passage of MSCs. HOX exerts its effects by directing binding Twist1, one important gene of MSCs. The identification of the genes regulating MSC differentiation and stemness will provide and promising strategies for gene therapy of MSCs in regenerative medicine.Keywords: mesenchymal stem cell, novel transcription factor, stemness, gene therapy, cartilage repair, signaling pathway
Procedia PDF Downloads 5726872 Alternative Seed System for Enhanced Availability of Quality Seeds and Seed/Varietal Replacement Rate - An Experience
Authors: Basave Gowda, Lokesh K., Prasanth S. M., Bellad S. B., Radha J., Lokesh G. Y., Patil S. B., Vijayakumar D. K., Ganigar B. S., Rakesh C. Mathad
Abstract:
Quality seed plays an important role in enhancing the crop productivity. It was reported and confirmed by large scale verification research trials that by use of quality seeds alone, the crop yield can be enhanced by 15 to 20 per cent. At present, the quality seed production and distribution through organised sectors comprising both public and private seed sector was only 20-25% of the requirement and the remaining quantity is met through unorganised sector which include the farmer to farmers saved seeds. With an objective of developing an alternative seed system, the University of Agricultural Sciences, Raichur in Karnataka state has implemented Seed Village Programme in more than 100 villages covering around 5000 farmers every year since 2009-10 and in the selected seed villages, a group of 50-150 farmers were supplied the foundation seeds of new varieties to an extent of 0.4 ha at 50 % subsidy. And two to three training programmes were conducted in the targeted villages for quality seed production and the seed produced in the target group was processed locally in the university seed processing units and arranged for distribution in the local villages by the seed growers themselves. By this new innovative and modified seed system, the university can able to replace old varieties of pigeon pea and green gram by producing 1482, 2978, 2729, 2560, and 4581 tonnes of seeds of new varieties on large scale under farmers and scientists participatory seed village programmes respectively during 2009-10, 2010-11, 2011-12, 2012-13 and 2013-14. From this new alternate model of seed system, there should be large scale promotion of regional seed system involving farmers, NGO and voluntary organisation for quick and effective replacement of old, low yielding, disease susceptible varieties with new high yielding, disease resistant for enhanced food production and food security.Keywords: seed system, seed village, seed replacement, varietal replacement
Procedia PDF Downloads 43126871 The Polarization on Twitter and COVID-19 Vaccination in Brazil
Authors: Giselda Cristina Ferreira, Carlos Alberto Kamienski, Ana Lígia Scott
Abstract:
The COVID-19 pandemic has enhanced the anti-vaccination movement in Brazil, supported by unscientific theories and false news and the possibility of wide communication through social networks such as Twitter, Facebook, and YouTube. The World Health Organization (WHO) classified the large volume of information on the subject against COVID-19 as an Infodemic. In this paper, we present a protocol to identify polarizing users (called polarizers) and study the profiles of Brazilian polarizers on Twitter (renamed to X some weeks ago). We analyzed polarizing interactions on Twitter (in Portuguese) to identify the main polarizers and how the conflicts they caused influenced the COVID-19 vaccination rate throughout the pandemic. This protocol uses data from this social network, graph theory, Java, and R-studio scripts to model and analyze the data. The information about the vaccination rate was obtained in a public database for the government called OpenDataSus. The results present the profiles of Twitter’s Polarizer (political position, gender, professional activity, immunization opinions). We observed that social and political events influenced the participation of these different profiles in conflicts and the vaccination rate.Keywords: Twitter, polarization, vaccine, Brazil
Procedia PDF Downloads 7526870 Effectiveness of Technology Enhanced Learning in Orthodontic Teaching
Authors: Mohammed Shaath
Abstract:
