Search results for: Yip Chan Heng
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 256

Search results for: Yip Chan Heng

226 Design of a Remote Radiation Sensing Module Based on Portable Gamma Spectrometer

Authors: Young Gil Kim, Hye Min Park, Chan Jong Park, Koan Sik Joo

Abstract:

A personal gamma spectrometer has to be sensitive, pocket-sized, and carriable on the users. To serve these requirements, we developed the SiPM-based portable radiation detectors. The prototype uses a Ce:GAGG scintillator coupled to a silicon photomultiplier and a radio frequency(RF) module to measure gamma-ray, and can be accessed wirelessly or remotely by mobile equipment. The prototype device consumes roughly 4.4W, weighs about 180g (including battery), and measures 5.0 7.0. It is able to achieve 5.8% FWHM energy resolution at 662keV.

Keywords: Ce:GAGG, gamma-ray, radio frequency, silicon photomultiplier

Procedia PDF Downloads 315
225 A Study on the Magnetic and Submarine Geology Structure of TA22 Seamount in Lau Basin, Tonga

Authors: Soon Young Choi, Chan Hwan Kim, Chan Hong Park, Hyung Rae Kim, Myoung Hoon Lee, Hyeon-Yeong Park

Abstract:

We performed the marine magnetic, bathymetry and seismic survey at the TA22 seamount (in the Lau basin, SW Pacific) for finding the submarine hydrothermal deposits in October 2009. We acquired magnetic and bathymetry data sets by suing Overhouser Proton Magnetometer SeaSPY (Marine Magnetics Co.), Multi-beam Echo Sounder EM120 (Kongsberg Co.). We conducted the data processing to obtain detailed seabed topography, magnetic anomaly, reduction to the pole (RTP) and magnetization. Based on the magnetic properties result, we analyzed submarine geology structure of TA22 seamount with post-processed seismic profile. The detailed bathymetry of the TA22 seamount showed the left and right crest parts that have caldera features in each crest central part. The magnetic anomaly distribution of the TA22 seamount regionally displayed high magnetic anomalies in northern part and the low magnetic anomalies in southern part around the caldera features. The RTP magnetic anomaly distribution of the TA22 seamount presented commonly high magnetic anomalies in the each caldera central part. Also, it represented strong anomalies at the inside of caldera rather than outside flank of the caldera. The magnetization distribution of the TA22 seamount showed the low magnetization zone in the center of each caldera, high magnetization zone in the southern and northern east part. From analyzed the seismic profile map, The TA22 seamount area is showed for the inferred small mounds inside each caldera central part and it assumes to make possibility of sills by the magma in cases of the right caldera. Taking into account all results of this study (bathymetry, magnetic anomaly, RTP, magnetization, seismic profile) with rock samples at the left caldera area in 2009 survey, we suppose the possibility of hydrothermal deposits at mounds in each caldera central part and at outside flank of the caldera representing the low magnetization zone. We expect to have the better results by combined modeling from this study data with the other geological data (ex. detailed gravity, 3D seismic, petrologic study results and etc).

Keywords: detailed bathymetry, magnetic anomaly, seamounts, seismic profile, SW Pacific

Procedia PDF Downloads 381
224 A Study on Using Network Coding for Packet Transmissions in Wireless Sensor Networks

Authors: Rei-Heng Cheng, Wen-Pinn Fang

Abstract:

A wireless sensor network (WSN) is composed by a large number of sensors and one or a few base stations, where the sensor is responsible for detecting specific event information, which is sent back to the base station(s). However, how to save electricity consumption to extend the network lifetime is a problem that cannot be ignored in the wireless sensor networks. Since the sensor network is used to monitor a region or specific events, how the information can be reliably sent back to the base station is surly important. Network coding technique is often used to enhance the reliability of the network transmission. When a node needs to send out M data packets, it encodes these data with redundant data and sends out totally M + R packets. If the receiver can get any M packets out from these M + R packets, it can decode and get the original M data packets. To transmit redundant packets will certainly result in the excess energy consumption. This paper will explore relationship between the quality of wireless transmission and the number of redundant packets. Hopefully, each sensor can overhear the nearby transmissions, learn the wireless transmission quality around it, and dynamically determine the number of redundant packets used in network coding.

Keywords: energy consumption, network coding, transmission reliability, wireless sensor networks

Procedia PDF Downloads 378
223 Machine Learning Invariants to Detect Anomalies in Secure Water Treatment

Authors: Jonathan Heng, Yoong Cheah Huei

Abstract:

A strategic model that does not trigger any false alarms to detect anomalies in Secure Water Treatment (SWaT) test bed is presented. This model uses machine learning invariants formulated from streamlining the general form of Auto-Regressive models with eXogenous input. A creative generalized CUSUM algorithm to integrate the invariants and the detection strategy technique is successfully developed and tested in the SWaT Programmable Logic Controllers (PLCs). Three steps to fine-tune parameters, b and τ in the generalized algorithm are stated and an example used to demonstrate the tuning process is discussed. This approach can swiftly and effectively detect various scopes of cyber-attacks such as multiple points single stage and multiple points multiple stages in SWaT. This technique can be applied in water treatment plants and other cyber physical systems like power and gas plants too.

