Search results for: parent node
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 963

Search results for: parent node

393 DCASH: Dynamic Cache Synchronization Algorithm for Heterogeneous Reverse Y Synchronizing Mobile Database Systems

Authors: Gunasekaran Raja, Kottilingam Kottursamy, Rajakumar Arul, Ramkumar Jayaraman, Krithika Sairam, Lakshmi Ravi

Abstract:

The synchronization server maintains a dynamically changing cache, which contains the data items which were requested and collected by the mobile node from the server. The order and presence of tuples in the cache changes dynamically according to the frequency of updates performed on the data, by the server and client. To synchronize, the data which has been modified by client and the server at an instant are collected, batched together by the type of modification (insert/ update/ delete), and sorted according to their update frequencies. This ensures that the DCASH (Dynamic Cache Synchronization Algorithm for Heterogeneous Reverse Y synchronizing Mobile Database Systems) gives priority to the frequently accessed data with high usage. The optimal memory management algorithm is proposed to manage data items according to their frequency, theorems were written to show the current mobile data activity is reverse Y in nature and the experiments were tested with 2g and 3g networks for various mobile devices to show the reduced response time and energy consumption.

Keywords: mobile databases, synchronization, cache, response time

Procedia PDF Downloads 368
392 A 3D Model of the Sustainable Management of the Natural Environment in National Parks

Authors: Paolo Russu

Abstract:

This paper investigates the economic and ecological dynamics that emerge in Protected Areas (PAs) as a result of interactions between visitors to the area and the animals that live there. We suppose that the PAs contain two species whose interactions are determined by the Lotka-Volterra equations system. Visitors' decisions to visit PAs are influenced by the entrance cost required to enter the park as well as the chance of witnessing the species that live there. Visitors have contradictory effects on the species and thus on the sustainability of the protected areas: on the one hand, an increase in the number of tourists damages the natural habitat of the areas and thus the species living there; on the other hand, it increases the total amount of entrance fees that the managing body of the PAs can use to perform defensive expenditures that protect the species from extinction. For a given set of parameter values, the existence of saddle-node bifurcation, Hopf bifurcation, homoclinic orbits, and a Bogdanov–Takens bifurcation of codimension two has been investigated. The system displays periodic doubling and chaotic solutions, as demonstrated by numerical examples. Pontryagin's Maximum Principle was utilized to develop an optimal admission charge policy that maximized both social gain and ecosystem conservation.

Keywords: environmental preferences, singularities point, dynamical system, chaos

Procedia PDF Downloads 72
391 Investigation of FoxM1 Gene Expression in Breast Cancer and Its Relationship with miR-216b-5p Expression Level

Authors: Neda Menbari, Ramin Mehdiabadi

Abstract:

Background: breast cancer remains a critical global health issue, constituting a leading cause of cancer-related mortality in women. MicroRNAs (miRs) are natural RNA molecules that play an important role in cellular processes and regulate post-transcriptional gene expression. MiR-216b-5p is a miR that acts as a tumor suppressor. The expression levels of FoxM1 and miR-216b-5p in malignant and control cells have been evaluated by quantitative polymerase chain reaction (qPCR) technique and flow cytometry. Results: the results of this study revealed a significant downregulation of miR-216b-5p in cancerous cells compared to the control MCF-10A cells (P=0.0004). Interestingly, the expression of miR-216b-5p exhibited an inverse relationship with key clinical indicators such as tumor size, grade, and lymph node invasion. Conclusion: The study's findings showed the prognostic value of miR-216b-5p levels in breast cancer, and its reduced expression correlates with unfavorable tumor characteristics. This research recommends performing more studies on the role of FoxM1 and miR-216b-5p in breast cancer pathology which potentially paving the way for targeted therapeutic interventions.

Keywords: breast cancer, gene expression, FOXM1, microRNA

Procedia PDF Downloads 25
390 Agent Based Location Management Protocol for Mobile Adhoc Networks

Authors: Mallikarjun B. Channappagoudar, Pallapa Venkataram

Abstract:

The dynamic nature of Mobile adhoc network (MANET) due to mobility and disconnection of mobile nodes, leads to various problems in predicting the movement of nodes and their location information updation, for efficient interaction among the application specific nodes. Location management is one of the main challenges to be considered for an efficient service provision to the applications of a MANET. In this paper, we propose a location management protocol, for locating the nodes of a MANET and to maintain uninterrupted high-quality service for distributed applications by intelligently anticipating the change of location of its nodes. The protocol predicts the node movement and application resource scarcity, does the replacement with the chosen nodes nearby which have less mobility and rich in resources, with the help of both static and mobile agents, and maintains the application continuity by providing required network resources. The protocol has been simulated using Java Agent Development Environment (JADE) Framework for agent generation, migration and communication. It consumes much less time (response time), gives better location accuracy, utilize less network resources, and reduce location management overhead.

