Search results for: line search algorithm
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7502

Search results for: line search algorithm

6362 Starting Characteristic Analysis of LSPM for Pumping System Considering Demagnetization

Authors: Subrato Saha, Yun-Hyun Cho

Abstract:

This paper presents the design process of a high performance 3-phase 3.7 kW 2-pole line start permanent magnet synchronous motor for pumping system. A method was proposed to study the starting torque characteristics considering line start with high inertia load. A d-q model including cage was built to study the synchronization capability. Time-stepping finite element method analysis was utilized to accurately predict the dynamic and transient performance, efficiency, starting current, speed curve and, etc. Considering the load torque of pumps during starting stage, the rotor bar was designed with minimum demagnetization of permanent magnet caused by huge starting current.

Keywords: LSPM, starting analysis, demagnetization, FEA, pumping system

Procedia PDF Downloads 458
6361 Freshwater Cyanobacterial Bioactive Insights: Planktothricoides raciorskii Compounds vs. Green Synthesized Silver Nanoparticles: Characterization, in vitro Cytotoxicity, and Antibacterial Exploration

Authors: Sujatha Edla

Abstract:

Introduction: New compounds and possible uses for the bioactive substances produced by freshwater cyanobacteria are constantly being discovered through research. Certain molecules are hazardous to the environment and human health, but others have potential applications in industry, biotechnology, and pharmaceuticals. These discoveries advance our knowledge of the varied functions these microbes perform in different ecosystems. Cyanobacterial silver nanoparticles (AgNPs) have special qualities and possible therapeutic advantages, which make them very promising for a range of medicinal uses. Aim: In our study; the attention was focused on the analysis and characterization of bioactive compounds extracted from freshwater cyanobacteria Planktothricoides raciorskii and its comparative study on Cyanobacteria-mediated silver nanoparticles synthesized by cell-free extract of Planktothricoides raciorskii. Material and Methods: A variety of bioactive secondary metabolites have been extracted, purified, and identified from cyanobacterial species using column chromatography, FTIR, and GC-MS/MS chromatography techniques and evaluated for antibacterial and cytotoxic studies, where the Cyanobacterial silver nanoparticles (CSNPs) were characterized by UV-Vis spectroscopy, scanning electron microscopy (SEM), transmission electron microscopy (TEM), and Fourier transform infrared (FTIR) analysis and were further tested for antibacterial and cytotoxic efficiency. Results: The synthesis of CSNPs was confirmed through visible color change and shift of peaks at 430–445 nm by UV-Vis spectroscopy. The size of CSNPs was between 22 and 34 nm and oval-shaped which were confirmed by SEM and TEM analyses. The FTIR spectra showed a new peak at the range of 3,400–3,460 cm−1 compared to the control, confirming the reduction of silver nitrate. The antibacterial activity of both crude bioactive compound extract and CSNPs showed remarkable activity with Zone of inhibition against E. coli with 9.5mm and 10.2mm, 13mm and 14.5mm against S. paratyphi, 9.2mm and 9.8mm zone of inhibition against K. pneumonia by both crude extract and CSNPs, respectively. The cytotoxicity as evaluated by extracts of Planktothricoides raciorskii against MCF7-Human Breast Adenocarcinoma cell line and HepG2- Human Hepatocellular Carcinoma cell line employing MTT assay gave IC50 value of 47.18ug/ml, 110.81ug/ml against MCF7cell line and HepG2 cell line, respectively. The cytotoxic evaluation of Planktothricoides raciorskii CSNPs against the MCF7cell line was 43.37 ug/ml and 20.88 ug/ml against the HepG2 cell line. Our ongoing research in this field aims to uncover the full therapeutic potential of cyanobacterial silver nanoparticles and address any associated challenges.

Keywords: cyanobacteria, silvernanoparticles, pharmaceuticals, bioactive compounds, cytotoxic

Procedia PDF Downloads 42
6360 Cytotoxic Activity of Extracts from Hibiscus sabdariffa Leaves against Women’s Cancer Cell Lines

Authors: Patsorn Worawattananutai, Srisopa Ruangnoo, Arunporn Itharat

Abstract:

Hibiscus sabdariffa (HS) leaves are vegetables which are extensively used as blood tonic and laxatives in Thai traditional medicine. They are popularly used as healthy sour soup for prevention of chronic diseases such as cancer. Therefore, the cytotoxic activity of different extracts of fresh and dried Hibiscus sabdariffa leaves were investigated via the sulforhodamine B (SRB) assay against three types of women’s cancer cell lines, namely the human cervical adenocarcinoma cell line (HeLa), the human ovarian adenocarcinoma cell line (SKOV-3), and the human breast adenocarcinoma cell line (MCF-7). Extraction methods were squeezing, boiling with water and maceration with 95% or 50% ethanol. The 95% ethanolic extracts of Hibiscus sabdariffa dry leaves (HSDE95) showed the highest cytotoxicity against all types of women’s cancer cell lines with the IC50 values in range 7.51±0.33 to 12.13±1.85 µg/ml. Its IC50 values against SKOV-3, HeLa and MCF-7 were 7.51±0.33, 9.44±1.41 and 12.13±1.85 µg/ml, respectively. In these results, this extract can be classified as “active” according to the NCI guideline which indicated that IC50 values of the active cytotoxic plant extracts have to be beneath 20 µg/ml. Thus, HSDE95 was concluded to be a potent cytotoxic drug for all women’s cancer cells. This extract should be further investigated to isolate active compounds against women’s cancer cells.

