Search results for: IVF techniques evolution
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 8167

Search results for: IVF techniques evolution

2917 Development of a French to Yorùbá Machine Translation System

Authors: Benjamen Nathaniel, Eludiora Safiriyu Ijiyemi, Egume Oneme Lucky

Abstract:

A review on machine translation systems shows that a lot of computational artefacts has been carried out to translate written or spoken texts from a source language to Yorùbá language through Machine Translation systems. However, there are no work on French to Yorùbá language machine translation system; hence, the study investigated the process involved in the translation of French-to-Yorùbá language equivalent with the view to adopting a rule- based MT approach to build a Machine Translation framework from simple sentences administered through questionnaire. Articles and relevant textbooks were reviewed with key speakers of both languages interviewed to find out the processes involved in the translation of French language and their equivalent in Yorùbálanguage simple sentences using home domain terminologies. Achieving this, a model was formulated using phrase grammar structure, re-write rule, parse tree, automata theory- based techniques, designed and implemented respectively with unified modeling language (UML) and python programming language. Analysing the result, it was observed when carrying out the result that, the Machine Translation system performed 18.45% above Experimental Subject Respondent and 2.7% below Linguistics Expert when analysed with word orthography, sentence syntax and semantic correctness of the sentences. And, when compared with Google Machine Translation system, it was noticed that the developed system performed better on lexicons of the target language.

Keywords: machine translation (MT), rule-based, French language, Yoru`ba´ language

Procedia PDF Downloads 51
2916 Analysis of an High Voltage Direct Current (HVDC) Connection Using a Real-Time Simulator Under Various Disturbances

Authors: Mankour Mohamed, Miloudi Mohamed

Abstract:

A thorough and accurate simulation is necessary for the study of a High Voltage Direct Current (HVDC) link system during various types of disturbances, including internal faults on both converters, either on the rectifier or on the inverter, as well as external faults, such as AC or DC faults on both converter sides inside the DC link party. In this study, we examine how an HVDC inverter responds to three different types of failures, including faults at the inverter valve, system control faults, and single-phase-to-ground AC faults at the sending end of the inverter side. As this phenomenon represents the most frequent problem that may affect inverter valves, particularly those based on thyristor valves (LCC (line-Commutated converter)), it is more precise to explore which circumstance generates and raises the commutation failure on inverter valves. Because of the techniques used to accelerate the simulation, digital real-time simulators are now the most potent tools that provide simulation results. The real-time-lab RT-LAB platform HYPERSIM OP-5600 is used to implement the Simulation in the Loop (SIL) technique, which is used to validate the results. It is demonstrated how to recover from both the internal faults and the AC problem. The simulation findings show how crucial a role the control system plays in fault recovery.

Keywords: hypersim simulator, HVDC systems, mono-polar link, AC faults, misfiring faults

Procedia PDF Downloads 79
2915 Phishing Detection: Comparison between Uniform Resource Locator and Content-Based Detection

Authors: Nuur Ezaini Akmar Ismail, Norbazilah Rahim, Norul Huda Md Rasdi, Maslina Daud

Abstract:

A web application is the most targeted by the attacker because the web application is accessible by the end users. It has become more advantageous to the attacker since not all the end users aware of what kind of sensitive data already leaked by them through the Internet especially via social network in shake on ‘sharing’. The attacker can use this information such as personal details, a favourite of artists, a favourite of actors or actress, music, politics, and medical records to customize phishing attack thus trick the user to click on malware-laced attachments. The Phishing attack is one of the most popular attacks for social engineering technique against web applications. There are several methods to detect phishing websites such as Blacklist/Whitelist based detection, heuristic-based, and visual similarity-based detection. This paper illustrated a comparison between the heuristic-based technique using features of a uniform resource locator (URL) and visual similarity-based detection techniques that compares the content of a suspected phishing page with the legitimate one in order to detect new phishing sites based on the paper reviewed from the past few years. The comparison focuses on three indicators which are false positive and negative, accuracy of the method, and time consumed to detect phishing website.

Keywords: heuristic-based technique, phishing detection, social engineering and visual similarity-based technique

Procedia PDF Downloads 163
2914 An Inquiry into the Usage of Complex Systems Models to Examine the Effects of the Agent Interaction in a Political Economic Environment

Authors: Ujjwall Sai Sunder Uppuluri

Abstract:

Group theory is a powerful tool that researchers can use to provide a structural foundation for their Agent Based Models. These Agent Based models are argued by this paper to be the future of the Social Science Disciplines. More specifically, researchers can use them to apply evolutionary theory to the study of complex social systems. This paper illustrates one such example of how theoretically an Agent Based Model can be formulated from the application of Group Theory, Systems Dynamics, and Evolutionary Biology to analyze the strategies pursued by states to mitigate risk and maximize usage of resources to achieve the objective of economic growth. This example can be applied to other social phenomena and this makes group theory so useful to the analysis of complex systems, because the theory provides the mathematical formulaic proof for validating the complex system models that researchers build and this will be discussed by the paper. The aim of this research, is to also provide researchers with a framework that can be used to model political entities such as states on a 3-dimensional plane. The x-axis representing resources (tangible and intangible) available to them, y the risks, and z the objective. There also exist other states with different constraints pursuing different strategies to climb the mountain. This mountain’s environment is made up of risks the state faces and resource endowments. This mountain is also layered in the sense that it has multiple peaks that must be overcome to reach the tallest peak. A state that sticks to a single strategy or pursues a strategy that is not conducive to the climbing of that specific peak it has reached is not able to continue advancement. To overcome the obstacle in the state’s path, it must innovate. Based on the definition of a group, we can categorize each state as being its own group. Each state is a closed system, one which is made up of micro level agents who have their own vectors and pursue strategies (actions) to achieve some sub objectives. The state also has an identity, the inverse being anarchy and/or inaction. Finally, the agents making up a state interact with each other through competition and collaboration to mitigate risks and achieve sub objectives that fall within the primary objective. Thus, researchers can categorize the state as an organism that reflects the sum of the output of the interactions pursued by agents at the micro level. When states compete, they employ a strategy and that state which has the better strategy (reflected by the strategies pursued by her parts) is able to out-compete her counterpart to acquire some resource, mitigate some risk or fulfil some objective. This paper will attempt to illustrate how group theory combined with evolutionary theory and systems dynamics can allow researchers to model the long run development, evolution, and growth of political entities through the use of a bottom up approach.

