Search results for: spread reshaping code
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2576

Search results for: spread reshaping code

1886 Study and Analysis of a Susceptible Infective Susceptible Mathematical Model with Density Dependent Migration

Authors: Jitendra Singh, Vivek Kumar

Abstract:

In this paper, a susceptible infective susceptible mathematical model is proposed and analyzed where the migration of human population is given by migration function. It is assumed that the disease is transmitted by direct contact of susceptible and infective populations with constant contact rate. The equilibria and their stability are studied by using the stability theory of ordinary differential equations and computer simulation. The model analysis shows that the spread of infectious disease increases when human population immigration increases in the habitat but it decreases if emigration increases.

Keywords: SIS (Susceptible Infective Susceptible) model, migration function, susceptible, stability

Procedia PDF Downloads 248
1885 Gossypol Extraction from Cotton Seed and Evaluation of Cotton Seed and Boll-cotton-pol Extract on Treatment of Cutaneous Leishmaniasis Resistant to Drugs

Authors: M. Mirmohammadi, S. Taghdisi, F. Anali

Abstract:

Gossypol is a yellow anti-nutritional compound found in the cotton plant. This substance exists in the cottonseed and other parts of the cotton plant, such as bark, leaves, and stems. Chemically, gossypol is a very active polyphenolic aldehyde compound, and due to this polyphenolic structure, it has antioxidant and therapeutic properties. On the other hand, this compound, especially in free form, has many toxic effects, that its excessive consumption can be very dangerous for humans and animals. In this study, gossypol was extracted as a derivative compound of gossypol acetic acid from cottonseed using the n-hexane solvent with an efficiency of 0.84 ± 0.04, which compared to the Gossypol extracted from cottonseed oil with the same method (cold press) showed a significant difference with its efficiency of 1.14 ± 0.06. Therefore, it can be suggested to use cottonseed oil to extract this valuable compound. In the other part of this research, cottonseed extracts and cotton bolls extracts were obtained by two methods of soaking and Soxhlet with hydroalcoholic solvent taken with a ratio of (25:75), then by using extracts and corn starch powder, four herbal medicine code was created and after receiving the code of ethics (IR.SSU.REC.1398.136) the therapeutic effect of each one on the Cutaneous leishmaniasis resistant to drugs (caused by the leishmaniasis parasite) was investigated in real patients and its results was compared with the common drug glucantime (local ampoule) (n = 36). Statistical studies showed that the use of herbal medicines prepared with cottonseed extract and cotton bolls extract has a significant positive effect on the treatment of the disease’s wounds (p-value > 0.05) compared to the control group (only ethanol). Also, by comparing the average diameter of the wounds after a two-month treatment period, no significant difference was found between the use of ointment containing extracts and local glucantime ampoules (p-value < 0.05). Bolls extract extracted with the Soxhlet method showed the best therapeutic effects, although there was no significant difference between them (p-value < 0.05). Therefore, there is acceptable reliability to recommend this medicine for the treatment of Cutaneous leishmaniasis resistant to drugs without the side effects of the chemical drug glucantime and the pain of injecting the ampoule.

Keywords: cottonseed oil, gossypol, cotton boll, cutaneous leishmaniasis

Procedia PDF Downloads 81
1884 Density functional (DFT), Study of the Structural and Phase Transition of ThC and ThN: LDA vs GGA Computational

Authors: Hamza Rekab Djabri, Salah Daoud

Abstract:

The present paper deals with the computational of structural and electronic properties of ThC and ThN compounds using density functional theory within generalized-gradient (GGA) apraximation and local density approximation (LDA). We employ the full potential linear muffin-tin orbitals (FP-LMTO) as implemented in the Lmtart code. We have used to examine structure parameter in eight different structures such as in NaCl (B1), CsCl (B2), ZB (B3), NiAs (B8), PbO (B10), Wurtzite (B4) , HCP (A3) βSn (A5) structures . The equilibrium lattice parameter, bulk modulus, and its pressure derivative were presented for all calculated phases. The calculated ground state properties are in good agreement with available experimental and theoretical results.

Keywords: DFT, GGA, LDA, properties structurales, ThC, ThN

Procedia PDF Downloads 85
1883 Experimental Investigation of Bituminous Roads with Waste Plastic

Authors: Arjita Biswas, Sandeep Potnis

Abstract:

Plastic roads (bituminous roads using waste plastic in the wearing course ) have now become familiar in the Road Construction Sector in India. With the Indian Road Congress Code (IRC SP: 98 -2013), many agencies are coming forward to implement Plastic Roads in India. This paper discuss and compare about the various properties of bituminous mix with 8% waste plastic and normal bituminous mix. This paper also signifies the performance of both the types of roads after 4 months of age under loading conditions. Experiments were carried out to evaluate its performance. The result shows improved performance of plastic roads.

