Search results for: radial basis function neural networks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 11552

Search results for: radial basis function neural networks

5312 Multi-Agent System Based Distributed Voltage Control in Distribution Systems

Authors: A. Arshad, M. Lehtonen. M. Humayun

Abstract:

With the increasing Distributed Generation (DG) penetration, distribution systems are advancing towards the smart grid technology for least latency in tackling voltage control problem in a distributed manner. This paper proposes a Multi-agent based distributed voltage level control. In this method a flat architecture of agents is used and agents involved in the whole controlling procedure are On Load Tap Changer Agent (OLTCA), Static VAR Compensator Agent (SVCA), and the agents associated with DGs and loads at their locations. The objectives of the proposed voltage control model are to minimize network losses and DG curtailments while maintaining voltage value within statutory limits as close as possible to the nominal. The total loss cost is the sum of network losses cost, DG curtailment costs, and voltage damage cost (which is based on penalty function implementation). The total cost is iteratively calculated for various stricter limits by plotting voltage damage cost and losses cost against varying voltage limit band. The method provides the optimal limits closer to nominal value with minimum total loss cost. In order to achieve the objective of voltage control, the whole network is divided into multiple control regions; downstream from the controlling device. The OLTCA behaves as a supervisory agent and performs all the optimizations. At first, a token is generated by OLTCA on each time step and it transfers from node to node until the node with voltage violation is detected. Upon detection of such a node, the token grants permission to Load Agent (LA) for initiation of possible remedial actions. LA will contact the respective controlling devices dependent on the vicinity of the violated node. If the violated node does not lie in the vicinity of the controller or the controlling capabilities of all the downstream control devices are at their limits then OLTC is considered as a last resort. For a realistic study, simulations are performed for a typical Finnish residential medium-voltage distribution system using Matlab ®. These simulations are executed for two cases; simple Distributed Voltage Control (DVC) and DVC with optimized loss cost (DVC + Penalty Function). A sensitivity analysis is performed based on DG penetration. The results indicate that costs of losses and DG curtailments are directly proportional to the DG penetration, while in case 2 there is a significant reduction in total loss. For lower DG penetration, losses are reduced more or less 50%, while for higher DG penetration, loss reduction is not very significant. Another observation is that the newer stricter limits calculated by cost optimization moves towards the statutory limits of ±10% of the nominal with the increasing DG penetration as for 25, 45 and 65% limits calculated are ±5, ±6.25 and 8.75% respectively. Observed results conclude that the novel voltage control algorithm proposed in case 1 is able to deal with the voltage control problem instantly but with higher losses. In contrast, case 2 make sure to reduce the network losses through proposed iterative method of loss cost optimization by OLTCA, slowly with time.

Keywords: distributed voltage control, distribution system, multi-agent systems, smart grids

Procedia PDF Downloads 309
5311 Fault Diagnosis in Induction Motors Using Discrete Wavelet Transform

Authors: K. Yahia, A. Titaouine, A. Ghoggal, S. E. Zouzou, F. Benchabane

Abstract:

This paper deals with the problem of stator faults diagnosis in induction motors. Using the discrete wavelet transform (DWT) for the current Park’s vector modulus (CPVM) analysis, the inter-turn short-circuit faults diagnosis can be achieved. This method is based on the decomposition of the CPVM signal, where wavelet approximation and detail coefficients of this signal have been extracted. The energy evaluation of a known bandwidth detail permits to define a fault severity factor (FSF). This method has been tested through the simulation of an induction motor using a mathematical model based on the winding-function approach. Simulation, as well as experimental, results show the effectiveness of the used method.

Keywords: Induction Motors (IMs), inter-turn short-circuits diagnosis, Discrete Wavelet Transform (DWT), Current Park’s Vector Modulus (CPVM)

Procedia PDF Downloads 546
5310 Phenotypic and Molecular Heterogeneity Linked to the Magnesium Transporter CNNM2

Authors: Reham Khalaf-Nazzal, Imad Dweikat, Paula Gimenez, Iker Oyenarte, Alfonso Martinez-Cruz, Domonik Muller

Abstract:

Metal cation transport mediator (CNNM) gene family comprises 4 isoforms that are expressed in various human tissues. Structurally, CNNMs are complex proteins that contain an extracellular N-terminal domain preceding a DUF21 transmembrane domain, a ‘Bateman module’ and a C-terminal cNMP-binding domain. Mutations in CNNM2 cause familial dominant hypomagnesaemia. Growing evidence highlights the role of CNNM2 in neurodevelopment. Mutations in CNNM2 have been implicated in epilepsy, intellectual disability, schizophrenia, and others. In the present study, we aim to elucidate the function of CNNM2 in the developing brain. Thus, we present the genetic origin of symptoms in two family cohorts. In the first family, three siblings of a consanguineous Palestinian family in which parents are first cousins, and consanguinity ran over several generations, presented a varying degree of intellectual disability, cone-rod dystrophy, and autism spectrum disorder. Exome sequencing and segregation analysis revealed the presence of homozygous pathogenic mutation in the CNNM2 gene, the parents were heterozygous for that gene mutation. Magnesium blood levels were normal in the three children and their parents in several measurements. They had no symptoms of hypomagnesemia. The CNNM2 mutation in this family was found to locate in the CBS1 domain of the CNNM2 protein. The crystal structure of the mutated CNNM2 protein was not significantly different from the wild-type protein, and the binding of AMP or MgATP was not dramatically affected. This suggests that the CBS1 domain could be involved in pure neurodevelopmental functions independent of its magnesium-handling role, and this mutation could have affected a protein partner binding or other functions in this protein. In the second family, another autosomal dominant CNNM2 mutation was found to run in a large family with multiple individuals over three generations. All affected family members had hypomagnesemia and hypermagnesuria. Oral supplementation of magnesium did not increase the levels of magnesium in serum significantly. Some affected members of this family have defects in fine motor skills such as dyslexia and dyslalia. The detected mutation is located in the N-terminal part, which contains a signal peptide thought to be involved in the sorting and routing of the protein. In this project, we describe heterogenous clinical phenotypes related to CNNM2 mutations and protein functions. In the first family, and up to the authors’ knowledge, we report for the first time the involvement of CNNM2 in retinal photoreceptor development and function. In addition, we report the presence of a neurophenotype independent of magnesium status related to the CNNM2 protein mutation. Taking into account the different modes of inheritance and the different positions of the mutations within CNNM2 and its different structural and functional domains, it is likely that CNNM2 might be involved in a wide spectrum of neuropsychiatric comorbidities with considerable varying phenotypes.

