Search results for: protection time
19154 A New Analytic Solution for the Heat Conduction with Time-Dependent Heat Transfer Coefficient
Authors: Te Wen Tu, Sen Yung Lee
Abstract:
An alternative approach is proposed to develop the analytic solution for one dimensional heat conduction with one mixed type boundary condition and general time-dependent heat transfer coefficient. In this study, the physic meaning of the solution procedure is revealed. It is shown that the shifting function takes the physic meaning of the reciprocal of Biot function in the initial time. Numerical results show the accuracy of this study. Comparing with those given in the existing literature, the difference is less than 0.3%.Keywords: analytic solution, heat transfer coefficient, shifting function method, time-dependent boundary condition
Procedia PDF Downloads 43319153 Spatial Spillovers in Forecasting Market Diffusion of Electric Mobility
Authors: Reinhold Kosfeld, Andreas Gohs
Abstract:
In the reduction of CO₂ emissions, the transition to environmentally friendly transport modes has a high significance. In Germany, the climate protection programme 2030 includes various measures for promoting electromobility. Although electric cars at present hold a market share of just over one percent, its stock more than doubled in the past two years. Special measures like tax incentives and a buyer’s premium have been put in place to promote the shift towards electric cars and boost their diffusion. Knowledge of the future expansion of electric cars is required for planning purposes and adaptation measures. With a view of these objectives, we particularly investigate the effect of spatial spillovers on forecasting performance. For this purpose, time series econometrics and panel econometric models are designed for pure electric cars and hybrid cars for Germany. Regional forecasting models with spatial interactions are consistently estimated by using spatial econometric techniques. Regional data on the stocks of electric cars and their determinants at the district level (NUTS 3 regions) are available from the Federal Motor Transport Authority (Kraftfahrt-Bundesamt) for the period 2017 - 2019. A comparative examination of aggregated regional and national predictions provides quantitative information on accuracy gains by allowing for spatial spillovers in forecasting electric mobility.Keywords: electric mobility, forecasting market diffusion, regional panel data model, spatial interaction
Procedia PDF Downloads 17519152 Arisarum Vulgare: Bridging Tradition and Science through Phytochemical Characterization and Exploring Therapeutic Potential via in vitro and in vivo Biological Activities
Authors: Boudjelal Amel
Abstract:
Arisarum vulgare, a member of the Araceae family, is an herbaceous perennial widely distributed in the Mediterranean region. A. vulgare is recognized for its medicinal properties and holds significant traditional importance in Algeria for the treatment of various human ailments, including pain, infections, inflammation, digestive disorders, skin problems, eczema, cancer, wounds, burns and gynecological diseases. Despite its extensive traditional use, scientific exploration of A. vulgare remains limited. The study aims to investigate for the first time the therapeutic potential of A. vulgare ethanolic extract obtained by ultrasound-assisted extraction. The chemical composition of the extract was determined by LC-MS/MS analysis. For in vitro phytopharmacological evaluation, several assays, including DPPH, ABTS, FRAP and reducing power, were employed to evaluate the antioxidant activity. The antibacterial activity was assessed againt Escherichia coli, Salmonella typhimurium, Staphylococus aureus, Enterococcus feacium by disk diffusion and microdilution methods. The possible inhibitory activity of ethanolic extract was analyzed against the cholinesterases enzymes (AChE and BChE). The DNA protection activity of A. vulgare ethanolic extract was estimated using the agarose gel electrophoresis method. The capacities of the extract to protect plasmid DNA (pBR322) from the oxidizing effects of H2O2 and UV treatment were evaluated by their DNA-breaking forms. The in vivo wound healing potential of a traditional ointment containing 5% of A. vulgare ethanolic extract was also investigated. The LC-MS/MS profiling of the extract revealed the presence of various bioactive compounds, including naringenin, chlorogenic, vanillic, cafeic, coumaric acids, trans-cinnamic and trans ferrulic acids. The plant extract presented considerable antioxidant potential, being the most active for Reducing power (0,07326±0.001 mg/ml) and DPPH (0.14±0.004 mg/ml). The extract showed the highest inhibition zone diameter against Enterococcus feacium (36±0.1 mm). The ethanolic extract of A. vulgare suppressed the growth of Staphylococus aureus, Escherichia coli and Salmonella typhimurium according to the MIC values. The extract of the plant significantly inhibited both AChE and BChE enzymes. DNA protection activity of the A. vulgare extract was determined as 90.41% for form I and 51.92% for form II. The in vivo experiments showed that 5% ethanolic extract ointment accelerated the wound healing process. The topical application of the traditional formulation enhanced wound closure (95,36±0,6 %) and improved histological parameters in the treated group compared to the control groups. The promising biological properties of Arisarum vulgare revealed that the plant could be appraised as a potential origin of bioactive molecules having multifunctional medicinal uses.Keywords: arisarum vulgare, LC-MS/MS, antioxidant activity, antimicrobial activity, cholinesterases enzymes inhibition, dna-damage activity, in vivo wound healing
Procedia PDF Downloads 6919151 Design and Realization of Computer Network Security Perception Control System
Authors: El Miloudi Djelloul
Abstract:
Based on analysis on applications by perception control technology in computer network security status and security protection measures, from the angles of network physical environment and network software system environmental security, this paper provides network security system perception control solution using Internet of Things (IOT), telecom and other perception technologies. Security Perception Control System is in the computer network environment, utilizing Radio Frequency Identification (RFID) of IOT and telecom integration technology to carry out integration design for systems. In the network physical security environment, RFID temperature, humidity, gas and perception technologies are used to do surveillance on environmental data, dynamic perception technology is used for network system security environment, user-defined security parameters, security log are used for quick data analysis, extends control on I/O interface, by development of API and AT command, Computer Network Security Perception Control based on Internet and GSM/GPRS is achieved, which enables users to carry out interactive perception and control for network security environment by WEB, E-MAIL as well as PDA, mobile phone short message and Internet. In the system testing, through middle ware server, security information data perception in real time with deviation of 3-5% was achieved; it proves the feasibility of Computer Network Security Perception Control System.Keywords: computer network, perception control system security strategy, Radio Frequency Identification (RFID)
Procedia PDF Downloads 44719150 Analysis of Injection-Lock in Oscillators versus Phase Variation of Injected Signal
Authors: M. Yousefi, N. Nasirzadeh
Abstract:
In this paper, behavior of an oscillator under injection of another signal has been investigated. Also, variation of output signal amplitude versus injected signal phase variation, the effect of varying the amplitude of injected signal and quality factor of the oscillator has been investigated. The results show that the locking time depends on phase and the best locking time happens at 180-degrees phase. Also, the effect of injected lock has been discussed. Simulations show that the locking time decreases with signal injection to bulk. Locking time has been investigated versus various phase differences. The effect of phase and amplitude changes on locking time of a typical LC oscillator in 180 nm technology has been investigated.Keywords: analysis, oscillator, injection-lock oscillator, phase modulation
Procedia PDF Downloads 34919149 Study of Lamination Quality of Semi-Flexible Solar Modules with Special Textile Materials
Authors: K. Drabczyk, Z. Starowicz, S. Maleczek, P. Zieba
Abstract:
The army, police and fire brigade commonly use dedicated equipment based on special textile materials. The properties of these textiles should ensure human life and health protection. Equally important is the ability to use electronic equipment and this requires access to the source of electricity. Photovoltaic cells integrated with such textiles can be solution for this problem in the most of outdoor circumstances. One idea may be to laminate the cells to textile without changing their properties. The main goal of this work was analyzed lamination quality of special designed semi-flexible solar module with special textile materials as a backsheet. In the first step of investigation, the quality of lamination was determined using device equipped with dynamometer. In this work, the crystalline silicon solar cells 50 x 50 mm and thin chemical tempered glass - 62 x 62 mm and 0.8 mm thick - were used. The obtained results showed the correlation between breaking force and type of textile weave and fiber. The breaking force was in the ranges: 4.5-5.5 N, 15-20 N and 30-33 N depending on the type of wave and fiber type. To verify these observations the microscopic and FTIR analysis of fibers was performed. The studies showed the special textile can be used as a backsheet of semi-flexible solar modules. This work presents a new composition of solar module with special textile layer which, to our best knowledge, has not been published so far. Moreover, the work presents original investigations on adhesion of EVA (ethylene-vinyl acetate) polymer to textile with respect to fiber structure of laminated substrate. This work is realized for the GEKON project (No. GEKON2/O4/268473/23/2016) sponsored by The National Centre for Research and Development and The National Fund for Environmental Protection and Water Management.Keywords: flexible solar modules, lamination process, solar cells, textile for photovoltaics
Procedia PDF Downloads 35819148 Adaptation to Repeated Eccentric Exercise Assessed by Double to Single Twitch Ratio
Authors: Damian Janecki, Anna Jaskólska, Jarosław Marusiak, Artur Jaskólski
Abstract:
The aim of this study was to assess double to single twitch ratio after two bouts of eccentric exercise of the elbow flexors. Maximal isometric torque, single and double twitch responses and low-frequency fatigue were assessed on the elbow flexors in 19 untrained male volunteers before, immediately after, 24 and 48 hours following two bouts of eccentric exercise consisted of 30 repetitions of lowering a dumbbell adjusted to ~75% of each individual's maximal isometric torque. Maximal isometric torque and electrically evoked responses decreased significantly in all measurements after the first bout of eccentric exercise (P<0.05). In measurements performed at 24 and 48 hours after the second bout both maximal voluntary isometric torque and electrically evoked contractions were significantly higher than in measurements performed after the fist bout (P<0.05). Although low-frequency fatigue significantly increased up to 48 hours after each bout of eccentric exercise, its values at 24 and 48 hours after the second bout were significantly lower than at respective time points after the first bout (P<0.05). Smaller changes in double to single twitch ratio at 24 and 48 hours after the second bout of eccentric exercise reflects repeated bout effect that confers protection against subsequent exercise-induced muscle damage.Keywords: biceps brachii, electrical stimulation, lenghtening contractions, repeated bout effect
Procedia PDF Downloads 32019147 The Evaluation of the Performance of CaCO3/Polymer Nano-Composites for the Preservation of Historic Limestone Monuments
Authors: Mohammed Badereldien, Rezk Diab, Mohamoud Ali, Ayman Aboelkassem
Abstract:
The stone surfaces of historical architectural heritage in Egypt are under threat from of various environmental factors such as temperature fluctuation, humidity, pollution, and microbes. Due to these factors, the facades of buildings are deteriorating deformation and disfiguration of external decoration and the formation of black accretion also often from the stone works. The aim of this study is to evaluate the effectiveness of CaCO₃ nano-particles as consolidation and protection material for calcareous stone monuments. Selected tests were carried out in order to estimate the superficial consolidating and protective effect of the treatment. When applied the nanoparticles dispersed in the acrylic copolymer; poly ethylmethacrylate (EMA)/methylacrylate (MA) (70/30, respectively) (EMA)/methylacrylate (MA) (70/30, respectively). The synthesis process of CaCO₃ nanoparticles/polymer nano-composite was prepared using in situ emulsion polymerization system. The consolidation and protection were characterized by TEM, while the penetration depth, re-aggregating effects of the deposited phase, and the surface morphology before and after treatment were examined by SEM (Scanning Electron Microscopy). Improvement of the stones' mechanical properties was evaluated by compressive strength tests. Changes in water-interaction properties were evaluated by water absorption capillarity measurements, and colorimetric measurements were used to evaluate the optical appearance. Together the results appear to demonstrate that CaCO₃/polymer nanocomposite is an efficient material for the consolidation of limestone architecture and monuments. As compared with samples treated with pure acrylic copolymer without Calcium carbonate nanoparticles, for example, CaCO₃ nanoparticles are completely compatible, strengthening limestone against thermal aging and improving its mechanical properties.Keywords: calcium carbonate nanoparticles, consolidation, nanocomposites, calcareous stone, colorimetric measurements, compressive strength
Procedia PDF Downloads 13619146 Encapsulated Western Red Cedar (Thuja Plicata) Essential Oil as a Prospective Biopesticide against Phytophthora Pathogens
Authors: Aleksandar M. Radojković, Jovana M. Ćirković, Sanja Z. Perać, Jelena N. Jovanović, Zorica M. Branković, Slobodan D. Milanović, Ivan Lj. Milenković, Jovan N. Dobrosavljević, Nemanja V. Simović, Vanja M. Tadić, Ana R. Žugić, Goran O. Branković
Abstract:
In many parts of the world, various Phytophthora species pose a serious threat to forests and crops. With the rapidly growing international trade in plants and the ongoing impacts of climate change, the harmful effects of plant pathogens of the genus Phytophthora are increasing, damaging the biodiversity and sustainability of forest ecosystems. This genus is one of the most destructive plant pathogens, causing the majority of fine root (66%) and collar rot diseases (90%) of woody plant species worldwide. Eco-friendly biopesticides, based on plant-derived products, such as essential oils (EOs), are one of the promising solutions to this problem. In this study, among three different EOs investigated (Chamaecyparis lawsoniana (A. Murr.) Parl., Thuja plicata Donn ex D.Don and Juniperus communis L.), western red cedar (Thuja plicata) essential oil almost completely inhibited the growth of three Phytophthora species (P. plurivora Jung and Burgess, P. quercina Jung, and P. ×cambivora (Petri) Buisman) during seven days of exposure for the EO concentrations of 0.1% and 0.5% (v/v). To prolong the inhibiting effect, Thuja plicata EO was encapsulated into a biopolymer matrix consisting of a chitosan-gelatin mixture to form a water-in-oil emulsion. This approach allowed the prolonged effect of the essential oil by its slow release from the biopolymer matrix and protection of the active components from atmospheric influences. Thus, it was demonstrated that encapsulated Thuja plicata EO consisting of sustainable bioproducts is efficient in controlling of Phytophthora species and can be considered a means of protection in natural and semi-natural ecosystems.Keywords: emulsions, essential oils, phytophthora, thuja plicata
Procedia PDF Downloads 9319145 Efficient Deep Neural Networks for Real-Time Strawberry Freshness Monitoring: A Transfer Learning Approach
Authors: Mst. Tuhin Akter, Sharun Akter Khushbu, S. M. Shaqib
Abstract:
A real-time system architecture is highly effective for monitoring and detecting various damaged products or fruits that may deteriorate over time or become infected with diseases. Deep learning models have proven to be effective in building such architectures. However, building a deep learning model from scratch is a time-consuming and costly process. A more efficient solution is to utilize deep neural network (DNN) based transfer learning models in the real-time monitoring architecture. This study focuses on using a novel strawberry dataset to develop effective transfer learning models for the proposed real-time monitoring system architecture, specifically for evaluating and detecting strawberry freshness. Several state-of-the-art transfer learning models were employed, and the best performing model was found to be Xception, demonstrating higher performance across evaluation metrics such as accuracy, recall, precision, and F1-score.Keywords: strawberry freshness evaluation, deep neural network, transfer learning, image augmentation
Procedia PDF Downloads 9119144 Effects of Bipolar Plate Coating Layer on Performance Degradation of High-Temperature Proton Exchange Membrane Fuel Cell
Authors: Chen-Yu Chen, Ping-Hsueh We, Wei-Mon Yan
Abstract:
Over the past few centuries, human requirements for energy have been met by burning fossil fuels. However, exploiting this resource has led to global warming and innumerable environmental issues. Thus, finding alternative solutions to the growing demands for energy has recently been driving the development of low-carbon and even zero-carbon energy sources. Wind power and solar energy are good options but they have the problem of unstable power output due to unpredictable weather conditions. To overcome this problem, a reliable and efficient energy storage sub-system is required in future distributed-power systems. Among all kinds of energy storage technologies, the fuel cell system with hydrogen storage is a promising option because it is suitable for large-scale and long-term energy storage. The high-temperature proton exchange membrane fuel cell (HT-PEMFC) with metallic bipolar plates is a promising fuel cell system because an HT-PEMFC can tolerate a higher CO concentration and the utilization of metallic bipolar plates can reduce the cost of the fuel cell stack. However, the operating life