Search results for: identification of person
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4273

Search results for: identification of person

3613 Identification of Potential Predictive Biomarkers for Early Diagnosis of Preeclampsia Growth Factors to microRNAs

Authors: Sadia Munir

Abstract:

Preeclampsia is the contributor to the worldwide maternal mortality of approximately 100,000 deaths a year. It complicates about 10% of all pregnancies and is the first cause of maternal admission to intensive care units. Predicting preeclampsia is a major challenge in obstetrics. More importantly, no major progress has been achieved in the treatment of preeclampsia. As placenta is the main cause of the disease, the only way to treat the disease is to extract placental and deliver the baby. In developed countries, the cost of an average case of preeclampsia is estimated at £9000. Interestingly, preeclampsia may have an impact on the health of mother or infant, beyond the pregnancy. We performed a systematic search of PubMed including the combination of terms such as preeclampsia, biomarkers, treatment, hypoxia, inflammation, oxidative stress, vascular endothelial growth factor A, activin A, inhibin A, placental growth factor, transforming growth factor β-1, Nodal, placenta, trophoblast cells, microRNAs. In this review, we have summarized current knowledge on the identification of potential biomarkers for the diagnosis of preeclampsia. Although these studies show promising data in early diagnosis of preeclampsia, the current value of these factors as biomarkers, for the precise prediction of preeclampsia, has its limitation. Therefore, future studies need to be done to support some of the very promising and interesting data to develop affordable and widely available tests for early detection and treatment of preeclampsia.

Keywords: activin, biomarkers, growth factors, miroRNA

Procedia PDF Downloads 438
3612 Concept for Determining the Focus of Technology Monitoring Activities

Authors: Guenther Schuh, Christina Koenig, Nico Schoen, Markus Wellensiek

Abstract:

Identification and selection of appropriate product and manufacturing technologies are key factors for competitiveness and market success of technology-based companies. Therefore many companies perform technology intelligence (TI) activities to ensure the identification of evolving technologies at the right time. Technology monitoring is one of the three base activities of TI, besides scanning and scouting. As the technological progress is accelerating, more and more technologies are being developed. Against the background of limited resources it is therefore necessary to focus TI activities. In this paper, we propose a concept for defining appropriate search fields for technology monitoring. This limitation of search space leads to more concentrated monitoring activities. The concept will be introduced and demonstrated through an anonymized case study conducted within an industry project at the Fraunhofer Institute for Production Technology. The described concept provides a customized monitoring approach, which is suitable for use in technology-oriented companies especially those that have not yet defined an explicit technology strategy. It is shown in this paper that the definition of search fields and search tasks are suitable methods to define topics of interest and thus to direct monitoring activities. Current as well as planned product, production and material technologies as well as existing skills, capabilities and resources form the basis of the described derivation of relevant search areas. To further improve the concept of technology monitoring the proposed concept should be extended during future research e.g. by the definition of relevant monitoring parameters.

Keywords: monitoring radar, search field, technology intelligence, technology monitoring

Procedia PDF Downloads 472
3611 Information Literacy Initiatives in India in Present Era Age

Authors: Darshan Lal

Abstract:

The paper describes the concept of Information literacy. It is a critical component of this information age. Information literacy is the vital process in modern changing world. Information Literacy initiatives in India was also discussed. Paper also discussed Information literacy programmes for LIS professionals. Information literacy makes person capable to recognize when information is needed and how to locate, evaluate and use effectively of the needed information.

Keywords: information literacy, information communication technology (ICT), information literacy programmes

Procedia PDF Downloads 366
3610 Anti-Fire Group 'Peduli Api': Case Study of Mitigating the Fire Hazard Impact and Climate Policy Enhancement on Riau Province Indonesia

Authors: Bayu Rizky Pratama, Hardiansyah Nur Sahaya

Abstract:

Riau Province is the worst emitter for forest burning which causes the huge scale of externality such as declining of forest habitat, health disease, and climate change impact. Indonesia forum of budget transparency for Riau Province (FITRA) reported the length of forest burning reached about 186.069 hectares which is 7,13% of total national forest burning disaster, consisted of 107.000 hectares of peatland and the rest 79.069 hectares of mineral land. Anti-fire group, a voluntary group next to the forest, to help in protecting the forest burning and heavily smoke residual has been established but unfortunately the implementation still far from expectation. This research will emphasize on (1) how the anti-fire group contribute to fire hazard tackling; (2) the identification of SWOT analysis to enhance the group benefit; and (3) government policy implication to maximize the role of Anti-fire group and reduce the case of forest burning as well as heavily smoke which can raise climate change impact. As the observation found some weakness from SWOT identification such as (1) lack of education and training; (2) facility in extinguishing the fire damage; (3) law for economic incentive; (4) communication and field experience; (5) also the reporting the fire case.

Keywords: anti-fire group, forest burning impact, SWOT, climate change mitigation

Procedia PDF Downloads 387
3609 Digi-Buddy: A Smart Cane with Artificial Intelligence and Real-Time Assistance

Authors: Amaladhithyan Krishnamoorthy, Ruvaitha Banu

Abstract:

Vision is considered as the most important sense in humans, without which leading a normal can be often difficult. There are many existing smart canes for visually impaired with obstacle detection using ultrasonic transducer to help them navigate. Though the basic smart cane increases the safety of the users, it does not help in filling the void of visual loss. This paper introduces the concept of Digi-Buddy which is an evolved smart cane for visually impaired. The cane consists for several modules, apart from the basic obstacle detection features; the Digi-Buddy assists the user by capturing video/images and streams them to the server using a wide-angled camera, which then detects the objects using Deep Convolutional Neural Network. In addition to determining what the particular image/object is, the distance of the object is assessed by the ultrasonic transducer. The sound generation application, modelled with the help of Natural Language Processing is used to convert the processed images/object into audio. The object detected is signified by its name which is transmitted to the user with the help of Bluetooth hear phones. The object detection is extended to facial recognition which maps the faces of the person the user meets in the database of face images and alerts the user about the person. One of other crucial function consists of an automatic-intimation-alarm which is triggered when the user is in an emergency. If the user recovers within a set time, a button is provisioned in the cane to stop the alarm. Else an automatic intimation is sent to friends and family about the whereabouts of the user using GPS. In addition to safety and security by the existing smart canes, the proposed concept devices to be implemented as a prototype helping visually-impaired visualize their surroundings through audio more in an amicable way.