Keywords: bituminous roads, experiments, performance, plastic roads

Procedia PDF Downloads 205
1882 Comparative Study on Fire Safety Evaluation Methods for External Cladding Systems: ISO 13785-2 and BS 8414

Authors: Kyungsuk Cho, H. Y. Kim, S. U. Chae, J. H. Choi

Abstract:

Technological development has led to the construction of super-tall buildings and insulators are increasingly used as exterior finishing materials to save energy. However, insulators are usually combustible and vulnerable to fire. Fires like that at Wooshin Golden Suite Building in Busan, Korea in 2010 and that at CCTV Building in Beijing, China are the major examples of fire spread accelerated by combustible insulators. The exterior finishing materials of a high-rise building are not made of insulators only, but they are integrated with the building’s external cladding system. There is a limit in evaluating the fire safety of a cladding system with a single small-unit material such as a cone calorimeter. Therefore, countries provide codes to evaluate the fire safety of exterior finishing materials using full-scale tests. This study compares and to examine the applicability of the methods to Korea. Standard analysis showed differences in the type and size of fire sources and duration and exterior finishing materials also differed in size. In order to confirm the differences, fire tests were conducted on identical external cladding systems to compare fire safety. Although the exterior finishing materials were identical, varying degrees of fire spread were observed, which could be considered as differences in the type and size of the fire sources and duration. Therefore, it is deduced that extended studies should be conducted before the evaluation methods and standards are employed in Korea. The two standards for evaluating fire safety provided different results. Peak heat release rate was 5.5MW in ISO method and 3.0±0.5MW in BS method. Peak heat release rate in ISO method continued for 15 minutes. Fire ignition, growth, full development and decay evolved for 30 minutes in BS method where wood cribs were used as fire sources. Therefore, follow-up studies should be conducted to determine which of the two standards provides fire sources that approximate the size of flames coming out from the openings or those spreading to the outside when a fire occurs at a high-rise building.

Keywords: external cladding systems, fire safety evaluation, ISO 13785-2, BS 8414

Procedia PDF Downloads 232
1881 Nurse-Led Codes: Practical Application in the Emergency Department during a Global Pandemic

Authors: F. DelGaudio, H. Gill

Abstract:

Resuscitation during cardiopulmonary (CPA) arrest is dynamic, high stress, high acuity situation, which can easily lead to communication breakdown, and errors. The care of these high acuity patients has also been shown to increase physiologic stress and task saturation of providers, which can negatively impact the care being provided. These difficulties are further complicated during a global pandemic and pose a significant safety risk to bedside providers. Nurse-led codes are a relatively new concept that may be a potential solution for alleviating some of these difficulties. An experienced nurse who has completed advanced cardiac life support (ACLS), and additional training, assumed the responsibility of directing the mechanics of the appropriate ACLS algorithm. This was done in conjunction with a physician who also acted as a physician leader. The additional nurse-led code training included a multi-disciplinary in situ simulation of a CPA on a suspected COVID-19 patient. During the CPA, the nurse leader’s responsibilities include: ensuring adequate compression depth and rate, minimizing interruptions in chest compressions, the timing of rhythm/pulse checks, and appropriate medication administration. In addition, the nurse leader also functions as a last line safety check for appropriate personal protective equipment and limiting exposure of staff. The use of nurse-led codes for CPA has shown to decrease the cognitive overload and task saturation for the physician, as well as limiting the number of staff being exposed to a potentially infectious patient. The real-world application has allowed physicians to perform and oversee high-risk procedures such as intubation, line placement, and point of care ultrasound, without sacrificing the integrity of the resuscitation. Nurse-led codes have also given the physician the bandwidth to review pertinent medical history, advanced directives, determine reversible causes, and have the end of life conversations with family. While there is a paucity of research on the effectiveness of nurse-led codes, there are many potentially significant benefits. In addition to its value during a pandemic, it may also be beneficial during complex circumstances such as extracorporeal cardiopulmonary resuscitation.

Keywords: cardiopulmonary arrest, COVID-19, nurse-led code, task saturation

Procedia PDF Downloads 137
1880 Detection of Chaos in General Parametric Model of Infectious Disease

Authors: Javad Khaligh, Aghileh Heydari, Ali Akbar Heydari

Abstract:

Mathematical epidemiological models for the spread of disease through a population are used to predict the prevalence of a disease or to study the impacts of treatment or prevention measures. Initial conditions for these models are measured from statistical data collected from a population since these initial conditions can never be exact, the presence of chaos in mathematical models has serious implications for the accuracy of the models as well as how epidemiologists interpret their findings. This paper confirms the chaotic behavior of a model for dengue fever and SI by investigating sensitive dependence, bifurcation, and 0-1 test under a variety of initial conditions.