Keywords: magnesium transport, autosomal recessive, autism, neurodevelopment, CBS domain

Procedia PDF Downloads 148
5309 Critical Success Factors for Sustainable Smart City Project in India

Authors: Debasis Sarkar

Abstract:

Development of a Smart City would depend upon the development of its infrastructure in a smart way. Primarily based on the ideology of the fourth industrial revolution a Smart City project should have Smart governance, smart health care, smart building, smart transportation, smart mobility, smart energy, smart technology and smart citizen. Considering the Indian scenario of current state of cities in India, it has become very essential to decide the specific parameters which would govern the development of a Smart City project. It has been observed that there are significant parameters beyond Information and Communication Technology (ICT), which govern the development of a Smart City project. This paper is an attempt to identify the Critical Success Factors (CSF) which are significantly responsible for the development of a Smart City project in Western India. Responses to questionnaire survey were analyzed on basis of Likert scale. They were further critically evaluated with help of Factor Comparison Method (FCM) and Analytical Hierarchy Process (AHP). The project authorities need to incorporate Building Information Modeling (BIM) to make the smart city project more collaborative. To make the project more sustainable, use of flyash in the concrete used, reduced usage of cement and steel, use of alternate fuels like biodiesel is recommended.

Keywords: analytical hierarchical process, building information modeling, critical success factors, factor comparison method

Procedia PDF Downloads 248
5308 Techno-Economic Prospects of High Wind Energy Share in Remote vs. Interconnected Island Grids

Authors: Marina Kapsali, John S. Anagnostopoulos

Abstract:

On the basis of comparative analysis of alternative “development scenarios” for electricity generation, the main objective of the present study is to investigate the techno-economic viability of high wind energy (WE) use at the local (island) level. An integrated theoretical model is developed based on first principles assuming two main possible scenarios for covering future electrification needs of a medium–sized Greek island, i.e. Lesbos. The first scenario (S1), assumes that the island will keep using oil products as the main source for electricity generation. The second scenario (S2) involves the interconnection of the island with the mainland grid to satisfy part of the electricity demand, while remarkable WE penetration is also achieved. The economic feasibility of the above solutions is investigated in terms of determining their Levelized Cost of Energy (LCOE) for the time-period 2020-2045, including also a sensitivity analysis on the worst/reference/best Cases. According to the results obtained, interconnection of Lesbos Island with the mainland grid (S2) presents considerable economic interest in comparison to autonomous development (S1) with WE having a prominent role to this effect.

Keywords: electricity generation cost, levelized cost of energy, mainland, wind energy surplus

Procedia PDF Downloads 340
5307 Discriminant Analysis as a Function of Predictive Learning to Select Evolutionary Algorithms in Intelligent Transportation System

Authors: Jorge A. Ruiz-Vanoye, Ocotlán Díaz-Parra, Alejandro Fuentes-Penna, Daniel Vélez-Díaz, Edith Olaco García

Abstract:

In this paper, we present the use of the discriminant analysis to select evolutionary algorithms that better solve instances of the vehicle routing problem with time windows. We use indicators as independent variables to obtain the classification criteria, and the best algorithm from the generic genetic algorithm (GA), random search (RS), steady-state genetic algorithm (SSGA), and sexual genetic algorithm (SXGA) as the dependent variable for the classification. The discriminant classification was trained with classic instances of the vehicle routing problem with time windows obtained from the Solomon benchmark. We obtained a classification of the discriminant analysis of 66.7%.

Keywords: Intelligent Transportation Systems, data-mining techniques, evolutionary algorithms, discriminant analysis, machine learning

Procedia PDF Downloads 466
5306 Modeling of Compaction Curves for CCA-Cement Stabilized Lateritic Soils

Authors: O. Ahmed Apampa, Yinusa, A. Jimoh

Abstract:

The aim of this study was to develop an appropriate model for predicting the compaction behavior of lateritic soils and corn cob ash (CCA) stabilized lateritic soils. This was done by first adopting an equation earlier developed for fine-grained soils and subsequent adaptation by others and extending it to modified lateritic soil through the introduction of alpha and beta parameters which are polynomial functions of the CCA binder input. The polynomial equations were determined with MATLAB R2011 curve fitting tool, while the alpha and beta parameters were determined by standard linear programming techniques using the Solver function of Microsoft Excel 2010. The model so developed was a good fit with a correlation coefficient R2 value of 0.86. The paper concludes that it is possible to determine the optimum moisture content and the maximum dry density of CCA stabilized soils from the compaction test of the unmodified soil, and recommends that this procedure is extended to other binder stabilized lateritic soils to facilitate quick decision making in roadworks.

