Search results for: rule insertion
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1029

Search results for: rule insertion

519 The Interaction of Adjacent Defects and the Effect on the Failure Pressure of the Corroded Pipeline

Authors: W. Wang, Y. Zhang, J. Shuai, Z. Lv

Abstract:

The interaction between defects has an essential influence on the bearing capacity of pipelines. This work developed the finite element model of pipelines containing adjacent defects, which includes longitudinally aligned, circumferentially aligned, and diagonally aligned defects. The relationships between spacing and geometries of defects and the failure pressure of pipelines, and the interaction between defects are investigated. The results show that the orientation of defects is an influential factor in the failure pressure of the pipeline. The influence of defect spacing on the failure pressure of the pipeline is non-linear, and the relationship presents different trends depending on the orientation of defects. The increase of defect geometry will weaken the failure pressure of the pipeline, and for the interaction between defects, the increase of defect depth will enhance it, and the increase of defect length will weaken it. According to the research on the interaction rule between defects with different orientations, the interacting coefficients under different orientations of defects are compared. It is determined that the diagonally aligned defects with the overlap of longitudinal projections are the most obvious arrangement of interaction between defects, and the limited distance of interaction between defects is proposed.

Keywords: pipeline, adjacent defects, interaction between defects, failure pressure

Procedia PDF Downloads 195
518 Architectural Knowledge Systems Related to Use of Terracotta in Bengal

Authors: Nandini Mukhopadhyay

Abstract:

The prominence of terracotta as a building material in Bengal is well justified by its geographical location. The architectural knowledge system associated with terracotta can be comprehended in the typology of the built structures as they act as texts to interpret the knowledge. The history of Bengal has witnessed the influence of several rulers in developing the architectural vocabulary of the region. This metamorphosis of the architectural knowledge systems in the region includes the Bhakti movement, the Islamic influence, and the British rule, which led to the evolution of the use of terracotta from decorative elements to structural elements in the present-day context. This paper intends to develop an understanding of terracotta as a building material, its use in a built structure, the common problems associated with terracotta construction, and the techniques of maintenance, repair, and conservation. This paper also explores the size, shape, and geometry of the material and its varied use in temples, mosques in the region. It also takes into note that the use of terracotta was concentrated majorly to religious structures and not in the settlements of the common people. And the architectural style of temples and mosques of Bengal is hugely influenced by the houses of the common.

Keywords: terracotta, material, knowledge system, conservation

Procedia PDF Downloads 136
517 The Impact of the EU Competition Law on the Asian Systems

Authors: Maria Casoria

Abstract:

Throughout the last decade developing countries have been undergoing substantial reforms to promote the establishment of competition regimes, as consequence of the trade liberalization and the spread of a ‘competition awareness movement’ across the globe. The legislative trend affected the whole Asia. Notwithstanding the existence of extensive joint ventures, cartels and other collusive business relationships in this geographical area, almost all the countries have already passed or are committed to enforce specific laws in the field. The study dwells into legal solutions adopted in the five sub-regions in which the continent is commonly divided –i.e. Central, East, South, Southeast, and Western Asia- and, using a comparative methodology, shed lights on the main differences and similarities in place. The final outcome of the analysis is that, despite the undeniable divergences of approach, what links together the legislation in force in the region is the unveiled influence exercised by the European Union competition regulation. Consequently, in order to properly evaluate the deterrence of the rule of law in the sector concerned, it is fundamental to scrutinize the major role played by the EU and its policy for the evolution of pro-competitive practices in the continent.

Keywords: Asia, competition law, differences and similarities, European union, influences

Procedia PDF Downloads 265
516 Techniques to Characterize Subpopulations among Hearing Impaired Patients and Its Impact for Hearing Aid Fitting

Authors: Vijaya K. Narne, Gerard Loquet, Tobias Piechowiak, Dorte Hammershoi, Jesper H. Schmidt

Abstract:

BEAR, which stands for better hearing rehabilitation is a large-scale project in Denmark designed and executed by three national universities, three hospitals, and the hearing aid industry with the aim to improve hearing aid fitting. A total of 1963 hearing impaired people were included and were segmented into subgroups based on hearing-loss, demographics, audiological and questionnaires data (i.e., the speech, spatial and qualities of hearing scale [SSQ-12] and the International Outcome Inventory for Hearing-Aids [IOI-HA]). With the aim to provide a better hearing-aid fit to individual patients, we applied modern machine learning techniques with traditional audiograms rule-based systems. Results show that age, speech discrimination scores, and audiogram configurations were evolved as important parameters in characterizing sub-population from the data-set. The attempt to characterize sub-population reveal a clearer picture about the individual hearing difficulties encountered and the benefits derived from more individualized hearing aids.

Keywords: hearing loss, audiological data, machine learning, hearing aids

Procedia PDF Downloads 141
515 Performance Analysis of Arithmetic Units for IoT Applications

Authors: Nithiya C., Komathi B. J., Praveena N. G., Samuda Prathima

Abstract:

At present, the ultimate aim in digital system designs, especially at the gate level and lower levels of design abstraction, is power optimization. Adders are a nearly universal component of today's integrated circuits. Most of the research was on the design of high-speed adders to execute addition based on various adder structures. This paper discusses the ideal path for selecting an arithmetic unit for IoT applications. Based on the analysis of eight types of 16-bit adders, we found out Carry Look-ahead (CLA) produces low power. Additionally, multiplier and accumulator (MAC) unit is implemented with the Booth multiplier by using the low power adders in the order of preference. The design is synthesized and verified using Synopsys Design Compiler and VCS. Then it is implemented by using Cadence Encounter. The total power consumed by the CLA based booth multiplier is 0.03527mW, the total area occupied is 11260 um², and the speed is 2034 ps.

