Search results for: Message Authentication Code (MAC)
1114 Detection and Quantification of Active Pharmaceutical Ingredients as Adulterants in Garcinia cambogia Slimming Preparations Using NIR Spectroscopy Combined with Chemometrics
Authors: Dina Ahmed Selim, Eman Shawky Anwar, Rasha Mohamed Abu El-Khair
Abstract:
A rapid, simple and efficient method with minimal sample treatment was developed for authentication of Garcinia cambogia fruit peel powder, along with determining undeclared active pharmaceutical ingredients (APIs) in its herbal slimming dietary supplements using near infrared spectroscopy combined with chemometrics. Five featured adulterants, including sibutramine, metformin, orlistat, ephedrine, and theophylline are selected as target compounds. The Near infrared spectral data matrix of authentic Garcinia cambogia fruit peel and specimens degraded by intentional contamination with the five selected APIs was subjected to hierarchical clustering analysis to investigate their bundling figure. SIMCA models were established to ensure the genuiness of Garcinia cambogia fruit peel which resulted in perfect classification of all tested specimens. Adulterated samples were utilized for construction of PLSR models based on different APIs contents at minute levels of fraud practices (LOQ < 0.2% w/w).The suggested approach can be applied to enhance and guarantee the safety and quality of Garcinia fruit peel powder as raw material and in dietary supplements.Keywords: Garcinia cambogia, Quality control, NIR spectroscopy, Chemometrics
Procedia PDF Downloads 761113 A Hybrid Digital Watermarking Scheme
Authors: Nazish Saleem Abbas, Muhammad Haris Jamil, Hamid Sharif
Abstract:
Digital watermarking is a technique that allows an individual to add and hide secret information, copyright notice, or other verification message inside a digital audio, video, or image. Today, with the advancement of technology, modern healthcare systems manage patients’ diagnostic information in a digital way in many countries. When transmitted between hospitals through the internet, the medical data becomes vulnerable to attacks and requires security and confidentiality. Digital watermarking techniques are used in order to ensure the authenticity, security and management of medical images and related information. This paper proposes a watermarking technique that embeds a watermark in medical images imperceptibly and securely. In this work, digital watermarking on medical images is carried out using the Least Significant Bit (LSB) with the Discrete Cosine Transform (DCT). The proposed methods of embedding and extraction of a watermark in a watermarked image are performed in the frequency domain using LSB by XOR operation. The quality of the watermarked medical image is measured by the Peak signal-to-noise ratio (PSNR). It was observed that the watermarked medical image obtained performing XOR operation between DCT and LSB survived compression attack having a PSNR up to 38.98.Keywords: watermarking, image processing, DCT, LSB, PSNR
Procedia PDF Downloads 461112 Monte Carlo Simulations of LSO/YSO for Dose Evaluation in Photon Beam Radiotherapy
Authors: H. Donya
Abstract:
Monte Carlo (MC) techniques play a fundamental role in radiotherapy. A two non-water-equivalent of different media were used to evaluate the dose in water. For such purpose, Lu2SiO5 (LSO) and Y2SiO5 (YSO) orthosilicates scintillators are chosen for MC simulation using Penelope code. To get higher efficiency in dose calculation, variance reduction techniques are discussed. Overall results of this investigation ensured that the LSO/YSO bi-media a good combination to tackle over-response issue in dynamic photon radiotherapy.Keywords: Lu2SiO5 (LSO) and Y2SiO5 (YSO) orthosilicates, Monte Carlo, correlated sampling, radiotherapy
Procedia PDF Downloads 4051111 Fixing the Identity Gap in Fashion: Magazines' Role in Consumption of Clothes
Authors: Kateryna Pilyarchuk
Abstract:
A dress has, since times immemorial, been used to communicate the wearer’s identity. When a new trend is born, fashionistas buy it not only with the purpose to beautify themselves, but also to acquire the collective identity. Fashion has become a means of narrating one’s stance and status. Thus, when one spends money on a brand, one pays for some unmaterial components associated with it. This paper will present some ways in which fashion magazines promote consumerism by drawing on women’s craving for collective identity and need to fill in their identity gap by means of a purchase. By applying the method of critical discursive psychology, it will present layers of ideology and positions that become visible in framing of the message in U.S. Harper’s Bazaar. In this context, fashion decisions that are presented to its readers will be critically evaluated from the gender perspective. It will be demonstrated that what is presented as a postfeminist choice in the neoliberal society is still, to a considerable extent, oppressive and driven by the male gaze. As the findings show, the contemporary female identities in fashion are still built on the principles of traditional femininity. Magazines and fashion discourse train women that they should fear being left out of fashion and, by extension, out of the category of the sexually appealing (from the male perspective).Keywords: collective identity, critical discursive psychology, fashion discourse, identity gap
Procedia PDF Downloads 1461110 Experimental and Numerical Modeling of Dynamic Axial Crushing of a Composite Glass/PEHD
Authors: Mahmoudi Noureddine, Kaou Abdellah
Abstract:
Energy absorption is a major requirement for automotive structures. Although crashworthy structures of composite based glass fiber have exhibited energy absorption greater than similar at other composites structures, the crush process in many cases is accompanied by fracture, rather than by plastic deformation. The crash experiments show that the tubes are crushed in progressive manner start from one end of the tubes and delamination takes place between the layers. To better understand details of the crash process, ABAQUS finite element code is used.Keywords: Energy absorption, crash, PEHD
Procedia PDF Downloads 4961109 Heritage, Cultural Events and Promises for Better Future: Media Strategies for Attracting Tourism during the Arab Spring Uprisings
Authors: Eli Avraham
Abstract:
The Arab Spring was widely covered in the global media and the number of Western tourists traveling to the area began to fall. The goal of this study was to analyze which media strategies marketers in Middle Eastern countries chose to employ in their attempts to repair the negative image of the area in the wake of the Arab Spring. Several studies were published concerning image-restoration strategies of destinations during crises around the globe; however, these strategies were not part of an overarching theory, conceptual framework or model from the fields of crisis communication and image repair. The conceptual framework used in the current study was the ‘multi-step model for altering place image’, which offers three types of strategies: source, message and audience. Three research questions were used: 1.What public relations crisis techniques and advertising campaign components were used? 2. What media policies and relationships with the international media were adopted by Arab officials? 3. Which marketing initiatives (such as cultural and sports events) were promoted? This study is based on qualitative content analysis of four types of data: 1) advertising components (slogans, visuals and text); (2) press interviews with Middle Eastern officials and marketers; (3) official media policy adopted by government decision-maker (e.g. boycotting or arresting newspeople); and (4) marketing initiatives (e.g. organizing heritage festivals and cultural events). The data was located in three channels from December 2010, when the events started, to September 31, 2013: (1) Internet and video-sharing websites: YouTube and Middle Eastern countries' national tourism board websites; (2) News reports from two international media outlets, The New York Times and Ha’aretz; these are considered quality newspapers that focus on foreign news and tend to criticize institutions; (3) Global tourism news websites: eTurbo news and ‘Cities and countries branding’. Using the ‘multi-step model for altering place image,’ the analysis reveals that Middle Eastern marketers and officials used three kinds of strategies to repair their countries' negative image: 1. Source (cooperation and media relations; complying, threatening and blocking the media; and finding alternatives to the traditional media) 2. Message (ignoring, limiting, narrowing or reducing the scale of the crisis; acknowledging the negative effect of an event’s coverage and assuring a better future; promotion of multiple facets, exhibitions and softening the ‘hard’ image; hosting spotlight sporting and cultural events; spinning liabilities into assets; geographic dissociation from the Middle East region; ridicule the existing stereotype) and 3. Audience (changing the target audience by addressing others; emphasizing similarities and relevance to specific target audience). It appears that dealing with their image problems will continue to be a challenge for officials and marketers of Middle Eastern countries until the region stabilizes and its regional conflicts are resolved.Keywords: Arab spring, cultural events, image repair, Middle East, tourism marketing
Procedia PDF Downloads 2851108 Heritage Tourism Balance between Historic Culture and Marketing Innovation: The Case Study of Taiwan
Authors: Lin Chih-Ken
Abstract:
This paper explores the A Li Shan hotel of Taiwan during the Japanese occupation period, after over a hundred years of time, it has been handed over to the hotel managing enterprise to retain the historic building and the culture. Applying the innovative marketing strategies, coordinate the local government traveling policy then combined local tea agriculture and forestry specialty integrated marketing, to create the special hotel located in the Alishan National Scenic Area with the characteristics of landscape, innovative marketing and history, to attract domestic tourism and visitors around the world. This study interview the hotel owner, managers, employees and guests, in addition to collected message feedback from reservation website, to apply Ambidexterity Marketing Theory and Resource Base Theory to analyze the main impact factors. The conclusion showed that the integration of several key factors and make good use of resource strength generate heterogeneous product characteristics to attracting wider range of visitors.Keywords: heritage tourism, historic hotel, marketing ambidexterity, resource base theory
Procedia PDF Downloads 2651107 Energy-Efficient Contact Selection Method for CARD in Wireless Ad-Hoc Networks
Authors: Mehdi Assefi, Keihan Hataminezhad
Abstract:
One of the efficient architectures for exploring the resources in wireless ad-hoc networks is contact-based architecture. In this architecture, each node assigns a unique zone for itself and each node keeps all information from inside the zone, as well as some from outside the zone, which is called contact. Reducing the overlap between different zones of a node and its contacts increases its performance, therefore Edge Method (EM) is designed for this purpose. Contacts selected by EM do not have any overlap with their sources, but for choosing the contact a vast amount of information must be transmitted. In this article, we will offer a new protocol for contact selection, which is called PEM. The objective would be reducing the volume of transmitted information, using Non-Uniform Dissemination Probabilistic Protocols. Consumed energy for contact selection is a function of the size of transmitted information between nodes. Therefore, by reducing the content of contact selection message using the PEM will decrease the consumed energy. For evaluation of the PEM we applied the simulation method. Results indicated that PEM consumes less energy compared to EM, and by increasing the number of nodes (level of nodes), performance of PEM will improve in comparison with EM.Keywords: wireless ad-hoc networks, contact selection, method for CARD, energy-efficient
Procedia PDF Downloads 2881106 Use of Visual, Animating Narrative in an Entrepreneurial Storytelling: A Case Study of Greenesignit! Card Game, Educational and Brainstorming Tool for Development of Sustainable Products
Authors: Maja S. Todorovic
Abstract:
This paper aims to promote entrepreneurial storytelling by exploring new ideas and learning practices. An entrepreneur needs to be a ‘storyteller’, an ‘epic hero’, capable of offering an emotional connection to his audience, a character with whom audience can identify with, rejoice, suffer, celebrate, fail – simply experience everything. In other words, a successful entrepreneur is giving tangible experience through his business story and that’s what makes his story and business alive. Use of mythology, eulogy, metaphor, epic, fairytales and cartoons, permeated with humor and sudden twists is a winning recipe for a business story that captures attention. In the business case of the Greenesignit! Card game, (educational and brainstorming tool for development of sustainable products) we will demonstrate how an entrepreneur successfully used visual narrative to communicate his story and at the same time as a vehicle to transmute his message in learning tool and product development.Keywords: animating narrative, entrepreneur, Greeneisgnit! card game, visual storytelling
Procedia PDF Downloads 3911105 Design and Application of NFC-Based Identity and Access Management in Cloud Services
Authors: Shin-Jer Yang, Kai-Tai Yang
Abstract:
In response to a changing world and the fast growth of the Internet, more and more enterprises are replacing web-based services with cloud-based ones. Multi-tenancy technology is becoming more important especially with Software as a Service (SaaS). This in turn leads to a greater focus on the application of Identity and Access Management (IAM). Conventional Near-Field Communication (NFC) based verification relies on a computer browser and a card reader to access an NFC tag. This type of verification does not support mobile device login and user-based access management functions. This study designs an NFC-based third-party cloud identity and access management scheme (NFC-IAM) addressing this shortcoming. Data from simulation tests analyzed with Key Performance Indicators (KPIs) suggest that the NFC-IAM not only takes less time in identity identification but also cuts time by 80% in terms of two-factor authentication and improves verification accuracy to 99.9% or better. In functional performance analyses, NFC-IAM performed better in salability and portability. The NFC-IAM App (Application Software) and back-end system to be developed and deployed in mobile device are to support IAM features and also offers users a more user-friendly experience and stronger security protection. In the future, our NFC-IAM can be employed to different environments including identification for mobile payment systems, permission management for remote equipment monitoring, among other applications.Keywords: cloud service, multi-tenancy, NFC, IAM, mobile device
Procedia PDF Downloads 4331104 Further Investigation of Core Degradation Using Quench Test Facility Results
Authors: Antoaneta Stefanova, Rositsa Gencheva, Pavlin Groudev
Abstract:
This paper presents an application of the ASTEC V2r3p3 computer code for simulation of QUENCH-12 experiment. The test has been performed to investigate the behavior of VVER type of fuel assemblies during severe accident conditions. In the performed analyses it has been assessed the mass of generated hydrogen during the experiment flooding of overheated core. The comparison of ASTECv2r3p3 calculated results with measured test data shows good agreement.Keywords: hydrogen production, VVER, QUENCH facility, severe accident, reactor core
Procedia PDF Downloads 2291103 Bandwidth Efficient Cluster Based Collision Avoidance Multicasting Protocol in VANETs
Authors: Navneet Kaur, Amarpreet Singh
Abstract:
In Vehicular Adhoc Networks, Data Dissemination is a challenging task. There are number of techniques, types and protocols available for disseminating the data but in order to preserve limited bandwidth and to disseminate maximum data over networks makes it more challenging. There are broadcasting, multicasting and geocasting based protocols. Multicasting based protocols are found to be best for conserving the bandwidth. One such protocol named BEAM exists that improves the performance of Vehicular Adhoc Networks by reducing the number of in-network message transactions and thereby efficiently utilizing the bandwidth during an emergency situation. But this protocol may result in multicar chain collision as there was no V2V communication. So, this paper proposes a new protocol named Enhanced Bandwidth Efficient Cluster Based Multicasting Protocol (EBECM) that will overcome the limitations of existing BEAM protocol. And Simulation results will show the improved performance of EBECM in terms of Routing overhead, throughput and PDR when compared with BEAM protocol.Keywords: BEAM, data dissemination, emergency situation, vehicular adhoc network