Keywords: complex systems, evolutionary theory, group theory, international political economy

Procedia PDF Downloads 117
2913 Encouraging Teachers to be Reflective: Advantages, Obstacles and Limitations

Authors: Fazilet Alachaher

Abstract:

Within the constructivist perspective of teaching, which views skilled teaching as knowing what to do in uncertain and unpredictable situations, this research essay explores the topic of reflective teaching by investigating the following questions: (1) What is reflective teaching and why is it important? (2) Why should teachers be trained to be reflective and how can they be prepared to be reflective? (3) What is the role of the teaching context in teachers’ attempts to be reflective? This paper suggests that reflective teaching is important because of the various potential benefits to teaching. Through reflection, teachers can maintain their voices and creativeness thus have authority to affect students, curriculum and school policies. The discussions also highlight the need to prepare student teachers and their professional counterparts to be reflective, so they can develop the characteristics of reflective teaching and gain the potential benefits of reflection. This can be achieved by adopting models and techniques that are based on constructivist pedagogical approaches. The paper also suggests that maintaining teachers’ attempts to be reflective in a workplace context and aligning practice with pre-service teacher education programs require the administrators or the policy makers to provide the following: sufficient time for teachers to reflect and work collaboratively to discuss challenges encountered in teaching, fewer non-classroom duties, regular in-service opportunities, more facilities and freedom in choosing suitable ways of evaluating their students’ progress and needs.

Keywords: creative teaching, reflective teaching, constructivist pedagogical approaches, teaching context, teacher’s role, curriculum and school policies, teaching context effect

Procedia PDF Downloads 435
2912 Essential Oil Encapsulated into Succinic Acid Modified Beta-Cyclodextrin: Characterization, Docking Study, and Antifungal Activity

Authors: Amine Ez-Zoubi, Abdellah Farah

Abstract:

Because of their effectiveness and environmental safety, many essential oils have been investigated as biopesticides. Nevertheless, the encapsulation process is necessary to improve its physical, chemical, and biological properties. Therefore, the purpose of this paper was to study the physicochemical characteristics, and antifungal activity of the Artemisia Herba-Alba essential oil (HAEO) encapsulated in succinic acid modified β-CD (SACD). A yellowish oil was obtained from plant A. Herba-Alba using hydrodistillation and GC-MS was used to identify the chemical composition, in which α-Thujone (65.0%) was the main component in HAEO. The succinic acid has been esterified via the hydroxyl groups in β-CD to produce SACD. In addition, the inclusion complex formation of HAEO and SACD was generated according to the co-precipitation method and was analyzed by several techniques. The antifungal activity in vitro was examined against Botrytis cinerea by direct contact with a potato dextrose agar culture medium. At a 0.1 % concentration, the HAEO in encapsulated form showed higher potential for the control of B. cinerea when compared to the EO in free form (38.34 to 12%). Thus, these results produced evidence that the encapsulation of EOs in SACD can be useful for the development of B.cinerea inhibitors and a promising alternative biopesticide.

Keywords: Artemisia Herba-Alba essential oil, succinic acid modified β-cyclodextrin, inclusion complex, co-precipitation, Botrytis cinerea, direct contact

Procedia PDF Downloads 70
2911 The Construction of Knowledge and Social Wisdom on Local Community in the Process of Disaster Management

Authors: Oman Sukmana

Abstract:

Geographically, Indonesia appears to be disaster-prone areas, whether for natural, nonnatural (man-made), or social disasters. This study aimed to construct the knowledge and social wisdom on the local community in the process of disaster management after the eruption of Mt. Kelud. This study, moreover, encompassed two major concerns: (1) the construction of knowledge and social wisdom on the local community in the process of disaster management after the eruption of Mt. Kelud; (2) the conceptual framework of disaster management on the basis of knowledge and social wisdom on the local community. The study was conducted by means of qualitative approach. The data were analyzed by using the qualitative-descriptive technique. The data collection techniques used in this study were in-depth interview, focus group discussion, observation, and documentation. It was conducted at Pandansari Village, Sub-district Ngantang, District Malang as the most at risk area of Mt. Kelud’s eruption. The purposive sampling was applied ad hoc to select the respondents including: the apparatus of Pandansari Village, the local figures of Pandansari Village, the Chief and Boards of the Forum of Disaster Risk Reduction (FPRB), the Head of Malang Regional Disaster Management Agency, and other agencies. The findings of this study showed that the local community has already possessed the adequate knowledge and social wisdom to overcome the disaster. Through the social wisdom, the local community could predict the potential eruption.