Keywords: epidemiological models, SEIR disease model, bifurcation, chaotic behavior, 0-1 test

Procedia PDF Downloads 313
1879 Psychoeducation to Prevent Spread of HIV Among Men Who Have Sex with Men in Surabaya City

Authors: Christina Albertina Ludwinia Parung, I Gusti Ayu Maya Vratasti

Abstract:

Sexual transmission of HIV among Men who have Sex with Men (MSM) is believed to be one of the sources of the AIDS epidemic. Nowadays, government, communities, and NGOs are taking action to prevent its spread by assisting and educating groups of MSM in their countries. This assistance involves experts in many fields of study, including psychology. In the field of psychology, psychoeducation is believed to be one of the ways to assist the MSM groups. Just like in other countries, this psychoeducation assistance is also needed in Indonesia, where MSM groups are found in many cities within. Surabaya, as the second largest and densely populated city in Indonesia, is known to have a big number of MSM population. In September to December 2020, the author and a colleague conducted a mentoring effort to the MSM community at the MSM community gathering location called Gang Pattaya, in the city of Surabaya. The existence of this community is disguised by the general public, but is well known by NGOs. Community members do MSM out of their liking, although some do it in exchange for money. However, safety factors, such as using condoms for MSM, are not a priority for this community. They do MSM whether they receive a reward or not, just out of a boost of pleasure. There is no attempt to find out the health of the partner once they are attracted to each other. In general, they do not know whether they are infected with HIV. Most of them feel healthy and since they do not show any symptoms, they think it is not necessary to get tested. In the mentoring process, the researchers conduct psychoeducation, which begins with an approach to certain individuals so that they are comfortable with the researchers’ presence, then increasing awareness of safe sex behavior for HIV prevention for groups in the form of counseling using the Theory of Reasoned Action (TRA) approach. Counseling is carried out in various forms including roleplay, games, and seminars. The number of participants was 11 people, varying from 19-47 years old. Pretest related to knowledge of safe sex was carried out before conducting the intervention and post-test after the intervention. The normality test used is the Shapiro-Wilk analysis. Different tests on the data obtained were carried out using the non-parametric Wilcoxon Signed Ranks Test. None of the participants had lower post-test knowledge scores than the pre-test. Prestest and post test for safer sex behavior showed 2 participants with safer sex behavior did not change. Both belong to the senior group, while other participants have an improvement in their safer sex behavior. These findings suggest that intervention programs for MSM as an effort to reduce HIV transmission should pay attention to affective and cognitive coping strategies.

Keywords: HIV, men who have sex with men, psychoeducation, psychology health, safer sex behavior, theory of reasoned action

Procedia PDF Downloads 125
1878 COVID-19 Teaches Probability Risk Assessment

Authors: Sean Sloan

Abstract:

Probability Risk Assessments (PRA) can be a difficult concept for students to grasp. So in searching for different ways to describe PRA to relate it to their lives; COVID-19 came up. The parallels are amazing. Soon students began analyzing acceptable risk with the virus. This helped them to quantify just how dangerous is dangerous. The original lesson was dismissed and for the remainder of the period, the probability of risk, and the lethality of risk became the topic. Spreading events such as a COVID carrier on an airline became analogous to single fault casualties such as a Tsunami. Odds of spreading became odds of backup-diesel-generator failure – like with Fukashima Daiichi. Fatalities of the disease became expected fatalities due to radiation spread. Quantification from this discussion took it from hyperbole and emotion into one where we could rationally base guidelines. It has been one of the most effective educational devices observed.

Keywords: COVID, education, probability, risk

Procedia PDF Downloads 146
1877 Tumor Size and Lymph Node Metastasis Detection in Colon Cancer Patients Using MR Images

Authors: Mohammadreza Hedyehzadeh, Mahdi Yousefi

Abstract:

Colon cancer is one of the most common cancer, which predicted to increase its prevalence due to the bad eating habits of peoples. Nowadays, due to the busyness of people, the use of fast foods is increasing, and therefore, diagnosis of this disease and its treatment are of particular importance. To determine the best treatment approach for each specific colon cancer patients, the oncologist should be known the stage of the tumor. The most common method to determine the tumor stage is TNM staging system. In this system, M indicates the presence of metastasis, N indicates the extent of spread to the lymph nodes, and T indicates the size of the tumor. It is clear that in order to determine all three of these parameters, an imaging method must be used, and the gold standard imaging protocols for this purpose are CT and PET/CT. In CT imaging, due to the use of X-rays, the risk of cancer and the absorbed dose of the patient is high, while in the PET/CT method, there is a lack of access to the device due to its high cost. Therefore, in this study, we aimed to estimate the tumor size and the extent of its spread to the lymph nodes using MR images. More than 1300 MR images collected from the TCIA portal, and in the first step (pre-processing), histogram equalization to improve image qualities and resizing to get the same image size was done. Two expert radiologists, which work more than 21 years on colon cancer cases, segmented the images and extracted the tumor region from the images. The next step is feature extraction from segmented images and then classify the data into three classes: T0N0، T3N1 و T3N2. In this article, the VGG-16 convolutional neural network has been used to perform both of the above-mentioned tasks, i.e., feature extraction and classification. This network has 13 convolution layers for feature extraction and three fully connected layers with the softmax activation function for classification. In order to validate the proposed method, the 10-fold cross validation method used in such a way that the data was randomly divided into three parts: training (70% of data), validation (10% of data) and the rest for testing. It is repeated 10 times, each time, the accuracy, sensitivity and specificity of the model are calculated and the average of ten repetitions is reported as the result. The accuracy, specificity and sensitivity of the proposed method for testing dataset was 89/09%, 95/8% and 96/4%. Compared to previous studies, using a safe imaging technique (MRI) and non-use of predefined hand-crafted imaging features to determine the stage of colon cancer patients are some of the study advantages.