Keywords: compaction, corn cob ash, lateritic soil, stabilization

Procedia PDF Downloads 529
5305 A Boundary Backstepping Control Design for 2-D, 3-D and N-D Heat Equation

Authors: Aziz Sezgin

Abstract:

We consider the problem of stabilization of an unstable heat equation in a 2-D, 3-D and generally n-D domain by deriving a generalized backstepping boundary control design methodology. To stabilize the systems, we design boundary backstepping controllers inspired by the 1-D unstable heat equation stabilization procedure. We assume that one side of the boundary is hinged and the other side is controlled for each direction of the domain. Thus, controllers act on two boundaries for 2-D domain, three boundaries for 3-D domain and ”n” boundaries for n-D domain. The main idea of the design is to derive ”n” controllers for each of the dimensions by using ”n” kernel functions. Thus, we obtain ”n” controllers for the ”n” dimensional case. We use a transformation to change the system into an exponentially stable ”n” dimensional heat equation. The transformation used in this paper is a generalized Volterra/Fredholm type with ”n” kernel functions for n-D domain instead of the one kernel function of 1-D design.

Keywords: backstepping, boundary control, 2-D, 3-D, n-D heat equation, distributed parameter systems

Procedia PDF Downloads 397
5304 Blocking of Random Chat Apps at Home Routers for Juvenile Protection in South Korea

Authors: Min Jin Kwon, Seung Won Kim, Eui Yeon Kim, Haeyoung Lee

Abstract:

Numerous anonymous chat apps that help people to connect with random strangers have been released in South Korea. However, they become a serious problem for young people since young people often use them for channels of prostitution or sexual violence. Although ISPs in South Korea are responsible for making inappropriate content inaccessible on their networks, they do not block traffic of random chat apps since 1) the use of random chat apps is entirely legal. 2) it is reported that they use HTTP proxy blocking so that non-HTTP traffic cannot be blocked. In this paper, we propose a service model that can block random chat apps at home routers. A service provider manages a blacklist that contains blocked apps’ information. Home routers that subscribe the service filter the traffic of the apps out using deep packet inspection. We have implemented a prototype of the proposed model, including a centralized server providing the blacklist, a Raspberry Pi-based home router that can filter traffic of the apps out, and an Android app used by the router’s administrator to locally customize the blacklist.

Keywords: deep packet inspection, internet filtering, juvenile protection, technical blocking

Procedia PDF Downloads 345
5303 Evaluation of European Surveys in the Area of Health and Safety at Work and Identification of New Risks in the Labor Environment

Authors: Alena Dadova, Katarina Holla, Anna Cidlinova, Linda Makovicka Osvaldova, Jiri Vala, Samuel Kockar

Abstract:

Occupational health and safety (ASH) is an area in which procedures and applications are constantly evolving and changing through legislation and new directives and guidelines. In this way, the relevant organizations strive to ensure continuous progress and the advantage of up-to-date information to ensure safety and prevent occupational accidents. Three ESENER surveys have been carried out in the European Union, led by the Agency for Safety and Health at Work (EU-OSHA). On the basis of surveys, it was determined how European workplaces manage risks and how they manage the field of safety and health protection at work. Thousands of companies and organizations in the European Union were involved in the surveys. Organizations and businesses were presented with a questionnaire that focused on the following topics: the impact of general risks on the field of OSH and the possibility of their management, psychosocial risks and other factors such as stress, harassment and bullying, and employee participation in OSH procedures. The article is dedicated to the fundamental conclusions from these surveys and their subsequent connection with the strategic intent of the Strategic Framework of European Union for the years 2021 - 2027. In the conclusion, emerging risks are identified and EU will soon have to deal with them.

Keywords: ESENER, emerging risks, strategic framework in OSH, EU

Procedia PDF Downloads 108
5302 An Approach to Apply Kernel Density Estimation Tool for Crash Prone Location Identification

Authors: Kazi Md. Shifun Newaz, S. Miaji, Shahnewaz Hazanat-E-Rabbi

Abstract:

In this study, the kernel density estimation tool has been used to identify most crash prone locations in a national highway of Bangladesh. Like other developing countries, in Bangladesh road traffic crashes (RTC) have now become a great social alarm and the situation is deteriorating day by day. Today’s black spot identification process is not based on modern technical tools and most of the cases provide wrong output. In this situation, characteristic analysis and black spot identification by spatial analysis would be an effective and low cost approach in ensuring road safety. The methodology of this study incorporates a framework on the basis of spatial-temporal study to identify most RTC occurrence locations. In this study, a very important and economic corridor like Dhaka to Sylhet highway has been chosen to apply the method. This research proposes that KDE method for identification of Hazardous Road Location (HRL) could be used for all other National highways in Bangladesh and also for other developing countries. Some recommendations have been suggested for policy maker to reduce RTC in Dhaka-Sylhet especially in black spots.