Aims Technological advancements in teaching and learning have made significant improvements over the past decade and have been incorporated in institutions to aid the learner’s experience. This review aims to assess whether Technology Enhanced Learning (TEL) pedagogy is more effective at improving students’ attitude and knowledge retention in orthodontic training than traditional methods. Methodology The searches comprised Systematic Reviews (SRs) related to the comparison of TEL and traditional teaching methods from the following databases: PubMed, SCOPUS, Medline, and Embase. One researcher performed the screening, data extraction, and analysis and assessed the risk of bias and quality using A Measurement Tool to Assess Systematic Reviews 2 (AMSTAR-2). Kirkpatrick’s 4-level evaluation model was used to evaluate the educational values. Results A sum of 34 SRs was identified after the removal of duplications and irrelevant SRs; 4 fit the inclusion criteria. On Level 1, students showed positivity to TEL methods, although acknowledging that the harder the platforms to use, the less favourable. Nonetheless, the students still showed high levels of acceptability. Level 2 showed there is no significant overall advantage of increased knowledge when it comes to TEL methods. One SR showed that certain aspects of study within orthodontics deliver a statistical improvement with TEL. Level 3 was the least reported on. Results showed that if left without time restrictions, TEL methods may be advantageous. Level 4 shows that both methods are equally as effective, but TEL has the potential to overtake traditional methods in the future as a form of active, student-centered approach. Conclusion TEL has a high level of acceptability and potential to improve learning in orthodontics. Current reviews have potential to be improved, but the biggest aspect that needs to be addressed is the primary study, which shows a lower level of evidence and heterogeneity in their results. As it stands, the replacement of traditional methods with TEL cannot be fully supported in an evidence-based manner. The potential of TEL methods has been recognized and is already starting to show some evidence of the ability to be more effective in some aspects of learning to cater for a more technology savvy generation.Keywords: TEL, orthodontic, teaching, traditional
Procedia PDF Downloads 4226869 Explainable Graph Attention Networks
Authors: David Pham, Yongfeng Zhang
Abstract:
Graphs are an important structure for data storage and computation. Recent years have seen the success of deep learning on graphs such as Graph Neural Networks (GNN) on various data mining and machine learning tasks. However, most of the deep learning models on graphs cannot easily explain their predictions and are thus often labelled as “black boxes.” For example, Graph Attention Network (GAT) is a frequently used GNN architecture, which adopts an attention mechanism to carefully select the neighborhood nodes for message passing and aggregation. However, it is difficult to explain why certain neighbors are selected while others are not and how the selected neighbors contribute to the final classification result. In this paper, we present a graph learning model called Explainable Graph Attention Network (XGAT), which integrates graph attention modeling and explainability. We use a single model to target both the accuracy and explainability of problem spaces and show that in the context of graph attention modeling, we can design a unified neighborhood selection strategy that selects appropriate neighbor nodes for both better accuracy and enhanced explainability. To justify this, we conduct extensive experiments to better understand the behavior of our model under different conditions and show an increase in both accuracy and explainability.Keywords: explainable AI, graph attention network, graph neural network, node classification
Procedia PDF Downloads 19826868 Fiber-Based 3D Cellular Reinforcing Structures for Mineral-Bonded Composites with Enhanced Structural Impact Tolerance
Authors: Duy M. P. Vo, Cornelia Sennewald, Gerald Hoffmann, Chokri Cherif
Abstract:
The development of solutions to improve the resistance of buildings to short-term dynamic loads, particularly impact load, is driven by the urgent demand worldwide on securing human life and critical infrastructures. The research training group GRK 2250/1 aims to develop mineral-bonded composites that allow the fabrication of thin-layered strengthening layers providing available concrete members with enhanced impact resistance. This paper presents the development of 3D woven wire cellular structures that can be used as innovative reinforcement for targeted composites. 3D woven wire cellular structures are truss-like architectures that can be fabricated in an automatized process with a great customization possibility. The specific architecture allows this kind of structures to have good load bearing capability and forming behavior, which is of great potential to give strength against impact loading. An appropriate combination of topology and material enables an optimal use of thin-layered reinforcement in concrete constructions.Keywords: 3D woven cellular structures, ductile behavior, energy absorption, fiber-based reinforced concrete, impact resistant