Keywords: artificial intelligence, facial recognition, natural language processing, internet of things

Procedia PDF Downloads 353
3608 The Sustainable Development for Coastal Tourist Building

Authors: D. Avila

Abstract:

The tourism industry is a phenomenon that has become a growing presence in international socio-economic dynamics, which in most cases exceeds the control parameters in the various environmental regulations and sustainability of existing resources. Because of this, the effects on the natural environment at the regional and national levels represent a challenge, for which a number of strategies are necessary to minimize the environmental impact generated by the occupation of the territory. The hotel tourist building and sustainable development in the coastal zone, have an important impact on the environment and on the physical and psychological health of the inhabitants. Environmental quality associated with the comfort of humans to the sustainable development of natural resources; applied to the hotel architecture this concept involves the incorporation of new demands on all of the constructive process of a building, changing customs of developers and users. The methodology developed provides an initial analysis to determine and rank the different tourist buildings, with the above it will be feasible to establish methods of study and environmental impact assessment. Finally, it is necessary to establish an overview regarding the best way to implement tourism development on the coast, containing guidelines to improve and protect the natural environment. This paper analyzes the parameters and strategies to reduce environmental impacts derived from deployments tourism on the coast, through a series of recommendations towards sustainability, in the context of the Bahia de Banderas, Puerto Vallarta, Jalisco. The environmental impact caused by the implementation of tourism development, perceived in a coastal environment, forcing a series of processes, ranging from the identification of impacts, prediction and evaluation of them. For this purpose are described below, different techniques and valuation procedures: Identification of impacts. Methods for the identification of damage caused to the environment pursue general purpose to obtain a group of negative indicators that are subsequently used in the study of environmental impact. There are several systematic methods to identify the impacts caused by human activities. In the present work, develops a procedure based and adapted from the Ministry of works public urban reference in studies of environmental impacts, the representative methods are: list of contrast, arrays, and networks, method of transparencies and superposition of maps.

Keywords: environmental impact, physical health, sustainability, tourist building

Procedia PDF Downloads 329
3607 Providing Support On-Time: Need to Establish De-Radicalization Hotlines

Authors: Ashir Ahmed

Abstract:

Peacekeeping is a collective responsibility of governments, law enforcement agencies, communities, families, and individuals. Moreover, the complex nature of peacekeeping activities requires a holistic and collaborative approach where various community sectors work together to form collective strategies that are likely to be more effective than strategies designed and delivered in isolation. Similarly, it is important to learn from past programs to evaluate the initiatives that have worked well and the areas that need further improvement. Review of recent peacekeeping initiatives suggests that there have been tremendous efforts and resources put in place to deal with the emerging threat of terrorism, radicalization and violent extremism through number of de-radicalization programs. Despite various attempts in designing and delivering successful programs for deradicalization, the threat of people being radicalized is growing more than ever before. This research reviews the prominent de-radicalization programs to draw an understanding of their strengths and weaknesses. Some of the weaknesses in the existing programs include. Inaccessibility: Limited resources, geographical location of potential participants (for offline programs), inaccessibility or inability to use various technologies (for online programs) makes it difficult for people to participate in de-radicalization programs. Timeliness: People might need to wait for a program on a set date/time to get the required information and to get their questions answered. This is particularly true for offline programs. Lack of trust: The privacy issues and lack of trust between participants and program organizers are another hurdle in the success of de-radicalization programs. The fear of sharing participants information with organizations (such as law enforcement agencies) without their consent led them not to participate in these programs. Generalizability: Majority of these programs are very generic in nature and do not cater the specific needs of an individual. Participants in these programs may feel that the contents are irrelevant to their individual situations and hence feel disconnected with purpose of the programs. To address the above-mentioned weaknesses, this research developed a framework that recommends some improvements in de-radicalization programs. One of the recommendations is to offer 24/7, secure, private and online hotline (also referred as helpline) for the people who have any question, concern or situation to discuss with someone who is qualified (a counsellor) to deal with people who are vulnerable to be radicalized. To make these hotline services viable and sustainable, the existing organizations offering support for depression, anxiety or suicidal ideation could additionally host these services. These helplines should be available via phone, the internet, social media and in-person. Since these services will be embedded within existing and well-known services, they would likely to get more visibility and promotion. The anonymous and secure conversation between a person and a counsellor would ensure that a person can discuss the issues without being afraid of information sharing with any third party – without his/her consent. The next stage of this project would include the operationalization of the framework by collaborating with other organizations to host de-radicalization hotlines and would assess the effectiveness of such initiatives.

Keywords: de-radicalization, framework, hotlines, peacekeeping

Procedia PDF Downloads 214
3606 Remote Assessment and Change Detection of GreenLAI of Cotton Crop Using Different Vegetation Indices

Authors: Ganesh B. Shinde, Vijaya B. Musande

Abstract:

Cotton crop identification based on the timely information has significant advantage to the different implications of food, economic and environment. Due to the significant advantages, the accurate detection of cotton crop regions using supervised learning procedure is challenging problem in remote sensing. Here, classifiers on the direct image are played a major role but the results are not much satisfactorily. In order to further improve the effectiveness, variety of vegetation indices are proposed in the literature. But, recently, the major challenge is to find the better vegetation indices for the cotton crop identification through the proposed methodology. Accordingly, fuzzy c-means clustering is combined with neural network algorithm, trained by Levenberg-Marquardt for cotton crop classification. To experiment the proposed method, five LISS-III satellite images was taken and the experimentation was done with six vegetation indices such as Simple Ratio, Normalized Difference Vegetation Index, Enhanced Vegetation Index, Green Atmospherically Resistant Vegetation Index, Wide-Dynamic Range Vegetation Index, Green Chlorophyll Index. Along with these indices, Green Leaf Area Index is also considered for investigation. From the research outcome, Green Atmospherically Resistant Vegetation Index outperformed with all other indices by reaching the average accuracy value of 95.21%.