Keywords: hazardous road location (HRL), crash, GIS, kernel density

Procedia PDF Downloads 311
5301 Post-Soviet Georgia in Visual History Analysis

Authors: Ana Nemsadze

Abstract:

Contemporary era and society are called postindustrial era and postindustrial society and/or informational era and informational society. Today science intends to define concept of information and comprehend informations role and function in contemporary society. Organization of social environment and governance of public processes on the base of information and tools of communication are main characteristics of informational era. This was defined by technological changes which were accomplished in culture in the second half of twentieth century. Today Georgia as an independent state needs to create an informational discourse of the country and therefore it is very important to study political and social cases which accomplished in the country after collapse of the Soviet Union because they start to define the present and the future of the country. The purpose of this study is to analyze political cases of the latest history of Georgia in terms of culture and information, concretely to elucidate which political cases transformed social life of post Soviet Georgia most of all who accomplished these political cases which visual and verbal messages was each political case spread with. The research is conducted on the base of interview. Participants of the interview are people of various specializations. Their professional activity is related to reflections on culture and theme of visual communication. They are philosophers sociologists a journalist media researcher a politologist a painter. The participants of the interview enumerated political cases and characterized them separately. Every expert thinks that declaration of independence of Georgia is the most important fact among all facts which were implemented in Georgia after collapse of the Soviet Union. The research revealed important social and political cases. Most of the cases are related to independence and territorial integrity of the state. Presidents of Georgia Zviad Gamsakhurdia Eduard Shevardnadze Mikheil Saakashvili Catholocos-Patriarch of All Georgia, the Archbishop of Mtskheta Tbilisi and Metropolitan bishop of Bichvinta and Tskhum Abkhazia Ilia II, businessman Bidzina Ivanishvili assumed dominating roles in cases. Verbal narrative of the cases accomplished during Zviad Gamsakhurdia presidential term expresses national freedom and visual part of cases of the same period expresses ruin of social-political structure. Verbal narrative of the cases accomplished during Eduard Sevardnadze presidential term expresses Free State and stability and reestablishment of Georgias political function in international relations and visual part of cases of the same period describes the most important moment of his presidential term and Eduard Shevardnadzes face appears too. Verbal narrative of the cases accomplished during Mikheil Saakashvilis presidential term expresses social renewal and visual part of cases of the same period describes August war and Mikheil Saakashvilis face appears too. The results of the study also reveal other details of visual verbal narrative of political and social cases of post Soviet Georgia. This gives a chance to start further reflection.

Keywords: culture, narrative, post soviet, visual communication

Procedia PDF Downloads 300
5300 Generation of Symmetric Key Using Randomness of Hash Function

Authors: Sai Charan Kamana, Harsha Vardhan Nakkina, B.R. Chandavarkar

Abstract:

In a highly secure and robust key generation process, a key role is played by randomness and random numbers when current real-world cryptosystems are observed. Most of the present-day cryptographic protocols depend upon the Random Number Generators (RNG), Pseudo-Random Number Generator (PRNG). These protocols often use noisy channels such as Disk seek time, CPU temperature, Mouse pointer movement, Fan noise to obtain true random values. Despite being cost-effective, these noisy channels may need additional hardware devices to continuously communicate with them. On the other hand, Hash functions are Pseudo-Random (because of their requirements). So, they are a good replacement for these noisy channels and have low hardware requirements. This paper discusses, some of the key generation methodologies, and their drawbacks. This paper explains how hash functions can be used in key generation, how to combine Key Derivation Functions with hash functions.

Keywords: key derivation, hash based key derivation, password based key derivation, symmetric key derivation

Procedia PDF Downloads 155
5299 Isolation and Identification of Diacylglycerol Acyltransferase Type-2 (GAT2) Genes from Three Egyptian Olive Cultivars

Authors: Yahia I. Mohamed, Ahmed I. Marzouk, Mohamed A. Yacout

Abstract:

Aim of this work was to study the genetic basis for oil accumulation in olive fruit via tracking DGAT2 (Diacylglycerol acyltransferase type-2) gene in three Egyptian Origen Olive cultivars namely Toffahi, Hamed and Maraki using molecular marker techniques and bioinformatics tools. Results illustrate that, firstly: specific genomic band of Maraki cultivars was identified as DGAT2 (Diacylglycerol acyltransferase type-2) and identical for this gene in Olea europaea with 100 % of similarity. Secondly, differential genomic band of Maraki cultivars which produced from RAPD fingerprinting technique reflected predicted distinguished sequence which identified as DGAT2 (Diacylglycerol acyltransferase type-2) in Fragaria vesca subsp. Vesca with 76% of sequential similarity. Third and finally, specific genomic specific band of Hamed cultivars was indentified as two fragments, 1-Olea europaea cultivar Koroneiki diacylglycerol acyltransferase type 2 mRNA, complete cds with two matches regions with 99% or 2-PREDICTED: Fragaria vesca subsp. vesca diacylglycerol O-acyltransferase 2-like (LOC101313050), mRNA with 86% of similarity.

Keywords: Olea europaea, fingerprinting, diacylglycerol acyltransferase type-2 (DGAT2), Egypt

Procedia PDF Downloads 496
5298 Theoretical Study of Acetylation of P-Methylaniline Catalyzed by Cu²⁺ Ions

Authors: Silvana Caglieri

Abstract:

Theoretical study of acetylation of p-methylaniline catalyzed by Cu2+ ions from the analysis of intermediate of the reaction was carried out. The study of acetylation of amines is of great interest by the utility of its products of reaction and is one of the most frequently used transformations in organic synthesis as it provides an efficient and inexpensive means for protecting amino groups in a multistep synthetic process. Acetylation of amine is a nucleophilic substitution reaction. This reaction can be catalyzed by Lewis acid, metallic ion. In reaction mechanism, the metallic ion formed a complex with the oxygen of the acetic anhydride carbonyl, facilitating the polarization of the same and the successive addition of amine at the position to form a tetrahedral intermediate, determining step of the rate of the reaction. Experimental work agreed that this reaction takes place with the formation of a tetrahedral intermediate. In the present theoretical work were investigated the structure and energy of the tetrahedral intermediate of the reaction catalyzed by Cu2+ ions. Geometries of all species involved in the acetylation were made and identified. All of the geometry optimizations were performed by the method at the DFT/B3LYP level of theory and the method MP2. Were adopted the 6-31+G* basis sets. Energies were calculated using the Mechanics-UFF method. Following the same procedure it was identified the geometric parameters and energy of reaction intermediate. The calculations show 61.35 kcal/mol of energy for the tetrahedral intermediate and the energy of activation for the reaction was 15.55 kcal/mol.