Procedia PDF Downloads 29826867 A Hybrid Model for Secure Protocol Independent Multicast Sparse Mode and Dense Mode Protocols in a Group Network
Authors: M. S. Jimah, A. C. Achuenu, M. Momodu
Abstract:
Group communications over public infrastructure are prone to a lot of security issues. Existing network protocols like Protocol Independent Multicast Sparse Mode (PIM SM) and Protocol Independent Multicast Dense Mode (PIM DM) do not have inbuilt security features. Therefore, any user or node can easily access the group communication as long as the user can send join message to the source nodes, the source node then adds the user to the network group. In this research, a hybrid method of salting and hashing to encrypt information in the source and stub node was designed, and when stub nodes need to connect, they must have the appropriate key to join the group network. Object oriented analysis design (OOAD) was the methodology used, and the result shows that no extra controlled bandwidth overhead cost was added by encrypting and the hybrid model was more securing than the existing PIM SM, PIM DM and Zhang secure PIM SM.Keywords: group communications, multicast, PIM SM, PIM DM, encryption
Procedia PDF Downloads 16226866 Deep Learning for Image Correction in Sparse-View Computed Tomography
Authors: Shubham Gogri, Lucia Florescu
Abstract:
Medical diagnosis and radiotherapy treatment planning using Computed Tomography (CT) rely on the quantitative accuracy and quality of the CT images. At the same time, requirements for CT imaging include reducing the radiation dose exposure to patients and minimizing scanning time. A solution to this is the sparse-view CT technique, based on a reduced number of projection views. This, however, introduces a new problem— the incomplete projection data results in lower quality of the reconstructed images. To tackle this issue, deep learning methods have been applied to enhance the quality of the sparse-view CT images. A first approach involved employing Mir-Net, a dedicated deep neural network designed for image enhancement. This showed promise, utilizing an intricate architecture comprising encoder and decoder networks, along with the incorporation of the Charbonnier Loss. However, this approach was computationally demanding. Subsequently, a specialized Generative Adversarial Network (GAN) architecture, rooted in the Pix2Pix framework, was implemented. This GAN framework involves a U-Net-based Generator and a Discriminator based on Convolutional Neural Networks. To bolster the GAN's performance, both Charbonnier and Wasserstein loss functions were introduced, collectively focusing on capturing minute details while ensuring training stability. The integration of the perceptual loss, calculated based on feature vectors extracted from the VGG16 network pretrained on the ImageNet dataset, further enhanced the network's ability to synthesize relevant images. A series of comprehensive experiments with clinical CT data were conducted, exploring various GAN loss functions, including Wasserstein, Charbonnier, and perceptual loss. The outcomes demonstrated significant image quality improvements, confirmed through pertinent metrics such as Peak Signal-to-Noise Ratio (PSNR) and Structural Similarity Index (SSIM) between the corrected images and the ground truth. Furthermore, learning curves and qualitative comparisons added evidence of the enhanced image quality and the network's increased stability, while preserving pixel value intensity. The experiments underscored the potential of deep learning frameworks in enhancing the visual interpretation of CT scans, achieving outcomes with SSIM values close to one and PSNR values reaching up to 76.Keywords: generative adversarial networks, sparse view computed tomography, CT image correction, Mir-Net
Procedia PDF Downloads 16126865 Image Enhancement of Histological Slides by Using Nonlinear Transfer Function
Authors: D. Suman, B. Nikitha, J. Sarvani, V. Archana
Abstract:
Histological slides provide clinical diagnostic information about the subjects from the ancient times. Even with the advent of high resolution imaging cameras the image tend to have some background noise which makes the analysis complex. A study of the histological slides is done by using a nonlinear transfer function based image enhancement method. The method processes the raw, color images acquired from the biological microscope, which, in general, is associated with background noise. The images usually appearing blurred does not convey the intended information. In this regard, an enhancement method is proposed and implemented on 50 histological slides of human tissue by using nonlinear transfer function method. The histological image is converted into HSV color image. The luminance value of the image is enhanced (V component) because change in the H and S components could change the color balance between HSV components. The HSV image is divided into smaller blocks for carrying out the dynamic range compression by using a linear transformation function. Each pixel in the block is enhanced based on the contrast of the center pixel and its neighborhood. After the processing the V component, the HSV image is transformed into a colour image. The study has shown improvement of the characteristics of the image so that the significant details of the histological images were improved.Keywords: HSV space, histology, enhancement, image