Keywords: Fuzzy C-Means clustering (FCM), neural network, Levenberg-Marquardt (LM) algorithm, vegetation indices

Procedia PDF Downloads 317
3605 Examining Child Rape Provisions of Bangladesh in Comparison with Other South Asian Countries

Authors: Monira Nazmi Jahan

Abstract:

Child rape or child abuse is a serious and fearsome crime against children, which is an epidemic almost in every state of today’s world. However, in the case of Bangladesh, the scenario is terrifying. The objective of this paper is to examine the laws relating to child rape in Bangladesh as according to a renowned Daily Newspaper 'Prothom Alo', nearly 346 children are being raped since January 2019. This paper discusses and draws the difference of child rape provisions of Bangladesh with other South-Asian countries, comprises of India, Maldives, Pakistan, Sri Lanka, Nepal, Bhutan, and Afghanistan. In Bangladesh, girls below 18 years are considered to be a child. ‘The Penal Code, 1860’ and a special law ‘Nari O Shishu Nirjatan Daman Ain, 2012’ provides that any person committing child rape will be punished with rigorous life imprisonment and fine. This piece of law also gives provisions for punishment in case of child’s death after the commission of rape and gang rape, and the punishment is the death penalty. In India there is ‘The Protection of Children from Sexual Offences Act, 2012’ (POSCO) which has separate provisions for sexual assault, penetrative sexual assault and aggravated penetrative sexual assault by different categories of person such as relatives, institutional officers and trustees and also for mentally and physically challenged child victims and provides punishment up to death penalty. In Pakistan, there is ‘Pakistan Penal Code Amended Act, 2016’ which has only two provisions for child rape. In case offence committed by one person, the punishment is 10 to 25 years of imprisonment and fine. In case of offence committed by two or more persons, each shall be liable to death or imprisonment for life. Unfortunately, Afghanistan has no laws for the protection of rape victims of women let alone children, whereas there are a lot of child rape cases, including both girls and boys who are used for sexual slavery. The Maldives has a special law named ‘Special Provisions Act to Deal with Child Sex Abuse Offenders.’ This has categorized the offenders like POSCO and has provided punishments accordingly. The punishments are: punishments range from 1 to 25 years accordingly, whereas Bangladesh has lesser provisions, but the gravity and duration of punishments are much higher. The Penal Code of Sri Lanka imposes a minimum sentence of 10 years for those convicted of raping a child under 18 years. In Bhutan, child rape provision is made according to the age of a child. ‘The Penal Code of Bhutan, 2004’, mentions provisions for the rape of a child in case of child rape below and above 12 years, gang rape of a child below and above 12 years and has graded the punishments as first, second and third degree. Though Bangladesh has better provisions for punishments, the ages are not categorized in the laws. In Nepal there is ‘Act relating to Children, 2018’ provisions are made for offenders who use or cause or engage child sexual exploitation, and the punishment is same for rape offenders according to prevailing laws in Nepal. No separate punishments for child offenders are made. The ultimate conclusion that can be drawn is Bangladesh has better punishments than all other South-Asian countries and same punishment as India however, Bangladesh can make or amend the laws and categorize offenders as like POSCO of India, Special provisions of Maldives and Bhutan.

Keywords: child rape, death penalty, sexual slavery, South Asia

Procedia PDF Downloads 109
3604 Design and Application of NFC-Based Identity and Access Management in Cloud Services

Authors: Shin-Jer Yang, Kai-Tai Yang

Abstract:

In response to a changing world and the fast growth of the Internet, more and more enterprises are replacing web-based services with cloud-based ones. Multi-tenancy technology is becoming more important especially with Software as a Service (SaaS). This in turn leads to a greater focus on the application of Identity and Access Management (IAM). Conventional Near-Field Communication (NFC) based verification relies on a computer browser and a card reader to access an NFC tag. This type of verification does not support mobile device login and user-based access management functions. This study designs an NFC-based third-party cloud identity and access management scheme (NFC-IAM) addressing this shortcoming. Data from simulation tests analyzed with Key Performance Indicators (KPIs) suggest that the NFC-IAM not only takes less time in identity identification but also cuts time by 80% in terms of two-factor authentication and improves verification accuracy to 99.9% or better. In functional performance analyses, NFC-IAM performed better in salability and portability. The NFC-IAM App (Application Software) and back-end system to be developed and deployed in mobile device are to support IAM features and also offers users a more user-friendly experience and stronger security protection. In the future, our NFC-IAM can be employed to different environments including identification for mobile payment systems, permission management for remote equipment monitoring, among other applications.

Keywords: cloud service, multi-tenancy, NFC, IAM, mobile device

Procedia PDF Downloads 433
3603 Genetic Diversity of Termite (Isoptera) Fauna of Western Ghats of India

Authors: A. S. Vidyashree, C. M. Kalleshwaraswamy, R. Asokan, H. M. Mahadevaswamy

Abstract:

Termites are very vital ecological thespians in tropical ecosystem, having been designated as “ecosystem engineers”, due to their significant role in providing soil ecosystem services. Despite their importance, our understanding of a number of their basic biological processes in termites is extremely limited. Developing a better understanding of termite biology is closely dependent upon consistent species identification. At present, identification of termites is relied on soldier castes. But for many species, soldier caste is not reported, that creates confusion in identification. The use of molecular markers may be helpful in estimating phylogenetic relatedness between the termite species and estimating genetic differentiation among local populations within each species. To understand this, termites samples were collected from various places of Western Ghats covering four states namely Karnataka, Kerala, Tamil Nadu, Maharashtra during 2013-15. Termite samples were identified based on their morphological characteristics, molecular characteristics, or both. Survey on the termite fauna in Karnataka, Kerala, Maharashtra and Tamil Nadu indicated the presence of a 16 species belongs to 4 subfamilies under two families viz., Rhinotermitidae and Termitidae. Termititidae was the dominant family which was belonging to 4 genera and four subfamilies viz., Macrotermitinae, Amitermitinae, Nasutitermitinae and Termitinae. Amitermitinae had three species namely, Microcerotermes fletcheri, M. pakistanicus and Speculitermes sinhalensis. Macrotermitinae had the highest number of species belonging two genera, namely Microtermes and Odontotermes. Microtermes genus was with only one species i.e., Microtermes obesi. The genus Odontotermes was represented by the highest number of species (07), namely, O. obesus was the dominant (41 per cent) and the most widely distributed species in Karnataka, Karala, Maharashtra and Tamil nadu followed by O. feae (19 per cent), O.assmuthi (11 per cent) and others like O. bellahunisensis O. horni O. redemanni, O. yadevi. Nasutitermitinae was represented by two genera namely Nasutitermes anamalaiensis and Trinervitermes biformis. Termitinae subfamily was represented by Labiocapritermes distortus. Rhinotermitidae was represented by single subfamily Heterotermetinae. In Heterotermetinae, two species namely Heterotermes balwanthi and H. malabaricus were recorded. Genetic relationship among termites collected from various locations of Western Ghats of India was characterized based on mitochondrial DNA sequences (12S, 16S, and COII). Sequence analysis and divergence among the species was assessed. These results suggest that the use of both molecular and morphological approaches is crucial in ensuring accurate species identification. Efforts were made to understand their evolution and to address the ambiguities in morphological taxonomy. The implication of the study in revising the taxonomy of Indian termites, their characterization and molecular comparisons between the sequences are discussed.

