Search results for: binary spray and wait
433 Density Measurement of Mixed Refrigerants R32+R1234yf and R125+R290 from 0°C to 100°C and at Pressures up to 10 MPa
Authors: Xiaoci Li, Yonghua Huang, Hui Lin
Abstract:
Optimization of the concentration of components in mixed refrigerants leads to potential improvement of either thermodynamic cycle performance or safety performance of heat pumps and refrigerators. R32+R1234yf and R125+R290 are two promising binary mixed refrigerants for the application of heat pumps working in the cold areas. The p-ρ-T data of these mixtures are one of the fundamental and necessary properties for design and evaluation of the performance of the heat pumps. Although the property data of mixtures can be predicted by the mixing models based on the pure substances incorporated in programs such as the NIST database Refprop, direct property measurement will still be helpful to reveal the true state behaviors and verify the models. Densities of the mixtures of R32+R1234yf an d R125+R290 are measured by an Anton Paar U shape oscillating tube digital densimeter DMA-4500 in the range of temperatures from 0°C to 100 °C and pressures up to 10 MPa. The accuracy of the measurement reaches 0.00005 g/cm³. The experimental data are compared with the predictions by Refprop in the corresponding range of pressure and temperature.Keywords: mixed refrigerant, density measurement, densimeter, thermodynamic property
Procedia PDF Downloads 295432 Determinants of Child Anthropometric Indicators: A Case Study of Mali in 2015
Authors: Davod Ahmadigheidari
Abstract:
The main objective of this study was to explore prevalence of anthropometric indicators as well the factors associated with the anthropometric indications in Mali. Data on 2015, downloaded from the website of Unicef, were analyzed. A total of 16,467 women (ages 15-49 years) and 16,467 children (ages 0-59 months) were selected for the sample. Different statistical analyses, such as descriptive, crosstabs and binary logistic regression form the basis of this study. Child anthropometric indicators (i.e., wasting, stunting, underweight and BMI for age) were used as the dependent variables. SPSS Syntax from WHO was used to create anthropometric indicators. Different factors, such as child’s sex, child’s age groups, child’s diseases symptoms (i.e., diarrhea, cough and fever), maternal education, household wealth index and area of residence were used as independent variables. Results showed more than forty percent of Malian households were in nutritional crises (stunting (42%) and underweight (34%). Findings from logistic regression analyses indicated that low score of wealth index, low maternal education and experience of diarrhea in last two weeks increase the probability of child malnutrition.Keywords: Mali, wasting, stunting, underweight, BMI for age and wealth index
Procedia PDF Downloads 155431 Building Green Infrastructure Networks Based on Cadastral Parcels Using Network Analysis
Authors: Gon Park
Abstract:
Seoul in South Korea established the 2030 Seoul City Master Plan that contains green-link projects to connect critical green areas within the city. However, the plan does not have detailed analyses for green infrastructure to incorporate land-cover information to many structural classes. This study maps green infrastructure networks of Seoul for complementing their green plans with identifying and raking green areas. Hubs and links of main elements of green infrastructure have been identified from incorporating cadastral data of 967,502 parcels to 135 of land use maps using geographic information system. Network analyses were used to rank hubs and links of a green infrastructure map with applying a force-directed algorithm, weighted values, and binary relationships that has metrics of density, distance, and centrality. The results indicate that network analyses using cadastral parcel data can be used as the framework to identify and rank hubs, links, and networks for the green infrastructure planning under a variable scenarios of green areas in cities.Keywords: cadastral data, green Infrastructure, network analysis, parcel data
Procedia PDF Downloads 205430 Wireless Transmission of Big Data Using Novel Secure Algorithm
Authors: K. Thiagarajan, K. Saranya, A. Veeraiah, B. Sudha
Abstract:
This paper presents a novel algorithm for secure, reliable and flexible transmission of big data in two hop wireless networks using cooperative jamming scheme. Two hop wireless networks consist of source, relay and destination nodes. Big data has to transmit from source to relay and from relay to destination by deploying security in physical layer. Cooperative jamming scheme determines transmission of big data in more secure manner by protecting it from eavesdroppers and malicious nodes of unknown location. The novel algorithm that ensures secure and energy balance transmission of big data, includes selection of data transmitting region, segmenting the selected region, determining probability ratio for each node (capture node, non-capture and eavesdropper node) in every segment, evaluating the probability using binary based evaluation. If it is secure transmission resume with the two- hop transmission of big data, otherwise prevent the attackers by cooperative jamming scheme and transmit the data in two-hop transmission.Keywords: big data, two-hop transmission, physical layer wireless security, cooperative jamming, energy balance
Procedia PDF Downloads 490429 Use of Telehealth for Facilitating the Diagnostic Assessment of Autism Spectrum Disorder: A Scoping Review
Authors: Manahil Alfuraydan, Jodie Croxall, Lisa Hurt, Mike Kerr, Sinead Brophy
Abstract:
Autism Spectrum Disorder (ASD) is a developmental condition characterised by impairment in terms of social communication, social interaction, and a repetitive or restricted pattern of interest, behaviour, and activity. There is a significant delay between seeking help and a confirmed diagnosis of ASD. This may result in delay in receiving early intervention services, which are critical for positive outcomes. The long wait times also cause stress for the individuals and their families. Telehealth potentially offers a way of improving the diagnostic pathway for ASD. This review of the literature aims to examine which telehealth approaches have been used in the diagnosis and assessment of autism in children and adults, whether they are feasible and acceptable, and how they compare with face-to-face diagnosis and assessment methods. A comprehensive search of following databases- MEDLINE, CINAHL Plus with Full text, Business Sources Complete, Web of Science, Scopus, PsycINFO and trail and systematic review databases including Cochrane Library, Health Technology Assessment, Database of Abstracts and Reviews of Effectiveness and NHS Economic Evaluation was conducted, combining the terms of autism and telehealth from 2000 to 2018. A total of 10 studies were identified for inclusion in the review. This review of the literature found there to be two methods of using telehealth: (a) video conferencing to enable teams in different areas to consult with the families and to assess the child/adult in real time and (b) a video upload to a web portal that enables the clinical assessment of behaviours in the family home. The findings were positive, finding there to be high agreement in terms of the diagnosis between remote methods and face to face methods and with high levels of satisfaction among the families and clinicians. This field is in the very early stages, and so only studies with small sample size were identified, but the findings suggest that there is potential for telehealth methods to improve assessment and diagnosis of autism used in conjunction with existing methods, especially for those with clear autism traits and adults with autism. Larger randomised controlled trials of this technology are warranted.Keywords: assessment, autism spectrum disorder, diagnosis, telehealth
Procedia PDF Downloads 128428 The Aesthetic Manifestations of Nothingness in Contemporary Visual Arts Practice
Authors: Robyn Therese Munnick
Abstract:
This paper aims to report on a qualitative practice-based research study which explores the notion of nothingness and how it (nothingness) is the conceptual and theoretical foundation for artistic practice. Furthermore, this study explicates how the artist used their mother’s battle with cancer and the subsequent void it created as source material for the artistic expression of nothingness. The diagnosis which was followed by a physical and emotional absence of the matriarch of the artist family led to an emotional trauma that triggered a feeling of nothingness within the artist. The overarching problem in the study is thus: how this ‘nothingness’ could be expressed in visual art? Nothingness, as a product of expectation, is a notion which refers to where something used to be, should be or isn’t anymore, which attempts to grasp what is there by not being there. In attempting to express nothingness, the research aims to build on an exploration of various materials and modes utilized in order to underpin the research objectives. The primary mode of delivery for the art-making process is painting. However, through strengthening the messages and meaning of the hypothesis of nothingness within the art and research, the use of further modes and materials became pivotal. This involves the use of unconventional contrasting modes within a painting such as the cloth doily, thread, tubing, ceramics, food colour, spray paint, polyvinyl acetate paint, plaster, wooden boxes and fragments thereof. These materials and modes were vital in visualising and aestheticising the conceptual underpinnings of the research. As a result, this strengthened and emancipated the art from the traditional bounds of pure painting. Methods of data gathering took the form of artefacts, document analysis, and field notes in the form of photographic journaling. Ultimately the body of work and research validates that the idea of nothingness can be artistically explored.Keywords: conceptual, nothingness, modes, unconventional
Procedia PDF Downloads 140427 Indentifying Critical Factors Influencing Timeshare Purchases in India
Authors: Shivam Kushwaha, Veena Bansal
Abstract:
Timeshare refers to real estate that is owned simultaneously by many, for a specified time in a year, for a specified numbers of years and is maintained and managed by an agency. Timeshare falls under the umbrella of tourism and is often used for vacation. Timeshare industry has attracted significantly less number of customers in India as compared to the US and Europe. In more than 40 years of existence of timeshare industry, it has not been able to grow its roots among Indian customers. The purpose of the study: To explore perception of Indian customers towards the adoption of timeshare segment of the hospitality industry and identify the factors. Source of data: Survey has been done on existing owners of holidays memberships, resorts or those who at least tourism experience in their past purchases. Methodology: Logistic Regression is used to predict binary responses of the customers based on identified critical factors which might influence timeshare purchases. Result: The study identified four factors: discretionary income, exchange options, ownership pride, risk, and measured their influence on intention to purchases in India. It is recognized that is all four variables are statistically significant while explaining in purchase intentions of customers in India.Keywords: timeshare, holiday, tourism, customer perception, intent to use, Indian tourism
Procedia PDF Downloads 297426 Coronavirus Academic Paper Sorting Application
Authors: Christina A. van Hal, Xiaoqian Jiang, Luyao Chen, Yan Chu, Robert D. Jolly, Yaobin Lin, Jitian Zhao, Kang Lin Hsieh
Abstract:
The COVID-19 Literature Summary App was created for the primary purpose of enabling academicians and clinicians to quickly sort through the vast array of recent coronavirus publications by topics of interest. Multiple methods of summarizing and sorting the manuscripts were created. A summary page introduces the application function and capabilities, while an interactive map provides daily updates on infection, death, and recovery rates. A page with a pivot table allows publication sorting by topic, with an interactive data table that allows sorting topics by columns, as wells as the capability to view abstracts. Additionally, publications may be sorted by the medical topics they cover. We used the CORD-19 database to compile lists of publications. The data table can sort binary variables, allowing the user to pick desired publication topics, such as papers that describe COVID-19 symptoms. The application is primarily designed for use by researchers but can be used by anybody who wants a faster and more efficient means of locating papers of interest.Keywords: COVID-19, literature summary, information retrieval, Snorkel
