Search results for: Long Short Term Memory
4671 The Effect of Non-Surgical Periodontal Therapy on Metabolic Control in Children
Authors: Areej Al-Khabbaz, Swapna Goerge, Majedah Abdul-Rasoul
Abstract:
Introduction: The most prevalent periodontal disease among children is gingivitis, and it usually becomes more severe in adolescence. A number of intervention studies suggested that resolution of periodontal inflammation can improve metabolic control in patients diagnosed with diabetes mellitus. Aim: to assess the effect of non-surgical periodontal therapy on glycemic control of children diagnosed with diabetes mellitus. Method: Twenty-eight children diagnosed with diabetes mellitus were recruited with established diagnosis diabetes for at least 1 year. Informed consent and child assent form were obtained from children and parents prior to enrolment. The dental examination for the participants was performed on the same week directly following their annual medical assessment. All patients had their glycosylated hemoglobin (HbA1c%) test one week prior to their annual medical and dental visit and 3 months following non-surgical periodontal therapy. All patients received a comprehensive periodontal examination The periodontal assessment included clinical attachment loss, bleeding on probing, plaque score, plaque index and gingival index. All patients were referred for non-surgical periodontal therapy, which included oral hygiene instruction and motivation followed by supra-gingival and subg-ingival scaling using ultrasonic and hand instruments. Statistical Analysis: Data were entered and analyzed using the Statistical Package for Social Science software (SPSS, Chicago, USA), version 18. Statistical analysis of clinical findings was performed to detect differences between the two groups in term of periodontal findings and HbA1c%. Binary logistic regression analysis was performed in order to examine which factors were significant in multivariate analysis after adjusting for confounding between effects. The regression model used the dependent variable ‘Improved glycemic control’, and the independent variables entered in the model were plaque index, gingival index, bleeding %, plaque Statistical significance was set at p < 0.05. Result: A total of 28 children. The mean age of the participants was 13.3±1.92 years. The study participants were divided into two groups; Compliant group (received dental scaling) and non-complaints group (received oral hygiene instructions only). No statistical difference was found between compliant and non-compliant group in age, gender distribution, oral hygiene practice and the level of diabetes control. There was a significant difference between compliant and non-compliant group in term of improvement of HBa1c before and after periodontal therapy. Mean gingival index was the only significant variable associated with improved glycemic control level. In conclusion, this study has demonstrated that non-surgical mechanical periodontal therapy can improve HbA1c% control. The result of this study confirmed that children with diabetes mellitus who are compliant to dental care and have routine professional scaling may have better metabolic control compared to diabetic children who are erratic with dental care.Keywords: children, diabetes, metabolic control, periodontal therapy
Procedia PDF Downloads 1664670 Iranian Refinery Vacuum Residue Upgrading Using Microwave Irradiation: Effects of Catalyst Type and Amount
Authors: Zarrin Nasri
Abstract:
Microwave irradiation is an innovative technology in the petroleum industry. This kind of energy has been considered to convert vacuum residue of oil refineries into useful products. The advantages of microwaves energy are short time, fast heating, high energy efficiency, and precise process control. In this paper, the effects of catalyst type and amount have been investigated on upgrading of vacuum residue using microwave irradiation. The vacuum residue used in this research is from Tehran oil refinery, Iran. Additives include different catalysts, active carbon as sensitizer, and sodium borohydride as a solid hydrogen donor. Various catalysts contain iron, nickel, molybdenum disulfide, iron oxide and copper. The amount of catalysts in two cases of presence and absence of sodium borohydride have been evaluated. The objective parameters include temperature, asphaltene, viscosity, and API. The specifications of vacuum residue are API, 8.79, viscosity, 16391 cSt (60°C), asphaltene, 13.3 wt %. The results show that there is a significant difference between the effects of catalysts. Among the used catalysts, Fe powder is the best catalyst for upgrading vacuum residue using microwave irradiation and resulted in asphaltene reduction, 31.3 %; viscosity reduction, 76.43 %; and 23.43 % in API increase.Keywords: asphaltene, microwave, upgrading, vacuum residue, viscosity
Procedia PDF Downloads 2594669 Mapping of Electrical Energy Consumption Yogyakarta Province in 2014-2025
Authors: Alfi Al Fahreizy
Abstract:
Yogyakarta is one of the provinces in Indonesia that often get a power outage because of high load electrical consumption. The authors mapped the electrical energy consumption [GWh] for the province of Yogyakarta in 2014-2025 using LEAP (Long-range Energy Alternatives Planning system) software. This paper use BAU (Business As Usual) scenario. BAU scenario in which the projection is based on the assumption that growth in electricity consumption will run as normally as before. The goal is to be able to see the electrical energy consumption in the household sector, industry , business, social, government office building, and street lighting. The data is the data projected statistical population and consumption data electricity [GWh] 2010, 2011, 2012 in Yogyakarta province.Keywords: LEAP, energy consumption, Yogyakarta, BAU
