Search results for: differential invariant signature curves
2004 Risk Analysis of Flood Physical Vulnerability in Residential Areas of Mathare Nairobi, Kenya
Authors: James Kinyua Gitonga, Toshio Fujimi
Abstract:
Vulnerability assessment and analysis is essential to solving the degree of damage and loss as a result of natural disasters. Urban flooding causes a major economic loss and casualties, at Mathare residential area in Nairobi, Kenya. High population caused by rural-urban migration, Unemployment, and unplanned urban development are among factors that increase flood vulnerability in Mathare area. This study aims to analyse flood risk physical vulnerabilities in Mathare based on scientific data, research data that includes the Rainfall data, River Mathare discharge rate data, Water runoff data, field survey data and questionnaire survey through sampling of the study area have been used to develop the risk curves. Three structural types of building were identified in the study area, vulnerability and risk curves were made for these three structural types by plotting the relationship between flood depth and damage for each structural type. The results indicate that the structural type with mud wall and mud floor is the most vulnerable building to flooding while the structural type with stone walls and concrete floor is least vulnerable. The vulnerability of building contents is mainly determined by the number of floors, where households with two floors are least vulnerable, and households with a one floor are most vulnerable. Therefore more than 80% of the residential buildings including the property in the building are highly vulnerable to floods consequently exposed to high risk. When estimating the potential casualties/injuries we discovered that the structural types of houses were major determinants where the mud/adobe structural type had casualties of 83.7% while the Masonry structural type had casualties of 10.71% of the people living in these houses. This research concludes that flood awareness, warnings and observing the building codes will enable reduce damage to the structural types of building, deaths and reduce damage to the building contents.Keywords: flood loss, Mathare Nairobi, risk curve analysis, vulnerability
Procedia PDF Downloads 2392003 Survivability of Maneuvering Aircraft against Air to Air Infrared Missile
Authors: Ji-Yeul Bae, Hyung Mo Bae, Jihyuk Kim, Hyung Hee Cho
Abstract:
An air to air infrared missile poses a significant threat to the survivability of an aircraft due to an advanced sensitivity of sensor and maneuverability of the missile. Therefore, recent military aircraft is equipped with MAW (Missile Approach Warning) to take an evasive maneuver and to deploy countermeasures like chaff and flare. In this research, an effect of MAW sensitivity and resulting evasive maneuver on the survivability of the fighter aircraft is studied. A single engine fighter jet with Mach 0.9 flying at an altitude of 5 km is modeled in the research and infrared signature of the aircraft is calculated by numerical simulation. The survivability is assessed in terms of lethal range. The MAW sensitivity and maneuverability of an aircraft is used as variables. The result showed that improvement in survivability mainly achieved when the missile approach from the side of the aircraft. And maximum 30% increase in survivability of the aircraft is achieved when existence of the missile is noticed at 7 km distance. As a conclusion, sensitivity of the MAW seems to be more important factor than the maneuverability of the aircraft in terms of the survivability.Keywords: air to air missile, missile approach warning, lethal range, survivability
Procedia PDF Downloads 5672002 MHD Chemically Reacting Viscous Fluid Flow towards a Vertical Surface with Slip and Convective Boundary Conditions
Authors: Ibrahim Yakubu Seini, Oluwole Daniel Makinde
Abstract:
MHD chemically reacting viscous fluid flow towards a vertical surface with slip and convective boundary conditions has been conducted. The temperature and the chemical species concentration of the surface and the velocity of the external flow are assumed to vary linearly with the distance from the vertical surface. The governing differential equations are modeled and transformed into systems of ordinary differential equations, which are then solved numerically by a shooting method. The effects of various parameters on the heat and mass transfer characteristics are discussed. Graphical results are presented for the velocity, temperature, and concentration profiles whilst the skin-friction coefficient and the rate of heat and mass transfers near the surface are presented in tables and discussed. The results revealed that increasing the strength of the magnetic field increases the skin-friction coefficient and the rate of heat and mass transfers toward the surface. The velocity profiles are increased towards the surface due to the presence of the Lorenz force, which attracts the fluid particles near the surface. The rate of chemical reaction is seen to decrease the concentration boundary layer near the surface due to the destructive chemical reaction occurring near the surface.Keywords: boundary layer, surface slip, MHD flow, chemical reaction, heat transfer, mass transfer
Procedia PDF Downloads 5392001 Development of Stretchable Woven Fabrics with Auxetic Behaviour
Authors: Adeel Zulifqar, Hong Hu
Abstract:
Auxetic fabrics are a special kind of textile materials which possess negative Poisson’s ratio. Opposite to most of the conventional fabrics, auxetic fabrics get bigger in the transversal direction when stretched or get smaller when compressed. Auxetic fabrics are superior to conventional fabrics because of their counterintuitive properties, such as enhanced porosity under the extension, excellent formability to a curved surface and high energy absorption ability. Up till today, auxetic fabrics have been produced based on two approaches. The first approach involves using auxetic fibre or yarn and weaving technology to fabricate auxetic fabrics. The other method to fabricate the auxetic fabrics is by using non-auxetic yarns. This method has gained extraordinary curiosity of researcher in recent years. This method is based on realizing auxetic geometries into the fabric structure. In the woven fabric structure auxetic geometries can be realized by creating a differential shrinkage phenomenon into the fabric structural unit cell. This phenomenon can be created by using loose and tight weave combinations within the unit cell of interlacement pattern along with elastic and non-elastic yarns. Upon relaxation, the unit cell of interlacement pattern acquires a non-uniform shrinkage profile due to different shrinkage properties of loose and tight weaves in designed pattern, and the auxetic geometry is realized. The development of uni-stretch auxetic woven fabrics and bi-stretch auxetic woven fabrics by using this method has already been reported. This study reports the development of another kind of bi-stretch auxetic woven fabric. The fabric is first designed by transforming the auxetic geometry into interlacement pattern and then fabricated, using the available conventional weaving technology and non-auxetic elastic and non-elastic yarns. The tensile tests confirmed that the developed bi-stretch auxetic woven fabrics exhibit negative Poisson’s ratio over a wide range of tensile strain. Therefore, it can be concluded that the auxetic geometry can be realized into the woven fabric structure by creating the phenomenon of differential shrinkage and bi-stretch woven fabrics made of non-auxetic yarns having auxetic behavior and stretchability are possible can be obtained. Acknowledgement: This work was supported by the Research Grants Council of Hong Kong Special Administrative Region Government (grant number 15205514).Keywords: auxetic, differential shrinkage, negative Poisson's ratio, weaving, stretchable