Procedia PDF Downloads 152425 A Characterization of Skew Cyclic Code with Complementary Dual
Authors: Eusebio Jr. Lina, Ederlina Nocon
Abstract:
Cyclic codes are a fundamental subclass of linear codes that enjoy a very interesting algebraic structure. The class of skew cyclic codes (or θ-cyclic codes) is a generalization of the notion of cyclic codes. This a very large class of linear codes which can be used to systematically search for codes with good properties. A linear code with complementary dual (LCD code) is a linear code C satisfying C ∩ C^⊥ = {0}. This subclass of linear codes provides an optimum linear coding solution for a two-user binary adder channel and plays an important role in countermeasures to passive and active side-channel analyses on embedded cryptosystems. This paper aims to identify LCD codes from the class of skew cyclic codes. Let F_q be a finite field of order q, and θ be an automorphism of F_q. Some conditions for a skew cyclic code to be LCD were given. To this end, the properties of a noncommutative skew polynomial ring F_q[x, θ] of automorphism type were revisited, and the algebraic structure of skew cyclic code using its skew polynomial representation was examined. Using the result that skew cyclic codes are left ideals of the ring F_q[x, θ]/〈x^n-1〉, a characterization of a skew cyclic LCD code of length n was derived. A necessary condition for a skew cyclic code to be LCD was also given.Keywords: LCD cyclic codes, skew cyclic LCD codes, skew cyclic complementary dual codes, theta-cyclic codes with complementary duals
Procedia PDF Downloads 344424 Contact Toxicity Effects of Different Formulations of Artemisia Absinthium Extracts on Rose Aphid
Authors: Maryam Atapour
Abstract:
Chemical pesticides, which are widely used in agriculture, cause problems such as soil and water pollution, reducing biodiversity and creating pest resistance. These problems have led to increased attention to alternative and more sustainable methods such as natural-based pesticides. Herbal pesticides have been developed based on essential oils or extracts from different parts of plants, such as leaves, roots, and flowers. Herbal pesticides are compatible with the environment and can be used in integrated pest management programs. Despite the many benefits, herbal pesticides, especially essential oil-based compounds, have low durability in the environment, and their production costs are high, so the use of herbal extracts with appropriate formulations is more justified in all aspects. In the current study and based on the results of previous studies, aqueous and 70% ethanolic extract of Artemisia absinthium L. was prepared by the percolation method and formulated as an emulsion and water-soluble powder. To produce powder formulation, 20% maltodextrin was used with the spray-dryer method. Different concentrations of these compounds were sprayed on bushes infected with rose aphid Macrosiphum rosae (L.). Sampling was done randomly and the percentage of aphids’ mortality was checked. The results showed that the use of different concentrations of ethanolic extracts created a significant difference in the mortality rate of aphids, while water-soluble powder formulation caused less mortality. The current results showed that the extract of this plant has practical usability to control aphids, and with the appropriate formulation, it can be used as a good alternative to chemical pesticides.Keywords: contact toxicity, formulation, extract, aphid, Artemisia absinthium.
Procedia PDF Downloads 36423 Prevalence and Spatial Distribution of Anaemia in Ethiopia using 2011 EDHS
Authors: Bedilu A. Ejigu, Eshetu Wencheko, Kiros Berhane
Abstract:
Anaemia is a condition in which the haemoglobin concentration falls below an established cut-off value due to a decrease in the number and size of red blood cells. The current study aimed to assess the spatial pattern and identify predictors related to anaemia using the third Ethiopian demographic health survey which was conducted in 2010. To achieve this objective, this study took into account the clustered nature of the data. As a result, multilevel modeling has been used in the statistical analysis. For analysis purpose, only complete cases from 15,909 females, and 13,903 males were considered. Among all subjects who agreed for haemoglobin test, 5.49 %males, and 19.86% females were anaemic. In both binary and ordinal outcome modeling approaches, educational level, age, wealth index, BMI and HIV status were identified to be significant predictors for anaemia prevalence. Furthermore, it was noted that pregnant women were more anaemic than non-pregnant women. As revealed by Moran's I test, significant spatial autocorrelation was noted across clusters. The risk of anaemia was found to vary across different regions, and higher prevalence was observed in Somali and Affar region.Keywords: anaemia, Moran's I test, multilevel models, spatial pattern
Procedia PDF Downloads 424422 Enhanced Modification Effect of CeO2 on Pt-Pd Binary Catalysts for Formic Acid Oxidation
Authors: Azeem Ur Rehman, Asma Tayyaba
Abstract:
This article deals with the promotional effects of CeO2 on PtPd/CeO2-OMC electro catalysts. The synthesized catalysts are characterized using different physico chemical techniques and evaluated in a formic acid oxidation fuel cell. N2 adsorption/desorption analysis shows that CeO2 modification increases the surface area of OMC from 1005 m2/g to 1119 m2/g. SEM, XRD and TEM analysis reveal that the presence of CeO2 enhances the active metal(s) dispersion on the CeO2-OMC surface. The average particle size of the dispersed metal decreases with the increase of Pt/Pd ratio on CeO2-OMC support. Cyclic voltametry measurement of Pd/CeO2-OMC gives 12 % higher anodic current activity with 83 mV negative shift of the peak potential as compared to unmodified Pd/OMC. In bimetallic catalysts, the addition of Pt improves the activity and stability of the catalysts significantly. Among the bimetallic samples, Pd3Pt1/CeO2-OMC displays superior current density (74.6 mA/cm2), which is 28.3 times higher than that of Pt/CeO2-OMC. It also shows higher stability in extended period of runs with least indication of CO poisoning effects.Keywords: CeO2, ordered mesoporous carbon (OMC), electro catalyst, formic acid fuel cell
Procedia PDF Downloads 492421 Effect of Black Locust Trees on the Nitrogen Dynamics of Black Pine Trees in Shonai Coastal Forest, Japan
Authors: Kazushi Murata, Fabian Watermann, O. B. Herve Gonroudobou, Le Thuy Hang, Toshiro Yamanaka, M. Larry Lopez C.