Keywords: knowledge, social and local wisdom, disaster management

Procedia PDF Downloads 356
2910 Application of the Hit or Miss Transform to Detect Dams Monitored for Water Quality Using Remote Sensing in South Africa

Authors: Brighton Chamunorwa

Abstract:

The current remote sensing of water quality procedures does not provide a step representing physical visualisation of the monitored dam. The application of the remote sensing of water quality techniques may benefit from use of mathematical morphology operators for shape identification. Given an input of dam outline, morphological operators such as the hit or miss transform identifies if the water body is present on input remotely sensed images. This study seeks to determine the accuracy of the hit or miss transform to identify dams monitored by the water resources authorities in South Africa on satellite images. To achieve this objective the study download a Landsat image acquired in winter and tested the capability of the hit or miss transform using shapefile boundaries of dams in the crocodile marico catchment. The results of the experiment show that it is possible to detect most dams on the Landsat image after the adjusting the erosion operator to detect pixel matching a percentage similarity of 80% and above. Successfully implementation of the current study contributes towards optimisation of mathematical morphology image operators. Additionally, the effort helps develop remote sensing of water quality monitoring with improved simulation of the conventional procedures.

Keywords: hit or miss transform, mathematical morphology, remote sensing, water quality monitoring

Procedia PDF Downloads 132
2909 Transition Metal Carbodiimide vs. Spinel Matrices for Photocatalytic Water Oxidation

Authors: Karla Lienau, Rafael Müller, René Moré, Debora Ressnig, Dan Cook, Richard Walton, Greta R. Patzke

Abstract:

The increasing demand for renewable energy sources and storable fuels underscores the high potential of artificial photosynthesis. The four electron transfer process of water oxidation remains the bottleneck of water splitting, so that special emphasis is placed on the development of economic, stable and efficient water oxidation catalysts (WOCs). Our investigations introduced cobalt carbodiimide CoNCN and its transition metal analogues as WOC types, and further studies are focused on the interaction of different transition metals in the convenient all-nitrogen/carbon matrix. This provides further insights into the nature of the ‘true catalyst’ for cobalt centers in this non-oxide environment. Water oxidation activity is evaluated with complementary methods, namely photocatalytically using a Ru-dye sensitized standard setup as well as electrocatalytically, via immobilization of the WOCs on glassy carbon electrodes. To further explore the tuning potential of transition metal combinations, complementary investigations were carried out in oxidic spinel WOC matrices with more versatile host options than the carbodiimide framework. The influence of the preparative history on the WOC performance was evaluated with different synthetic methods (e.g. hydrothermally or microwave assisted). Moreover, the growth mechanism of nanoscale Co3O4-spinel as a benchmark WOC was investigated with in-situ PXRD techniques.

Keywords: carbodiimide, photocatalysis, spinels, water oxidation

Procedia PDF Downloads 270
2908 Performance Analysis of Different PSK Scheme on Receiver Sensitivity and Round Trip Distance for Chipless RFID System for UWB with Rayleigh Fading Channels in Outdoor NLOS Environment

Authors: Khalid Mahmud

Abstract:

In this paper, an analytic approach is presented to evaluate the Bit Error Rate (BER) and round trip distance for a UWB chipless RFID system using diversity technique at the reader receiver using different modulation technique. The analysis is carried out with multiresonator based chipless RFID tags using frequency range from 3 GHz − 6 GHz and bandwidth of 500 M Hz in outdoor non-line-of-sight (NLOS) environment. SISO configuration is used to communicate from the reader to the tag and SIMO configuration is used do vice versa. Maximal Ratio Combining (MRC) technique is used in the reader. MPSK, DQPSK, DBPSK, BPSK, QPSK and DMPSK modulation techniques are considered with coherent demodulation to evaluate the BER performance. From the numerical analysis of the results, it is found that at a given BER maximum possible round trip distance can be achieved using DMPSK modulation technique. In addition, it has been proved that, while using DMPSK modulation technique, the application of diversity has very little effect on the overall improvement in reader receiver sensitivity and achievable distance. Finally the method not only proves to be a very good way for tag detection in case of a chipless RFID system but also gives a clear insight regarding the interrelationship between BER, read range, reader received power, number of receiving antenna in outdoor NLOS environment.

Keywords: EGC, MRC, BER, read range, diversity

Procedia PDF Downloads 338
2907 Accounting for Downtime Effects in Resilience-Based Highway Network Restoration Scheduling

Authors: Zhenyu Zhang, Hsi-Hsien Wei

Abstract:

Highway networks play a vital role in post-disaster recovery for disaster-damaged areas. Damaged bridges in such networks can disrupt the recovery activities by impeding the transportation of people, cargo, and reconstruction resources. Therefore, rapid restoration of damaged bridges is of paramount importance to long-term disaster recovery. In the post-disaster recovery phase, the key to restoration scheduling for a highway network is prioritization of bridge-repair tasks. Resilience is widely used as a measure of the ability to recover with which a network can return to its pre-disaster level of functionality. In practice, highways will be temporarily blocked during the downtime of bridge restoration, leading to the decrease of highway-network functionality. The failure to take downtime effects into account can lead to overestimation of network resilience. Additionally, post-disaster recovery of highway networks is generally divided into emergency bridge repair (EBR) in the response phase and long-term bridge repair (LBR) in the recovery phase, and both of EBR and LBR are different in terms of restoration objectives, restoration duration, budget, etc. Distinguish these two phases are important to precisely quantify highway network resilience and generate suitable restoration schedules for highway networks in the recovery phase. To address the above issues, this study proposes a novel resilience quantification method for the optimization of long-term bridge repair schedules (LBRS) taking into account the impact of EBR activities and restoration downtime on a highway network’s functionality. A time-dependent integer program with recursive functions is formulated for optimally scheduling LBR activities. Moreover, since uncertainty always exists in the LBRS problem, this paper extends the optimization model from the deterministic case to the stochastic case. A hybrid genetic algorithm that integrates a heuristic approach into a traditional genetic algorithm to accelerate the evolution process is developed. The proposed methods are tested using data from the 2008 Wenchuan earthquake, based on a regional highway network in Sichuan, China, consisting of 168 highway bridges on 36 highways connecting 25 cities/towns. The results show that, in this case, neglecting the bridge restoration downtime can lead to approximately 15% overestimation of highway network resilience. Moreover, accounting for the impact of EBR on network functionality can help to generate a more specific and reasonable LBRS. The theoretical and practical values are as follows. First, the proposed network recovery curve contributes to comprehensive quantification of highway network resilience by accounting for the impact of both restoration downtime and EBR activities on the recovery curves. Moreover, this study can improve the highway network resilience from the organizational dimension by providing bridge managers with optimal LBR strategies.