Keywords: machine learning invariants, generalized CUSUM algorithm with invariants and detection strategy, scope of cyber attacks, strategic model, tuning parameters

Procedia PDF Downloads 169
222 The Feasibility of Online, Interactive Workshops to Facilitate Anatomy Education during the UK COVID-19 Lockdowns

Authors: Prabhvir Singh Marway, Kai Lok Chan, Maria-Ruxandra Jinga, Rachel Bok Ying Lee, Matthew Bok Kit Lee, Krishan Nandapalan, Sze Yi Beh, Harry Carr, Christopher Kui

Abstract:

We piloted a structured series of online workshops on the 3D segmentation of anatomical structures from CT scans. 33 participants were recruited from four UK universities for two-day workshops between 2020 and 2021. Open-source software (3D-Slicer) was used. We hypothesized that active participation via real-time screen-sharing and voice-communication via Discord would enable improved engagement and learning, despite national lockdowns. Written feedback indicated positive learning experiences, with subjective measures of anatomical understanding and software confidence improving.

Keywords: medical education, workshop, segmentation, anatomy

Procedia PDF Downloads 183
221 Audio-Visual Recognition Based on Effective Model and Distillation

Authors: Heng Yang, Tao Luo, Yakun Zhang, Kai Wang, Wei Qin, Liang Xie, Ye Yan, Erwei Yin

Abstract:

Recent years have seen that audio-visual recognition has shown great potential in a strong noise environment. The existing method of audio-visual recognition has explored methods with ResNet and feature fusion. However, on the one hand, ResNet always occupies a large amount of memory resources, restricting the application in engineering. On the other hand, the feature merging also brings some interferences in a high noise environment. In order to solve the problems, we proposed an effective framework with bidirectional distillation. At first, in consideration of the good performance in extracting of features, we chose the light model, Efficientnet as our extractor of spatial features. Secondly, self-distillation was applied to learn more information from raw data. Finally, we proposed a bidirectional distillation in decision-level fusion. In more detail, our experimental results are based on a multi-model dataset from 24 volunteers. Eventually, the lipreading accuracy of our framework was increased by 2.3% compared with existing systems, and our framework made progress in audio-visual fusion in a high noise environment compared with the system of audio recognition without visual.

Keywords: lipreading, audio-visual, Efficientnet, distillation

Procedia PDF Downloads 119
220 Competition and Cooperation of Prosumers in Cournot Games with Uncertainty

Authors: Yong-Heng Shi, Peng Hao, Bai-Chen Xie

Abstract:

Solar prosumers are playing increasingly prominent roles in the power system. However, its uncertainty affects the outcomes and functions of the power market, especially in the asymmetric information environment. Therefore, an important issue is how to take effective measures to reduce the impact of uncertainty on market equilibrium. We propose a two-level stochastic differential game model to explore the Cournot decision problem of prosumers. In particular, we study the impact of punishment and cooperation mechanisms on the efficiency of the Cournot game in which prosumers face uncertainty. The results show that under the penalty mechanism of fixed and variable rates, producers and consumers tend to take conservative actions to hedge risks, and the variable rates mechanism is more reasonable. Compared with non-cooperative situations, prosumers can improve the efficiency of the game through cooperation, which we attribute to the superposition of market power and uncertainty reduction. In addition, the market environment of asymmetric information intensifies the role of uncertainty. It reduces social welfare but increases the income of prosumers. For regulators, promoting alliances is an effective measure to realize the integration, optimization, and stable grid connection of producers and consumers.

Keywords: Cournot games, power market, uncertainty, prosumer cooperation

Procedia PDF Downloads 93
219 Incorporating Priority Round-Robin Scheduler to Sustain Indefinite Blocking Issue and Prioritized Processes in Operating System

Authors: Heng Chia Ying, Charmaine Tan Chai Nie, Burra Venkata Durga Kumar

Abstract:

Process scheduling is the method of process management that determines which process the CPU will proceed with for the next task and how long it takes. Some issues were found in process management, particularly for Priority Scheduling (PS) and Round Robin Scheduling (RR). The proposed recommendations made for IPRRS are to combine the strengths of both into a combining algorithm while they draw on others to compensate for each weakness. A significant improvement on the combining technique of scheduler, Incorporating Priority Round-Robin Scheduler (IPRRS) address an algorithm for both high and low priority task to sustain the indefinite blocking issue faced in the priority scheduling algorithm and minimize the average turnaround time (ATT) and average waiting time (AWT) in RR scheduling algorithm. This paper will delve into the simple rules introduced by IPRRS and enhancements that both PS and RR bring to the execution of processes in the operating system. Furthermore, it incorporates the best aspects of each algorithm to build the optimum algorithm for a certain case in terms of prioritized processes, ATT, and AWT.