of metallic bipolar plates is a critical issue because of the corrosion phenomenon. As a result, in this work, we try to apply different coating layer on the metal surface and to investigate the protection performance of the coating layers. The tested bipolar plates include uncoated SS304 bipolar plates, titanium nitride (TiN) coated SS304 bipolar plates and chromium nitride (CrN) coated SS304 bipolar plates. The results show that the TiN coated SS304 bipolar plate has the lowest contact resistance and through-plane resistance and has the best cell performance and operating life among all tested bipolar plates. The long-term in-situ fuel cell tests show that the HT-PEMFC with TiN coated SS304 bipolar plates has the lowest performance decay rate. The second lowest is CrN coated SS304 bipolar plate. The uncoated SS304 bipolar plate has the worst performance decay rate. The performance decay rates with TiN coated SS304, CrN coated SS304 and uncoated SS304 bipolar plates are 5.324×10⁻³ % h⁻¹, 4.513×10⁻² % h⁻¹ and 7.870×10⁻² % h⁻¹, respectively. In addition, the EIS results indicate that the uncoated SS304 bipolar plate has the highest growth rate of ohmic resistance. However, the ohmic resistance with the TiN coated SS304 bipolar plates only increases slightly with time. The growth rate of ohmic resistances with TiN coated SS304, CrN coated SS304 and SS304 bipolar plates are 2.85×10⁻³ h⁻¹, 3.56×10⁻³ h⁻¹, and 4.33×10⁻³ h⁻¹, respectively. On the other hand, the charge transfer resistances with these three bipolar plates all increase with time, but the growth rates are all similar. In addition, the effective catalyst surface areas with all bipolar plates do not change significantly with time. Thus, it is inferred that the major reason for the performance degradation is the elevated ohmic resistance with time, which is associated with the corrosion and oxidation phenomena on the surface of the stainless steel bipolar plates.Keywords: coating layer, high-temperature proton exchange membrane fuel cell, metallic bipolar plate, performance degradation
Procedia PDF Downloads 28219143 Evolving Knowledge Extraction from Online Resources
Authors: Zhibo Xiao, Tharini Nayanika de Silva, Kezhi Mao
Abstract:
In this paper, we present an evolving knowledge extraction system named AKEOS (Automatic Knowledge Extraction from Online Sources). AKEOS consists of two modules, including a one-time learning module and an evolving learning module. The one-time learning module takes in user input query, and automatically harvests knowledge from online unstructured resources in an unsupervised way. The output of the one-time learning is a structured vector representing the harvested knowledge. The evolving learning module automatically schedules and performs repeated one-time learning to extract the newest information and track the development of an event. In addition, the evolving learning module summarizes the knowledge learned at different time points to produce a final knowledge vector about the event. With the evolving learning, we are able to visualize the key information of the event, discover the trends, and track the development of an event.Keywords: evolving learning, knowledge extraction, knowledge graph, text mining
Procedia PDF Downloads 45819142 Comparison of the Center of Pressure, Gait Angle, and Gait Time in Female College Students and Elderly Women
Authors: Dae-gun Kim, Hyun-joo Kang
Abstract:
Purpose: The purpose of this study was to investigate the effects of aging on center of pressure, gait angle and gait time. Methods: 29 healthy female college students(FCS) and 28 elderly women (EW) were recruited to participate in this study. A gait analysis system( Gaitview, Korea) was used to collect the center of pressure in static state and gait angle with gait time in dynamic state. Results: Results of the center of pressure do not have significant differences between two groups. In the gait angle test, the FCS showed 1.56±5.2° on their left while the EW showed 9.76±6.54° on their left. In their right, the FCS showed 2.85±6.47° and the EW showed 10.27±6.97°. In the gait angle test, there was a significant difference in the gait time between the female college students and elderly women. A significant difference was evident in the gait time. The FCS on the left was 0.87±0.1sec while the EW’s was 1.28±0.44sec. The FCS on the right was 0.86±0.09sec and the EW was 1.1±0.21sec. The results of this study revealed that the elderly participants aging musculoskeletal system and subsequent changes in their posture altered gait angle and gait time. Therefore, this widening is due to their need to leave their feet on the ground longer for stability slowing their movement. Conclusions: In conclusion, it is advisable to develop an exercise program for the elderly focusing on stability the prevention of falls.Keywords: center of pressure, gait angle, gait time, elderly women
Procedia PDF Downloads 18319141 Interactive IoT-Blockchain System for Big Data Processing
Authors: Abdallah Al-ZoubI, Mamoun Dmour
Abstract:
The spectrum of IoT devices is becoming widely diversified, entering almost all possible fields and finding applications in industry, health, finance, logistics, education, to name a few. The IoT active endpoint sensors and devices exceeded the 12 billion mark in 2021 and are expected to reach 27 billion in 2025, with over $34 billion in total market value. This sheer rise in numbers and use of IoT devices bring with it considerable concerns regarding data storage, analysis, manipulation and protection. IoT Blockchain-based systems have recently been proposed as a decentralized solution for large-scale data storage and protection. COVID-19 has actually accelerated the desire to utilize IoT devices as it impacted both demand and supply and significantly affected several regions due to logistic reasons such as supply chain interruptions, shortage of shipping containers and port congestion. An IoT-blockchain system is proposed to handle big data generated by a distributed network of sensors and controllers in an interactive manner. The system is designed using the Ethereum platform, which utilizes smart contracts, programmed in solidity to execute and manage data generated by IoT sensors and devices. such as Raspberry Pi 4, Rasbpian, and add-on hardware security modules. The proposed system will run a number of applications hosted by a local machine used to validate transactions. It then sends data to the rest of the network through InterPlanetary File System (IPFS) and Ethereum Swarm, forming a closed IoT ecosystem run by blockchain where a number of distributed IoT devices can communicate and interact, thus forming a closed, controlled environment. A prototype has been deployed with three IoT handling units distributed over a wide geographical space in order to examine its feasibility, performance and costs. Initial results indicated that big IoT data retrieval and storage is feasible and interactivity is possible, provided that certain conditions of cost, speed and thorough put are met.Keywords: IoT devices, blockchain, Ethereum, big data