Keywords: disaster management, highway network, long-term bridge repair schedule, resilience, restoration downtime

Procedia PDF Downloads 132
2906 Examining the Critical Factors for Success and Failure of Common Ticketing Systems

Authors: Tam Viet Hoang

Abstract:

With a plethora of new mobility services and payment systems found in our cities and across modern public transportation systems, several cities globally have turned to common ticketing systems to help navigate this complexity. Helping to create time and space-differentiated fare structures and tariff schemes, common ticketing systems can optimize transport utilization rates, achieve cost efficiencies, and provide key incentives to specific target groups. However, not all cities and transportation systems have enjoyed a smooth journey towards the adoption, roll-out, and servicing of common ticketing systems, with both the experiences of success and failure being attributed to a wide variety of critical factors. Using case study research as a methodology and cities as the main unit of analysis, this research will seek to address the fundamental question of “what are the critical factors for the success and failure of common ticketing systems?” Using rail/train systems as the entry point for this study will start by providing a background to the evolution of transport ticketing and justify the improvements in operational efficiency that can be achieved through common ticketing systems. Examining the socio-economic benefits of common ticketing, the research will also help to articulate the value derived for different key identified stakeholder groups. By reviewing case studies of the implementation of common ticketing systems in different cities, the research will explore lessons learned from cities with the aim to elicit factors to ensure seamless connectivity integrated e-ticketing platforms. In an increasingly digital age and where cities are now coming online, this paper seeks to unpack these critical factors, undertaking case study research drawing from literature and lived experiences. Offering us a better understanding of the enabling environment and ideal mixture of ingredients to facilitate the successful roll-out of a common ticketing system, interviews will be conducted with transport operators from several selected cities to better appreciate the challenges and strategies employed to overcome those challenges in relation to common ticketing systems. Meanwhile, as we begin to see the introduction of new mobile applications and user interfaces to facilitate ticketing and payment as part of the transport journey, we take stock of numerous policy challenges ahead and implications on city-wide and system-wide urban planning. It is hoped that this study will help to identify the critical factors for the success and failure of common ticketing systems for cities set to embark on their implementation while serving to fine-tune processes in those cities where common ticketing systems are already in place. Outcomes from the study will help to facilitate an improved understanding of common pitfalls and essential milestones towards the roll-out of a common ticketing system for railway systems, especially for emerging countries where mass rapid transit transport systems are being considered or in the process of construction.

Keywords: common ticketing, public transport, urban strategies, Bangkok, Fukuoka, Sydney

Procedia PDF Downloads 68
2905 Remotely Sensed Data Fusion to Extract Vegetation Cover in the Cultural Park of Tassili, South of Algeria

Authors: Y. Fekir, K. Mederbal, M. A. Hammadouche, D. Anteur

Abstract:

The cultural park of the Tassili, occupying a large area of Algeria, is characterized by a rich vegetative biodiversity to be preserved and managed both in time and space. The management of a large area (case of Tassili), by its complexity, needs large amounts of data, which for the most part, are spatially localized (DEM, satellite images and socio-economic information etc.), where the use of conventional and traditional methods is quite difficult. The remote sensing, by its efficiency in environmental applications, became an indispensable solution for this kind of studies. Multispectral imaging sensors have been very useful in the last decade in very interesting applications of remote sensing. They can aid in several domains such as the de¬tection and identification of diverse surface targets, topographical details, and geological features. In this work, we try to extract vegetative areas using fusion techniques between data acquired from sensor on-board the Earth Observing 1 (EO-1) satellite and Landsat ETM+ and TM sensors. We have used images acquired over the Oasis of Djanet in the National Park of Tassili in the south of Algeria. Fusion technqiues were applied on the obtained image to extract the vegetative fraction of the different classes of land use. We compare the obtained results in vegetation end member extraction with vegetation indices calculated from both Hyperion and other multispectral sensors.

Keywords: Landsat ETM+, EO1, data fusion, vegetation, Tassili, Algeria

Procedia PDF Downloads 417
2904 The Importance of Industrial Work Experience, Career Information, and Work Motivation to Increase Work Readiness

Authors: Nyaris Pambudiyatno, Asto Buditjahjanto, Eppy Yundra, Arie Wardhono, Eko Hariadi

Abstract:

Vocational education is part of the national education system that is prepared to produce graduates who have the skills and knowledge according to the needs and requirements required by the job. Vocational Education is a secondary education that prepares students to work in a particular field. The purpose of this study was to analyze and find out the effect of industrial work practice experience and career information on work readiness through work motivation. This type of research is causal research with a quantitative approach. The population in this study was 359 cadets of Aviation Polytechnic Surabaya. While the number of samples calculates using slovin calculations obtained by 189 cadets of Surabaya Aviation Polytechnic. The type of data used is quantitative data with the primary data source. Data collection techniques are by distributing questionnaires. Analysis of this study is with Lisrel. The findings prove that: (1) Industrial Work Experience experience has a positive and significant effect on work motivation; (2) Industrial Work Experience has a positive and significant impact on work readiness; (3) Career information has a positive and significant effect on job readiness; (4) Career information has a positive and significant impact on job readiness; Dan (5) Work motivation has a positive and significant effect on work readiness.