Procedia PDF Downloads 6014668 Currency As National Narrative: A Semiotic Analysis Of Philippine Banknote Design
Authors: Raneshka Angela Gudes, Krisje Alessandria Nagal, Angeline Patero, Kimberly Sweet
Abstract:
This study examines how Philippine banknote designs function as semiotic texts that communicate messages of power and authority, shaping national identity and historical consciousness. Drawing from Roland Barthes' critique of power and Benedict Anderson's concept of imagined communities, the research analyzes the interplay of connotation and denotation in the current series of Philippine banknotes. The study addresses the following research questions: (1) What semiotic elements on Philippine banknotes convey messages of power and authority? (2) How do the design elements on Philippine banknotes reflect historical and political power dynamics in the Philippines? (3) In what ways do the representations on Philippine banknotes shape or reinforce national narratives of power and identity? Using a semiotic analysis framework, the study deconstructs visual and textual elements such as portraits, landmarks, and symbolic motifs to uncover underlying narratives. Findings reveal that the connotative meanings of the banknotes emphasize political authority through the depiction of historical figures and monuments linked to significant events, while denotative aspects project neutrality by portraying these elements as universally accepted symbols of the nation. These representations obscure marginalized histories and present a curated narrative aligning with dominant ideologies. The banknotes ultimately reinforce the idea of a unified national identity while perpetuating selective historical memory. This research highlights the critical role of currency design in narrating national identity and underscores its implications for cultural and political discourse. By decoding the semiotics of banknote designs, this study contributes to understanding how everyday objects mediate power and identity construction.Keywords: philippine banknotes, power, currency design, semiotics
Procedia PDF Downloads 124667 Students’ Academic and Personal Needs: Basis for a Guidance Program
Authors: Susan Marie R. De La Cruz, Bernadette F. De La Cruz, Georgia D. Demavibas
Abstract:
This study determined the top 10 perceived students’ academic needs, personal needs, personal obstacles in achieving their academic goals, are as they need assistance, and their perceived feelings in math, reading and writing. The North Carolina State College, Student Support Services needs assessment survey was used. The respondents were the randomly chosen122Graduate school students. The top 10 academic needs are as follows: need to improve memory, communication skills, study habits, time management skills, career decisions, vocabulary, math skills, test taking skills, reading comprehension, and the need to reduce math anxiety. Top 10 personal needs are as follows: difficulty meeting deadline, difficulty managing money, inadequate computer skills, afraid of failing graduate school, difficulty participating in class/group discussions, absence from school, anxiety during exams, little or no experience with internet, personal counseling needs, and unsure of university academic procedures. Students’ top 10 perceived personal obstacles were as follows: issues surrounding sickness in family, lack of time management, lack of money, feeling tired, fears to speak in class, poor study habits, problems at home, late in class, too shy, and always feeling sick and easily distracted. Students felt need assistance in areas surrounding personal budget, stress management, motivation, anxiety, depressions, leadership development and goals/decision making. It is recommended that enrichment activities be provided to respond to students’ academic and personal needs. Also, Graduate School Guidance Counselor collaborates with other licensed Guidance Counselors in other colleges to have a well-coordinated and effective delivery of services responsive to students’ needs.Keywords: academic needs, guidance counsellors, guidance service, needs assessment survey, personal needs, student services
Procedia PDF Downloads 3414666 Top-Down Influences to Multistable Perception: Evidence from Temporal Dynamics
Authors: Daria N. Podvigina, Tatiana V. Chernigovskaya
Abstract:
We have studied the temporal characteristics of bistable perception of the stimuli of two types: one involves alterations in a perceived depth and another one has an ambiguous content. We used the Necker lattice and lines of shadowed circles ambiguously perceived either as spheres or holes as stimuli of the first type. The Winson figure (the Eskimo/Indian picture) was a stimulus of the second type. We have analyzed how often the reversals occurred (reversal rate) and for how long each of the two interpretations, or percepts, was observed during one presentation (stability durations). For all three ambiguous images the reversal rate and the stability durations had similar values, which provide another evidence for a significant role of top-down processes in multistable perception.Keywords: multistable perception, perceived depth, reversal rate, top-down processes
Procedia PDF Downloads 5894665 Endocrine Therapy Resistance and Epithelial to Mesenchymal Transition Inhibits by INT3 & Quercetin in MCF7 Cell Lines
Authors: D. Pradhan, G. Tripathy, S. Pradhan
Abstract:
Objectives: Imperviousness gainst estrogen treatments is a noteworthy reason for infection backslide and mortality in estrogen receptor alpha (ERα)- positive breast diseases. Tamoxifen or estrogen withdrawal builds the reliance of breast malignancy cells on INT3 flagging. Here, we researched the commitment of Quercetin and INT3 motioning in endocrine-safe breast tumor cells. Methods: We utilized two models of endocrine treatments safe (ETR) breast tumor: Tamoxifen-safe (TamR) and long haul estrogen-denied (LTED) MCF7 cells. We assessed the transitory and intrusive limit of these cells by Transwell cells. Articulation of epithelial to mesenchymal move (EMT) controllers and in addition INT3 receptors and targets were assessed by constant PCR and western smudge investigation. Besides, we tried in-vitro hostile to Quercetin monoclonal Antibodies (mAbs) and Gamma Secretase Inhibitors (GSIs) as potential EMT inversion remedial specialists. At last, we created stable Quercetin overexpressing MCF7 cells and assessed their EMT components and reaction to Tamoxifen. Results: We found that ETR cells procured an Epithelial to Mesenchymal move (EMT) phenotype and showed expanded levels of Quercetin and INT3 targets. Interestingly, we distinguished more elevated amount of INT3 however lower levels of INT1 and INT3 proposing a change to motioning through distinctive INT3 receptors after obtaining of resistance. Against Quercetin monoclonal antibodies and the GSI PF03084014 were powerful in obstructing the Quercetin/INT3 pivot and in part repressing the EMT process. As a consequence of this, cell relocation and attack were weakened and the immature microorganism like populace was essentially decreased. Hereditary hushing of Quercetin and INT3 prompted proportionate impacts. At long last, stable overexpression of Quercetin was adequate to make MCF7 lethargic to Tamoxifen by INT3 initiation. Conclusions: ETR cells express abnormal amounts of Quercetin and INT3, whose actuation eventually drives intrusive conduct. Hostile to Quercetin mAbs and GSI PF03084014 lessen articulation of EMT particles decreasing cell obtrusiveness. Quercetin overexpression instigates Tamoxifen resistance connected to obtaining of EMT phenotype. Our discovering propose that focusing on Quercetin and INT3 warrants further clinical Correlation as substantial restorative methodologies in endocrine-safe breast.Keywords: endocrine, epithelial, mesenchymal, INT3, quercetin, MCF7
Procedia PDF Downloads 3084664 [Keynote Talk]: Thermal Performance of Common Building Insulation Materials: Operating Temperature and Moisture Effect
Authors: Maatouk Khoukhi
Abstract:
An accurate prediction of the heat transfer through the envelope components of building is required to achieve an accurate cooling/heating load calculation which leads to precise sizing of the hvac equipment. This also depends on the accuracy of the thermal conductivity of the building insulation material. The proper use of thermal insulation in buildings (k-value) contribute significantly to reducing the HVAC size and consequently the annual energy cost. The first part of this paper presents an overview of building thermal insulation and their applications. The second part presents some results related to the change of the polystyrene insulation thermal conductivity with the change of the operating temperature and the moisture. Best-fit linear relationship of the k-value in term of the operating temperatures and different percentage of moisture content by weight has been established. The thermal conductivity of the polystyrene insulation material increases with the increase of both operating temperature and humidity content.Keywords: building insulation material, moisture content, operating temperature, thermal conductivity
Procedia PDF Downloads 3284663 Background Knowledge and Reading Comprehension in ELT Classes: A Pedagogical Perspective
Authors: Davoud Ansari Kejal, Meysam Sabour
Abstract:
For long, there has been a belief that a reader can easily comprehend a text if he is strong enough in vocabulary and grammatical knowledge but there was no account for the ability of understanding different subjects based on readers’ understanding of the surrounding world which is called world background knowledge. This paper attempts to investigate the reading comprehension process applying the schema theory as an influential factor in comprehending texts, in order to prove the important role of background knowledge in reading comprehension. Based on the discussion, some teaching methods are suggested for employing world background knowledge for an elaborated teaching of reading comprehension in an active learning environment in EFL classes.Keywords: background knowledge, reading comprehension, schema theory, ELT classes
Procedia PDF Downloads 4604662 A Curricular Approach to Organizational Mentoring Programs: The Integrated Mentoring Curriculum Model
Authors: Christopher Webb
Abstract:
This work presents a new model of mentoring in an organizational environment and has important implications for both practice and research, the model frames the organizational environment as organizational curriculum, which includes the elements that affect learning within the organization. This includes the organizational structure and culture, roles within the organization, and accessibility of knowledge. The program curriculum includes the elements of the mentoring program, including materials, training, and scheduled events for the program participants. The term dyadic curriculum is coined in this work. The dyadic curriculum describes the participation, behavior, and identities of the pairs participating in mentorships. This also includes the identity work of the participants and their views of each other. Much of this curriculum is unprescribed and is unique within each dyad. It describes how participants mediate the elements of organizational and program curricula. These three curricula interact and affect each other in predictable ways. A detailed example of a mentoring program framed in this model is provided.Keywords: curriculum, mentoring, organizational learning and development, social learning
