Search results for: node points
2375 Need for a National Newborn Screening Programme in India: Pilot Study Data
Authors: Sudheer Moorkoth, Leslie Edward Lewis, Pragna Rao
Abstract:
Newborn screening (NBS) is a part of routine newborn care in many countries worldwide to detect early any rare treatable conditions and inborn errors of metabolism (IEM). India has not started this program yet. In an attempt to understand the challenges in implementing a national newborn screening program in India, we initiated a pilot newborn screening project funded by the Government of Canada. Along with initiating the newborn screening at Kasturba Hospital, Manipal in South India, for screening six disorders (Congenital Hypothyroidism(CH), Congenital Adrenal Hyperplasia (CAH), Galactosemia, Biotinidase deficiency, Glucose-6-Phosphate Dehydrogenase deficiency (G-6PD) and Phenylketonurea), we also studied the awareness of various stakeholders on the newborn screening. In a period of nine months from August 2017 to March 2018 we could screen 1915 newborns (999 male and 916 female). The result showed that there were seven babies screened positive. This interim result points to an incidence rate of 1 in 270 children for these rare disorders collectively. This includes three confirmed cases of CH, two cases of G-6PD deficiency, and one case each for Galctosemia and CAH. A questionnaire based study to understand the awareness among various stakeholders revealed that there is little awareness among parents, adolescents and anganwadi workers (public health worker). The interim data points to the need for a national newborn screening programme in India. There is also an immediate need to undertake large-scale awareness programme to create knowledge on NBS among the various stakeholders.Keywords: awareness, inborn errors of metabolism (IEM), newborn screening, rare disease
Procedia PDF Downloads 2492374 The Applications of Four Fingers Theory: The Proof of 66 Acupoints under the Human Elbow and Knee
Authors: Chih-I. Tsai, Yu-Chien. Lin
Abstract:
Through experiences of clinical practices, it is discovered that locations on the body at a level of four fingerbreadth above and below the joints are the points at which muscles connect to tendons, and since the muscles and tendons possess opposite characteristics, muscles are full of blood but lack qi, while tendons are full of qi but lack blood, these points on our body become easily blocked. It is proposed that through doing acupuncture or creating localized pressure to the areas four fingerbreadths above and below our joints, with an elastic bandage, we could help the energy, also known as qi, to flow smoothly in our body and further improve our health. Based on the Four Fingers Theory, we understand that human height is 22 four fingerbreadths. In addition, qi and blood travel through 24 meridians, 50 times each day, and they flow through 6 cun with every human breath. We can also understand the average number of human heartbeats is 75 times per minute. And the function of qi-blood circulation system in Traditional Chinese Medicine is the same as the blood circulation in Western Medical Science. Informed by Four Fingers Theory, this study further examined its applications in acupuncture practices. The research question is how Four Fingers Theory proves what has been mentioned in Nei Jing that there are 66 acupoints under a human’s elbow and knee. In responding to the research question, there are 66 acupoints under a human’s elbow and knee. Four Fingers Theory facilitated the creation of the acupuncture naming and teaching system. It is expected to serve as an approachable and effective way to deliver knowledge of acupuncture to the public worldwide.Keywords: four fingers theory, meridians circulation, 66 acupoints under human elbow and knee, acupuncture
Procedia PDF Downloads 2962373 A Case Study on Effectiveness of Hijamah (Wet Cupping) on Numbness of Foot in Diabetic Patient
Authors: Nafdha Thajudeen
Abstract:
Hijamah therapy is one of the leading alternative & complementary modalities in the World. It is a kind of detoxification, rejuvenation, and blood purification method. It comes under Ilaj bil Tadbeer (Regimental therapy) in the Unani medical system. In diabetes, hands and foot care in people is very important because of slow blood circulation, where blood sometimes is not able to fully penetrate the capillaries. Hijamah therapy works upon the following two principles- Tanqiyae Mawad (Evacuation of morbid humor) and Imalae Mawad (Diversion of humor). The aim of this study was to find out the effectiveness of hijamah therapy on the numbness of legs in a diabetic patient. This case study was carried out in Ayurvedic Research Hospital (Non-Communicable Diseases), Ninthavur, Sri Lanka. A 63 years old female diabetic patient came to the clinic with the complain of numbness in both feet for one year. The treatment history of the patient revealed that she had taken western medicine for her complaints for 7 months. In her first visit, wet cupping was done on local and distal points. The patient said there was a remarkable improvement; internal medicines were given to keep the sugar level in normal with some external applications. Every week, wet cupping was done on the same points, with repeating the same medicines. Foot numbness was fully cured within one month. The finding of this study shows that the complaint of numbness in the diabetic patient was treated with hijamah therapy with internal & external medicine. This case study can be concluded as hijamah therapy is very effective in treating diabetic numbness. This single case study may be the entrance for future clinical studiesKeywords: Hijamah therapy, Ilaj bil thadbeer, diabetes, numbness
Procedia PDF Downloads 1382372 The Study of Self-Management of Stress (SMS) of Yoga Program for Pregnant Women in Early Pregnancy in Taiwan
Authors: Shau-Ping Shiu, Shu-Ling Lin
Abstract:
Pregnancy lead a process of changing in the endocrine system. Either pregnancy itself or the surrounding affect such as the attitude of family to the pregnant lady can bring lots of stress. Sever stress may lead pregnant women display serious mental problem such as mood swings, impulsivity, and abnormal behavior. A method of self management of stress(SMS) has been proved that help patient of cancer in release their stress. This study were going to use SMS to help pregnant women. Methods: In this study, 42 ladies in the first to third months of pregnancy process applied to join SMS of program have divided into 21 participants in both control and experimental group by draw. 24 sessions of Yoga program were conducted once a week for 6 months for experimental group. Verbatim used to gather more feedbacks from the interview followed by each Yoga sessions. Brief symptom Rating scale also conducted pre and post experiment for 42 participations. Results: Overall score of Brief Symptom Rating Scale reduced 17.82 points and suicide drop 9 points in experimental group, compared to the control group increasing 10.24 point of overall score and suicide add 7 points. Feedback from interviews showed participations improved in emotion, physical health and stress management. They indicated having more positive emotion daily, having better gastrointestinal peristalsis movement, releasing back tention, well weight control, reducing stress and changing the quality of interpersonal relationships. Conclusion: SMS of Yoga program in this study included four key training directions which were stimulation, relaxation, awareness and pranayama lead a great improvment of stress management for pregnant lady. Throughout this Yoga program, women learned to ignite eustress, remove distress, create calmness and breath slows down. As the result, Yoga program has helped women in experiment group lower their tension, and bring the extra benifits in emotion and relationships. It support women to overcome their pregnancy. Suggestion: An unexpected result of this study showed all participants had no morning sickness since they engaged in SMS program, and no one absent from course due to the benefits of it. We strongly suggest that SMS of Yoga program can be a add of medication for women in pregnancy, however, the position of Forward in the SMS sequence has been point out pressing participant’s stomach, which can be replace to Bridge position to comfort participants.Keywords: self-management of stress(SMS), yoga program, pregnant women, early pregnancy
Procedia PDF Downloads 3302371 DeepNIC a Method to Transform Each Tabular Variable into an Independant Image Analyzable by Basic CNNs
Authors: Nguyen J. M., Lucas G., Ruan S., Digonnet H., Antonioli D.