Keywords: carry look-ahead, carry select adder, CSA, internet of things, ripple carry adder, design rule check, power delay product, multiplier and accumulator

Procedia PDF Downloads 108
514 An Expert System for Assessment of Learning Outcomes for ABET Accreditation

Authors: M. H. Imam, Imran A. Tasadduq, Abdul-Rahim Ahmad, Fahd M. Aldosari

Abstract:

Learning outcomes of a course (CLOs) and the abilities at the time of graduation referred to as Student Outcomes (SOs) are required to be assessed for ABET accreditation. A question in an assessment must target a CLO as well as an SO and must represent a required level of competence. This paper presents the idea of an Expert System (ES) to select a proper question to satisfy ABET accreditation requirements. For ES implementation, seven attributes of a question are considered including the learning outcomes and Bloom’s Taxonomy level. A database contains all the data about a course including course content topics, course learning outcomes and the CLO-SO relationship matrix. The knowledge base of the presented ES contains a pool of questions each with tags of the specified attributes. Questions and the attributes represent expert opinions. With implicit rule base the inference engine finds the best possible question satisfying the required attributes. It is shown that the novel idea of such an ES can be implemented and applied to a course with success. An application example is presented to demonstrate the working of the proposed ES.

Keywords: expert system, student outcomes, course learning outcomes, question attributes

Procedia PDF Downloads 241
513 Ultimate Stress of the Steel Tube in Circular Concrete-Filled Steel Tube Stub Columns Subjected to Axial Compression

Authors: Siqi Lin, Yangang Zhao

Abstract:

Concrete-filled steel tube column achieves the excellent performance of high strength, stiffness, and ductility due to the confinement from the steel tube. Well understanding the stress of the steel tube is important to make clear the confinement effect. In this paper, the ultimate stress of the steel tube in circular concrete-filled steel tube columns subjected to axial compression was studied. Experimental tests were conducted to investigate the effects of the parameters, including concrete strength, steel strength, and D/t ratio, on the ultimate stress of the steel tube. The stress of the steel tube was determined by employing the Prandtl-Reuss flow rule associated with isotropic strain hardening. Results indicate that the stress of steel tube was influenced by the parameters. Specimen with higher strength ratio fy/fc and smaller D/t ratio generally leads to a higher utilization efficiency of the steel tube.

Keywords: concrete-filled steel tube, axial compression, ultimate stress, utilization efficiency

Procedia PDF Downloads 405
512 Historico-Cultural Study of the Royal Palace Architecture of the Former Buddhist Kingdom of Mustang, Nepal

Authors: Umesh Regmi

Abstract:

This research briefly covers the historical, cultural, and religious significance of the palaces of Mustang. The research forwards an introduction of the five palaces of Mustang located in Lo Monthang, Tsarang, Thinkar, Ghami, and Dhagmar. These five palaces have survived for centuries till date in different forms of physical condition, though there were originally eight palaces as recorded in the historical sources. The palaces of Mustang are deeply connected to the Buddhist religious practices exhibited through the intangible cultural practices taking place in and around the palaces. The architectural plan and location of religious shrines and halls in certain sections of the palaces are common in all the palaces of the Mustang. The palace of Lo Monthang works as the center of rule, and the other four palaces function as satellite palaces located in the surrounding areas of Lo Monthang. The architectural ensemble of the Palace of Mustang is the symbol of the cultural, administrative, social, and religious authority of the royal family of Mustang. The palace performed the role of unifier of the political and cultural geography of the former independent Buddhist Kingdom of Lo (Mustang).

Keywords: cultural heritage, royal palace, mustang, buddhist kingdom, palace architecture

Procedia PDF Downloads 100
511 Specified Human Motion Recognition and Unknown Hand-Held Object Tracking

Authors: Jinsiang Shaw, Pik-Hoe Chen

Abstract:

This paper aims to integrate human recognition, motion recognition, and object tracking technologies without requiring a pre-training database model for motion recognition or the unknown object itself. Furthermore, it can simultaneously track multiple users and multiple objects. Unlike other existing human motion recognition methods, our approach employs a rule-based condition method to determine if a user hand is approaching or departing an object. It uses a background subtraction method to separate the human and object from the background, and employs behavior features to effectively interpret human object-grabbing actions. With an object’s histogram characteristics, we are able to isolate and track it using back projection. Hence, a moving object trajectory can be recorded and the object itself can be located. This particular technique can be used in a camera surveillance system in a shopping area to perform real-time intelligent surveillance, thus preventing theft. Experimental results verify the validity of the developed surveillance algorithm with an accuracy of 83% for shoplifting detection.