Procedia PDF Downloads 2064661 DeepLig: A de-novo Computational Drug Design Approach to Generate Multi-Targeted Drugs
Authors: Anika Chebrolu
Abstract:
Mono-targeted drugs can be of limited efficacy against complex diseases. Recently, multi-target drug design has been approached as a promising tool to fight against these challenging diseases. However, the scope of current computational approaches for multi-target drug design is limited. DeepLig presents a de-novo drug discovery platform that uses reinforcement learning to generate and optimize novel, potent, and multitargeted drug candidates against protein targets. DeepLig’s model consists of two networks in interplay: a generative network and a predictive network. The generative network, a Stack- Augmented Recurrent Neural Network, utilizes a stack memory unit to remember and recognize molecular patterns when generating novel ligands from scratch. The generative network passes each newly created ligand to the predictive network, which then uses multiple Graph Attention Networks simultaneously to forecast the average binding affinity of the generated ligand towards multiple target proteins. With each iteration, given feedback from the predictive network, the generative network learns to optimize itself to create molecules with a higher average binding affinity towards multiple proteins. DeepLig was evaluated based on its ability to generate multi-target ligands against two distinct proteins, multi-target ligands against three distinct proteins, and multi-target ligands against two distinct binding pockets on the same protein. With each test case, DeepLig was able to create a library of valid, synthetically accessible, and novel molecules with optimal and equipotent binding energies. We propose that DeepLig provides an effective approach to design multi-targeted drug therapies that can potentially show higher success rates during in-vitro trials.Keywords: drug design, multitargeticity, de-novo, reinforcement learning
Procedia PDF Downloads 1044660 SCR-Stacking Structure with High Holding Voltage for IO and Power Clamp
Authors: Hyun Young Kim, Chung Kwang Lee, Han Hee Cho, Sang Woon Cho, Yong Seo Koo
Abstract:
In this paper, we proposed a novel SCR (Silicon Controlled Rectifier) - based ESD (Electrostatic Discharge) protection device for I/O and power clamp. The proposed device has a higher holding voltage characteristic than conventional SCR. These characteristics enable to have latch-up immunity under normal operating conditions as well as superior full chip ESD protection. The proposed device was analyzed to figure out electrical characteristics and tolerance robustness in term of individual design parameters (D1, D2, D3). They are investigated by using the Synopsys TCAD simulator. As a result of simulation, holding voltage increased with different design parameters. The holding voltage of the proposed device changes from 3.3V to 7.9V. Also, N-Stack structure ESD device with the high holding voltage is proposed. In the simulation results, 2-stack has holding voltage of 6.8V and 3-stack has holding voltage of 10.5V. The simulation results show that holding voltage of stacking structure can be larger than the operation voltage of high-voltage application.Keywords: ESD, SCR, holding voltage, stack, power clamp
Procedia PDF Downloads 5614659 Computational Model for Predicting Effective siRNA Sequences Using Whole Stacking Energy (ΔG) for Gene Silencing
Authors: Reena Murali, David Peter S.
Abstract:
The small interfering RNA (siRNA) alters the regulatory role of mRNA during gene expression by translational inhibition. Recent studies shows that up regulation of mRNA cause serious diseases like Cancer. So designing effective siRNA with good knockdown effects play an important role in gene silencing. Various siRNA design tools had been developed earlier. In this work, we are trying to analyze the existing good scoring second generation siRNA predicting tools and to optimize the efficiency of siRNA prediction by designing a computational model using Artificial Neural Network and whole stacking energy (ΔG), which may help in gene silencing and drug design in cancer therapy. Our model is trained and tested against a large data set of siRNA sequences. Validation of our results is done by finding correlation coefficient of experimental versus observed inhibition efficacy of siRNA. We achieved a correlation coefficient of 0.727 in our previous computational model and we could improve the correlation coefficient up to 0.753 when the threshold of whole tacking energy is greater than or equal to -32.5 kcal/mol.Keywords: artificial neural network, double stranded RNA, RNA interference, short interfering RNA
Procedia PDF Downloads 5274658 Photocatalytic Glucose Electrooxidation Applications of Titanium Dioxide Supported CD and CdTe Catalysts
Authors: Hilal Kivrak, Aykut ÇağLar, Nahit Aktaş, Ali Osman Solak
Abstract:
At present, Cd/TiO₂ and CdTe/TiO₂ catalysts are prepared via sodium borohydride (NaBH4) reduction method. These catalysts are characterized by fourier transform infrared spectroscopy (FTIR) and scanning electron microscopy (SEM). These Cd/TiO₂ and CdTe/TiO₂ are employed as catalysts for the photocatalytic oxidation of glucose. Cyclic voltammetry (CV), chronoamperometry (CA), and electrochemical impedance spectroscopy (EIS) measurements are used to investigate their glucose electrooxidation activities of catalysts at long and under UV illumination (ʎ=354 nm). CdTe/TiO₂ catalyst is showed the best photocatalytic glucose electrooxidation activity compared to Cd/TiO₂ catalyst.Keywords: cadmium, NaBH4 reduction method, photocatalytic glucose electrooxidation, Tellerium, TiO2
Procedia PDF Downloads 2804657 Waste Management in a Hot Laboratory of Japan Atomic Energy Agency – 2: Condensation and Solidification Experiments on Liquid Waste