Keywords: breast adenocarcinoma, cervical adenocarcinoma, cytotoxic activity, Hibiscus sabdariffa, ovarian adenocarcinoma

Procedia PDF Downloads 583
6359 Mitigation of Cascading Power Outage Caused Power Swing Disturbance Using Real-time DLR Applications

Authors: Dejenie Birile Gemeda, Wilhelm Stork

Abstract:

The power system is one of the most important systems in modern society. The existing power system is approaching the critical operating limits as views of several power system operators. With the increase of load demand, high capacity and long transmission networks are widely used to meet the requirement. With the integration of renewable energies such as wind and solar, the uncertainty, intermittence bring bigger challenges to the operation of power systems. These dynamic uncertainties in the power system lead to power disturbances. The disturbances in a heavily stressed power system cause distance relays to mal-operation or false alarms during post fault power oscillations. This unintended operation of these relays may propagate and trigger cascaded trappings leading to total power system blackout. This is due to relays inability to take an appropriate tripping decision based on ensuing power swing. According to the N-1 criterion, electric power systems are generally designed to withstand a single failure without causing the violation of any operating limit. As a result, some overloaded components such as overhead transmission lines can still work for several hours under overload conditions. However, when a large power swing happens in the power system, the settings of the distance relay of zone 3 may trip the transmission line with a short time delay, and they will be acting so quickly that the system operator has no time to respond and stop the cascading. Misfiring of relays in absence of fault due to power swing may have a significant loss in economic performance, thus a loss in revenue for power companies. This research paper proposes a method to distinguish stable power swing from unstable using dynamic line rating (DLR) in response to power swing or disturbances. As opposed to static line rating (SLR), dynamic line rating support effective mitigation actions against propagating cascading outages in a power grid. Effective utilization of existing transmission lines capacity using machine learning DLR predictions will improve the operating point of distance relay protection, thus reducing unintended power outages due to power swing.

Keywords: blackout, cascading outages, dynamic line rating, power swing, overhead transmission lines

Procedia PDF Downloads 123
6358 Simulation of Acoustic Properties of Borate and Tellurite Glasses

Authors: M. S. Gaafar, S. Y. Marzouk, I. S. Mahmoud, S. Al-Zobaidi

Abstract:

Makishima and Mackenzie model was used to simulation of acoustic properties (longitudinal and shear ultrasonic wave velocities, elastic moduli theoretically for many tellurite and borate glasses. The model was proposed mainly depending on the values of the experimentally measured density, which are obtained before. In this search work, we are trying to obtain the values of densities of amorphous glasses (as the density depends on the geometry of the network structure of these glasses). In addition, the problem of simulating the slope of linear regression between the experimentally determined bulk modulus and the product of packing density and experimental Young's modulus, were solved in this search work. The results showed good agreement between the experimentally measured values of densities and both ultrasonic wave velocities, and those theoretically determined.

Keywords: glasses, ultrasonic wave velocities, elastic modulus, Makishima & Mackenzie Model

Procedia PDF Downloads 367
6357 Social Media Idea Ontology: A Concept for Semantic Search of Product Ideas in Customer Knowledge through User-Centered Metrics and Natural Language Processing

Authors: Martin H¨ausl, Maximilian Auch, Johannes Forster, Peter Mandl, Alexander Schill

Abstract:

In order to survive on the market, companies must constantly develop improved and new products. These products are designed to serve the needs of their customers in the best possible way. The creation of new products is also called innovation and is primarily driven by a company’s internal research and development department. However, a new approach has been taking place for some years now, involving external knowledge in the innovation process. This approach is called open innovation and identifies customer knowledge as the most important source in the innovation process. This paper presents a concept of using social media posts as an external source to support the open innovation approach in its initial phase, the Ideation phase. For this purpose, the social media posts are semantically structured with the help of an ontology and the authors are evaluated using graph-theoretical metrics such as density. For the structuring and evaluation of relevant social media posts, we also use the findings of Natural Language Processing, e. g. Named Entity Recognition, specific dictionaries, Triple Tagger and Part-of-Speech-Tagger. The selection and evaluation of the tools used are discussed in this paper. Using our ontology and metrics to structure social media posts enables users to semantically search these posts for new product ideas and thus gain an improved insight into the external sources such as customer needs.

Keywords: idea ontology, innovation management, semantic search, open information extraction

Procedia PDF Downloads 172
6356 Securitization of Illegal Fishing Cases in Natuna Waters by Indonesian Government: Study Case of Chinese Vessels Shootouts 2016

Authors: Ray Maximillian, Idil Syawfi

Abstract:

Indonesia’s Exclusive Economic Zone and the infamous China’s nine-dash line are intersected in Natuna waters. Even though from Indonesia perspective, that line does not possess any legal basis, China treat that line as their national boundaries, therefore allowing Chinese fishermen to fish in the area. Under President Joko Widodo leadership, Indonesia which now focusing to suppress illegal fishing cases while emphasizing their maritime sovereignty is facing an imminent threat from China’s presence in Natuna. Tension between these countries spiked after three incident happened on 2016, especially after Indonesian navy shot Chinese fishermen vessel that suspected doing illegal fishing activity. This action seen as an attempt to secure Indonesia’s law enforcement in their waters after several months before such attempt was intervened by Chinese coast guard. Indonesia tries to securitize this issue to justify the shooting they done to Chinese vessels. In the process of securitization, it is imperative to identify the existential threat that leads to implementation of emergency measures which responded by units in the cases. Chinese coast guard presence in Natuna perceived as an existential threat to Indonesia, therefore, responded by shooting to Chinese vessels on the next encounter. This action then responded by Chinese government who said that there is overlapping claim between them and Indonesia in Natuna.