Keywords: Automatic Tracking, Back Projection, Motion Recognition, Shoplifting

Procedia PDF Downloads 323
510 FISCEAPP: FIsh Skin Color Evaluation APPlication

Authors: J. Urban, Á. S. Botella, L. E. Robaina, A. Bárta, P. Souček, P. Císař, Š. Papáček, L. M. Domínguez

Abstract:

Skin coloration in fish is of great physiological, behavioral and ecological importance and can be considered as an index of animal welfare in aquaculture as well as an important quality factor in the retail value. Currently, in order to compare color in animals fed on different diets, biochemical analysis, and colorimetry of fished, mildly anesthetized or dead body, are very accurate and meaningful measurements. The noninvasive method using digital images of the fish body was developed as a standalone application. This application deals with the computation burden and memory consumption of large input files, optimizing piece wise processing and analysis with the memory/computation time ratio. For the comparison of color distributions of various experiments and different color spaces (RGB, CIE L*a*b*) the comparable semi-equidistant binning of multi channels representation is introduced. It is derived from the knowledge of quantization levels and Freedman-Diaconis rule. The color calibrations and camera responsivity function were necessary part of the measurement process.

Keywords: color distribution, fish skin color, piecewise transformation, object to background segmentation

Procedia PDF Downloads 249
509 Social Accountability: Persuasion and Debate to Contain Corruption

Authors: A. Lambert-Mogiliansky

Abstract:

In this paper, we investigate the properties of simple rules for reappointment aimed at holding a public official accountable and monitor his activity. The public official allocates budget resources to various activities which results in the delivery of public services to citizens. He has discretion over the use of resource so he can divert some of them for private ends. Because of a liability constraint, zero diversion can never be secured in all states. The optimal reappointment mechanism under complete information is shown to exhibit some leniency thus departing from the zero tolerance principle. Under asymmetric information (about the state), a rule with random verification in a pre-announced subset is shown to be optimal in a class of common rules. Surprisingly, those common rules make little use of hard information about service delivery when available. Similarly, PO's claim about his record is of no value to improve the performance of the examined rules. In contrast requesting that the PO defends his records publicly can be very useful if the service users are given the chance to refute false claims with cheap talk complaints: the first best complete information outcome can be approached in the absence of any observation by the manager of the accountability mechanism.

Keywords: accountability, corruption, persuasion, debate

Procedia PDF Downloads 369
508 The Risk of Post-stroke Pneumonia and Its One-Year Disability in Taiwan

Authors: Hui-Chi Huang, Su-Ju Yang, Ching-Wei Lin, Jui-Yao Tsai, Liang-Yiang

Abstract:

Background: Evidence exists that pneumonia is a frequently encountered complication after stroke which is associated with a higher rate of mortality and increased long-term disability Purpose: To determine the predictors associated with the risk of one-year disability in acute stroke. Methods: Data for this longitudinal follow-up study were extracted from a tertiary referral medical center’s stroke registry database in Northern Taipei. Eligible patients with acute stroke admitted to the hospital and completed a one-year follow up were recruited for analysis. Favorable outcome was defined as a modified Rankin Scale score ≤ 2. SAS version 9.2 was used for the multivariable regression analyses to examine the factors correlated with the one-year disability in stroke patients. Results: From January 2012 to December 2013, a total of 1373 (mean age: 70.49±15.4 years, 913(66.5%) males) consecutively administered acute stroke patients were recruited. Overall, the rate of one-year disability was 37.20%(404/1086) in those without post-stroke pneumonia. It increased to 82.93 %(238/287) in patients developed post-stroke pneumonia. Factors associated with increased risk of disability were age ≧ 75(OR= 4.845, p<.0001), female /gender (OR=1.568, p =.0062), previous stroke (OR= 1.868, p = <. 0001) ,dementia (OR= 2.872, p =.0047), ventilator use (OR= 4.653, p <. 0001),age ≧ 75 /pneumonia (OR=1.236, p <. 0001) , ICU admission (OR=3.314, p <.0001) , nasogastric tube insertion (OR= 4.28, p <.0001), speech therapy (OR= 1.79, p =.0142), urinary tract infection (OR= 1.865, p =.0018), estimated glomerular filtration rate (eGFR > 60 )(OR= 0.525, p= .0029), Admission NIHSS >11 (OR= 2.101, p = .0099), Length of hospitalization > 30(d) (OR= 5.182, p <.0001). Conclusion: Older age, severe neurological deficit, complications, rehabilitation intervention, length of hospitalization >30(d), and cognitive impairment were significantly associated with Post-stroke functional impairment, especially those with post-stroke pneumonia. These findings could open new avenues in the management of stroke patients.

Keywords: stroke, risk, pneumonia, disability

Procedia PDF Downloads 222
507 Software-Defined Networking: A New Approach to Fifth Generation Networks: Security Issues and Challenges Ahead

Authors: Behrooz Daneshmand

Abstract:

Software Defined Networking (SDN) is designed to meet the future needs of 5G mobile networks. The SDN architecture offers a new solution that involves separating the control plane from the data plane, which is usually paired together. Network functions traditionally performed on specific hardware can now be abstracted and virtualized on any device, and a centralized software-based administration approach is based on a central controller, facilitating the development of modern applications and services. These plan standards clear the way for a more adaptable, speedier, and more energetic network beneath computer program control compared with a conventional network. We accept SDN gives modern inquire about openings to security, and it can significantly affect network security research in numerous diverse ways. Subsequently, the SDN architecture engages systems to effectively screen activity and analyze threats to facilitate security approach modification and security benefit insertion. The segregation of the data planes and control and, be that as it may, opens security challenges, such as man-in-the-middle attacks (MIMA), denial of service (DoS) attacks, and immersion attacks. In this paper, we analyze security threats to each layer of SDN - application layer - southbound interfaces/northbound interfaces - controller layer and data layer. From a security point of see, the components that make up the SDN architecture have a few vulnerabilities, which may be abused by aggressors to perform noxious activities and hence influence the network and its administrations. Software-defined network assaults are shockingly a reality these days. In a nutshell, this paper highlights architectural weaknesses and develops attack vectors at each layer, which leads to conclusions about further progress in identifying the consequences of attacks and proposing mitigation strategies.