Abstract:
Introduction: Deep Learning (DL) is a very powerful tool for analyzing image data. But for tabular data, it cannot compete with machine learning methods like XGBoost. The research question becomes: can tabular data be transformed into images that can be analyzed by simple CNNs (Convolutional Neuron Networks)? Will DL be the absolute tool for data classification? All current solutions consist in repositioning the variables in a 2x2 matrix using their correlation proximity. In doing so, it obtains an image whose pixels are the variables. We implement a technology, DeepNIC, that offers the possibility of obtaining an image for each variable, which can be analyzed by simple CNNs. Material and method: The 'ROP' (Regression OPtimized) model is a binary and atypical decision tree whose nodes are managed by a new artificial neuron, the Neurop. By positioning an artificial neuron in each node of the decision trees, it is possible to make an adjustment on a theoretically infinite number of variables at each node. From this new decision tree whose nodes are artificial neurons, we created the concept of a 'Random Forest of Perfect Trees' (RFPT), which disobeys Breiman's concepts by assembling very large numbers of small trees with no classification errors. From the results of the RFPT, we developed a family of 10 statistical information criteria, Nguyen Information Criterion (NICs), which evaluates in 3 dimensions the predictive quality of a variable: Performance, Complexity and Multiplicity of solution. A NIC is a probability that can be transformed into a grey level. The value of a NIC depends essentially on 2 super parameters used in Neurops. By varying these 2 super parameters, we obtain a 2x2 matrix of probabilities for each NIC. We can combine these 10 NICs with the functions AND, OR, and XOR. The total number of combinations is greater than 100,000. In total, we obtain for each variable an image of at least 1166x1167 pixels. The intensity of the pixels is proportional to the probability of the associated NIC. The color depends on the associated NIC. This image actually contains considerable information about the ability of the variable to make the prediction of Y, depending on the presence or absence of other variables. A basic CNNs model was trained for supervised classification. Results: The first results are impressive. Using the GSE22513 public data (Omic data set of markers of Taxane Sensitivity in Breast Cancer), DEEPNic outperformed other statistical methods, including XGBoost. We still need to generalize the comparison on several databases. Conclusion: The ability to transform any tabular variable into an image offers the possibility of merging image and tabular information in the same format. This opens up great perspectives in the analysis of metadata.Keywords: tabular data, CNNs, NICs, DeepNICs, random forest of perfect trees, classification
Procedia PDF Downloads 1252370 Detection of New Attacks on Ubiquitous Services in Cloud Computing and Countermeasures
Authors: L. Sellami, D. Idoughi, P. F. Tiako
Abstract:
Cloud computing provides infrastructure to the enterprise through the Internet allowing access to cloud services at anytime and anywhere. This pervasive aspect of the services, the distributed nature of data and the wide use of information make cloud computing vulnerable to intrusions that violate the security of the cloud. This requires the use of security mechanisms to detect malicious behavior in network communications and hosts such as intrusion detection systems (IDS). In this article, we focus on the detection of intrusion into the cloud sing IDSs. We base ourselves on client authentication in the computing cloud. This technique allows to detect the abnormal use of ubiquitous service and prevents the intrusion of cloud computing. This is an approach based on client authentication data. Our IDS provides intrusion detection inside and outside cloud computing network. It is a double protection approach: The security user node and the global security cloud computing.Keywords: cloud computing, intrusion detection system, privacy, trust
Procedia PDF Downloads 3232369 Simulation Approach for a Comparison of Linked Cluster Algorithm and Clusterhead Size Algorithm in Ad Hoc Networks
Authors: Ameen Jameel Alawneh
Abstract:
A Mobile ad-hoc network (MANET) is a collection of wireless mobile hosts that dynamically form a temporary network without the aid of a system administrator. It has neither fixed infrastructure nor wireless ad hoc sessions. It inherently reaches several nodes with a single transmission, and each node functions as both a host and a router. The network maybe represented as a set of clusters each managed by clusterhead. The cluster size is not fixed and it depends on the movement of nodes. We proposed a clusterhead size algorithm (CHSize). This clustering algorithm can be used by several routing algorithms for ad hoc networks. An elected clusterhead is assigned for communication with all other clusters. Analysis and simulation of the algorithm has been implemented using GloMoSim networks simulator, MATLAB and MAPL11 proved that the proposed algorithm achieves the goals.Keywords: simulation, MANET, Ad-hoc, cluster head size, linked cluster algorithm, loss and dropped packets
Procedia PDF Downloads 3912368 Follicular Thyroid Carcinoma in a Developing Country: A Retrospective Study of 10 Years
Authors: Abdul Aziz, Muhammad Qamar Masood, Saadia Sattar, Saira Fatima, Najmul Islam
Abstract:
Introduction: The most common endocrine tumor is thyroid cancer. Follicular Thyroid Carcinoma (FTC) accounts for 5%–10% of all thyroid cancers. Patients with FTC frequently present with more advanced stage diseases and a higher occurrence of distant metastases because of the propensity of vascular invasion. FTC is mainly treated with surgery, while radioactive iodine therapy is the main adjuvant therapy as per ATA guidelines. In many developing countries, surgical facilities and radioactive iodine are in short supply; therefore, understanding follicular thyroid cancer trends may help developing countries plan and use resources more effectively. Methodology: It was a retrospective observational study of FTC patients of age 18 years and above conducted at Aga Khan University Hospital, Karachi, from 1st January 2010 to 31st December 2019. Results: There were 404 patients with thyroid carcinoma, out of which forty (10.1%) were FTC. 50% of the patients were in the 41-60 years age group, and the female to male ratio was 1.5: 1. Twenty-four patients (60%) presented with complain of neck swelling followed by metastasis (20%) and compressive symptoms (20%). The most common site of metastasis was bone (87.5%), followed by lung (12.5%). The pre-operative thyroglobulin