Keywords: colon cancer, VGG-16, magnetic resonance imaging, tumor size, lymph node metastasis

Procedia PDF Downloads 45
1876 Part Variation Simulations: An Industrial Case Study with an Experimental Validation

Authors: Narendra Akhadkar, Silvestre Cano, Christophe Gourru

Abstract:

Injection-molded parts are widely used in power system protection products. One of the biggest challenges in an injection molding process is shrinkage and warpage of the molded parts. All these geometrical variations may have an adverse effect on the quality of the product, functionality, cost, and time-to-market. The situation becomes more challenging in the case of intricate shapes and in mass production using multi-cavity tools. To control the effects of shrinkage and warpage, it is very important to correctly find out the input parameters that could affect the product performance. With the advances in the computer-aided engineering (CAE), different tools are available to simulate the injection molding process. For our case study, we used the MoldFlow insight tool. Our aim is to predict the spread of the functional dimensions and geometrical variations on the part due to variations in the input parameters such as material viscosity, packing pressure, mold temperature, melt temperature, and injection speed. The input parameters may vary during batch production or due to variations in the machine process settings. To perform the accurate product assembly variation simulation, the first step is to perform an individual part variation simulation to render realistic tolerance ranges. In this article, we present a method to simulate part variations coming from the input parameters variation during batch production. The method is based on computer simulations and experimental validation using the full factorial design of experiments (DoE). The robustness of the simulation model is verified through input parameter wise sensitivity analysis study performed using simulations and experiments; all the results show a very good correlation in the material flow direction. There exists a non-linear interaction between material and the input process variables. It is observed that the parameters such as packing pressure, material, and mold temperature play an important role in spread on functional dimensions and geometrical variations. This method will allow us in the future to develop accurate/realistic virtual prototypes based on trusted simulated process variation and, therefore, increase the product quality and potentially decrease the time to market.

Keywords: correlation, molding process, tolerance, sensitivity analysis, variation simulation

Procedia PDF Downloads 164
1875 Disconnect between Water, Sanitation and Hygiene Related Behaviours of Children in School and Family

Authors: Rehan Mohammad

Abstract:

Background: Improved Water, Sanitation and Hygiene (WASH) practices in schools ensure children’s health, well-being and cognitive performance. In India under various WASH interventions in schools, teachers, and other staff make every possible effort to educate children about personal hygiene, sanitation practices and harms of open defecation. However, once children get back to their families, they see other practicing inappropriate WASH behaviors, and they consequently start following them. This show disconnect between school behavior and family behavior, which needs to be bridged to achieve desired WASH outcomes. Aims and Objectives: The aim of this study is to assess the factors causing disconnect of WASH-related behaviors between school and the family of children. It also suggests behavior change interventions to bridge the gap. Methodology: The present study has chosen a mixed- method approach. Both quantitative and qualitative methods of data collection have been used in the present study. The purposive sampling for data collection has been chosen. The data have been collected from 20% children in each age group of 04-08 years and 09-12 years spread over three primary schools and 20% of households to which they belong to which is spread over three slum communities in south district of Delhi. Results: The present study shows that despite of several behavior change interventions at school level, children still practice inappropriate WASH behaviors due to disconnect between school and family behaviors. These behaviors show variation from one age group to another. The inappropriate WASH behaviors being practiced by children include open defecation, wrong disposal of garbage, not keeping personal hygiene, not practicing hand washing practices during critical junctures and not washing fruits and vegetables before eating. The present study has highlighted that 80% of children in the age group of 04-08 years still practice inappropriate WASH behaviors when they go back to their families after school whereas, this percentage has reduced to 40% in case of children in the age group 09-12 years. Present study uncovers association between school and family teaching which creates a huge gap between WASH-related behavioral practices. The study has established that children learn and de-learn the WASH behaviors due to the evident disconnect between behavior change interventions at schools and household level. The study has also made it clear that children understand the significance of appropriate WASH practices but owing to the disconnect the behaviors remain unsettled. The study proposes several behavior change interventions to sync the behaviors of children at school and family level to ensure children’s health, well-being and cognitive performance.