Authors: Sou Watanabe, Hiromichi Ogi, Atsuhiro Shibata, Kazunori Nomura
Abstract:
As a part of STRAD project conducted by JAEA, condensation of radioactive liquid waste containing various chemical compounds using reverse osmosis (RO) membrane filter was examined for efficient and safety treatment of the liquid wastes accumulated inside hot laboratories. NH4+ ion in the feed solution was successfully concentrated, and NH4+ ion involved in the effluents became lower than target value; 100 ppm. Solidification of simulated aqueous and organic liquid wastes was also tested. Those liquids were successfully solidified by adding cement or coagulants. Nevertheless, optimization in materials for confinement of chemicals is required for long time storage of the final solidified wastes.Keywords: condensation, radioactive liquid waste, solidification, STRAD project
Procedia PDF Downloads 1624656 Real-Time Network Anomaly Detection Systems Based on Machine-Learning Algorithms
Authors: Zahra Ramezanpanah, Joachim Carvallo, Aurelien Rodriguez
Abstract:
This paper aims to detect anomalies in streaming data using machine learning algorithms. In this regard, we designed two separate pipelines and evaluated the effectiveness of each separately. The first pipeline, based on supervised machine learning methods, consists of two phases. In the first phase, we trained several supervised models using the UNSW-NB15 data-set. We measured the efficiency of each using different performance metrics and selected the best model for the second phase. At the beginning of the second phase, we first, using Argus Server, sniffed a local area network. Several types of attacks were simulated and then sent the sniffed data to a running algorithm at short intervals. This algorithm can display the results of each packet of received data in real-time using the trained model. The second pipeline presented in this paper is based on unsupervised algorithms, in which a Temporal Graph Network (TGN) is used to monitor a local network. The TGN is trained to predict the probability of future states of the network based on its past behavior. Our contribution in this section is introducing an indicator to identify anomalies from these predicted probabilities.Keywords: temporal graph network, anomaly detection, cyber security, IDS
Procedia PDF Downloads 1064655 MegaProjects and the Governing Processes That Lead to Success and Failure: A Literature Review
Authors: Fangwei Zhu, Wei Tian, Linzhuo Wang, Miao Yu
Abstract:
Megaproject has long been a critical issue in project governance, for its low success rate and large impact on society. Although the extant literature on megaproject governance is vast, to our best knowledge, the lacking of a thorough literature review makes it hard for us to gain a holistic view on current scenario of megaproject governance. The study conducts a systematic literature review process to analyze the existing literatures on megaproject governance. The finding indicates that mega project governance needs to be handled at network level and forming a network level governance provides a holistic framework for governing megaproject towards sustainable development of the projects. Theoretical and practical implications, as well as future studies and limitations, were discussed.Keywords: megaproject, governance, literature review, network
Procedia PDF Downloads 2024654 The Lived Experiences of Fathers with Children Who Have Cerebral Palsy: An Interpretative Phenomenological Analysis
Authors: Krizette Ladera
Abstract:
Fathers are there not only to provide the financial stability of a family but a father is also there to provide the love and support that usually people would see as the mother’s responsibility. To describe the lived experiences and how fathers make sense of their lived experiences with their children who have cerebral palsy is the main objective of the study. A qualitative research using a thematic analysis was used for the study. The qualitative research focused on the personal narratives, self-report and expression of the participant’s memory in terms of how they tell their stories. The interpretative phenomenological analysis was used to focus on the experience of the participants on how they will describe their experiences, and to also add on that the IPA will also attempt to describe and explain the meaning of human experiences using interview, specifically on the father who have a child that suffers from cerebral palsy. For the sampling technique, the snowball technique was used to gather participants from the referral of other participants. The five non-randomly selected fathers will be served as the participants for the research. A self-made interview with an open-ended question was used as the research instrument; it includes profiling of the respondent as well as their experiences in taking care of their child that suffers from cerebral palsy. In analyzing a data, the researcher used the thematic analysis where in the interview was made into a transcript, then it was organized and divided themes. After that, the relations of each themes, was identified and it was later documented and translated into written text format using thematic grouping. Finally, the researcher analyzed each data according to its themes and put it in a table to be presented in the result section of the study And as for the result of the study, the researcher was able to come up with the four (4) main themes that most of the participants experienced and those are: The experiences in finding out about the condition of the Child, disclosing the condition of the child to the family and its emotional effect, The experiences of living the day of day realities in providing the physical, financial, emotional and a well balanced environment to the child, and the religious perspectives of the fathers. Along with those four (4) themes comes the subtheme which explains the themes in a more detailed explanation.Keywords: cerebral palsy, children, fathers, lived experiences