Keywords: mobile agent, location management, distributed applications, mobile adhoc network

Procedia PDF Downloads 364
389 WSN System Warns Atta Cephalotes Climbing in Mango Fruit Trees

Authors: Federico Hahn Schlam, Fermín Martínez Solís

Abstract:

Leaf-cutting ants (Atta cephalotes) forage from mango tree leaves and flowers to feed their colony. Farmers find it difficult to control ants due to the great quantity of trees grown in commercial orchards. In this article, IoT can support farmers for ant detection in real time, as production losses can be considered of 324 US per tree.A wireless sensor network, WSN, was developed to warn the farmer from ant presence in trees during a night. Mango trees were gathered into groups of 9 trees, where the central tree holds the master microcontroller, and the other eight trees presented slave microcontrollers (nodes). At each node, anemitter diode-photodiode unitdetects ants climbing up. A capacitor is chargedand discharged after being sampled every ten minutes. The system usesBLE (Bluetooth Low Energy) to communicate between the master microcontroller by BLE.When ants were detected the number of the tree was transmitted via LoRa from the masterto the producer smartphone to warn him. In this paper, BLE, LoRa, and energy consumption were studied under variable vegetation in the orchard. During 2018, 19 trees were attacked by ants, and ants fed 26.3% of flowers and 73.7% of leaves.

Keywords: BLE, atta cephalotes, LoRa, WSN-smartphone, energy consumption

Procedia PDF Downloads 132
388 Aspect-Level Sentiment Analysis with Multi-Channel and Graph Convolutional Networks

Authors: Jiajun Wang, Xiaoge Li

Abstract:

The purpose of the aspect-level sentiment analysis task is to identify the sentiment polarity of aspects in a sentence. Currently, most methods mainly focus on using neural networks and attention mechanisms to model the relationship between aspects and context, but they ignore the dependence of words in different ranges in the sentence, resulting in deviation when assigning relationship weight to other words other than aspect words. To solve these problems, we propose a new aspect-level sentiment analysis model that combines a multi-channel convolutional network and graph convolutional network (GCN). Firstly, the context and the degree of association between words are characterized by Long Short-Term Memory (LSTM) and self-attention mechanism. Besides, a multi-channel convolutional network is used to extract the features of words in different ranges. Finally, a convolutional graph network is used to associate the node information of the dependency tree structure. We conduct experiments on four benchmark datasets. The experimental results are compared with those of other models, which shows that our model is better and more effective.

Keywords: aspect-level sentiment analysis, attention, multi-channel convolution network, graph convolution network, dependency tree

Procedia PDF Downloads 180
387 High Performance Field Programmable Gate Array-Based Stochastic Low-Density Parity-Check Decoder Design for IEEE 802.3an Standard

Authors: Ghania Zerari, Abderrezak Guessoum, Rachid Beguenane

Abstract:

This paper introduces high-performance architecture for fully parallel stochastic Low-Density Parity-Check (LDPC) field programmable gate array (FPGA) based LDPC decoder. The new approach is designed to decrease the decoding latency and to reduce the FPGA logic utilisation. To accomplish the target logic utilisation reduction, the routing of the proposed sub-variable node (VN) internal memory is designed to utilize one slice distributed RAM. Furthermore, a VN initialization, using the channel input probability, is achieved to enhance the decoder convergence, without extra resources and without integrating the output saturated-counters. The Xilinx FPGA implementation, of IEEE 802.3an standard LDPC code, shows that the proposed decoding approach attain high performance along with reduction of FPGA logic utilisation.

Keywords: low-density parity-check (LDPC) decoder, stochastic decoding, field programmable gate array (FPGA), IEEE 802.3an standard

Procedia PDF Downloads 275
386 Parent’s Perspective about the Impact of Digital Storytelling on a Child’s Moral Development in the Early Years

Authors: Hina Abdul Majeed

Abstract:

The story has a powerful impact on the human mind of all age groups. There are various ways to tell stories; one of the forms is digital storytelling. Digital storytelling is getting popular nowadays; it mainly catalyzes a child's holistic development in the early years. Thus, this study's primary purpose is to explore parents' perception of the impact of digital storytelling on developing children's moral values and the change that occurs in child's moral behavior and attitude using the digital storytelling tool. Literature was reviewed by exploring the recent studies on digital stories and their impact on child's development. This study was based on a mixed-method approach, considering qualitative and quantitative research designs. The population for this study included parents of early years children who resided in Karachi. However, parents of two to six years old children were targeted as samples by selecting using a purposive sample method. Thus, 100 parents were chosen for the quantitative survey, and five parents were interviewed to collect qualitative data. Questionnaires were developed for collecting data from parents through surveys and interviews. The SPSS was used to analyze the quantitative data, and the parents' responses collected during discussions were presented in narrative form. The findings show that the impact of digital storytelling, in most parents' opinion, is positive in inculcating moral values in their children. Moreover, parents also endorse the changes in child's behavior and attitude due to digital stories.