Procedia PDF Downloads 1512000 A Mimetic Textuality in Robert Frost's 'Nothing Gold Can Stay'
Authors: Kurt S. Candilas
Abstract:
This study is a critical analysis of the work of Robert Frost, 'Nothing Gold Can Stay'. It subjects the literary piece into a qualitative analysis using the critical theory of mimesis. In effect, this study is proposed to find out and shed light on the mimetic feature of the poem’s textuality. Generally, it aims to analyze the poem’s deeper meaning in the context of the reality of life from birth to death. For the most part, this critical analysis discerns, investigates, and highlights the features which present the imitation of life in detail and from a deeper view. Based on the result of analysis, it shows that Frost has portrayed the cycle of life from birth to midst life as about proving oneself to others as far as achievements and accomplishments are concerned; secondly, at some point of one’s life, successes and achievements are just one’s perfect signature of living. As Frost discloses his poem, his message of the reality of life from birth to death is clear enough, that nothing is going to last forever.Keywords: Nothing Gold Can Stay, mimesis, birth, death
Procedia PDF Downloads 4711999 Recognizing Human Actions by Multi-Layer Growing Grid Architecture
Authors: Z. Gharaee
Abstract:
Recognizing actions performed by others is important in our daily lives since it is necessary for communicating with others in a proper way. We perceive an action by observing the kinematics of motions involved in the performance. We use our experience and concepts to make a correct recognition of the actions. Although building the action concepts is a life-long process, which is repeated throughout life, we are very efficient in applying our learned concepts in analyzing motions and recognizing actions. Experiments on the subjects observing the actions performed by an actor show that an action is recognized after only about two hundred milliseconds of observation. In this study, hierarchical action recognition architecture is proposed by using growing grid layers. The first-layer growing grid receives the pre-processed data of consecutive 3D postures of joint positions and applies some heuristics during the growth phase to allocate areas of the map by inserting new neurons. As a result of training the first-layer growing grid, action pattern vectors are generated by connecting the elicited activations of the learned map. The ordered vector representation layer receives action pattern vectors to create time-invariant vectors of key elicited activations. Time-invariant vectors are sent to second-layer growing grid for categorization. This grid creates the clusters representing the actions. Finally, one-layer neural network developed by a delta rule labels the action categories in the last layer. System performance has been evaluated in an experiment with the publicly available MSR-Action3D dataset. There are actions performed by using different parts of human body: Hand Clap, Two Hands Wave, Side Boxing, Bend, Forward Kick, Side Kick, Jogging, Tennis Serve, Golf Swing, Pick Up and Throw. The growing grid architecture was trained by applying several random selections of generalization test data fed to the system during on average 100 epochs for each training of the first-layer growing grid and around 75 epochs for each training of the second-layer growing grid. The average generalization test accuracy is 92.6%. A comparison analysis between the performance of growing grid architecture and self-organizing map (SOM) architecture in terms of accuracy and learning speed show that the growing grid architecture is superior to the SOM architecture in action recognition task. The SOM architecture completes learning the same dataset of actions in around 150 epochs for each training of the first-layer SOM while it takes 1200 epochs for each training of the second-layer SOM and it achieves the average recognition accuracy of 90% for generalization test data. In summary, using the growing grid network preserves the fundamental features of SOMs, such as topographic organization of neurons, lateral interactions, the abilities of unsupervised learning and representing high dimensional input space in the lower dimensional maps. The architecture also benefits from an automatic size setting mechanism resulting in higher flexibility and robustness. Moreover, by utilizing growing grids the system automatically obtains a prior knowledge of input space during the growth phase and applies this information to expand the map by inserting new neurons wherever there is high representational demand.Keywords: action recognition, growing grid, hierarchical architecture, neural networks, system performance
Procedia PDF Downloads 1571998 Avoidant Restrictive Food Intake Disorder and Its Impact on Other Eating Disorders
Abstract:
Avoidant Restrictive Food Intake Disorder (ARFID) was included for the first time in DSM-5, replacing the old diagnosis of DSM-4 'Early Childhood Eating Disorder'. An ARFID is characterized by a restrictive/avoidant eating pattern that can lead to severe nutritional deficiency, weight loss, nutritional supplementation dependence, and poor psychosocial functioning. This eating pattern is associated with decreased interest in food, worries about food characteristics or the act of ingestion, and lack of concern with weight or body image. This paper aims to understand the impact of this new diagnosis in other Eating Disorders (ED) prevalence, as well as to compare their therapeutic approaches. Methodology: Literature reviewed by PubMed with the following keywords: 'ARFID', 'Prevalence', and 'Eating Disorders'. We selected articles related to this theme, written since 2016. Results: In a population of children hospitalized with ED, 5% to 14% was diagnosed with ARFID, and, as outpatient treatment, the prevalence was 22%. People diagnosed with ARFID have more prevalence of other comorbidities, especially autism spectrum, are younger, and are more often male. Regarding the treatment of ARFID, it most often required nasogastric feeding, and with less suffering associated with this procedure, compared to AN. Despite these differences, 12% of patients diagnosed with ARFID transited to AN during treatment, suggesting that the first pathology may be a risk factor for the development of AN. Conclusions: The differences identified between ARFID and the other EDs are important when analyzed as differential diagnostic hypotheses and therapeutic approaches. Further study is necessary regarding its prevalence, risk factors, and treatment.Keywords: avoidant restrictive food intake disorder, ARFID, differential diagnoses, eating disorders, prevalence