Keywords: career information, increase work readiness, industrial work experience, work motivation

Procedia PDF Downloads 123
2903 Comparing Different Frequency Ground Penetrating Radar Antennas for Tunnel Health Assessment

Authors: Can Mungan, Gokhan Kilic

Abstract:

Structural engineers and tunnel owners have good reason to attach importance to the assessment and inspection of tunnels. Regular inspection is necessary to maintain and monitor the health of the structure not only at the present time but throughout its life cycle. Detection of flaws within the structure, such as corrosion and the formation of cracks within the internal elements of the structure, can go a long way to ensuring that the structure maintains its integrity over the course of its life. Other issues that may be detected earlier through regular assessment include tunnel surface delamination and the corrosion of the rebar. One advantage of new technology such as the ground penetrating radar (GPR) is the early detection of imperfections. This study will aim to discuss and present the effectiveness of GPR as a tool for assessing the structural integrity of the heavily used tunnel. GPR is used with various antennae in frequency and application method (2 GHz and 500 MHz GPR antennae). The paper will attempt to produce a greater understanding of structural defects and identify the correct tool for such purposes. Conquest View with 3D scanning capabilities was involved throughout the analysis, reporting, and interpretation of the results. This study will illustrate GPR mapping and its effectiveness in providing information of value when it comes to rebar position (lower and upper reinforcement). It will also show how such techniques can detect structural features that would otherwise remain unseen, as well as moisture ingress.

Keywords: tunnel, GPR, health monitoring, moisture ingress, rebar position

Procedia PDF Downloads 106
2902 Troubleshooting Petroleum Equipment Based on Wireless Sensors Based on Bayesian Algorithm

Authors: Vahid Bayrami Rad

Abstract:

In this research, common methods and techniques have been investigated with a focus on intelligent fault finding and monitoring systems in the oil industry. In fact, remote and intelligent control methods are considered a necessity for implementing various operations in the oil industry, but benefiting from the knowledge extracted from countless data generated with the help of data mining algorithms. It is a avoid way to speed up the operational process for monitoring and troubleshooting in today's big oil companies. Therefore, by comparing data mining algorithms and checking the efficiency and structure and how these algorithms respond in different conditions, The proposed (Bayesian) algorithm using data clustering and their analysis and data evaluation using a colored Petri net has provided an applicable and dynamic model from the point of view of reliability and response time. Therefore, by using this method, it is possible to achieve a dynamic and consistent model of the remote control system and prevent the occurrence of leakage in oil pipelines and refineries and reduce costs and human and financial errors. Statistical data The data obtained from the evaluation process shows an increase in reliability, availability and high speed compared to other previous methods in this proposed method.

Keywords: wireless sensors, petroleum equipment troubleshooting, Bayesian algorithm, colored Petri net, rapid miner, data mining-reliability

Procedia PDF Downloads 48
2901 Breast Cancer Risk is Predicted Using Fuzzy Logic in MATLAB Environment

Authors: S. Valarmathi, P. B. Harathi, R. Sridhar, S. Balasubramanian

Abstract:

Machine learning tools in medical diagnosis is increasing due to the improved effectiveness of classification and recognition systems to help medical experts in diagnosing breast cancer. In this study, ID3 chooses the splitting attribute with the highest gain in information, where gain is defined as the difference between before the split versus after the split. It is applied for age, location, taluk, stage, year, period, martial status, treatment, heredity, sex, and habitat against Very Serious (VS), Very Serious Moderate (VSM), Serious (S) and Not Serious (NS) to calculate the gain of information. The ranked histogram gives the gain of each field for the breast cancer data. The doctors use TNM staging which will decide the risk level of the breast cancer and play an important decision making field in fuzzy logic for perception based measurement. Spatial risk area (taluk) of the breast cancer is calculated. Result clearly states that Coimbatore (North and South) was found to be risk region to the breast cancer than other areas at 20% criteria. Weighted value of taluk was compared with criterion value and integrated with Map Object to visualize the results. ID3 algorithm shows the high breast cancer risk regions in the study area. The study has outlined, discussed and resolved the algorithms, techniques / methods adopted through soft computing methodology like ID3 algorithm for prognostic decision making in the seriousness of the breast cancer.

Keywords: ID3 algorithm, breast cancer, fuzzy logic, MATLAB

Procedia PDF Downloads 503
2900 Detecting Music Enjoyment Level Using Electroencephalogram Signals and Machine Learning Techniques

Authors: Raymond Feng, Shadi Ghiasi

Abstract:

An electroencephalogram (EEG) is a non-invasive technique that records electrical activity in the brain using scalp electrodes. Researchers have studied the use of EEG to detect emotions and moods by collecting signals from participants and analyzing how those signals correlate with their activities. In this study, researchers investigated the relationship between EEG signals and music enjoyment. Participants listened to music while data was collected. During the signal-processing phase, power spectral densities (PSDs) were computed from the signals, and dominant brainwave frequencies were extracted from the PSDs to form a comprehensive feature matrix. A machine learning approach was then taken to find correlations between the processed data and the music enjoyment level indicated by the participants. To improve on previous research, multiple machine learning models were employed, including K-Nearest Neighbors Classifier, Support Vector Classifier, and Decision Tree Classifier. Hyperparameters were used to fine-tune each model to further increase its performance. The experiments showed that a strong correlation exists, with the Decision Tree Classifier with hyperparameters yielding 85% accuracy. This study proves that EEG is a reliable means to detect music enjoyment and has future applications, including personalized music recommendation, mood adjustment, and mental health therapy.