Keywords: isoptera, mitochondrial DNA sequences, rhinotermitidae, termitidae, Western ghats

Procedia PDF Downloads 265
3602 Design and Realization of Computer Network Security Perception Control System

Authors: El Miloudi Djelloul

Abstract:

Based on analysis on applications by perception control technology in computer network security status and security protection measures, from the angles of network physical environment and network software system environmental security, this paper provides network security system perception control solution using Internet of Things (IOT), telecom and other perception technologies. Security Perception Control System is in the computer network environment, utilizing Radio Frequency Identification (RFID) of IOT and telecom integration technology to carry out integration design for systems. In the network physical security environment, RFID temperature, humidity, gas and perception technologies are used to do surveillance on environmental data, dynamic perception technology is used for network system security environment, user-defined security parameters, security log are used for quick data analysis, extends control on I/O interface, by development of API and AT command, Computer Network Security Perception Control based on Internet and GSM/GPRS is achieved, which enables users to carry out interactive perception and control for network security environment by WEB, E-MAIL as well as PDA, mobile phone short message and Internet. In the system testing, through middle ware server, security information data perception in real time with deviation of 3-5% was achieved; it proves the feasibility of Computer Network Security Perception Control System.

Keywords: computer network, perception control system security strategy, Radio Frequency Identification (RFID)

Procedia PDF Downloads 444
3601 Description of the Non-Iterative Learning Algorithm of Artificial Neuron

Authors: B. S. Akhmetov, S. T. Akhmetova, A. I. Ivanov, T. S. Kartbayev, A. Y. Malygin

Abstract:

The problem of training of a network of artificial neurons in biometric appendices is that this process has to be completely automatic, i.e. the person operator should not participate in it. Therefore, this article discusses the issues of training the network of artificial neurons and the description of the non-iterative learning algorithm of artificial neuron.

Keywords: artificial neuron, biometrics, biometrical applications, learning of neuron, non-iterative algorithm

Procedia PDF Downloads 491
3600 Staphylococcus argenteus: An Emerging Subclinical Bovine Mastitis Pathogen in Thailand

Authors: Natapol Pumipuntu

Abstract:

Staphylococcus argenteus is the emerging species of S. aureus complex. It was generally misidentified as S. aureus by standard techniques and their features. S. argenteus is possibly emerging in both humans and animals, as well as increasing worldwide distribution. The objective of this study was to differentiate and identify S. argenteus from S. aureus, which has been collected and isolated from milk samples of subclinical bovine mastitis cases in Maha Sarakham province, Northeastern of Thailand. Twenty-one isolates of S. aureus, which confirmed by conventional methods and immune-agglutination method were analyzed by matrix-assisted laser desorption/ionization time-of-flight mass spectrometry (MALDI-TOF MS) and multilocus sequence typing (MLST). The result from MALDI-TOF MS and MLST showed 6 from 42 isolates were confirmed as S. argenteus, and 36 isolates were S. aureus, respectively. This study indicated that the identification and classification method by using MALDI-TOF MS and MLST could accurately differentiate the emerging species, S. argenteus, from S. aureus complex which usually misdiagnosed. In addition, the identification of S. argenteus seems to be very limited despite the fact that it may be the important causative pathogen in bovine mastitis as well as pathogenic bacteria in food and milk. Therefore, it is very necessary for both bovine medicine and veterinary public health to emphasize and recognize this bacterial pathogen as the emerging disease of Staphylococcal bacteria and need further study about S. argenteus infection.

Keywords: Staphylococcus argenteus, subclinical bovine mastitis, Staphylococcus aureus complex, mass spectrometry, MLST

Procedia PDF Downloads 150
3599 Identification of Hedgerows in the Agricultural Landscapes of Mugada within Bartın Province, Turkey

Authors: Yeliz Sarı Nayim, B. Niyami Nayim

Abstract:

Biotopes such as forest areas rich in biodiversity, wetlands, hedgerows and woodlands play important ecological roles in agricultural landscapes. Of these semi-natural areas and features, hedgerows are the most common landscape elements. Their most significant features are that they serve as a barrier between the agricultural lands, serve as shelter, add aesthetical value to the landscape and contribute significantly to the wildlife and biodiversity. Hedgerows surrounding agricultural landscapes also provide an important habitat for pollinators which are important for agricultural production. This study looks into the identification of hedgerows in agricultural lands in the Mugada rural area within Bartın province, Turkey. From field data and-and satellite images, it is clear that in this area, especially around rural settlements, large forest areas have been cleared for settlement and agriculture. A network of hedgerows is also apparent, which might potentially play an important role in the otherwise open agricultural landscape. We found that these hedgerows serve as an ecological and biological corridor, linking forest ecosystems. Forest patches of different sizes and creating a habitat network across the landscape. Some examples of this will be presented. The overall conclusion from the study is that ecologically, biologically and aesthetically important hedge biotopes should be maintained in the long term in agricultural landscapes such as this. Some suggestions are given for how they could be managed sustainably into the future.

Keywords: agricultural biotopes, Hedgerows, landscape ecology, Turkey

Procedia PDF Downloads 305
3598 An Interpretative Phenomenological Analysis of the Death Practices and Rituals of the Isneg People in Apayao

Authors: Ivy Angelique Malit, Marion Nicole Dela Vega, Marjorie Mae Mendoza

Abstract:

Death practices and rituals of the Philippines is rich with facts about our history mostly on our beliefs of the afterlife before the arrival of the western culture which is still being practiced by the indigenous people of the Philippines. The death practices and rituals are acts of showing the inner thoughts, and feelings towards the person who died. The meanings behind those practices and rituals become the reason why the indigenous people still treasure these death practices and rituals as a part of their culture. This study seeks to know the experiences of the death practices and rituals of one of the Indigenous groups in Apayao, the Isnegs and the meaning of those experiences. The researchers aimed to look at it on a psychological lens. In which the researchers aim (1) to know their experiences of their death practices from the perspective of their thoughts, feelings and actions, and (2) to seek the meaning behind their death rituals. The design used in the research is a qualitative design and Interpretative Phenomenological Analysis. The participants were gathered by using purposive sampling. The researchers gathered the data from a form of a semi-structured interview with guide questions. The researchers used Thematic Analysis to analyze the verbatim transcriptions from the interview. The experiences of death practices and rituals of the Isneg people have been presented in the aspects of their thoughts, feelings and behavior. The experiences were presented with 7 superordinate themes namely, (1) Refusal of Reality (2) Feelings of mixed emotions (3) Oblivious Acts of the participants (4) Conflict with self and culture (5) Negative thinking of the participants (6) Process of Acceptance (8) Act of Love. The make meaning behind the death practices and rituals of the Isneg people have been presented with 2 superordinate themes, (1) Act of Respect and (2) Act of Loyalty. The results of the research show that the experiences and meaning behind their death practices and burials were being based more by their own beliefs. In their culture, which has been passed through by their ancestors and becomes the foundation of their beliefs and their newly found religion which was introduced by the travelling missionaries. Doing those death practices and rituals is their way to show their affections, like respect and loyalty towards the person who died.

