Search results for: eye protective devices
2843 Analysis of User Data Usage Trends on Cellular and Wi-Fi Networks
Authors: Jayesh M. Patel, Bharat P. Modi
Abstract:
The availability of on mobile devices that can invoke the demonstrated that the total data demand from users is far higher than previously articulated by measurements based solely on a cellular-centric view of smart-phone usage. The ratio of Wi-Fi to cellular traffic varies significantly between countries, This paper is shown the compression between the cellular data usage and Wi-Fi data usage by the user. This strategy helps operators to understand the growing importance and application of yield management strategies designed to squeeze maximum returns from their investments into the networks and devices that enable the mobile data ecosystem. The transition from unlimited data plans towards tiered pricing and, in the future, towards more value-centric pricing offers significant revenue upside potential for mobile operators, but, without a complete insight into all aspects of smartphone customer behavior, operators will unlikely be able to capture the maximum return from this billion-dollar market opportunity.Keywords: cellular, Wi-Fi, mobile, smart phone
Procedia PDF Downloads 3652842 Comparative Therapeutic Effect of Acalypha indica Linn. Extract and Gemfibrozil on High Fructose and Cholesterol Diet Induced Pancreas Steatosis in Sprague-Dawley Mice
Authors: Adrian Reynaldo Sudirman, Siti Farida, Aisyah Aminy Maulidina, Caren Andika Surbakti
Abstract:
Sedentary lifestyle and imbalance consumption pattern has made metabolic syndrome as the global time bomb phenomenon in the world. The increasing tendency of people in consuming high amount of fructose and cholesterol food has worsened this issue in the society. Pancreas steatosis become one of the most comorbid when early diagnosis and prompt treatment has not been applied on hyperglycemic and hyperlipidemic condition in metabolic syndrome patient. Gemfibrozil become the drug of choice to prevent this issue, yet the efficacy of this regiment was still questionable. Acalypha indica Linn. is the herb that has protective effect on hyperlipidemic and hyperglycemic condition. This study was aimed to compare therapeutic effect of gemfibrozil (G) and Acalypha indica Linn. (AI) on high fructose and cholesterol diet-induced pancreas steatosis in Sprague-Dawley mice. The post induction mice were divided into four groups: control, gemfibrozil, AI extract, and G+AI combination regiment. Each group received four weeks intervention. The result of statistical analysis using the One-Way ANOVA test and Tukey Post Hoc test showed significant decrease in pancreatic steatosis between the control group and administered Acalypha indica group (p = 0.004, 95% CI: 0.170-0.959) and the group administered with a combination of Gemfibrozil-Acalypha indica (p = 0.023, 95% CI: 0.537-0.813). The protective effect of Acalypha indica Linn. shows that this plant has the potential as therapeutic option in overcoming the condition of pancreas steatosis in metabolic syndrome.Keywords: Acalypha Indica Linn., Cholesterol, Fructose, Gemfibrozil, Pancreas Steatosis
Procedia PDF Downloads 3072841 Study of Mechanical Properties of Large Scale Flexible Silicon Solar Modules on the Various Substrates
Authors: M. Maleczek, Leszek Bogdan, Kazimierz Drabczyk, Agnieszka Iwan
Abstract:
Crystalline silicon (Si) solar cells are the main product in the market among the various photovoltaic technologies concerning such advantages as: material richness, high carrier mobilities, broad spectral absorption range and established technology. However, photovoltaic technology on the stiff substrates are heavier, more fragile and less cost-effective than devices on the flexible substrates to be applied in special applications. The main goal of our work was to incorporate silicon solar cells into various fabric, without any change of the electrical and mechanical parameters of devices. This work is realized for the GEKON project (No. GEKON2/O4/268473/23/2016) sponsored by The National Centre for Research and Development and The National Fund for Environmental Protection and Water Management. In our work, the polyamide or polyester fabrics were used as a flexible substrate in the created devices. Applied fabrics differ in tensile and tear strength. All investigated polyamide fabrics are resistant to weathering and UV, while polyester ones is resistant to ozone, water and ageing. The examined fabrics are tight at 100 cm water per 2 hours. In our work, commercial silicon solar cells with the size 156 × 156 mm were cut into nine parts (called single solar cells) by diamond saw and laser. Gap and edge after cutting of solar cells were checked by transmission electron microscope (TEM) to study morphology and quality of the prepared single solar cells. Modules with the size of 160 × 70 cm (containing about 80 single solar cells) were created and investigated by electrical and mechanical methods. Weight of constructed module is about 1.9 kg. Three types of solar cell architectures such as: -fabric/EVA/Si solar cell/EVA/film for lamination, -backsheet PET/EVA/Si solar cell/EVA/film for lamination, -fabric/EVA/Si solar cell/EVA/tempered glass, were investigated taking into consideration type of fabric and lamination process together with the size of solar cells. In investigated devices EVA, it is ethylene-vinyl acetate, while PET - polyethylene terephthalate. Depend on the lamination process and compatibility of textile with solar cell an efficiency of investigated flexible silicon solar cells was in the range of 9.44-16.64 %. Multi folding and unfolding of flexible module has no impact on its efficiency as was detected by Instron equipment. Power (P) of constructed solar module is 30 W, while voltage about 36 V. Finally, solar panel contains five modules with the polyamide fabric and tempered glass will be produced commercially for different applications (dual use).Keywords: flexible devices, mechanical properties, silicon solar cells, textiles
Procedia PDF Downloads 1732840 Passive Attenuation with Multiple Resonator Rings for Musical Instruments Equalization
Authors: Lorenzo Bonoldi, Gianluca Memoli, Abdelhalim Azbaid El Ouahabi
Abstract:
In this paper, a series of ring-shaped attenuators utilizing Helmholtz and quarter wavelength resonators in variable, fixed, and combined configurations have been manufactured using a 3D printer. We illustrate possible uses by incorporating such devices into musical instruments (e.g. in acoustic guitar sound holes) and audio speakers with a view to controlling such devices tonal emissions without electronic equalization systems. Numerical investigations into the transmission loss values of these ring-shaped attenuators using finite element method simulations (COMSOL Multiphysics) have been presented in the frequency range of 100– 1000 Hz. We compare such results for each attenuator model with experimental measurements using different driving sources such as white noise, a maximum-length sequence (MLS), square and sine sweep pulses, and point scans in the frequency domain. Finally, we present a preliminary discussion on the comparison of numerical and experimental results.Keywords: equaliser, metamaterials, musical, instruments