Procedia PDF Downloads 15019140 Algorithmic Obligations: Proactive Liability for AI-Generated Content and Copyright Compliance
Authors: Aleksandra Czubek
Abstract:
As AI systems increasingly shape content creation, existing copyright frameworks face significant challenges in determining liability for AI-generated outputs. Current legal discussions largely focus on who bears responsibility for infringing works, be it developers, users, or entities benefiting from AI outputs. This paper introduces a novel concept of algorithmic obligations, proposing that AI developers be subject to proactive duties that ensure their models prevent copyright infringement before it occurs. Building on principles of obligations law traditionally applied to human actors, the paper suggests a shift from reactive enforcement to proactive legal requirements. AI developers would be legally mandated to incorporate copyright-aware mechanisms within their systems, turning optional safeguards into enforceable standards. These obligations could vary in implementation across international, EU, UK, and U.S. legal frameworks, creating a multi-jurisdictional approach to copyright compliance. This paper explores how the EU’s existing copyright framework, exemplified by the Copyright Directive (2019/790), could evolve to impose a duty of foresight on AI developers, compelling them to embed mechanisms that prevent infringing outputs. By drawing parallels to GDPR’s “data protection by design,” a similar principle could be applied to copyright law, where AI models are designed to minimize copyright risks. In the UK, post-Brexit text and data mining exemptions are seen as pro-innovation but pose risks to copyright protections. This paper proposes a balanced approach, introducing algorithmic obligations to complement these exemptions. AI systems benefiting from text and data mining provisions should integrate safeguards that flag potential copyright violations in real time, ensuring both innovation and protection. In the U.S., where copyright law focuses on human-centric works, this paper suggests an evolution toward algorithmic due diligence. AI developers would have a duty similar to product liability, ensuring that their systems do not produce infringing outputs, even if the outputs themselves cannot be copyrighted. This framework introduces a shift from post-infringement remedies to preventive legal structures, where developers actively mitigate risks. The paper also breaks new ground by addressing obligations surrounding the training data of large language models (LLMs). Currently, training data is often treated under exceptions such as the EU’s text and data mining provisions or U.S. fair use. However, this paper proposes a proactive framework where developers are obligated to verify and document the legal status of their training data, ensuring it is licensed or otherwise cleared for use. In conclusion, this paper advocates for an obligations-centered model that shifts AI-related copyright law from reactive litigation to proactive design. By holding AI developers to a heightened standard of care, this approach aims to prevent infringement at its source, addressing both the outputs of AI systems and the training processes that underlie them.Keywords: ip, technology, copyright, data, infringement, comparative analysis
Procedia PDF Downloads 2019139 Detecting Rat’s Kidney Inflammation Using Real Time Photoacoustic Tomography
Authors: M. Y. Lee, D. H. Shin, S. H. Park, W.C. Ham, S.K. Ko, C. G. Song
Abstract:
Photoacoustic Tomography (PAT) is a promising medical imaging modality that combines optical imaging contrast with the spatial resolution of ultrasound imaging. It can also distinguish the changes in biological features. But, real-time PAT system should be confirmed due to photoacoustic effect for tissue. Thus, we have developed a real-time PAT system using a custom-developed data acquisition board and ultrasound linear probe. To evaluate performance of our system, phantom test was performed. As a result of those experiments, the system showed satisfactory performance and its usefulness has been confirmed. We monitored the degradation of inflammation which induced on the rat’s kidney using real-time PAT.Keywords: photoacoustic tomography, inflammation detection, rat, kidney, contrast agent, ultrasound
Procedia PDF Downloads 45819138 The Application of Conceptual Metaphor Theory to the Treatment of Depression
Abstract:
Conceptual Metaphor Theory (CMT) proposes that metaphor is fundamental to human thought. CMT utilizes embodied cognition, in that emotions are conceptualized as effects on the body because of a coupling of one’s bodily experiences and one’s somatosensory system. Time perception is a function of embodied cognition and conceptual metaphor in that one’s experience of time is inextricably dependent on one’s perception of the world around them. A hallmark of depressive disorders is the distortion in one’s perception of time, such as neurological dysfunction and psychomotor retardation, and yet, to the author’s best knowledge, previous studies have not before linked CMT, embodied cognition, and depressive disorders. Therefore, the focus of this paper is the investigation of how the applications of CMT and embodied cognition (especially regarding time perception) have promise in improving current techniques to treat depressive disorders. This paper aimed to extend, through a thorough review of literature, the theoretical basis required to further research into CMT and embodied cognition’s application in treating time distortion related symptoms of depressive disorders. Future research could include the development of brain training technologies that capitalize on the principles of CMT, with the aim of promoting cognitive remediation and cognitive activation to mitigate symptoms of depressive disorder.Keywords: depression, conceptual metaphor theory, embodied cognition, time