Keywords: round Robin scheduling, priority scheduling, indefinite blocking, process management, sustain, turnaround time

Procedia PDF Downloads 121
218 Compilation of Load Spectrum of Loader Drive Axle

Authors: Wei Yongxiang, Zhu Haoyue, Tang Heng, Yuan Qunwei

Abstract:

In order to study the preparation method of gear fatigue load spectrum for loaders, the load signal of four typical working conditions of loader is collected. The signal that reflects the law of load change is obtained by preprocessing the original signal. The torque of the drive axle is calculated by using the rain flow counting method. According to the operating time ratio of each working condition, the two-dimensional load spectrum based on the real working conditions of the drive axle of loader is established by the cycle extrapolation and synthesis method. The two-dimensional load spectrum is converted into one-dimensional load spectrum by means of the mean of torque equal damage method. Torque amplification includes the maximum load torque of the main reduction gear. Based on the theory of equal damage, the accelerated cycles are calculated. In this way, the load spectrum of the loading condition of the drive axle is prepared to reflect loading condition of the loader. The load spectrum can provide reference for fatigue life test and life prediction of loader drive axle.

Keywords: load spectrum, axle, torque, rain-flow counting method, extrapolation

Procedia PDF Downloads 351
217 Phase Equilibria in Zn-Al-Sn Alloy for Lead-free Solder Application

Authors: Ji Chan Kim, Seok Hong Min, Tae Kwon Ha

Abstract:

The effect of Yttrium addition on the microstructure and mechanical properties of Sn-Zn eutectic alloy, which has been attracting intensive focus as a Pb-free solder material, was investigated in this study. Phase equilibrium has been calculated by using FactSage® to evaluate the composition and fraction of equilibrium intermetallic compounds and construct a phase diagram. In the case of Sn-8.8 Zn eutectic alloy, the as-cast microstructure was typical lamellar. With addition of 0.25 wt. %Y, a large amount of pro-eutectic phases have been observed and various YZnx intermetallic compounds were expected to successively form during cooling. Hardness of Sn-8.8 Zn alloy was not affected by Y-addition and both alloys could be rolled by 90% at room temperature.

Keywords: lead-free solder, zn-al-sn alloy, phase equilibrium, rolling, microstructure, hardness

Procedia PDF Downloads 297
216 Data-Driven Approach to Predict Inpatient's Estimated Discharge Date

Authors: Ayliana Dharmawan, Heng Yong Sheng, Zhang Xiaojin, Tan Thai Lian

Abstract:

To facilitate discharge planning, doctors are presently required to assign an Estimated Discharge Date (EDD) for each patient admitted to the hospital. This assignment of the EDD is largely based on the doctor’s judgment. This can be difficult for cases which are complex or relatively new to the doctor. It is hypothesized that a data-driven approach would be able to facilitate the doctors to make accurate estimations of the discharge date. Making use of routinely collected data on inpatient discharges between January 2013 and May 2016, a predictive model was developed using machine learning techniques to predict the Length of Stay (and hence the EDD) of inpatients, at the point of admission. The predictive performance of the model was compared to that of the clinicians using accuracy measures. Overall, the best performing model was found to be able to predict EDD with an accuracy improvement in Average Squared Error (ASE) by -38% as compared to the first EDD determined by the present method. It was found that important predictors of the EDD include the provisional diagnosis code, patient’s age, attending doctor at admission, medical specialty at admission, accommodation type, and the mean length of stay of the patient in the past year. The predictive model can be used as a tool to accurately predict the EDD.

Keywords: inpatient, estimated discharge date, EDD, prediction, data-driven

Procedia PDF Downloads 160
215 Blockchain-Based Approach on Security Enhancement of Distributed System in Healthcare Sector

Authors: Loong Qing Zhe, Foo Jing Heng

Abstract:

A variety of data files are now available on the internet due to the advancement of technology across the globe today. As more and more data are being uploaded on the internet, people are becoming more concerned that their private data, particularly medical health records, are being compromised and sold to others for money. Hence, the accessibility and confidentiality of patients' medical records have to be protected through electronic means. Blockchain technology is introduced to offer patients security against adversaries or unauthorised parties. In the blockchain network, only authorised personnel or organisations that have been validated as nodes may share information and data. For any change within the network, including adding a new block or modifying existing information about the block, a majority of two-thirds of the vote is required to confirm its legitimacy. Additionally, a consortium permission blockchain will connect all the entities within the same community. Consequently, all medical data in the network can be safely shared with all authorised entities. Also, synchronization can be performed within the cloud since the data is real-time. This paper discusses an efficient method for storing and sharing electronic health records (EHRs). It also examines the framework of roles within the blockchain and proposes a new approach to maintain EHRs with keyword indexes to search for patients' medical records while ensuring data privacy.