Keywords: digital storytelling, moral development, early years, parents

Procedia PDF Downloads 52
385 Performance Effects of Demergers in India

Authors: Pavak Vyas, Hiral Vyas

Abstract:

Spin-offs commonly known as demergers in India, represents dismantling of conglomerates which is a common phenomenon in financial markets across the world. Demergers are carried out with different motives. A demerger generally refers to a corporate restructuring where, a large company divests its stake in in its subsidiary and distributes the shares of the subsidiary - demerged entity to the existing shareholders without any consideration. Demergers in Indian companies are over a decade old phenomena, with many companies opting for the same. This study examines the demerger regulations in Indian capital markets and the announcement period price reaction of demergers during year 2010-2015. We study total 97 demerger announcements by companies listed in India and try to establish that demergers results into abnormal returns for the shareholders of the parent company. Using event study methodology we have analyzed the security price performance of the announcement day effect 10 days prior to announcement to 10 days post demerger announcement. We find significant out-performance of the security over the benchmark index post demerger announcements. The cumulative average abnormal returns range from 3.71% on the day of announcement of a private demerger to 2.08% following 10 days surrounding the announcement, and cumulative average abnormal returns range from 5.67% on the day of announcement of a public demerger to 4.15% following10 days surrounding the announcement.

Keywords: demergers, event study, spin offs, stock returns

Procedia PDF Downloads 276
384 Effect of Weld Build-up on the Mechanical Performance of Railway Wheels

Authors: Abdullah Kaymakci, Daniel M. Madyira, Hilda Moseme

Abstract:

Repairing railway wheels by weld build-up is one of the technological solutions that have been applied in the past. However, the effects of this process on the material properties are not well established. The effects of the weld build-up on the mechanical properties of the wheel material in comparison to the required mechanical properties for proper service performance were investigated in this study. A turning process was used to remove the worn surface from the railway wheel. During this process 5mm thickness was removed to ensure that, if there was any weld build-up done in the previous years, it was removed. This was followed by welding a round bar on the sides of the wheel to provide build-up guide. There were two welding processes performed, namely submerged arc welding (SAW) and gas metal arc welding (GMAW). Submerged arc welding (SAW) was used to build up weld on one rim while the other rim was just left with metal arc welding of the round bar at the edges. Both processes produced hardness values that were lower than that of the parent material of 195 HV as the GMAW welds had an average of 184 HV and SAW had an average of 194 HV. Whilst a number of defects were noted on the GMAW welds at both macro and micro levels, SAW welds had less defects and they were all micro defects. All the microstructures were ferritic but with differences in grain sizes. Furthermore, in the SAW weld build up, the grains of the weld build-up appeared to be elongated which was a result of the cooling rate. Using GMAW instead of SAW would result in improved wear and fatigue performance.

Keywords: submerged arc welding, gas metal arc welding, railway wheel, microstructure, micro hardness

Procedia PDF Downloads 285
383 A Phenomenal Study of Parental Attitudes towards the Professional Education of Their Daughters in Karachi

Authors: Nusrat Ali, Muhammad Saleem Khan

Abstract:

Education is the process of bringing individuals aware of their own reality in a manner that leads them to the effective adjustment with the environment. Females’ participation is vital to reducing hunger and poverty and promoting the family welfare. Education is the right of men and women both. Female education is more needed rural areas as compared to urban areas. Without educating the women of the country we cannot think of developing our nation. It is a fact that women are the first teachers of their children. Hence, if mothers are well educated, they can play an important role in shaping and molding of their sons and daughters. The main purpose of study was to identify the barriers of female education and the attitude among the parents. The present study researchers selected a quantitative study to explore the highlighting problem in the particular areas. Through the stratified random sampling selected a sample size from each stratum and generalized whole population. Chi-square test was used to test the validity of the data. The conclusion shows attitudes of parents somehow influence their daughters’ education, particularly those who are living in countryside. Another a big challenge of female education is co-education system in our society is higher which directly subjected to parents unfavorable attitude towards their daughters’ education. In this modern era various organizations are working for female education in rural areas where females are considered as house working ladies, now it’s time to work more to change parent’s attitude towards their daughter’s education.

Keywords: parental attitude, professional education, daughter, unfavorable attitude

Procedia PDF Downloads 276
382 Simplified 3R2C Building Thermal Network Model: A Case Study

Authors: S. M. Mahbobur Rahman

Abstract:

Whole building energy simulation models are widely used for predicting future energy consumption, performance diagnosis and optimum control.  Black box building energy modeling approach has been heavily studied in the past decade. The thermal response of a building can also be modeled using a network of interconnected resistors (R) and capacitors (C) at each node called R-C network. In this study, a model building, Case 600, as described in the “Standard Method of Test for the Evaluation of Building Energy Analysis Computer Program”, ASHRAE standard 140, is studied along with a 3R2C thermal network model and the ASHRAE clear sky solar radiation model. Although building an energy model involves two important parts of building component i.e., the envelope and internal mass, the effect of building internal mass is not considered in this study. All the characteristic parameters of the building envelope are evaluated as on Case 600. Finally, monthly building energy consumption from the thermal network model is compared with a simple-box energy model within reasonable accuracy. From the results, 0.6-9.4% variation of monthly energy consumption is observed because of the south-facing windows.