Abstract:
Aims: Black pine coastal forests play an important role as a windbreak and as a natural barrier to sand and salt spray inland in Japan. The recent invasion of N₂-fxing black locust (Robinia pseudoacacia) trees in these forests is expected to have a nutritional contribution to black pine trees growth. Thus, the effect of this new source of N on black pine trees' N assimilation needs to be assessed. Methods: In order to evaluate this contribution, tree-ring isotopic composition (δ¹⁵N) and nitrogen content (%N) of black pine (Pinus thunbergii) trees in a pure stand (BPP) and a mixed stand (BPM) with black locust (BL) trees were measured for the period 2000–2019 for BPP and BL and 1990–2019 for BPM. The same measurements were conducted in plant tissues and in soil samples. Results: The tree ring δ15N values showed that for the last 30 years, BPM trees gradually switched from BPP to BL-derived soil N starting in the 1990s, becoming the dominant N source from 2000 as no significant diference was found between BPM and BL tree ring δ¹⁵N values from 2000 to 2019. No difference in root and sapwood BPM and BL δ¹⁵N values were found, but BPM foliage (−2.1‰) was different to BPP (−4.4‰) and BL (−0.3‰), which is related to the different N assimilation pathways between BP and BL. Conclusions: Based on the results of this study, the assimilation of BL-derived N inferred from the BPM tissues' δ¹⁵N values is the result of an increase in soil bioavailable N with a higher δ¹⁵N value.Keywords: nitrogen-15, N₂-fxing species, mixed stand, soil, tree rings
Procedia PDF Downloads 64420 University Students’ Perception on Public Transit in Dhaka City
Authors: Mosabbir Pasha, Ijaj Mahmud Chowdhury, M. A. Afrahim Bhuiyann
Abstract:
With the increasing population and intensive land use, huge traffic demand is generating worldwide both in developing and developed countries. As a developing country, Bangladesh is also facing the same problem in recent years by producing huge numbers of daily trips. As a matter of fact, extensive traffic demand is increasing day by day. Also, transport system in Dhaka is heterogeneous, reflecting the heterogeneity in the socio-economic and land use patterns. As a matter of fact, trips produced here are for different purposes such as work, business, educational etc. Due to the significant concentration of educational institutions a large share of the trips are generated by educational purpose. And one of the major percentages of educational trips is produced by university going students and most of them are travelled by car, bus, train, taxi, rickshaw etc. The aim of the study was to find out the university students’ perception on public transit ridership. A survey was conducted among 330 students from eight different universities. It was found out that 26% of the trips produced by university going students are travelled by public bus service and only 5% are by train. Percentage of car share is 16% and 12% of the trips are travelled by private taxi. From the study, it has been found that more than 42 percent student’s family resides outside of Dhaka, eventually they prefer bus instead of other options. Again those who chose to walk most of the time, of them, over 40 percent students’ family reside outside of Dhaka and of them over 85 percent students have a tendency to live in a mess. They generally choose a neighboring location to their respective university so that they can reach their destination by walk. On the other hand, those who travel by car 80 percent of their family reside inside Dhaka. The study also revealed that the most important reason that restricts students not to use public transit is poor service. Negative attitudes such as discomfort, uneasiness in using public transit also reduces the usage of public transit. The poor waiting area is another major cause of not using public transit. Insufficient security also plays a significant role in not using public transit. On the contrary, the fare is not a problem for students those who use public transit as a mode of transportation. Students also think stations are not far away from their home or institution and they do not need to wait long for the buses or trains. It was also found accessibility to public transit is moderate.Keywords: traffic demand, fare, poor service, public transit ridership
Procedia PDF Downloads 268419 A Neuron Model of Facial Recognition and Detection of an Authorized Entity Using Machine Learning System
Authors: J. K. Adedeji, M. O. Oyekanmi
Abstract:
This paper has critically examined the use of Machine Learning procedures in curbing unauthorized access into valuable areas of an organization. The use of passwords, pin codes, user’s identification in recent times has been partially successful in curbing crimes involving identities, hence the need for the design of a system which incorporates biometric characteristics such as DNA and pattern recognition of variations in facial expressions. The facial model used is the OpenCV library which is based on the use of certain physiological features, the Raspberry Pi 3 module is used to compile the OpenCV library, which extracts and stores the detected faces into the datasets directory through the use of camera. The model is trained with 50 epoch run in the database and recognized by the Local Binary Pattern Histogram (LBPH) recognizer contained in the OpenCV. The training algorithm used by the neural network is back propagation coded using python algorithmic language with 200 epoch runs to identify specific resemblance in the exclusive OR (XOR) output neurons. The research however confirmed that physiological parameters are better effective measures to curb crimes relating to identities.Keywords: biometric characters, facial recognition, neural network, OpenCV
Procedia PDF Downloads 256418 Seed Quality Aspects of Nightshade (Solanum Nigrum) as Influenced by Gibberellins (GA3) on Seed
Authors: Muga Moses
Abstract:
Plant growth regulators are actively involved in the growth and yield of plants. However, limited information is available on the combined effect of gibberellic acid (GA3) on growth attributes and yield of African nightshade. This experiment will be designed to fill this gap by studying the performance of African nightshade under the application of hormones. Gibberellic acid is a plant growth hormone that promotes cell expansion and division. A greenhouse and laboratory experiment will be conducted at the University of Sussex biotechnology greenhouse and Agriculture laboratory using a growth chamber to study the effect of GA3 on the growth and development attributes of African nightshade. The experiment consists of three replications and 5 treatments and is laid out in a randomized complete block design consisting of various concentrations of GA3. 0ppm, 50ppm, 100ppm, 150ppm and 200ppm. local farmer seed was grown in plastic pots, 6 seeds then hardening off to remain with four plants per pot at the greenhouse to attain purity of germplasm, proper management until maturity of berries then harvesting and squeezing to get seeds, paper dry on the sun for 7 days. In a laboratory, place 5 Whatman filter paper on glass petri-dish subject to different concentrations of stock solution, count 50 certified and clean, healthy seeds, then arrange on the moist filter paper and mark respectively. Spray with the stock solution twice a day and protrusion of radicle termed as germination count and discard to increase the accuracy of precision. Data will be collected on the application of GA3 to compare synergistic effects on the growth, yield, and nutrient contents on African nightshade.Keywords: African nightshade, growth, yield, shoot, gibberellins
Procedia PDF Downloads 88417 High Frequency Memristor-Based BFSK and 8QAM Demodulators
Authors: Nahla Elazab, Mohamed Aboudina, Ghada Ibrahim, Hossam Fahmy, Ahmed Khalil
Abstract:
This paper presents the developed memristor based demodulators for eight circular Quadrature Amplitude Modulation (QAM) and Binary Frequency Shift Keying (BFSK) operating at relatively high frequency. In our implementations, the experimental-based ‘nonlinear’ dopant drift model is adopted along with the proposed circuits providing incorporation of all known non-idealities of practically realized memristor and gaining high operation frequency. The suggested designs leverage the distinctive characteristics of the memristor device, definitely, its changeable average memristance versus the frequency, phase and amplitude of the periodic excitation input. The proposed demodulators feature small integration area, low power consumption, and easy implementation. Moreover, the proposed QAM demodulator precludes the requirement for the carrier recovery circuits. In doing so, the designs were validated by transient simulations using the nonlinear dopant drift memristor model. The simulations results show high agreement with the theory presented.Keywords: BFSK, demodulator, high frequency memristor applications, memristor based analog circuits, nonlinear dopant drift model, QAM
Procedia PDF Downloads 167416 Religiosity and Social Factors on Alcohol Use among South African University Students
Authors: Godswill Nwabuisi Osuafor, Sonto Maria Maputle
Abstract:
Background: Abounding studies found that religiosity and social factors modulate alcohol use among university students. However, there is a scarcity of empirical studies examining the protective effects of religiosity and other social factors on alcohol use and abuse in South African universities. The aim of this study was therefore to assess the protective effects of religiosity and roles of social factors on alcohol use among university students. Methodology: A survey on the use of alcohol among 416 university students was conducted using structured questionnaire in 2014. Data were sourced on religiosity and contextual variables. Students were classified as practicing intrinsic religiosity or extrinsic religiosity based on the response to the measures of religiosity. Descriptive, chi square and binary logistic analyses were used in processing the data. Result: Results revealed that alcohol use was associated with religiosity, religion, sex, family history of alcohol use and experimenting with alcohol. Reporting alcohol abuse was significantly predicted by sex, family history of alcohol use and experimenting with alcohol. Religiosity mediated lower alcohol use whereas family history of alcohol use and experimenting with alcohol promoted alcohol use and abuse. Conclusion: Families, religious groups and societal factors may be the specific niches for intervention on alcohol use among university students.Keywords: religiosity, alcohol use, protective factors, university students
Procedia PDF Downloads 397415 Robust Data Image Watermarking for Data Security
Authors: Harsh Vikram Singh, Ankur Rai, Anand Mohan
Abstract:
In this paper, we propose secure and robust data hiding algorithm based on DCT by Arnold transform and chaotic sequence. The watermark image is scrambled by Arnold cat map to increases its security and then the chaotic map is used for watermark signal spread in middle band of DCT coefficients of the cover image The chaotic map can be used as pseudo-random generator for digital data hiding, to increase security and robustness .Performance evaluation for robustness and imperceptibility of proposed algorithm has been made using bit error rate (BER), normalized correlation (NC), and peak signal to noise ratio (PSNR) value for different watermark and cover images such as Lena, Girl, Tank images and gain factor .We use a binary logo image and text image as watermark. The experimental results demonstrate that the proposed algorithm achieves higher security and robustness against JPEG compression as well as other attacks such as addition of noise, low pass filtering and cropping attacks compared to other existing algorithm using DCT coefficients. Moreover, to recover watermarks in proposed algorithm, there is no need to original cover image.Keywords: data hiding, watermarking, DCT, chaotic sequence, arnold transforms
Procedia PDF Downloads 515414 LGBT+ Migrants: A Cultural and Legislative Comparison in Canada, Italy and Egypt
Authors: Andreas Aceranti, Simonetta Vernocchi, Federica Brondoni, Marco Colorato, Marta Primatesta
Abstract:
This study entitled “LGBT+ migrants: a cultural and legislative comparison in Canada, Italy and Egypt” suggests an analysis of the living conditions of migrants who are members of the LGBT+ community in Canada, Italy and Egypt. The acronym LGBT+ refers to lesbian, gay, bisexual, transgender and all other gender identities and sexual orientations that do not fit into the male and female binary. This study aims at reflecting on the living conditions of LGBT+ migrants and the relatable difficulties they may face due to the culture and laws of their countries. Migratory flows were examined by providing a definition of "migrant" and the choices that drive a person to migrate elsewhere explained, followed by a focus on the recognition of refugee status related to sexual orientation and gender identity. Furthermore, we will deal with Canada, Italy and Egypt respectively, by analyzing for each country the history and rise of the LGBT+ community, the different laws and especially the migrants’ rights. Finally, the services and associations designed to provide a response to the needs of these people will be analyzed, highlighting the branches which nowadays operate in those areas and the importance of the cultural mediator.Keywords: LGBTQ+, migrants, international rights, discrimination
Procedia PDF Downloads 112413 Semi-Supervised Learning Using Pseudo F Measure
Authors: Mahesh Balan U, Rohith Srinivaas Mohanakrishnan, Venkat Subramanian
Abstract:
Positive and unlabeled learning (PU) has gained more attention in both academic and industry research literature recently because of its relevance to existing business problems today. Yet, there still seems to be some existing challenges in terms of validating the performance of PU learning, as the actual truth of unlabeled data points is still unknown in contrast to a binary classification where we know the truth. In this study, we propose a novel PU learning technique based on the Pseudo-F measure, where we address this research gap. In this approach, we train the PU model to discriminate the probability distribution of the positive and unlabeled in the validation and spy data. The predicted probabilities of the PU model have a two-fold validation – (a) the predicted probabilities of reliable positives and predicted positives should be from the same distribution; (b) the predicted probabilities of predicted positives and predicted unlabeled should be from a different distribution. We experimented with this approach on a credit marketing case study in one of the world’s biggest fintech platforms and found evidence for benchmarking performance and backtested using historical data. This study contributes to the existing literature on semi-supervised learning.Keywords: PU learning, semi-supervised learning, pseudo f measure, classification
Procedia PDF Downloads 235412 Machine Learning Assisted Prediction of Sintered Density of Binary W(MO) Alloys
Authors: Hexiong Liu
Abstract:
Powder metallurgy is the optimal method for the consolidation and preparation of W(Mo) alloys, which exhibit excellent application prospects at high temperatures. The properties of W(Mo) alloys are closely related to the sintered density. However, controlling the sintered density and porosity of these alloys is still challenging. In the past, the regulation methods mainly focused on time-consuming and costly trial-and-error experiments. In this study, the sintering data for more than a dozen W(Mo) alloys constituted a small-scale dataset, including both solid and liquid phases of sintering. Furthermore, simple descriptors were used to predict the sintered density of W(Mo) alloys based on the descriptor selection strategy and machine learning method (ML), where the ML algorithm included the least absolute shrinkage and selection operator (Lasso) regression, k-nearest neighbor (k-NN), random forest (RF), and multi-layer perceptron (MLP). The results showed that the interpretable descriptors extracted by our proposed selection strategy and the MLP neural network achieved a high prediction accuracy (R>0.950). By further predicting the sintered density of W(Mo) alloys using different sintering processes, the error between the predicted and experimental values was less than 0.063, confirming the application potential of the model.Keywords: sintered density, machine learning, interpretable descriptors, W(Mo) alloy
Procedia PDF Downloads 82411 Worst-Case Load Shedding in Electric Power Networks
Authors: Fu Lin
Abstract:
We consider the worst-case load-shedding problem in electric power networks where a number of transmission lines are to be taken out of service. The objective is to identify a prespecified number of line outages that lead to the maximum interruption of power generation and load at the transmission level, subject to the active power-flow model, the load and generation capacity of the buses, and the phase-angle limit across the transmission lines. For this nonlinear model with binary constraints, we show that all decision variables are separable except for the nonlinear power-flow equations. We develop an iterative decomposition algorithm, which converts the worst-case load shedding problem into a sequence of small subproblems. We show that the subproblems are either convex problems that can be solved efficiently or nonconvex problems that have closed-form solutions. Consequently, our approach is scalable for large networks. Furthermore, we prove the convergence of our algorithm to a critical point, and the objective value is guaranteed to decrease throughout the iterations. Numerical experiments with IEEE test cases demonstrate the effectiveness of the developed approach.Keywords: load shedding, power system, proximal alternating linearization method, vulnerability analysis
Procedia PDF Downloads 139410 Silent Culminations in Operas Aida and Mazeppa
Authors: Stacy Jarvis
Abstract:
A silent culmination is a musical technique that creates or increases tension in a piece of music. It is a type of cadence in which the music gradually builds to a climax but suddenly stops without any resolution. This technique can create suspense and anticipation in the listener as they wait to find out what will happen next. It can also draw attention to a particular element of the music, such as a particular instrument or vocal line. Silent culminations can evoke a sense of mystery or ambiguity by not resolving the tension created. This technique has been used by composers of all musical genres, from classical to jazz, as well as in film scores. Silent culminations can also make a piece of music more dynamic and exciting. Verdi’s Aida is a classic example of the use of silent culminations to create tension and suspense. Throughout the opera, Verdi uses a technique of gradually building to a climax, only to abruptly stop without any resolution. This technique brings out the story's drama and intensity and creates anticipation for the climactic moments. For example, at the end of the second act, Verdi reaches a crescendo of tension as Aida and Radamès swear their undying love for one another, only to stop with a moment of silence. This technique also helps to draw attention to the important moments in the story, such as the duets between Aida and Radamès. By stopping the music just before it resolves, Verdi can create an atmosphere of anticipation and suspense that carries through to the opera's end. Silent culminations are used greatly in Aida and are integral to Verdi’s dramatic style. In his symphonic poem Mazeppa, Tchaikovsky uses silent culminations to emphasize the piece's drama and powerful emotions. The piece begins with a gentle introduction but quickly builds to a powerful climax. Throughout the piece, Tchaikovsky uses silent culminations to create tension and suspense, drawing the listener in and heightening the intensity of the music 2. The most dramatic moment of the piece comes when the music builds to a frantic climax and then suddenly cuts out, leaving the listener hanging in anticipation of what will happen next. This technique creates an intense atmosphere and leaves the listener eager to hear what comes next. In addition, the use of silent culminations helps to emphasize the strong emotions of the piece, such as fear, horror, and despair. By not resolving the tension with a resolution, the listener is left with a feeling of uneasiness and uncertainty that helps to convey the story of Mazeppa’s tragic fate.Keywords: Verdi, Tchaikovsky, opera, culmination
Procedia PDF Downloads 94409 Emotion Recognition with Occlusions Based on Facial Expression Reconstruction and Weber Local Descriptor
Authors: Jadisha Cornejo, Helio Pedrini
Abstract:
Recognition of emotions based on facial expressions has received increasing attention from the scientific community over the last years. Several fields of applications can benefit from facial emotion recognition, such as behavior prediction, interpersonal relations, human-computer interactions, recommendation systems. In this work, we develop and analyze an emotion recognition framework based on facial expressions robust to occlusions through the Weber Local Descriptor (WLD). Initially, the occluded facial expressions are reconstructed following an extension approach of Robust Principal Component Analysis (RPCA). Then, WLD features are extracted from the facial expression representation, as well as Local Binary Patterns (LBP) and Histogram of Oriented Gradients (HOG). The feature vector space is reduced using Principal Component Analysis (PCA) and Linear Discriminant Analysis (LDA). Finally, K-Nearest Neighbor (K-NN) and Support Vector Machine (SVM) classifiers are used to recognize the expressions. Experimental results on three public datasets demonstrated that the WLD representation achieved competitive accuracy rates for occluded and non-occluded facial expressions compared to other approaches available in the literature.Keywords: emotion recognition, facial expression, occlusion, fiducial landmarks
Procedia PDF Downloads 182408 Logistic Model Tree and Expectation-Maximization for Pollen Recognition and Grouping
Authors: Endrick Barnacin, Jean-Luc Henry, Jack Molinié, Jimmy Nagau, Hélène Delatte, Gérard Lebreton
Abstract:
Palynology is a field of interest for many disciplines. It has multiple applications such as chronological dating, climatology, allergy treatment, and even honey characterization. Unfortunately, the analysis of a pollen slide is a complicated and time-consuming task that requires the intervention of experts in the field, which is becoming increasingly rare due to economic and social conditions. So, the automation of this task is a necessity. Pollen slides analysis is mainly a visual process as it is carried out with the naked eye. That is the reason why a primary method to automate palynology is the use of digital image processing. This method presents the lowest cost and has relatively good accuracy in pollen retrieval. In this work, we propose a system combining recognition and grouping of pollen. It consists of using a Logistic Model Tree to classify pollen already known by the proposed system while detecting any unknown species. Then, the unknown pollen species are divided using a cluster-based approach. Success rates for the recognition of known species have been achieved, and automated clustering seems to be a promising approach.Keywords: pollen recognition, logistic model tree, expectation-maximization, local binary pattern
Procedia PDF Downloads 182407 Novel Bioinspired Design to Capture Smoky CO2 by Reactive Absorption with Aqueous Scrubber
Authors: J. E. O. Hernandez
Abstract:
In the next 20 years, energy production by burning fuels will increase and so will the atmospheric concentration of CO2 and its well-known threats to life on Earth. The technologies available for capturing CO2 are still dubious and this keeps fostering an interest in bio-inspired approaches. The leading one is the application of carbonic anhydrase (CA) –a superfast biocatalyst able to convert up to one million molecules of CO2 into carbonates in water. However, natural CA underperforms when applied to real smoky CO2 in chimneys and, so far, the efforts to create superior CAs in the lab rely on screening methods running under pristine conditions at the micro level, which are far from resembling those in chimneys. For the evolution of man-made enzymes, selection rather than screening would be ideal but this is challenging because of the need for a suitable artificial environment that is also sustainable for our society. Herein we present the stepwise design and construction of a bioprocess (from bench-scale