Keywords: healthcare sectors, distributed system, blockchain, electronic health records (EHR)

Procedia PDF Downloads 175
214 Evaluation of Medicinal Plants, Catunaregam spinosa, Houttuynia cordata, and Rhapis excelsa from Malaysia for Antibacterial, Antifungal and Antiviral Properties

Authors: Yik Sin Chan, Bee Ling Chuah, Wei Quan Chan, Ri Jin Cheng, Yan Hang Oon, Kong Soo Khoo, Nam Weng Sit

Abstract:

Traditionally, medicinal plants have been used to treat different kinds of ailments including infectious diseases. They serve as a good source of lead compounds for the development of new and safer anti-infective agents. This study aimed to investigate the antimicrobial potential of the leaves of three medicinal plants, namely Catunaregam spinosa (Rubiaceae; Mountain pomegranate), Houttuynia cordata (Saururaceae; "fishy-smell herb") and Rhapis excelsa (Arecaceae; “broadleaf lady palm”). The leaves extracts were obtained by sequential extraction using hexane, chloroform, ethyl acetate, ethanol, methanol and water. The antibacterial and antifungal activities were assessed using a colorimetric broth microdilution method against a panel of human pathogenic bacteria (Gram-positive: Bacillus cereus and Staphylococcus aureus; Gram-negative: Escherichia coli, Klebsiella pneumoniae and Pseudomonas aeruginosa) and fungi (yeasts: Candida albicans, Candida parapsilosis and Cryptococcus neoformans; Moulds: Aspergillus fumigatus and Trichophyton mentagrophytes) respectively; while antiviral activity was evaluated against the Chikungunya virus on monkey kidney epithelial (Vero) cells by neutral red uptake assay. All the plant extracts showed bacteriostatic activity, however, only 72% of the extracts (13/18) were found to have bactericidal activity. The lowest minimum inhibitory concentration (MIC) and minimum bactericidal concentration (MBC) were given by the hexane extract of C. spinosa against S. aureus with the values of 0.16 and 0.31 mg/mL respectively. All the extracts also possessed fungistatic activity. Only the hexane, chloroform and ethyl acetate extracts of H. cordata exerted inhibitory activity against A. fumigatus, giving the lowest fungal susceptibility index of 16.7%. In contrast, only 61% of the extracts (11/18) showed fungicidal activity. The ethanol extract of R. excelsa exhibited the strongest fungicidal activity against C. albicans, C. parapsilosis and T. mentagrophytes with minimum fungicidal concentration (MFC) values of 0.04–0.08 mg/mL, in addition to its methanol extract against T. mentagrophytes (MFC=0.02 mg/mL). For anti-Chikungunya virus activity, only chloroform and ethyl acetate extracts of R. excelsa showed significant antiviral activity with 50% effective concentrations (EC50) of 29.9 and 78.1 g/mL respectively. Extracts of R. excelsa warrant further investigations into their active principles responsible for antifungal and antiviral properties.

Keywords: bactericidal, Chikungunya virus, extraction, fungicidal

Procedia PDF Downloads 389
213 Application of Fuzzy Logic to Design and Coordinate Parallel Behaviors for a Humanoid Mobile Robot

Authors: Nguyen Chan Hung, Mai Ngoc Anh, Nguyen Xuan Ha, Tran Xuan Duc, Dang Bao Lam, Nguyen Hoang Viet

Abstract:

This paper presents a design and implementation of a navigation controller for a humanoid mobile robot platform to operate in indoor office environments. In order to fulfil the requirement of recognizing and approaching human to provide service while avoiding random obstacles, a behavior-based fuzzy logic controller was designed to simultaneously coordinate multiple behaviors. Experiments in real office environment showed that the fuzzy controller deals well with complex scenarios without colliding with random objects and human.

Keywords: behavior control, fuzzy logic, humanoid robot, mobile robot

Procedia PDF Downloads 398
212 The Asymmetric Proximal Support Vector Machine Based on Multitask Learning for Classification

Authors: Qing Wu, Fei-Yan Li, Heng-Chang Zhang

Abstract:

Multitask learning support vector machines (SVMs) have recently attracted increasing research attention. Given several related tasks, the single-task learning methods trains each task separately and ignore the inner cross-relationship among tasks. However, multitask learning can capture the correlation information among tasks and achieve better performance by training all tasks simultaneously. In addition, the asymmetric squared loss function can better improve the generalization ability of the models on the most asymmetric distributed data. In this paper, we first make two assumptions on the relatedness among tasks and propose two multitask learning proximal support vector machine algorithms, named MTL-a-PSVM and EMTL-a-PSVM, respectively. MTL-a-PSVM seeks a trade-off between the maximum expectile distance for each task model and the closeness of each task model to the general model. As an extension of the MTL-a-PSVM, EMTL-a-PSVM can select appropriate kernel functions for shared information and private information. Besides, two corresponding special cases named MTL-PSVM and EMTLPSVM are proposed by analyzing the asymmetric squared loss function, which can be easily implemented by solving linear systems. Experimental analysis of three classification datasets demonstrates the effectiveness and superiority of our proposed multitask learning algorithms.