Keywords: behavioral interventions, child health, family behavior, school behavior, WASH

Procedia PDF Downloads 100
1874 Scalable CI/CD and Scalable Automation: Assisting in Optimizing Productivity and Fostering Delivery Expansion

Authors: Solanki Ravirajsinh, Kudo Kuniaki, Sharma Ankit, Devi Sherine, Kuboshima Misaki, Tachi Shuntaro

Abstract:

In software development life cycles, the absence of scalable CI/CD significantly impacts organizations, leading to increased overall maintenance costs, prolonged release delivery times, heightened manual efforts, and difficulties in meeting tight deadlines. Implementing CI/CD with standard serverless technologies using cloud services overcomes all the above-mentioned issues and helps organizations improve efficiency and faster delivery without the need to manage server maintenance and capacity. By integrating scalable CI/CD with scalable automation testing, productivity, quality, and agility are enhanced while reducing the need for repetitive work and manual efforts. Implementing scalable CI/CD for development using cloud services like ECS (Container Management Service), AWS Fargate, ECR (to store Docker images with all dependencies), Serverless Computing (serverless virtual machines), Cloud Log (for monitoring errors and logs), Security Groups (for inside/outside access to the application), Docker Containerization (Docker-based images and container techniques), Jenkins (CI/CD build management tool), and code management tools (GitHub, Bitbucket, AWS CodeCommit) can efficiently handle the demands of diverse development environments and are capable of accommodating dynamic workloads, increasing efficiency for faster delivery with good quality. CI/CD pipelines encourage collaboration among development, operations, and quality assurance teams by providing a centralized platform for automated testing, deployment, and monitoring. Scalable CI/CD streamlines the development process by automatically fetching the latest code from the repository every time the process starts, building the application based on the branches, testing the application using a scalable automation testing framework, and deploying the builds. Developers can focus more on writing code and less on managing infrastructure as it scales based on the need. Serverless CI/CD eliminates the need to manage and maintain traditional CI/CD infrastructure, such as servers and build agents, reducing operational overhead and allowing teams to allocate resources more efficiently. Scalable CI/CD adjusts the application's scale according to usage, thereby alleviating concerns about scalability, maintenance costs, and resource needs. Creating scalable automation testing using cloud services (ECR, ECS Fargate, Docker, EFS, Serverless Computing) helps organizations run more than 500 test cases in parallel, aiding in the detection of race conditions, performance issues, and reducing execution time. Scalable CI/CD offers flexibility, dynamically adjusting to varying workloads and demands, allowing teams to scale resources up or down as needed. It optimizes costs by only paying for the resources as they are used and increases reliability. Scalable CI/CD pipelines employ automated testing and validation processes to detect and prevent errors early in the development cycle.

Keywords: achieve parallel execution, cloud services, scalable automation testing, scalable continuous integration and deployment

Procedia PDF Downloads 26
1873 Phishing Attacks Facilitated by Open Source Intelligence

Authors: Urva Maryam

Abstract:

The information has become an important asset to the current cosmos. Globally, various tactics are being observed to confine the spread of information as it makes people vulnerable to security attacks. Open Source Intelligence (OSINT) is a publicly available source that has disseminated information about users or websites, companies, and various organizations. This paper focuses on the quantitative method of exploring various OSINT tools that reveal public information of personals. This information could further facilitate phishing attacks. Phishing attacks can be launched on email addresses, open ports, and unsecure web-surfing. This study allows to analyze the information retrieved from OSINT tools, i.e. theHarvester, and Maltego that can be used to send phishing attacks to individuals.

Keywords: e-mail spoofing, Maltego, OSINT, phishing, spear phishing, theHarvester

Procedia PDF Downloads 129
1872 A Comparative Study of Deep Learning Methods for COVID-19 Detection

Authors: Aishrith Rao

Abstract:

COVID 19 is a pandemic which has resulted in thousands of deaths around the world and a huge impact on the global economy. Testing is a huge issue as the test kits have limited availability and are expensive to manufacture. Using deep learning methods on radiology images in the detection of the coronavirus as these images contain information about the spread of the virus in the lungs is extremely economical and time-saving as it can be used in areas with a lack of testing facilities. This paper focuses on binary classification and multi-class classification of COVID 19 and other diseases such as pneumonia, tuberculosis, etc. Different deep learning methods such as VGG-19, COVID-Net, ResNET+ SVM, Deep CNN, DarkCovidnet, etc., have been used, and their accuracy has been compared using the Chest X-Ray dataset.

Keywords: deep learning, computer vision, radiology, COVID-19, ResNet, VGG-19, deep neural networks

Procedia PDF Downloads 145
1871 Homogenization of Culture and Its Effect on Preferred Reading of Media Communications Aimed at Members of Generation Z

Authors: Philip Katz

Abstract:

The research examines preferred reading of contemporary ads aimed at Generation Z through digital media. A qualitative analysis of focus groups consisting of members of Generation Z from 13 countries in Europe, the Middle East, South America and Asia has shown that, among this cohort, the influence of national culture does not create a strong impediment to understanding media communications targeting Generation Z. The familiarity of members of Generation Z with other countries’ popular culture through the spread of digital media has allowed a homogenizing effect and allowed a greater understanding of those cultures among this generation that lessens the impact of geographic separation.