Procedia PDF Downloads 1742839 The SEMONT Monitoring and Risk Assessment of Environmental EMF Pollution
Authors: Dragan Kljajic, Nikola Djuric, Karolina Kasas-Lazetic, Danka Antic
Abstract:
Wireless communications have been expanded very fast in recent decades. This technology relies on an extensive network of base stations and antennas, using radio frequency signals to transmit information. Devices that use wireless communication, while offering various services, basically act as sources of non-ionizing electromagnetic fields (EMF). Such devices are permanently present in the human vicinity and almost constantly radiate, causing EMF pollution of the environment. This fact has initiated development of modern systems for observation of the EMF pollution, as well as for risk assessment. This paper presents the Serbian electromagnetic field monitoring network – SEMONT, designed for automated, remote and continuous broadband monitoring of EMF in the environment. Measurement results of the SEMONT monitoring at one of the test locations, within the main campus of the University of Novi Sad, are presented and discussed, along with corresponding exposure assessment of the general population, regarding the Serbian legislation.Keywords: EMF monitoring, exposure assessment, sensor nodes, wireless network
Procedia PDF Downloads 2642838 A New Mechanical Architecture Design of a Multifunctional Bed for Bedridden Healthcare
Authors: Rogelio Portillo Vélez, Eduardo Vázquez-Santacruz, Mariano Gamboa-Zúñiga
Abstract:
In this paper a new mechanical architecture design of a multi functional robot bed, is presented. The importance of this design relies on the fact that in next years the need of assistive devices development will increase in such way that elderly patients will use this kind of devices. This mechanical design implies following specific mechanisms which attend Mexican hospital requirements. This design is the base of next step of this kind of development given that it shows all technical details of the mechanical systems which are needed in order to construct the bed. This is first hospital bed design which could responds to the Latin America hospital requirements. We have obtained these hospital requirements using our diagnosis methodology [14]. From these results we have designed the mechanical system. This is the mechanical base of the hospital robotic bed which is being developed in our robotics laboratory. It will be useful in different hospital environments for elderly and disabled patients.Keywords: assistive robotics, methodology, feasibility analysis, robotics, operational feasibility, assistive technology, viability analysis matrix, social impact
Procedia PDF Downloads 3972837 Solid Health Care Waste Management Practice in Ethiopia
Authors: Yeshanew Ayele Tiruneh, L. M. Modiba, S. M. Zuma
Abstract:
Introduction- Healthcare waste is any waste generated by health care facilities, considered potentially hazardous to health. Solid health care waste is categorised into infectious and non-infectious wastes. Infectious waste is material suspected to contain pathogens. The non-infectious waste includes wastes that have not been in contact with infectious agents, hazardous chemicals, or radioactive substances. The purpose is to assess solid health care waste (SHCW) management practice toward developing guidelines. The setting is all health facilities found in Hossaena town. A mixed-method study design used. For the qualitative part, small purposeful samples were considered and large samples for the quantitative phase. Both samples were taken from the same population. Result - 17(3.1%) of health facility workers have hand washing facilities. 392 (72.6%) of the participants agree on the availability of one or more of personal protective equipment (PPE) in the facility ‘’the reason for the absence of some of the PPEs like boots, goggles, and shortage of disposable gloves are owing to cost inflation from time to time and sometimes absent from the market’’. The observational finding shows that colour coded waste bins are available at 23 (9.6%) of the rooms. Majority of the sharp container used in the health facility are reusable in the contrary to the health care waste management standards and most of them are plastic buckets and easily cleanable. All of the health facility infectious waste are collected transported and deposed daily. Regarding the preventive vaccination nearly half of the the fahealth facility workers wer vaccinated for Hep B virus. Conclusion- Hand washing facilities, personal protective equipment’s and preventive vaccinations are not easily available for health workers. Solid waste segregation practices are poor and these practices showed that SWMP is below the acceptable level.Keywords: health care waste, waste management, disposal, private health facilities
Procedia PDF Downloads 722836 Study on Comparison Between Acoustic Emission Behavior and Strain on Concrete Surface During Rebar Corrosion in Reinforced Concrete
Authors: Ejazulhaq Rahimi
Abstract:
The development of techniques evaluating deterioration on concrete structures is vital for structural health monitoring (SHM). One of the main reasons for reinforced concrete structure's deterioration is the corroding of embedded rebars. It is a natural process that begins when the rebar starts to rust. It occurs when the protective layer on the rebar is destroyed. The rebar in concrete is usually protected against corrosion by the high pH of the surrounding cement paste. However, there are chemicals that can destroy the protective layer, making it susceptible to corrosion. It is very destructive for the lifespan and durability of the concrete structure. Corrosion products which are 3 to 6 times voluminous than the rebar stress its surrounding concrete and lead to fracture as cracks even peeling off the cover concrete over the rebar. As is clear that concrete shows limit elastic behavior in its stress strain property, so corrosion product stresses can be detected as strains from the concrete surface. It means that surface strains have a relation with the situation and amount of corrosion products and related concrete fractures inside reinforced concrete. In this paper, a comparative study of surface strains due to corrosion products detected by strain gauges and acoustic emission (AE) testing under periodic accelerated corrosion in the salty environment with 3% NaCl is reported. From the results, three different stages of strains were clearly observed based on the type and rate of strains in each corrosion situation and related fracture types. AE parameters which mostly are related to fracture and their shapes, describe the same phases. It is confirmed that there is a great agreement to the result of each other and describes three phases as generation and expansion of corrosion products and initiation and propagation of corrosion-induced cracks, and surface cracks. In addition, the strain on the concrete surface was rapidly increased before the cracks arrived at the surface of the concrete.Keywords: acoustic emission, monitoring, rebar corrosion, reinforced concrete, strain