level was done in six out of eight metastatic patients (75%) in which it was elevated. This emphasizes the importance of checking thyroglobulin level in unusual presentation (bone pain, fractures) of a patient having neck swelling also to help in establishing the primary source of tumor. There was no complete documentation of ultrasound features of the thyroid gland in all the patients, which is an important investigation done in the initial evaluation of thyroid nodule. On FNAC, 50% (20 patients) had Bethesda category III-IV nodules, while 10% ( 4 patients ) had Bethesda category II. In sixteen patients, FNAC was not done as they presented with compressive symptoms or metastasis. Fifty percent had a total thyroidectomy and 50% had subtotal followed by completion thyroidectomy, plus ten patients had lymph node dissection, out of which seven had histopathological lymph node involvement. On histopathology, twenty-three patients (57.5%) had minimally invasive, while seventeen (42.5%) had widely invasive follicular thyroid carcinoma. The capsular invasion was present in thirty-three patients (82.5%); one patient had no capsular invasion, but there was a vascular invasion. Six patients' histopathology had no record of capsular invasion. In contrast, the lymphovascular invasion was present in twenty-six patients (65%). In this study, 65 % of the patients had clinical stage 1 disease, while 25% had stage 2 and 10% had clinical stage 4. Seventeen patients (42.5%) had received RAI 30-100 mCi, while ten patients (25%) received more than 100 mCi. Conclusion: FTC demographic and clinicopathological presentation are the same in Pakistan as compared to other countries. Surgery followed by RAI is the mainstay of treatment. Thus understanding the trend of FTC and proper planning and utilization of the resources will help the developing countries in effectively treating the FTC.Keywords: thyroid carcinoma, follicular thyroid carcinoma, clinicopathological features, developing countries
Procedia PDF Downloads 1912367 Power Flow and Modal Analysis of a Power System Including Unified Power Flow Controller
Authors: Djilani Kobibi Youcef Islam, Hadjeri Samir, Djehaf Mohamed Abdeldjalil
Abstract:
The Flexible AC Transmission System (FACTS) technology is a new advanced solution that increases the reliability and provides more flexibility, controllability, and stability of a power system. The Unified Power Flow Controller (UPFC), as the most versatile FACTS device for regulating power flow, is able to control respectively transmission line real power, reactive power, and node voltage. The main purpose of this paper is to analyze the effect of the UPFC on the load flow, the power losses, and the voltage stability using NEPLAN software modules, Newton-Raphson load flow is used for the power flow analysis and the modal analysis is used for the study of the voltage stability. The simulation was carried out on the IEEE 14-bus test system.Keywords: FACTS, load flow, modal analysis, UPFC, voltage stability
Procedia PDF Downloads 5162366 Prediction of Sepsis Illness from Patients Vital Signs Using Long Short-Term Memory Network and Dynamic Analysis
Authors: Marcio Freire Cruz, Naoaki Ono, Shigehiko Kanaya, Carlos Arthur Mattos Teixeira Cavalcante
Abstract:
The systems that record patient care information, known as Electronic Medical Record (EMR) and those that monitor vital signs of patients, such as heart rate, body temperature, and blood pressure have been extremely valuable for the effectiveness of the patient’s treatment. Several kinds of research have been using data from EMRs and vital signs of patients to predict illnesses. Among them, we highlight those that intend to predict, classify, or, at least identify patterns, of sepsis illness in patients under vital signs monitoring. Sepsis is an organic dysfunction caused by a dysregulated patient's response to an infection that affects millions of people worldwide. Early detection of sepsis is expected to provide a significant improvement in its treatment. Preceding works usually combined medical, statistical, mathematical and computational models to develop detection methods for early prediction, getting higher accuracies, and using the smallest number of variables. Among other techniques, we could find researches using survival analysis, specialist systems, machine learning and deep learning that reached great results. In our research, patients are modeled as points moving each hour in an n-dimensional space where n is the number of vital signs (variables). These points can reach a sepsis target point after some time. For now, the sepsis target point was calculated using the median of all patients’ variables on the sepsis onset. From these points, we calculate for each hour the position vector, the first derivative (velocity vector) and the second derivative (acceleration vector) of the variables to evaluate their behavior. And we construct a prediction model based on a Long Short-Term Memory (LSTM) Network, including these derivatives as explanatory variables. The accuracy of the prediction 6 hours before the time of sepsis, considering only the vital signs reached 83.24% and by including the vectors position, speed, and acceleration, we obtained 94.96%. The data are being collected from Medical Information Mart for Intensive Care (MIMIC) Database, a public database that contains vital signs, laboratory test results, observations, notes, and so on, from more than 60.000 patients.Keywords: dynamic analysis, long short-term memory, prediction, sepsis
Procedia PDF Downloads 1252365 The Data Quality Model for the IoT based Real-time Water Quality Monitoring Sensors
Authors: Rabbia Idrees, Ananda Maiti, Saurabh Garg, Muhammad Bilal Amin
Abstract:
IoT devices are the basic building blocks of IoT network that generate enormous volume of real-time and high-speed data to help organizations and companies to take intelligent decisions. To integrate this enormous data from multisource and transfer it to the appropriate client is the fundamental of IoT development. The handling of this huge quantity of devices along with the huge volume of data is very challenging. The IoT devices are battery-powered and resource-constrained and to provide energy efficient communication, these IoT devices go sleep or online/wakeup periodically and a-periodically depending on the traffic loads to reduce energy consumption. Sometime these devices get disconnected due to device battery depletion. If the node is not available in the network, then the IoT network provides incomplete, missing, and inaccurate data. Moreover, many IoT applications, like vehicle tracking and patient tracking require the IoT devices to be mobile. Due to this mobility, If the distance of the device from