Procedia PDF Downloads 3471102 Relevance of Copyright and Trademark in the Gaming Industry
Authors: Deeksha Karunakar
Abstract:
The gaming industry is one of the biggest industries in the world. Video games are interactive works of authorship that require the execution of a computer programme on specialized hardware but which also incorporate a wide variety of other artistic mediums, such as music, scripts, stories, video, paintings, and characters, into which the player takes an active role. Therefore, video games are not made as singular, simple works but rather as a collection of elements that, if they reach a certain level of originality and creativity, can each be copyrighted on their own. A video game is made up of a wide variety of parts, all of which combine to form the overall sensation that we, the players, have while playing. The entirety of the components is implemented in the form of software code, which is then translated into the game's user interface. Even while copyright protection is already in place for the coding of software, the work that is produced because of that coding can also be protected by copyright. This includes the game's storyline or narrative, its characters, and even elements of the code on their own. In each sector, there is a potential legal framework required, and the gaming industry also requires legal frameworks. This represents the importance of intellectual property laws in each sector. This paper will explore the beginnings of video games, the various aspects of game copyrights, and the approach of the courts, including examples of a few different instances. Although the creative arts have always been known to draw inspiration from and build upon the works of others, it has not always been simple to evaluate whether a game has been cloned. The video game business is experiencing growth as it has never seen before today. The majority of today's video games are both pieces of software and works of audio-visual art. Even though the existing legal framework does not have a clause specifically addressing video games, it is clear that there is a great many alternative means by which this protection can be granted. This paper will represent the importance of copyright and trademark laws in the gaming industry and its regulations with the help of relevant case laws via utilizing doctrinal methodology to support its findings. The aim of the paper is to make aware of the applicability of intellectual property laws in the gaming industry and how the justice system is evolving to adapt to such new industries. Furthermore, it will provide in-depth knowledge of their relationship with each other.Keywords: copyright, DMCA, gaming industry, trademark, WIPO
Procedia PDF Downloads 641101 Droplet Entrainment and Deposition in Horizontal Stratified Two-Phase Flow
Authors: Joshua Kim Schimpf, Kyun Doo Kim, Jaseok Heo
Abstract:
In this study, the droplet behavior of under horizontal stratified flow regime for air and water flow in horizontal pipe experiments from a 0.24 m, 0.095 m, and 0.0486 m size diameter pipe are examined. The effects of gravity, pipe diameter, and turbulent diffusion on droplet deposition are considered. Models for droplet entrainment and deposition are proposed that considers developing length. Validation for experimental data dedicated from the REGARD, CEA and Williams, University of Illinois, experiment were performed using SPACE (Safety and Performance Analysis Code for Nuclear Power Plants).Keywords: droplet, entrainment, deposition, horizontal
Procedia PDF Downloads 3751100 Study the Dynamic Behavior of Irregular Buildings by the Analysis Method Accelerogram
Authors: Beciri Mohamed Walid
Abstract:
Some architectural conditions required some shapes often lead to an irregular distribution of masses, rigidities and resistances. The main object of the present study consists in estimating the influence of the irregularity both in plan and in elevation which presenting some structures on the dynamic characteristics and his influence on the behavior of this structures. To do this, it is necessary to make apply both dynamic methods proposed by the RPA99 (spectral modal method and method of analysis by accelerogram) on certain similar prototypes and to analyze the parameters measuring the answer of these structures and to proceed to a comparison of the results.Keywords: structure, irregular, code, seismic, method, force, period
Procedia PDF Downloads 3081099 Gossypol Extraction from Cotton Seed and Evaluation of Cotton Seed and Boll-cotton-pol Extract on Treatment of Cutaneous Leishmaniasis Resistant to Drugs
Authors: M. Mirmohammadi, S. Taghdisi, F. Anali
Abstract:
Gossypol is a yellow anti-nutritional compound found in the cotton plant. This substance exists in the cottonseed and other parts of the cotton plant, such as bark, leaves, and stems. Chemically, gossypol is a very active polyphenolic aldehyde compound, and due to this polyphenolic structure, it has antioxidant and therapeutic properties. On the other hand, this compound, especially in free form, has many toxic effects, that its excessive consumption can be very dangerous for humans and animals. In this study, gossypol was extracted as a derivative compound of gossypol acetic acid from cottonseed using the n-hexane solvent with an efficiency of 0.84 ± 0.04, which compared to the Gossypol extracted from cottonseed oil with the same method (cold press) showed a significant difference with its efficiency of 1.14 ± 0.06. Therefore, it can be suggested to use cottonseed oil to extract this valuable compound. In the other part of this research, cottonseed extracts and cotton bolls extracts were obtained by two methods of soaking and Soxhlet with hydroalcoholic solvent taken with a ratio of (25:75), then by using extracts and corn starch powder, four herbal medicine code was created and after receiving the code of ethics (IR.SSU.REC.1398.136) the therapeutic effect of each one on the Cutaneous leishmaniasis resistant to drugs (caused by the leishmaniasis parasite) was investigated in real patients and its results was compared with the common drug glucantime (local ampoule) (n = 36). Statistical studies showed that the use of herbal medicines prepared with cottonseed extract and cotton bolls extract has a significant positive effect on the treatment of the disease’s wounds (p-value > 0.05) compared to the control group (only ethanol). Also, by comparing the average diameter of the wounds after a two-month treatment period, no significant difference was found between the use of ointment containing extracts and local glucantime ampoules (p-value < 0.05). Bolls extract extracted with the Soxhlet method showed the best therapeutic effects, although there was no significant difference between them (p-value < 0.05). Therefore, there is acceptable reliability to recommend this medicine for the treatment of Cutaneous leishmaniasis resistant to drugs without the side effects of the chemical drug glucantime and the pain of injecting the ampoule.Keywords: cottonseed oil, gossypol, cotton boll, cutaneous leishmaniasis
Procedia PDF Downloads 941098 Density functional (DFT), Study of the Structural and Phase Transition of ThC and ThN: LDA vs GGA Computational
Authors: Hamza Rekab Djabri, Salah Daoud
Abstract:
The present paper deals with the computational of structural and electronic properties of ThC and ThN compounds using density functional theory within generalized-gradient (GGA) apraximation and local density approximation (LDA). We employ the full potential linear muffin-tin orbitals (FP-LMTO) as implemented in the Lmtart code. We have used to examine structure parameter in eight different structures such as in NaCl (B1), CsCl (B2), ZB (B3), NiAs (B8), PbO (B10), Wurtzite (B4) , HCP (A3) βSn (A5) structures . The equilibrium lattice parameter, bulk modulus, and its pressure derivative were presented for all calculated phases. The calculated ground state properties are in good agreement with available experimental and theoretical results.Keywords: DFT, GGA, LDA, properties structurales, ThC, ThN
Procedia PDF Downloads 971097 Experimental Investigation of Bituminous Roads with Waste Plastic
Authors: Arjita Biswas, Sandeep Potnis
Abstract:
Plastic roads (bituminous roads using waste plastic in the wearing course ) have now become familiar in the Road Construction Sector in India. With the Indian Road Congress Code (IRC SP: 98 -2013), many agencies are coming forward to implement Plastic Roads in India. This paper discuss and compare about the various properties of bituminous mix with 8% waste plastic and normal bituminous mix. This paper also signifies the performance of both the types of roads after 4 months of age under loading conditions. Experiments were carried out to evaluate its performance. The result shows improved performance of plastic roads.Keywords: bituminous roads, experiments, performance, plastic roads
Procedia PDF Downloads 2151096 Iris Feature Extraction and Recognition Based on Two-Dimensional Gabor Wavelength Transform
Authors: Bamidele Samson Alobalorun, Ifedotun Roseline Idowu
Abstract:
Biometrics technologies apply the human body parts for their unique and reliable identification based on physiological traits. The iris recognition system is a biometric–based method for identification. The human iris has some discriminating characteristics which provide efficiency to the method. In order to achieve this efficiency, there is a need for feature extraction of the distinct features from the human iris in order to generate accurate authentication of persons. In this study, an approach for an iris recognition system using 2D Gabor for feature extraction is applied to iris templates. The 2D Gabor filter formulated the patterns that were used for training and equally sent to the hamming distance matching technique for recognition. A comparison of results is presented using two iris image subjects of different matching indices of 1,2,3,4,5 filter based on the CASIA iris image database. By comparing the two subject results, the actual computational time of the developed models, which is measured in terms of training and average testing time in processing the hamming distance classifier, is found with best recognition accuracy of 96.11% after capturing the iris localization or segmentation using the Daughman’s Integro-differential, the normalization is confined to the Daugman’s rubber sheet model.Keywords: Daugman rubber sheet, feature extraction, Hamming distance, iris recognition system, 2D Gabor wavelet transform
Procedia PDF Downloads 631095 Implementation of Successive Interference Cancellation Algorithms in the 5g Downlink
Authors: Mokrani Mohamed Amine
Abstract:
In this paper, we have implemented successive interference cancellation algorithms in the 5G downlink. We have calculated the maximum throughput in Frequency Division Duplex (FDD) mode in the downlink, where we have obtained a value equal to 836932 b/ms. The transmitter is of type Multiple Input Multiple Output (MIMO) with eight transmitting and receiving antennas. Each antenna among eight transmits simultaneously a data rate of 104616 b/ms that contains the binary messages of the three users; in this case, the Cyclic Redundancy Check CRC is negligible, and the MIMO category is the spatial diversity. The technology used for this is called Non-Orthogonal Multiple Access (NOMA) with a Quadrature Phase Shift Keying (QPSK) modulation. The transmission is done in a Rayleigh fading channel with the presence of obstacles. The MIMO Successive Interference Cancellation (SIC) receiver with two transmitting and receiving antennas recovers its binary message without errors for certain values of transmission power such as 50 dBm, with 0.054485% errors when the transmitted power is 20dBm and with 0.00286763% errors for a transmitted power of 32 dBm(in the case of user 1) as well as with 0.0114705% errors when the transmitted power is 20 dBm also with 0.00286763% errors for a power of 24 dBm(in the case of user2) by applying the steps involved in SIC.Keywords: 5G, NOMA, QPSK, TBS, LDPC, SIC, capacity
Procedia PDF Downloads 1021094 Intelligent Wireless Patient Monitoring and Tracking System
Authors: Ch. Sandeep Kumar Subudhi, S. Sivanandam
Abstract:
Our system is to monitor the human body temperature, blood pressure (BP), Pulse Rate and ECG and tracking the patient location. In our system the body temperature is detected by using LM35 temperature sensor, blood pressure is detected by the BP sensor, pulse rate is detected by the ear plug pulse sensor and the ECG is detected by the three lead ECG sensor in the working environment of the patient. The sensed information is sent to the PIC16F877 microcontroller through signal conditioning circuit. A desired amount of sensor value is set and if it is exceeded preliminary steps should be taken by indication by buzzer. The sensor information will be transmitted from the patient unit to the main controller unit with the help of Zigbee communication medium which is connected with the microcontrollers in the both units. The main controller unit will send those sensor data as well as the location of that patient by the help of GPS module to the observer/doctor. The observer/doctor can receive the SMS sent by GSM module and further decision can be taken. The message is sent to a cell phone using global system mobile (GSM) Modem. MAX232 acts as a driver between microcontroller and modem.Keywords: LM35, heart beat sensor, ECG Sensor, BP Sensor, Zigbee module, GSM module, GPS module, PIC16F877A microcontroller
Procedia PDF Downloads 3801093 Nurse-Led Codes: Practical Application in the Emergency Department during a Global Pandemic
Authors: F. DelGaudio, H. Gill
Abstract:
Resuscitation during cardiopulmonary (CPA) arrest is dynamic, high stress, high acuity situation, which can easily lead to communication breakdown, and errors. The care of these high acuity patients has also been shown to increase physiologic stress and task saturation of providers, which can negatively impact the care being provided. These difficulties are further complicated during a global pandemic and pose a significant safety risk to bedside providers. Nurse-led codes are a relatively new concept that may be a potential solution for alleviating some of these difficulties. An experienced nurse who has completed advanced cardiac life support (ACLS), and additional training, assumed the responsibility of directing the mechanics of the appropriate ACLS algorithm. This was done in conjunction with a physician who also acted as a physician leader. The additional nurse-led code training included a multi-disciplinary in situ simulation of a CPA on a suspected COVID-19 patient. During the CPA, the nurse leader’s responsibilities include: ensuring adequate compression depth and rate, minimizing interruptions in chest compressions, the timing of rhythm/pulse checks, and appropriate medication administration. In addition, the nurse leader also functions as a last line safety check for appropriate personal protective equipment and limiting exposure of staff. The use of nurse-led codes for CPA has shown to decrease the cognitive overload and task saturation for the physician, as well as limiting the number of staff being exposed to a potentially infectious patient. The real-world application has allowed physicians to perform and oversee high-risk procedures such as intubation, line placement, and point of care ultrasound, without sacrificing the integrity of the resuscitation. Nurse-led codes have also given the physician the bandwidth to review pertinent medical history, advanced directives, determine reversible causes, and have the end of life conversations with family. While there is a paucity of research on the effectiveness of nurse-led codes, there are many potentially significant benefits. In addition to its value during a pandemic, it may also be beneficial during complex circumstances such as extracorporeal cardiopulmonary resuscitation.Keywords: cardiopulmonary arrest, COVID-19, nurse-led code, task saturation
Procedia PDF Downloads 1541092 Scalable CI/CD and Scalable Automation: Assisting in Optimizing Productivity and Fostering Delivery Expansion
Authors: Solanki Ravirajsinh, Kudo Kuniaki, Sharma Ankit, Devi Sherine, Kuboshima Misaki, Tachi Shuntaro
Abstract:
In software development life cycles, the absence of scalable CI/CD significantly impacts organizations, leading to increased overall maintenance costs, prolonged release delivery times, heightened manual efforts, and difficulties in meeting tight deadlines. Implementing CI/CD with standard serverless technologies using cloud services overcomes all the above-mentioned issues and helps organizations improve efficiency and faster delivery without the need to manage server maintenance and capacity. By integrating scalable CI/CD with scalable automation testing, productivity, quality, and agility are enhanced while reducing the need for repetitive work and manual efforts. Implementing scalable CI/CD for development using cloud services like ECS (Container Management Service), AWS Fargate, ECR (to store Docker images with all dependencies), Serverless Computing (serverless virtual machines), Cloud Log (for monitoring errors and logs), Security Groups (for inside/outside access to the application), Docker Containerization (Docker-based images and container techniques), Jenkins (CI/CD build management tool), and code management tools (GitHub, Bitbucket, AWS CodeCommit) can efficiently handle the demands of diverse development environments and are capable of accommodating dynamic workloads, increasing efficiency for faster delivery with good quality. CI/CD pipelines encourage collaboration among development, operations, and quality assurance teams by providing a centralized platform for automated testing, deployment, and monitoring. Scalable CI/CD streamlines the development process by automatically fetching the latest code from the repository every time the process starts, building the application based on the branches, testing the application using a scalable automation testing framework, and deploying the builds. Developers can focus more on writing code and less on managing infrastructure as it scales based on the need. Serverless CI/CD eliminates the need to manage and maintain traditional CI/CD infrastructure, such as servers and build agents, reducing operational overhead and allowing teams to allocate resources more efficiently. Scalable CI/CD adjusts the application's scale according to usage, thereby alleviating concerns about scalability, maintenance costs, and resource needs. Creating scalable automation testing using cloud services (ECR, ECS Fargate, Docker, EFS, Serverless Computing) helps organizations run more than 500 test cases in parallel, aiding in the detection of race conditions, performance issues, and reducing execution time. Scalable CI/CD offers flexibility, dynamically adjusting to varying workloads and demands, allowing teams to scale resources up or down as needed. It optimizes costs by only paying for the resources as they are used and increases reliability. Scalable CI/CD pipelines employ automated testing and validation processes to detect and prevent errors early in the development cycle.Keywords: achieve parallel execution, cloud services, scalable automation testing, scalable continuous integration and deployment
Procedia PDF Downloads 421091 The Language of Hip-Hop and Rap in Tunisia: Symbol of Cultural Change in Post-Arab Spring Tunisia
Authors: Zouhir Gabsi
Abstract:
The Arab Spring has had noticeable effects on Tunisia in socio-economic, political, and cultural terms. Few have predicted that the music of hip-hop and rap could engage with the socio-political situation in Tunisia, especially after the downfall of Ben Ali’s regime. Having survived as underground music since the year 2000, the genre of hip-hop and rap remains an aberration from the folkloric tradition. By adhering to the socio-economic reality of the Tunisian street, rappers attempt to claim authenticity mainly in both thematic and language uses, and by usurping the power of ‘space’ from the regime’s control. With the songs’ fast-paced rhythms, catchy phrases, puns, vulgarisms, and linguistic innovations using metaphors, hip-hop, and rap have struck a chord with Tunisia’s youth. Tunisia’s new social reality has allowed Tunisian rappers to express dissent and voice people’s despair over the socio-economic and political situation. This paper argues that rap artists use language as a vehicle to claim the authenticity of their message. It also explores how the performative nature of the language of hip-hop and rap interacts with the Tunisian culture and argues the power of music in the context of political and socio-economic grievances in post-Arab Spring Tunisia.Keywords: Arab Spring, hip-hop, eevolution, Tunisia, Tunisian Arabic
Procedia PDF Downloads 1501090 Virtual Reality Design Platform to Easily Create Virtual Reality Experiences
Authors: J. Casteleiro- Pitrez
Abstract:
The interest in Virtual Reality (VR) keeps increasing among the community of designers. To develop this type of immersive experience, the understanding of new processes and methodologies is as fundamental as its complex implementation which usually implies hiring a specialized team. In this paper, we introduce a case study, a platform that allows designers to easily create complex VR experiences, present its features, and its development process. We conclude that this platform provides a complete solution for the design and development of VR experiences, no-code needed.Keywords: creatives, designers, virtual reality, virtual reality design platform, virtual reality system, no-coding
Procedia PDF Downloads 1541089 A Method of the Semantic on Image Auto-Annotation
Authors: Lin Huo, Xianwei Liu, Jingxiong Zhou
Abstract:
Recently, due to the existence of semantic gap between image visual features and human concepts, the semantic of image auto-annotation has become an important topic. Firstly, by extract low-level visual features of the image, and the corresponding Hash method, mapping the feature into the corresponding Hash coding, eventually, transformed that into a group of binary string and store it, image auto-annotation by search is a popular method, we can use it to design and implement a method of image semantic auto-annotation. Finally, Through the test based on the Corel image set, and the results show that, this method is effective.Keywords: image auto-annotation, color correlograms, Hash code, image retrieval