Keywords: amides, amines, DFT, MP2

Procedia PDF Downloads 279
5297 Real-Time Neuroimaging for Rehabilitation of Stroke Patients

Authors: Gerhard Gritsch, Ana Skupch, Manfred Hartmann, Wolfgang Frühwirt, Hannes Perko, Dieter Grossegger, Tilmann Kluge

Abstract:

Rehabilitation of stroke patients is dominated by classical physiotherapy. Nowadays, a field of research is the application of neurofeedback techniques in order to help stroke patients to get rid of their motor impairments. Especially, if a certain limb is completely paralyzed, neurofeedback is often the last option to cure the patient. Certain exercises, like the imagination of the impaired motor function, have to be performed to stimulate the neuroplasticity of the brain, such that in the neighboring parts of the injured cortex the corresponding activity takes place. During the exercises, it is very important to keep the motivation of the patient at a high level. For this reason, the missing natural feedback due to a movement of the effected limb may be replaced by a synthetic feedback based on the motor-related brain function. To generate such a synthetic feedback a system is needed which measures, detects, localizes and visualizes the motor related µ-rhythm. Fast therapeutic success can only be achieved if the feedback features high specificity, comes in real-time and without large delay. We describe such an approach that offers a 3D visualization of µ-rhythms in real time with a delay of 500ms. This is accomplished by combining smart EEG preprocessing in the frequency domain with source localization techniques. The algorithm first selects the EEG channel featuring the most prominent rhythm in the alpha frequency band from a so-called motor channel set (C4, CZ, C3; CP6, CP4, CP2, CP1, CP3, CP5). If the amplitude in the alpha frequency band of this certain electrode exceeds a threshold, a µ-rhythm is detected. To prevent detection of a mixture of posterior alpha activity and µ-activity, the amplitudes in the alpha band outside the motor channel set are not allowed to be in the same range as the main channel. The EEG signal of the main channel is used as template for calculating the spatial distribution of the µ - rhythm over all electrodes. This spatial distribution is the input for a inverse method which provides the 3D distribution of the µ - activity within the brain which is visualized in 3D as color coded activity map. This approach mitigates the influence of lid artifacts on the localization performance. The first results of several healthy subjects show that the system is capable of detecting and localizing the rarely appearing µ-rhythm. In most cases the results match with findings from visual EEG analysis. Frequent eye-lid artifacts have no influence on the system performance. Furthermore, the system will be able to run in real-time. Due to the design of the frequency transformation the processing delay is 500ms. First results are promising and we plan to extend the test data set to further evaluate the performance of the system. The relevance of the system with respect to the therapy of stroke patients has to be shown in studies with real patients after CE certification of the system. This work was performed within the project ‘LiveSolo’ funded by the Austrian Research Promotion Agency (FFG) (project number: 853263).

Keywords: real-time EEG neuroimaging, neurofeedback, stroke, EEG–signal processing, rehabilitation

Procedia PDF Downloads 381
5296 Multi-Plane Wrist Movement: Pathomechanics and Design of a 3D-Printed Splint

Authors: Sigal Portnoy, Yael Kaufman-Cohen, Yafa Levanon

Abstract:

Introduction: Rehabilitation following wrist fractures often includes exercising flexion-extension movements with a dynamic splint. However, during daily activities, we combine most of our wrist movements with radial and ulnar deviations. Also, the multi-plane wrist motion, named the ‘dart throw motion’ (DTM), was found to be a more stable motion in healthy individuals, in term of the motion of the proximal carpal bones, compared with sagittal wrist motion. The aim of this study was therefore to explore the pathomechanics of the wrist in a common multi-plane movement pattern (DTM) and design a novel splint for rehabilitation following distal radius fractures. Methods: First, a multi-axis electro-goniometer was used to quantify the plane angle of motion of the dominant and non-dominant wrists during various activities, e.g. drinking from a glass of water and answering a phone in 43 healthy individuals. The following protocols were then implemented with a population following distal radius fracture. Two dynamic scans were performed, one of the sagittal wrist motion and DTM, in a 3T magnetic resonance imaging (MRI) device, bilaterally. The scaphoid and lunate carpal bones, as well as the surface of the distal radius, were manually-segmented in SolidWorks and the angles of motion of the scaphoid and lunate bones were calculated. Subsequently, a patient-specific splint was designed using 3D scans of the hand. The brace design comprises of a proximal attachment to the arm and a distal envelope of the palm. An axle with two wheels is attached to the proximal part. Two wires attach the proximal part with the medial-palmar and lateral-ventral aspects of the distal part: when the wrist extends, the first wire is released and the second wire is strained towards the radius. The opposite occurs when the wrist flexes. The splint was attached to the wrist using Velcro and constrained the wrist movement to the desired calculated multi-plane of motion. Results: No significant differences were found between the multi-plane angles of the dominant and non-dominant wrists. The most common daily activities occurred at a plane angle of approximately 20° to 45° from the sagittal plane and the MRI studies show individual angles of the plane of motion. The printed splint fitted the wrist of the subjects and constricted movement to the desired multi-plane of motion. Hooks were inserted on each part to allow the addition of springs or rubber bands for resistance training towards muscle strengthening in the rehabilitation setting. Conclusions: It has been hypothesized that activation of the wrist in a multi-plane movement pattern following distal radius fractures will accelerate the recovery of the patient. Our results show that this motion can be determined from either the dominant or non-dominant wrists. The design of the patient-specific dynamic splint is the first step towards assessing whether splinting to induce combined movement is beneficial to the rehabilitation process, compared to conventional treatment. The evaluation of the clinical benefits of this method, compared to conventional rehabilitation methods following wrist fracture, are a part of a PhD work, currently conducted by an occupational therapist.