Procedia PDF Downloads 1111997 Mechanical Behavior of 16NC6 Steel Hardened by Burnishing
Authors: Litim Tarek, Taamallah Ouahiba
Abstract:
This work relates to the physico-geometrical aspect of the surface layers of 16NC6 steel having undergone the burnishing treatment by hard steel ball. The results show that the optimal effects of burnishing are closely linked to the shape and the material of the active part of the device as well as to the surface plastic deformation ability of the material to be treated. Thus the roughness is improved by more than 70%, and the consolidation rate is increased by 30%. In addition, modeling of the rational traction curves provides a work hardening coefficient of up to 0.3 in the presence of burnishing.Keywords: 16NC6 steel, burnishing, hardening, roughness
Procedia PDF Downloads 1641996 Physical Fitness Normative Reference Values among Lithuanian Primary School Students: Population-Based Cross-Sectional Study
Authors: Brigita Mieziene, Arunas Emeljanovas, Vida Cesnaitiene, Ingunn Fjortoft, Lise Kjonniksen
Abstract:
Background. Health-related physical fitness refers to the favorable health status, i.e. ability to perform daily activities with vigor, as well as capacities that are associated with a low risk for development of chronic diseases and premature death. However, in school-aged children it is constantly declining, while some aspects of fitness declined as much as 50 percent during the last two decades, which prognosticates increasingly earlier onset of health problems, decreasing the quality of life of the population and financial burden for the society. Therefore, the goal of the current study was to indicate nationally representative age- and gender-specific reference values of anthropometric measures, musculoskeletal, motor and cardiorespiratory fitness in Lithuanian primary school children from 6 to 10 years. Methods. The study included 3556 students in total, from 73 randomly selected schools. Ethics approval for research by the Kaunas Regional Ethics Committee (No. BE-2-42) was obtained. Physical fitness was measured by the 9-item test battery, developed by Fjørtoft and colleagues. Height and weight were measured and body mass index calculated. Smoothed centile charts were derived using the LMS method. Results. The numerical age- and gender-specific percentile values (3rd, 10th, 25th, 50th, 75th, 90th, and 97th percentile) for anthropometric measures, musculoskeletal, motor and cardiorespiratory fitness were provided. The equivalent smoothed LMS curves were performed. The study indicated 12.5 percent of overweight and 5 percent of obese children in accordance with international gender and age specific norms of body mass index. This data could be used in clinical and educational settings in order to identify the level of individual physical fitness within its different components.Keywords: fitness, overweight, primary school children, reference values, smoothed percentile curves
Procedia PDF Downloads 1621995 A Uniformly Convergent Numerical Scheme for a Singularly Perturbed Volterra Integrodifferential Equation
Authors: Nana Adjoah Mbroh, Suares Clovis Oukouomi Noutchie
Abstract:
Singularly perturbed problems are parameter dependent problems, and they play major roles in the modelling of real-life situational problems in applied sciences. Thus, designing efficient numerical schemes to solve these problems is of much interest since the exact solutions of such problems may not even exist. Generally, singularly perturbed problems are identified by a small parameter multiplying at least the highest derivative in the equation. The presence of this parameter causes the solution of these problems to be characterized by rapid oscillations. This unique feature renders classical numerical schemes inefficient since they are unable to capture the behaviour of the exact solution in the part of the domain where the rapid oscillations are present. In this paper, a numerical scheme is proposed to solve a singularly perturbed Volterra Integro-differential equation. The scheme is based on the midpoint rule and employs the non-standard finite difference scheme to solve the differential part whilst the composite trapezoidal rule is used for the integral part. A fully fledged error estimate is performed, and Richardson extrapolation is applied to accelerate the convergence of the scheme. Numerical simulations are conducted to confirm the theoretical findings before and after extrapolation.Keywords: midpoint rule, non-standard finite difference schemes, Richardson extrapolation, singularly perturbed problems, trapezoidal rule, uniform convergence
Procedia PDF Downloads 1251994 Characterization of Polymorphic Forms of Rifaximin
Authors: Ana Carolina Kogawa, Selma Gutierrez Antonio, Hérida Regina Nunes Salgado
Abstract:
Rifaximin is an oral antimicrobial, gut - selective and not systemic with adverse effects compared to placebo. It is used for the treatment of hepatic encephalopathy, travelers diarrhea, irritable bowel syndrome, Clostridium difficile, ulcerative colitis and acute diarrhea. The crystalline form present in the rifaximin with minimal systemic absorption is α, being the amorphous form significantly different. Regulators are increasingly attention to polymorphisms. Polymorphs can change the form by altering the drug characteristics compromising the effectiveness and safety of the finished product. International Conference on Harmonization issued the ICH Guidance Q6A, which aim to improve the control of polymorphism in new and existing pharmaceuticals. The objective of this study was to obtain polymorphic forms of rifaximin employing recrystallization processes and characterize them by thermal analysis (thermogravimetry - TG and differential scanning calorimetry - DSC), X-ray diffraction, scanning electron microscopy and solubility test. Six polymorphic forms of rifaximin, designated I to VI were obtained by the crystallization process by evaporation of the solvent. The profiles of the TG curves obtained from polymorphic forms of rifaximin are similar to rifaximin and each other, however, the DTG are different, indicating different thermal behaviors. Melting temperature values of all the polymorphic forms were greater to that shown by the rifaximin, indicating the higher thermal stability of the obtained forms. The comparison of the diffractograms of the polymorphic forms of rifaximin with rifaximin α, β and γ constant in patent indicate that forms III, V and VI are formed by mixing polymorph β and α and form III is formed by polymorph β. The polymorphic form I is formed by polymorph β, but with a significant amount of amorphous material. Already, the polymorphic form II consists of polymorph γ, amorphous. In scanning electron microscope is possible to observe the heterogeneity of morphological characteristics of crystals of polymorphic forms among themselves and with rifaximin. The solubility of forms I and II was greater than the solubility of rifaximin, already, forms III, IV and V presented lower solubility than of rifaximin. Similarly, the bioavailability of the amorphous form of rifaximin is considered significantly higher than the form α, the polymorphic forms obtained in this work can not guarantee the excellent tolerability of the reference medicine. Therefore, studies like these are extremely important and they point to the need for greater requirements by the regulatory agencies competent about polymorphs analysis of the raw materials used in the manufacture of medicines marketed globally. These analyzes are not required in the majority of official compendia. Partnerships between industries, research centers and universities would be a viable way to consolidate researches in this area and contribute to improving the quality of solid drugs.Keywords: electronic microscopy, polymorphism, rifaximin, solubility, X-ray diffraction