Procedia PDF Downloads 16219137 Time-Frequency Feature Extraction Method Based on Micro-Doppler Signature of Ground Moving Targets
Authors: Ke Ren, Huiruo Shi, Linsen Li, Baoshuai Wang, Yu Zhou
Abstract:
Since some discriminative features are required for ground moving targets classification, we propose a new feature extraction method based on micro-Doppler signature. Firstly, the time-frequency analysis of measured data indicates that the time-frequency spectrograms of the three kinds of ground moving targets, i.e., single walking person, two people walking and a moving wheeled vehicle, are discriminative. Then, a three-dimensional time-frequency feature vector is extracted from the time-frequency spectrograms to depict these differences. At last, a Support Vector Machine (SVM) classifier is trained with the proposed three-dimensional feature vector. The classification accuracy to categorize ground moving targets into the three kinds of the measured data is found to be over 96%, which demonstrates the good discriminative ability of the proposed micro-Doppler feature.Keywords: micro-doppler, time-frequency analysis, feature extraction, radar target classification
Procedia PDF Downloads 40619136 The Web of Injustice: Untangling Violations of Personality Rights in European International Private Law
Authors: Sara Vora (Hoxha)
Abstract:
Defamation, invasion of privacy, and cyberbullying have all increased in tandem with the growth of the internet. European international private law may struggle to deal with such transgressions if they occur in many jurisdictions. The current study examines how effectively the legal system of European international private law addresses abuses of personality rights in cyberspace. The study starts by discussing how established legal frameworks are being threatened by online personality rights abuses. The article then looks into the rules and regulations of European international private law that are in place to handle overseas lawsuits. This article examines the different elements that courts evaluate when deciding which law to use in a particular case, focusing on the concepts of jurisdiction, choice of law, and recognition and execution of foreign judgements. Next, the research analyses the function of the European Union in preventing and punishing online personality rights abuses. Key pieces of law that control the collecting and processing of personal data on the Internet, including the General Data Protection Regulation (GDPR) and the e-Commerce Directive, are discussed. In addition, this article investigates how the ECtHR handles cases involving the infringement of personal freedoms, including privacy and speech. The article finishes with an assessment of how well the legal framework of European international private law protects individuals' right to privacy online. It draws attention to problems with the present legal structure, such as the inability to enforce international judgements, the inconsistency between national laws, and the necessity for stronger measures to safeguard people' rights online. This paper concludes that while European international private law provides a useful framework for dealing with violations of personality rights online, further harmonisation and stronger enforcement mechanisms are necessary to effectively protect individuals' rights in the digital age.Keywords: European international private law, personality rights, internet, jurisdiction, cross-border disputes, data protection
Procedia PDF Downloads 7619135 An Analysis of Institutional Environments on Corporate Social Responsibility Practices in Nigerian Renewable Energy Firms
Authors: Bolanle Deborah Motilewa, E. K. Rowland Worlu, Gbenga Mayowa Agboola, Ayodele Maxwell Olokundun
Abstract:
Several studies have proposed a one-size fit all approach to Corporate Social Responsibility (CSR) practices, such that CSR as it applies to developed countries is adapted to developing countries, ignoring the differing institutional environments (such as the regulative, economic, social and political environments), which affects the profitability and practices of businesses operating in them. CSR as it applies to filling institutional gaps in developing countries, was categorized into four themes: environmental protection, product and service innovation, social innovation and local cluster development. Based on the four themes, the study employed a qualitative research approach through the use of interviews and review of available publications to study the influence of institutional environments on CSR practices engaged in by three renewable energy firms operating in Nigeria. Over the course of three 60-minutes sessions with the top management and selected workers of the firms, four propositions were made: regulatory environment influences environmental protection practice of Nigerian renewable firms, economic environment influences product and service innovation practice of Nigerian renewable energy firms, the social environment impacts on social innovation in Nigerian renewable energy firms, and political environment affects local cluster development practice of Nigerian renewable energy firms. It was also observed that beyond institutional environments, the international exposure of an organization’s managers reflected in their approach to CSR. This finding on the influence of international exposure on CSR practices creates an area for further study. Insights from this paper are set to help policy makers in developing countries, CSR managers, and future researchers.Keywords: corporate social responsibility, renewable energy firms, institutional environment, social entrepreneurship
Procedia PDF Downloads 29219134 Efficacy and User Satisfaction on the Rama-Chest Cryo Arm Innovation for Bronchoscopic Cryotherapy
Authors: Chariya Laohavich
Abstract:
At the current, the trends in the lung disease at a university hospital are the treat and diagnosis by bronchoscopy. Bronchoscopic cryotherapy is a long time procedure 1-4 hours. The cryo probe is sensitive and easy to be damaged and expensive. We have this study management for protection the cryo probe, user satisfaction and qualities work. This study conducted in 4 stages: stage 1 for a survey of problems and assessment of user’s needs; stage 2 for designing and developing the Rama-chest cryo arm for a bronchoscopy process; stage 3 for test-implementing the Rama-chest cryo arm in real situations, studying its problems and obstacles, and evaluating the user satisfaction; and stage 4 for an overall assessment and improvement. The sample used in this study consisted of a total of 15 Ramathipbodi Hospital’s Bronchoscopist and bronchoscopist’s nurse who had used the Rama-chest cryo arm for bronchoscopic cryotherapy from January to June 2016. Objective: To study efficacy and user satisfaction on the Rama-chest cryo arm innovation for bronchoscopic cryotherapy. Data were collected using a Rama-chest cryo arm satisfaction assessment form and analysed based on mean and standard deviation. Result is the Rama-chest cryo arm was an innovation that accommodated during bronchoscopic cryotherapy. The subjects rated this the cryo arm as being most satisfactory (M = 4.86 ± , SD 0.48. Therefore we have developed a cryo arm that uses local material, practical and economic. Our innovation is not only flexible and sustainable development but also lean and seamless. This produced device can be used as effectively as the imported one, and thus can be eventually substituted.Keywords: efficacy, satisfaction, Rama-chest cryo arm, innovation, bronchoscopic cryotherapy
Procedia PDF Downloads 24419133 Security of Database Using Chaotic Systems
Authors: Eman W. Boghdady, A. R. Shehata, M. A. Azem
Abstract:
Database (DB) security demands permitting authorized users and prohibiting non-authorized users and intruders actions on the DB and the objects inside it. Organizations that are running successfully demand the confidentiality of their DBs. They do not allow the unauthorized access to their data/information. They also demand the assurance that their data is protected against any malicious or accidental modification. DB protection and confidentiality are the security concerns. There are four types of controls to obtain the DB protection, those include: access control, information flow control, inference control, and cryptographic. The cryptographic control is considered as the backbone for DB security, it secures the DB by encryption during storage and communications. Current cryptographic techniques are classified into two types: traditional classical cryptography using standard algorithms (DES, AES, IDEA, etc.) and chaos cryptography using continuous (Chau, Rossler, Lorenz, etc.) or discreet (Logistics, Henon, etc.) algorithms. The important characteristics of chaos are its extreme sensitivity to initial conditions of the system. In this paper, DB-security systems based on chaotic algorithms are described. The Pseudo Random Numbers Generators (PRNGs) from the different chaotic algorithms are implemented using Matlab and their statistical properties are evaluated using NIST and other statistical test-suits. Then, these algorithms are used to secure conventional DB (plaintext), where the statistical properties of the ciphertext are also tested. To increase the complexity of the PRNGs and to let pass all the NIST statistical tests, we propose two hybrid PRNGs: one based on two chaotic Logistic maps and another based on two chaotic Henon maps, where each chaotic algorithm is running side-by-side and starting from random independent initial conditions and parameters (encryption keys). The resulted hybrid PRNGs passed the NIST statistical test suit.Keywords: algorithms and data structure, DB security, encryption, chaotic algorithms, Matlab, NIST
Procedia PDF Downloads 26519132 Advanced Stability Criterion for Time-Delayed Systems of Neutral Type and Its Application
Authors: M. J. Park, S. H. Lee, C. H. Lee, O. M. Kwon
Abstract:
This paper investigates stability problem for linear systems of neutral type with time-varying delay. By constructing various Lyapunov-Krasovskii functional, and utilizing some mathematical techniques, the sufficient stability conditions for the systems are established in terms of linear matrix inequalities (LMIs), which can be easily solved by various effective optimization algorithms. Finally, some illustrative examples are given to show the effectiveness of the proposed criterion.Keywords: neutral systems, time-delay, stability, Lyapnov method, LMI
Procedia PDF Downloads 34819131 Cloud Computing: Deciding Whether It Is Easier or Harder to Defend Against Cyber Attacks
Authors: Emhemed Shaklawoon, Ibrahim Althomali
Abstract:
We propose that we identify different defense mechanisms that were used before the introduction of the cloud and compare if their protection mechanisms are still valuable and to what degree. Note that in order to defend against vulnerability, we must know how this vulnerability is abused in an attack. Only then, we will be able to recognize if it is easier or harder to defend against cyber attacks.Keywords: cloud computing, privacy, cyber attacks, defend the cloud
Procedia PDF Downloads 42319130 Time Variance and Spillover Effects between International Crude Oil Price and Ten Emerging Equity Markets
Authors: Murad A. Bein
Abstract:
This paper empirically examines the time-varying relationship and spillover effects between the international crude oil price and ten emerging equity markets, namely three oil-exporting countries (Brazil, Mexico, and Russia) and seven Central and Eastern European (CEE) countries (Bulgaria, Croatia, Czech Republic, Hungary, Poland, Romania, and Slovakia). The results revealed that there are spillover effects from oil markets into almost all emerging equity markets save Slovakia. Besides, the oil supply glut had a homogenous effect on the emerging markets, both net oil-exporting, and oil-importing countries (CEE). Further, the time variance drastically increased during financial turmoil. Indeed, the time variance remained high from 2009 to 2012 in response to aggregate demand shocks (global financial crisis and Eurozone debt crisis) and quantitative easing measures. Interestingly, the time variance was slightly higher for the oil-exporting countries than for some of the CEE countries. Decision-makers in emerging economies should therefore seek policy coordination when dealing with financial turmoil.Keywords: crude oil, spillover effects, emerging equity, time-varying, aggregate demand shock
