Search results for: PN code
579 Analysis of the Interventions Performed in Pediatric Cardiology Unit Based on Nursing Interventions Classification (NIC-6th): A Pilot Study
Authors: Ji Wen Sun, Nan Ping Shen, Yi Bei Wu
Abstract:
This study used Nursing Interventions Classification (NIC-6th) to identify the interventions performed in a pediatric cardiology unit, and then to analysis its frequency, time and difficulty, so as to give a brief review on what our nurses have done. The research team selected a 35 beds pediatric cardiology unit, and drawn all the nursing interventions in the nursing record from our hospital information system (HIS) from 1 October 2015 to 30 November 2015, using NIC-6th to do the matching and then counting their frequencies. Then giving each intervention its own time and difficulty code according to NIC-6th. The results showed that nurses in pediatric cardiology unit performed totally 43 interventions from 5394 statements, and most of them were in RN(basic) education level needed and less than 15 minutes time needed. There still had some interventions just needed by a nursing assistant but done by nurses, which should call for nurse managers to think about the suitable staffing. Thus, counting the summary of the product of frequency, time and difficulty for each intervention of each nurse can know one's performance. Acknowledgement Clinical Management Optimization Project of Shanghai Shen Kang Hospital Development Center (SHDC2014615); Hundred-Talent Program of Construction of Nursing Plateau Discipline (hlgy16073qnhb).Keywords: nursing interventions, nursing interventions classification, nursing record, pediatric cardiology
Procedia PDF Downloads 364578 Shear Strengthening of RC T-Beams by Means of CFRP Sheets
Authors: Omar A. Farghal
Abstract:
This research aimed to experimentally and analytically investigate the contribution of bonded web carbon fiber reinforced polymer (CFRP) sheets to the shear strength of reinforced concrete (RC) T-beams. Two strengthening techniques using CFRP strips were applied along the shear-span zone: the first one is vertical U-jacket and the later is vertical strips bonded to the beam sides only. Fibers of both U-jacket and side sheets were vertically oriented (θ = 90°). Test results showed that the strengthening technique with U-jacket CFRP sheets improved the shear strength particularly. Three mechanisms of failure were recognized for the tested beams depending upon the end condition of the bonded CFRP sheet. Although the failure mode for the different beams was a brittle one, the strengthened beams provided with U-jacket CFRP sheets showed more or less a ductile behavior at a higher loading level up to a load level just before failure. As a consequence, these beams approved an acceptable enhancement in the structural ductility. Moreover, the obtained results concerning both the strains induced in the CFRP sheets and the maximum loads are used to study the applicability of the analytical models proposed in this study (ACI code) to predict: the nominal shear strength of the strengthened beams.Keywords: carbon fiber reinforced polymer, wrapping, ductility, shear strengthening
Procedia PDF Downloads 255577 Segmentation of Arabic Handwritten Numeral Strings Based on Watershed Approach
Authors: Nidal F. Shilbayeh, Remah W. Al-Khatib, Sameer A. Nooh
Abstract:
Arabic offline handwriting recognition systems are considered as one of the most challenging topics. Arabic Handwritten Numeral Strings are used to automate systems that deal with numbers such as postal code, banking account numbers and numbers on car plates. Segmentation of connected numerals is the main bottleneck in the handwritten numeral recognition system. This is in turn can increase the speed and efficiency of the recognition system. In this paper, we proposed algorithms for automatic segmentation and feature extraction of Arabic handwritten numeral strings based on Watershed approach. The algorithms have been designed and implemented to achieve the main goal of segmenting and extracting the string of numeral digits written by hand especially in a courtesy amount of bank checks. The segmentation algorithm partitions the string into multiple regions that can be associated with the properties of one or more criteria. The numeral extraction algorithm extracts the numeral string digits into separated individual digit. Both algorithms for segmentation and feature extraction have been tested successfully and efficiently for all types of numerals.Keywords: handwritten numerals, segmentation, courtesy amount, feature extraction, numeral recognition
Procedia PDF Downloads 381576 Media Coverage of the Turkish Armenian Journalist Hrant Dink Assassination: The Analysis of Media News in the Aftermath of the Assassination
Authors: Nusret Mesut Sahin
Abstract:
Hrant Dink, a prominent Turkish-Armenian journalist, and editor-in-chief of the bilingual Turkish-Armenian newspaper Agos, was assassinated in Istanbul on January 19th, 2007 by a nationalist extremist, Ogun Samast. Dink had been voicing the atrocities against the Armenians between 1915 and 1922 during the Ottoman rule, and his comments on the issue appeared in the Turkish media many times before his assassination. Despite intensive media coverage of his assassination, there is not enough research analyzing how national and international media presented Dink’s assassination. In this research, a content analysis of national and international news articles (N= 139) is conducted to identify whether there is a significant difference in national and international media’s coverage of the assassination. The content of the newspaper articles is categorized and coded according to the topics covered. The findings of this research suggested that Dink’s assassination wounded Turkey’s image as a democratic country. It has also been found that the Turkish media focused on security forces and their responsibility in Dink’s assassination, whereas international media focused more on the Article 301 of the Turkish penal code, freedom of expression, and atrocities against the Armenians during the Ottoman rule.Keywords: Hrant Dink, Armenian, journalist, assassination