Keywords: death practices, interpretative phenomenological analysis, isneg people, rituals, theory of grieving

Procedia PDF Downloads 254
3597 Multiperson Drone Control with Seamless Pilot Switching Using Onboard Camera and Openpose Real-Time Keypoint Detection

Authors: Evan Lowhorn, Rocio Alba-Flores

Abstract:

Traditional classification Convolutional Neural Networks (CNN) attempt to classify an image in its entirety. This becomes problematic when trying to perform classification with a drone’s camera in real-time due to unpredictable backgrounds. Object detectors with bounding boxes can be used to isolate individuals and other items, but the original backgrounds remain within these boxes. These basic detectors have been regularly used to determine what type of object an item is, such as “person” or “dog.” Recent advancement in computer vision, particularly with human imaging, is keypoint detection. Human keypoint detection goes beyond bounding boxes to fully isolate humans and plot points, or Regions of Interest (ROI), on their bodies within an image. ROIs can include shoulders, elbows, knees, heads, etc. These points can then be related to each other and used in deep learning methods such as pose estimation. For drone control based on human motions, poses, or signals using the onboard camera, it is important to have a simple method for pilot identification among multiple individuals while also giving the pilot fine control options for the drone. To achieve this, the OpenPose keypoint detection network was used with body and hand keypoint detection enabled. OpenPose supports the ability to combine multiple keypoint detection methods in real-time with a single network. Body keypoint detection allows simple poses to act as the pilot identifier. The hand keypoint detection with ROIs for each finger can then offer a greater variety of signal options for the pilot once identified. For this work, the individual must raise their non-control arm to be identified as the operator and send commands with the hand on their other arm. The drone ignores all other individuals in the onboard camera feed until the current operator lowers their non-control arm. When another individual wish to operate the drone, they simply raise their arm once the current operator relinquishes control, and then they can begin controlling the drone with their other hand. This is all performed mid-flight with no landing or script editing required. When using a desktop with a discrete NVIDIA GPU, the drone’s 2.4 GHz Wi-Fi connection combined with OpenPose restrictions to only body and hand allows this control method to perform as intended while maintaining the responsiveness required for practical use.

Keywords: computer vision, drone control, keypoint detection, openpose

Procedia PDF Downloads 183
3596 Chemical Analysis and Cytotoxic Evaluation of Asphodelus Aestivus Brot. Flowers

Authors: Mai M. Farid, Mona El-Shabrawy, Sameh R. Hussein, Ahmed Elkhateeb, El-Said S. Abdel-Hameed, Mona M. Marzouk

Abstract:

Asphodelus aestivus Brot. Is a wild plant distributed in Egypt and is considered one of the five Asphodelus spp. from the family Asphodelaceae; it grows in dry grasslands and on rocky or sandy soil. The chemical components of A. aestivus flowers extract were analyzed using different chromatographic and spectral techniques and led to the isolation of two anthraquinones identified as emodin and emodin-O-glucoside. In addition to, five flavonoid compounds;kaempferol,Kaempferol-3-O-glucoside,Apigenin-6-C-glucoside-7-O-glucoside (Saponarine), luteolin 7-O-β-glucopyranoside, Isoorientin-O-malic acid which is a new compound in nature. The LC-ESI-MS/MS analysis of the flower extract of A. aestivus led to the identification of twenty- two compounds characterized by the presence of flavones, flavonols, and flavone C-glycosides. While GC/MS analysis led to the identification of 24 compounds comprising 98.32% of the oil, the major components of the oil were 9, 12, 15-Octadecatrieoic acid methyl ester 28.72%, and 9, 12-Octadecadieroic acid (Z, Z)-methyl ester 19.96%. In vitro cytotoxic activity of the aqueous methanol extract of A. aestivus flowers against HEPG2, HCT-116, MCF-7, and A549 culture was examined and showed moderate inhibition (62.3±1.1)% on HEPG2 cell line followed by (36.8±0.2)% inhibition on HCT-116 and a weak inhibition (5.7± 0.0.2) on MCF-7 cell line followed by (4.5± 0.4) % inhibition on A549 cell line and this is considered the first cytotoxic report of A. aestivus flowers.

Keywords: Anthraquinones, Asphodelus aestivus, Cytotoxic activity, Flavonoids, LC-ESI-MS/MS

Procedia PDF Downloads 220
3595 Automatic Identification and Monitoring of Wildlife via Computer Vision and IoT

Authors: Bilal Arshad, Johan Barthelemy, Elliott Pilton, Pascal Perez

Abstract:

Getting reliable, informative, and up-to-date information about the location, mobility, and behavioural patterns of animals will enhance our ability to research and preserve biodiversity. The fusion of infra-red sensors and camera traps offers an inexpensive way to collect wildlife data in the form of images. However, extracting useful data from these images, such as the identification and counting of animals remains a manual, time-consuming, and costly process. In this paper, we demonstrate that such information can be automatically retrieved by using state-of-the-art deep learning methods. Another major challenge that ecologists are facing is the recounting of one single animal multiple times due to that animal reappearing in other images taken by the same or other camera traps. Nonetheless, such information can be extremely useful for tracking wildlife and understanding its behaviour. To tackle the multiple count problem, we have designed a meshed network of camera traps, so they can share the captured images along with timestamps, cumulative counts, and dimensions of the animal. The proposed method takes leverage of edge computing to support real-time tracking and monitoring of wildlife. This method has been validated in the field and can be easily extended to other applications focusing on wildlife monitoring and management, where the traditional way of monitoring is expensive and time-consuming.