Keywords: software-defined networking, security, SDN, 5G/IMT-2020

Procedia PDF Downloads 86
506 Morphometric Study of Human Anterior and Posterior Meniscofemoral Ligaments of the Knee Joint on Thiel Embalmed Cadavers

Authors: Mohammad Alobaidy, David Nicoll, Tracey Wilkinson

Abstract:

Background: Many patients suffer postoperative knee stability after total knee arthroplasty (joint replacement) involving posterior cruciate ligament (PCL) sacrificing or retaining, but is not clear whether the meniscofemoral ligaments (MFLs) are retained during these procedures; their function in terms of knee stability is not well established in the literature. Purpose: Macroscopic, detailed, morphometric investigation of the anterior and posterior MFLs of the knee joint was undertaken to assist understanding of knee stability after total knee arthroplasty and ligament reconstruction. Methods: Dissection of eighty Thiel embalmed knees from 19 male and 21 female cadavers was conducted, mean age 77 (range 47-99 years). The origin and insertion of the anterior and posterior MFLs were measured using high accuracy, calibrated, digital Vernier calipers at 0.01mm. Results: The means were: anterior meniscofemoral ligament (aMFL) length 28.4 ± 2.7mm; posterior meniscofemoral ligament (pMFL) length 29 ± 3.7mm; aMFL femoral width 6.4 ± 1.7mm, mid-distance ligament width 4 ± 1.1mm, meniscal ligament width 3.9 ± 1.2mm; pMFL femoral width 5.6 ± 1.5mm, mid-distance ligament width 4.1 ± 1.1mm, meniscal ligament width 4.1 ± 1.3mm. Some of the male measurements were larger than female, with significant differences in the length of the aMFL femoral length p<0.01 and pMFL femoral length p<0.007, and width of the pMFL mid-distance p<0.04. Conclusion: This study may help explore the role of the meniscofemoral ligaments in knee stability after total knee arthroplasty with a posterior cruciate ligament retaining prosthesis. Anatomical information for Thiel embalmed knees may aid orthopaedic surgeons in ligament reconstruction.

Keywords: anterior and posterior meniscofemoral ligaments, morphometric analysis, Thiel embalmed knees, knee arthroplasty

Procedia PDF Downloads 356
505 Automated Adaptions of Semantic User- and Service Profile Representations by Learning the User Context

Authors: Nicole Merkle, Stefan Zander

Abstract:

Ambient Assisted Living (AAL) describes a technological and methodological stack of (e.g. formal model-theoretic semantics, rule-based reasoning and machine learning), different aspects regarding the behavior, activities and characteristics of humans. Hence, a semantic representation of the user environment and its relevant elements are required in order to allow assistive agents to recognize situations and deduce appropriate actions. Furthermore, the user and his/her characteristics (e.g. physical, cognitive, preferences) need to be represented with a high degree of expressiveness in order to allow software agents a precise evaluation of the users’ context models. The correct interpretation of these context models highly depends on temporal, spatial circumstances as well as individual user preferences. In most AAL approaches, model representations of real world situations represent the current state of a universe of discourse at a given point in time by neglecting transitions between a set of states. However, the AAL domain currently lacks sufficient approaches that contemplate on the dynamic adaptions of context-related representations. Semantic representations of relevant real-world excerpts (e.g. user activities) help cognitive, rule-based agents to reason and make decisions in order to help users in appropriate tasks and situations. Furthermore, rules and reasoning on semantic models are not sufficient for handling uncertainty and fuzzy situations. A certain situation can require different (re-)actions in order to achieve the best results with respect to the user and his/her needs. But what is the best result? To answer this question, we need to consider that every smart agent requires to achieve an objective, but this objective is mostly defined by domain experts who can also fail in their estimation of what is desired by the user and what not. Hence, a smart agent has to be able to learn from context history data and estimate or predict what is most likely in certain contexts. Furthermore, different agents with contrary objectives can cause collisions as their actions influence the user’s context and constituting conditions in unintended or uncontrolled ways. We present an approach for dynamically updating a semantic model with respect to the current user context that allows flexibility of the software agents and enhances their conformance in order to improve the user experience. The presented approach adapts rules by learning sensor evidence and user actions using probabilistic reasoning approaches, based on given expert knowledge. The semantic domain model consists basically of device-, service- and user profile representations. In this paper, we present how this semantic domain model can be used in order to compute the probability of matching rules and actions. We apply this probability estimation to compare the current domain model representation with the computed one in order to adapt the formal semantic representation. Our approach aims at minimizing the likelihood of unintended interferences in order to eliminate conflicts and unpredictable side-effects by updating pre-defined expert knowledge according to the most probable context representation. This enables agents to adapt to dynamic changes in the environment which enhances the provision of adequate assistance and affects positively the user satisfaction.