Procedia PDF Downloads 1802835 Secure Mobile E-Business Applications
Authors: Hala A. Alrumaih
Abstract:
It is widely believed that mobile device is a promising technology for lending the opportunity for the third wave of electronic commerce. Mobile devices have changed the way companies do business. Many applications are under development or being incorporated into business processes. In this day, mobile applications are a vital component of any industry strategy. One of the greatest benefits of selling merchandise and providing services on a mobile application is that it widens a company’s customer base significantly. Mobile applications are accessible to interested customers across regional and international borders in different electronic business (e-business) area. But there is a dark side to this success story. The security risks associated with mobile devices and applications are very significant. This paper introduces a broad risk analysis for the various threats, vulnerabilities, and risks in mobile e-business applications and presents some important risk mitigation approaches. It reviews and compares two different frameworks for security assurance in mobile e-business applications. Based on the comparison, the paper suggests some recommendations for applications developers and business owners in mobile e-business application development process.Keywords: e-business, mobile applications, risk mitigations, security assurance
Procedia PDF Downloads 2952834 Data Poisoning Attacks on Federated Learning and Preventive Measures
Authors: Beulah Rani Inbanathan
Abstract:
In the present era, it is vivid from the numerous outcomes that data privacy is being compromised in various ways. Machine learning is one technology that uses the centralized server, and then data is given as input which is being analyzed by the algorithms present on this mentioned server, and hence outputs are predicted. However, each time the data must be sent by the user as the algorithm will analyze the input data in order to predict the output, which is prone to threats. The solution to overcome this issue is federated learning, where the models alone get updated while the data resides on the local machine and does not get exchanged with the other local models. Nevertheless, even on these local models, there are chances of data poisoning, and it is crystal clear from various experiments done by many people. This paper delves into many ways where data poisoning occurs and the many methods through which it is prevalent that data poisoning still exists. It includes the poisoning attacks on IoT devices, Edge devices, Autoregressive model, and also, on Industrial IoT systems and also, few points on how these could be evadible in order to protect our data which is personal, or sensitive, or harmful when exposed.Keywords: data poisoning, federated learning, Internet of Things, edge computing
Procedia PDF Downloads 872833 Survey on Malware Detection
Authors: Doaa Wael, Naswa Abdelbaky
Abstract:
Malware is malicious software that is built to cause destructive actions and damage information systems and networks. Malware infections increase rapidly, and types of malware have become more sophisticated, which makes the malware detection process more difficult. On the other side, the Internet of Things IoT technology is vulnerable to malware attacks. These IoT devices are always connected to the internet and lack security. This makes them easy for hackers to access. These malware attacks are becoming the go-to attack for hackers. Thus, in order to deal with this challenge, new malware detection techniques are needed. Currently, building a blockchain solution that allows IoT devices to download any file from the internet and to verify/approve whether it is malicious or not is the need of the hour. In recent years, blockchain technology has stood as a solution to everything due to its features like decentralization, persistence, and anonymity. Moreover, using blockchain technology overcomes some difficulties in malware detection and improves the malware detection ratio over-than the techniques that do not utilize blockchain technology. In this paper, we study malware detection models which are based on blockchain technology. Furthermore, we elaborate on the effect of blockchain technology in malware detection, especially in the android environment.Keywords: malware analysis, blockchain, malware attacks, malware detection approaches
Procedia PDF Downloads 872832 Adjustable Counter-Weight for Full Turn Rotary Systems
Authors: G. Karakaya, C. Türker, M. Anaklı
Abstract:
It is necessary to test to see if optical devices such as camera, night vision devices are working properly. Therefore, a precision biaxial rotary system (gimbal) is required for mounting Unit Under Test, UUT. The Gimbal systems can be utilized for precise positioning of the UUT; hence, optical test can be performed with high accuracy. The weight of UUT, which is placed outside the axis of rotation, causes an off-axis moment to the mounting armature. The off-axis moment can act against the direction of movement for some orientation, thus the electrical motor, which rotates the gimbal axis, has to apply higher level of torque to guide and stabilize the system. Moreover, UUT and its mounting fixture to the gimbal can be changed, which causes change in applied resistance moment to the gimbals electrical motor. In this study, a preloaded spring is added to the gimbal system for minimizing applied off axis moment with the help of four bar mechanism. Two different possible methods for preloading spring are introduced and system optimization is performed to eliminate all moment which is created by off axis weight.Keywords: adaptive, balancing, gimbal, mechanics, spring
Procedia PDF Downloads 1212831 Lean Comic GAN (LC-GAN): a Light-Weight GAN Architecture Leveraging Factorized Convolution and Teacher Forcing Distillation Style Loss Aimed to Capture Two Dimensional Animated Filtered Still Shots Using Mobile Phone Camera and Edge Devices
Authors: Kaustav Mukherjee
Abstract:
In this paper we propose a Neural Style Transfer solution whereby we have created a Lightweight Separable Convolution Kernel Based GAN Architecture (SC-GAN) which will very useful for designing filter for Mobile Phone Cameras and also Edge Devices which will convert any image to its 2D ANIMATED COMIC STYLE Movies like HEMAN, SUPERMAN, JUNGLE-BOOK. This will help the 2D animation artist by relieving to create new characters from real life person's images without having to go for endless hours of manual labour drawing each and every pose of a cartoon. It can even be used to create scenes from real life images.This will reduce a huge amount of turn around time to make 2D animated movies and decrease cost in terms of manpower and time. In addition to that being extreme light-weight it can be used as camera filters capable of taking Comic Style Shots using mobile phone camera or edge device cameras like Raspberry Pi 4,NVIDIA Jetson NANO etc. Existing Methods like CartoonGAN with the model size close to 170 MB is too heavy weight for mobile phones and edge devices due to their scarcity in resources. Compared to the current state of the art our proposed method which has a total model size of 31 MB which clearly makes it ideal and ultra-efficient for designing of camera filters on low resource devices like mobile phones, tablets and edge devices running OS or RTOS. .Owing to use of high resolution input and usage of bigger convolution kernel size it produces richer resolution Comic-Style Pictures implementation with 6 times lesser number of parameters and with just 25 extra epoch trained on a dataset of less than 1000 which breaks the myth that all GAN need mammoth amount of data. Our network reduces the density of the Gan architecture by using Depthwise Separable Convolution which does the convolution operation on each of the RGB channels separately then we use a Point-Wise Convolution to bring back the network into required channel number using 1 by 1 kernel.This reduces the number of parameters substantially and makes it extreme light-weight and suitable for mobile phones and edge devices. The architecture mentioned in the present paper make use of Parameterised Batch Normalization Goodfellow etc al. (Deep Learning OPTIMIZATION FOR TRAINING DEEP MODELS page 320) which makes the network to use the advantage of Batch Norm for easier training while maintaining the non-linear feature capture by inducing the learnable parametersKeywords: comic stylisation from camera image using GAN, creating 2D animated movie style custom stickers from images, depth-wise separable convolutional neural network for light-weight GAN architecture for EDGE devices, GAN architecture for 2D animated cartoonizing neural style, neural style transfer for edge, model distilation, perceptual loss
Procedia PDF Downloads 1322830 Localization of Near Field Radio Controlled Unintended Emitting Sources
Authors: Nurbanu Guzey, S. Jagannathan
Abstract:
Locating radio controlled (RC) devices using their unintended emissions has a great interest considering security concerns. Weak nature of these emissions requires near field localization approach since it is hard to detect these signals in far field region of array. Instead of only angle estimation, near field localization also requires range estimation of the source which makes this method more complicated than far field models. Challenges of locating such devices in a near field region and real time environment are analyzed in this paper. An ESPRIT like near field localization scheme is utilized for both angle and range estimation. 1-D search with symmetric subarrays is provided. Two 7 element uniform linear antenna arrays (ULA) are employed for locating RC source. Experiment results of location estimation for one unintended emitting walkie-talkie for different positions are given.Keywords: localization, angle of arrival (AoA), range estimation, array signal processing, ESPRIT, Uniform Linear Array (ULA)
Procedia PDF Downloads 5262829 Preliminary Assessment for Protective Effect of Rhodiola rosea in Chemically Induced Ulcerative Colitis
Authors: Santram Lodhi, Alok Pal Jain, Awesh K. Yadav, Gopal Rai
Abstract:
Rhodiola rosea L. (Crassulaceae) is commonly known as golden root or rose root. It is a perennial herbaceous plant and most investigated species of the genus Rhodiola. Rhodiola rosea contains flavonoids, terpenoids, phenylpropanoid glycosides and phenylethanol derivatives in the roots of the plant. The objective of present study was to investigate the protective effect of hydroalcoholic extract from Rhodiola rosea roots in DSS induced colitis in mice. The ulcerative colitis was induced by DSS (3%, w/v) in mice and estimated weight loss and stool consistency. Various parameters including Colon length, spleen weights and ulcer index were also measured. The histological observations were observed by H&E staining. Effect of hydroalcoholic extract on various antioxidant parameter of rat colon such as tissue myeloperoxidase (MPO), reduced GSH, SOD concentrations and lipid peroxidation were determined. Pro-inflammatory mediators, such as tumour necrosis factor-α (TNF-α) and nitric oxide (NO) were determined by ELISA. In DSS induced group, mice body weight decreased gradually as compared to the control group. Redness and edema were observed in the colons intensely and scores representing inflammation in this group. The extract treated showed with tissue levels of TNF-α, IL-6 and MPO activity were significantly (p<0.05) increased. The mice treated with higher doses of hydroalcoholic extract (300 mg/kg) significantly reduced the activity compared with standard drug sulfasalazine (100 mg/kg. B.wt). Conclusion: Results of this study were suggested that the efficacy of hydroalcoholic extract, especially at the higher dose, was similar to that of standard drug, which concerned its potential application as a natural medicine for the treatment of ulcerative colitis.Keywords: phenylpropanoid, Rhodiola rosea, sulfasalazin, ulcerative colitis
Procedia PDF Downloads 2442828 Simulation of Stretching and Fragmenting DNA by Microfluidic for Optimizing Microfluidic Devices
Authors: Shuyi Wu, Chuang Li, Quanshui Zheng, Luping Xu
Abstract:
Stretching and snipping DNA molecule by microfluidic has important application value in gene analysis by lab on a chip. Movement, deformation and fragmenting of DNA in microfluidic are typical fluid-solid coupling problems. An efficient and common simulation system for researching the movement, deformation and fragmenting of DNA by microfluidic has not been well developed. In our study, Brownian dynamics-finite element method (BD-FEM) is used to simulate the dynamic process of stretching and fragmenting DNA by contraction flow. The shape and parameters of micro-channels are changed to optimize the stretching and fragmenting properties of DNA. Our results indicate that strain rate, resulting from contraction microchannel, is the main control parameter for stretching and fragmenting DNA. There is good consistency between the simulation data and previous experimental result about the single DNA molecule behavior and averaged fragmenting properties in this study. BD-FEM method is an efficient calculating tool to research stretching and fragmenting behavior of single DNA molecule and optimize microfluidic devices for manipulating, stretching and fragmenting DNA.Keywords: fragmenting, DNA, microfluidic, optimize.