Keywords: computer vision, ecology, internet of things, invasive species management, wildlife management

Procedia PDF Downloads 137
3594 The Lived Experience of Thai Mothers Living with HIV in Southern Thailand

Authors: Dusanee Suwankhong, Pranee Liamputtong

Abstract:

Mothers living with HIV tend to experience stigma and discrimination which has an impact on their psychological and social well-being and their human rights. This paper explores the lived experience of Thai mothers with HIV in their family. In-depth interviewing and drawing methods were employed to gain a deep understanding on the experience of 30 HIV-positive mothers in the southern community of Thailand. The data was analyzed using thematic analysis method. We found that the majority of HIV-positive mothers learned about their HIV status through blood test services during their antenatal care, but some decided to visit a doctor when their partner became chronically frail and showed some signs indicating HIV/AIDS. Learning about their HIV gave them a great shock, and they could not believe that they were infected with HIV/AIDS. They feared that their illness would be disclosed and hence attempted to keep their HIV secret. This was due to the fact that people in their community would blame and labeled them as a ‘disgusting person’. Besides, they would be separated from social contacts and networks, their individual rights would be disregarded, and their potential roles would be restricted. Although participants suggested that people had more positive view on HIV-infected person nowadays, all still wanted to keep it secret because of fear of stigma and discrimination. Thai health care has provided various kinds of support programs, but many mothers chose not to participate due to the fear of disclosure. However, the women attempted to seek some strategies to live a life which would be more acceptable by the community. We conclude that HIV is still seen as a stigmatised disease in rural community of southern Thailand. Local health care providers and relevant sectors in the locality should create suitable programs to enhance self-worth among those HIV-positive mothers because this could increase a quality of life of this vulnerable mothers. Providing sufficient and appropriate supports for better emotional wellbeing is an essential role of health professionals so that the feeling of isolation among these women could be eliminated and positive social justice can be achieved.

Keywords: HIV-positive mothers, lived experience, southern Thailand, stigma and discrimination

Procedia PDF Downloads 187
3593 Third Eye: A Hybrid Portrayal of Visuospatial Attention through Eye Tracking Research and Modular Arithmetic

Authors: Shareefa Abdullah Al-Maqtari, Ruzaika Omar Basaree, Rafeah Legino

Abstract:

A pictorial representation of hybrid forms in science-art collaboration has become a crucial issue in the course of exploring a new painting technique development. This is straight related to the reception of an invisible-recognition phenomenology. In hybrid pictorial representation of invisible-recognition phenomenology, the challenging issue is how to depict the pictorial features of indescribable objects from its mental source, modality and transparency. This paper proposes the hybrid technique of painting Demonstrate, Resemble, and Synthesize (DRS) through a combination of the hybrid aspect-recognition representation of understanding picture, demonstrative mod, the number theory, pattern in the modular arithmetic system, and the coherence theory of visual attention in the dynamic scenes representation. Multi-methods digital gaze data analyses, pattern-modular table operation design, and rotation parameter were used for the visualization. In the scientific processes, Eye-trackingvideo-sections based was conducted using Tobii T60 remote eye tracking hardware and TobiiStudioTM analysis software to collect and analyze the eye movements of ten participants when watching the video clip, Alexander Paulikevitch’s performance’s ‘Tajwal’. Results: we found that correlation of fixation count in section one was positively and moderately correlated with section two Person’s (r=.10, p < .05, 2-tailed) as well as in fixation duration Person’s (r=.10, p < .05, 2-tailed). However, a paired-samples t-test indicates that scores were significantly higher for the section one (M = 2.2, SD = .6) than for the section two (M = 1.93, SD = .6) t(9) = 2.44, p < .05, d = 0.87. In the visual process, the exported data of gaze number N was resembled the hybrid forms of visuospatial attention using the table-mod-analyses operation. The explored hybrid guideline was simply applicable, and it could be as alternative approach to the sustainability of contemporary visual arts.

Keywords: science-art collaboration, hybrid forms, pictorial representation, visuospatial attention, modular arithmetic

Procedia PDF Downloads 363
3592 Assessing Antimicrobial Activity of Various Plant Extracts on Midgutmicroflora of Aedesaegypti

Authors: V. Baweja, K. K. Gupta, V. Dubey, C. Keshavam

Abstract:

Antimicrobial activity of six indigenous plants such as Tulsi Ocimum sanctum, Neem Azadirachta indica, Aloe vera, Turmeric Curcuma longa, Lantana Lantana camara, and Clove Syzygium aromaticum was assessed against the gut microbiota of the dengue fever mosquito Aedes aegypti, keeping in view that the presence of midgut bacteria may affect the ability of the vector to transmit pathogens. Eleven different types of bacterial clones were isolated from the midgut of lab-reared fourth instar larvae of Aedes aegypti and were grown on LB agar medium at an optimum temperature of 25 ºC. Identification of these bacteria was done on the basis of their colony characteristic such as colony size, shape, opacity, elevation, consistency, and growth. Light microscopic studies of the gut microbiota revealed dominance of Gram-negative cocci over gram positive cocci and bacilli and Gram-negative bacilli. Identification of species was done by chemical characterization of the colonies. Crude extracts of all test plants were screened for their antimicrobial activities against gut microbiota by disc diffusion assay. The zone of exclusion seen after 24 hr of incubation in different assays revealed the most potent antibacterial activities in neem followed by clove and turmeric. Lantana and Aloe vera were least effective.

Keywords: plant extract, aedes, dengue, antimicrobial activity

Procedia PDF Downloads 402
3591 Iris Feature Extraction and Recognition Based on Two-Dimensional Gabor Wavelength Transform

Authors: Bamidele Samson Alobalorun, Ifedotun Roseline Idowu

Abstract:

Biometrics technologies apply the human body parts for their unique and reliable identification based on physiological traits. The iris recognition system is a biometric–based method for identification. The human iris has some discriminating characteristics which provide efficiency to the method. In order to achieve this efficiency, there is a need for feature extraction of the distinct features from the human iris in order to generate accurate authentication of persons. In this study, an approach for an iris recognition system using 2D Gabor for feature extraction is applied to iris templates. The 2D Gabor filter formulated the patterns that were used for training and equally sent to the hamming distance matching technique for recognition. A comparison of results is presented using two iris image subjects of different matching indices of 1,2,3,4,5 filter based on the CASIA iris image database. By comparing the two subject results, the actual computational time of the developed models, which is measured in terms of training and average testing time in processing the hamming distance classifier, is found with best recognition accuracy of 96.11% after capturing the iris localization or segmentation using the Daughman’s Integro-differential, the normalization is confined to the Daugman’s rubber sheet model.