Keywords: EEG, electroencephalogram, machine learning, mood, music enjoyment, physiological signals

Procedia PDF Downloads 38
2899 Hybrid Localization Schemes for Wireless Sensor Networks

Authors: Fatima Babar, Majid I. Khan, Malik Najmus Saqib, Muhammad Tahir

Abstract:

This article provides range based improvements over a well-known single-hop range free localization scheme, Approximate Point in Triangulation (APIT) by proposing an energy efficient Barycentric coordinate based Point-In-Triangulation (PIT) test along with PIT based trilateration. These improvements result in energy efficiency, reduced localization error and improved localization coverage compared to APIT and its variants. Moreover, we propose to embed Received signal strength indication (RSSI) based distance estimation in DV-Hop which is a multi-hop localization scheme. The proposed localization algorithm achieves energy efficiency and reduced localization error compared to DV-Hop and its available improvements. Furthermore, a hybrid multi-hop localization scheme is also proposed that utilize Barycentric coordinate based PIT test and both range based (Received signal strength indicator) and range free (hop count) techniques for distance estimation. Our experimental results provide evidence that proposed hybrid multi-hop localization scheme results in two to five times reduction in the localization error compare to DV-Hop and its variants, at reduced energy requirements.

Keywords: Localization, Trilateration, Triangulation, Wireless Sensor Networks

Procedia PDF Downloads 454
2898 The Effect of the Earthworm (Lumbricus rubellus) as the Source of Protein Feed and Pathogen Antibacterial for Broiler

Authors: Waode Nurmayani, Nikmatul Riswanda

Abstract:

Broilers are chickens which are kept with the most efficient time and hoped get a good body weight. All things are done, for example with the improvement of feed and use antibiotics. Feed cost is the most cost to be spent. Nearly 80% of the cost is spent just for buy feed. Earthworm (Lumbricus rubellus) is a good choice to reduce the cost of feed protein source. The Earthworm has a high crude protein content of about 48.5%-61.9%, rich with proline amino acid about 15% of the 62 amino acids. Not only about protein, this earthworm also has a role in disease prevention. Prevention of disease in livestock usual with use feed supplement. Earthworm (Lumbricus rubellus) is one of the natural materials used as feed. In addition, several types of earthworms that have been known to contain active substances about antibacterial pathogens namely Lumbricus rubellus. The earthworm could be used as an antibiotic because it contain the antibody of Lumbricine active substance. So that, this animal feed from Lumbricus rubellus could improve the performance of broilers. Bioactive of anti-bacterial is called Lumbricine able to inhibit the growth of pathogenic bacteria in the intestinal wall so that the population of pathogenic bacteria is reduced. The method of write in this scientific writing is divided into 3 techniques, namely data completion, data analysis, and thinking pan from various literature about earthworm (Lumbricus rubellus) as broiler feed. It is expected that innovation of feed material of earthworm (Lumbricus rubellus) could reduce the cost of protein feed and the use of chemical antibiotics.

Keywords: earthworm, broiler, protein, antibiotic

Procedia PDF Downloads 140
2897 Roller Pump-Induced Tubing Rupture during Cardiopulmonary Bypass

Authors: W. G. Kim, C. H. Jo

Abstract:

We analyzed the effects of variations in the diameter of silicone rubber and polyvinyl chloride (PVC) tubings on the likelihood of tubing rupture during modeling of accidental arterial line clamping in cardiopulmonary bypass with a roller pump. A closed CPB circuit constructed with a roller pump was tested with both PVC and silicone rubber tubings of 1/2, 3/8, and 1/4 inch internal diameter. Arterial line pressure was monitored, and an occlusive clamp was placed across the tubing distal to the pressure monitor site to model an accidental arterial line occlusion. A CCD camera with 512(H) x 492(V) pixels was installed above the roller pump to measure tubing diameters at pump outlet, where the maximum deformations (distension) of the tubings occurred. Quantitative measurement of the changes of tubing diameters with the change of arterial line pressure was performed using computerized image processing techniques. A visible change of tubing diameter was generally noticeable by around 250 psi of arterial line pressure, which was already very high. By 1500 psi, the PVC tubings showed an increase of diameter of between 5-10 %, while the silicone rubber tubings showed an increase between 20-25 %. Silicone rubber tubings of all sizes showed greater distensibility than PVC tubings of equivalent size. In conclusion, although roller-pump induced tubing rupture remains a theoretical problem during cardiopulmonary bypass in terms of the inherent mechanism of the pump, in reality such an occurrence is impossible in real clinical conditions.

Keywords: roller pump, tubing rupture, cardiopulmonary bypass, arterial line

Procedia PDF Downloads 280
2896 Vegetables and Fruits Solar Tunnel Dryer for Small-Scale Farmers in Kassala

Authors: Sami Mohamed Sharif

Abstract:

The current study focuses on the design and construction of a solar tunnel dryer intended for small-scale farmers in Kassala, Sudan. To determine the appropriate dimensions of the dryer, the heat and mass balance equations are used, taking into account factors such as the target agricultural product, climate conditions, solar irradiance, and desired drying time. In Kassala, a dryer with a width of 88 cm, length of 600 cm, and height of 25 cm has been built, capable of drying up to 40 kg of vegetables or fruits. The dryer is divided into two chambers of different lengths. The air passing through is heated to the desired drying temperature in a separate heating chamber that is 200 cm long. From there, the heated air enters the drying chamber, which is 400 cm long. In this section, the agricultural product is placed on a slightly elevated net. The tunnel dryer was constructed using materials from the local market. The paper also examines the solar irradiance in Kassala, finding an average of 23.6 MJ/m2/day, with a maximum of 26.6 MJ/m2/day in April and a minimum of 20.2 MJ/m2/day in December. A DC fan powered by a 160Wp solar panel is utilized to circulate air within the tunnel. By connecting the fan and three 12V, 60W bulbs in series, four different speeds can be achieved using a speed controller. Temperature and relative humidity measurements were taken hourly over three days, from 10:00 a.m. to 3:00 p.m. The results demonstrate the promising technology and sizing techniques of solar tunnel dryers, which can significantly increase the temperature within the tunnel by more than 90%.