Keywords: ambient intelligence, machine learning, semantic web, software agents

Procedia PDF Downloads 268
504 Purposes of Urdu Translations of the Meanings of Holy Quran

Authors: Muhammad Saleem

Abstract:

The research paper entitled above would be a comprehensive and critical study of translations of the meanings of the Holy Qur’an. The discussion will deal with the targets & purposes of Urdu (National Language of Pakistan) translators of the meanings of the Holy Qur’an. There are more than 400 translations of the meanings of the Holy Qur’an in the Urdu Language. Muslims, non-Muslims and some organizations have made translations of the meanings of the Holy Qur’an to meet various targets. It is observed that all Urdu translators have not translated the Qur’an with a single objective and motivation; rather, some are biased and strive to discredit the Qur’an. Thus, they have made unauthentic and fabricated translations of the Qur’an. Some optimistically believe that they intend to do a service, whereas others pessimistically hold that they treacherously seek to further their rule. Some of them have been observed to be against Islam, starting their activities with spite, but after perceiving the truths of Islam and the miracle and greatness of the Holy Qur’an, they submitted to Islam, embracing it with pure hearts. Some translators made their translations of the meanings of the Holy Qur’an to serve Allah, and some of them have done their translations to earn only. All these translations vary from one to another due to style, trend, type, method and style. Some Urdu translations have been made to fulfill the lingual requirements. Some translations have been made by Muslim scholars to reduce the influence of Urdu translations of the meanings of the Holy Qur’an by Non-Muslims. The article deals with the various purposes of the translators of the meanings of the Holy Qur’an.

Keywords: Qur'an, translation, urdu, language

Procedia PDF Downloads 20
503 Testing of Complicated Bus Bar Protection Using Smart Testing Methodology

Authors: K. N. Dinesh Babu

Abstract:

In this paper, the protection of a complicated bus arrangement with a dual bus coupler and bus sectionalizer using low impedance differential protection applicable for very high voltages like 220kV and 400kV is discussed. In many power generation stations, several operational procedures are implemented to utilize the transfer bus as the main bus and to facilitate the maintenance of circuit breakers and current transformers (in each section) without shutting down the bay(s). Owing to this fact, the complications in operational philosophy have thrown challenges for the bus bar protection implementation. Many bus topologies allow any one of the main buses available in the station to be used as an auxiliary bus. In such a system, pre-defined precautions and procedures are made as guidelines, which are followed before assigning any bus as an auxiliary bus. The procedure involves shifting of links, changing rotary switches, insertion of test block, and so on, thereby causing unreliable operation. This kind of unreliable operation or inadvertent procedural lapse may result in the isolation of the bus bar from the grid due to the unpredictable operation of the bus bar protection relay, which is a commonly occurring phenomenon due to manual mistakes. With the sophisticated configuration and implementation of logic in modern intelligent electronic devices, the operator is free to select the transfer arrangement without sacrificing the protection required by a bus differential system for a reliable operation, and labor-intensive processes are completely eliminated. This paper deals with the procedure to test the security logic for such special scenarios using Megger make SMRT, bus bar protection relay to assure system stability and get rid of all the specific operational precautions/procedure.

Keywords: bus bar protection, by-pass isolator, blind spot, breaker failure, intelligent electronic device, end fault, bus unification, directional principle, zones of protection, breaker re-trip, under voltage security, smart megger relay tester

Procedia PDF Downloads 57
502 Closed Forms of Trigonometric Series Interms of Riemann’s ζ Function and Dirichlet η, λ, β Functions or the Hurwitz Zeta Function and Harmonic Numbers

Authors: Slobodan B. Tričković

Abstract:

We present the results concerned with trigonometric series that include sine and cosine functions with a parameter appearing in the denominator. We derive two types of closed-form formulas for trigonometric series. At first, for some integer values, as we know that Riemann’s ζ function and Dirichlet η, λ equal zero at negative even integers, whereas Dirichlet’s β function equals zero at negative odd integers, after a certain number of members, the rest of the series vanishes. Thus, a trigonometric series becomes a polynomial with coefficients involving Riemann’s ζ function and Dirichlet η, λ, β functions. On the other hand, in some cases, one cannot immediately replace the parameter with any positive integer because we shall encounter singularities. So it is necessary to take a limit, so in the process, we apply L’Hospital’s rule and, after a series of rearrangements, we bring a trigonometric series to a form suitable for the application of Choi-Srivastava’s theorem dealing with Hurwitz’s zeta function and Harmonic numbers. In this way, we express a trigonometric series as a polynomial over Hurwitz’s zeta function derivative.

Keywords: Dirichlet eta lambda beta functions, Riemann's zeta function, Hurwitz zeta function, Harmonic numbers

Procedia PDF Downloads 89
501 Optimal Bayesian Chart for Controlling Expected Number of Defects in Production Processes

Authors: V. Makis, L. Jafari

Abstract:

In this paper, we develop an optimal Bayesian chart to control the expected number of defects per inspection unit in production processes with long production runs. We formulate this control problem in the optimal stopping framework. The objective is to determine the optimal stopping rule minimizing the long-run expected average cost per unit time considering partial information obtained from the process sampling at regular epochs. We prove the optimality of the control limit policy, i.e., the process is stopped and the search for assignable causes is initiated when the posterior probability that the process is out of control exceeds a control limit. An algorithm in the semi-Markov decision process framework is developed to calculate the optimal control limit and the corresponding average cost. Numerical examples are presented to illustrate the developed optimal control chart and to compare it with the traditional u-chart.