Keywords: distal radius fracture, rehabilitation, dynamic magnetic resonance imaging, dart throw motion

Procedia PDF Downloads 292
5295 Policies and Politics of Infrastructure Provisioning in Nigeria

Authors: Olufemi Adedamola Oyedele

Abstract:

Infrastructure provision in Nigeria is now at its lowest ebb in spite of its being critical to the socio-economic and political development of any nation. This is partly because the policy that will ensure its adequate provisioning is missing and partly because politics is affecting its provision. Policy is the basic principles by which a government is guided. Infrastructural development is the basis for measuring the performance of governments and it is the foundation of good governance. Demand for infrastructural development is higher and resources used in its provision are limited. Ethnic-interest agitation and lobbying for infrastructure provision are common things in multi-ethnic state like Nigeria. Most infrastructures are now decayed and need repair or replacement. Government is the system that organizes, control and sensitizes the people in a society in other for all to have an acceptable level of living. Governments have the power to put in place all measures that they deem fit will make an environment conducive for living for everybody. Infrastructure development in any environment requires needs assessment, feasibility and viability studies and carrying out physical development of the project. The challenge in Nigeria is largely carrying out development where they are not needed but where the people are loyal. There are numerous abandoned projects because they were started due to politics and not because they are feasible. Policies and politics greatly affect infrastructure provisioning in Nigeria and this is the premise of this paper.

Keywords: infrastructure challenges, infrastructure development, policy making, politics, project finance

Procedia PDF Downloads 273
5294 Molecular Communication Noise Effect Analysis of Diffusion-Based Channel for Considering Minimum-Shift Keying and Molecular Shift Keying Modulations

Authors: A. Azari, S. S. K. Seyyedi

Abstract:

One of the unaddressed and open challenges in the nano-networking is the characteristics of noise. The previous analysis, however, has concentrated on end-to-end communication model with no separate modelings for propagation channel and noise. By considering a separate signal propagation and noise model, the design and implementation of an optimum receiver will be much easier. In this paper, we justify consideration of a separate additive Gaussian noise model of a nano-communication system based on the molecular communication channel for which are applicable for MSK and MOSK modulation schemes. The presented noise analysis is based on the Brownian motion process, and advection molecular statistics, where the received random signal has a probability density function whose mean is equal to the mean number of the received molecules. Finally, the justification of received signal magnitude being uncorrelated with additive non-stationary white noise is provided.

Keywords: molecular, noise, diffusion, channel

Procedia PDF Downloads 275
5293 Anaerobic Digestion of Coffee Wastewater from a Fast Inoculum Adaptation Stage: Replacement of Complex Substrate

Authors: D. Lepe-Cervantes, E. Leon-Becerril, J. Gomez-Romero, O. Garcia-Depraect, A. Lopez-Lopez

Abstract:

In this study, raw coffee wastewater (CWW) was used as a complex substrate for anaerobic digestion. The inoculum adaptation stage, microbial diversity analysis and biomethane potential (BMP) tests were performed. A fast inoculum adaptation stage was used by the replacement of vinasse to CWW in an anaerobic sequential batch reactor (AnSBR) operated at mesophilic conditions. Illumina MiSeq sequencing was used to analyze the microbial diversity. While, BMP tests using inoculum adapted to CWW were carried out at different inoculum to substrate (I/S) ratios (2:1, 3:1 and 4:1, on a VS basis). Results show that the adaptability percentage was increased gradually until it reaches the highest theoretical value in a short time of 10 d; with a methane yield of 359.10 NmL CH4/g COD-removed; Methanobacterium beijingense was the most abundant microbial (75%) and the greatest specific methane production was achieved at I/S ratio 4:1, whereas the lowest was obtained at 2:1, with BMP values of 320 NmL CH4/g VS and 151 NmL CH4/g VS, respectively. In conclusion, gradual replacement of substrate was a feasible method to adapt the inoculum in a short time even using complex raw substrates, whereas in the BMP tests, the specific methane production was proportional to the initial amount of inoculum.

Keywords: anaerobic digestion, biomethane potential test, coffee wastewater, fast inoculum adaptation

Procedia PDF Downloads 377
5292 Auditory Brainstem Response in Wave VI for the Detection of Learning Disabilities

Authors: Maria Isabel Garcia-Planas, Maria Victoria Garcia-Camba

Abstract:

The use of brain stem auditory evoked potential (BAEP) is a common way to study the auditory function of people, a way to learn the functionality of a part of the brain neuronal groups that intervene in the learning process by studying the behaviour of wave VI. The latest advances in neuroscience have revealed the existence of different brain activity in the learning process that can be highlighted through the use of innocuous, low-cost, and easy-access techniques such as, among others, the BAEP that can help us to detect early possible neurodevelopmental difficulties for their subsequent assessment and cure. To date and to the authors' best knowledge, only the latency data obtained, observing the first to V waves and mainly in the left ear, were taken into account. This work shows that it is essential to take into account both ears; with these latest data, it has been possible had diagnosed more precise some cases than with the previous data had been diagnosed as 'normal' despite showing signs of some alteration that motivated the new consultation to the specialist.