Procedia PDF Downloads 12519129 A Probabilistic Study on Time to Cover Cracking Due to Corrosion
Authors: Chun-Qing Li, Hassan Baji, Wei Yang
Abstract:
Corrosion of steel in reinforced concrete structures is a major problem worldwide. The volume expansion of corrosion products causes concrete cover cracking, which could lead to delamination of concrete cover. The time to cover cracking plays a key role to the assessment of serviceability of reinforced concrete structures subjected to corrosion. Many analytical, numerical, and empirical models have been developed to predict the time to cracking initiation due to corrosion. In this study, a numerical model based on finite element modeling of corrosion-induced cracking process is used. In order to predict the service life based on time to cover initiation, the numerical approach is coupled with a probabilistic procedure. In this procedure, all the influential factors affecting time to cover cracking are modeled as random variables. The results show that the time to cover cracking is highly variables. It is also shown that rust product expansion ratio and the size of more porous concrete zone around the rebar are the most influential factors in predicting service life of corrosion-affected structures.Keywords: corrosion, crack width, probabilistic, service life
Procedia PDF Downloads 20719128 Impact of Reclamation on the Water Exchange in Bohai Bay
Authors: Luyao Liu, Dekui Yuan, Xu Li
Abstract:
As one of the most important bays of China, the water exchange capacity of Bohai Bay can influence the economic development and urbanization of surrounding cities. However, the rapid reclamation has influenced the weak water exchange capacity of this semi-enclosed bay in recent years. This paper sets two hydrodynamic models of Bohai Bay with two shorelines before and after reclamation. The mean value and distribution of Turn-over Time, the distribution of residual current, and the feature of the tracer path are compared. After comparison, it is found that Bohai Bay keeps these characteristics; the spending time of water exchange in the northern is longer than southern, and inshore is longer than offshore. However, the mean water exchange time becomes longer after reclamation. In addition, the material spreading is blocked because of the inwardly extending shorelines, and the direction changed from along the shoreline to towards the center after reclamation.Keywords: Bohai Bay, water exchange, reclamation, turn-over time
Procedia PDF Downloads 15219127 Design and Development of Sustained Release Floating Tablet of Stavudine
Authors: Surajj Sarode, G. Vidya Sagar, G. P. Vadnere
Abstract:
The purpose of the present study was to prolong the gastric residence time of Stavudine by developing gastric floating drug delivery system (GFDDS). Moreover, to study influence of different polymers on its release rate using gas-forming agents, like sodium bicarbonate, citric acid. Floating tablets were prepared by wet granulation method using PVP K-30 as a binder and the other polymers include Pullulan Gum, HPMC K100M, six different formulations with the varying concentrations of polymers were prepared and the tablets were evaluated in terms of their pre-compression parameters like bulk density, tapped density, Haunsner ratio, angle of repose, compressibility index, post compression physical characteristics, in vitro release, buoyancy, floating lag time (FLT), total floating time (TFT) and swelling index. All the formulations showed good floating lag time i.e. less than 3 mins. The batch containing combination of Pullulan Gum and HPMC 100M (i.e. F-6) showed total floating lag time more than 12 h., the highest swelling index among all the prepared batches. The drug release was found to follow zero order kinetics.Keywords: Suavudine, floating, total floating time (TFT), gastric residence
Procedia PDF Downloads 40019126 Modeling and Analysis of Laser Sintering Process Scanning Time for Optimal Planning and Control
Authors: Agarana Michael C., Akinlabi Esther T., Pule Kholopane
Abstract:
In order to sustain the advantages of an advanced manufacturing technique, such as laser sintering, minimization of total processing cost of the parts being produced is very important. An efficient time management would usually very important in optimal cost attainment which would ultimately result in an efficient advanced manufacturing process planning and control. During Laser Scanning Process Scanning (SLS) procedures it is possible to adjust various manufacturing parameters which are used to influence the improvement of various mechanical and other properties of the products. In this study, Modelling and mathematical analysis, including sensitivity analysis, of the laser sintering process time were carried out. The results of the analyses were represented with graphs, from where conclusions were drawn. It was specifically observed that achievement of optimal total scanning time is key for economic efficiency which is required for sustainability of the process.Keywords: modeling and analysis, optimal planning and control, laser sintering process, scanning time
Procedia PDF Downloads 9819125 Nonstationarity Modeling of Economic and Financial Time Series
Authors: C. Slim
Abstract:
Traditional techniques for analyzing time series are based on the notion of stationarity of phenomena under study, but in reality most economic and financial series do not verify this hypothesis, which implies the implementation of specific tools for the detection of such behavior. In this paper, we study nonstationary non-seasonal time series tests in a non-exhaustive manner. We formalize the problem of nonstationary processes with numerical simulations and take stock of their statistical characteristics. The theoretical aspects of some of the most common unit root tests will be discussed. We detail the specification of the tests, showing the advantages and disadvantages of each. The empirical study focuses on the application of these tests to the exchange rate (USD/TND) and the Consumer Price Index (CPI) in Tunisia, in order to compare the Power of these tests with the characteristics of the series.Keywords: stationarity, unit root tests, economic time series, ADF tests
Procedia PDF Downloads 423