Keywords: China, illegal fishing, Indonesia, natuna, securitization

Procedia PDF Downloads 199
6355 A Weighted Sum Particle Swarm Approach (WPSO) Combined with a Novel Feasibility-Based Ranking Strategy for Constrained Multi-Objective Optimization of Compact Heat Exchangers

Authors: Milad Yousefi, Moslem Yousefi, Ricarpo Poley, Amer Nordin Darus

Abstract:

Design optimization of heat exchangers is a very complicated task that has been traditionally carried out based on a trial-and-error procedure. To overcome the difficulties of the conventional design approaches especially when a large number of variables, constraints and objectives are involved, a new method based on a well-stablished evolutionary algorithm, particle swarm optimization (PSO), weighted sum approach and a novel constraint handling strategy is presented in this study. Since, the conventional constraint handling strategies are not effective and easy-to-implement in multi-objective algorithms, a novel feasibility-based ranking strategy is introduced which is both extremely user-friendly and effective. A case study from industry has been investigated to illustrate the performance of the presented approach. The results show that the proposed algorithm can find the near pareto-optimal with higher accuracy when it is compared to conventional non-dominated sorting genetic algorithm II (NSGA-II). Moreover, the difficulties of a trial-and-error process for setting the penalty parameters is solved in this algorithm.

Keywords: Heat exchanger, Multi-objective optimization, Particle swarm optimization, NSGA-II Constraints handling.

Procedia PDF Downloads 541
6354 Ultra-Reliable Low Latency V2X Communication for Express Way Using Multiuser Scheduling Algorithm

Authors: Vaishali D. Khairnar

Abstract:

The main aim is to provide lower-latency and highly reliable communication facilities for vehicles in the automobile industry; vehicle-to-everything (V2X) communication basically intends to increase expressway road security and its effectiveness. The Ultra-Reliable Low-Latency Communications (URLLC) algorithm and cellular networks are applied in combination with Mobile Broadband (MBB). This is particularly used in express way safety-based driving applications. Expressway vehicle drivers (humans) will communicate in V2X systems using the sixth-generation (6G) communication systems which have very high-speed mobility features. As a result, we need to determine how to ensure reliable and consistent wireless communication links and improve the quality to increase channel gain, which is becoming a challenge that needs to be addressed. To overcome this challenge, we proposed a unique multi-user scheduling algorithm for ultra-massive multiple-input multiple-output (MIMO) systems using 6G. In wideband wireless network access in case of high traffic and also in medium traffic conditions, moreover offering quality-of-service (QoS) to distinct service groups with synchronized contemporaneous traffic on the highway like the Mumbai-Pune expressway becomes a critical problem. Opportunist MAC (OMAC) is a way of proposing communication across a wireless communication link that can change in space and time and might overcome the above-mentioned challenge. Therefore, a multi-user scheduling algorithm is proposed for MIMO systems using a cross-layered MAC protocol to achieve URLLC and high reliability in V2X communication.

Keywords: ultra-reliable low latency communications, vehicle-to-everything communication, multiple-input multiple-output systems, multi-user scheduling algorithm

Procedia PDF Downloads 69
6353 Quantitative Analysis of Multiprocessor Architectures for Radar Signal Processing

Authors: Deepak Kumar, Debasish Deb, Reena Mamgain

Abstract:

Radar signal processing requires high number crunching capability. Most often this is achieved using multiprocessor platform. Though multiprocessor platform provides the capability of meeting the real time computational challenges, the architecture of the same along with mapping of the algorithm on the architecture plays a vital role in efficiently using the platform. Towards this, along with standard performance metrics, few additional metrics are defined which helps in evaluating the multiprocessor platform along with the algorithm mapping. A generic multiprocessor architecture can not suit all the processing requirements. Depending on the system requirement and type of algorithms used, the most suitable architecture for the given problem is decided. In the paper, we study different architectures and quantify the different performance metrics which enables comparison of different architectures for their merit. We also carried out case study of different architectures and their efficiency depending on parallelism exploited on algorithm or data or both.

Keywords: radar signal processing, multiprocessor architecture, efficiency, load imbalance, buffer requirement, pipeline, parallel, hybrid, cluster of processors (COPs)

Procedia PDF Downloads 398
6352 Evaluation of ROS Mediated Apoptosis Induced by Tuber Extract of Dioscorea Bulbifera on Human Breast Adenocarcinoma

Authors: Debasmita Dubey, Rajesh Kumar Meher, Smruti Pragya Samal, Pradeep Kumar Naik

Abstract:

Background: To determine antioxidant properties and anticancer activity by ROS and mitochondrial transmembrane potential mediated apoptosis against MCF7, MDA-MB-231, cell line. Methods: Leaf sample was extracted using methanol by microwave digestion technique. The antioxidant properties of the methanolic extract were determined by a DPPH scavenging assay. In vitro anticancer activity, mitochondrial transmembrane potential, apoptosis activity and DNA fragmentation study, as well as intracellular ROS activity of most potential leaf extract, were also determined by using the MDA-MB-231cell line. In vivo animal toxicity study was carried out using mice model. Results: Methanolic leaf extract has shown the highest antioxidant, as well as anticancer activity, is based on the assay conducted. For the identification of active phytochemicals from methanolic extract, High-resolution mass spectroscopy-LCMS was used. In vitro cytotoxicity study against MCF-7 and MDA-MB-231 cell line and IC 50 value was found to be 37.5µg/ml. From histopathological studies, no toxicity in liver and kidney tissue was identified. Conclusion: This plant tuber can be used as a regular diet to reduce the chance of breast cancer. Further, more studies should be conducted to isolate and identify the responsible compound.