Keywords: ASHRAE case study, clear sky solar radiation model, energy modeling, thermal network model

Procedia PDF Downloads 120
381 Using Hidden Markov Chain for Improving the Dependability of Safety-Critical Wireless Sensor Networks

Authors: Issam Alnader, Aboubaker Lasebae, Rand Raheem

Abstract:

Wireless sensor networks (WSNs) are distributed network systems used in a wide range of applications, including safety-critical systems. The latter provide critical services, often concerned with human life or assets. Therefore, ensuring the dependability requirements of Safety critical systems is of paramount importance. The purpose of this paper is to utilize the Hidden Markov Model (HMM) to elongate the service availability of WSNs by increasing the time it takes a node to become obsolete via optimal load balancing. We propose an HMM algorithm that, given a WSN, analyses and predicts undesirable situations, notably, nodes dying unexpectedly or prematurely. We apply this technique to improve on C. Lius’ algorithm, a scheduling-based algorithm which has served to improve the lifetime of WSNs. Our experiments show that our HMM technique improves the lifetime of the network, achieved by detecting nodes that die early and rebalancing their load. Our technique can also be used for diagnosis and provide maintenance warnings to WSN system administrators. Finally, our technique can be used to improve algorithms other than C. Liu’s.

Keywords: wireless sensor networks, IoT, dependability of safety WSNs, energy conservation, sleep awake schedule

Procedia PDF Downloads 75
380 Data Clustering in Wireless Sensor Network Implemented on Self-Organization Feature Map (SOFM) Neural Network

Authors: Krishan Kumar, Mohit Mittal, Pramod Kumar

Abstract:

Wireless sensor network is one of the most promising communication networks for monitoring remote environmental areas. In this network, all the sensor nodes are communicated with each other via radio signals. The sensor nodes have capability of sensing, data storage and processing. The sensor nodes collect the information through neighboring nodes to particular node. The data collection and processing is done by data aggregation techniques. For the data aggregation in sensor network, clustering technique is implemented in the sensor network by implementing self-organizing feature map (SOFM) neural network. Some of the sensor nodes are selected as cluster head nodes. The information aggregated to cluster head nodes from non-cluster head nodes and then this information is transferred to base station (or sink nodes). The aim of this paper is to manage the huge amount of data with the help of SOM neural network. Clustered data is selected to transfer to base station instead of whole information aggregated at cluster head nodes. This reduces the battery consumption over the huge data management. The network lifetime is enhanced at a greater extent.

Keywords: artificial neural network, data clustering, self organization feature map, wireless sensor network

Procedia PDF Downloads 488
379 Explainable Graph Attention Networks

Authors: David Pham, Yongfeng Zhang

Abstract:

Graphs are an important structure for data storage and computation. Recent years have seen the success of deep learning on graphs such as Graph Neural Networks (GNN) on various data mining and machine learning tasks. However, most of the deep learning models on graphs cannot easily explain their predictions and are thus often labelled as “black boxes.” For example, Graph Attention Network (GAT) is a frequently used GNN architecture, which adopts an attention mechanism to carefully select the neighborhood nodes for message passing and aggregation. However, it is difficult to explain why certain neighbors are selected while others are not and how the selected neighbors contribute to the final classification result. In this paper, we present a graph learning model called Explainable Graph Attention Network (XGAT), which integrates graph attention modeling and explainability. We use a single model to target both the accuracy and explainability of problem spaces and show that in the context of graph attention modeling, we can design a unified neighborhood selection strategy that selects appropriate neighbor nodes for both better accuracy and enhanced explainability. To justify this, we conduct extensive experiments to better understand the behavior of our model under different conditions and show an increase in both accuracy and explainability.

Keywords: explainable AI, graph attention network, graph neural network, node classification

Procedia PDF Downloads 152
378 Towards Reliable Mobile Cloud Computing

Authors: Khaled Darwish, Islam El Madahh, Hoda Mohamed, Hadia El Hennawy

Abstract:

Cloud computing has been one of the fastest growing parts in IT industry mainly in the context of the future of the web where computing, communication, and storage services are main services provided for Internet users. Mobile Cloud Computing (MCC) is gaining stream which can be used to extend cloud computing functions, services and results to the world of future mobile applications and enables delivery of a large variety of cloud application to billions of smartphones and wearable devices. This paper describes reliability for MCC by determining the ability of a system or component to function correctly under stated conditions for a specified period of time to be able to deal with the estimation and management of high levels of lifetime engineering uncertainty and risks of failure. The assessment procedures consists of determine Mean Time between Failures (MTBF), Mean Time to Failure (MTTF), and availability percentages for main components in both cloud computing and MCC structures applied on single node OpenStack installation to analyze its performance with different settings governing the behavior of participants. Additionally, we presented several factors have a significant impact on rates of change overall cloud system reliability should be taken into account in order to deliver highly available cloud computing services for mobile consumers.