Keywords: ear, neurodevelopment, auditory evoked potentials, intervals of normality, learning disabilities

Procedia PDF Downloads 159
5291 The Need for Educational Psychology in Teacher Education for Sustainable Transformation and Security in Nigeria

Authors: Kaltume Kabir Sharrif

Abstract:

Teacher education is the bedrock of educational growth and development of any nation. With development in education all human problems can be overcome. Educational Psychology, on the other hand, is in a strategic position for any programme in teacher education to be successful hence other aspects of societal issues. In other words, no teacher education can be of any help in ensuring transformation and security without adequate study in Educational Psychology. Without adequate knowledge and skills in Educational Psychology the teacher may not function effectively in the course of discharging his duty. It is in view of this, that the paper discusses some aspects of Educational Psychology that are of paramount importance in teacher education for sustainable transformation and security of Nigeria. Some recommendations were offered on the role educational psychology play in resolving security challenges facing the country. These include enriching educational psychology with topics from forensic psychology that will provide the teacher the skills of fighting crime in the school, Behavioural Science Unit should be established in each school to monitor the behavior of students, among others.

Keywords: transformation, security challenges, teacher education, educational psychology

Procedia PDF Downloads 502
5290 Analyzing Test Data Generation Techniques Using Evolutionary Algorithms

Authors: Arslan Ellahi, Syed Amjad Hussain

Abstract:

Software Testing is a vital process in software development life cycle. We can attain the quality of software after passing it through software testing phase. We have tried to find out automatic test data generation techniques that are a key research area of software testing to achieve test automation that can eventually decrease testing time. In this paper, we review some of the approaches presented in the literature which use evolutionary search based algorithms like Genetic Algorithm, Particle Swarm Optimization (PSO), etc. to validate the test data generation process. We also look into the quality of test data generation which increases or decreases the efficiency of testing. We have proposed test data generation techniques for model-based testing. We have worked on tuning and fitness function of PSO algorithm.

Keywords: search based, evolutionary algorithm, particle swarm optimization, genetic algorithm, test data generation

Procedia PDF Downloads 185
5289 The Ebola Virus Disease and Its Outbreak in Nigeria

Authors: Osagiede Efosa Kelvin

Abstract:

The Ebola virus disease (EVD); also Ebola hemorrhagic fever, is a disease of humans and other primates caused by Ebola viruses. Signs and symptoms typically start between two days and three weeks after contracting the virus as a fever, sore throat, muscle pain, and headaches. Then, vomiting, diarrhoea and rash usually follow, along with decreased function of the liver and kidneys. At this time, some people begin to bleed both internally and externally. The first death in Nigeria was reported on 25 July 2014: a Liberian-American with Ebola flew from Liberia to Nigeria and died in Lagos soon after arrival. As part of the effort to contain the disease, possible contacts were monitored –353 in Lagos and 451 in Port Harcourt On 22 September, the World Health Organisation reported a total of 20 cases, including eight deaths. The WHO's representative in Nigeria officially declared Nigeria Ebola-free on 20 October after no new active cases were reported in the follow-up contact. This paper looks at the Ebola Virus in general and the measures taken by Nigeria to combat its spread.

Keywords: Ebola virus, hemorrhagic fever, Nigeria, outbreak

Procedia PDF Downloads 497
5288 3D Images Representation to Provide Information on the Type of Castella Beams Hole

Authors: Cut Maisyarah Karyati, Aries Muslim, Sulardi

Abstract:

Digital image processing techniques to obtain detailed information from an image have been used in various fields, including in civil engineering, where the use of solid beam profiles in buildings and bridges has often been encountered since the early development of beams. Along with this development, the founded castellated beam profiles began to be more diverse in shape, such as the shape of a hexagon, triangle, pentagon, circle, ellipse and oval that could be a practical solution in optimizing a construction because of its characteristics. The purpose of this research is to create a computer application to edge detect the profile of various shapes of the castella beams hole. The digital image segmentation method has been used to obtain the grayscale images and represented in 2D and 3D formats. This application has been successfully made according to the desired function, which is to provide information on the type of castella beam hole.

Keywords: digital image, image processing, edge detection, grayscale, castella beams

Procedia PDF Downloads 137
5287 Research and Development of Intelligent Cooling Channels Design System

Authors: Q. Niu, X. H. Zhou, W. Liu

Abstract:

The cooling channels of injection mould play a crucial role in determining the productivity of moulding process and the product quality. It’s not a simple task to design high quality cooling channels. In this paper, an intelligent cooling channels design system including automatic layout of cooling channels, interference checking and assembly of accessories is studied. Automatic layout of cooling channels using genetic algorithm is analyzed. Through integrating experience criteria of designing cooling channels, considering the factors such as the mould temperature and interference checking, the automatic layout of cooling channels is implemented. The method of checking interference based on distance constraint algorithm and the function of automatic and continuous assembly of accessories are developed and integrated into the system. Case studies demonstrate the feasibility and practicality of the intelligent design system.