Keywords: multitask learning, asymmetric squared loss, EMTL-a-PSVM, classification

Procedia PDF Downloads 99
211 Radial Distortion Correction Based on the Concept of Verifying the Planarity of a Specimen

Authors: Shih-Heng Tung, Ming-Hsiang Shih, Wen-Pei Sung

Abstract:

Because of the rapid development of digital camera and computer, digital image correlation method has drawn lots of attention recently and has been applied to a variety of fields. However, the image distortion is inevitable when the image is captured through a lens. This image distortion problem can result in an innegligible error while using digital image correlation method. There are already many different ways to correct the image distortion, and most of them require specific image patterns or precise control points. A new distortion correction method is proposed in this study. The proposed method is based on the fact that a flat surface should keep flat when it is measured using three-dimensional (3D) digital image measurement technique. Lens distortion can be divided into radial distortion, decentering distortion and thin prism distortion. Because radial distortion has a more noticeable influence than the other types of distortions, this method deals only with radial distortion. The simplified 3D digital image measurement technique is adopted to measure the surface coordinates of a flat specimen. Then the gradient method is applied to find the best correction parameters. A few experiments are carried out in this study to verify the correctness of this method. The results show that this method can achieve a good accuracy and it is suitable for both large and small distortion conditions. The most important advantage is that it requires neither mark with specific pattern nor precise control points.

Keywords: 3D DIC, radial distortion, distortion correction, planarity

Procedia PDF Downloads 541
210 Heat Transfer from Block Heat Sources Mounted on the Wall of a 3-D Cabinet to Ambient Natural Convective Air Stream

Authors: J. C. Cheng, Y. L. Tsay, Z. D. Chan, C. H. Yang

Abstract:

In this study the physical system under consideration is a three-dimensional (3-D) cabinet with arrays of block heat sources mounted on one of the walls of the cabinet. The block heat sources dissipate heat to the cabinet surrounding through the conjugate conduction and natural convection. The results illustrate that the difference in hot spot temperatures of the system (θH) for the situations with and without consideration of thermal interaction is higher for smaller Rayleigh number (Ra), and can be up to 94.73% as Ra=10^5. In addition, the heat transfer characteristics depends strongly on the dimensionless heat conductivity of cabinet wall (Kwf), heat conductivity of block (Kpf) and length of cabinet (Ax). The maximum reduction in θH is 70.01% when Kwf varies from 10 to 1000, and it is 30.07% for Ax from 0.5 to 1. While the hot spot temperature of system is not sensitive to the cabinet angle (Φ).

Keywords: block heat sources, 3-D cabinet, thermal interaction, heat transfer

Procedia PDF Downloads 542
209 Research of Applicable Ground Reinforcement Method in Double-Deck Tunnel Junction

Authors: SKhan Park, Seok Jin Lee, Jong Sun Kim, Jun Ho Lee, Bong Chan Kim

Abstract:

Because of the large economic losses caused by traffic congestion in metropolitan areas, various studies on the underground network design and construction techniques has been performed various studies in the developed countries. In Korea, it has performed a study to develop a versatile double-deck of deep tunnel model. This paper is an introduction to develop a ground reinforcement method to enable the safe tunnel construction in the weakened pillar section like as junction of tunnel. Applicable ground reinforcement method in the weakened section is proposed and it is expected to verify the method by the field application tests.

Keywords: double-deck tunnel, ground reinforcement, tunnel construction, weakened pillar section

Procedia PDF Downloads 399
208 Experimental Investigation for the Overtopping Wave Force of the Vertical Breakwater

Authors: Jin Song Gui, Han Li, Rui Jin Zhang, Heng Jiang Cai

Abstract:

There is a large deviation between the measured wave power at the vertical breast wall and the calculated one according to current specification in the case of overtopping. In order to investigate the reasons for the deviation, the wave forces of vertical breast wall under overtopping conditions have been measured through physical model experiment and compared with the calculated results. The effect of water depth, period and the wave height on the wave forces of the vertical breast wall have been also investigated. The distribution of wave pressure under different wave actions was tested based on the force sensor which is installed in the vertical breakwater. By comparing and analyzing the measured values and norms calculated values, the applicability of the existing norms recommended method were discussed and a reference for the design of vertical breakwater was provided. Experiment results show that with the decrease of the water depth, the gap is growing between the actual wave forces and the specification values, and there are no obvious regulations between these two values with the variation of period while wave force greatly reduces with the overtopping reducing. The amount of water depth and wave overtopping has a significant impact on the wave force of overtopping section while the period has no obvious influence on the wave force. Finally, some favorable recommendations for the overtopping wave force design of the vertical breakwater according to the model experiment results are provided.

Keywords: overtopping wave, physical model experiment, vertical breakwater, wave forces

Procedia PDF Downloads 292
207 Maximisation of Consumer Welfare in the Enforcement of Intellectual Property Rights in Competition Guidelines: The Malaysian Experience

Authors: Ida Madieha Abdul Ghani Azmi, Heng Gee Lim, Adlan Abdul Razak, Nasaruddin Abdul Rahman

Abstract:

The objective of competition law is to maximise consumer welfare through the regulation of anti-competitive behaviour that results in the distortion of the market. Intellectual property law also seeks to enhance consumer welfare in the long run by encouraging the development of useful devices and processes. Nevertheless, in some circumstances, the IP owners behave in such a way that makes it difficult for rival companies to sell substitute products and technology in the market. Intellectual property owners may also reach a dominant position in the market such that they are able to dictate unfair terms and conditions on other market players. Among the two major categories of anti-competitive behavior is the use of horizontal and vertical agreement to constrain effective competition and abuse of dominant position. As a result, many countries have regulated the conduct of the IP owners that are considered as anti-competitive including the US, Canada, and Singapore. This paper visits the proposed IP Guidelines recently drafted by the Malaysian Competition Commission and investigates to what extent it resolves most of the anti-competitive behavior of the IP owners. The paper concludes by suggesting some of the rules that could be prescribed by the Competition Commission in order to maintain the relevancy of competition law as the main check against the abuse of rights by the intellectual property owners.