Procedia PDF Downloads 2074653 High Speed Image Rotation Algorithm
Authors: Hee-Choul Kwon, Hyungjin Cho, Heeyong Kwon
Abstract:
Image rotation is one of main pre-processing step in image processing or image pattern recognition. It is implemented with rotation matrix multiplication. However it requires lots of floating point arithmetic operations and trigonometric function calculations, so it takes long execution time. We propose a new high speed image rotation algorithm without two major time-consuming operations. We compare the proposed algorithm with the conventional rotation one with various size images. Experimental results show that the proposed algorithm is superior to the conventional rotation ones.Keywords: high speed rotation operation, image processing, image rotation, pattern recognition, transformation matrix
Procedia PDF Downloads 5094652 A Prototype of an Information and Communication Technology Based Intervention Tool for Children with Dyslexia
Authors: Rajlakshmi Guha, Sajjad Ansari, Shazia Nasreen, Hirak Banerjee, Jiaul Paik
Abstract:
Dyslexia is a neurocognitive disorder, affecting around fifteen percent of the Indian population. The symptoms include difficulty in reading alphabet, words, and sentences. This can be difficult at the phonemic or recognition level and may further affect lexical structures. Therapeutic intervention of dyslexic children post assessment is generally done by special educators and psychologists through one on one interaction. Considering the large number of children affected and the scarcity of experts, access to care is limited in India. Moreover, unavailability of resources and timely communication with caregivers add on to the problem of proper intervention. With the development of Educational Technology and its use in India, access to information and care has been improved in such a large and diverse country. In this context, this paper proposes an ICT enabled home-based intervention program for dyslexic children which would support the child, and provide an interactive interface between expert, parents, and students. The paper discusses the details of the database design and system layout of the program. Along with, it also highlights the development of different technical aids required to build out personalized android applications for the Indian dyslexic population. These technical aids include speech database creation for children, automatic speech recognition system, serious game development, and color coded fonts. The paper also emphasizes the games developed to assist the dyslexic child on cognitive training primarily for attention, working memory, and spatial reasoning. In addition, it talks about the specific elements of the interactive intervention tool that makes it effective for home based intervention of dyslexia.Keywords: Android applications, cognitive training, dyslexia, intervention
Procedia PDF Downloads 2954651 Effect on the Integrity of the DN300 Pipe and Valves in the Cooling Water System Imposed by the Pipes and Ventilation Pipes above in an Earthquake Situation
Authors: Liang Zhang, Gang Xu, Yue Wang, Chen Li, Shao Chong Zhou
Abstract:
Presently, more and more nuclear power plants are facing the issue of life extension. When a nuclear power plant applies for an extension of life, its condition needs to meet the current design standards, which is not fine for all old reactors, typically for seismic design. Seismic-grade equipment in nuclear power plants are now generally placed separately from the non-seismic-grade equipment, but it was not strictly required before. Therefore, it is very important to study whether non-seismic-grade equipment will affect the seismic-grade equipment when dropped down in an earthquake situation, which is related to the safety of nuclear power plants and future life extension applications. This research was based on the cooling water system with the seismic and non-seismic grade equipment installed together, as an example to study whether the non-seismic-grade equipment such as DN50 fire pipes and ventilation pipes arranged above will damage the DN300 pipes and valves arranged below when earthquakes occur. In the study, the simulation was carried out by ANSYS / LY-DYNA, and Johnson-Cook was used as the material model and failure model. For the experiments, the relative positions of objects in the room were restored by 1: 1. In the experiment, the pipes and valves were filled with water with a pressure of 0.785 MPa. The pressure-holding performance of the pipe was used as a criterion for damage. In addition to the pressure-holding performance, the opening torque was considered as well for the valves. The research results show that when the 10-meter-long DN50 pipe was dropped from the position of 8 meters height and the 8-meter-long air pipe dropped from a position of 3.6 meters height, they do not affect the integrity of DN300 pipe below. There is no failure phenomenon in the simulation as well. After the experiment, the pressure drop in two hours for the pipe is less than 0.1%. The main body of the valve does not fail either. The opening torque change after the experiment is less than 0.5%, but the handwheel of the valve may break, which affects the opening actions. In summary, impacts of the upper pipes and ventilation pipes dropdown on the integrity of the DN300 pipes and valves below in a cooling water system of a typical second-generation nuclear power plant under an earthquake was studied. As a result, the functionality of the DN300 pipeline and the valves themselves are not significantly affected, but the handwheel of the valve or similar articles can probably be broken and need to take care.Keywords: cooling water system, earthquake, integrity, pipe and valve