Procedia PDF Downloads 6641993 Current Approach in Biodosimetry: Electrochemical Detection of DNA Damage
Authors: Marcela Jelicova, Anna Lierova, Zuzana Sinkorova, Radovan Metelka
Abstract:
At present, electrochemical methods are used in various research fields, especially for analysis of biological molecules. The fact offers the possibility of using the detection of oxidative damage induced indirectly by γ rays in DNA in biodosimentry. The main goal of our study is to optimize the detection of 8-hydroxyguanine by differential pulse voltammetry. The level of this stable and specific indicator of DNA damage could be determined in DNA isolated from peripheral blood lymphocytes, plasma or urine of irradiated individuals. Screen-printed carbon electrodes modified with carboxy-functionalized multi-walled carbon nanotubes were utilized for highly sensitive electrochemical detection of 8-hydroxyguanine. Electrochemical oxidation of 8-hydroxoguanine monitored by differential pulse voltammetry was found pH-dependent and the most intensive signal was recorded at pH 7. After recalculating the current density, several times higher sensitivity was attained in comparison with already published results, which were obtained using screen-printed carbon electrodes with unmodified carbon ink. Subsequently, the modified electrochemical technique was used for the detection of 8-hydroxoguanine in calf thymus DNA samples irradiated by 60Co gamma source in the dose range from 0.5 to 20 Gy using by various types of sample pretreatment and measurement conditions. This method could serve for fast retrospective quantification of absorbed dose in cases of accidental exposure to ionizing radiation and may play an important role in biodosimetry.Keywords: biodosimetry, electrochemical detection, voltametry, 8-hydroxyguanine
Procedia PDF Downloads 2741992 Numerical Solution of Space Fractional Order Linear/Nonlinear Reaction-Advection Diffusion Equation Using Jacobi Polynomial
Authors: Shubham Jaiswal
Abstract:
During modelling of many physical problems and engineering processes, fractional calculus plays an important role. Those are greatly described by fractional differential equations (FDEs). So a reliable and efficient technique to solve such types of FDEs is needed. In this article, a numerical solution of a class of fractional differential equations namely space fractional order reaction-advection dispersion equations subject to initial and boundary conditions is derived. In the proposed approach shifted Jacobi polynomials are used to approximate the solutions together with shifted Jacobi operational matrix of fractional order and spectral collocation method. The main advantage of this approach is that it converts such problems in the systems of algebraic equations which are easier to be solved. The proposed approach is effective to solve the linear as well as non-linear FDEs. To show the reliability, validity and high accuracy of proposed approach, the numerical results of some illustrative examples are reported, which are compared with the existing analytical results already reported in the literature. The error analysis for each case exhibited through graphs and tables confirms the exponential convergence rate of the proposed method.Keywords: space fractional order linear/nonlinear reaction-advection diffusion equation, shifted Jacobi polynomials, operational matrix, collocation method, Caputo derivative
Procedia PDF Downloads 4451991 Assessing Influence of End-Boundary Conditions on Stability and Second-Order Lateral Stiffness of Beam-Column Elements Embedded in Non-Homogeneous Soil
Authors: Carlos A. Vega-Posada, Jeisson Alejandro Higuita-Villa, Julio C. Saldarriaga-Molina
Abstract:
This paper presents a simplified analytical approach to conduct elastic stability and second-order lateral stiffness analyses of beam-column elements (i.e., piles) with generalized end-boundary conditions embedded on a homogeneous or non-homogeneous Pasternak foundation. The solution is derived using the well-known Differential Transformation Method (DTM), and it consists simply of solving a system of two linear algebraic equations. Using other conventional approaches to solve the governing differential equation of the proposed element can be cumbersome and the solution challenging to implement, especially when the non-homogeneity of the soil is considered. The proposed formulation includes the effects of i) any rotational or lateral transverse spring at the ends of the pile, ii) any external transverse load acting along the pile, iii) soil non-homogeneity, and iv) the second-parameter of the elastic foundation (i.e., shear layer connecting the springs at the top). A parametric study is conducted to investigate the effects of different modulus of subgrade reactions, degrees of non-homogeneities, and intermediate end-boundary conditions on the pile response. The same set of equations can be used to conduct both elastic stability and static analyses. Comprehensive examples are presented to show the simplicity and practicability of the proposed method.Keywords: elastic stability, second-order lateral stiffness, soil-non-homogeneity, pile analysis
Procedia PDF Downloads 2091990 Nonlinear Dynamic Analysis of Base-Isolated Structures Using a Partitioned Solution Approach and an Exponential Model
Authors: Nicolò Vaiana, Filip C. Filippou, Giorgio Serino
Abstract:
The solution of the nonlinear dynamic equilibrium equations of base-isolated structures adopting a conventional monolithic solution approach, i.e. an implicit single-step time integration method employed with an iteration procedure, and the use of existing nonlinear analytical models, such as differential equation models, to simulate the dynamic behavior of seismic isolators can require a significant computational effort. In order to reduce numerical computations, a partitioned solution method and a one dimensional nonlinear analytical model are presented in this paper. A partitioned solution approach can be easily applied to base-isolated structures in which the base isolation system is much more flexible than the superstructure. Thus, in this work, the explicit conditionally stable central difference method is used to evaluate the base isolation system nonlinear response and the implicit unconditionally stable Newmark’s constant average acceleration method is adopted to predict the superstructure linear response with the benefit in avoiding iterations in each time step of a nonlinear dynamic analysis. The proposed mathematical model is able to simulate the dynamic behavior of seismic isolators without requiring the solution of a nonlinear differential equation, as in the case of widely used differential equation model. The proposed mixed explicit-implicit time integration method and nonlinear exponential model are adopted to analyze a three dimensional seismically isolated structure with a lead rubber bearing system subjected to earthquake excitation. The numerical results show the good accuracy and the significant computational efficiency of the proposed solution approach and analytical model compared to the conventional solution method and mathematical model adopted in this work. Furthermore, the low stiffness value of the base isolation system with lead rubber bearings allows to have a critical time step considerably larger than the imposed ground acceleration time step, thus avoiding stability problems in the proposed mixed method.Keywords: base-isolated structures, earthquake engineering, mixed time integration, nonlinear exponential model