Keywords: tunnel dryer, solar drying, moisture content, fruits drying modeling, open sun drying

Procedia PDF Downloads 43
2895 The Challenges to Information Communication Technology Integration in Mathematics Teaching and Learning

Authors: George Onomah

Abstract:

Background: The integration of information communication technology (ICT) in Mathematics education faces notable challenges, which this study aimed to dissect and understand. Objectives: The primary goal was to assess the internal and external factors affecting the adoption of ICT by in-service Mathematics teachers. Internal factors examined included teachers' pedagogical beliefs, prior teaching experience, attitudes towards computers, and proficiency with technology. External factors included the availability of technological resources, the level of ICT training received, the sufficiency of allocated time for technology use, and the institutional culture within educational environments. Methods: A descriptive survey design was employed to methodically investigate these factors. Data collection was carried out using a five-point Likert scale questionnaire, administered to a carefully selected sample of 100 in-service Mathematics teachers through a combination of purposive and convenience sampling techniques. Findings: Results from multiple regression analysis revealed a significant underutilization of ICT in Mathematics teaching, highlighting a pronounced deficiency in current classroom practices. Recommendations: The findings suggest an urgent need for educational department heads to implement regular and comprehensive ICT training programs aimed at enhancing teachers' technological capabilities and promoting the integration of ICT in Mathematics teaching methodologies.

Keywords: ICT, Mathematics, integration, barriers

Procedia PDF Downloads 30
2894 Thermal Performance of Fully Immersed Server into Saturated Fluid Porous Medium

Authors: Yaser Al-Anii, Abdulmajeed Almaneea, Jonathan L. Summers, Harvey M. Thompson, Nikil Kapur

Abstract:

The natural convection cooling system of a fully immersed server in dielectric liquid is studied numerically. In present case study, the dielectric liquid represents working fluid and it is in contact with server inside capsule. The capsule includes electronic component and fluid, which can be modelled as saturated porous media. This medium follow Darcy flow regime and assumed to be in balance between its components. The study focus is on role of spatial parameters on thermal behavior of convective heat transfer. Based on server known unit, which is 1U, two parameters Ly and S are changed to test their effect. Meanwhile, wide range of modified Rayleigh number, which is 0.5 to 300, are covered to better understand thermal performance. Navier-Stokes equations are used to model physical domain. Furthermore, successive over relaxation and time marching techniques are used to solve momentum and energy equation. From obtained correlation, the in-between distance S is more effective on Nusselt number than distance to edge Ly by approximately 14%. In addition, as S increase, the average Nusselt number of the upper unit is increased sharply, whereas the lower one keeps on same level.

Keywords: convective cooling of server, darcy flow, liquid-immersed server, porous media

Procedia PDF Downloads 386
2893 Teaching Techno-Criticism to Digital Natives: Participatory Journalism as Pedagogical Practice

Authors: Stephen D. Caldes

Abstract:

Teaching media and digital literacy to “digital natives” presents a unique set of pedagogical obstacles, especially when critique is involved, as these early-adopters tend to deify most technological and/or digital advancements and inventions. Knowing no other way of being, these natives are often reluctant to hear criticisms of the way they receive information, educate themselves, communicate with others, and even become enculturated because critique often connotes generational gaps and/or clandestine efforts to produce neo-Luddites. To digital natives, techno-criticism is more the result of an antiquated, out-of-touch agenda rather than a constructive, progressive praxis. However, the need to cultivate a techno-critical perspective among technology’s premier users has, perhaps, never been more pressing. In an effort to sidestep reluctance and encourage critical thought about where we are in terms of digital technology and where exactly it may be taking us, this essay outlines a new model for teaching techno-criticism to digital natives. Specifically, it recasts the techniques of participatory journalism—helping writers and readers understand subjects outside of their specific historical context—as progressive, interdisciplinary pedagogy. The model arises out of a review of relevant literature and data gathered via literary analysis and participant observation. Given the tenuous relationships between novel digital advancements, individual identity, collective engagement, and, indeed, Truth/fact, shepherding digital natives toward routine practice of “techno-realism” seems of utter importance.

Keywords: digital natives, journalism education, media literacy, techno-criticism

Procedia PDF Downloads 300
2892 Decomposition of Factors Affecting Farmers Net Income Variation of Potato Crop Production in Bangladesh

Authors: M. Shah Alamgir, Jun Furuya, Shintaro Kobayashi, M. Abdus Salam

Abstract:

Farmers’ environmental and economic situations are very diverse. In order to develop effective policies and technologies to improve farmers’ life standard, it is important to understand which factors induce the diversity of agricultural income. Analyze both primary and secondary data, this study applied descriptive, inferential statistical tools, and econometric techniques. From the study, farmers of Sylhet Division produce potato as one of the main cash crop with other seasonal crops. The total costs of potato production per hectare varied in different districts of Sylhet division in addition seed and hired labor cost has the biggest share of the full cost. To grasp the diversity of income, the study decomposes the variance of net income into different factors of potato production. Through this decomposition, seed cost is the important factors of income variability and it is the most important sector to induce total cost disparity for potato production. The result shows that 73% of net income variation is explained by gross income. It implies that potato yield or potato price (quality) or both vary widely among farmers. This finding is important of policymaking and technology development of agricultural farming in Bangladesh.