Keywords: Daugman rubber sheet, feature extraction, Hamming distance, iris recognition system, 2D Gabor wavelet transform

Procedia PDF Downloads 63
3590 Coping Strategies Used by Persons with Spinal Cord Injury: A Rehabilitation Hospital Based Qualitative Study

Authors: P. W. G. D. P. Samarasekara, S. M. K. S. Seneviratne, D. Munidasa, S. S. Williams

Abstract:

Sustaining a spinal cord injury (SCI) causes severe disruption of all aspects of a person’s life, resulting in the difficult process of coping with the distressing effects of paralysis affecting their ability to lead a meaningful life. These persons are hospitalized in the acute stage of injury and subsequently for rehabilitation and the treatment of complications. The purpose of this study was to explore coping strategies used by persons with SCI during their rehabilitation period. A qualitative study was conducted among persons with SCI, undergoing rehabilitation at the Rheumatology and Rehabilitation Hospitals, Ragama and Digana Sri Lanka. Twelve participants were selected purposively to represent both males and females, with cervical, thoracic or lumbar levels of injuries due to traumatic and non-traumatic causes as well as from different socioeconomic backgrounds. Informed consent was taken from the participants. In-depth interviews were conducted using an interview guide to collect data. Probes were used to get more information and to encourage participants. Interviews were audio taped and transcribed verbatim. Qualitative content analysis was conducted. Ethical approval for this study was obtained from the Ethics Review Committee, Faculty of Medicine, University of Kelaniya. Five themes were identified in the content analysis: social support, religious beliefs, determination, acceptance and making comparisons. Participants indicated that the support from their family members had been an essential factor in coping, after sustaining an SCI and they expressed the importance of emotional support from family members during their rehabilitation. Many participants had a strong belief towards the God, who had a personal interest in their lives, played an important role in their ability to cope with the injury. They believed that what happens to them in this life results from their actions in previous lives. They expressed that determination was essential as a factor that helps them cope with their injury. They indicated their focus on the positive aspects of the life and accepted the disability. They made comparisons to other persons who were worse off than them to help lift them out of unpleasant experience. Even some of the most severely injured and disabled participants presented evidence of using this coping strategy. Identification of coping strategies used by persons with SCI will help nurses and other health-care professionals in reinforcing the most effective coping strategies among persons with SCI. The findings recommend that engagement coping positively influences psychosocial adaptation.

Keywords: content analysis, coping strategies, rehabilitation, spinal cord injury

Procedia PDF Downloads 182
3589 Identifying a Drug Addict Person Using Artificial Neural Networks

Authors: Mustafa Al Sukar, Azzam Sleit, Abdullatif Abu-Dalhoum, Bassam Al-Kasasbeh

Abstract:

Use and abuse of drugs by teens is very common and can have dangerous consequences. The drugs contribute to physical and sexual aggression such as assault or rape. Some teenagers regularly use drugs to compensate for depression, anxiety or a lack of positive social skills. Teen resort to smoking should not be minimized because it can be "gateway drugs" for other drugs (marijuana, cocaine, hallucinogens, inhalants, and heroin). The combination of teenagers' curiosity, risk taking behavior, and social pressure make it very difficult to say no. This leads most teenagers to the questions: "Will it hurt to try once?" Nowadays, technological advances are changing our lives very rapidly and adding a lot of technologies that help us to track the risk of drug abuse such as smart phones, Wireless Sensor Networks (WSNs), Internet of Things (IoT), etc. This technique may help us to early discovery of drug abuse in order to prevent an aggravation of the influence of drugs on the abuser. In this paper, we have developed a Decision Support System (DSS) for detecting the drug abuse using Artificial Neural Network (ANN); we used a Multilayer Perceptron (MLP) feed-forward neural network in developing the system. The input layer includes 50 variables while the output layer contains one neuron which indicates whether the person is a drug addict. An iterative process is used to determine the number of hidden layers and the number of neurons in each one. We used multiple experiment models that have been completed with Log-Sigmoid transfer function. Particularly, 10-fold cross validation schemes are used to access the generalization of the proposed system. The experiment results have obtained 98.42% classification accuracy for correct diagnosis in our system. The data had been taken from 184 cases in Jordan according to a set of questions compiled from Specialists, and data have been obtained through the families of drug abusers.

Keywords: drug addiction, artificial neural networks, multilayer perceptron (MLP), decision support system

Procedia PDF Downloads 299
3588 The Great Mimicker: A Case of Disseminated Tuberculosis

Authors: W. Ling, Mohamed Saufi Bin Awang

Abstract:

Introduction: Mycobacterium tuberculosis post a major health problem worldwide. Central nervous system (CNS) infection by mycobacterium tuberculosis is one of the most devastating complications of tuberculosis. Although with advancement in medical fields, we are yet to understand the pathophysiology of how mycobacterium tuberculosis was able to cross the blood-brain barrier (BBB) and infect the CNS. CNS TB may present with nonspecific clinical symptoms which can mimic other diseases/conditions; this is what makes the diagnosis relatively difficult and challenging. Public health has to be informed and educated about the spread of TB, and early identification of TB is important as it is a curable disease. Case Report: A young 21-year-old Malay gentleman was initially presented to us with symptoms of ear discharge, tinnitus, and right-sided headache for the past one year. Further history reveals that the symptoms have been mismanaged and neglected over the period of 1 year. Initial investigation reveals features of inflammation of the ear. Further imaging showed the feature of chronic inflammation of the otitis media and atypical right cerebral abscess, which has the same characteristic features and consistency. He further underwent a biopsy, and results reveal positive Mycobacterium tuberculosis of the otitis media. With the results and the available imaging, we were certain that this is likely a case of disseminated tuberculosis causing CNS TB. Conclusion: We aim to highlight the challenge and difficult face in our health care system and public health in early identification and treatment.