Procedia PDF Downloads 2801989 Molecular Portraits: The Role of Posttranslational Modification in Cancer Metastasis
Authors: Navkiran Kaur, Apoorva Mathur, Abhishree Agarwal, Sakshi Gupta, Tuhin Rashmi
Abstract:
Aim: Breast cancer is the most common cancer in women worldwide, and resistance to the current therapeutics, often concurrently, is an increasing clinical challenge. Glycosylation of proteins is one of the most important post-translational modifications. It is widely known that aberrant glycosylation has been implicated in many different diseases due to changes associated with biological function and protein folding. Alterations in cell surface glycosylation, can promote invasive behavior of tumor cells that ultimately lead to the progression of cancer. In breast cancer, there is an increasing evidence pertaining to the role of glycosylation in tumor formation and metastasis. In the present study, an attempt has been made to study the disease associated sialoglycoproteins in breast cancer by using bioinformatics tools. The sequence will be retrieved from UniProt database. A database in the form of a word document was made by a collection of FASTA sequences of breast cancer gene sequence. Glycosylation was studied using yinOyang tool on ExPASy and Differential genes expression and protein analysis was done in context of breast cancer metastasis. The number of residues predicted O-glc NAc threshold containing 50 aberrant glycosylation sites or more was detected and recorded for individual sequence. We found that the there is a significant change in the expression profiling of glycosylation patterns of various proteins associated with breast cancer. Differential aberrant glycosylated proteins in breast cancer cells with respect to non-neoplastic cells are an important factor for the overall progression and development of cancer.Keywords: breast cancer, bioinformatics, cancer, metastasis, glycosylation
Procedia PDF Downloads 2941988 Chaos Cryptography in Cloud Architectures with Lower Latency
Authors: Mohammad A. Alia
Abstract:
With the rapid evolution of the internet applications, cloud computing becomes one of today’s hottest research areas due to its ability to reduce costs associated with computing. Cloud is, therefore, increasing flexibility and scalability for computing services in the internet. Cloud computing is Internet based computing due to shared resources and information which are dynamically delivered to consumers. As cloud computing share resources via the open network, hence cloud outsourcing is vulnerable to attack. Therefore, this paper will explore data security of cloud computing by implementing chaotic cryptography. The proposal scenario develops a problem transformation technique that enables customers to secretly transform their information. This work proposes the chaotic cryptographic algorithms have been applied to enhance the security of the cloud computing accessibility. However, the proposed scenario is secure, easy and straightforward process. The chaotic encryption and digital signature systems ensure the security of the proposed scenario. Though, the choice of the key size becomes crucial to prevent a brute force attack.Keywords: chaos, cloud computing, security, cryptography
Procedia PDF Downloads 3451987 Proposals of Exposure Limits for Infrasound From Wind Turbines
Authors: M. Pawlaczyk-Łuszczyńska, T. Wszołek, A. Dudarewicz, P. Małecki, M. Kłaczyński, A. Bortkiewicz
Abstract:
Human tolerance to infrasound is defined by the hearing threshold. Infrasound that cannot be heard (or felt) is not annoying and is not thought to have any other adverse or health effects. Recent research has largely confirmed earlier findings. ISO 7196:1995 recommends the use of G-weighted characteristics for the assessment of infrasound. There is a strong correlation between G-weighted SPL and annoyance perception. The aim of this study was to propose exposure limits for infrasound from wind turbines. However, only a few countries have set limits for infrasound. These limits are usually no higher than 85-92 dBG, and none of them are specific to wind turbines. Over the years, a number of studies have been carried out to determine hearing thresholds below 20 Hz. It has been recognized that 10% of young people would be able to perceive 10 Hz at around 90 dB, and it has also been found that the difference in median hearing thresholds between young adults aged around 20 years and older adults aged over 60 years is around 10 dB, irrespective of frequency. This shows that older people (up to about 60 years of age) retain good hearing in the low frequency range, while their sensitivity to higher frequencies is often significantly reduced. In terms of exposure limits for infrasound, the average hearing threshold corresponds to a tone with a G-weighted SPL of about 96 dBG. In contrast, infrasound at Lp,G levels below 85-90 dBG is usually inaudible. The individual hearing threshold can, therefore be 10-15 dB lower than the average threshold, so the recommended limits for environmental infrasound could be 75 dBG or 80 dBG. It is worth noting that the G86 curve has been taken as the threshold of auditory perception of infrasound reached by 90-95% of the population, so the G75 and G80 curves can be taken as the criterion curve for wind turbine infrasound. Finally, two assessment methods and corresponding exposure limit values have been proposed for wind turbine infrasound, i.e. method I - based on G-weighted sound pressure level measurements and method II - based on frequency analysis in 1/3-octave bands in the frequency range 4-20 Hz. Separate limit values have been set for outdoor living areas in the open countryside (Area A) and for noise sensitive areas (Area B). In the case of Method I, infrasound limit values of 80 dBG (for areas A) and 75 dBG (for areas B) have been proposed, while in the case of Method II - criterion curves G80 and G75 have been chosen (for areas A and B, respectively).Keywords: infrasound, exposure limit, hearing thresholds, wind turbines
Procedia PDF Downloads 831986 Surface Geodesic Derivative Pattern for Deformable Textured 3D Object Comparison: Application to Expression and Pose Invariant 3D Face Recognition