Keywords: human breast adenocarcinoma, ROS, mitochondrial transmembrane, apoptosis

Procedia PDF Downloads 100
6351 Multiobjective Economic Dispatch Using Optimal Weighting Method

Authors: Mandeep Kaur, Fatehgarh Sahib

Abstract:

The purpose of economic load dispatch is to allocate the required load demand between the available generation units such that the cost of operation is minimized. It is an optimization problem to find the most economical schedule of the generating units while satisfying load demand and operational constraints. The multiobjective optimization problem in which the engineer’s goal is to maximize or minimize not a single objective function but several objective functions simultaneously. The purpose of multiobjective problems in the mathematical programming framework is to optimize the different objective functions. Many approaches and methods have been proposed in recent years to solve multiobjective optimization problems. Weighting method has been applied to convert multiobjective optimization problems into scalar optimization. MATLAB 7.10 has been used to write the code for the complete algorithm with the help of genetic algorithm (GA). The validity of the proposed method has been demonstrated on a three-unit power system.

Keywords: economic load dispatch, genetic algorithm, generating units, multiobjective optimization, weighting method

Procedia PDF Downloads 131
6350 Speech Intelligibility Improvement Using Variable Level Decomposition DWT

Authors: Samba Raju, Chiluveru, Manoj Tripathy

Abstract:

Intelligibility is an essential characteristic of a speech signal, which is used to help in the understanding of information in speech signal. Background noise in the environment can deteriorate the intelligibility of a recorded speech. In this paper, we presented a simple variance subtracted - variable level discrete wavelet transform, which improve the intelligibility of speech. The proposed algorithm does not require an explicit estimation of noise, i.e., prior knowledge of the noise; hence, it is easy to implement, and it reduces the computational burden. The proposed algorithm decides a separate decomposition level for each frame based on signal dominant and dominant noise criteria. The performance of the proposed algorithm is evaluated with speech intelligibility measure (STOI), and results obtained are compared with Universal Discrete Wavelet Transform (DWT) thresholding and Minimum Mean Square Error (MMSE) methods. The experimental results revealed that the proposed scheme outperformed competing methods

Keywords: discrete wavelet transform, speech intelligibility, STOI, standard deviation

Procedia PDF Downloads 129
6349 Ground Water Monitoring Using High-Resolution Fiber Optics Cable Sensors (FOCS)

Authors: Sayed Isahaq Hossain, K. T. Chang, Moustapha Ndour

Abstract:

Inference of the phreatic line through earth dams is of paramount importance because it could be directly associated with piping phenomena which may lead to the dam failure. Normally in the field, the instrumentations such as ‘diver’ and ‘standpipe’ are to be used to identify the seepage conditions which only provide point data with a fair amount of interpolation or assumption. Here in this paper, we employed high-resolution fiber optic cable sensors (FOCS) based on Raman Scattering in order to obtain a very accurate phreatic line and seepage profile. Unlike the above-mention devices which pinpoint the water level location, this kind of Distributed Fiber Optics Sensing gives us more reliable information due to its inherent characteristics of continuous measurement.

Keywords: standpipe, diver, FOCS, monitoring, Raman scattering

Procedia PDF Downloads 337
6348 Using Support Vector Machines for Measuring Democracy

Authors: Tommy Krieger, Klaus Gruendler

Abstract:

We present a novel approach for measuring democracy, which enables a very detailed and sensitive index. This method is based on Support Vector Machines, a mathematical algorithm for pattern recognition. Our implementation evaluates 188 countries in the period between 1981 and 2011. The Support Vector Machines Democracy Index (SVMDI) is continuously on the 0-1-Interval and robust to variations in the numerical process parameters. The algorithm introduced here can be used for every concept of democracy without additional adjustments, and due to its flexibility it is also a valuable tool for comparison studies.

Keywords: democracy, democracy index, machine learning, support vector machines

Procedia PDF Downloads 355
6347 Effect of Copper Complexes on Human Colon Carcinoma Cell Line and Human Breast Carcinoma Cell Line

Authors: Katarína Koňariková, Georgios A. Perdikaris, Lucia Andrezálová, Zdeňka Ďuračková, Lucia Laubertová, Helena Gbelcová, Ingrid Žitňanová

Abstract:

Introduction: The continuous demand for new anti-cancer drugs has stimulated chemotherapeutic research based on the use of essential metalloelements with the aim to develop potential drugs with lower toxicity and higher antiproliferative activity against tumors. Copper(II) and its complexes play an important role as suitable species for antiproliferative tests. Objectives: The central objective of the current study was to investigate the potential in vitro anti-proliferative effects of N-salicylidene-L-glutamato copper (II) complexes and molecular mechanism of apoptosis induced by tested complexes. In our project we tested N-salicylidene-L-glutamato copper (II) complexes ZK1 - [Cu(N-salicylidene-L-glutamato)(H2O)2].H2O; MK0 - ([Cu2(N-sal-D,L-glu)2(isoquinoline)2].2H2O); MK1 - [Cu(N-salicylidene-5-methyl-L-glutamato)(H2O)].H2O; MK3 - transbis(ethanol)tetrakis(imidazol)Cu(II)(2+)bis(N-salicylidene-D,L-glutamato-N,O)-KO:KO´-(imidazol); MK5 - [Cu(N-salicylidene-D,L- glutamato)(2-methylimidazol] at concentration range 0.001-100 µmol/L against human colon carcinoma cell line HT-29 and human breast carcinoma cell line MCF-7. Methods: Viability was assessed by direct counting of 0.4% trypan blue dye-excluding cells after 24, 48 and 72 hour cultivations with or without copper complex and by MTT assay. To analyze the type of cell death and its mechanism induced by our copper complex we used different methods. To distinguish apoptosis from necrosis we used electrophoretic analysis, to study the activity of caspases 8 and 9 – luminometric analysis and caspase activity 3 colorimetric assay. Results: The observed anti-proliferative effect of the copper complexes appeared to be dose-, time- and cell line- dependent. Human colon carcinoma cells HT-29 appeared to be more sensitive to the complex MK0 ([Cu2(N-sal-D,L-glu)2(isoquinoline)2].2H2O) than to ZK1 ([Cu(N-salicylidene-L-glutamato)(H2O)2].H2O) and MK1 ([Cu(N-salicylidene-5-methyl-L-glutamato)(H2O)].H2O)). Human colon carcinoma cells HT-29 appeared to be more sensitive to the complex than human breast carcinoma cells MCF-7. IC50 decreased with time of incubation (24, 48 and 72h) for HT-29, but increased for MCF-7. By electrophoresis we found apoptotic cell death induced by our copper complexes in HT-29 at concentrations 1, 10, 50 and 100 µmol/L after 48h (ZK1) and 72h (MK0, MK1) and in MCF-7 we did not find apoptosis. We also studied molecular mechanism of apoptosis in HT-29 induced by copper complexes. We found active caspase 9 in HT-29 after ZK1 ([Cu(N-salicylidene-L-glutamato)(H2O)2].H2O) and MK1 ([Cu(N-salicylidene-5-methyl-L-glutamato)(H2O)].H2O)) influence and active caspase 8 after MK0 ([Cu2(N-sal-D,L-glu)2(isoquinoline)2].2H2O) influence. Conclusion: Our copper complexes showed cytotoxic activities against human colon carcinoma cells HT-29 and breast cancer cell line MCF-7 in vitro. Apoptosis was activated by mitochondrial pathway (intrinsic pathway) in case of ZK1 [Cu(N-salicylidene-L-glutamato)(H2O)2].H2O; MK1 [Cu(N-salicylidene-5-methyl-L-glutamato)(H2O)].H2O; MK3 - transbis(ethanol)tetrakis(imidazol)Cu(II)(2+)bis(N-salicylidene-D,L-glutamato-N,O)-KO:KO´-(imidazol) and MK5 - [Cu(N-salicylidene-D,L- glutamato)(2-methylimidazol] copper complexes and by death receptors (extrinsic pathway) in case of MK0 [Cu2(N-sal-D,L-glu)2(isoquinoline)2].2H2O copper complex in HT-29.

Keywords: apoptosis, copper complex, cancer, carcinoma cell line

Procedia PDF Downloads 282
6346 Veering Pattern in Human Walking in Sighted and Blindfolded Conditions

Authors: Triloki Prasad, Subhankar Ghosh, Asis Goswami

Abstract:

The information received from visual organ plays an important role in human locomotion and human beings generally veer from the straight line in the absence of visual cue. Since in case of visually impaired persons this support is unavailable they are expected to have a different type of locomotion behaviour than the sighted persons. Higher degree of veering can result in accident or injury during indoor and outdoor activities. Hence, it is important to know the degree of veering that may happen in case of a sighted individual loosing the visual input. The present study was conducted on fifty three volunteers who walked with open and closed eyes, at their comfortable pace, in a grid marked area of 17m by 10m space. The volunteers had to walk in a straight line from a central starting point during three trials and their walking path was marked with a pair of sponge absorbed with three different colours. All volunteers had walked expectedly in straight line during open eye condition but had varied degree of veering during closed eye state. The correlation between the first step side and the side of deviation was not significant in closed eye condition. The number of steps taken in open eye and closed eye condition were significantly different while travelling similar distances. This study reveals that sighted persons become cautious during walking if the visual cue is not available and they reduce the step length so there is increase in step number.

Keywords: Closed eye, Open eye, Footprint, Veering

Procedia PDF Downloads 193
6345 An Algorithm Based on Control Indexes to Increase the Quality of Service on Cellular Networks

Authors: Rahman Mofidi, Sina Rahimi, Farnoosh Darban

Abstract:

Communication plays a key role in today’s world, and to support it, the quality of service has the highest priority. It is very important to differentiate between traffic based on priority level. Some traffic classes should be a higher priority than other classes. It is also necessary to give high priority to customers who have more payment for better service, however, without influence on other customers. So to realize that, we will require effective quality of service methods. To ensure the optimal performance of the network in accordance with the quality of service is an important goal for all operators in the mobile network. In this work, we propose an algorithm based on control parameters which it’s based on user feedback that aims at minimizing the access to system transmit power and thus improving the network key performance indicators and increasing the quality of service. This feedback that is known as channel quality indicator (CQI) indicates the received signal level of the user. We aim at proposing an algorithm in control parameter criterion to study improving the quality of service and throughput in a cellular network at the simulated environment. In this work we tried to parameter values have close to their actual level. Simulation results show that the proposed algorithm improves the system throughput and thus satisfies users' throughput and improves service to set up a successful call.