Procedia PDF Downloads 4951088 Urban Vitality: Methods for Measuring Vitality in Egypt's Commercial Streets
Authors: Alaa Eldien Sarhaan, Rania A. Galil, Yasmina Youssef
Abstract:
Vital streets transfer a totally different message from the lifeless streets; vitality is considered as the mobility dynamism for the city’s streets. The quality of a street is integral to the vitality. However, most efforts have focused on the requirements of cars resulting in the loss many qualities. A successful street is related to the needs and expectations of pedestrians. The amount of activity held in a place is one of the measures of vitality; hence the meaning of a vital street may be the result of a number of people engaged in various activities meeting their needs and expectations. Consequently, it varies from one city to another. This research focuses on vitality in commercial streets. It studies commercial streets in the Egyptian context, which have developed into a chaotic environment due to inefficiency and high-density activities. The first part identifies the meaning of vitality in the frame of its physical, social and economic dimensions, then determines the methods used in measuring vitality across commercial streets. Secondly, an application on one of the most important commercial streets in Alexandria ‘El-Attareen’ street is chosen as a case study to measure its vitality. The study contributes to a greater understanding of how theories on vital urban life contribute to the development of vital commercial streets in the Egyptian and similar contexts.Keywords: footfall measurement, vitality, urban commercial streets, yield factor
Procedia PDF Downloads 2601087 Case Study Analysis for Driver's Company in the Transport Sector with the Help of Data Mining
Authors: Diana Katherine Gonzalez Galindo, David Rolando Suarez Mora
Abstract:
With this study, we used data mining as a new alternative of the solution to evaluate the comments of the customers in order to find a pattern that helps us to determine some behaviors to reduce the deactivation of the partners of the LEVEL app. In one of the greatest business created in the last times, the partners are being affected due to an internal process that compensates the customer for a bad experience, but these comments could be false towards the driver, that’s why we made an investigation to collect information to restructure this process, many partners have been disassociated due to this internal process and many of them refuse the comments given by the customer. The main methodology used in this case study is the observation, we recollect information in real time what gave us the opportunity to see the most common issues to get the most accurate solution. With this new process helped by data mining, we could get a prediction based on the behaviors of the customer and some basic data recollected such as the age, the gender, and others; this could help us in future to improve another process. This investigation gives more opportunities to the partner to keep his account active even if the customer writes a message through the app. The term is trying to avoid a recession of drivers in the future offering improving in the processes, at the same time we are in search of stablishing a strategy which benefits both the app’s managers and the associated driver.Keywords: agent, driver, deactivation, rider
Procedia PDF Downloads 2781086 The Use of Facebook as a Social Media by Political Parties in the June 7 Election in Konya
Authors: Yasemin Gülşen Yılmaz, Süleyman Hakan Yılmaz, Muhammet Erbay
Abstract:
Social media is among the most important means of communication. Social media offers individuals and groups with an opportunity for participatory socialization over the internet, which is free of any time and place restrictions. Social media is a kind of interactive communication and bilateral social network. Various communication contents can be shared and put into mass circulation easily and quickly through social media. These sharings are not only limited to individuals but also happen to groups, institutions, and different constitutions. Their contents consist of any type of written message, audio and video files. We are living in the social media era now. It is not surprising that social media which has extensive communication facilities and massive prevalence is used in politics. Therefore, the use of social media (Facebook) by political parties during the Turkish general elections held on June 7, 2015, has been chosen as our research subject. Four parties namely, AKP, CHP, MHP and HDP who have the majority of votes in Turkey and participate in elections in Konya have been selected for our study. Their provincial centers’ and parliamentary candidates` use of social media (Facebook) on the last three days prior to the election have been examined and subjected to a qualitative analysis by means of content analysis.Keywords: social media, June 7 general elections, politics, Facebook
Procedia PDF Downloads 4021085 Effects of Wind Load on the Tank Structures with Various Shapes and Aspect Ratios
Authors: Doo Byong Bae, Jae Jun Yoo, Il Gyu Park, Choi Seowon, Oh Chang Kook
Abstract:
There are several wind load provisions to evaluate the wind response on tank structures such as API, Euro-code, etc. the assessment of wind action applying these provisions is made by performing the finite element analysis using both linear bifurcation analysis and geometrically nonlinear analysis. By comparing the pressure patterns obtained from the analysis with the results of wind tunnel test, most appropriate wind load criteria will be recommended.Keywords: wind load, finite element analysis, linear bifurcation analysis, geometrically nonlinear analysis
Procedia PDF Downloads 636