Keywords: cloud computing, mobile cloud computing, reliability, availability, OpenStack

Procedia PDF Downloads 375
377 The Influence of Addition of Asparagus Bean Powder (Psophocarpus tetragonolobus) on Gonad Maturity of Nilem Carp (Osteochilus hasselti) at the Floating Net Cage of Cirata Reservoir

Authors: Rita Rostika, Junianto, Zulfiqar W. Ibrahim, Iskandar, Lantun P. Dewanti

Abstract:

The purpose of this research is to determine the influence of asparagus bean powder and its most effective administration dose to improve the gonad maturity of nilem carp (Osteochilus hasselti). The research is conducted in October-July 2017 located at Cirata Reservoir and Aquaculture Laboratory, Faculty of Fisheries and Marine Sciences, Padjadjaran University, Jatinangor. The research employs an experimental method using a Complete Random Design (RAL) with six treatments and three repetitions. The treatments include the addition of asparagus bean powder by 0% (Control), 4% per kg of feed, 5% per kg of feed, 6% per kg of feed, 7% per kg of feed, as well as the addition of vitamin E essential as the control. The results show that the addition of asparagus bean powder to the feed may influence the gonad maturity of nilem carp shown by its Gonado Somatic Index (GSI) parameter, fecundity, egg diameter and egg reaching its maturity phase or GVBD (Germinal Vesicle Breakdown). The best administration dose influencing nilem carp is the addition of asparagus bean powder by 7% per kg of feed with the average GSI of 15.02%, relative fecundity of 137 eggs/g of fish parent weight, egg diameter of 1,263 mm, and egg reaching its maturity phase (GVBD) of 78.15%.

Keywords: asparagus bean powder, nilem carp, gonad maturity, Cirata reservoir

Procedia PDF Downloads 136
376 Optimizing AI Voice for Adolescent Health Education: Preferences and Trustworthiness Across Teens and Parent

Authors: Yu-Lin Chen, Kimberly Koester, Marissa Raymond-Flesh, Anika Thapar, Jay Thapar

Abstract:

Purpose: Effectively communicating adolescent health topics to teens and their parents is crucial. This study emphasizes critically evaluating the optimal use of artificial intelligence tools (AI), which are increasingly prevalent in disseminating health information. By fostering a deeper understanding of AI voice preference in the context of health, the research aspires to have a ripple effect, enhancing the collective health literacy and decision-making capabilities of both teenagers and their parents. This study explores AI voices' potential within health learning modules for annual well-child visits. We aim to identify preferred voice characteristics and understand factors influencing perceived trustworthiness, ultimately aiming to improve health literacy and decision-making in both demographics. Methods: A cross-sectional study assessed preferences and trust perceptions of AI voices in learning modules among teens (11-18) and their parents/guardians in Northern California. The study involved the development of four distinct learning modules covering various adolescent health-related topics, including general communication, sexual and reproductive health communication, parental monitoring, and well-child check-ups. Participants were asked to evaluate eight AI voices across the modules, considering a set of six factors such as intelligibility, naturalness, prosody, social impression, trustworthiness, and overall appeal, using Likert scales ranging from 1 to 10 (the higher, the better). They were also asked to select their preferred choice of voice for each module. Descriptive statistics summarized participant demographics. Chi-square/t-tests explored differences in voice preferences between groups. Regression models identified factors impacting the perceived trustworthiness of the top-selected voice per module. Results: Data from 104 participants (teen=63; adult guardian = 41) were included in the analysis. The mean age is 14.9 for teens (54% male) and 41.9 for the parent/guardian (12% male). At the same time, similar voice quality ratings were observed across groups, and preferences varied by topic. For instance, in general communication, teens leaned towards young female voices, while parents preferred mature female tones. Interestingly, this trend reversed for parental monitoring, with teens favoring mature male voices and parents opting for mature female ones. Both groups, however, converged on mature female voices for sexual and reproductive health topics. Beyond preferences, the study delved into factors influencing perceived trustworthiness. Interestingly, social impression and sound appeal emerged as the most significant contributors across all modules, jointly explaining 71-75% of the variance in trustworthiness ratings. Conclusion: The study emphasizes the importance of catering AI voices to specific audiences and topics. Social impression and sound appeal emerged as critical factors influencing perceived trustworthiness across all modules. These findings highlight the need to tailor AI voices by age and the specific health information being delivered. Ensuring AI voices resonate with both teens and their parents can foster their engagement and trust, ultimately leading to improved health literacy and decision-making for both groups. Limitations and future research: This study lays the groundwork for understanding AI voice preferences for teenagers and their parents in healthcare settings. However, limitations exist. The sample represents a specific geographic location, and cultural variations might influence preferences. Additionally, the modules focused on topics related to well-child visits, and preferences might differ for more sensitive health topics. Future research should explore these limitations and investigate the long-term impact of AI voice on user engagement, health outcomes, and health behaviors.

Keywords: artificial intelligence, trustworthiness, voice, adolescent

Procedia PDF Downloads 20
375 Failure Analysis of Low Relaxation Prestressed High Carbon Steel Wire During Drawing Operation: A Metallurgical Investigation

Authors: Souvik Das, Sandip Bhattacharya, Goutam Mukhopadhyay, Manashi Adhikary

Abstract:

Wires breakages during cold drawing are a complex phenomenon; wire breakages may be induced by improper wire-rod quality, inappropriate heat-treated microstructure, and/or lubrication breakdown on the wire surface. A comprehensive metallurgical investigation of failed/broken wire samples is therefore essential for understanding the origin of failure. Frequent breakage of wires during drawing is a matter of serious concern to the wire drawers as it erodes their already slim margins through reduced productivity and loss in yield. The present paper highlights the failure investigation of wires of Low Relaxation Prestressed High Carbon grade during cold drawing due to entrapment of hard constituents detached from the roller entry guide during rolling operations. The hardness measurement of this entrapped location indicates 54.9 Rockwell Hardness as against the rest portion 33.4 Rockwell Hardness. The microstructure chemical analysis and X-ray mapping analysis data of the entrapment location confirmed complex chromium carbide originated from D2-steel used in entry guide during the rolling process. Since the harder entrapped phase could not be deformed in the same manner as the parent phase, the failure of the wire rod occurs during hot rolling.