Keywords: Bayesian u-chart, economic design, optimal stopping, semi-Markov decision process, statistical process control

Procedia PDF Downloads 559
500 Nutrient Foramina in the Shaft of Long Bones of Upper Limb

Authors: Madala Venkateswara Rao

Abstract:

The major blood supply to the long bones occurs through the nutrient arteries, which enters through the nutrient foramina. This is the study of nutrient Foramina in the shaft of upper limb long bones taken from the department of Anatomy at Narayana medical college nellore. Nutrient foramina play an important role in nutrition and growth of the bones. Most of the nutrient arteries follow the rule, 'to the elbow I go, from the knee I flee' but they are very variable in position. Their number, location, direction & its importance in the growing end of long bones were studied in the long bones of upper limb. The present study has variations in the position & direction of long bones especially in the radius & ulna, as most of the nutrient foramina are found in anterior surface of upper 1/3rd and middle 1/3rd of these bones. The study of nutrient foramina is not only of academic interest but also in medico-legal practice in relation to their position. Careful observation has also been made on the position of nutrient foramina in relation to upper end of long bones. This study also gives importance of length long bones to know the height of an individual. With the knowledge of variations in the nutrient foramen, placement of internal fixation devices can be appropriately done.

Keywords: nutrient artery, nutrient foramina, shaft of long bones, upper limb bones

Procedia PDF Downloads 489
499 A Simulation Study of E-Glass Reinforced Polyurethane Footbed and Investigation of Parameters Effecting Elastic Behaviour of Footbed Material

Authors: Berkay Ergene, Çağın Bolat

Abstract:

In this study, we mainly focused on a simulation study regarding composite footbed in order to contribute to shoe industry. As a footbed, e-glass fiber reinforced polyurethane was determined since polyurethane based materials are already used for footbed in shoe manufacturing frequently. Flat, elliptical and rectangular grooved shoe soles were modeled and analyzed separately as TPU, 10% glass fiber reinforced, 30% glass fiber reinforced and 50% glass fiber reinforced materials according to their properties under three point bending and compression situations to determine the relationship between model, material type and mechanical behaviours of composite model. ANSYS 14.0 APDL mechanical structural module is utilized in all simulations and analyzed stress and strain distributions for different footbed models and materials. Furthermore, materials constants like young modulus, shear modulus, Poisson ratio and density of the composites were calculated theoretically by using composite mixture rule and interpreted for mechanical aspects.

Keywords: composite, elastic behaviour, footbed, simulation

Procedia PDF Downloads 255
498 Roadmaps as a Tool of Innovation Management: System View

Authors: Matich Lyubov

Abstract:

Today roadmaps are becoming commonly used tools for detecting and designing a desired future for companies, states and the international community. The growing popularity of this method puts tasks such as identifying basic roadmapping principles, creation of concepts and determination of the characteristics of the use of roadmaps depending on the objectives as well as restrictions and opportunities specific to the study area on the agenda. However, the system approach, e.g. the elements which are recognized to be major for high-quality roadmapping, remains one of the main fields for improving the methodology and practice of their development as limited research was devoted to the detailed analysis of the roadmaps from the view of system approach. Therefore, this article is an attempt to examine roadmaps from the view of the system analysis, to compare areas, where, as a rule, roadmaps and systems analysis are considered the most effective tools. To compare the structure and composition of roadmaps and systems models the identification of common points between construction stages of roadmaps and system modeling and the determination of future directions for research roadmaps from a systems perspective are of special importance.

Keywords: technology roadmap, roadmapping, systems analysis, system modeling, innovation management

Procedia PDF Downloads 296
497 Growth and Development Parameters of Saanen Kids Raised under Intensive Conditions in Konya/Turkey

Authors: Vahdetti̇n Sariyel, Bi̇rol Dağ

Abstract:

In this research, growth and development parameters in Konya, a private company in Saanen kids reared in intensive conditions in the province were examined. Average birth weights were 3.42, 2.96, 3.57, 3.23 and 2.77 kg for male, female, single, twins and triplets kids. Average weaning weights (three months of age) were 12.65, 12.09, 12.80, 12.65 and 11.68 kg for male, female, single, twins and triplets kids. Average body weights at seven months of age were 20.55, 18.98, 20.12, 20.12 and 19.05 kg for male, female, single, twins and triplets kids respectively. Considering the gender of the live weight factors birth control and rule in favor of the first en ( P <0.01), the second control finally it disappeared statistically significant ( P> 0.05). Main age and the effect of birth weight in the first month, while significant (P < 0.01); The effect of the second month following the live weight of the kid was not significant.