Keywords: quality of service, key performance indicators, control parameter, channel quality indicator

Procedia PDF Downloads 181
6344 A Multilayer Perceptron Neural Network Model Optimized by Genetic Algorithm for Significant Wave Height Prediction

Authors: Luis C. Parra

Abstract:

The significant wave height prediction is an issue of great interest in the field of coastal activities because of the non-linear behavior of the wave height and its complexity of prediction. This study aims to present a machine learning model to forecast the significant wave height of the oceanographic wave measuring buoys anchored at Mooloolaba of the Queensland Government Data. Modeling was performed by a multilayer perceptron neural network-genetic algorithm (GA-MLP), considering Relu(x) as the activation function of the MLPNN. The GA is in charge of optimized the MLPNN hyperparameters (learning rate, hidden layers, neurons, and activation functions) and wrapper feature selection for the window width size. Results are assessed using Mean Square Error (MSE), Root Mean Square Error (RMSE), and Mean Absolute Error (MAE). The GAMLPNN algorithm was performed with a population size of thirty individuals for eight generations for the prediction optimization of 5 steps forward, obtaining a performance evaluation of 0.00104 MSE, 0.03222 RMSE, 0.02338 MAE, and 0.71163% of MAPE. The results of the analysis suggest that the MLPNNGA model is effective in predicting significant wave height in a one-step forecast with distant time windows, presenting 0.00014 MSE, 0.01180 RMSE, 0.00912 MAE, and 0.52500% of MAPE with 0.99940 of correlation factor. The GA-MLP algorithm was compared with the ARIMA forecasting model, presenting better performance criteria in all performance criteria, validating the potential of this algorithm.

Keywords: significant wave height, machine learning optimization, multilayer perceptron neural networks, evolutionary algorithms

Procedia PDF Downloads 89
6343 A Genetic Algorithm Based Sleep-Wake up Protocol for Area Coverage in WSNs

Authors: Seyed Mahdi Jameii, Arash Nikdel, Seyed Mohsen Jameii

Abstract:

Energy efficiency is an important issue in the field of Wireless Sensor Networks (WSNs). So, minimizing the energy consumption in this kind of networks should be an essential consideration. Sleep/wake scheduling mechanism is an efficient approach to handling this issue. In this paper, we propose a Genetic Algorithm-based Sleep-Wake up Area Coverage protocol called GA-SWAC. The proposed protocol puts the minimum of nodes in active mode and adjusts the sensing radius of each active node to decrease the energy consumption while maintaining the network’s coverage. The proposed protocol is simulated. The results demonstrate the efficiency of the proposed protocol in terms of coverage ratio, number of active nodes and energy consumption.

Keywords: wireless sensor networks, genetic algorithm, coverage, connectivity

Procedia PDF Downloads 497
6342 Nurse-Led Codes: Practical Application in the Emergency Department during a Global Pandemic

Authors: F. DelGaudio, H. Gill

Abstract:

Resuscitation during cardiopulmonary (CPA) arrest is dynamic, high stress, high acuity situation, which can easily lead to communication breakdown, and errors. The care of these high acuity patients has also been shown to increase physiologic stress and task saturation of providers, which can negatively impact the care being provided. These difficulties are further complicated during a global pandemic and pose a significant safety risk to bedside providers. Nurse-led codes are a relatively new concept that may be a potential solution for alleviating some of these difficulties. An experienced nurse who has completed advanced cardiac life support (ACLS), and additional training, assumed the responsibility of directing the mechanics of the appropriate ACLS algorithm. This was done in conjunction with a physician who also acted as a physician leader. The additional nurse-led code training included a multi-disciplinary in situ simulation of a CPA on a suspected COVID-19 patient. During the CPA, the nurse leader’s responsibilities include: ensuring adequate compression depth and rate, minimizing interruptions in chest compressions, the timing of rhythm/pulse checks, and appropriate medication administration. In addition, the nurse leader also functions as a last line safety check for appropriate personal protective equipment and limiting exposure of staff. The use of nurse-led codes for CPA has shown to decrease the cognitive overload and task saturation for the physician, as well as limiting the number of staff being exposed to a potentially infectious patient. The real-world application has allowed physicians to perform and oversee high-risk procedures such as intubation, line placement, and point of care ultrasound, without sacrificing the integrity of the resuscitation. Nurse-led codes have also given the physician the bandwidth to review pertinent medical history, advanced directives, determine reversible causes, and have the end of life conversations with family. While there is a paucity of research on the effectiveness of nurse-led codes, there are many potentially significant benefits. In addition to its value during a pandemic, it may also be beneficial during complex circumstances such as extracorporeal cardiopulmonary resuscitation.

Keywords: cardiopulmonary arrest, COVID-19, nurse-led code, task saturation

Procedia PDF Downloads 130
6341 Hand Symbol Recognition Using Canny Edge Algorithm and Convolutional Neural Network

Authors: Harshit Mittal, Neeraj Garg

Abstract:

Hand symbol recognition is a pivotal component in the domain of computer vision, with far-reaching applications spanning sign language interpretation, human-computer interaction, and accessibility. This research paper discusses the approach with the integration of the Canny Edge algorithm and convolutional neural network. The significance of this study lies in its potential to enhance communication and accessibility for individuals with hearing impairments or those engaged in gesture-based interactions with technology. In the experiment mentioned, the data is manually collected by the authors from the webcam using Python codes, to increase the dataset augmentation, is applied to original images, which makes the model more compatible and advanced. Further, the dataset of about 6000 coloured images distributed equally in 5 classes (i.e., 1, 2, 3, 4, 5) are pre-processed first to gray images and then by the Canny Edge algorithm with threshold 1 and 2 as 150 each. After successful data building, this data is trained on the Convolutional Neural Network model, giving accuracy: 0.97834, precision: 0.97841, recall: 0.9783, and F1 score: 0.97832. For user purposes, a block of codes is built in Python to enable a window for hand symbol recognition. This research, at its core, seeks to advance the field of computer vision by providing an advanced perspective on hand sign recognition. By leveraging the capabilities of the Canny Edge algorithm and convolutional neural network, this study contributes to the ongoing efforts to create more accurate, efficient, and accessible solutions for individuals with diverse communication needs.