Authors: Farshid Hajati, Soheila Gheisari, Ali Cheraghian, Yongsheng Gao
Abstract:
This paper presents a new Surface Geodesic Derivative Pattern (SGDP) for matching textured deformable 3D surfaces. SGDP encodes micro-pattern features based on local surface higher-order derivative variation. It extracts local information by encoding various distinctive textural relationships contained in a geodesic neighborhood, hence fusing texture and range information of a surface at the data level. Geodesic texture rings are encoded into local patterns for similarity measurement between non-rigid 3D surfaces. The performance of the proposed method is evaluated extensively on the Bosphorus and FRGC v2 face databases. Compared to existing benchmarks, experimental results show the effectiveness and superiority of combining the texture and 3D shape data at the earliest level in recognizing typical deformable faces under expression, illumination, and pose variations.Keywords: 3D face recognition, pose, expression, surface matching, texture
Procedia PDF Downloads 3931985 Model Order Reduction of Continuous LTI Large Descriptor System Using LRCF-ADI and Square Root Balanced Truncation
Authors: Mohammad Sahadet Hossain, Shamsil Arifeen, Mehrab Hossian Likhon
Abstract:
In this paper, we analyze a linear time invariant (LTI) descriptor system of large dimension. Since these systems are difficult to simulate, compute and store, we attempt to reduce this large system using Low Rank Cholesky Factorized Alternating Directions Implicit (LRCF-ADI) iteration followed by Square Root Balanced Truncation. LRCF-ADI solves the dual Lyapunov equations of the large system and gives low-rank Cholesky factors of the gramians as the solution. Using these cholesky factors, we compute the Hankel singular values via singular value decomposition. Later, implementing square root balanced truncation, the reduced system is obtained. The bode plots of original and lower order systems are used to show that the magnitude and phase responses are same for both the systems.Keywords: low-rank cholesky factor alternating directions implicit iteration, LTI Descriptor system, Lyapunov equations, Square-root balanced truncation
Procedia PDF Downloads 4181984 Hydraulic Characteristics of Mine Tailings by Metaheuristics Approach
Authors: Akhila Vasudev, Himanshu Kaushik, Tadikonda Venkata Bharat
Abstract:
A large number of mine tailings are produced every year as part of the extraction process of phosphates, gold, copper, and other materials. Mine tailings are high in water content and have very slow dewatering behavior. The efficient design of tailings dam and economical disposal of these slurries requires the knowledge of tailings consolidation behavior. The large-strain consolidation theory closely predicts the self-weight consolidation of these slurries as the theory considers the conservation of mass and momentum conservation and considers the hydraulic conductivity as a function of void ratio. Classical laboratory techniques, such as settling column test, seepage consolidation test, etc., are expensive and time-consuming for the estimation of hydraulic conductivity variation with void ratio. Inverse estimation of the constitutive relationships from the measured settlement versus time curves is explored. In this work, inverse analysis based on metaheuristics techniques will be explored for predicting the hydraulic conductivity parameters for mine tailings from the base excess pore water pressure dissipation curve and the initial conditions of the mine tailings. The proposed inverse model uses particle swarm optimization (PSO) algorithm, which is based on the social behavior of animals searching for food sources. The finite-difference numerical solution of the forward analytical model is integrated with the PSO algorithm to solve the inverse problem. The method is tested on synthetic data of base excess pore pressure dissipation curves generated using the finite difference method. The effectiveness of the method is verified using base excess pore pressure dissipation curve obtained from a settling column experiment and further ensured through comparison with available predicted hydraulic conductivity parameters.Keywords: base excess pore pressure, hydraulic conductivity, large strain consolidation, mine tailings
Procedia PDF Downloads 1361983 Drivetrain Comparison and Selection Approach for Armored Wheeled Hybrid Vehicles
Authors: Çağrı Bekir Baysal, Göktuğ Burak Çalık
Abstract:
Armored vehicles may have different traction layouts as a result of terrain capabilities and mobility needs. Two main categories of layouts can be separated as wheeled and tracked. Tracked vehicles have superior off-road capabilities but what they gain on terrain performance they lose on mobility front. Wheeled vehicles on the other hand do not have as good terrain capabilities as tracked vehicles but they have superior mobility capabilities such as top speed, range and agility with respect to tracked vehicles. Conventional armored vehicles employ a diesel ICE as main power source. In these vehicles ICE is mechanically connected to the powertrain. This determines the ICE rpm as a result of speed and torque requested by the driver. ICE efficiency changes drastically with torque and speed required and conventional vehicles suffer in terms of fuel consumption because of this. Hybrid electric vehicles employ at least one electric motor in order to improve fuel efficiency. There are different types of hybrid vehicles but main types are Series Hybrid, Parallel Hybrid and Series-Parallel Hybrid. These vehicles introduce an electric motor for traction and also can have a generator electric motor for range extending purposes. Having an electric motor as the traction power source brings the flexibility of either using the ICE as an alternative traction source while it is in efficient range or completely separating the ICE from traction and using it solely considering efficiency. Hybrid configurations have additional advantages for armored vehicles in addition to fuel efficiency. Heat signature, silent operation and prolonged stationary missions can be possible with the help of the high-power battery pack that will be present in the vehicle for hybrid drivetrain. Because of the reasons explained, hybrid armored vehicles are becoming a target area for military and also for vehicle suppliers. In order to have a better idea and starting point when starting a hybrid armored vehicle design, hybrid drivetrain configuration has to be selected after performing a trade-off study. This study has to include vehicle mobility simulations, integration level, vehicle level and performance level criteria. In this study different hybrid traction configurations possible for an 8x8 vehicle is compared using above mentioned criteria set. In order to compare hybrid traction configurations ease of application, cost, weight advantage, reliability, maintainability, redundancy and performance criteria have been used. Performance criteria points have been defined with the help of vehicle simulations and tests. Results of these simulations and tests also help determining required tractive power for an armored vehicle including conditions like trench and obstacle crossing, gradient climb. With the method explained in this study, each configuration is assigned a point for each criterion. This way, correct configuration can be selected objectively for every application. Also, key aspects of armored vehicles, mine protection and ballistic protection will be considered for hybrid configurations. Results are expected to vary for different types of vehicles but it is observed that having longitudinal differential locking capability improves mobility and having high motor count increases complexity in general.Keywords: armored vehicles, electric drivetrain, electric mobility, hybrid vehicles