Procedia PDF Downloads 32926864 Bacterial Contamination of Kitchen Sponges and Cutting Surfaces and Disinfection Procedures
Authors: Hayyan I Al Taweil
Abstract:
Background: The most common of bacterium in kitchen sponges and cutting surfaces which can play a task within the cross-contamination of foods, fomites and hands by foodborne pathogens. Aims and Objectives: This study investigated the incidence of bacterium in kitchen Sponge, and cutting surfaces. Material and methods: a complete of twenty four kitchen Sponges were collected from home kitchens and therefore the numbers of mesotrophic microorganism, coliform microorganism, E. coli, Salmonella, genus {pseudomonas|bacteria genus} and staphylococci in every kitchen Sponges were determined. Microbiological tests of all sponges for total mesophilic aerobic microorganism, S. aureus, Pseudomonas, Salmonella spp., and E. coli were performed on days 3, 7, and 14 by sampling. The sponges involved in daily use in kitchens countenosely with the dishwasher detergent a minimum of doubly daily Results: Results from the overall mesophilic aerobic microorganism, indicate a major increase within the variety of log CFU/ml. the amount of E. coli was reduced, Salmonella spp. was stabled, S. aureus was enhanced from the sponges throughout fourteen days. Genus Pseudomonas was enhanced and was the dominant micro flora within the sponges throughout fourteen days.Keywords: Kitchen Sponges, Microbiological Contamination, Disinfection; cutting surface; , Cross-Contamination
Procedia PDF Downloads 14426863 Integrating Wound Location Data with Deep Learning for Improved Wound Classification
Authors: Mouli Banga, Chaya Ravindra
Abstract:
Wound classification is a crucial step in wound diagnosis. An effective classifier can aid wound specialists in identifying wound types with reduced financial and time investments, facilitating the determination of optimal treatment procedures. This study presents a deep neural network-based classifier that leverages wound images and their corresponding locations to categorize wounds into various classes, such as diabetic, pressure, surgical, and venous ulcers. By incorporating a developed body map, the process of tagging wound locations is significantly enhanced, providing healthcare specialists with a more efficient tool for wound analysis. We conducted a comparative analysis between two prominent convolutional neural network models, ResNet50 and MobileNetV2, utilizing a dataset of 730 images. Our findings reveal that the RestNet50 outperforms MovileNetV2, achieving an accuracy of approximately 90%, compared to MobileNetV2’s 83%. This disparity highlights the superior capability of ResNet50 in the context of this dataset. The results underscore the potential of integrating deep learning with spatial data to improve the precision and efficiency of wound diagnosis, ultimately contributing to better patient outcomes and reducing healthcare costs.Keywords: wound classification, MobileNetV2, ResNet50, multimodel
Procedia PDF Downloads 3226862 A Machine Learning Approach for Detecting and Locating Hardware Trojans
Authors: Kaiwen Zheng, Wanting Zhou, Nan Tang, Lei Li, Yuanhang He
Abstract:
The integrated circuit industry has become a cornerstone of the information society, finding widespread application in areas such as industry, communication, medicine, and aerospace. However, with the increasing complexity of integrated circuits, Hardware Trojans (HTs) implanted by attackers have become a significant threat to their security. In this paper, we proposed a hardware trojan detection method for large-scale circuits. As HTs introduce physical characteristic changes such as structure, area, and power consumption as additional redundant circuits, we proposed a machine-learning-based hardware trojan detection method based on the physical characteristics of gate-level netlists. This method transforms the hardware trojan detection problem into a machine-learning binary classification problem based on physical characteristics, greatly improving detection speed. To address the problem of imbalanced data, where the number