Keywords: audience, Generation Z, marketing communication, preferred reading

Procedia PDF Downloads 163
1870 Estimating the Technological Deviation Impact on the Value of the Output Parameter of the Induction Converter

Authors: Marinka K. Baghdasaryan, Siranush M. Muradyan, Avgen A. Gasparyan

Abstract:

Based on the experimental data, the impact of resistance and reactance of the winding, as well as the magnetic permeability of the magnetic circuit steel material on the value of the electromotive force of the induction converter is investigated. The obtained results allow to estimate the main technological spreads and determine the maximum level of the electromotive force change. By the method of experiment planning, the expression of a polynomial for the electromotive force which can be used to estimate the adequacy of mathematical models to be used at the investigation and design of induction converters is obtained.

Keywords: induction converter, electromotive force, expectation, technological spread, deviation, planning an experiment, polynomial, confidence level

Procedia PDF Downloads 455
1869 Modeling and Simulation for Infection Processes of Bird Flu within a Poultry Farm

Authors: Tertia Delia Nova, Masaji Watanabge

Abstract:

Infection of bird flu within a poultry farm involves hosts, virus, and medium. Intrusion of bird flu into a poultry farm divides the population into two groups; healthy and susceptible chickens and infected chickens. A healthy and susceptible bird is infected to become an infected bird. Bird flu viruses spread among chickens through medium such as air and droppings, and increase in hosts. A model for an infection process of bird flu within a poultry farm is described, numerical techniques are illustrated, and numerical results are introduced.

Keywords: bird flu, poultry farm, model for an infection process, flu viruses

Procedia PDF Downloads 240
1868 Virtual Reality Design Platform to Easily Create Virtual Reality Experiences

Authors: J. Casteleiro- Pitrez

Abstract:

The interest in Virtual Reality (VR) keeps increasing among the community of designers. To develop this type of immersive experience, the understanding of new processes and methodologies is as fundamental as its complex implementation which usually implies hiring a specialized team. In this paper, we introduce a case study, a platform that allows designers to easily create complex VR experiences, present its features, and its development process. We conclude that this platform provides a complete solution for the design and development of VR experiences, no-code needed.

Keywords: creatives, designers, virtual reality, virtual reality design platform, virtual reality system, no-coding

Procedia PDF Downloads 142
1867 A Method of the Semantic on Image Auto-Annotation

Authors: Lin Huo, Xianwei Liu, Jingxiong Zhou

Abstract:

Recently, due to the existence of semantic gap between image visual features and human concepts, the semantic of image auto-annotation has become an important topic. Firstly, by extract low-level visual features of the image, and the corresponding Hash method, mapping the feature into the corresponding Hash coding, eventually, transformed that into a group of binary string and store it, image auto-annotation by search is a popular method, we can use it to design and implement a method of image semantic auto-annotation. Finally, Through the test based on the Corel image set, and the results show that, this method is effective.

Keywords: image auto-annotation, color correlograms, Hash code, image retrieval

Procedia PDF Downloads 480
1866 Effects of Wind Load on the Tank Structures with Various Shapes and Aspect Ratios

Authors: Doo Byong Bae, Jae Jun Yoo, Il Gyu Park, Choi Seowon, Oh Chang Kook

Abstract:

There are several wind load provisions to evaluate the wind response on tank structures such as API, Euro-code, etc. the assessment of wind action applying these provisions is made by performing the finite element analysis using both linear bifurcation analysis and geometrically nonlinear analysis. By comparing the pressure patterns obtained from the analysis with the results of wind tunnel test, most appropriate wind load criteria will be recommended.

Keywords: wind load, finite element analysis, linear bifurcation analysis, geometrically nonlinear analysis

Procedia PDF Downloads 618
1865 Frequency- and Content-Based Tag Cloud Font Distribution Algorithm

Authors: Ágnes Bogárdi-Mészöly, Takeshi Hashimoto, Shohei Yokoyama, Hiroshi Ishikawa

Abstract:

The spread of Web 2.0 has caused user-generated content explosion. Users can tag resources to describe and organize them. Tag clouds provide rough impression of relative importance of each tag within overall cloud in order to facilitate browsing among numerous tags and resources. The goal of our paper is to enrich visualization of tag clouds. A font distribution algorithm has been proposed to calculate a novel metric based on frequency and content, and to classify among classes from this metric based on power law distribution and percentages. The suggested algorithm has been validated and verified on the tag cloud of a real-world thesis portal.