Procedia PDF Downloads 861982 Optimization Query Image Using Search Relevance Re-Ranking Process
Authors: T. G. Asmitha Chandini
Abstract:
Web-based image search re-ranking, as an successful method to get better the results. In a query keyword, the first stair is store the images is first retrieve based on the text-based information. The user to select a query keywordimage, by using this query keyword other images are re-ranked based on their visual properties with images.Now a day to day, people projected to match images in a semantic space which is used attributes or reference classes closely related to the basis of semantic image. though, understanding a worldwide visual semantic space to demonstrate highly different images from the web is difficult and inefficient. The re-ranking images, which automatically offline part learns dissimilar semantic spaces for different query keywords. The features of images are projected into their related semantic spaces to get particular images. At the online stage, images are re-ranked by compare their semantic signatures obtained the semantic précised by the query keyword image. The query-specific semantic signatures extensively improve both the proper and efficiency of image re-ranking.Keywords: Query, keyword, image, re-ranking, semantic, signature
Procedia PDF Downloads 5511981 Perceived Seriousness of Cybercrime Types: A Comparison across Gender
Authors: Suleman Ibrahim
Abstract:
Purpose: The research is seeking people's perceptions on cybercrime issues, rather than their knowledge of the facts. Unlike the Tripartite Cybercrime Framework (TCF), the binary models are ill-equipped to differentiate between cyber fraud (a socioeconomic crime) and cyber bullying or cyber stalking (psychosocial cybercrimes). Whilst the binary categories suggested that digital crimes are dichotomized: (i.e. cyber-enabled and cyber-dependent), the TCF, recently proposed, argued that cybercrimes can be conceptualized into three groups: socioeconomic, psychosocial and geopolitical. Concomitantly, as regards to the experience/perceptions of cybercrime, the TCF’s claim requires substantiation beyond its theoretical realm. Approach/Methodology: This scholar endeavor framed with the TCF, deploys a survey method to explore the experience of cybercrime across gender. Drawing from over 400 participants in the UK, this study aimed to contrast the differential perceptions/experiences of socioeconomic cybercrime (e.g. cyber fraud) and psychological cybercrime (e.g. cyber bullying and cyber stalking) across gender. Findings: The results revealed that cyber stalking was rated as least serious of the different digital crime categories. Further revealed that female participants judged all types of cybercrimes as more serious than male participants, with the exception of socioeconomic cybercrime – cyber fraud. This distinction helps to emphasize that gender cultures and nuances not only apply both online and offline, it emphasized the utilitarian value of the TCF. Originality: Unlike existing data, this study has contrasted the differential perceptions and experience of socioeconomic and psychosocial cybercrimes with more refined variables.Keywords: gender variations, psychosocial cybercrime, socioeconomic cybercrime, tripartite cybercrime framework
Procedia PDF Downloads 3891980 Implication of Fractal Kinetics and Diffusion Limited Reaction on Biomass Hydrolysis
Authors: Sibashish Baksi, Ujjaini Sarkar, Sudeshna Saha
Abstract:
In the present study, hydrolysis of Pinus roxburghi wood powder was carried out with Viscozyme, and kinetics of the hydrolysis has been investigated. Finely ground sawdust is submerged into 2% aqueous peroxide solution (pH=11.5) and pretreated through autoclaving, probe sonication, and alkaline peroxide pretreatment. Afterward, the pretreated material is subjected to hydrolysis. A chain of experiments was executed with delignified biomass (50 g/l) and varying enzyme concentrations (24.2–60.5 g/l). In the present study, 14.32 g/l of glucose, along with 7.35 g/l of xylose, have been recovered with a viscozyme concentration of 48.8 g/l and the same condition was treated as optimum condition. Additionally, thermal deactivation of viscozyme has been investigated and found to be gradually decreasing with escalated enzyme loading from 48.4 g/l (dissociation constant= 0.05 h⁻¹) to 60.5 g/l (dissociation constant= 0.02 h⁻¹). The hydrolysis reaction is a pseudo first-order reaction, and therefore, the rate of the hydrolysis can be expressed as a fractal-like kinetic equation that communicates between the product concentration and hydrolytic time t. It is seen that the value of rate constant (K) increases from 0.008 to 0.017 with augmented enzyme concentration from 24.2 g/l to 60.5 g/l. Greater value of K is associated with stronger enzyme binding capacity of the substrate mass. However, escalated concentration of supplied enzyme ensures improved interaction with more substrate molecules resulting in an enhanced de-polymerization of the polymeric sugar chains per unit time which eventually modifies the physiochemical structure of biomass. All fractal dimensions are in between 0 and 1. Lower the value of fractal dimension, more easily the biomass get hydrolyzed. It can be seen that with increased enzyme concentration from 24.2 g/l to 48.4 g/l, the values of fractal dimension go down from 0.1 to 0.044. This indicates that the presence of more enzyme molecules can more easily hydrolyze the substrate. However, an increased value has been observed with a further increment of enzyme concentration to 60.5g/l because of diffusional limitation. It is evident that the hydrolysis reaction system is a heterogeneous organization, and the product formation rate depends strongly on the enzyme diffusion resistances caused by the rate-limiting structures of the substrate-enzyme complex. Value of the rate constant increases from 1.061 to 2.610 with escalated enzyme concentration from 24.2 to 48.4 g/l. As the rate constant is proportional to Fick’s diffusion coefficient, it can be assumed that with a higher concentration of enzyme, a larger amount of enzyme mass dM diffuses into the substrate through the surface dF per unit time dt. Therefore, a higher rate constant value is associated with a faster diffusion of enzyme into the substrate. Regression analysis of time curves with various enzyme concentrations shows that diffusion resistant constant increases from 0.3 to 0.51 for the first two enzyme concentrations and again decreases with enzyme concentration of 60.5 g/l. During diffusion in a differential scale, the enzyme also experiences a greater resistance during diffusion of larger dM through dF in dt.Keywords: viscozyme, glucose, fractal kinetics, thermal deactivation