Procedia PDF Downloads 152575 A Real-World Roadmap and Exploration of Quantum Computers Capacity to Trivialise Internet Security
Authors: James Andrew Fitzjohn
Abstract:
This paper intends to discuss and explore the practical aspects of cracking encrypted messages with quantum computers. The theory of this process has been shown and well described both in academic papers and headline-grabbing news articles, but with all theory and hyperbole, we must be careful to assess the practicalities of these claims. Therefore, we will use real-world devices and proof of concept code to prove or disprove the notion that quantum computers will render the encryption technologies used by many websites unfit for purpose. It is time to discuss and implement the practical aspects of the process as many advances in quantum computing hardware/software have recently been made. This paper will set expectations regarding the useful lifespan of RSA and cipher lengths and propose alternative encryption technologies. We will set out comprehensive roadmaps describing when and how encryption schemes can be used, including when they can no longer be trusted. The cost will also be factored into our investigation; for example, it would make little financial sense to spend millions of dollars on a quantum computer to factor a private key in seconds when a commodity GPU could perform the same task in hours. It is hoped that the real-world results depicted in this paper will help influence the owners of websites who can take appropriate actions to improve the security of their provisions.Keywords: quantum computing, encryption, RSA, roadmap, real world
Procedia PDF Downloads 131574 Analysis of Cyber Activities of Potential Business Customers Using Neo4j Graph Databases
Authors: Suglo Tohari Luri
Abstract:
Data analysis is an important aspect of business performance. With the application of artificial intelligence within databases, selecting a suitable database engine for an application design is also very crucial for business data analysis. The application of business intelligence (BI) software into some relational databases such as Neo4j has proved highly effective in terms of customer data analysis. Yet what remains of great concern is the fact that not all business organizations have the neo4j business intelligence software applications to implement for customer data analysis. Further, those with the BI software lack personnel with the requisite expertise to use it effectively with the neo4j database. The purpose of this research is to demonstrate how the Neo4j program code alone can be applied for the analysis of e-commerce website customer visits. As the neo4j database engine is optimized for handling and managing data relationships with the capability of building high performance and scalable systems to handle connected data nodes, it will ensure that business owners who advertise their products at websites using neo4j as a database are able to determine the number of visitors so as to know which products are visited at routine intervals for the necessary decision making. It will also help in knowing the best customer segments in relation to specific goods so as to place more emphasis on their advertisement on the said websites.Keywords: data, engine, intelligence, customer, neo4j, database
Procedia PDF Downloads 193573 Chromite Exploration Using Electrical Resistivity Tomography in Ingessana Hill, Blue Nile State, Sudan
Authors: Mohamed A. Mohamed-Ali, Jannis Simos, Khalid M. Kheiralla
Abstract:
The Ingessana hills in the southern Blue Nile of Sudan are part of the southern sector of the NE-SW trending ophiolithic belt of the Arab-Nubian Shield with mid-neoproterozoic age. The rocks are mainly serpentinized and in parts highly silicified dunites especially towards the contact with the intruding Bau granite. A promising chromite mineralization zones in the area tend to be generally associated with NE-SW trending shear-zones. A detailed geophysical survey employing electrical resistivity tomography (ERT) at 34 lines were carried out over a zone of a known chromite mineralization to test feasibility of detecting and delineating the ore (if exist) and accordingly facilitate the positioning of exploratory drill holes. ERT sections were inverted with smooth constraints inversion code where the contacts between the granite and the ultramafics are showing up clearly. The continuity of mineralization along the contact is not well confirmed. However, the low-resistivity anomalies are probably recognized as potential chromite mineralization zones. These anomalies represent prime targets for further exploration by drilling, trenching or shallow pits. If the results of the drilling or excavations are positive, small open pit exploitations may produce important tonnages of chromite.Keywords: chromite exploration, ERT, Ingessana Hills, inversion
Procedia PDF Downloads 388572 The Model Establishment and Analysis of TRACE/FRAPTRAN for Chinshan Nuclear Power Plant Spent Fuel Pool
Authors: J. R. Wang, H. T. Lin, Y. S. Tseng, W. Y. Li, H. C. Chen, S. W. Chen, C. Shih
Abstract:
TRACE is developed by U.S. NRC for the nuclear power plants (NPPs) safety analysis. We focus on the establishment and application of TRACE/FRAPTRAN/SNAP models for Chinshan NPP (BWR/4) spent fuel pool in this research. The geometry is 12.17 m × 7.87 m × 11.61 m for the spent fuel pool. In this study, there are three TRACE/SNAP models: one-channel, two-channel, and multi-channel TRACE/SNAP model. Additionally, the cooling system failure of the spent fuel pool was simulated and analyzed by using the above models. According to the analysis results, the peak cladding temperature response was more accurate in the multi-channel TRACE/SNAP model. The results depicted that the uncovered of the fuels occurred at 2.7 day after the cooling system failed. In order to estimate the detailed fuel rods performance, FRAPTRAN code was used in this research. According to the results of FRAPTRAN, the highest cladding temperature located on the node 21 of the fuel rod (the highest node at node 23) and the cladding burst roughly after 3.7 day.Keywords: TRACE, FRAPTRAN, BWR, spent fuel pool
Procedia PDF Downloads 356571 A Study for the Effect of Fire Initiated Location on Evacuation Success Rate
Authors: Jin A Ryu, Hee Sun Kim
Abstract:
As the number of fire accidents is gradually raising, many studies have been reported on evacuation. Previous studies have mostly focused on evaluating the safety of evacuation and the risk of fire in particular buildings. However, studies on effects of various parameters on evacuation have not been nearly done. Therefore, this paper aims at observing evacuation time under the effect of fire initiated location. In this study, evacuation simulations are performed on a 5-floor building located in Seoul, South Korea using the commercial program, Fire Dynamics Simulator with Evacuation (FDS+EVAC). Only the fourth and fifth floors are modeled with an assumption that fire starts in a room located on the fourth floor. The parameter for evacuation simulations is location of fire initiation to observe the evacuation time and safety. Results show that the location of fire initiation is closer to exit, the more time is taken to evacuate. The case having the nearest location of fire initiation to exit has the lowest ratio of successful occupants to the total occupants. In addition, for safety evaluation, the evacuation time calculated from computer simulation model is compared with the tolerable evacuation time according to code in Japan. As a result, all cases are completed within the tolerable evacuation time. This study allows predicting evacuation time under various conditions of fire and can be used to evaluate evacuation appropriateness and fire safety of building.Keywords: fire simulation, evacuation simulation, temperature, evacuation safety
Procedia PDF Downloads 349570 A Study of Adaptive Fault Detection Method for GNSS Applications
Authors: Je Young Lee, Hee Sung Kim, Kwang Ho Choi, Joonhoo Lim, Sebum Chun, Hyung Keun Lee
Abstract:
A purpose of this study is to develop efficient detection method for Global Navigation Satellite Systems (GNSS) applications based on adaptive estimation. Due to dependence of radio frequency signals, GNSS measurements are dominated by systematic errors in receiver’s operating environment. Thus, to utilize GNSS for aerospace or ground vehicles requiring high level of safety, unhealthy measurements should be considered seriously. For the reason, this paper proposes adaptive fault detection method to deal with unhealthy measurements in various harsh environments. By the proposed method, the test statistics for fault detection is generated by estimated measurement noise. Pseudorange and carrier-phase measurement noise are obtained at time propagations and measurement updates in process of Carrier-Smoothed Code (CSC) filtering, respectively. Performance of the proposed method was evaluated by field-collected GNSS measurements. To evaluate the fault detection capability, intentional faults were added to measurements. The experimental result shows that the proposed detection method is efficient in detecting unhealthy measurements and improves the accuracy of GNSS positioning under fault occurrence.Keywords: adaptive estimation, fault detection, GNSS, residual
Procedia PDF Downloads 574569 Privacy Preserving in Association Rule Mining on Horizontally Partitioned Database
Authors: Manvar Sagar, Nikul Virpariya
Abstract:
The advancement in data mining techniques plays an important role in many applications. In context of privacy and security issues, the problems caused by association rule mining technique are investigated by many research scholars. It is proved that the misuse of this technique may reveal the database owner’s sensitive and private information to others. Many researchers have put their effort to preserve privacy in Association Rule Mining. Amongst the two basic approaches for privacy preserving data mining, viz. Randomization based and Cryptography based, the later provides high level of privacy but incurs higher computational as well as communication overhead. Hence, it is necessary to explore alternative techniques that improve the over-heads. In this work, we propose an efficient, collusion-resistant cryptography based approach for distributed Association Rule mining using Shamir’s secret sharing scheme. As we show from theoretical and practical analysis, our approach is provably secure and require only one time a trusted third party. We use secret sharing for privately sharing the information and code based identification scheme to add support against malicious adversaries.Keywords: Privacy, Privacy Preservation in Data Mining (PPDM), horizontally partitioned database, EMHS, MFI, shamir secret sharing
Procedia PDF Downloads 408568 Machine Learning Approach for Mutation Testing
Authors: Michael Stewart
Abstract:
Mutation testing is a type of software testing proposed in the 1970s where program statements are deliberately changed to introduce simple errors so that test cases can be validated to determine if they can detect the errors. Test cases are executed against the mutant code to determine if one fails, detects the error and ensures the program is correct. One major issue with this type of testing was it became intensive computationally to generate and test all possible mutations for complex programs. This paper used reinforcement learning and parallel processing within the context of mutation testing for the selection of mutation operators and test cases that reduced the computational cost of testing and improved test suite effectiveness. Experiments were conducted using sample programs to determine how well the reinforcement learning-based algorithm performed with one live mutation, multiple live mutations and no live mutations. The experiments, measured by mutation score, were used to update the algorithm and improved accuracy for predictions. The performance was then evaluated on multiple processor computers. With reinforcement learning, the mutation operators utilized were reduced by 50 – 100%.Keywords: automated-testing, machine learning, mutation testing, parallel processing, reinforcement learning, software engineering, software testing
Procedia PDF Downloads 198567 Geotechnical Investigation of Soil Foundation for Ramps of Dawar El-Tawheed Bridge in Jizan City, Kingdom of Saudi Arabia
Authors: Ali H. Mahfouz, Hossam E. M. Sallam, Abdulwali Wazir, Hamod H. Kharezi
Abstract:
The soil profile at site of the bridge project includes soft fine grained soil layer located between 5.0 m to 11.0 m in depth, it has high water content, low SPT no., and low bearing capacity. The clay layer induces high settlement due to surcharge application of earth embankment at ramp T1, ramp T2, and ramp T3 especially at heights from 9m right 3m. Calculated settlement for embankment heights less than 3m may be accepted regarding Saudi Code for soil and foundation. The soil and groundwater at the project site comprise high contents of sulfates and chlorides of high aggressively on concrete and steel bars, respectively. Regarding results of the study, it has been recommended to use stone column piles or new technology named PCC piles as soil improvement to improve the bearing capacity of the weak layer. The new technology is cast in-situ thin wall concrete pipe piles (PCC piles), it has economically advantageous and high workability. The technology can save time of implementation and cost of application is almost 30% of other types of piles.Keywords: soft foundation soil, bearing capacity, bridge ramps, soil improvement, geogrid, PCC piles
Procedia PDF Downloads 399566 CSRFDtool: Automated Detection and Prevention of a Reflected Cross-Site Request Forgery
Authors: Alaa A. Almarzuki, Nora A. Farraj, Aisha M. Alshiky, Omar A. Batarfi
Abstract:
The number of internet users is dramatically increased every year. Most of these users are exposed to the dangers of attackers in one way or another. The reason for this lies in the presence of many weaknesses that are not known for native users. In addition, the lack of user awareness is considered as the main reason for falling into the attackers’ snares. Cross Site Request Forgery (CSRF) has placed in the list of the most dangerous threats to security in OWASP Top Ten for 2013. CSRF is an attack that forces the user’s browser to send or perform unwanted request or action without user awareness by exploiting a valid session between the browser and the server. When CSRF attack successes, it leads to many bad consequences. An attacker may reach private and personal information and modify it. This paper aims to detect and prevent a specific type of CSRF, called reflected CSRF. In a reflected CSRF, a malicious code could be injected by the attackers. This paper explores how CSRF Detection Extension prevents the reflected CSRF by checking browser specific information. Our evaluation shows that the proposed solution succeeds in preventing this type of attack.Keywords: CSRF, CSRF detection extension, attackers, attacks
Procedia PDF Downloads 414565 Fake News During COVID-19 Pandemic: An Overview from A Legal Perspective
Authors: Ida Shafinaz Mohamed Kamil, Mohd Dahlan Abdul Malek
Abstract:
Today, the whole world is facing a catastrophe called the novel coronavirus disease known as COVID-19. As of October 2021, it has been reported that more than 248 million cases and 5 million deaths have been recorded worldwide. In Malaysia, 2,466,663 cases were reported, with 28,876 deaths recorded on 30 October 2021. Unfortunately, the world is not only facing the COVID-19 pandemic but the COVID-19 infodemic as well, where fake news about COVID-19 disease is spreading faster and more widely than from the virus itself. The spread of fake news is amplified through various social media platforms, which is causing concern among the community. The uncertainty in understanding what fake news really is has caused difficulties and challenges in providing a solution to the hazards that it creates. This article discusses what constitutes fake news and examines the current legal framework put in place to combat fake news in Malaysia. Employing a doctrinal research methodology, this article thoroughly analyzes the relevant legal provisions under the Communications and Multimedia Act 1998, the Penal Code and the Emergency (Essential Powers) Ordinance (No.2) 2021, which came into force on 12 March 2021 as well as related case laws, for offenses and punishments with regards to fake news. The findings from the analysis indicate that there is still room for improvement in regulating fake news, in particular concerning COVID-19.Keywords: fake news, legal pespective, covid 19, pendemic
Procedia PDF Downloads 85564 Numerical Study of Steel Structures Responses to External Explosions
Authors: Mohammad Abdallah