Procedia PDF Downloads 3282827 Protective Effect of Vitamin D on Cardiac Apoptosis in Obese Rats
Authors: Kadeejah Alsolami, Zainab Alrefay, Husaam Awad
Abstract:
Obesity and vitamin D deficiency have both been related to cardiovascular disease. The present work aimed to investigate the possible protective effect of vitamin D on cardiac apoptosis in a rat model of dietary-induced obesity. Methods: 30 male Wistar rats included in this study. They were allocated into 4 groups: Control (n=5), animal were fed standard diet for 3 months: Control + vitamin D (VD) (n=5),animals were fed a standard diet with 400IU VD/kg for 3 months: hypercaloric diets group (n=10), animals were fed a high fat diet for 3 months: hypercaloric diet with VD group (n=10), animals were fed a high fat diet with 400IU VD/kg for 3 months. At the beginning of the experiment, the weight and length were measured to assess body mass index (BMI) and repeated every 45 days. Food intake and body weight were monitored throughout the study period. Then rats were sacrificed and heart tissues collected for Quantitative Real-time polymerase chain reaction (qRT-PCR). qRT-PCR used to detect different genetic markers of apoptosis (anti-apoptotic gene (BCL2), a pro-apoptotic gene(BAX), pro-apoptotic genes (FAS, FAS-L), tumour necrosis factor (TNF), mitogen-activated protein kinases (MAPK). Results: FAS and FAS-L gene expression were significantly upregulated in rats fed with high fat diet. And FAS-L gene expression was significantly upregulated in all groups on comparison with control. Whereas Bax gene expression was significantly downregulated in rats fed with high-fat diet supplied with vitamin D. TNF was significantly upregulated in rats fed with high-fat diet treated with vitamin D. MAPK was significantly upregulated in rats fed with high fat diet group, and in rats fed with high-fat diet supplied with vitamin D. Conclusion: The cardiac apoptotic pathways were more activated in rats fed with high-fat than lean rats. And vitamin D protect the heart from the cardiac mitochondrial-dependent apoptotic pathway.Keywords: apoptosis, heart, obesity, Vitamin D
Procedia PDF Downloads 2112826 Distributed Framework for Pothole Detection and Monitoring Using Federated Learning
Authors: Ezil Sam Leni, Shalen S.
Abstract:
Transport service monitoring and upkeep are essential components of smart city initiatives. The main risks to the relevant departments and authorities are the ever-increasing vehicular traffic and the conditions of the roads. In India, the economy is greatly impacted by the road transport sector. In 2021, the Ministry of Road Transport and Highways Transport, Government of India, produced a report with statistical data on traffic accidents. The data included the number of fatalities, injuries, and other pertinent criteria. This study proposes a distributed infrastructure for the monitoring, detection, and reporting of potholes to the appropriate authorities. In a distributed environment, the nodes are the edge devices, and local edge servers, and global servers. The edge devices receive the initial model to be employed from the global server. The YOLOv8 model for pothole detection is used in the edge devices. The edge devices run the pothole detection model, gather the pothole images on their path, and send the updates to the nearby edge server. The local edge server selects the clients for its aggregation process, aggregates the model updates and sends the updates to the global server. The global server collects the updates from the local edge servers, performs aggregation and derives the updated model. The updated model has the information about the potholes received from the local edge servers and notifies the updates to the local edge servers and concerned authorities for monitoring and maintenance of road conditions. The entire process is implemented in FedCV distributed environment with the implementation using the client-server model and aggregation entities. After choosing the clients for its aggregation process, the local edge server gathers the model updates and transmits them to the global server. After gathering the updates from the regional edge servers, the global server aggregates them and creates the updated model. Performance indicators and the experimentation environment are assessed, discussed, and presented. Accelerometer data may be taken into consideration for improved performance in the future development of this study, in addition to the images captured from the transportation routes.Keywords: federated Learning, pothole detection, distributed framework, federated averaging
Procedia PDF Downloads 1032825 Estimation of Hysteretic Damping in Steel Dual Systems with Buckling Restrained Brace and Moment Resisting Frame
Authors: Seyed Saeid Tabaee, Omid Bahar
Abstract:
Nowadays, using energy dissipation devices has been commonly used in structures. A high rate of energy absorption during earthquakes is the benefit of using such devices, which results in damage reduction of structural elements specifically columns. The hysteretic damping capacity of energy dissipation devices is the key point that it may adversely complicate analysis and design of such structures. This effect may be generally represented by equivalent viscous damping. The equivalent viscous damping may be obtained from the expected hysteretic behavior under the design or maximum considered displacement of a structure. In this paper, the hysteretic damping coefficient of a steel moment resisting frame (MRF), which its performance is enhanced by a buckling restrained brace (BRB) system has been evaluated. Having the foresight of damping fraction between BRB and MRF is inevitable for seismic design procedures like Direct Displacement-Based Design (DDBD) method. This paper presents an approach to calculate the damping fraction for such systems by carrying out the dynamic nonlinear time history analysis (NTHA) under harmonic loading, which is tuned to the natural frequency of the system. Two steel moment frame structures, one equipped with BRB, and the other without BRB are simultaneously studied. The extensive analysis shows that proportion of each system damping fraction may be calculated by its shear story portion. In this way, the contribution of each BRB in the floors and their general contribution in the structural performance may be clearly recognized, in advance.Keywords: buckling restrained brace, direct displacement based design, dual systems, hysteretic damping, moment resisting frames