Keywords: LRPC, D2-steel, chromium carbide, roller guide

Procedia PDF Downloads 133
374 Reading the Memoirs of American Caregiving Daughters: A Care-Focused Feminist Approach

Authors: Su-Lin Yu

Abstract:

This paper will explore how gender and care discourse are intersected, reformulated and contested in American daughters’ caregiving memoirs. In particular, it will attempt to show how gender structure has worked to regulate a daughter’s response to her mother’s illness. In other words, how do certain cultural notions and class difference affect the ways in which the daughter enacts her caregiving response to her mother’s illness? What is the interrelation of female subjectivity and care practice? To understand care and gender politics in the memoirs, this paper will engage in close readings of five texts: Sandra Bullock Simith’s Trading Places: Becoming My Mother’s Mother: A Daughter’s Memoir (2015),Martha Stettinius’s Inside the Dementia Epidemic: A Daughter’s Memoir (2012), Patricia Thompson Collamer’s Grace on the Ledge: a Caregiver's Memoir, Judith Henry’s The Dutiful Daughter's Guide to Caregiving: A Practical Memoir (2015), and The Daughter's Dilemma: A Survival Guide to Caring for an Aging, Abusive Parent by Emily Wanderer Cohen (2018). By analyzing these texts, this paper will show why adult daughters become the primary caregivers, how gender norms and care practices influence a daughter’s thoughts and actions, and how it affects her self-understanding. Taken as a whole, then, the paper will provide an important examination not only of care and gender politics, but also a contribution to the intersecting discourses of illness, death, and mother-daughter relationship.

Keywords: care ethics, daughter-mother relationship, gender politics, memoirs

Procedia PDF Downloads 241
373 Early Intervention and Teletherapy during the COVID-19 Pandemic

Authors: Stephen Hernandez, Nikita Sharma

Abstract:

The Coronavirus disease (COVID-19) emerged as a worldwide pandemic at the beginning of 2020. The pandemic and its impact reached the shores of the United States by the second week of March. Once infections started to grow in numbers, early intervention programs, including those providing home-based services, recognized that to reduce the spread of the virus, many traditional in-person therapeutic interventions were going to be impossible due to social distancing and self-quarantine requirements. Initially, infants, toddlers, and their families were left without any services from their educators and therapists, but within a few weeks of the public health emergency, various states, including New York, approved the use of teletherapy/virtual visits for early intervention service provision. This paper will detail the results of a survey from over 400 E.I. service providers about their experiences utilizing teletherapy to deliver services to children in early intervention programs. The survey questions focused on how did COVID-19 stay-at-home orders impact E.I. services for young children with special needs? Sub-questions included topics such as availability of the parents, the amount of time that babies remained engaged, as well as the perceived success of teletherapy as a viable option to provide service by both parent and professional. The results of this study found that therapists found teletherapy to be a viable manner of providing services and could be very effective on a case by case basis.

Keywords: early intervention, teletheraphy, telehealth, COVID-19

Procedia PDF Downloads 112
372 A New DIDS Design Based on a Combination Feature Selection Approach

Authors: Adel Sabry Eesa, Adnan Mohsin Abdulazeez Brifcani, Zeynep Orman

Abstract:

Feature selection has been used in many fields such as classification, data mining and object recognition and proven to be effective for removing irrelevant and redundant features from the original data set. In this paper, a new design of distributed intrusion detection system using a combination feature selection model based on bees and decision tree. Bees algorithm is used as the search strategy to find the optimal subset of features, whereas decision tree is used as a judgment for the selected features. Both the produced features and the generated rules are used by Decision Making Mobile Agent to decide whether there is an attack or not in the networks. Decision Making Mobile Agent will migrate through the networks, moving from node to another, if it found that there is an attack on one of the nodes, it then alerts the user through User Interface Agent or takes some action through Action Mobile Agent. The KDD Cup 99 data set is used to test the effectiveness of the proposed system. The results show that even if only four features are used, the proposed system gives a better performance when it is compared with the obtained results using all 41 features.

Keywords: distributed intrusion detection system, mobile agent, feature selection, bees algorithm, decision tree

Procedia PDF Downloads 373
371 Autism Spectrum Disorder Classification Algorithm Using Multimodal Data Based on Graph Convolutional Network

Authors: Yuntao Liu, Lei Wang, Haoran Xia

Abstract:

Machine learning has shown extensive applications in the development of classification models for autism spectrum disorder (ASD) using neural image data. This paper proposes a fusion multi-modal classification network based on a graph neural network. First, the brain is segmented into 116 regions of interest using a medical segmentation template (AAL, Anatomical Automatic Labeling). The image features of sMRI and the signal features of fMRI are extracted, which build the node and edge embedding representations of the brain map. Then, we construct a dynamically updated brain map neural network and propose a method based on a dynamic brain map adjacency matrix update mechanism and learnable graph to further improve the accuracy of autism diagnosis and recognition results. Based on the Autism Brain Imaging Data Exchange I dataset(ABIDE I), we reached a prediction accuracy of 74% between ASD and TD subjects. Besides, to study the biomarkers that can help doctors analyze diseases and interpretability, we used the features by extracting the top five maximum and minimum ROI weights. This work provides a meaningful way for brain disorder identification.