Abstract:
Due to the constant increase in terrorist attacks, the research and engineering communities have given significant attention to building performance under explosions. This paper presents a methodology for studying and simulating the dynamic responses of steel structures during external detonations, particularly for accurately investigating the impact of incrementing charge weight on the members total behavior, resistance and failure. Prediction damage method was introduced to evaluate the damage level of the steel members based on five scenarios of explosions. Johnson–Cook strength and failure model have been used as well as ABAQUS finite element code to simulate the explicit dynamic analysis, and antecedent field tests were used to verify the acceptance and accuracy of the proposed material strength and failure model. Based on the structural response, evaluation criteria such as deflection, vertical displacement, drift index, and damage level; the obtained results show the vulnerability of steel columns and un-braced steel frames which are designed and optimized to carry dead and live load to resist and endure blast loading.Keywords: steel structure, blast load, terrorist attacks, charge weight, damage level
Procedia PDF Downloads 364563 Assessment of Causes of Building Collapse in Nigeria
Authors: Olufemi Oyedele
Abstract:
Building collapse (BC) in Nigeria is becoming a regular occurrence, each recording great casualties in the number of lives and materials lost. Building collapse is a situation where building which has been completed and occupied, completed but not occupied or under construction, collapses on its own due to action or inaction of man or due to natural event like earthquake, storm, flooding, tsunami or wildfire. It is different from building demolition. There are various causes of building collapse and each case requires expert judgment to decide the cause of its collapse. Rate of building collapse is a reflection of the level of organization and control of building activities and degree of sophistication of the construction professionals in a country. This study explored the use of case study by examining the causes of six (6) collapsed buildings (CB) across Nigeria. Samples of materials from the sites of the collapsed buildings were taken for testing and analysis, while critical observations were made at the sites to note the conditions of the ground (building base). The study found out that majority of the building collapses in Nigeria were due to poor workmanship, sub-standard building materials, followed by bad building base and poor design. The National Building Code 2006 is not effective due to lack of enforcement and the Physical Development Departments of states and Federal Capital Territory are just mere agents of corruption allowing all types of construction without building approvals.Keywords: building collapse, concrete tests, differential settlement, integrity test, quality control
Procedia PDF Downloads 535562 One-Dimensional Performance Improvement of a Single-Stage Transonic Compressor
Authors: A. Shahsavari, M. Nili-Ahmadabadi
Abstract:
This paper presents an innovative one-dimensional optimization of a transonic compressor based on the radial equilibrium theory by means of increasing blade loading. Firstly, the rotor blade of the transonic compressor is redesigned based on the constant span-wise deHaller number and diffusion. The code is applied to extract compressor meridional plane and blade to blade geometry containing rotor and stator in order to design blade three-dimensional view. A structured grid is generated for the numerical domain of fluid. Finer grids are used for regions near walls to capture boundary layer effects and behavior. RANS equations are solved by finite volume method for rotating zones (rotor) and stationary zones (stator). The experimental data, available for the performance map of NASA Rotor67, is used to validate the results of simulations. Then, the capability of the design method is validated by CFD that is capable of predicting the performance map. The numerical results of new geometry show about 19% increase in pressure ratio and 11% improvement in overall efficiency of the transonic stage; however, the design point mass flow rate of the new compressor is 5.7% less than that of the original compressor.Keywords: deHaller number, one dimensional design, radial equilibrium, transonic compressor
Procedia PDF Downloads 341561 Using Sandplay Therapy to Assess Psychological Resilience
Authors: Dan Wang
Abstract:
Sandplay therapy is a Jungian psychological therapy developed by Dora Kalff in 1956. In sandplay therapy, the client first makes a sandtray with various miniatures and then has a communication with the therapist based on the sandtray. The special method makes sandplay therapy has great assessment potential. With regarding that the core treatment hypothesis of sandplay therapy - the self-healing power, is very similar to resilience. This study tries to use sandplay to evaluate psychological resilience. Participants are 107 undergraduates recruited from three public universities in China who were required to make an initial sandtray and to complete the Ego-Resiliency Scale (ER89) respectively. First, a 28- category General Sandtray Coding Manual (GSCM) was developed based on literature on sandplay therapy. Next, using GSCM to code the 107 initial sandtrays and conducted correlation analysis and regression analysis between all GSCM categories and ER89. Results show three categories (i.e., vitality, water types, and relationships) of sandplay account for 36.6% of the variance of ego-resilience and form the four-point Likert-type Sandtray Projective Test of Resilience (SPTR). Finally, it is found that SPTR dimensions and total score all have good inter-rater reliability, ranging from 0.89 to 0.93. This study provides an alternative approach to measure psychological resilience and can help to guide clinical social work.Keywords: sandplay therapy, psychological resilience, measurement, college students