the sink node become greater than required, the connection is lost. Due to this disconnection other devices join the network for replacing the broken-down and left devices. This make IoT devices dynamic in nature which brings uncertainty and unreliability in the IoT network and hence produce bad quality of data. Due to this dynamic nature of IoT devices we do not know the actual reason of abnormal data. If data are of poor-quality decisions are likely to be unsound. It is highly important to process data and estimate data quality before bringing it to use in IoT applications. In the past many researchers tried to estimate data quality and provided several Machine Learning (ML), stochastic and statistical methods to perform analysis on stored data in the data processing layer, without focusing the challenges and issues arises from the dynamic nature of IoT devices and how it is impacting data quality. A comprehensive review on determining the impact of dynamic nature of IoT devices on data quality is done in this research and presented a data quality model that can deal with this challenge and produce good quality of data. This research presents the data quality model for the sensors monitoring water quality. DBSCAN clustering and weather sensors are used in this research to make data quality model for the sensors monitoring water quality. An extensive study has been done in this research on finding the relationship between the data of weather sensors and sensors monitoring water quality of the lakes and beaches. The detailed theoretical analysis has been presented in this research mentioning correlation between independent data streams of the two sets of sensors. With the help of the analysis and DBSCAN, a data quality model is prepared. This model encompasses five dimensions of data quality: outliers’ detection and removal, completeness, patterns of missing values and checks the accuracy of the data with the help of cluster’s position. At the end, the statistical analysis has been done on the clusters formed as the result of DBSCAN, and consistency is evaluated through Coefficient of Variation (CoV).Keywords: clustering, data quality, DBSCAN, and Internet of things (IoT)
Procedia PDF Downloads 1392364 Delineation of Fracture Zones for Investigation of Groundwater Potentials Using Vertical Electrical Sounding in a Sedimentary Complex Terrain
Authors: M. N. Yahaya, K. A. Salako, U. Z. Magawata
Abstract:
Vertical electrical sounding (VES) method was used to investigate the groundwater potential at the southern part of Gulumbe district, Kebbi State, north-western part of Nigeria. The study was carried out with the aim of determining the subsurface layer’s parameters (resistivity and thickness) and uses the same to characterize the groundwater potential of the study area. The Schlumberger configuration was used for data acquisition. A total number of thirty-three (33) sounding points (VES) were surveyed over six profiles. The software IPI2WIN was used to obtain n-layered geo-electric sections. The geo-electric section drawn from the results of the interpretation revealed that three subsurface layers could be delineated, which comprise of top soil, sand, sandstone, coarse sand, limestone, and gravelly sand. The results of the resistivity sounding were correlated with the lithological logs of nearby boreholes that expose cross-section geologic units around the study area. We found out that the area is dominated by three subsurface layers. The coarse sand layers constituted the aquifer zones in the majority of sounding stations. Thus, this present study concluded that the depth of any borehole in the study area should be located between the depth of 18.5 to 39 m. The study further classified the VES points penetrated based on their conductivity content as highly suitable, suitable, moderately suitably, and poor zones for groundwater exploration. Hence, from this research, we recommended that boreholes can be sited in high conductivity zones across VES 2, 11, 13, 16, 20, 21, 27, and 33, respectively.Keywords: vertical electrical sounding, resistivity, geo-electric, resistivity, aquifer and groundwater
Procedia PDF Downloads 1642363 Structural Damage Detection via Incomplete Model Data Using Output Data Only
Authors: Ahmed Noor Al-qayyim, Barlas Özden Çağlayan
Abstract:
Structural failure is caused mainly by damage that often occurs on structures. Many researchers focus on obtaining very efficient tools to detect the damage in structures in the early state. In the past decades, a subject that has received considerable attention in literature is the damage detection as determined by variations in the dynamic characteristics or response of structures. This study presents a new damage identification technique. The technique detects the damage location for the incomplete structure system using output data only. The method indicates the damage based on the free vibration test data by using “Two Points - Condensation (TPC) technique”. This method creates a set of matrices by reducing the structural system to two degrees of freedom systems. The current stiffness matrices are obtained from optimization of the equation of motion using the measured test data. The current stiffness matrices are compared with original (undamaged) stiffness matrices. High percentage changes in matrices’ coefficients lead to the location of the damage. TPC technique is applied to the experimental data of a simply supported steel beam model structure after inducing thickness change in one element. Where two cases are considered, the method detects the damage and determines its location accurately in both cases. In addition, the results illustrate that these changes in stiffness matrix can be a useful tool for continuous monitoring of structural safety using ambient vibration data. Furthermore, its efficiency proves that this technique can also be used for big structures.Keywords: damage detection, optimization, signals processing, structural health monitoring, two points–condensation
Procedia PDF Downloads 3652362 Unsupervised Learning with Self-Organizing Maps for Named Entity Recognition in the CONLL2003 Dataset
Authors: Assel Jaxylykova, Alexnder Pak
Abstract:
This study utilized a Self-Organizing Map (SOM) for unsupervised learning on the CONLL-2003 dataset for Named Entity Recognition (NER). The process involved encoding words into 300-dimensional vectors using FastText. These vectors were input into a SOM grid, where training adjusted node weights to minimize distances. The SOM provided a topological representation for identifying and clustering named entities, demonstrating its efficacy without labeled examples. Results showed an F1-measure of 0.86, highlighting SOM's viability. Although some methods achieve higher F1 measures, SOM eliminates the need for labeled data, offering a scalable and efficient alternative. The SOM's ability to uncover hidden patterns provides insights that could enhance existing supervised methods. Further investigation into potential limitations and optimization strategies is suggested to maximize benefits.Keywords: named entity recognition, natural language processing, self-organizing map, CONLL-2003, semantics