Keywords: abuse of dominant position, consumer welfare, intellectual property rights, vertical and horizontal agreements

Procedia PDF Downloads 208
206 Disaster Adaptation Mechanism and Disaster Prevention Adaptation Planning Strategies for Industrial Parks in Response to Climate Change and Different Socio-Economic Disasters

Authors: Jen-Te Pai, Jao-Heng Liu, Shin-En Pai

Abstract:

The impact of climate change has intensified in recent years, causing Taiwan to face higher frequency and serious natural disasters. Therefore, it is imperative for industrial parks manufacturers to promote adaptation policies in response to climate change. On the other hand, with the rise of the international anti-terrorism situation, once a terrorist attack occurs, it will attract domestic and international media attention, especially the strategic and economic status of the science park. Thus, it is necessary to formulate adaptation and mitigation strategies under climate change and social economic disasters. After reviewed the literature about climate change, urban disaster prevention, vulnerability assessment, and risk communication, the study selected 62 industrial parks compiled by the Industrial Bureau of the Ministry of Economic Affairs of Taiwan as the research object. This study explored the vulnerability and disaster prevention and disaster relief functional assessment of these industrial parks facing of natural and socio-economic disasters. Furthermore, this study explored planned adaptation of industrial parks management section and autonomous adaptation of corporate institutions in the park. The conclusion of this study is that Taiwan industrial parks with a higher vulnerability to natural and socio-economic disasters should employ positive adaptive behaviours.

Keywords: adaptive behaviours, analytic network process, vulnerability, industrial parks

Procedia PDF Downloads 127
205 Microstructure and Mechanical Properties of Boron-Containing AZ91D Mg Alloys

Authors: Ji Chan Kim, Seok Hong Min, Tae Kwon Ha

Abstract:

Effect of boron addition on the microstructure and mechanical properties of AZ91D Mg alloy was investigated in this study. Through calculation of phase equilibria, carried out by using FactSage® and FTLite database, solution treatment temperature was decided as 420 °C where supersaturated solid solution can be obtained. Solid solution treatment was conducted at 420 °C for 24 hrs followed by hot rolling at 420 °C and the total reduction was about 60%. Recrystallization heat treatment was followed at 420 °C for 6 hrs to obtain equiaxed microstructure. After recrystallization treatment, aging heat treatment was conducted at temperature of 200 °C for time intervals from 1 min to 200 hrs and hardness of each condition was measured by micro-Vickers method. Peak hardness was observed after 20 hrs. Tensile tests were also conducted on the specimens aged for various time intervals and the results were compared with hardness.

Keywords: AZ91D Mg alloy, boron, heat treatment, microstructure, mechanical properties, hardness

Procedia PDF Downloads 301
204 Thermal Performance of Radial Heat Sinks for LED Applications

Authors: Jongchul Park, Chan Byon

Abstract:

In this study, the thermal performance of radial heat sinks for LED applications is investigated numerically and experimentally. The effect of geometrical parameters such as inner radius, fin height, fin length, and fin spacing, as well as the Elenbaas number, is considered. In addition, the effects of augmentation of concentric ring, perforation, and duct are extensively explored in order to enhance the thermal performance of conventional radial heat sink. The results indicate that the Elenbaas number and the fin radius have a significant effect on the thermal performance of the heat sink. The concentric ring affects the performance much, but the degree of affection is highly dependent on the orientation. The perforation always brings about higher thermal performance. The duct can effectively prevent the bypass of the natural convection flow, which in turn reduces the thermal resistance of the radial heat sink significantly.

Keywords: heat transfer, radial heat sink, LED, Elenbaas

Procedia PDF Downloads 395
203 L2 Acquisition of Tense and Aspect by Cantonese and Mandarin ESL Learners of Different Proficiency Levels

Authors: Mable Chan

Abstract:

The present study about the acquisition of tense and aspect by Cantonese and Mandarin ESL learners aims to investigate the relationship between knowledge, the role that classroom input plays in the development of that knowledge, and learners' use of the L2 knowledge they acquire (i.e. their performance). Chinese has been argued as a tenseless language and Chinese ESL learners have to acquire the property from scratch. The study of acquisition of tense and aspect is a very fruitful research area in second language acquisition for a number of reasons. First, tense and aspect are notorious for being difficult for Chinese ESL learners. Second, to our knowledge, no studies have been done to compare Cantonese and Mandarin ESL learners and age effects in one single study. Data are now being collected and the findings from this comparison study of tense-aspect acquisition will shed light on both theoretical and pedagogical issues in second language acquisition, and contribute to a better understanding of both theoretical aspect concerning L2 acquisition of tense and aspect, and pedagogy of tense for L2 Chinese ESL learners.

