Search results for: IoT technique
6497 Optimization of Multiplier Extraction Digital Filter On FPGA
Authors: Shiksha Jain, Ramesh Mishra
Abstract:
One of the most widely used complex signals processing operation is filtering. The most important FIR digital filter are widely used in DSP for filtering to alter the spectrum according to some given specifications. Power consumption and Area complexity in the algorithm of Finite Impulse Response (FIR) filter is mainly caused by multipliers. So we present a multiplier less technique (DA technique). In this technique, precomputed value of inner product is stored in LUT. Which are further added and shifted with number of iterations equal to the precision of input sample. But the exponential growth of LUT with the order of FIR filter, in this basic structure, makes it prohibitive for many applications. The significant area and power reduction over traditional Distributed Arithmetic (DA) structure is presented in this paper, by the use of slicing of LUT to the desired length. An architecture of 16 tap FIR filter is presented, with different length of slice of LUT. The result of FIR Filter implementation on Xilinx ISE synthesis tool (XST) vertex-4 FPGA Tool by using proposed method shows the increase of the maximum frequency, the decrease of the resources as usage saving in area with more number of slices and the reduction dynamic power.Keywords: multiplier less technique, linear phase symmetric FIR filter, FPGA tool, look up table
Procedia PDF Downloads 3926496 Needle Track Technique In Strabismus Surgery
Authors: Seema Dutt Bandhu, Yashi Bansal, Tania Moudgil, Barinder Kaur
Abstract:
Introduction: Scleral perforation during the passage of suture needle is a known complication of strabismus surgery. The present study was conducted to evolve a safe and easy technique of passing the suture needle through the sclera. A scleral tunnel was created with a 26-guage needle through which the suture needle was passed. The rest of the steps of strabismus surgery were carried out as usual. Material and Methods: After taking clearance from the Institutional Ethics Committee, an interventional study was carried out on twenty patients. The scleral tunnel technique was performed on the patients of strabismus after taking written informed consent. Before passing the suture needle through the sclera during strabismus surgery, a tunnel through approximately half the thickness of the sclera was created with the help of a bent 26-gauge needle. The suture needle was then passed through this tunnel. Rest of the steps of the surgery were carried out in the conventional manner. In a control group of same number of patients, the surgery was performed in the conventional method. Both the groups were followed up for any complications. Ease of passing suture and surgeons’ satisfaction with the technique was noted on a 10-point Likert scale. Results: None of the patients in either group suffered from any complications. Four surgeons participated in the study. The average Likert scale score of the surgeons for satisfaction with the technique was 4.5 on a scale of 5. The score for ease of passage of suture needle was 5 on a score of 5. Discussion: Scleral perforation during passing the sutures through the sclera is a known complication of strabismus surgery. Incidence reported is 7.8% It occurs due to inappropriate engagement of the scleral tissue or passage of the suture needle along a wrong axis during the process of passing the suture needle. The needle track technique eases the passage of passing the suture needle through the sclera as the engagement of the scleral tissue can be done with greater control with a 26-guage needle. The surgeons have reported that they are highly satisfied with the technique and they have reported that the technique eased the passage of the suture needle through the sclera.Keywords: suture, scleral tunnel, strabismus, scleral perforation
Procedia PDF Downloads 796495 Improving the Efficiency of Repacking Process with Lean Technique: The Study of Read With Me Group Company Limited
Authors: Jirayut Phetchuen, Jongkol Srithorn
Abstract:
The study examines the unloading and repacking process of Read With Me Group Company Limited. The research aims to improve the old work process and build a new efficient process with the Lean Technique and new machines for faster delivery without increasing the number of employees. Currently, two employees work based on five days on and off. However, workplace injuries have delayed the delivery time, especially the delivery to the neighboring countries. After the process improvement, the working space increased by 25%, the Process Lead Time decreased by 40%, the work efficiency increased by 175.82%, and the work injuries rate was reduced to zero.Keywords: lean technique, plant layout design, U-shaped disassembly line, value stream mapping
Procedia PDF Downloads 1056494 Performance Analysis of Different PSK Scheme on Receiver Sensitivity and Round Trip Distance for Chipless RFID System for UWB with Rayleigh Fading Channels in Outdoor NLOS Environment
Authors: Khalid Mahmud