to semi-pilot) for evolutionary selection experiments. In this bioprocess, reaction and adsorption took place simultaneously at atmospheric pressure in a spray tower. The scrubbing solution was fed countercurrently by reusing municipal pressure and it was mainly prepared with water, carbonic anhydrase and calcium chloride. This bioprocess allowed for the enzymatic carbonation of smoky CO2; the reuse of process water and the recovery of solid carbonates without cooling of smoke, pretreatments, solvent amines and compression of CO2. The average yield of solid carbonates was 0.54 g min-1 or 12-fold the amount produced in serum bottles at lab bench scale. This bioprocess could be used as a tailor-made environment for driving the selection of superior CAs. The bioprocess and its match CA could be sustainably used to reduce global warming by CO2 emissions from exhausts.Keywords: biological carbon capture and sequestration, carbonic anhydrase, directed evolution, global warming
Procedia PDF Downloads 193406 Synergistic Effects of Hydrogen Sulfide and Melatonin in Alleviating Vanadium Toxicity in Solanum lycopersicum L. Plants
Authors: Abazar Ghorbani, W. M. Wishwajith W. Kandegama, Seyed Mehdi Razavi, Moxian Chen
Abstract:
The roles of hydrogen sulfide (H₂S) and melatonin (MT) as gasotransmitters in plants are widely recognised. Nevertheless, the precise nature of their involvement in defensive reactions remains uncertain. This study investigates the impact of the ML-H2S interaction on tomato plants exposed to vanadium (V) toxicity, focusing on synthesising secondary metabolites and V metal sequestration. The treatments applied in this study included a control (T1), V stress (T2), MT+V (T3), MT+H2S+V (T4), MT+hypotaurine (HT)+V (T5), and MT+H2S+HT+V (T6). These treatments were administered: MT (150 µM) as a foliar spray pre-treatment (3X), HT treatment (0.1 mM, an H2S scavenger) as root immersion for 12 hours as pre-treatments, and H2S (NaHS, 0.2 mM) and V (40 mg/L) treatments added to the Hoagland solution for 2 weeks. Results demonstrate that ML and H2S+ML treatments alleviate V toxicity by promoting the transcription of key genes (ANS, F3H, CHS, DFR, PAL, and CHI) involved in phenolic and anthocyanin biosynthesis. Moreover, they decreased V uptake and accumulation and enhanced the transcription of genes involved in glutathione and phytochelatin synthesis (GSH1, PCS, and ABC1), leading to V sequestration in roots and protection against V-induced damage. Additionally, ML and H2S+ML treatments optimize chlorophyll metabolism, and increase internal H2S levels, thereby promoting tomato growth under V stress. The combined treatment of ML+H2S shows superior effects compared to ML alone, suggesting synergistic/interactive effects between these two substances. Furthermore, inhibition of the beneficial impact of ML+H2S and ML treatments by HT, an H2S scavenger, underscores the significant involvement of H₂S in the signaling pathway activated by ML during V toxicity. Overall, these findings suggest that ML requires the presence of endogenous H₂S to mitigate V-induced adverse effects on tomato seedlings.Keywords: vanadium toxicity, secondary metabolites, vanadium sequestration, h2s-melatonin crosstalk
Procedia PDF Downloads 45405 A QoE-driven Cross-layer Resource Allocation Scheme for High Traffic Service over Open Wireless Network Downlink
Authors: Liya Shan, Qing Liao, Qinyue Hu, Shantao Jiang, Tao Wang
Abstract:
In this paper, a Quality of Experience (QoE)-driven cross-layer resource allocation scheme for high traffic service over Open Wireless Network (OWN) downlink is proposed, and the related problem about the users in the whole cell including the users in overlap region of different cells has been solved.A method, in which assess models of the BestEffort service and the no-reference assess algorithm for video service are adopted, to calculate the Mean Opinion Score (MOS) value for high traffic service has been introduced. The cross-layer architecture considers the parameters in application layer, media access control layer and physical layer jointly. Based on this architecture and the MOS value, the Binary Constrained Particle Swarm Optimization (B_CPSO) algorithm is used to solve the cross-layer resource allocation problem. In addition,simulationresults show that the proposed scheme significantly outperforms other schemes in terms of maximizing average users’ MOS value for the whole system as well as maintaining fairness among users.Keywords: high traffic service, cross-layer resource allocation, QoE, B_CPSO, OWN
Procedia PDF Downloads 541404 Comparative Study in Dentinal Tubuli Occlusion Using Bioglass and Copper-Bromide Laser
Authors: Sun Woo Lee, Tae Bum Lee, Yoon Hwa Park, Yoo Jeong Kim
Abstract:
Cervical dentinal hypersensitivity (CDH) affects 8-30% of adults and nearly 85% of perio-treated patients. Various treatment schemes have been applied for treating CDH, among them being fluoride application, laser irradiation, and, recently, bioglass. The purpose of this study was to investigate the influence of bioglass, copper-bromide (Cu-Br) laser irradiation and their combination on dentinal tubule occlusion as a potential dentinal hypersensitivity treatment for CDH. 45 human dentin surfaces were organized into three equal groups: group A received Cu-Br laser only; group B received bioglass only; group C received bioglass followed by Cu-Br laser irradiation. Specimens were evaluated with regard to dentinal tubule occlusion under environmental scanning electron microscope. Treatment modality significantly affected dentinal tubule occlusion (p<0.001). Groups B and C scored higher dentinal tubule occlusion than group A. Binary logistic regression showed that bioglass application significantly (p<0.001) contributed to dentinal tubule occlusion, compared with other variables. Under the conditions used herein and within the limitations of this study, bioglass application, alone or combined with Cu-Br laser irradiation, is a superior method for producing dentinal tubule occlusion, and may lead to an effective treatment modality for CDH.Keywords: bioglass, Cu-Br laser, cervical dentinal hypersensitivity, dentinal tubule occlusion
Procedia PDF Downloads 355