Procedia PDF Downloads 255560 Exergetic Analysis of Steam Turbine Power Plant Operated in Chemical Industry
Authors: F. Hafdhi, T. Khir, A. Ben Yahia, A. Ben Brahim
Abstract:
An Energetic and exergetic analysis is conducted on a Steam Turbine Power Plant of an existing Phosphoric Acid Factory. The heat recovery systems used in different parts of the plant are also considered in the analysis. Mass, thermal and exergy balances are established on the main compounds of the factory. A numerical code is established using EES software to perform the calculations required for the thermal and exergy plant analysis. The effects of the key operating parameters such as steam pressure and temperature, mass flow rate as well as seawater temperature, on the cycle performances are investigated. A maximum Exergy Loss Rate of about 72% is obtained for the melters, followed by the condensers, heat exchangers and the pumps. The heat exchangers used in the phosphoric acid unit present exergetic efficiencies around 33% while 60% to 72% are obtained for steam turbines and blower. For the explored ranges of HP steam temperature and pressure, the exergy efficiencies of steam turbine generators STGI and STGII increase of about 2.5% and 5.4% respectively. In the same way, optimum HP steam flow rate values, leading to the maximum exergy efficiencies are defined.Keywords: steam turbine generator, energy efficiency, exergy efficiency, phosphoric acid plant
Procedia PDF Downloads 310559 Evaluation of Response Modification Factor and Behavior of Seismic Base-Isolated RC Structures
Authors: Mohammad Parsaeimaram, Fang Congqi
Abstract:
In this paper, one of the significant seismic design parameter as response modification factor in reinforced concrete (RC) buildings with base isolation system was evaluated. The seismic isolation system is a capable approach to absorbing seismic energy at the base and transfer to the substructure with lower response modification factor as compared to non-isolated structures. A response spectrum method and static nonlinear pushover analysis in according to Uniform Building Code (UBC-97), have been performed on building models involve 5, 8, 12 and 15 stories building with fixed and isolated bases consist of identical moment resisting configurations. The isolation system is composed of lead rubber bearing (LRB) was designed with help UBC-97 parameters. The force-deformation behavior of isolators was modeled as bi-linear hysteretic behavior which can be effectively used to create the isolation systems. The obtained analytical results highlight the response modification factor of considered base isolation system with higher values than recommended in the codes. The response modification factor is used in modern seismic codes to scale down the elastic response of structures.Keywords: response modification factor, base isolation system, pushover analysis, lead rubber bearing, bi-linear hysteretic
Procedia PDF Downloads 324558 Discrete Element Method Simulation of Crushable Pumice Sand
Authors: Sayed Hessam Bahmani, Rolsndo P. Orense
Abstract:
From an engineering point of view, pumice particles are problematic because of their crushability and compressibility due to their vesicular nature. Currently, information on the geotechnical characteristics of pumice sands is limited. While extensive empirical and laboratory tests can be implemented to characterize their behavior, these are generally time-consuming and expensive. These drawbacks have motivated attempts to study the effects of particle breakage of pumice sand through the Discrete Element Method (DEM). This method provides insights into the behavior of crushable granular material at both the micro and macro-level. In this paper, the results of single-particle crushing tests conducted in the laboratory are simulated using DEM through the open-source code YADE. This is done to better understand the parameters necessary to represent the pumice microstructure that governs its crushing features, and to examine how the resulting microstructure evolution affects a particle’s properties. The DEM particle model is then used to simulate the behavior of pumice sand during consolidated drained triaxial tests. The results indicate the importance of incorporating particle porosity and unique surface textures in the material characterization and show that interlocking between the crushed particles significantly influences the drained behavior of the pumice specimen.Keywords: pumice sand, triaxial compression, simulation, particle breakage
Procedia PDF Downloads 245557 Towards the Use of Software Product Metrics as an Indicator for Measuring Mobile Applications Power Consumption
Authors: Ching Kin Keong, Koh Tieng Wei, Abdul Azim Abd. Ghani, Khaironi Yatim Sharif
Abstract:
Maintaining factory default battery endurance rate over time in supporting huge amount of running applications on energy-restricted mobile devices has created a new challenge for mobile applications developer. While delivering customers’ unlimited expectations, developers are barely aware of efficient use of energy from the application itself. Thus developers need a set of valid energy consumption indicators in assisting them to develop energy saving applications. In this paper, we present a few software product metrics that can be used as an indicator to measure energy consumption of Android-based mobile applications in the early of design stage. In particular, Trepn Profiler (Power profiling tool for Qualcomm processor) has used to collect the data of mobile application power consumption, and then analyzed for the 23 software metrics in this preliminary study. The results show that McCabe cyclomatic complexity, number of parameters, nested block depth, number of methods, weighted methods per class, number of classes, total lines of code and method lines have direct relationship with power consumption of mobile application.Keywords: battery endurance, software metrics, mobile application, power consumption