Keywords: hand symbol recognition, computer vision, Canny edge algorithm, convolutional neural network

Procedia PDF Downloads 43
6340 Transmission Line Protection Challenges under High Penetration of Renewable Energy Sources and Proposed Solutions: A Review

Authors: Melake Kuflom

Abstract:

European power networks involve the use of multiple overhead transmission lines to construct a highly duplicated system that delivers reliable and stable electrical energy to the distribution level. The transmission line protection applied in the existing GB transmission network are normally independent unit differential and time stepped distance protection schemes, referred to as main-1 & main-2 respectively, with overcurrent protection as a backup. The increasing penetration of renewable energy sources, commonly referred as “weak sources,” into the power network resulted in the decline of fault level. Traditionally, the fault level of the GB transmission network has been strong; hence the fault current contribution is more than sufficient to ensure the correct operation of the protection schemes. However, numerous conventional coal and nuclear generators have been or about to shut down due to the societal requirement for CO2 emission reduction, and this has resulted in a reduction in the fault level on some transmission lines, and therefore an adaptive transmission line protection is required. Generally, greater utilization of renewable energy sources generated from wind or direct solar energy results in a reduction of CO2 carbon emission and can increase the system security and reliability but reduces the fault level, which has an adverse effect on protection. Consequently, the effectiveness of conventional protection schemes under low fault levels needs to be reviewed, particularly for future GB transmission network operating scenarios. The proposed paper will evaluate the transmission line challenges under high penetration of renewable energy sources andprovides alternative viable protection solutions based on the problem observed. The paper will consider the assessment ofrenewable energy sources (RES) based on a fully rated converter technology. The DIgSILENT Power Factory software tool will be used to model the network.

Keywords: fault level, protection schemes, relay settings, relay coordination, renewable energy sources

Procedia PDF Downloads 179
6339 Computer-Aided Detection of Liver and Spleen from CT Scans using Watershed Algorithm

Authors: Belgherbi Aicha, Bessaid Abdelhafid

Abstract:

In the recent years a great deal of research work has been devoted to the development of semi-automatic and automatic techniques for the analysis of abdominal CT images. The first and fundamental step in all these studies is the semi-automatic liver and spleen segmentation that is still an open problem. In this paper, a semi-automatic liver and spleen segmentation method by the mathematical morphology based on watershed algorithm has been proposed. Our algorithm is currency in two parts. In the first, we seek to determine the region of interest by applying the morphological to extract the liver and spleen. The second step consists to improve the quality of the image gradient. In this step, we propose a method for improving the image gradient to reduce the over-segmentation problem by applying the spatial filters followed by the morphological filters. Thereafter we proceed to the segmentation of the liver, spleen. The aim of this work is to develop a method for semi-automatic segmentation liver and spleen based on watershed algorithm, improve the accuracy and the robustness of the liver and spleen segmentation and evaluate a new semi-automatic approach with the manual for liver segmentation. To validate the segmentation technique proposed, we have tested it on several images. Our segmentation approach is evaluated by comparing our results with the manual segmentation performed by an expert. The experimental results are described in the last part of this work. The system has been evaluated by computing the sensitivity and specificity between the semi-automatically segmented (liver and spleen) contour and the manually contour traced by radiological experts. Liver segmentation has achieved the sensitivity and specificity; sens Liver=96% and specif Liver=99% respectively. Spleen segmentation achieves similar, promising results sens Spleen=95% and specif Spleen=99%.

Keywords: CT images, liver and spleen segmentation, anisotropic diffusion filter, morphological filters, watershed algorithm

Procedia PDF Downloads 309
6338 Fast Fourier Transform-Based Steganalysis of Covert Communications over Streaming Media

Authors: Jinghui Peng, Shanyu Tang, Jia Li

Abstract:

Steganalysis seeks to detect the presence of secret data embedded in cover objects, and there is an imminent demand to detect hidden messages in streaming media. This paper shows how a steganalysis algorithm based on Fast Fourier Transform (FFT) can be used to detect the existence of secret data embedded in streaming media. The proposed algorithm uses machine parameter characteristics and a network sniffer to determine whether the Internet traffic contains streaming channels. The detected streaming data is then transferred from the time domain to the frequency domain through FFT. The distributions of power spectra in the frequency domain between original VoIP streams and stego VoIP streams are compared in turn using t-test, achieving the p-value of 7.5686E-176 which is below the threshold. The results indicate that the proposed FFT-based steganalysis algorithm is effective in detecting the secret data embedded in VoIP streaming media.

Keywords: steganalysis, security, Fast Fourier Transform, streaming media

Procedia PDF Downloads 125
6337 A Memetic Algorithm Approach to Clustering in Mobile Wireless Sensor Networks

Authors: Masood Ahmad, Ataul Aziz Ikram, Ishtiaq Wahid

Abstract:

Wireless sensor network (WSN) is the interconnection of mobile wireless nodes with limited energy and memory. These networks can be deployed formany critical applications like military operations, rescue management, fire detection and so on. In flat routing structure, every node plays an equal role of sensor and router. The topology may change very frequently due to the mobile nature of nodes in WSNs. The topology maintenance may produce more overhead messages. To avoid topology maintenance overhead messages, an optimized cluster based mobile wireless sensor network using memetic algorithm is proposed in this paper. The nodes in this network are first divided into clusters. The cluster leaders then transmit data to that base station. The network is validated through extensive simulation study. The results show that the proposed technique has superior results compared to existing techniques.