Procedia PDF Downloads 452361 Fixed Point Iteration of a Damped and Unforced Duffing's Equation
Authors: Paschal A. Ochang, Emmanuel C. Oji
Abstract:
The Duffing’s Equation is a second order system that is very important because they are fundamental to the behaviour of higher order systems and they have applications in almost all fields of science and engineering. In the biological area, it is useful in plant stem dependence and natural frequency and model of the Brain Crash Analysis (BCA). In Engineering, it is useful in the study of Damping indoor construction and Traffic lights and to the meteorologist it is used in the prediction of weather conditions. However, most Problems in real life that occur are non-linear in nature and may not have analytical solutions except approximations or simulations, so trying to find an exact explicit solution may in general be complicated and sometimes impossible. Therefore we aim to find out if it is possible to obtain one analytical fixed point to the non-linear ordinary equation using fixed point analytical method. We started by exposing the scope of the Duffing’s equation and other related works on it. With a major focus on the fixed point and fixed point iterative scheme, we tried different iterative schemes on the Duffing’s Equation. We were able to identify that one can only see the fixed points to a Damped Duffing’s Equation and not to the Undamped Duffing’s Equation. This is because the cubic nonlinearity term is the determining factor to the Duffing’s Equation. We finally came to the results where we identified the stability of an equation that is damped, forced and second order in nature. Generally, in this research, we approximate the solution of Duffing’s Equation by converting it to a system of First and Second Order Ordinary Differential Equation and using Fixed Point Iterative approach. This approach shows that for different versions of Duffing’s Equations (damped), we find fixed points, therefore the order of computations and running time of applied software in all fields using the Duffing’s equation will be reduced.Keywords: damping, Duffing's equation, fixed point analysis, second order differential, stability analysis
Procedia PDF Downloads 2922360 Affordances in Boating Performative Practices: The Case of Leisure Boating from the Swedish West Coast
Authors: Neva Leposa
Abstract:
While environmental policy makers are trying to increase pro-environmental behavior among tourists or outdoor recreation users through changing users’ attitudes, the focus of this paper is turned to the importance of so far marginalized – materiality in the users’ practices. The case study of leisure boating in Sweden used in this paper demonstrates how through the change of materiality (i.e. equipment and physical size of the leisure boats) emergent affordances in materially bound practices are transformed, and the boater-boat-sea nexus is redefined. Participatory observation and in-depth interviewing of Swedish West Coast visitors reveal two stories, first one points to the fact that sail boating practice is becoming increasingly motorized and second one describes how leisure boats are becoming increasingly perceived and used as mobile summer houses. Hence, such practice increases energy and matter consumption. This paper describes how that change happens through practice theory and affordance theory, thus points to visibility and the importance of materiality in shaping human nature nexus. Boating practice changes through the change of the materiality of the boats. In particular, energy consumption increases through the change of engagement with the matter. This study puts focus environmental attitudes focused strivings in question, for the fact that it is too individual-centered and lacks contextual understanding of the materially bound practices and may fail in the very thing it is aiming to do - reduce the environmental impacts.Keywords: practice theory, affordance theory, leisure boating, materiality
Procedia PDF Downloads 2692359 Subway Stray Current Effects on Gas Pipelines in the City of Tehran
Authors: Mohammad Derakhshani, Saeed Reza Allahkarama, Michael Isakhani-Zakaria, Masoud Samadian, Hojjat Sharifi Rasaey
Abstract:
In order to investigate the effects of stray current from DC traction systems (subway) on cathodically protected gas pipelines, the subway and the gas network maps in the city of Tehran were superimposed and a comprehensive map was prepared. 213 intersections and about 100150 meters of parallel sections of gas pipelines were found with respect to the railway right of way which was specified for field measurements. The potential measurements data were logged for one hour in each test point. 24-hour potential monitoring was carried out in selected test points as well. Results showed that dynamic stray current from subway on pipeline potential appears as fluctuations in its static potential that is visible in the diagrams during night periods. These fluctuations can cause the pipeline potential to exit the safe zone and lead to corrosion or overprotection. In this study, a maximum potential shift of 100 mv in the pipe-to-soil potential was considered as a criterion for dynamic stray current effective presence. Results showed that a potential fluctuation range between 100 mV to 3 V exists in measured points on pipelines which exceeds the proposed criterion and needs to be investigated. Corrosion rates influenced by stray currents were calculated using coupons. Results showed that coupon linked to the pipeline in one of the locations at region 1 of the city of Tehran has a corrosion rate of 4.2 mpy (with cathodic protection and under influence of stray currents) which is about 1.5 times more than free corrosion rate of 2.6 mpy.Keywords: stray current, DC traction, subway, buried Pipelines, cathodic protection list
Procedia PDF Downloads 8222358 Comparison of Different Methods of Evaluating Nozzle Junction Stresses under External Loads
Authors: Vinod Kumar, Arun Kumar, Surjit Angra
Abstract:
This paper addresses the junction stress analysis of orthogonally intersecting thin walled cylindrical shell and thin walled cylindrical nozzle subjected to external loading on nozzle. Junction stresses have been calculated theoretically by welding research council (WRC) bulletins 107 and 297 for different nozzle loads. WRC bulletins 107 and 297 have been used by design engineers for calculating nozzle-vessel junction stresses since their publication. They give simple empirical relations and easy in application. Also 3D FEA in which material is elastic has been done in ANSYS software with 8 node solid element model and results of FEA have been compared with WRC results. Stress intensities obtained by WRC 297 are generally slightly higher than obtained by WRC 107. Membrane stresses obtained by FEA are much higher than WRC and membrane plus bending stresses obtained by FEA are lower than WRC.Keywords: FEA, junction stress, solid element, WRC 107, WRC 297
Procedia PDF Downloads 5782357 Post-Quantum Resistant Edge Authentication in Large Scale Industrial Internet of Things Environments Using Aggregated Local Knowledge and Consistent Triangulation
Authors: C. P. Autry, A. W. Roscoe, Mykhailo Magal
Abstract:
We discuss the theoretical model underlying 2BPA (two-band peer authentication), a practical alternative to conventional authentication of entities and data in IoT. In essence, this involves assembling a virtual map of authentication assets in the network, typically leading to many paths of confirmation between any pair of entities. This map is continuously updated, confirmed, and evaluated. The value of authentication along multiple disjoint paths becomes very clear, and we require analogues of triangulation to extend authentication along extended paths and deliver it along all possible paths. We discover that if an attacker wants to make an honest node falsely believe she has authenticated another, then the length of the authentication paths is of little importance. This is because optimal attack strategies correspond to minimal cuts in the authentication graph and do not contain multiple edges on the same path. The authentication provided by disjoint paths normally is additive (in entropy).Keywords: authentication, edge computing, industrial IoT, post-quantum resistance
Procedia PDF Downloads 1972356 Social Support and Depressive Symptoms in Participants of a University of the Third Age: Evidences From a Cross-Sectional Study in Brazil
Authors: Ana Luiza Blanco, Juliana Cordeiro Carvalho, Tábatta Renata Pereira Brito, Ariene Angelini dos Santos Orlandi, Ligiana Pires Corona, Daniella Pires Nunes
Abstract:
Depressive symptoms are recurrent in older adults and affect the quality of life and well-being of individuals. One of the strategies to reduce depression is social support, but studies are still needed to determine which types of social support are most effective in moderating this effect in certain populations. The objective was to identify the relationship between social support and depressive symptoms in participants of a University of the Third Age. This is a cross-sectional study. Participants were 82 individuals (≥ 50 years) who responded to the Geriatric Depression Scale - GDS and the Medical Outcomes Study - MOS. Data collection was carried out from November 2020 to May 2021. The Chi-Square and Mann Whitney tests were used, at a significance level of 5% for data analysis. Among the participants, 83.4% were female, 57.3% were age between 60 to 69 years, 83.1% studied 12 year or more and 48.1% receive from 4 to 10 minimum wages. The prevalence of depressive symptoms was 12.2%. The type of support with the highest median score was affective (100 points) and the lowest, or emotional (87.5 points). The results showed that participants without depressive symptoms had higher median scores for informational support when compared to those with depressive symptoms (p=0.029). The other types of social support were not statistically significant. The findings suggested that informational support is related to depressive symptoms in older adults. Promote informational support and educational actions in Universities of the Third Age may be an important strategy for preventing depressive symptoms and improve the quality of life of this population.Keywords: aged, depressive symptoms, social support, university of the third age
Procedia PDF Downloads 1222355 Geophysical Exploration of Aquifer Zones by (Ves) Method at Ayma-Kharagpur, District Paschim Midnapore, West Bengal
Authors: Mayank Sharma
Abstract:
Groundwater has been a matter of great concern in the past years due to the depletion in the water table. This has resulted from the over-exploitation of groundwater resources. Sub-surface exploration of groundwater is a great way to identify the groundwater potential of an area. Thus, in order to meet the water needs for irrigation in the study area, there was a need for a tube well to be installed. Therefore, a Geophysical investigation was carried out to find the most suitable point of drilling and sinking of tube well that encounters an aquifer. Hence, an electrical resistivity survey of geophysical exploration was used to know the aquifer zones of the area. The Vertical Electrical Sounding (VES) method was employed to know the subsurface geology of the area. Seven vertical electrical soundings using Schlumberger electrode array were carried out, having the maximum AB electrode separation of 700m at selected points in Ayma, Kharagpur-1 block of Paschim Midnapore district, West Bengal. The VES was done using an IGIS DDR3 Resistivity meter up to an approximate depth of 160-180m. The data was interpreted, processed and analyzed. Based on all the interpretations using the direct method, the geology of the area at the points of sounding was interpreted. It was established that two deeper clay-sand sections exist in the area at a depth of 50-70m (having resistivity range of 40-60ohm-m) and 70-160m (having resistivity range of 25-35ohm-m). These aquifers will provide a high yield of water which would be sufficient for the desired irrigation in the study area.Keywords: VES method, Schlumberger method, electrical resistivity survey, geophysical exploration
Procedia PDF Downloads 1952354 Cu Voids Detection of Electron Beam Inspection at the 5nm Node
Authors: Byungsik Moon
Abstract:
Electron beam inspection (EBI) has played an important role in detecting defects during the Fab process. The study focused on capturing buried Cu metal voids for 5nm technology nodes in Qualcomm Snapdragon mass production. This paper illustrates a case study where Cu metal voids can be detected without side effects with optimized EBI scanning conditions. The voids were buried in the VIA and not detected effectively by bright field inspection. EBI showed higher detectability, about 10 times that of bright fields, and a lower landing energy of EBI can avoid film damage. A comparison of detectability between EBI and bright field inspection was performed, and TEM confirmed voids that were detected by EBI. Therefore, a much higher detectability of buried Cu metal voids can be achieved without causing film damage.Keywords: electron beam inspection, EBI, landing energy, Cu metal voids, bright field inspection