Procedia PDF Downloads 4342824 One Step Further: Pull-Process-Push Data Processing
Authors: Romeo Botes, Imelda Smit
Abstract:
In today’s modern age of technology vast amounts of data needs to be processed in real-time to keep users satisfied. This data comes from various sources and in many formats, including electronic and mobile devices such as GPRS modems and GPS devices. They make use of different protocols including TCP, UDP, and HTTP/s for data communication to web servers and eventually to users. The data obtained from these devices may provide valuable information to users, but are mostly in an unreadable format which needs to be processed to provide information and business intelligence. This data is not always current, it is mostly historical data. The data is not subject to implementation of consistency and redundancy measures as most other data usually is. Most important to the users is that the data are to be pre-processed in a readable format when it is entered into the database. To accomplish this, programmers build processing programs and scripts to decode and process the information stored in databases. Programmers make use of various techniques in such programs to accomplish this, but sometimes neglect the effect some of these techniques may have on database performance. One of the techniques generally used,is to pull data from the database server, process it and push it back to the database server in one single step. Since the processing of the data usually takes some time, it keeps the database busy and locked for the period of time that the processing takes place. Because of this, it decreases the overall performance of the database server and therefore the system’s performance. This paper follows on a paper discussing the performance increase that may be achieved by utilizing array lists along with a pull-process-push data processing technique split in three steps. The purpose of this paper is to expand the number of clients when comparing the two techniques to establish the impact it may have on performance of the CPU storage and processing time.Keywords: performance measures, algorithm techniques, data processing, push data, process data, array list
Procedia PDF Downloads 2442823 Proactive WPA/WPA2 Security Using DD-WRT Firmware
Authors: Mustafa Kamoona, Mohamed El-Sharkawy
Abstract:
Although the latest Wireless Local Area Network technology Wi-Fi 802.11i standard addresses many of the security weaknesses of the antecedent Wired Equivalent Privacy (WEP) protocol, there are still scenarios where the network security are still vulnerable. The first security model that 802.11i offers is the Personal model which is very cheap and simple to install and maintain, yet it uses a Pre Shared Key (PSK) and thus has a low to medium security level. The second model that 802.11i provide is the Enterprise model which is highly secured but much more expensive and difficult to install/maintain and requires the installation and maintenance of an authentication server that will handle the authentication and key management for the wireless network. A central issue with the personal model is that the PSK needs to be shared with all the devices that are connected to the specific Wi-Fi network. This pre-shared key, unless changed regularly, can be cracked using offline dictionary attacks within a matter of hours. The key is burdensome to change in all the connected devices manually unless there is some kind of algorithm that coordinate this PSK update. The key idea of this paper is to propose a new algorithm that proactively and effectively coordinates the pre-shared key generation, management, and distribution in the cheap WPA/WPA2 personal security model using only a DD-WRT router.Keywords: Wi-Fi, WPS, TLS, DD-WRT
Procedia PDF Downloads 2332822 White Light Emitting Carbon Dots- Surface Modification of Carbon Dots Using Auxochromes
Authors: Manasa Perikala, Asha Bhardwaj
Abstract:
Fluorescent carbon dots (CDs), a young member of Carbon nanomaterial family, has gained a lot of research attention across the globe due to its highly luminescent emission properties, non-toxic behavior, stable emission properties, and zero re-absorption lose. These dots have the potential to replace the use of traditional semiconductor quantum dots in light-emitting devices (LED’s, fiber lasers) and other photonic devices (temperature sensor, UV detector). However, One major drawback of Carbon dots is that, till date, the actual mechanism of photoluminescence (PL) in carbon dots is still an open topic of discussion among various researchers across the globe. PL mechanism of CDs based on wide particle size distribution, the effect of surface groups, hybridization in carbon, and charge transfer mechanisms have been proposed. Although these mechanisms explain PL of CDs to an extent, no universally accepted mechanism to explain complete PL behavior of these dots is put forth. In our work, we report parameters affecting the size and surface of CDs, such as time of the reaction, synthesis temperature and concentration of precursors and their effects on the optical properties of the carbon dots. The effect of auxochromes on the emission properties and re-modification of carbon surface using an external surface functionalizing agent is discussed in detail. All the explanations have been supported by UV-Visible absorption, emission spectroscopies, Fourier transform infrared spectroscopy and Transmission electron microscopy and X-Ray diffraction techniques. Once the origin of PL in CDs is understood, parameters affecting PL centers can be modified to tailor the optical properties of these dots, which can enhance their applications in the fabrication of LED’s and other photonic devices out of these carbon dots.Keywords: carbon dots, photoluminescence, size effects on emission in CDs, surface modification of carbon dots
Procedia PDF Downloads 1352821 Botnet Detection with ML Techniques by Using the BoT-IoT Dataset