Keywords: central nervous system tuberculosis, intracranial tuberculosis, tuberculous encephalopathy, tuberculous meningitis

Procedia PDF Downloads 189
3587 Water Quality Management Based on Hydrodynamic Approach, Landuse, and Human Intervention in Wulan Delta Central Java Indonesia: Problems Identification and Review

Authors: Lintang Nur Fadlillah, Muh Aris Marfai, M. Widyastuti

Abstract:

Delta is dynamics area which is influenced by marine and river. Increasing human population in coastal area and the need of life exert pressure in delta that provides various resources. Wulan Delta is one of active Delta in Central Java, Indonesia. It has been experienced multiple pressures because of natural factors and human factors. In order to provide scientific solution and to analyze the main driving force in river delta, we collected several evidences based on news, papers, and publications related to Wulan Delta. This paper presents a review and problems identification in Wulan Delta, based on hydrodynamic approach, land use, and human activities which influenced water quality in the delta. A comprehensive overview is needed to address best policies under local communities and government. The analysis based on driving forces which affect delta estuary and river mouth. Natural factor in particular hydrodynamic influenced by tides, waves, runoff, and sediment transport. However, hydrodynamic affecting mixing process in river estuaries. The main problem is human intervention in land which is land use exchange leads to several problems such us decreasing water quality. Almost 90% of delta has been transformed into fish pond by local communities. Yet, they have not apply any water management to treat waste water before flush it to the sea and estuary. To understand the environmental condition, we need to assess water quality of river delta. The assessment based on land use as non-point source pollution. In Wulan Delta there are no industries. The land use in Wulan Delta consist of fish pond, settlement, and agriculture. The samples must represent the land use, to estimate which land use are most influence in river delta pollution. The hydrodynamic condition such as high tides and runoff must be considered, because it will affect the mixing process and water quality as well. To determine the samples site, we need to involve local community, in order to give insight into them. Furthermore, based on this review and problem identification, recommendations and strategies for water management are formulated.

Keywords: delta, land use, water quality, management, hydrodynamics

Procedia PDF Downloads 249
3586 Defect Identification in Partial Discharge Patterns of Gas Insulated Switchgear and Straight Cable Joint

Authors: Chien-Kuo Chang, Yu-Hsiang Lin, Yi-Yun Tang, Min-Chiu Wu

Abstract:

With the trend of technological advancement, the harm caused by power outages is substantial, mostly due to problems in the power grid. This highlights the necessity for further improvement in the reliability of the power system. In the power system, gas-insulated switches (GIS) and power cables play a crucial role. Long-term operation under high voltage can cause insulation materials in the equipment to crack, potentially leading to partial discharges. If these partial discharges (PD) can be analyzed, preventative maintenance and replacement of equipment can be carried out, there by improving the reliability of the power grid. This research will diagnose defects by identifying three different defects in GIS and three different defects in straight cable joints, for a total of six types of defects. The partial discharge data measured will be converted through phase analysis diagrams and pulse sequence analysis. Discharge features will be extracted using convolutional image processing, and three different deep learning models, CNN, ResNet18, and MobileNet, will be used for training and evaluation. Class Activation Mapping will be utilized to interpret the black-box problem of deep learning models, with each model achieving an accuracy rate of over 95%. Lastly, the overall model performance will be enhanced through an ensemble learning voting method.

Keywords: partial discharge, gas-insulated switches, straight cable joint, defect identification, deep learning, ensemble learning

Procedia PDF Downloads 76
3585 Identification and Quantification of Lisinopril from Pure, Formulated and Urine Samples by Micellar Thin Layer Chromatography

Authors: Sudhanshu Sharma

Abstract:

Lisinopril, 1-[N-{(s)-I-carboxy-3 phenyl propyl}-L-proline dehydrate is a lysine analog of enalaprilat, the active metabolite of enalapril. It is long-acting, non-sulhydryl angiotensin-converting enzyme (ACE) inhibitor that is used for the treatment of hypertension and congestive heart failure in daily dosage 10-80 mg. Pharmacological activity of lisinopril has been proved in various experimental and clinical studies. Owing to its importance and widespread use, efforts have been made towards the development of simple and reliable analytical methods. As per our literature survey, lisinopril in pharmaceutical formulations has been determined by various analytical methodologies like polaragraphy, potentiometry, and spectrophotometry, but most of these analytical methods are not too suitable for the Identification of lisinopril from clinical samples because of the interferences caused by the amino acids and amino groups containing metabolites present in biological samples. This report is an attempt in the direction of developing a simple and reliable method for on plate identification and quantification of lisinopril in pharmaceutical formulations as well as from human urine samples using silica gel H layers developed with a new mobile phase comprising of micellar solutions of N-cetyl-N, N, N-trimethylammonium bromide (CTAB). Micellar solutions have found numerous practical applications in many areas of separation science. Micellar liquid chromatography (MLC) has gained immense popularity and wider applicability due to operational simplicity, cost effectiveness, relatively non-toxicity and enhanced separation efficiency, low aggressiveness. Incorporation of aqueous micellar solutions as mobile phase was pioneered by Armstrong and Terrill as they accentuated the importance of TLC where simultaneous separation of ionic or non-ionic species in a variety of matrices is required. A peculiarity of the micellar mobile phases (MMPs) is that they have no macroscopic analogues, as a result the typical separations can be easily achieved by using MMPs than aqueous organic mobile phases. Previously MMPs were successfully employed in TLC based critical separations of aromatic hydrocarbons, nucleotides, vitamin K1 and K5, o-, m- and p- aminophenol, amino acids, separation of penicillins. The human urine analysis for identification of selected drugs and their metabolites has emerged as an important investigation tool in forensic drug analysis. Among all chromatographic methods available only thin layer chromatography (TLC) enables a simple fast and effective separation of the complex mixtures present in various biological samples and is recommended as an approved testing for forensic drug analysis by federal Law. TLC proved its applicability during successful separation of bio-active amines, carbohydrates, enzymes, porphyrins, and their precursors, alkaloid and drugs from urine samples.

Keywords: lisnopril, surfactant, chromatography, micellar solutions

Procedia PDF Downloads 366
3584 Bending Tests for the Axial Load Identifications in Space Structures with Unknown Boundary Conditions

Authors: M. Bonopera, N. Tullini, C. C. Chen, T. K. Lin, K. C. Chang

Abstract:

This paper presents the extension of a static method for the axial load identifications in prismatic beam-columns with uncertain length and unknown boundary conditions belonging to generic space structures, such as columns of space frames or struts and ties of space trusses. The non-destructive method requires the knowledge of the beam-column flexural rigidity only. Flexural displacements are measured at five cross sections along the beam-column subjected to an additional vertical load at the mid-span. Unlike analogous dynamic methods, any set of experimental data may be used in the identification procedure. The method is verified by means of many numerical and experimental tests on beam-columns having unknown boundary conditions and different slenderness belonging to three different space prototypes in small-scale. Excellent estimates of the tensile and compressive forces are obtained for the elements with higher slenderness and when the greatest possible distance between sensors is adopted. Moreover, the application of larger values of the vertical load and very accurate displacement measurements are required. The method could be an efficacious technique in-situ, considering that safety inspections will become increasingly important in the near future, especially because of the improvement of the material properties that allowed designing space structures composed of beam-columns with higher slenderness.

Keywords: force identification, in-situ test, space structure, static test

Procedia PDF Downloads 243