Keywords: Saanen kids, growth, development, body weight

Procedia PDF Downloads 264
496 Radiation Risks for Nurses: The Unrecognized Consequences of ERCP Procedures

Authors: Ava Zarif Sanayei, Sedigheh Sina

Abstract:

Despite the advancement of radiation-free interventions in the gastrointestinal and hepatobiliary fields, endoscopy and endoscopic retrograde cholangiopancreatography (ERCP) remain indispensable procedures that necessitate radiation exposure. ERCP, in particular, relies heavily on radiation-guided imaging to ensure precise delivery of therapy. Meanwhile, interventional radiology (IR) procedures also utilize imaging modalities like X-rays and CT scans to guide therapy, often under local anesthesia via small needle insertion. However, the complexity of these procedures raises concerns about radiation exposure to healthcare professionals, including nurses, who play a crucial role in these interventions. This study aims to assess the radiation exposure to the hands and fingers of nurses 1 and 2, who are directly involved in ERCP procedures utilizing (TLD-100) dosimeters at the Gastrointestinal Endoscopy department of a clinic in Shiraz, Iran. The dosimeters were initially calibrated using various phantoms and then a group was prepared and used over a two-month period. For personal equivalent dose measurement, two TLD chips were mounted on a finger ring to monitor exposure to the hands and fingers. Upon completion of the monitoring period, the TLDs were analyzed using a TLD reader, showing that Nurse 1 received an equivalent dose of 298.26 µSv and Nurse 2 received an equivalent dose of 195.39 µSv. The investigation revealed that the total radiation exposure to the nurses did not exceed the annual limit for occupational exposure. Nevertheless, it is essential to prioritize radiation protection measures to prevent potential harm. The study showed that positioning staff members and placing two nurses in a specific location contributed to somehow equal doses. To reduce exposure further, we suggest providing education and training on radiation safety principles, particularly for technologists.

Keywords: dose measurement, ERCP, interventional radiology, medical imaging

Procedia PDF Downloads 17
495 A Compact Via-less Ultra-Wideband Microstrip Filter by Utilizing Open-Circuit Quarter Wavelength Stubs

Authors: Muhammad Yasir Wadood, Fatemeh Babaeian

Abstract:

By developing ultra-wideband (UWB) systems, there is a high demand for UWB filters with low insertion loss, wide bandwidth, and having a planar structure which is compatible with other components of the UWB system. A microstrip interdigital filter is a great option for designing UWB filters. However, the presence of via holes in this structure creates difficulties in the fabrication procedure of the filter. Especially in the higher frequency band, any misalignment of the drilled via hole with the Microstrip stubs causes large errors in the measurement results compared to the desired results. Moreover, in this case (high-frequency designs), the line width of the stubs are very narrow, so highly precise small via holes are required to be implemented, which increases the cost of fabrication significantly. Also, in this case, there is a risk of having fabrication errors. To combat this issue, in this paper, a via-less UWB microstrip filter is proposed which is designed based on a modification of a conventional inter-digital bandpass filter. The novel approaches in this filter design are 1) replacement of each via hole with a quarter-wavelength open circuit stub to avoid the complexity of manufacturing, 2) using a bend structure to reduce the unwanted coupling effects and 3) minimising the size. Using the proposed structure, a UWB filter operating in the frequency band of 3.9-6.6 GHz (1-dB bandwidth) is designed and fabricated. The promising results of the simulation and measurement are presented in this paper. The selected substrate for these designs was Rogers RO4003 with a thickness of 20 mils. This is a common substrate in most of the industrial projects. The compact size of the proposed filter is highly beneficial for applications which require a very miniature size of hardware.

Keywords: band-pass filters, inter-digital filter, microstrip, via-less

Procedia PDF Downloads 144
494 Pneumoperitoneum Creation Assisted with Optical Coherence Tomography and Automatic Identification

Authors: Eric Yi-Hsiu Huang, Meng-Chun Kao, Wen-Chuan Kuo

Abstract:

For every laparoscopic surgery, a safe pneumoperitoneumcreation (gaining access to the peritoneal cavity) is the first and essential step. However, closed pneumoperitoneum is usually obtained by blind insertion of a Veress needle into the peritoneal cavity, which may carry potential risks suchas bowel and vascular injury.Until now, there remains no definite measure to visually confirm the position of the needle tip inside the peritoneal cavity. Therefore, this study established an image-guided Veress needle method by combining a fiber probe with optical coherence tomography (OCT). An algorithm was also proposed for determining the exact location of the needle tip through the acquisition of OCT images. Our method not only generates a series of “live” two-dimensional (2D) images during the needle puncture toward the peritoneal cavity but also can eliminate operator variation in image judgment, thus improving peritoneal access safety. This study was approved by the Ethics Committee of Taipei Veterans General Hospital (Taipei VGH IACUC 2020-144). A total of 2400 in vivo OCT images, independent of each other, were acquired from experiments of forty peritoneal punctures on two piglets. Characteristic OCT image patterns could be observed during the puncturing process. The ROC curve demonstrates the discrimination capability of these quantitative image features of the classifier, showing the accuracy of the classifier for determining the inside vs. outside of the peritoneal was 98% (AUC=0.98). In summary, the present study demonstrates the ability of the combination of our proposed automatic identification method and OCT imaging for automatically and objectively identifying the location of the needle tip. OCT images translate the blind closed technique of peritoneal access into a visualized procedure, thus improving peritoneal access safety.