Keywords: aspect, second language acquisition, tense, universal grammar

Procedia PDF Downloads 330
202 Designing an Intelligent Voltage Instability System in Power Distribution Systems in the Philippines Using IEEE 14 Bus Test System

Authors: Pocholo Rodriguez, Anne Bernadine Ocampo, Ian Benedict Chan, Janric Micah Gray

Abstract:

The state of an electric power system may be classified as either stable or unstable. The borderline of stability is at any condition for which a slight change in an unfavourable direction of any pertinent quantity will cause instability. Voltage instability in power distribution systems could lead to voltage collapse and thus power blackouts. The researchers will present an intelligent system using back propagation algorithm that can detect voltage instability and output voltage of a power distribution and classify it as stable or unstable. The researchers’ work is the use of parameters involved in voltage instability as input parameters to the neural network for training and testing purposes that can provide faster detection and monitoring of the power distribution system.

Keywords: back-propagation algorithm, load instability, neural network, power distribution system

Procedia PDF Downloads 424
201 An Approach to Addressing Homelessness in Hong Kong: Life Story Approach

Authors: Tak Mau Simon Chan, Ying Chuen Lance Chan

Abstract:

Homelessness has been a popular and controversial debate in Hong Kong, a city which is densely populated and well-known for very expensive housing. The constitution of the homeless as threats to the community and environmental hygiene is ambiguous and debatable in the Hong Kong context. The lack of an intervention model is the critical research gap thus far, aside from the tangible services delivered. The life story approach (LSA), with its unique humanistic orientation, has been well applied in recent decades to depict the needs of various target groups, but not the homeless. It is argued that the life story approach (LSA), which has been employed by health professionals in the landscape of dementia, and health and social care settings, can be used as a reference in the local Chinese context through indigenization. This study, therefore, captures the viewpoints of service providers and users by constructing an indigenous intervention model that refers to the LSA in serving the chronically homeless. By informing 13 social workers and 27 homeless individuals in 8 focus groups whilst 12 homeless individuals have participated in individual in-depth interviews, a framework of LSA in homeless people is proposed. Through thematic analysis, three main themes of their life stories was generated, namely, the family, negative experiences and identity transformation. The three domains solidified framework that not only can be applied to the homeless, but also other disadvantaged groups in the Chinese context. Based on the three domains of family, negative experiences and identity transformation, the model is applied in the daily practices of social workers who help the homeless. The domain of family encompasses familial relationships from the past to the present to the speculated future with ten sub-themes. The domain of negative experiences includes seven sub-themes, with reference to the deviant behavior committed. The last domain, identity transformation, incorporates the awareness and redefining of one’s identity and there are a total of seven sub-themes. The first two domains are important components of personal histories while the third is more of an unknown, exploratory and yet to-be-redefined territory which has a more positive and constructive orientation towards developing one’s identity and life meaning. The longitudinal temporal dimension of moving from the past – present - future enriches the meaning making process, facilitates the integration of life experiences and maintains a more hopeful dialogue. The model is tested and its effectiveness is measured by using qualitative and quantitative methods to affirm the extent that it is relevant to the local context. First, it contributes to providing a clear guideline for social workers who can use the approach as a reference source. Secondly, the framework acts as a new intervention means to address problem saturated stories and the intangible needs of the homeless. Thirdly, the model extends the application to beyond health related issues. Last but not least, the model is highly relevant to the local indigenous context.

Keywords: homeless, indigenous intervention, life story approach, social work practice

Procedia PDF Downloads 282
200 Trends in Conservation and Inheritance of Musical Culture of Ethnic Groups: A Case Study of the Akha Music in Chiang Rai Province, Thailand

Authors: Nutthan Inkhong, Sutthiphong Ruangchante

Abstract:

Chiang Rai province is located at the northern border of Thailand. Most of the geography there is the northern continental highlands, and the population has many types of inhabitants, including Thai people, immigrants and ethnic groups such as Akha, Lahu, Lisu, Yao, etc. Most of these ethnic groups migrated from neighbouring countries such as Myanmar, Laos, China, etc. and settled in the mountains. Each ethnic group has their unique traditions, culture, and ways of life, including the musical culture that the ancestors of each ethnic group brought with them. In the present, the Akha have the largest population in the region and still live together in numerous villages in many districts. Thus, Akha musical culture still appears in the community traditions and cultural events of Chiang Rai province regularly. This article presents the situations of Akha musical culture in the present and the predictions for the future. The study method involves the analysis of music information and the related social contexts, which were collected from the fieldwork of ethnomusicological methodology by in-depth interviews, observations, audio and visual recordings, and related documents. The results found that the important persons who are related with Akha musical culture include (1) a musical instrument maker (lives in Mae Chan district) who produces various Akha musical instruments, including gourd mouth organs, Akha drums, two-way flutes, three-hole flutes, Jew’s harps (the sound of teenage love), buffalo horns (the sound symbol of hunting) and bird call instruments (the imitation of bird sounds), (2) a folk philosopher (lives in Mae Pha Luang district) who can teach music to the new generation of Akha people as well as lecture and demonstrate music to academics and tourists, and (3) a community leader (lives in Mae Chan district) who conserves Akha performances, singing and music through various activities of the students in an informal school. Because of the changes to the social contexts and ways of life of the Akha people, such as the educational system, religion, social media, etc., including the popularity of both Thai and international popular music among the new generation of Akha people, changes to and the fading away of Akha musical culture in the future may likely occur. Therefore, the conservation and inheritance of Akha music is an issue that should be resolved quickly. This primary study leads to the next step of the ethnomusicological work and plays a part in preventing or reducing the problems impacting Akha musical culture survival by the recording of Akha music in all of its dimensions, such as producing musical instruments, playing musical instruments, analysis of tuning systems, recording Akha music as musical notation using symbols, researching related social contexts, etc. and the transcription of this information to create lessons that can be returned to the Akha community.