Authors: Adnan Baig, Ishteeaq Naeem, Saad Mansoor
Abstract:
The Internet of Things (IoT) gadgets have advanced quickly in recent years, and their use is steadily rising daily. However, cyber-attackers can target these gadgets due to their distributed nature. Additionally, many IoT devices have significant security flaws in their implementation and design, making them vulnerable to security threats. Hence, these threats can cause important data security and privacy loss from a single attack on network devices or systems. Botnets are a significant security risk that can harm the IoT network; hence, sophisticated techniques are required to mitigate the risk. This work uses a machine learning-based method to identify IoT orchestrated by botnets. The proposed technique identifies the net attack by distinguishing between legitimate and malicious traffic. This article proposes a hyperparameter tuning model to improvise the method to improve the accuracy of existing processes. The results demonstrated an improved and more accurate indication of botnet-based cyber-attacks.Keywords: Internet of Things, Botnet, BoT-IoT dataset, ML techniques
Procedia PDF Downloads 112820 Social Affiliation Effects of Technology in 2022
Authors: Johanna Goeß
Abstract:
In this field study, it is hypothesised that affiliation motivation is relevant to dark terminal technology readiness. The theoretical basis for this work was the TAM 2, focusing on the social process variables and the short-scale technology readiness. Two hypotheses to be tested are the focus of consideration: H1: The TAM constructs are independently positively related to dark device use. H2: Sense of social belonging is positively related to dark device use. In this quantitative study, 30 male subjects participated with their dark devices. Using a post-basket exercise, affiliation is manipulated by content items on the website to investigate whether affiliation between computers and people and smartphones and people leads to similar effects as an affiliation between people. The entire scientific study, including the questionnaire, took about 30 minutes. This study contributes to the current literature and draws attention to the fact that male users' terminal devices have an influence in the form of affiliation effects.Keywords: human-computer-interaction, computers, smartphones, addiction, social affiliation effects, TAM 2, pyramid of needs, social actors
Procedia PDF Downloads 1172819 A Pervasive System Architecture for Smart Environments in Internet of Things Context
Authors: Patrick Santos, João Casal, João Santos Luis Varandas, Tiago Alves, Carlos Romeiro, Sérgio Lourenço
Abstract:
Nowadays, technology makes it possible to, in one hand, communicate with various objects of the daily life through the Internet, and in the other, put these objects interacting with each other through this channel. Simultaneously, with the raise of smartphones as the most ubiquitous technology on persons lives, emerge new agents for these devices - Intelligent Personal Assistants. These agents have the goal of helping the user manage and organize his information as well as supporting the user in his/her day-to-day tasks. Moreover, other emergent concept is the Cloud Computing, which allows computation and storage to get out of the users devices, bringing benefits in terms of performance, security, interoperability and others. Connecting these three paradigms, in this work we propose an architecture for an intelligent system which provides an interface that assists the user on smart environments, informing, suggesting actions and allowing to manage the objects of his/her daily life.Keywords: internet of things, cloud, intelligent personal assistant, architecture
Procedia PDF Downloads 5142818 Learning through Gaming with Mobile Devices
Authors: Luis Rodrigo Valencia Pérez, Juan Manuel Peña Aguilar, Adelina Morita Alexander, Alberto Lamadrid Alvarez, Héctor Fernando Valencia Pérez
Abstract:
Financial education is among the areas of opportunity in the Spanish-speaking from an early age to high school, through mobile devices such as cell phones and tablets using ludic and fun applications like interactive games, children can learn money management and investment through time, thereby fostering the habit of saving and/or sound management of cash and family business resources, having interaction with an uncontrolled environment such as the involvement of other players in the external decisions of the environment in which the game is play. The application proposed in Phase 1 (design and development) was designed in multi-user environments, under methodologies of hybrid programming for any platform on the market and designed under CMMI standards that allow for quality production over time, following up on these improvements counting with continuous user feedback and usage statistics.Keywords: mobile educational games, ludic games, children, multiuser, design and software development
Procedia PDF Downloads 3822817 Optimum Parameter of a Viscous Damper for Seismic and Wind Vibration
Authors: Soltani Amir, Hu Jiaxin
Abstract:
Determination of optimal parameters of a passive control system device is the primary objective of this study. Expanding upon the use of control devices in wind and earthquake hazard reduction has led to development of various control systems. The advantage of non-linearity characteristics in a passive control device and the optimal control method using LQR algorithm are explained in this study. Finally, this paper introduces a simple approach to determine optimum parameters of a nonlinear viscous damper for vibration control of structures. A MATLAB program is used to produce the dynamic motion of the structure considering the stiffness matrix of the SDOF frame and the non-linear damping effect. This study concluded that the proposed system (variable damping system) has better performance in system response control than a linear damping system. Also, according to the energy dissipation graph, the total energy loss is greater in non-linear damping system than other systems.Keywords: passive control system, damping devices, viscous dampers, control algorithm
Procedia PDF Downloads 4702816 Determining the Threshold for Protective Effects of Aerobic Exercise on Aortic Structure in a Mouse Model of Marfan Syndrome Associated Aortic Aneurysm