Keywords: WSN, routing, cluster based, meme, memetic algorithm

Procedia PDF Downloads 461
6336 Enhanced Bit Error Rate in Visible Light Communication: A New LED Hexagonal Array Distribution

Authors: Karim Matter, Heba Fayed, Ahmed Abd-Elaziz, Moustafa Hussein

Abstract:

Due to the exponential growth of mobile devices and wireless services, a huge demand for radiofrequency has increased. The presence of several frequencies causes interference between cells, which must be minimized to get the lower Bit Error Rate (BER). For this reason, it is of great interest to use visible light communication (VLC). This paper suggests a VLC system that decreases the BER by applying a new LED distribution with a hexagonal shape using a Frequency Reuse (FR) concept to mitigate the interference between the reused frequencies inside the hexagonal shape. The BER is measured in two scenarios, Line of Sight (LoS) and Non-Line of Sight (Non-LoS), for each technique that we used. The recommended values of BER in the proposed model for Soft Frequency Reuse (SFR) in the case of Los at 4, 8, and 10 dB signal to noise ratio (SNR), are 3.6×10⁻⁶, 6.03×10⁻¹³, and 2.66×10⁻¹⁸, respectively.

Keywords: visible light communication (VLC), field of view (FoV), hexagonal array, frequency reuse

Procedia PDF Downloads 144
6335 Low Density Parity Check Codes

Authors: Kassoul Ilyes

Abstract:

The field of error correcting codes has been revolutionized by the introduction of iteratively decoded codes. Among these, LDPC codes are now a preferred solution thanks to their remarkable performance and low complexity. The binary version of LDPC codes showed even better performance, although it’s decoding introduced greater complexity. This thesis studies the performance of binary LDPC codes using simplified weighted decisions. Information is transported between a transmitter and a receiver by digital transmission systems, either by propagating over a radio channel or also by using a transmission medium such as the transmission line. The purpose of the transmission system is then to carry the information from the transmitter to the receiver as reliably as possible. These codes have not generated enough interest within the coding theory community. This forgetfulness will last until the introduction of Turbo-codes and the iterative principle. Then it was proposed to adopt Pearl's Belief Propagation (BP) algorithm for decoding these codes. Subsequently, Luby introduced irregular LDPC codes characterized by a parity check matrix. And finally, we study simplifications on binary LDPC codes. Thus, we propose a method to make the exact calculation of the APP simpler. This method leads to simplifying the implementation of the system.

Keywords: LDPC, parity check matrix, 5G, BER, SNR

Procedia PDF Downloads 139
6334 Implications on Informed Consent of Information Available to Patients on the Internet Regarding Hip and Knee Osteoarthritis

Authors: R. W. Walker, J. M. Lynch, K. Anderson, R. G. Middleton

Abstract:

Hip and knee arthritis are two of the commonest conditions that result in elective orthopaedic outpatient referral. At clinic appointments advice given regarding lifestyle modifications or treatment options may not be fully understood by patients. The majority of patients now use the internet to research their condition and use this to inform their decision about treatments. This study assessed the quality of patient information regarding hip and knee arthritis. To assess the quality of patient information regarding knee and hip arthritis available on the internet. Two internet searches were carried out one month apart using the search terms “knee arthritis” and “hip arthritis” on Google, a search engine that accounts for over 90% or internet searches in the UK. Sites were evaluated using the DISCERN instrument, a validated tool for measuring the quality of consumer health information. The first 50 results for each search were analysed by two different observers and discrepancies in scores were reviewed by both observers together and a score was agreed upon. In total 200 search result websites were assessed, of which 84 fulfilled the inclusion criteria. 53% (n=44) were funded directly by commercial healthcare businesses and of these, 70% (n=31) were funded by a surgeon/hospital promoting end-user purchase of surgical intervention. Overall 35% (n=29) websites were “for-profit” information websites where funding was from advertising revenues from pharmaceutical and prosthesis companies. 81% (n=67) offered information about surgical treatments however only 43% (n=36) mentioned the risk of complications of surgery. 67% (n=56) did not have any reference to sources for the information they detailed and 57% (n=47) had no apparent date for the production of the information they offered. Overall 17% (n=14) of websites were judged as being of high quality, with 29% (n=24) being of moderate quality and 54% (n=45) being of low quality. The quality of health information regarding hip and knee arthritis on the internet is highly variable and the majority of websites assessed were of poor quality. A preponderance of websites were funded by a commercial surgical service offering athroplasty at consumer cost, with a further third being funded indirectly via advertising revenues from commercial businesses. The vast majority of websites only mentioned surgery as a treatment and nearly half of all websites did not mention the risks or complications of surgical intervention at all. This has implications for the consent process. As such, Clinicians should be aware of the heterogeneous nature of patient information on the internet and be prepared to advise their patients about good quality websites where further reliable information can be sought.

Keywords: hip osteoarthritis, informed consent, knee osteoarthritis, patient information

Procedia PDF Downloads 81
6333 A Parallel Approach for 3D-Variational Data Assimilation on GPUs in Ocean Circulation Models

Authors: Rossella Arcucci, Luisa D'Amore, Simone Celestino, Giuseppe Scotti, Giuliano Laccetti

Abstract:

This work is the first dowel in a rather wide research activity in collaboration with Euro Mediterranean Center for Climate Changes, aimed at introducing scalable approaches in Ocean Circulation Models. We discuss designing and implementation of a parallel algorithm for solving the Variational Data Assimilation (DA) problem on Graphics Processing Units (GPUs). The algorithm is based on the fully scalable 3DVar DA model, previously proposed by the authors, which uses a Domain Decomposition approach (we refer to this model as the DD-DA model). We proceed with an incremental porting process consisting of 3 distinct stages: requirements and source code analysis, incremental development of CUDA kernels, testing and optimization. Experiments confirm the theoretic performance analysis based on the so-called scale up factor demonstrating that the DD-DA model can be suitably mapped on GPU architectures.

Keywords: data assimilation, GPU architectures, ocean models, parallel algorithm

Procedia PDF Downloads 394