Procedia PDF Downloads 1164650 Phase II Monitoring of First-Order Autocorrelated General Linear Profiles
Authors: Yihua Wang, Yunru Lai
Abstract:
Statistical process control has been successfully applied in a variety of industries. In some applications, the quality of a process or product is better characterized and summarized by a functional relationship between a response variable and one or more explanatory variables. A collection of this type of data is called a profile. Profile monitoring is used to understand and check the stability of this relationship or curve over time. The independent assumption for the error term is commonly used in the existing profile monitoring studies. However, in many applications, the profile data show correlations over time. Therefore, we focus on a general linear regression model with a first-order autocorrelation between profiles in this study. We propose an exponentially weighted moving average charting scheme to monitor this type of profile. The simulation study shows that our proposed methods outperform the existing schemes based on the average run length criterion.Keywords: autocorrelation, EWMA control chart, general linear regression model, profile monitoring
Procedia PDF Downloads 4644649 An Entropy Based Novel Algorithm for Internal Attack Detection in Wireless Sensor Network
Authors: Muhammad R. Ahmed, Mohammed Aseeri
Abstract:
Wireless Sensor Network (WSN) consists of low-cost and multi functional resources constrain nodes that communicate at short distances through wireless links. It is open media and underpinned by an application driven technology for information gathering and processing. It can be used for many different applications range from military implementation in the battlefield, environmental monitoring, health sector as well as emergency response of surveillance. With its nature and application scenario, security of WSN had drawn a great attention. It is known to be valuable to variety of attacks for the construction of nodes and distributed network infrastructure. In order to ensure its functionality especially in malicious environments, security mechanisms are essential. Malicious or internal attacker has gained prominence and poses the most challenging attacks to WSN. Many works have been done to secure WSN from internal attacks but most of it relay on either training data set or predefined threshold. Without a fixed security infrastructure a WSN needs to find the internal attacks is a challenge. In this paper we present an internal attack detection method based on maximum entropy model. The final experimental works showed that the proposed algorithm does work well at the designed level.Keywords: internal attack, wireless sensor network, network security, entropy
Procedia PDF Downloads 4584648 Cardiometabolic Risk Factors Responses to Supplemental High Intensity Exercise in Middle School Children
Authors: R. M. Chandler, A. J. Stringer
Abstract:
In adults, short bursts of high-intensity exercise (intensities between 80-95% of maximum heart rates) increase cardiovascular and metabolic function without the time investment of traditional aerobic training. Similar improvements in various health indices are also becoming increasingly evident in children in countries other than the United States. In the United States, physical education programs have become shorter in length and fewer in frequency. With this in the background, it is imperative that health and physical educators delivered well-organized and focused fitness programs that can be tolerated across many different somatotypes. Perhaps the least effective lag-time in a US physical education (PE) class is the first 10 minutes, a time during which children warm up. Replacing a traditional PE warmup with a 10 min high-intensity excise protocol is a time-efficient method to impact health, leaving as much time for other PE material such as skill development, motor behavior development as possible. This supplemented 10 min high-intensity exercise increases cardiovascular function as well as induces favorable body composition changes in as little as six weeks with further enhancement throughout a semester of activity. The supplemental high-intensity exercise did not detract from the PE lesson outcomes.Keywords: cardiovascular fitness, high intensity interval training, high intensity exercise, pediatric
Procedia PDF Downloads 1394647 Contributions at the Define of the Vortex Plane Cyclic Motion
Authors: Petre Stan, Marinica Stan
Abstract:
In this paper, a new way to define the vortex plane cyclic motion is exposed, starting from the physical cause of reacting the vortex. The Navier-Stokes equations are used in cylindrical coordinates for viscous fluids in laminar motion, and are integrated in case of a infinite long revolving cylinder which rotates around a pintle in a viscous fluid that occupies the entire space up to infinite. In this way, a revolving field of velocities in fluid is obtained, having the shape of a vortex in which the intensity is obtained objectively, being given by the physical phenomenon that generates this vortex.Keywords: cylindrical coordinates, Navier-Stokes equations, viscous fluid, vortex plane
Procedia PDF Downloads 1334646 Facial Biometric Privacy Using Visual Cryptography: A Fundamental Approach to Enhance the Security of Facial Biometric Data
Authors: Devika Tanna
Abstract:
'Biometrics' means 'life measurement' but the term is usually associated with the use of unique physiological characteristics to identify an individual. It is important to secure the privacy of digital face image that is stored in central database. To impart privacy to such biometric face images, first, the digital face image is split into two host face images such that, each of it gives no idea of existence of the original face image and, then each cover image is stored in two different databases geographically apart. When both the cover images are simultaneously available then only we can access that original image. This can be achieved by using the XM2VTS and IMM face database, an adaptive algorithm for spatial greyscale. The algorithm helps to select the appropriate host images which are most likely to be compatible with the secret image stored in the central database based on its geometry and appearance. The encryption is done using GEVCS which results in a reconstructed image identical to the original private image.Keywords: adaptive algorithm, database, host images, privacy, visual cryptography
Procedia PDF Downloads 1344645 Education for Sustainable Development and Primary Education in China: A Case Study
Authors: Ronghui (Kevin) Zhou
Abstract:
This research intends to explore the enactment of Education for Sustainable Development (ESD), in term of the ESD concept, in primary schools in China, and investigate the factors that have positively or negatively impacted the outcome of ESD in urban primary schools in China. The proposed research question is: how is the ESD concept perceived and enacted by the local education stakeholders. This research is conducted in multiple primary schools in China and has questionnaired and interviewed multiple education stakeholders, including school principals, school teachers, and bureau from the municipal Ministry of Education. Factor analysis, regression analysis, and critical discourse analysis are adopted to interpret and analyze the data. The preliminary findings suggest that contested ESD definition, education system pressures, education policy enforcement, and power dynamics between stakeholders are the key factors that have determined to what degree is ESD enacted, and to what extent is ESD practiced in primary schools in China.Keywords: education for sustainable development, China, primary education, case study
Procedia PDF Downloads 1714644 Analysis of Tannins from Padus asiatica
Authors: Telmen Dashdondov, Selenge Erdenechimeg
Abstract:
Padus asiatica contains large quantities of polyphenolic compounds, and it is one of the most consumed fruits throughout the country. These compounds have the biological activity of the fruit and have long been used in traditional Mongolian medicine for diarrhea, coughs, pneumonia, and gastritis. In this study, we studied the solvents that can be used to make extracts from dried raw fruits; in order to determine the amount of tannin in Padus asiatica, we selected three solvents: distilled water, 20% ethanol, and 40% ethanol, and determined the amount of tannin. As a result, the amount of extract (distilled water) was 11.8%, the amount of extract (20% ethanol) was 15.7%, and the amount of extract (40% ethanol) was 8.2%. Therefore, it was found that tannins are extracted better in 20% ethanol solution.Keywords: Padus asiatica, tannin, diarrhea, Mongolian medicinal plant
Procedia PDF Downloads 1654643 An Epsilon Hierarchical Fuzzy Twin Support Vector Regression
Authors: Arindam Chaudhuri
Abstract:
The research presents epsilon- hierarchical fuzzy twin support vector regression (epsilon-HFTSVR) based on epsilon-fuzzy twin support vector regression (epsilon-FTSVR) and epsilon-twin support vector regression (epsilon-TSVR). Epsilon-FTSVR is achieved by incorporating trapezoidal fuzzy numbers to epsilon-TSVR which takes care of uncertainty existing in forecasting problems. Epsilon-FTSVR determines a pair of epsilon-insensitive proximal functions by solving two related quadratic programming problems. The structural risk minimization principle is implemented by introducing regularization term in primal problems of epsilon-FTSVR. This yields dual stable positive definite problems which improves regression performance. Epsilon-FTSVR is then reformulated as epsilon-HFTSVR consisting of a set of hierarchical layers each containing epsilon-FTSVR. Experimental results on both synthetic and real datasets reveal that epsilon-HFTSVR has remarkable generalization performance with minimum training time.Keywords: regression, epsilon-TSVR, epsilon-FTSVR, epsilon-HFTSVR
Procedia PDF Downloads 3794642 ISIS after the Defeat of the Islamic Caliphate: The Rise of Cyber-Jihad
Authors: Spyridon Plakoudas
Abstract:
After the capture of Al-Raqqah and the defeat of the short-lived Islamic Caliphate in 2017, everyone predicted the end of ISIS. However, ISIS proved far more resilient than initially thought. The militant group quickly regrouped from its defeat and started a low-intensity guerrilla campaign in central Iraq (near Kirkuk and Mosul) and north-eastern Syria (near Deir ez-Zorr). At the same time, ISIS doubled down on its cyber-campaign; actually, ISIS is as active on the cyber-domain as during the peak of its power in 2015. This paper, a spin-off paper from a co-authored book on the Syrian Civil War (due to be published by Rowman and Littlefield), intends to examine how ISIS operates in the cyber-domain and how this "Cyber-Caliphate" under re-construction is associated with its post-2017 strategy. This paper will draw on the discipline of War Studies (with an emphasis on Cyber-Security and Insurgency / Counter-Insurgency) and will benefit from the insights of interviewed experts on the field (e.g., Hassan Hasssan). This paper will explain how the successful operation of ISIS in the cyber-space preserves the myth of the “caliphate” amongst its worldwide followers (against the odds) and sustains the group’s ongoing insurgency in Syria and Iraq; in addition, this paper will suggest how this cyber-threat can be countered best.Keywords: ISIS, cyber-jihad, Syrian Civil War, cyber-terrorism, insurgency and counter-insurgency
Procedia PDF Downloads 139