Keywords: Akha music, Chiang Rai, ethnic music in Thailand, ethnomusicology

Procedia PDF Downloads 145
199 Anti-Inflammatory Effect of Myristic Acid through Inhibiting NF-κB and MAPK Signaling Pathways in Lipopolysaccharide-Stimulated RAW 264.7 Macrophage Cells

Authors: Hyun Ji Hyun, Hyo Sun Suh, Min Kook Kim, Yong Chan Kwon, Byung-Mu Lee

Abstract:

Scope: This study is focused on the effect of myristic acid on LPS-induced inflammation in RAW 264.7 macrophage cells. Methods and results: For the experiment, RAW 264.7 mouse macrophage cell line was used. Results showed that treatment with myristic acid can attenuate LPS-induced inflammation. Moreover, myristic acid significantly suppressed expression of inflammatory mediators and down-regulating UVB-induced intracellular ROS generation. Furthermore, myristic acid reduced the expression of NF-κB by inhibiting degradation of IκB-α and ERK, JNK, and p38 pathways by inhibiting phosphorylation in RAW 264.7 macrophage cells. Conclusion: Overall, these data suggest that the myristic acid could reduce LPS-induced inflammation. Acknowledgment: This research was supported by the Ministry of Trade, Industry & Energy(MOTIE), Korea Institute for Advancement of Technology(KIAT) through the Encouragement Program for The Industries of Economic Cooperation Region

Keywords: anti-inflammation, myristic acid, ROS, ultraviolet light

Procedia PDF Downloads 187
198 Three Dimensional Large Eddy Simulation of Blood Flow and Deformation in an Elastic Constricted Artery

Authors: Xi Gu, Guan Heng Yeoh, Victoria Timchenko

Abstract:

In the current work, a three-dimensional geometry of a 75% stenosed blood vessel is analysed. Large eddy simulation (LES) with the help of a dynamic subgrid scale Smagorinsky model is applied to model the turbulent pulsatile flow. The geometry, the transmural pressure and the properties of the blood and the elastic boundary were based on clinical measurement data. For the flexible wall model, a thin solid region is constructed around the 75% stenosed blood vessel. The deformation of this solid region was modelled as a deforming boundary to reduce the computational cost of the solid model. Fluid-structure interaction is realised via a two-way coupling between the blood flow modelled via LES and the deforming vessel. The information of the flow pressure and the wall motion was exchanged continually during the cycle by an arbitrary lagrangian-eulerian method. The boundary condition of current time step depended on previous solutions. The fluctuation of the velocity in the post-stenotic region was analysed in the study. The axial velocity at normalised position Z=0.5 shows a negative value near the vessel wall. The displacement of the elastic boundary was concerned in this study. In particular, the wall displacement at the systole and the diastole were compared. The negative displacement at the stenosis indicates a collapse at the maximum velocity and the deceleration phase.

Keywords: Large Eddy Simulation, Fluid Structural Interaction, constricted artery, Computational Fluid Dynamics

Procedia PDF Downloads 285
197 Performance Analysis of Vision-Based Transparent Obstacle Avoidance for Construction Robots

Authors: Siwei Chang, Heng Li, Haitao Wu, Xin Fang

Abstract:

Construction robots are receiving more and more attention as a promising solution to the manpower shortage issue in the construction industry. The development of intelligent control techniques that assist in controlling the robots to avoid transparency and reflected building obstacles is crucial for guaranteeing the adaptability and flexibility of mobile construction robots in complex construction environments. With the boom of computer vision techniques, a number of studies have proposed vision-based methods for transparent obstacle avoidance to improve operation accuracy. However, vision-based methods are also associated with disadvantages such as high computational costs. To provide better perception and value evaluation, this study aims to analyze the performance of vision-based techniques for avoiding transparent building obstacles. To achieve this, commonly used sensors, including a lidar, an ultrasonic sensor, and a USB camera, are equipped on the robotic platform to detect obstacles. A Raspberry Pi 3 computer board is employed to compute data collecting and control algorithms. The turtlebot3 burger is employed to test the programs. On-site experiments are carried out to observe the performance in terms of success rate and detection distance. Control variables include obstacle shapes and environmental conditions. The findings contribute to demonstrating how effectively vision-based obstacle avoidance strategies for transparent building obstacle avoidance and provide insights and informed knowledge when introducing computer vision techniques in the aforementioned domain.

Keywords: construction robot, obstacle avoidance, computer vision, transparent obstacle

Procedia PDF Downloads 65