Keywords: pneumoperitoneum, optical coherence tomography, automatic identification, veress needle

Procedia PDF Downloads 117
493 Frequent Itemset Mining Using Rough-Sets

Authors: Usman Qamar, Younus Javed

Abstract:

Frequent pattern mining is the process of finding a pattern (a set of items, subsequences, substructures, etc.) that occurs frequently in a data set. It was proposed in the context of frequent itemsets and association rule mining. Frequent pattern mining is used to find inherent regularities in data. What products were often purchased together? Its applications include basket data analysis, cross-marketing, catalog design, sale campaign analysis, Web log (click stream) analysis, and DNA sequence analysis. However, one of the bottlenecks of frequent itemset mining is that as the data increase the amount of time and resources required to mining the data increases at an exponential rate. In this investigation a new algorithm is proposed which can be uses as a pre-processor for frequent itemset mining. FASTER (FeAture SelecTion using Entropy and Rough sets) is a hybrid pre-processor algorithm which utilizes entropy and rough-sets to carry out record reduction and feature (attribute) selection respectively. FASTER for frequent itemset mining can produce a speed up of 3.1 times when compared to original algorithm while maintaining an accuracy of 71%.

Keywords: rough-sets, classification, feature selection, entropy, outliers, frequent itemset mining

Procedia PDF Downloads 423
492 A Theoretical Model for Pattern Extraction in Large Datasets

Authors: Muhammad Usman

Abstract:

Pattern extraction has been done in past to extract hidden and interesting patterns from large datasets. Recently, advancements are being made in these techniques by providing the ability of multi-level mining, effective dimension reduction, advanced evaluation and visualization support. This paper focuses on reviewing the current techniques in literature on the basis of these parameters. Literature review suggests that most of the techniques which provide multi-level mining and dimension reduction, do not handle mixed-type data during the process. Patterns are not extracted using advanced algorithms for large datasets. Moreover, the evaluation of patterns is not done using advanced measures which are suited for high-dimensional data. Techniques which provide visualization support are unable to handle a large number of rules in a small space. We present a theoretical model to handle these issues. The implementation of the model is beyond the scope of this paper.

Keywords: association rule mining, data mining, data warehouses, visualization of association rules

Procedia PDF Downloads 217
491 A Case of Iatrogenic Esophageal Perforation in an Extremely Low Birth Weight Neonate

Authors: Ya-Ching Fu, An-Kuo Chou, Boon-Fatt Tan, Chi-Nien Chen, Wen-Chien Yang, Pou-Leng Cheong

Abstract:

Blind oro-/naso-pharyngeal suction and feeding tube placement are very common practices in neonatal intensive care unit. Though esophageal perforation is a rare complication of these instrumentations, its prevalence is highest in extremely premature neonates. Due to its association with significant morbidity (including respiratory deterioration, pneumothorax, and sepsis) and even mortality, it is an important issue to prevent this iatrogenic complication in the field of premature care. We demonstrate an esophageal perforation in an extreme-low-birth-weight neonate after oro-gastric tube placement. This female baby weighing 680 grams was delivered by caesarean section at 25 weeks of gestational age. She initially received oro-tracheal intubation with mechanical ventilation which was smoothly weaned to non-invasive positive-pressure ventilation at 7-day-old. However, after insertion of a 5-French oro-gastric tube, the baby’s condition suddenly worsened with apnea requiring mechanical ventilation. Her chest radiogram showed the oro-gastric tube in right pleural space, and thus another oro-gastric tube was replaced, and its position was radiographically confirmed. The malpositioned tube was then removed. The baby received 2-week course of intravenous antibiotics for her esophageal perforation. Feeding was then reintroduced and increased to full feeds in a smooth course. She was discharged at 107-day-old. Esophageal perforation in newborn is very rare. Sudden respiratory deterioration in a neonate after naso-/oro-gastric tube placement should alarm us to consider esophageal perforation, and further radiological investigation is required for the diagnosis. Tube materials, patient condition, and age are major risk factors of esophageal perforation. The use of softer tube material, such as silicone, in extreme premature baby might prevent this fetal complication.

Keywords: esophageal perforation, preterm, newborn, feeding tube

Procedia PDF Downloads 262
490 Unreality of Real: Debordean Reading of Gillian Flynn's Gone Girl

Authors: Sahand Hamed Moeel Ardebil, Zohreh Taebi Noghondari, Mahmood Reza Ghorban Sabbagh

Abstract:

Gillian Flynn’s Gone Girl, depicts a society in which, as a result of media dominance, the reality is very precarious and difficult to grasp. In Gone Girl, reality and image of reality represented on TV, are challenging to differentiate. Along with reality, individuals’ agency and independence before media and the capitalist rule are called in to question in the novel. In order to expose the unstable nature of reality and an individual’s complicated relationship with media, this study has deployed the ideas of Marxist-media theorist Guy Debord (1931-1992). In his book Society of the Spectacle (1966), Debord delineates a society in which images replace the objective reality, and people are incapable of making real changes. The results of the current study show that despite their efforts, Nick and Amy, the two main characters of the novel, are no more than spectators with very little agency before the media. Moreover, following Debord’s argument about the replacement of reality with images, everyone and every institution in Gone Girl projects an image that does not necessarily embody the objective reality, a fact that makes it very hard to differentiate the real from unreal.

Keywords: agency, Debord, Gone Girl, media studies, society of spectacle, reality

Procedia PDF Downloads 110