Procedia PDF Downloads 395556 Estimating X-Ray Spectra for Digital Mammography by Using the Expectation Maximization Algorithm: A Monte Carlo Simulation Study
Authors: Chieh-Chun Chang, Cheng-Ting Shih, Yan-Lin Liu, Shu-Jun Chang, Jay Wu
Abstract:
With the widespread use of digital mammography (DM), radiation dose evaluation of breasts has become important. X-ray spectra are one of the key factors that influence the absorbed dose of glandular tissue. In this study, we estimated the X-ray spectrum of DM using the expectation maximization (EM) algorithm with the transmission measurement data. The interpolating polynomial model proposed by Boone was applied to generate the initial guess of the DM spectrum with the target/filter combination of Mo/Mo and the tube voltage of 26 kVp. The Monte Carlo N-particle code (MCNP5) was used to tally the transmission data through aluminum sheets of 0.2 to 3 mm. The X-ray spectrum was reconstructed by using the EM algorithm iteratively. The influence of the initial guess for EM reconstruction was evaluated. The percentage error of the average energy between the reference spectrum inputted for Monte Carlo simulation and the spectrum estimated by the EM algorithm was -0.14%. The normalized root mean square error (NRMSE) and the normalized root max square error (NRMaSE) between both spectra were 0.6% and 2.3%, respectively. We conclude that the EM algorithm with transmission measurement data is a convenient and useful tool for estimating x-ray spectra for DM in clinical practice.Keywords: digital mammography, expectation maximization algorithm, X-Ray spectrum, X-Ray
Procedia PDF Downloads 730555 The Problem of Legal Regulation of Joint Physical Custody: The Polish Perspective
Authors: Katarzyna Kamińska
Abstract:
The main purpose of the work is to present the results of the studies regarding joint physical custody in the Polish legal system. The issues addressed fit into the ongoing process of modernising family law regulations and their adaptation to changing social reality in Poland. The Polish legislator now faces a dilemma: whether to introduce into Polish law a developed substantive or procedural regulation of joint physical custody and then whether it should be considered a legal presumption. Joint physical custody after divorce or separation is theoretically possible in Poland. It can either follow from the court’s independent proposal based on the assessment of the circumstances or from the parenting plan submitted by parents wishing to jointly retain full parental authority. However, joint physical custody does not result directly from the Polish Family and Guardianship Code. Therefore, there is real legal uncertainty in this matter, which leads to different treatment of citizens by the public authorities and courts. Another problem is that joint physical custody is misunderstood by the Polish courts. The main thesis of the work is that joint physical custody does not only mean the system of symmetrical child care (50/50), and the possibility to award joint physical custody will require the courts to carefully weigh the pros and cons of such an arrangement in each individual case.Keywords: joint physical custody, shared parenting, divorce, separation, parental authority
Procedia PDF Downloads 83554 Performance of Buildings with Base-Isolation System under Geometric Irregularities
Authors: Firoz Alam Faroque, Ankur Neog
Abstract:
Earthquake causes significant loss of lives and severe damage to infrastructure. Base isolator is one of the most suitable solutions to make a building earthquake resistant. Base isolation consists of installing an isolator along with the steel plates covered with pads of strong material like steel, rubber, etc. In our study, we have used lead rubber bearing (LRB). The basic idea of seismic isolation is based on the reduction of the earthquake-induced inertia forces by shifting the fundamental period of the structure out of dangerous resonance range, and concentration of the deformation and energy dissipation demands at the isolation and energy dissipation systems, which are designed for this purpose. In this paper, RC frame buildings have been modeled and analyzed by response spectrum method using ETABS software. The LRB used in the model is designed as per uniform building code (UBC) 97. It is found that time period for the base isolated structures are higher than that of the fixed base structure and the value of base shear significantly reduces in the case of base-isolated buildings. It has also been found that buildings with vertical irregularities give better performance as compared to building with plan irregularities using base isolators.Keywords: base isolation, base shear, irregularities in buildings, lead rubber bearing (LRB)
Procedia PDF Downloads 325553 Rethinking the Pre-Trial Detention Law of Ethiopia: An International Law and Constitutional Law Perspective
Authors: Addisu Teshama
Abstract:
The existing criminal procedure law which is the main determinant of the phenomena of pre-trial detention is under revision in Ethiopia. The drafting work is completed and submitted for approval to the House of Peoples Representatives. The drafters of the draft law claim that the existing law is not in harmony with the constitutionally and internationally recognized principles pertinent to pretrial detention regulation. Further, the drafters allege that the drafting process is dictated by human rights principles recognized in the FDRE constitution and international human rights instruments ratified by Ethiopia. This article aims to the asses the plausibility of the claims of the drafters. For that purpose, this article uses the standards and guidelines articulated by international human rights standard setters as bench marks to juxtapose and judge the existing law and the draft criminal procedure and evidence code (DCrimPEC). The study found that the many aspects of the pre-trial detention law of Ethiopia are not in compliance with international law standards in the existing criminal procedure law. The DCrimPEC is aimed to harmonize the existing law with the constitution and international law standards. In this regard, the study found that the DCrimPEC has made significant changes on pre-trial detention policies which are not in harmony the principle of presumption of innocence. However, there are still gaps.Keywords: pre-trial detention, right to personal liberty, right to bail, Ethiopia
Procedia PDF Downloads 52552 Three-Dimensional, Non-Linear Finite Element Analysis of Bullet Penetration through Thin AISI 4340 Steel Target Plate
Authors: Abhishek Soni, A. Kumaraswamy, M. S. Mahesh
Abstract:
Bullet penetration in steel plate is investigated with the help of three-dimensional, non-linear, transient, dynamic, finite elements analysis using explicit time integration code LSDYNA. The effect of large strain, strain-rate and temperature at very high velocity regime was studied from number of simulations of semi-spherical nose shape bullet penetration through single layered circular plate with 2 mm thickness at impact velocities of 500, 1000, and 1500 m/s with the help of Johnson Cook material model. Mie-Gruneisen equation of state is used in conjunction with Johnson Cook material model to determine pressure-volume relationship at various points of interests. Two material models viz. Plastic-Kinematic and Johnson- Cook resulted in different deformation patterns in steel plate. It is observed from the simulation results that the velocity drop and loss of kinetic energy occurred very quickly up to perforation of plate, after that the change in velocity and changes in kinetic energy are negligibly small. The physics behind this kind of behaviour is presented in the paper.Keywords: AISI 4340 steel, ballistic impact simulation, bullet penetration, non-linear FEM
Procedia PDF Downloads 208551 Yawning and Cortisol as a Potential Biomarker for Early Detection of Multiple Sclerosis
Authors: Simon B. N. Thompson
Abstract:
Cortisol is essential to the regulation of the immune system and yawning is a pathological symptom of multiple sclerosis (MS). Electromyography activity (EMG) in the jaw muscles typically rises when the muscles are moved and with yawning is highly correlated with cortisol levels in healthy people. Saliva samples from 59 participants were collected at the start and after yawning, or at the end of the presentation of yawning-provoking stimuli, in the absence of a yawn, together with EMG data and questionnaire data: Hospital Anxiety and Depression Scale, Yawning Susceptibility Scale, General Health Questionnaire, demographic, health details. Exclusion criteria: chronic fatigue, diabetes, fibromyalgia, heart condition, high blood pressure, hormone replacement therapy, multiple sclerosis, stroke. Significant differences were found between the saliva cortisol samples for the yawners, t (23) = -4.263, p = 0.000, as compared with the non-yawners between rest and post-stimuli, which was non-significant. Significant evidence was found to support the Thompson Cortisol Hypothesis suggesting that rises in cortisol levels are associated with yawning. Further research is exploring the use of cortisol as an early diagnostic tool for MS. Ethics approval granted and professional code of conduct, confidentiality, and safety issues are approved therein.Keywords: cortisol, multiple sclerosis, yawning, thompson cortisol hypothesis
Procedia PDF Downloads 376550 Characterization of the Catalytic and Structural Roles of the Human Hexokinase 2 in Cancer Progression
Authors: Mir Hussain Nawaz, Lyudmila Nedyalkova, Haizhong Zhu, Wael M. Rabeh
Abstract:
In this study, we aim to biochemically and structurally characterize the interactions of human HK2 with the mitochondria in addition to the role of its N-terminal domain in catalysis and stability of the full-length enzyme. Here, we solved the crystal structure of human HK2 in complex with glucose and glucose-6-phosphate (PDB code: 2NZT), where it is a homodimer with catalytically active N- and C-terminal domains linked by a seven-turn α-helix. Different from the inactive N-terminal domains of isozymes 1 and 3, the N- domain of HK2 not only capable to catalyze a reaction but it is responsible for the thermodynamic stabilizes of the full-length enzyme. Deletion of first α-helix of the N-domain that binds to the mitochondria altered the stability and catalytic activity of the full-length HK2. In addition, we found the linker helix between the N- and C-terminal domains to play an important role in controlling the catalytic activity of the N-terminal domain. HK2 is a major step in the regulation of glucose metabolism in cancer making it an ideal target for the development of new anticancer therapeutics. Characterizing the structural and molecular mechanisms of human HK2 and its role in cancer metabolism will accelerate the design and development of new cancer therapeutics that are safe and cancer specific.Keywords: cancer metabolism, enzymology, drug discovery, protein stability
Procedia PDF Downloads 263