of pure circuit samples is far less than that of HTs circuit samples, we used the SMOTETomek algorithm to expand the dataset and further improve the performance of the classifier. We used three machine learning algorithms, K-Nearest Neighbors, Random Forest, and Support Vector Machine, to train and validate benchmark circuits on Trust-Hub, and all achieved good results. In our case studies based on AES encryption circuits provided by trust-hub, the test results showed the effectiveness of the proposed method. To further validate the method’s effectiveness for detecting variant HTs, we designed variant HTs using open-source HTs. The proposed method can guarantee robust detection accuracy in the millisecond level detection time for IC, and FPGA design flows and has good detection performance for library variant HTs.Keywords: hardware trojans, physical properties, machine learning, hardware security
Procedia PDF Downloads 14626861 Potentials and Challenges of Implementing Participatory Irrigation Management, Tanzania
Authors: Pilly Joseph Kagosi
Abstract:
The study aims at assessing challenges observed during implementation of participatory irrigation management (PIM) approach for food security in semi-arid areas of Tanzania. Data were collected through questionnaire, PRA tools, key informants discussion, Focus Group Discussion (FGD), participant observation and literature review. Data collected from questionnaire was analyzed using SPSS while PRA data was analyzed with the help of local communities during PRA exercise. Data from other methods were analyzed using content analysis. The study revealed that PIM approach has contribution in improved food security at household level due to involvement of communities in water management activities and decision making which enhanced availability of water for irrigation and increased crop production. However there were challenges observed during implementation of the approach including; minimum participation of beneficiaries in decision making during planning and designing stages, meaning inadequate devolution of power among scheme owners; Inadequate and lack of transparency on income expenditure in Water Utilization Associations’ (WUAs), water conflict among WUAs members, conflict between farmers and livestock keepers and conflict between WUAs leaders and village government regarding training opportunities and status; WUAs rules and regulation are not legally recognized by the National court and few farmers involved in planting trees around water sources. However it was realized that some of the mentioned challenges were rectified by farmers themselves facilitated by government officials. The study recommends that, the identified challenges need to be rectified for farmers to realize impotence of PIM approach as it was realized by other Asian countries.Keywords: potentials of implementing participatory approach, challenges of participatory approach, irrigation management, Tanzania
Procedia PDF Downloads 30526860 Detection of Telomerase Activity as Cancer Biomarker Using Nanogap-Rich Au Nanowire SERS Sensor
Authors: G. Eom, H. Kim, A. Hwang, T. Kang, B. Kim
Abstract:
Telomerase activity is overexpressed in over 85% of human cancers while suppressed in normal somatic cells. Telomerase has been attracted as a universal cancer biomarker. Therefore, the development of effective telomerase activity detection methods is urgently demanded in cancer diagnosis and therapy. Herein, we report a nanogap-rich Au nanowire (NW) surface-enhanced Raman scattering (SERS) sensor for detection of human telomerase activity. The nanogap-rich Au NW SERS sensors were prepared simply by uniformly depositing nanoparticles (NPs) on single-crystalline Au NWs. We measured SERS spectra of methylene blue (MB) from 60 different nanogap-rich Au NWs and obtained the relative standard deviation (RSD) of 4.80%, confirming the superb reproducibility of nanogap-rich Au NW SERS sensors. The nanogap-rich Au NW SERS sensors enable us to detect telomerase activity in 0.2 cancer cells/mL. Furthermore, telomerase activity is detectable in 7 different cancer cell lines whereas undetectable in normal cell lines, which suggest the potential applicability of nanogap-rich Au NW SERS sensor in cancer diagnosis. We expect that the present nanogap-rich Au NW SERS sensor can be useful in biomedical applications including a diverse biomarker sensing.Keywords: cancer biomarker, nanowires, surface-enhanced Raman scattering, telomerase
Procedia PDF Downloads 34926859 Creating a Professional Knowledge Base for Multi-Grade Teaching: Case Studies
Authors: Matshidiso Joyce Taole, Linley Cornish
Abstract:
Teacher’s professional knowledge has become the focus of interest over decades and the interest has intensified in the 21st century. Teachers are expected to develop their professional academic expertise continually, on an ongoing basis. Such professional development may relate to acquiring enhanced expertise in terms of leadership, curriculum development, teaching and learning, assessment of/for learning and feedback for enhanced learning. The paper focuses on professional knowledge base required for teachers in multi-grade contexts. This paper argues that although teacher knowledge is strongly related to individual experiences and contexts, there are elements of teacher knowledge that are particular to multi-grade context. The study employed qualitative design using interviews and observations. The participants were multi-grade teachers and teaching principals. The study revealed that teachers need to develop skills such as learner grouping, differentiating the curriculum, planning, time management and be life-long learners so that they stay relevant and up to date with developments not only in the education sector but globally. This will help teachers to learn increasingly sophisticated methods for engaging the diverse needs of students in their classrooms.Keywords: curriculum differentiation, multi-grade, planning, teacher knowledge
Procedia PDF Downloads 41726858 NUX: A Lightweight Block Cipher for Security at Wireless Sensor Node Level
Authors: Gaurav Bansod, Swapnil Sutar, Abhijit Patil, Jagdish Patil
Abstract:
This paper proposes an ultra-lightweight cipher NUX. NUX is a generalized Feistel network. It supports 128/80 bit key length and block length of 64 bit. For 128 bit key length, NUX needs only 1022 GEs which is less as compared to all existing cipher design. NUX design results into less footprint area and minimal memory size. This paper presents security analysis of NUX cipher design which shows cipher’s resistance against basic attacks like Linear and Differential Cryptanalysis. Advanced attacks like Biclique attack is also mounted on NUX cipher design. Two different F function in NUX cipher design results in high diffusion mechanism which generates large number of active S-boxes in minimum number of rounds. NUX cipher has total 31 rounds. NUX design will be best-suited design for critical application like smart grid, IoT, wireless sensor network, where memory size, footprint area and the power dissipation are the major constraints.Keywords: lightweight cryptography, Feistel cipher, block cipher, IoT, encryption, embedded security, ubiquitous computing
Procedia PDF Downloads 37226857 Deployment of Beyond 4G Wireless Communication Networks with Carrier Aggregation
Authors: Bahram Khan, Anderson Rocha Ramos, Rui R. Paulo, Fernando J. Velez
Abstract:
With the growing demand for a new blend of applications, the users dependency on the internet is increasing day by day. Mobile internet users are giving more attention to their own experiences, especially in terms of communication reliability, high data rates and service stability on move. This increase in the demand is causing saturation of existing radio frequency bands. To address these challenges, researchers are investigating the best approaches, Carrier Aggregation (CA) is one of the newest innovations, which seems to fulfill the demands of the future spectrum, also CA is one the most important feature for Long Term Evolution - Advanced (LTE-Advanced). For this purpose to get the upcoming International Mobile Telecommunication Advanced (IMT-Advanced) mobile requirements (1 Gb/s peak data rate), the CA scheme is presented by 3GPP, which would sustain a high data rate using widespread frequency bandwidth up to 100 MHz. Technical issues such as aggregation structure, its implementations, deployment scenarios, control signal techniques, and challenges for CA technique in LTE-Advanced, with consideration of backward compatibility, are highlighted in this paper. Also, performance evaluation in macro-cellular scenarios through a simulation approach is presented, which shows the benefits of applying CA, low-complexity multi-band schedulers in service quality, system capacity enhancement and concluded that enhanced multi-band scheduler is less complex than the general multi-band scheduler, which performs better for a cell radius longer than 1800 m (and a PLR threshold of 2%).Keywords: component carrier, carrier aggregation, LTE-advanced, scheduling
Procedia PDF Downloads 19926856 Investigating Interlayer Bonding in 3D Printing Pressure Vessel Applications
Authors: Cam Minh Tri Tien, Richard Fenrich, Tristan Shelley, Nam Mai-Duy, Allan Malano, Xuesen Zeng
Abstract:
Since additive manufacturing is a layer-by-layer deposition approach, good bonding quality between adjacent layers is critically important to achieve optimal mechanical performance, including applications in pressure vessels. The need to enhance the strength of printed products, especially in the build direction where layup gaps and voids exist between the printed layers, has garnered significant attention. The proposed research will focus on improving the current Fused Deposition Modelling (FDM) process to produce polymers reinforced with chopped fibers, utilizing a controlled heat zone to enhance the adhesion between printed layers. Energy will be applied to both printed and printing layers to improve the bonding strength between adjacent layers. Through the enhanced FDM process, the mechanical performance of composite parts will experience a substantial improvement, particularly in the build direction, as compared to current FDM methods. A combination of experimental, numerical, and analytical methods will be employed to demonstrate the enhanced performance of heat-controlled 3D printed parts.Keywords: 3D Printing, pressure vessels, interlayer bonding, controlled heat
Procedia PDF Downloads 5126855 The Role of Transport Investment and Enhanced Railway Accessibility in Regional Efficiency Improvement in Saudi Arabia: Data Envelopment Analysis
Authors: Saleh Alotaibi, Mohammed Quddus, Craig Morton, Jobair Bin Alam
Abstract:
This paper explores the role of large-scale investment in transport sectors and the impact of increased railway accessibility on the efficiency of the regional economic productivity in the Kingdom of Saudi Arabia (KSA). There are considerable differences among the KSA regions in terms of their levels of investment and productivity due to their geographical scale and location, which in turn greatly affect their relative efficiency. The study used a non-parametric linear programming technique - Data Envelopment Analysis (DEA) - to measure the regional efficiency change over time and determine the drivers of inefficiency and their scope of improvement. In addition, Window DEA analysis is carried out to compare the efficiency performance change for various time periods. Malmquist index (MI) is also analyzed to identify the sources of productivity change between two subsequent years. The analysis involves spatial and temporal panel data collected from 1999 to 2018 for the 13 regions of the country. Outcomes reveal that transport investment and improved railway accessibility, in general, have significantly contributed to regional economic development. Moreover, the endowment of the new railway stations has spill-over effects. The DEA Window analysis confirmed the dynamic improvement in the average regional efficiency over the study periods. MI showed that the technical efficiency change was the main source of regional productivity improvement. However, there is evidence of investment allocation discrepancy among regions which could limit the achievement of development goals in the long term. These relevant findings will assist the Saudi government in developing better strategic decisions for future transport investments and their allocation at the regional level.Keywords: data envelopment analysis, transport investment, railway accessibility, efficiency
Procedia PDF Downloads 14926854 Effect of Graphene Oxide Nanoparticles on a Heavy Oilfield: Interfacial Tension, Wettability and Oil Displacement Studies
Authors: Jimena Lizeth Gomez Delgado, Jhon Jairo Rodriguez, Nicolas Santos, Enrique Mejia Ospino
Abstract:
Nanotechnology has played an important role in the hydrocarbon industry, recently , due to the unique properties of graphene oxide nanoparticles, they have been incorporated in different studies enhanced oil recovery. Nonetheless, very few studies have used graphene oxide nanoparticles in coreflooding experiments. Herein, the use of Graphene oxide (GO) nanoparticle was explored, exploited and evaluated. The performance of Graphene oxide nanoparticles on the interfacial properties in the presence of different electrolyte concentrations representative of field brine and pH conditions was investigated. Moreover, wettability behavior of the nanofluid at the oil/sand interface was studied used contact angle and Amott Harvey evaluation. Experimental result shows that the adsorption of GO on the sandstone surface changes the wettability of the sandstone from being strongly crude oil-wet to intermediate crude oil-wettability. At 900 ppm formation brine with 8 pH solution and 0.09 wt% nanoparticles concentration, Graphene oxide nanofluid exhibited better performance under the different electrolyte concentration studied. Finally, heavy oil displacement test in sandstone cores showed that oil recovery of Graphene oxide nanofluid had 7% incremental oil recovery over conventional waterflooding.Keywords: nanoparticle, graphene oxide, nanotechnology, wettability, enhanced oil recovery, coreflooding
Procedia PDF Downloads 108