Keywords: autism spectrum disorder, brain map, supervised machine learning, graph network, multimodal data, model interpretability

Procedia PDF Downloads 32
370 FEM for Stress Reduction by Optimal Auxiliary Holes in a Uniaxially Loaded Plate

Authors: Basavaraj R. Endigeri, Shriharsh Desphande

Abstract:

Optimization and reduction of stress concentration around holes in a uniaxially loaded plate is one of the important design criteria in many of the engineering applications. These stress risers will lead to failure of the component at the region of high stress concentration which has to be avoided by means of providing auxiliary holes on either side of the parent hole. By literature survey it is known that till date, there is no analytical solution documented to reduce the stress concentration by providing auxiliary holes expect for fever geometries. In the present work, plate with a hole subjected to uniaxial load is analyzed with the numerical method to determine the optimum sizes and locations for the auxillary holes for different center hole diameter to plate width ratios. The introduction of auxiliary holes at a optimum location and radii with its effect on stress concentration is also represented graphically. The finite element analysis package ANSYS 8.0 is used to carry out analysis and optimization is performed to determine the location and radii for optimum values of auxiliary holes to reduce stress concentration. All the results for different diameter to plate width ratio are presented graphically. It is found from the work that introduction of auxiliary holes on either side of central circular hole will reduce stress concentration factor by a factor of 19 to 21 percentage.

Keywords: finite element method, optimization, stress concentration factor, auxiliary holes

Procedia PDF Downloads 416
369 A Virtual Grid Based Energy Efficient Data Gathering Scheme for Heterogeneous Sensor Networks

Authors: Siddhartha Chauhan, Nitin Kumar Kotania

Abstract:

Traditional Wireless Sensor Networks (WSNs) generally use static sinks to collect data from the sensor nodes via multiple forwarding. Therefore, network suffers with some problems like long message relay time, bottle neck problem which reduces the performance of the network. Many approaches have been proposed to prevent this problem with the help of mobile sink to collect the data from the sensor nodes, but these approaches still suffer from the buffer overflow problem due to limited memory size of sensor nodes. This paper proposes an energy efficient scheme for data gathering which overcomes the buffer overflow problem. The proposed scheme creates virtual grid structure of heterogeneous nodes. Scheme has been designed for sensor nodes having variable sensing rate. Every node finds out its buffer overflow time and on the basis of this cluster heads are elected. A controlled traversing approach is used by the proposed scheme in order to transmit data to sink. The effectiveness of the proposed scheme is verified by simulation.

Keywords: buffer overflow problem, mobile sink, virtual grid, wireless sensor networks

Procedia PDF Downloads 356
368 Process Safety Evaluation of a Nuclear Power Plant through Virtual Process Hazard Analysis Using Hazard and Operability Technique

Authors: Elysa V. Largo, Lormaine Anne A. Branzuela, Julie Marisol D. Pagalilauan, Neil C. Concibido, Monet Concepcion M. Detras

Abstract:

The energy demand in the country is increasing; thus, nuclear energy is recently mandated to add to the energy mix. The Philippines has the Bataan Nuclear Power Plant (BNPP), which can be a source of nuclear energy; however, it has not been operated since the completion of its construction. Thus, evaluating the safety of BNPP is vital. This study explored the possible deviations that may occur in the operation of a nuclear power plant with a pressurized water reactor, which is similar to BNPP, through a virtual process hazard analysis (PHA) using the hazard and operability (HAZOP) technique. Temperature, pressure, and flow were used as parameters. A total of 86 causes of various deviations were identified, wherein the primary system and line from reactor coolant pump to reactor vessel are the most critical system and node, respectively. A total of 348 scenarios were determined. The critical events are radioactive leaks due to nuclear meltdown and sump overflow that could lead to multiple worker fatalities, one or more public fatalities, and environmental remediation. There were existing safeguards identified; however, further recommendations were provided to have additional and supplemental barriers to reduce the risk.

Keywords: PSM, PHA, HAZOP, nuclear power plant

Procedia PDF Downloads 119
367 Optimal Design of Composite Cylindrical Shell Based on Nonlinear Finite Element Analysis

Authors: Haider M. Alsaeq

Abstract:

The present research is an attempt to figure out the best configuration of composite cylindrical shells of the sandwich type, i.e. the lightest design of such shells required to sustain a certain load over a certain area. The optimization is based on elastic-plastic geometrically nonlinear incremental-iterative finite element analysis. The nine-node degenerated curved shell element is used in which five degrees of freedom are specified at each nodal point, with a layered model. The formulation of the geometrical nonlinearity problem is carried out using the well-known total Lagrangian principle. For the structural optimization problem, which is dealt with as a constrained nonlinear optimization, the so-called Modified Hooke and Jeeves method is employed by considering the weight of the shell as the objective function with stress and geometrical constraints. It was concluded that the optimum design of composite sandwich cylindrical shell that have a rigid polyurethane foam core and steel facing occurs when the area covered by the shell becomes almost square with a ratio of core thickness to facing thickness lies between 45 and 49, while the optimum height to length ration varies from 0.03 to 0.08 depending on the aspect ratio of the shell and its boundary conditions.