Keywords: agricultural income, seed, hired labor, technology development

Procedia PDF Downloads 405
2891 Bitcoin, Blockchain and Smart Contract: Attacks and Mitigations

Authors: Mohamed Rasslan, Doaa Abdelrahman, Mahmoud M. Nasreldin, Ghada Farouk, Heba K. Aslan

Abstract:

Blockchain is a distributed database that endorses transparency while bitcoin is a decentralized cryptocurrency (electronic cash) that endorses anonymity and is powered by blockchain technology. Smart contracts are programs that are stored on a blockchain. Smart contracts are executed when predetermined conditions are fulfilled. Smart contracts automate the agreement execution in order to make sure that all participants immediate-synchronism of the outcome-certainty, without any intermediary's involvement or time loss. Currently, the Bitcoin market worth billions of dollars. Bitcoin could be transferred from one purchaser to another without the need for an intermediary bank. Network nodes through cryptography verify bitcoin transactions, which are registered in a public-book called “blockchain”. Bitcoin could be replaced by other coins, merchandise, and services. Rapid growing of the bitcoin market-value, encourages its counterparts to make use of its weaknesses and exploit vulnerabilities for profit. Moreover, it motivates scientists to define known vulnerabilities, offer countermeasures, and predict future threats. In his paper, we study blockchain technology and bitcoin from the attacker’s point of view. Furthermore, mitigations for the attacks are suggested, and contemporary security solutions are discussed. Finally, research methods that achieve strict security and privacy protocol are elaborated.

Keywords: Cryptocurrencies, Blockchain, Bitcoin, Smart Contracts, Peer-to-Peer Network, Security Issues, Privacy Techniques

Procedia PDF Downloads 62
2890 A Framework for Event-Based Monitoring of Business Processes in the Supply Chain Management of Industry 4.0

Authors: Johannes Atug, Andreas Radke, Mitchell Tseng, Gunther Reinhart

Abstract:

In modern supply chains, large numbers of SKU (Stock-Keeping-Unit) need to be timely managed, and any delays in noticing disruptions of items often limit the ability to defer the impact on customer order fulfillment. However, in supply chains of IoT-connected enterprises, the ERP (Enterprise-Resource-Planning), the MES (Manufacturing-Execution-System) and the SCADA (Supervisory-Control-and-Data-Acquisition) systems generate large amounts of data, which generally glean much earlier notice of deviations in the business process steps. That is, analyzing these streams of data with process mining techniques allows the monitoring of the supply chain business processes and thus identification of items that deviate from the standard order fulfillment process. In this paper, a framework to enable event-based SCM (Supply-Chain-Management) processes including an overview of core enabling technologies are presented, which is based on the RAMI (Reference-Architecture-Model for Industrie 4.0) architecture. The application of this framework in the industry is presented, and implications for SCM in industry 4.0 and further research are outlined.

Keywords: cyber-physical production systems, event-based monitoring, supply chain management, RAMI (Reference-Architecture-Model for Industrie 4.0)

Procedia PDF Downloads 215
2889 A Study of Effectiveness of Topical Grapeseed Oil for Reducing Wrinkles on Periorbital Areas in Asian People in Thailand

Authors: Cherish Romina Prajitno, Sunisa Thaichinda

Abstract:

One indicator of facial aging is wrinkles. Not only that, but wrinkles are a key indicator in our world of facial aesthetics. Wrinkles occur where fault lines develop in aging skin. Nowadays, people are more motivated to keep up their appealing and young appearance. Many individuals are seeking a fast recovery time for their aesthetic procedures and are interested in non-invasive techniques that have a proven track record for successful outcomes. The purpose of this study is to see the efficacy of 100% (pure) grapeseed oil for reducing periorbital wrinkles. This study used the split-face, double-blind method, and this treatment was administered for three months at random to fifteen patients, with the grapeseed oil at one side of the face and the other side with the placebo. The main outcome measure was determined by conducting a comparative analysis of the participants' wrinkle results during each visit using the VIsioscan® VC98. Additionally, we evaluated the skin's elasticity and barrier function using the Cutometer® MP 530 and Tewameter® TM300. Furthermore, we administered a satisfaction score questionnaire to the patients in the 12th week. The findings of the study indicate that grapeseed oil exhibited a noteworthy effect in diminishing the appearance of wrinkles in the periorbital region, enhancing the viscoelastic properties of the periorbital skin, and improving the functionality of the skin barrier in the periorbital area.

Keywords: periorbital wrinkles, pure grapeseed oil, split-face method

Procedia PDF Downloads 54
2888 Effect of Low Level Laser Therapy versus Polarized Light Therapy on Oral Mucositis in Cancer Patients Receiving Chemotherapy

Authors: Andrew Anis Fakhrey Mosaad

Abstract:

The goal of this study is to compare the efficacy of polarised light therapy with low-intensity laser therapy in treating oral mucositis brought on by chemotherapy in cancer patients. Evaluation procedures are the measurement of the WHO oral mucositis scale and the Common toxicity criteria scale. Techniques: Cancer patients (men and women) who had oral mucositis, ulceration, and discomfort and whose ages varied from 30 to 55 years were separated into two groups and received 40 chemotherapy treatments. Twenty patients in Group (A) received low-level laser therapy (LLLT) along with their regular oral mucositis medication treatment, while twenty patients in Group (B) received Bioptron light therapy (BLT) along with their regular oral mucositis medication treatment. Both treatments were applied for 10 minutes each day for 30 days. Conclusion and results: This study showed that the use of both BLT and LLLT on oral mucositis in cancer patients following chemotherapy greatly improved, as seen by the sharp falls in both the WHO oral mucositis scale (OMS) and the common toxicity criteria scale (CTCS). However, low-intensity laser therapy (LLLT) was superior to Bioptron light therapy in terms of benefits (BLT).

Keywords: Bioptron light therapy, low level laser therapy, oral mucositis, WHO oral mucositis scale, common toxicity criteria scale

Procedia PDF Downloads 225