Authors: Christine P. Gibson, Ramona Alex, Michael Farney, Johana Vallejo-Elias, Mitra Esfandiarei
Abstract:
Aortic aneurysm is the leading cause of death in Marfan syndrome (MFS), a connective tissue disorder caused by mutations in fibrillin-1 gene (FBN1). MFS aneurysm is characterized by weakening of the aortic wall due to elastin fibers fragmentation and disorganization. The above-average height and distinct physical features make young adults with MFS desirable candidates for competitive sports; but little is known about the exercise limit at which they will be at risk for aortic rupture. On the other hand, aerobic cardiovascular exercise has been shown to have protective effects on the heart and aorta. We have previously reported that mild aerobic exercise can delay the formation of aortic aneurysm in a mouse model of MFS. In this study, we aimed to investigate the effects of various levels of exercise intensity on the progression of aortic aneurysm in the mouse model. Starting at 4 weeks of age, we subjected control and MFS mice to different levels of exercise intensity (8m/min, 10m/min, 15m/min, and 20m/min, corresponding to 55%, 65%, 75%, and 85% of VO2 max, respectively) on a treadmill for 30 minutes per day, five days a week for the duration of the study. At 24 weeks of age, aortic tissue were isolated and subjected to structural and functional studies using histology and wire myography in order to evaluate the effects of different exercise routines on elastin fragmentation and organization and aortic wall elasticity/stiffness. Our data shows that exercise training at the intensity levels between 55%-75% significantly reduces elastin fragmentation and disorganization, with less recovery observed in 85% MFS group. The reversibility of elasticity was also significantly restored in MFS mice subjected to 55%-75% intensity; however, the recovery was less pronounced in MFS mice subjected to 85% intensity. Furthermore, our data shows that smooth muscle cells (SMCs) contractilion in response to vasoconstrictor agent phenylephrine (100nM) is significantly reduced in MFS aorta (54.84 ± 1.63 mN/mm2) as compared to control (95.85 ± 3.04 mN/mm2). At 55% of intensity, exercise did not rescue SMCs contraction (63.45 ± 1.70 mN/mm2), while at higher intensity levels, SMCs contraction in response to phenylephrine was restored to levels similar to control aorta [65% (81.88 ± 4.57 mN/mm2), 75% (86.22 ± 3.84 mN/mm2), and 85% (83.91 ± 5.42 mN/mm2)]. This study provides the first time evidence that high intensity exercise (e.g. 85%) may not provide the most beneficial effects on aortic function (vasoconstriction) and structure (elastin fragmentation, aortic wall elasticity) during the progression of aortic aneurysm in MFS mice. On the other hand, based on our observations, medium intensity exercise (e.g. 65%) seems to provide the utmost protective effects on aortic structure and function in MFS mice. These findings provide new insights into the potential capacity, in which MFS patients could participate in various aerobic exercise routines, especially in young adults affected by cardiovascular complications particularly aortic aneurysm. This work was funded by Midwestern University Research Fund.Keywords: aerobic exercise, aortic aneurysm, aortic wall elasticity, elastin fragmentation, Marfan syndrome
Procedia PDF Downloads 3812815 An Efficient Mitigation Plan to Encounter Various Vulnerabilities in Internet of Things Enterprises
Authors: Umesh Kumar Singh, Abhishek Raghuvanshi, Suyash Kumar Singh
Abstract:
As IoT networks gain popularity, they are more susceptible to security breaches. As a result, it is crucial to analyze the IoT platform as a whole from the standpoint of core security concepts. The Internet of Things relies heavily on wireless networks, which are well-known for being susceptible to a wide variety of attacks. This article provides an analysis of many techniques that may be used to identify vulnerabilities in the software and hardware associated with the Internet of Things (IoT). In the current investigation, an experimental setup is built with the assistance of server computers, client PCs, Internet of Things development boards, sensors, and cloud subscriptions. Through the use of network host scanning methods and vulnerability scanning tools, raw data relating to IoT-based applications and devices may be collected. Shodan is a tool that is used for scanning, and it is also used for effective vulnerability discovery in IoT devices as well as penetration testing. This article presents an efficient mitigation plan for encountering vulnerabilities in the Internet of Things.Keywords: internet of things, security, privacy, vulnerability identification, mitigation plan
Procedia PDF Downloads 402814 Improving Research Collaborations in Medical Device Development in Korea from an SMEs’ Perspective
Authors: Yoon Chung Kim
Abstract:
In this coming aging society, medical device industry is expected to become one of the major industries. Since developing medical devices usually requires technology convergence, research collaboration is important, especially for some small and medium enterprises (SMEs) that do not have enough R&D resources in each related field. Collaboration in medical device development has some unique properties. Since it requires convergence technology, collaboration with different fields, and different types of people are often required. Since it requires clinical test, the development process usually takes longer and collaboration with hospitals is also required. However, despite these importance and uniqueness, collaboration in medical device development has not yet been widely studied. Thus, our research focuses on investigating collaborations in medical device development. For our research, we conducted surveys and interviews, especially with SMEs’ perspective in Korea. The result and discussion will be presented with a major impact factors for collaboration result, as well as future strategies that will improve and strengthen collaboration process in medical devices.Keywords: medical device, SME, research collaboration, development, clinical
Procedia PDF Downloads 329