Keywords: injection mould, cooling channel, intelligent design, automatic layout, interference checking

Procedia PDF Downloads 434
5286 Bioremediation of Polychlorinated Biphenyl (PCBS) Contaminated Soils: A Case Study from Rietvlei Farm at Borehole No. 11, Limpopo Province, South Africa

Authors: D. Sengani, N. Potgieter, P. E. L. Mojapelo

Abstract:

Three bacteria species which comprise of Gram negative and Gram positive microorganisms were isolated and identified on the basis of morpho-cultural study, catalase tests, oxidase tests and biochemical characteristics were found belonging to different genera including Burkholderia cepacia, Pasteurella pneumotropica and Enterococcus faecalis. The main objective of this study was to isolate and identify PCB degrading bacteria from PCB contaminated soils and test them for their degradation ability of PCBs in natural habitat conditions. The results indicated an overall decrease of PCB concentration level with the gradient average ranging from 1.5 to 1.8 respectively. Enterococcus faecalis removed as much as 32% of PCBs in the contaminated soil samples. Whereas Pasteurella pneumotropica could remove 24% of PCBs, Burkholderia cepacia 21% of PCBs and the mixed culture removed 23%. Data showed that the three bacterial strains could tolerate high concentration of PCBs. The results provided the evidence that naturally occurring bacteria in soil contaminated with PCBs have the potential to degrade PCBs. Statistical analysis showed that there was a significant positive correlation between bacteria growth and treatment with a coefficient of (r) =0.1459 and p value < 0.001.

Keywords: bacteria, bioaccumulation, biodegradation, bioremediation, polychlorinated biphenyls

Procedia PDF Downloads 236
5285 Impact of Climate Change on Sea Level Rise along the Coastline of Mumbai City, India

Authors: Chakraborty Sudipta, A. R. Kambekar, Sarma Arnab

Abstract:

Sea-level rise being one of the most important impacts of anthropogenic induced climate change resulting from global warming and melting of icebergs at Arctic and Antarctic, the investigations done by various researchers both on Indian Coast and elsewhere during the last decade has been reviewed in this paper. The paper aims to ascertain the propensity of consistency of different suggested methods to predict the near-accurate future sea level rise along the coast of Mumbai. Case studies at East Coast, Southern Tip and West and South West coast of India have been reviewed. Coastal Vulnerability Index of several important international places has been compared, which matched with Intergovernmental Panel on Climate Change forecasts. The application of Geographic Information System mapping, use of remote sensing technology, both Multi Spectral Scanner and Thematic Mapping data from Landsat classified through Iterative Self-Organizing Data Analysis Technique for arriving at high, moderate and low Coastal Vulnerability Index at various important coastal cities have been observed. Instead of data driven, hindcast based forecast for Significant Wave Height, additional impact of sea level rise has been suggested. Efficacy and limitations of numerical methods vis-à-vis Artificial Neural Network has been assessed, importance of Root Mean Square error on numerical results is mentioned. Comparing between various computerized methods on forecast results obtained from MIKE 21 has been opined to be more reliable than Delft 3D model.

Keywords: climate change, Coastal Vulnerability Index, global warming, sea level rise

Procedia PDF Downloads 130
5284 An Authentic Algorithm for Ciphering and Deciphering Called Latin Djokovic

Authors: Diogen Babuc

Abstract:

The question that is a motivation of writing is how many devote themselves to discovering something in the world of science where much is discerned and revealed, but at the same time, much is unknown. Methods: The insightful elements of this algorithm are the ciphering and deciphering algorithms of Playfair, Caesar, and Vigenère. Only a few of their main properties are taken and modified, with the aim of forming a specific functionality of the algorithm called Latin Djokovic. Specifically, a string is entered as input data. A key k is given, with a random value between the values a and b = a+3. The obtained value is stored in a variable with the aim of being constant during the run of the algorithm. In correlation to the given key, the string is divided into several groups of substrings, and each substring has a length of k characters. The next step involves encoding each substring from the list of existing substrings. Encoding is performed using the basis of Caesar algorithm, i.e., shifting with k characters. However, that k is incremented by 1 when moving to the next substring in that list. When the value of k becomes greater than b+1, it’ll return to its initial value. The algorithm is executed, following the same procedure, until the last substring in the list is traversed. Results: Using this polyalphabetic method, ciphering and deciphering of strings are achieved. The algorithm also works for a 100-character string. The x character isn’t used when the number of characters in a substring is incompatible with the expected length. The algorithm is simple to implement, but it’s questionable if it works better than the other methods from the point of view of execution time and storage space.

Keywords: ciphering, deciphering, authentic, algorithm, polyalphabetic cipher, random key, methods comparison

Procedia PDF Downloads 99
5283 Rethinking: Training Needs of Secondary School Teachers in Pakistan

Authors: Sidra Rizwan

Abstract:

The article focuses on the training needs of secondary school teachers related to the knowledge component of instructional planning and strategies as stated in the National professional standards for teachers in Pakistan. The study aimed to determine the training needs of secondary school teachers on different aspects of knowledge & understanding component of instructional planning and strategies. The target population of the study was the secondary school teachers across Pakistan. For this purpose, a sample of 400 secondary school teachers was selected through multistage sampling from all the four provinces and Federal capital area. Survey method was adopted to assess the training needs by using a self reporting tool. The tool helped to gauge the training needs through indirect inventory questions as well as a ranking list in which the respondents themselves prioritized their training areas. The results showed variation between the direct and indirect reporting of the teachers on the basis of which it was concluded that the secondary school teachers needed awareness about the knowledge component of instructional planning and strategies in order to redefine their actual training needs. The researcher further identified the training needs of secondary school teachers within each province and Islamabad capital territory; including an analysis of variations between strata. As teachers are considered agents of change, their training according to the professional standards should provide a solid base for “rethinking education”.

Keywords: training needs, secondary school teachers, instructional planning & strategies, knowledge & understanding

Procedia PDF Downloads 87