Procedia PDF Downloads 1111979 Simulation of the Large Hadrons Collisions Using Monte Carlo Tools
Authors: E. Al Daoud
Abstract:
In many cases, theoretical treatments are available for models for which there is no perfect physical realization. In this situation, the only possible test for an approximate theoretical solution is to compare with data generated from a computer simulation. In this paper, Monte Carlo tools are used to study and compare the elementary particles models. All the experiments are implemented using 10000 events, and the simulated energy is 13 TeV. The mean and the curves of several variables are calculated for each model using MadAnalysis 5. Anomalies in the results can be seen in the muons masses of the minimal supersymmetric standard model and the two Higgs doublet model.Keywords: Feynman rules, hadrons, Lagrangian, Monte Carlo, simulation
Procedia PDF Downloads 3191978 Human Gesture Recognition for Real-Time Control of Humanoid Robot
Authors: S. Aswath, Chinmaya Krishna Tilak, Amal Suresh, Ganesh Udupa
Abstract:
There are technologies to control a humanoid robot in many ways. But the use of Electromyogram (EMG) electrodes has its own importance in setting up the control system. The EMG based control system helps to control robotic devices with more fidelity and precision. In this paper, development of an electromyogram based interface for human gesture recognition for the control of a humanoid robot is presented. To recognize control signs in the gestures, a single channel EMG sensor is positioned on the muscles of the human body. Instead of using a remote control unit, the humanoid robot is controlled by various gestures performed by the human. The EMG electrodes attached to the muscles generates an analog signal due to the effect of nerve impulses generated on moving muscles of the human being. The analog signals taken up from the muscles are supplied to a differential muscle sensor that processes the given signal to generate a signal suitable for the microcontroller to get the control over a humanoid robot. The signal from the differential muscle sensor is converted to a digital form using the ADC of the microcontroller and outputs its decision to the CM-530 humanoid robot controller through a Zigbee wireless interface. The output decision of the CM-530 processor is sent to a motor driver in order to control the servo motors in required direction for human like actions. This method for gaining control of a humanoid robot could be used for performing actions with more accuracy and ease. In addition, a study has been conducted to investigate the controllability and ease of use of the interface and the employed gestures.Keywords: electromyogram, gesture, muscle sensor, humanoid robot, microcontroller, Zigbee
Procedia PDF Downloads 4071977 Evaluation of Dual Polarization Rainfall Estimation Algorithm Applicability in Korea: A Case Study on Biseulsan Radar
Authors: Chulsang Yoo, Gildo Kim
Abstract:
Dual polarization radar provides comprehensive information about rainfall by measuring multiple parameters. In Korea, for the rainfall estimation, JPOLE and CSU-HIDRO algorithms are generally used. This study evaluated the local applicability of JPOLE and CSU-HIDRO algorithms in Korea by using the observed rainfall data collected on August, 2014 by the Biseulsan dual polarization radar data and KMA AWS. A total of 11,372 pairs of radar-ground rain rate data were classified according to thresholds of synthetic algorithms into suitable and unsuitable data. Then, evaluation criteria were derived by comparing radar rain rate and ground rain rate, respectively, for entire, suitable, unsuitable data. The results are as follows: (1) The radar rain rate equation including KDP, was found better in the rainfall estimation than the other equations for both JPOLE and CSU-HIDRO algorithms. The thresholds were found to be adequately applied for both algorithms including specific differential phase. (2) The radar rain rate equation including horizontal reflectivity and differential reflectivity were found poor compared to the others. The result was not improved even when only the suitable data were applied. Acknowledgments: This work was supported by the Basic Science Research Program through the National Research Foundation of Korea, funded by the Ministry of Education (NRF-2013R1A1A2011012).Keywords: CSU-HIDRO algorithm, dual polarization radar, JPOLE algorithm, radar rainfall estimation algorithm
Procedia PDF Downloads 2131976 An Improved Tracking Approach Using Particle Filter and Background Subtraction
Authors: Amir Mukhtar, Dr. Likun Xia
Abstract:
An improved, robust and efficient visual target tracking algorithm using particle filtering is proposed. Particle filtering has been proven very successful in estimating non-Gaussian and non-linear problems. In this paper, the particle filter is used with color feature to estimate the target state with time. Color distributions are applied as this feature is scale and rotational invariant, shows robustness to partial occlusion and computationally efficient. The performance is made more robust by choosing the different (YIQ) color scheme. Tracking is performed by comparison of chrominance histograms of target and candidate positions (particles). Color based particle filter tracking often leads to inaccurate results when light intensity changes during a video stream. Furthermore, background subtraction technique is used for size estimation of the target. The qualitative evaluation of proposed algorithm is performed on several real-world videos. The experimental results demonstrate that the improved algorithm can track the moving objects very well under illumination changes, occlusion and moving background.Keywords: tracking, particle filter, histogram, corner points, occlusion, illumination
Procedia PDF Downloads 3811975 The Convolution Recurrent Network of Using Residual LSTM to Process the Output of the Downsampling for Monaural Speech Enhancement
Authors: Shibo Wei, Ting Jiang
Abstract:
Convolutional-recurrent neural networks (CRN) have achieved much success recently in the speech enhancement field. The common processing method is to use the convolution layer to compress the feature space by multiple upsampling and then model the compressed features with the LSTM layer. At last, the enhanced speech is obtained by deconvolution operation to integrate the global information of the speech sequence. However, the feature space compression process may cause the loss of information, so we propose to model the upsampling result of each step with the residual LSTM layer, then join it with the output of the deconvolution layer and input them to the next deconvolution layer, by this way, we want to integrate the global information of speech sequence better. The experimental results show the network model (RES-CRN) we introduce can achieve better performance than LSTM without residual and overlaying LSTM simply in the original CRN in terms of scale-invariant signal-to-distortion ratio (SI-SNR), speech quality (PESQ), and intelligibility (STOI).Keywords: convolutional-recurrent neural networks, speech enhancement, residual LSTM, SI-SNR
Procedia PDF Downloads 200