Procedia PDF Downloads 752353 Research on Architectural Steel Structure Design Based on BIM
Authors: Tianyu Gao
Abstract:
Digital architectures use computer-aided design, programming, simulation, and imaging to create virtual forms and physical structures. Today's customers want to know more about their buildings. They want an automatic thermostat to learn their behavior and contact them, such as the doors and windows they want to open with a mobile app. Therefore, the architectural display form is more closely related to the customer's experience. Based on the purpose of building informationization, this paper studies the steel structure design based on BIM. Taking the Zigan office building in Hangzhou as an example, it is divided into four parts, namely, the digital design modulus of the steel structure, the node analysis of the steel structure, the digital production and construction of the steel structure. Through the application of BIM software, the architectural design can be synergized, and the building components can be informationized. Not only can the architectural design be feedback in the early stage, but also the stability of the construction can be guaranteed. In this way, the monitoring of the entire life cycle of the building and the meeting of customer needs can be realized.Keywords: digital architectures, BIM, steel structure, architectural design
Procedia PDF Downloads 1952352 A Reactive Fast Inter-MAP Handover for Hierarchical Mobile IPv6
Authors: Pyung Soo Kim
Abstract:
This paper proposes an optimized reactive fast intermobility anchor point (MAP) handover scheme for Hierarchical Mobile IPv6, called the ORFH-HMIPv6, to minimize packet loss of the existing scheme. The key idea of the proposed ORFHHMIPv6 scheme is that the serving MAP buffers packets toward the mobile node (MN) as soon as the link layer between MN and serving base station is disconnected. To implement the proposed scheme, the MAP discovery message exchanged between MN and serving MAP is extended. In addition, the IEEE 802.21 Media Independent Handover Function (MIHF) event service message is defined newly. Through analytic performance evaluation, the proposed ORFH-HMIPv6 scheme can be shown to minimize packet loss much than the existing scheme.Keywords: hierarchical mobile IPv6 (HMIPv6), fast handover, reactive behavior, packet loss
Procedia PDF Downloads 2132351 Rotterdam in Transition: A Design Case for a Low-Carbon Transport Node in Lombardijen
Authors: Halina Veloso e Zarate, Manuela Triggianese
Abstract:
The urban challenges posed by rapid population growth, climate adaptation, and sustainable living have compelled Dutch cities to reimagine their built environment and transportation systems. As a pivotal contributor to CO₂ emissions, the transportation sector in the Netherlands demands innovative solutions for transitioning to low-carbon mobility. This study investigates the potential of transit oriented development (TOD) as a strategy for achieving carbon reduction and sustainable urban transformation. Focusing on the Lombardijen station area in Rotterdam, which is targeted for significant densification, this paper presents a design-oriented exploration of a low-carbon transport node. By employing a research-by-design methodology, this study delves into multifaceted factors and scales, aiming to propose future scenarios for Lombardijen. Drawing from a synthesis of existing literature, applied research, and practical insights, a robust design framework emerges. To inform this framework, governmental data concerning the built environment and material embodied carbon are harnessed. However, the restricted access to crucial datasets, such as property ownership information from the cadastre and embodied carbon data from De Nationale Milieudatabase, underscores the need for improved data accessibility, especially during the concept design phase. The findings of this research contribute fundamental insights not only to the Lombardijen case but also to TOD studies across Rotterdam's 13 nodes and similar global contexts. Spatial data related to property ownership facilitated the identification of potential densification sites, underscoring its importance for informed urban design decisions. Additionally, the paper highlights the disparity between the essential role of embodied carbon data in environmental assessments for building permits and its limited accessibility due to proprietary barriers. Although this study lays the groundwork for sustainable urbanization through TOD-based design, it acknowledges an area of future research worthy of exploration: the socio-economic dimension. Given the complex socio-economic challenges inherent in the Lombardijen area, extending beyond spatial constraints, a comprehensive approach demands integration of mobility infrastructure expansion, land-use diversification, programmatic enhancements, and climate adaptation. While the paper adopts a TOD lens, it refrains from an in-depth examination of issues concerning equity and inclusivity, opening doors for subsequent research to address these aspects crucial for holistic urban development.Keywords: Rotterdam zuid, transport oriented development, carbon emissions, low-carbon design, cross-scale design, data-supported design
Procedia PDF Downloads 842350 Bench Tests of Two-Stroke Opposed Piston Aircraft Diesel Engine under Propeller Characteristics Conditions
Authors: A. Majczak, G. Baranski, K. Pietrykowski
Abstract:
Due to the growing popularity of light aircraft, it has become necessary to develop aircraft engines for this type of construction. One of engine system, designed to increase efficiency and reduce weight, is the engine with opposed pistons. In such an engine, the combustion chamber is formed by two pistons moving in one cylinder. Therefore, this type of engines run in a two-stroke cycle, so they have many advantages such as high power and torque, high efficiency, or a favorable power-to-weight ratio. Tests of one of the available aircraft engines with opposing piston system fueled with diesel oil were carried out on an engine dynamometer equipped with an eddy current brake and the necessary measuring and testing equipment. In order to get to know the basic parameters of the engine, the tests were carried out under partial load conditions for the following torque values: 40, 60, 80, 100 Nm. The rotational speed was changed from 1600 to 2500 rpm. Measurements were also taken for designated points of propeller characteristics. During the tests, the engine torque, engine power, fuel consumption, intake manifold pressure, and oil pressure were recorded. On the basis of the measurements carried out for particular loads, the power curve, hourly and specific fuel consumption curves were determined. Characteristics of charge pressure as a function of rotational speed as well as power, torque, hourly and specific fuel consumption curves for propeller characteristics were also prepared. The obtained characteristics make it possible to select the optimal points of engine operation.Keywords: aircraft, diesel, engine testing, opposed piston