Keywords: composite structure, cylindrical shell, optimization, non-linear analysis, finite element

Procedia PDF Downloads 374
366 A Study of Generation Y's Career Attitude at Workplace

Authors: Supriadi Hardianto, Aditya Daniswara

Abstract:

Today's workplace, flooded by millennial Generation or known also as Generation Y. A common problem that faced by the company towards Gen Y is a high turnover rate, attitudes problem, communication style, and different work style than the older generation. This is common in private sector. The objective of this study is to get a better understanding of the Gen Y Career Attitude at the workplace. The subject of this study is focusing on 430 respondent of Gen Y which age between 20 – 35 years old who works for a private company. The Questionnaire as primary data source captured 9 aspects of career attitude based on Career Attitudes Strategy Inventory (CASI). This Survey distributes randomly among Gen Y in the IT Industry (125 Respondent) and Manufacture Company (305 Respondent). A Random deep interview was conducted to get the better understanding of the etiology of their primary obstacles. The study showed that most of Indonesia Gen Y have a moderate score on Job satisfaction but in the other aspects, Gen Y has the lowest score on Skill Development, Career Worries, Risk-Taking Style, Dominant Style, Work Involvement, Geographical Barrier, Interpersonal Abuse, and Family Commitment. The top 5 obstacles outside that 9 aspects that faced by Gen Y are 1. Lower communication & networking support; 2. Self-confidence issues; 3. Financial Problem; 4. Emotional issues; 5. Age. We also found that parent perspective toward the way they are nurturing their child are not aligned with their child’s real life. This research fundamentally helps the organization and other Gen Y’s Stakeholders to have a better understanding of Gen Y Career Attitude at the workplace.

Keywords: career attitudes, CASI, Gen Y, career attitude at workplace

Procedia PDF Downloads 135
365 Exposure to Bullying and General Psychopathology: A Prospective, Longitudinal Study

Authors: Jolien Rijlaarsdam, Charlotte A. M. Cecil, J. Marieke Buil, Pol A. C. Van Lier, Edward D. Barker

Abstract:

Although there is mounting evidence that the experience of being bullied associates with both internalizing and externalizing symptoms, it is not known yet whether the identified associations are specific to these symptoms or shared between them. The primary focus of this study is to assess the prospective associations of bullying exposure with both general and specific (i.e., internalizing, externalizing) factors of psychopathology. This study included data from 6,210 children participating in the Avon Longitudinal Study of Parents and Children (ALSPAC). Child bullying was measured by self-report at ages 8 and 10 years. Child psychopathology symptoms were assessed by parent-interview, using the Development and Well-being Assessment (DAWBA) at ages 7 and 13 years. Bullying exposure is significantly associated with the general psychopathology factor in early adolescence. In particular, chronically victimized youth exposed to multiple forms of bullying (i.e., both overt and relational) showed the highest levels of general psychopathology. Bullying exposure is also associated with both internalizing and externalizing factors from the correlated-factors model. However, the effect estimates for these factors decreased considerably in size and dropped to insignificant for the internalizing factor after extracting the shared variance that belongs to the general factor of psychopathology. In an integrative longitudinal model, higher levels of general psychopathology at age seven are associated with bullying exposure at age eight, which, in turn, is associated with general psychopathology at age 13 through its two-year continuity. Findings suggest that exposure to bullying is a risk factor for a more general vulnerability to psychopathology through mutually influencing relationships.

Keywords: bullying exposure, externalizing, general psychopathology, internalizing, longitudinal

Procedia PDF Downloads 123
364 Signal Strength Based Multipath Routing for Mobile Ad Hoc Networks

Authors: Chothmal

Abstract:

In this paper, we present a route discovery process which uses the signal strength on a link as a parameter of its inclusion in the route discovery method. The proposed signal-to-interference and noise ratio (SINR) based multipath reactive routing protocol is named as SINR-MP protocol. The proposed SINR-MP routing protocols has two following two features: a) SINR-MP protocol selects routes based on the SINR of the links during the route discovery process therefore it select the routes which has long lifetime and low frame error rate for data transmission, and b) SINR-MP protocols route discovery process is multipath which discovers more than one SINR based route between a given source destination pair. The multiple routes selected by our SINR-MP protocol are node-disjoint in nature which increases their robustness against link failures, as failure of one route will not affect the other route. The secondary route is very useful in situations where the primary route is broken because we can now use the secondary route without causing a new route discovery process. Due to this, the network overhead caused by a route discovery process is avoided. This increases the network performance greatly. The proposed SINR-MP routing protocol is implemented in the trail version of network simulator called Qualnet.

Keywords: ad hoc networks, quality of service, video streaming, H.264/SVC, multiple routes, video traces

Procedia PDF Downloads 221