Keywords: tag cloud, font distribution algorithm, frequency-based, content-based, power law

Procedia PDF Downloads 492
1864 Performance Analysis of SAC-OCDMA System using Different Detectors

Authors: Somaya A. Abd El Mottaleb, Ahmed Abd El Aziz, Heba A. Fayed, Moustafa H. Aly

Abstract:

In this paper, we present the performance of spectral amplitude coding optical code division multiple access using different detectors at different transmission distances using single photodiode detection technique. Modified double weight codes are used as signature codes. Simulation results show that the system using avalanche photo detector can move distance longer than that using positive intrinsic negative photo detector.

Keywords: avalanche photodiode, modified double weight, multiple access technique, single photodiode.

Procedia PDF Downloads 592
1863 Microwave Tomography: The Analytical Treatment for Detecting Malignant Tumor Inside Human Body

Authors: Muhammad Hassan Khalil, Xu Jiadong

Abstract:

Early detection through screening is the best tool short of a perfect treatment against the malignant tumor inside the breast of a woman. By detecting cancer in its early stages, it can be recognized and treated before it has the opportunity to spread and change into potentially dangerous. Microwave tomography is a new imaging method based on contrast in dielectric properties of materials. The mathematical theory of microwave tomography involves solving an inverse problem for Maxwell’s equations. In this paper, we present designed antenna for breast cancer detection, which will use in microwave tomography configuration.

Keywords: microwave imaging, inverse scattering, breast cancer, malignant tumor detection

Procedia PDF Downloads 357
1862 Influence of Deficient Materials on the Reliability of Reinforced Concrete Members

Authors: Sami W. Tabsh

Abstract:

The strength of reinforced concrete depends on the member dimensions and material properties. The properties of concrete and steel materials are not constant but random variables. The variability of concrete strength is due to batching errors, variations in mixing, cement quality uncertainties, differences in the degree of compaction and disparity in curing. Similarly, the variability of steel strength is attributed to the manufacturing process, rolling conditions, characteristics of base material, uncertainties in chemical composition, and the microstructure-property relationships. To account for such uncertainties, codes of practice for reinforced concrete design impose resistance factors to ensure structural reliability over the useful life of the structure. In this investigation, the effects of reductions in concrete and reinforcing steel strengths from the nominal values, beyond those accounted for in the structural design codes, on the structural reliability are assessed. The considered limit states are flexure, shear and axial compression based on the ACI 318-11 structural concrete building code. Structural safety is measured in terms of a reliability index. Probabilistic resistance and load models are compiled from the available literature. The study showed that there is a wide variation in the reliability index for reinforced concrete members designed for flexure, shear or axial compression, especially when the live-to-dead load ratio is low. Furthermore, variations in concrete strength have minor effect on the reliability of beams in flexure, moderate effect on the reliability of beams in shear, and sever effect on the reliability of columns in axial compression. On the other hand, changes in steel yield strength have great effect on the reliability of beams in flexure, moderate effect on the reliability of beams in shear, and mild effect on the reliability of columns in axial compression. Based on the outcome, it can be concluded that the reliability of beams is sensitive to changes in the yield strength of the steel reinforcement, whereas the reliability of columns is sensitive to variations in the concrete strength. Since the embedded target reliability in structural design codes results in lower structural safety in beams than in columns, large reductions in material strengths compromise the structural safety of beams much more than they affect columns.

Keywords: code, flexure, limit states, random variables, reinforced concrete, reliability, reliability index, shear, structural safety

Procedia PDF Downloads 420
1861 Literature Analysis of Nutrition in South Africa and How SA Harvest Aims to Improve Nutrition

Authors: Ali Conn, Kimberly Allen

Abstract:

Food and nutrition play a significant role in humans. It helps them function, grow, and develop into better individuals. However, as essential as food may seem to most people, it is not the case for everyone. South Africans, for example, have been suffering from hunger and poverty for the longest time now. With the spread of the COVID-19 virus, their situations have become worse. Millions of children and their families do not have access to food, hence no proper nutrition. They could barely make ends meet, so they make sure to make the most of what little they have for their household. Fortunately, organizations like SA Harvest aim to end hunger in South Africa. However, they still need to know more about how they can help South Africans with their current diet. Currently, most of the diets are composed of maize and rice. They do not have much to spend on fruits, so these commodities are seen as a luxury. With the help of organizations like SA Harvest, South Africans will be educated and more aware of what they need to eat.

Keywords: nutrition, public health, SA Harvest, food

Procedia PDF Downloads 113
1860 Phishing Attacks Facilitated by Open Source Intelligence

Authors: Urva Maryam

Abstract:

Information has become an important asset to the current cosmos. Globally, various tactics are being observed to confine the spread of information as it makes people vulnerable to security attacks. Open Source Intelligence (OSINT) is a publicly available source that has disseminated information about users or website, companies, and various organizations. This paper focuses on the quantitative method of exploring various OSINT tools that reveal public information of personals. This information could further facilitate the phishing attacks. Phishing attacks can be launched on email addresses, open ports, and unsecured web-surfing. This study allows to analyze information retrieved from OSINT tools i.e., the Harvester, and Maltego, that can be used to send phishing attacks to individuals.