Procedia PDF Downloads 1532349 Analysis of the Significance of Multimedia Channels Using Sparse PCA and Regularized SVD
Authors: Kourosh Modarresi
Abstract:
The abundance of media channels and devices has given users a variety of options to extract, discover, and explore information in the digital world. Since, often, there is a long and complicated path that a typical user may venture before taking any (significant) action (such as purchasing goods and services), it is critical to know how each node (media channel) in the path of user has contributed to the final action. In this work, the significance of each media channel is computed using statistical analysis and machine learning techniques. More specifically, “Regularized Singular Value Decomposition”, and “Sparse Principal Component” has been used to compute the significance of each channel toward the final action. The results of this work are a considerable improvement compared to the present approaches.Keywords: multimedia attribution, sparse principal component, regularization, singular value decomposition, feature significance, machine learning, linear systems, variable shrinkage
Procedia PDF Downloads 3092348 Communication in a Heterogeneous Ad Hoc Network
Authors: C. Benjbara, A. Habbani
Abstract:
Wireless networks are getting more and more used in every new technology or feature, especially those without infrastructure (Ad hoc mode) which provide a low cost alternative to the infrastructure mode wireless networks and a great flexibility for application domains such as environmental monitoring, smart cities, precision agriculture, and so on. These application domains present a common characteristic which is the need of coexistence and intercommunication between modules belonging to different types of ad hoc networks like wireless sensor networks, mesh networks, mobile ad hoc networks, vehicular ad hoc networks, etc. This vision to bring to life such heterogeneous networks will make humanity duties easier but its development path is full of challenges. One of these challenges is the communication complexity between its components due to the lack of common or compatible protocols standard. This article proposes a new patented routing protocol based on the OLSR standard in order to resolve the heterogeneous ad hoc networks communication issue. This new protocol is applied on a specific network architecture composed of MANET, VANET, and FANET.Keywords: Ad hoc, heterogeneous, ID-Node, OLSR
Procedia PDF Downloads 2152347 The Influence of Air Temperature Controls in Estimation of Air Temperature over Homogeneous Terrain
Authors: Fariza Yunus, Jasmee Jaafar, Zamalia Mahmud, Nurul Nisa’ Khairul Azmi, Nursalleh K. Chang, Nursalleh K. Chang
Abstract:
Variation of air temperature from one place to another is cause by air temperature controls. In general, the most important control of air temperature is elevation. Another significant independent variable in estimating air temperature is the location of meteorological stations. Distances to coastline and land use type are also contributed to significant variations in the air temperature. On the other hand, in homogeneous terrain direct interpolation of discrete points of air temperature work well to estimate air temperature values in un-sampled area. In this process the estimation is solely based on discrete points of air temperature. However, this study presents that air temperature controls also play significant roles in estimating air temperature over homogenous terrain of Peninsular Malaysia. An Inverse Distance Weighting (IDW) interpolation technique was adopted to generate continuous data of air temperature. This study compared two different datasets, observed mean monthly data of T, and estimation error of T–T’, where T’ estimated value from a multiple regression model. The multiple regression model considered eight independent variables of elevation, latitude, longitude, coastline, and four land use types of water bodies, forest, agriculture and build up areas, to represent the role of air temperature controls. Cross validation analysis was conducted to review accuracy of the estimation values. Final results show, estimation values of T–T’ produced lower errors for mean monthly mean air temperature over homogeneous terrain in Peninsular Malaysia.Keywords: air temperature control, interpolation analysis, peninsular Malaysia, regression model, air temperature
Procedia PDF Downloads 3742346 Spatial Variation of Nitrogen, Phosphorus and Potassium Contents of Tomato (Solanum lycopersicum L.) Plants Grown in Greenhouses (Springs) in Elmali-Antalya Region
Authors: Namik Kemal Sonmez, Sahriye Sonmez, Hasan Rasit Turkkan, Hatice Tuba Selcuk
Abstract:
In this study, the spatial variation of plant and soil nutrition contents of tomato plants grown in greenhouses was investigated in Elmalı region of Antalya. For this purpose, total of 19 sampling points were determined. Coordinates of each sampling points were recorded by using a hand-held GPS device and were transferred to satellite data in GIS. Soil samples were collected from two different depths, 0-20 and 20-40 cm, and leaf were taken from different tomato greenhouses. The soil and plant samples were analyzed for N, P and K. Then, attribute tables were created with the analyses results by using GIS. Data were analyzed and semivariogram models and parameters (nugget, sill and range) of variables were determined by using GIS software. Kriged maps of variables were created by using nugget, sill and range values with geostatistical extension of ArcGIS software. Kriged maps of the N, P and K contents of plant and soil samples showed patchy or a relatively smooth distribution in the study areas. As a result, the N content of plants were sufficient approximately 66% portion of the tomato productions. It was determined that the P and K contents were sufficient of 70% and 80% portion of the areas, respectively. On the other hand, soil total K contents were generally adequate and available N and P contents were found to be highly good enough in two depths (0-20 and 20-40 cm) 90% portion of the areas.Keywords: Elmali, nutrients, springs greenhouses, spatial variation, tomato
Procedia PDF Downloads 243