Keywords: OSINT, phishing, spear phishing, email spoofing, the harvester, maltego

Procedia PDF Downloads 62
1859 Terrorism: Definition, History and Different Approaches in the Analysis of Terrorism Phenomenon

Authors: Shabnam Dadparvar, Laijin Shen, Farzad Ravanbod

Abstract:

Nowadays, the political phenomenon of terrorism is considered as an effective factor on political, social, and economic changes. It has replaced the recognized political phenomena such as revolutions, wars (total war among two or more political units with distinct identities in the form of national states), coups d’état, insurgencies and etc. and has challenged political life in all its levels (sub national, national, and international political groups). In this paper by using descriptive-analytical method, the authors try to explain the spread of this political phenomenon across the world, its definition and types, also analyze different approaches to understand it. The authors believe that the Logical-Rational approach is the best way to explain and understand this phenomenon.

Keywords: logical approach, psychological- social approach, religious approach, terrorism

Procedia PDF Downloads 318
1858 Improved Wi-Fi Backscatter System for Multi-to-Multi Communication

Authors: Chang-Bin Ha, Yong-Jun Kim, Dong-Hyun Ha, Hyoung-Kyu Song

Abstract:

The conventional Wi-Fi back scatter system can only process one-to-one communication between the Wi-Fi reader and the Wi-Fi tag. For improvement of throughput of the conventional system, this paper proposes the multi-to-multi communication system. In the proposed system, the interference by the multi-to-multi communication is effectively cancelled by the orthogonal multiple access based on the identification code of the tag. Although the overhead is generated by the procedure for the multi-to-multi communication, because the procedure is processed by the Wi-Fi protocol, the overhead is insignificant for the entire communication procedure. From the numerical results, it is confirmed that the proposed system has nearly proportional increased throughput in according to the number of the tag that simultaneously participates in communication.

Keywords: backscatter, multi-to-multi communication, orthogonality, Wi-Fi

Procedia PDF Downloads 498
1857 Intercultural Initiatives and Canadian Bilingualism

Authors: Muna Shafiq

Abstract:

Growth in international immigration is a reflection of increased migration patterns in Canada and in other parts of the world. Canada continues to promote itself as a bilingual country, yet the bilingual French and English population numbers do not reflect this platform. Each province’s integration policies focus only on second language learning of either English or French. Moreover, since English Canadians outnumber French Canadians, maintaining, much less increasing, English-French bilingualism appears unrealistic. One solution to increasing Canadian bilingualism requires creating intercultural communication initiatives between youth in Quebec and the rest of Canada. Specifically, the focus is on active, experiential learning, where intercultural competencies develop outside traditional classroom settings. The target groups are Generation Y Millennials and Generation Z Linksters, the next generations in the career and parenthood lines. Today, Canada’s education system, like many others, must continually renegotiate lines between programs it offers its immigrant and native communities. While some purists or right-wing nationalists would disagree, the survival of bilingualism in Canada has little to do with reducing immigration. Children and youth immigrants play a valuable role in increasing Canada’s French and English speaking communities. For instance, a focus on more immersion, over core French education programs for immigrant children and youth would not only increase bilingual rates; it would develop meaningful intercultural attachments between Canadians. Moreover, a vigilant increase of funding in French immersion programs is critical, as are new initiatives that focus on experiential language learning for students in French and English language programs. A favorable argument supports the premise that other than French-speaking students in Québec and elsewhere in Canada, second and third generation immigrant students are excellent ambassadors to promote bilingualism in Canada. Most already speak another language at home and understand the value of speaking more than one language in their adopted communities. Their dialogue and participation in experiential language exchange workshops are necessary. If the proposed exchanges take place inter-provincially, the momentum to increase collective regional voices increases. This regional collectivity can unite Canadians differently than nation-targeted initiatives. The results from an experiential youth exchange organized in 2017 between students at the crossroads of Generation Y and Generation Z in Vancouver and Quebec City respectively offer a promising starting point in assessing the strength of bringing together different regional voices to promote bilingualism. Code-switching between standard, international French Vancouver students, learn in the classroom versus more regional forms of Quebec French spoken locally created regional connectivity between students. The exchange was equally rewarding for both groups. Increasing their appreciation for each other’s regional differences allowed them to contribute actively to their social and emotional development. Within a sociolinguistic frame, this proposed model of experiential learning does not focus on hands-on work experience. However, the benefits of such exchanges are as valuable as work experience initiatives developed in experiential education. Students who actively code switch between French and English in real, not simulated contexts appreciate bilingualism more meaningfully and experience its value in concrete terms.

Keywords: experiential learning, intercultural communication, social and emotional learning, sociolinguistic code-switching

Procedia PDF Downloads 127