Abstract:
In this paper, an analytic approach is presented to evaluate the Bit Error Rate (BER) and round trip distance for a UWB chipless RFID system using diversity technique at the reader receiver using different modulation technique. The analysis is carried out with multiresonator based chipless RFID tags using frequency range from 3 GHz − 6 GHz and bandwidth of 500 M Hz in outdoor non-line-of-sight (NLOS) environment. SISO configuration is used to communicate from the reader to the tag and SIMO configuration is used do vice versa. Maximal Ratio Combining (MRC) technique is used in the reader. MPSK, DQPSK, DBPSK, BPSK, QPSK and DMPSK modulation techniques are considered with coherent demodulation to evaluate the BER performance. From the numerical analysis of the results, it is found that at a given BER maximum possible round trip distance can be achieved using DMPSK modulation technique. In addition, it has been proved that, while using DMPSK modulation technique, the application of diversity has very little effect on the overall improvement in reader receiver sensitivity and achievable distance. Finally the method not only proves to be a very good way for tag detection in case of a chipless RFID system but also gives a clear insight regarding the interrelationship between BER, read range, reader received power, number of receiving antenna in outdoor NLOS environment.Keywords: EGC, MRC, BER, read range, diversity
Procedia PDF Downloads 3526493 The Femoral Eversion Endarterectomy Technique with Transection: Safety and Efficacy
Authors: Hansraj Riteesh Bookun, Emily Maree Stevens, Jarryd Leigh Solomon, Anthony Chan
Abstract:
Objective: This was a retrospective cross-sectional study evaluating the safety and efficacy of femoral endarterectomy using the eversion technique with transection as opposed to the conventional endarterectomy technique with either vein or synthetic patch arterioplasty. Methods: Between 2010 to mid 2017, 19 patients with mean age of 75.4 years, underwent eversion femoral endarterectomy with transection by a single surgeon. There were 13 males (68.4%), and the comorbid burden was as follows: ischaemic heart disease (53.3%), diabetes (43.8%), stage 4 kidney impairment (13.3%) and current or ex-smoking (73.3%). The indications were claudication (45.5%), rest pain (18.2%) and tissue loss (36.3%). Results: The technical success rate was 100%. One patient required a blood transfusion following bleeding from intraoperative losses. Two patients required blood transfusions from low post operative haemogloblin concentrations – one of them in the context of myelodysplastic syndrome. There were no unexpected returns to theatre. The mean length of stay was 11.5 days with two patients having inpatient stays of 36 and 50 days respectively due to the need for rehabilitation. There was one death unrelated to the operation. Conclusion: The eversion technique with transection is safe and effective with low complication rates and a normally expected length of stay. It poses the advantage of not requiring a synthetic patch. This technique features minimal extraneous dissection as there is no need to harvest vein for a patch. Additionally, future endovascular interventions can be performed by puncturing the native vessel. There is no change to the femoral bifurcation anatomy after this technique. We posit that this is a useful adjunct to the surgeon’s panoply of vascular surgical techniques.Keywords: endarterectomy, eversion, femoral, vascular
Procedia PDF Downloads 2006492 A Double PWM Source Inverter Technique with Reduced Leakage Current for Application on Standalone Systems
Authors: Md.Noman Habib Khan, M. S. Tajul Islam, T. S. Gunawan, M. Hasanuzzaman
Abstract:
The photovoltaic (PV) panel with no galvanic isolation system is well-known technique in the world which is effective and deliver power with enhanced efficiency. The PV generation presented here is for stand-alone system installed in remote areas when as the resulting power gets connected to electronic load installation instead of being tied to the grid. Though very small, even then transformer-less topology is shown to be with leakage in pico-ampere range. By using PWM technique PWM, leakage current in different situations is shown. The results that are demonstrated in this paper show how the pico-ampere current is reduced to femto-ampere through use of inductors and capacitors of suitable values of inductor and capacitors with the load.Keywords: photovoltaic (PV) panel, duty cycle, pulse duration modulation (PDM), leakage current
Procedia PDF Downloads 5346491 Application of Waterflooding Technique in Petroleum Reservoir
Authors: Khwaja Naweed Seddiqi
Abstract:
Hydrocarbon resources are important for the redevelopment and sustainable progress of Afghanistan’s infrastructure. This paper aim is to increase the oil recovery of Hitervian reservoir of Angut oil field in north part of Afghanistan by an easy and available method, which is Buckley-Leveret frontal displacement theory. In this paper oil displacement by water that takes placed by injecting water into the under laying petroleum reservoir which called waterflooding technique is investigated. The theory is investigated in a laboratory experiment first then applied in Angut oil field which is now under the operation of a private petroleum company. Based on this study oil recovery of Angut oil field, residual oil saturation, Buckle-Leveret saturation and FBL is determined.Keywords: waterflooding technique, two phase fluid flow, Buckley-Leveret, petroleum engineering
Procedia PDF Downloads 4356490 Ternary Content Addressable Memory Cell with a Leakage Reduction Technique
Authors: Gagnesh Kumar, Nitin Gupta
Abstract:
Ternary Content Addressable Memory cells are mainly popular in network routers for packet forwarding and packet classification, but they are also useful in a variety of other applications that require high-speed table look-up. The main TCAM-design challenge is to decrease the power consumption associated with the large amount of parallel active circuitry, without compromising with speed or memory density. Furthermore, when the channel length decreases, leakage power becomes more significant, and it can even dominate dynamic power at lower technologies. In this paper, we propose a TCAM-design technique, called Virtual Power Supply technique that reduces the leakage by a substantial amount.Keywords: match line (ML), search line (SL), ternary content addressable memory (TCAM), Leakage power (LP)
Procedia PDF Downloads 3006489 A Study on the Iterative Scheme for Stratified Shields Gamma Ray Buildup Factors Using Layer-Splitting Technique in Double-Layer Shields
Authors: Sari F. Alkhatib, Chang Je Park, Gyuhong Roh
Abstract:
The iterative scheme which is used to treat buildup factors for stratified shields is being investigated here using the layer-splitting technique. A simple suggested formalism for the scheme based on the Kalos’ formula is introduced, based on which the implementation of the testing technique is carried out. The second layer in a double-layer shield was split into two equivalent layers and the scheme (with the suggested formalism) was implemented on the new “three-layer” shield configuration. The results of such manipulation on water-lead and water-iron shields combinations are presented here for 1 MeV photons. It was found that splitting the second layer introduces some deviation on the overall buildup factor value. This expected deviation appeared to be higher in the case of low Z layer followed by high Z. However, the overall performance of the iterative scheme showed a great consistency and strong coherence even with the introduced changes. The introduced layer-splitting testing technique shows the capability to be implemented in test the iterative scheme with a wide range of formalisms.Keywords: buildup factor, iterative scheme, stratified shields, layer-splitting tecnique
Procedia PDF Downloads 4176488 Totally Robotic Gastric Bypass Using Modified Lonroth Technique
Authors: Arun Prasad
Abstract:
Background: Robotic Bariatric Surgery is a good option for the super obese where laparoscopy demands challenging technical skills. Gastric bypass can be difficult due to inability of the robot to work in two quadrants at the same time. Lonroth technique of gastric bypass involves a totally supracolic surgery where all anastomosis are done in one quadrant only. Methods: We have done 78 robotic gastric bypass surgeries using the modified Lonroth technique. The robot is docked above the head of the patient in the midline. Camera port is placed supra umbilically. Two ports are placed on the left side of the patient and one port on the right side of the patient. An assistant port is placed between the camera port and right sided robotic port for use of stapler. Gastric pouch is made first followed by the gastrojejunostomy that is a four layered sutured anastomosis. Jejuno jejunostomy is then performed followed by a leak test and then the jejunum is divided. A 150 cm biliopancreatic limb and a 75 cm alimentary limb are finally obtained. Mesenteric and Petersen’s defects are then closed. Results: All patients had a successful robotic procedure. Mean time taken in the first 5 cases was 130 minutes. This reduced to a mean of 95 minutes in the last five cases. There were no intraoperative or post operative complications. Conclusions: While a hybrid technique of partly laparoscopic and partly robotic gastric bypass has been done at many centres, we feel using the modified Lonroth technique, a totally robotic gastric bypass surgery fully utilizes the potential of robotic bariatric surgery.Keywords: robot, bariatric, totally robotic, gastric bypass
Procedia PDF Downloads 2586487 Analysis of Nonlinear and Non-Stationary Signal to Extract the Features Using Hilbert Huang Transform
Authors: A. N. Paithane, D. S. Bormane, S. D. Shirbahadurkar
Abstract:
It has been seen that emotion recognition is an important research topic in the field of Human and computer interface. A novel technique for Feature Extraction (FE) has been presented here, further a new method has been used for human emotion recognition which is based on HHT method. This method is feasible for analyzing the nonlinear and non-stationary signals. Each signal has been decomposed into the IMF using the EMD. These functions are used to extract the features using fission and fusion process. The decomposition technique which we adopt is a new technique for adaptively decomposing signals. In this perspective, we have reported here potential usefulness of EMD based techniques.We evaluated the algorithm on Augsburg University Database; the manually annotated database.Keywords: intrinsic mode function (IMF), Hilbert-Huang transform (HHT), empirical mode decomposition (EMD), emotion detection, electrocardiogram (ECG)
Procedia PDF Downloads 5816486 Manufacturing Process and Cost Estimation through Process Detection by Applying Image Processing Technique
Authors: Chalakorn Chitsaart, Suchada Rianmora, Noppawat Vongpiyasatit
Abstract:
In order to reduce the transportation time and cost for direct interface between customer and manufacturer, the image processing technique has been introduced in this research where designing part and defining manufacturing process can be performed quickly. A3D virtual model is directly generated from a series of multi-view images of an object, and it can be modified, analyzed, and improved the structure, or function for the further implementations, such as computer-aided manufacturing (CAM). To estimate and quote the production cost, the user-friendly platform has been developed in this research where the appropriate manufacturing parameters and process detections have been identified and planned by CAM simulation.Keywords: image processing technique, feature detections, surface registrations, capturing multi-view images, Production costs and Manufacturing processes
Procedia PDF Downloads 2516485 Assessment of Kinetic Trajectory of the Median Nerve from Wrist Ultrasound Images Using Two Dimensional Baysian Speckle Tracking Technique
Authors: Li-Kai Kuo, Shyh-Hau Wang
Abstract:
The kinetic trajectory of the median nerve (MN) in the wrist has shown to be capable of being applied to assess the carpal tunnel syndrome (CTS), and was found able to be detected by high-frequency ultrasound image via motion tracking technique. Yet, previous study may not quickly perform the measurement due to the use of a single element transducer for ultrasound image scanning. Therefore, previous system is not appropriate for being applied to clinical application. In the present study, B-mode ultrasound images of the wrist corresponding to movements of fingers from flexion to extension were acquired by clinical applicable real-time scanner. The kinetic trajectories of MN were off-line estimated utilizing two dimensional Baysian speckle tracking (TDBST) technique. The experiments were carried out from ten volunteers by ultrasound scanner at 12 MHz frequency. Results verified from phantom experiments have demonstrated that TDBST technique is able to detect the movement of MN based on signals of the past and present information and then to reduce the computational complications associated with the effect of such image quality as the resolution and contrast variations. Moreover, TDBST technique tended to be more accurate than that of the normalized cross correlation tracking (NCCT) technique used in previous study to detect movements of the MN in the wrist. In response to fingers’ flexion movement, the kinetic trajectory of the MN moved toward the ulnar-palmar direction, and then toward the radial-dorsal direction corresponding to the extensional movement. TDBST technique and the employed ultrasound image scanner have verified to be feasible to sensitively detect the kinetic trajectory and displacement of the MN. It thus could be further applied to diagnose CTS clinically and to improve the measurements to assess 3D trajectory of the MN.Keywords: baysian speckle tracking, carpal tunnel syndrome, median nerve, motion tracking
Procedia PDF Downloads 4956484 Clinical and Radiographic Evaluation of Split-Crest Technique by Ultrasonic Bone Surgery Combined with Platelet Concentrates Prior to Dental Implant Placement
Authors: Ahmed Mohamed El-Shamy, Akram Abbas El-Awady, Mahmoud Taha Eldestawy
Abstract:
Background: The present study was to evaluate clinically and radiographically the combined effect of split crest technique by ultrasonic bone surgery and platelet concentrates in implant site development. Methods: Forty patients with narrow ridge were participated in this study. Patients were assigned randomly into one of the following four groups according to treatment: Group 1: Patients received split-crest technique by ultrasonic bone surgery with implant placement. Group 2: Patients received split-crest technique by ultrasonic bone surgery with implant placement and PRF. Group 3: Patients received split-crest technique by ultrasonic bone surgery with implant placement and PRP. Group 4: Patients received split-crest technique by ultrasonic bone surgery with implant placement and collagen membrane. Modified plaque index, modified sulcus bleeding index, and implant stability were recorded as a baseline and measured again at 3 and 6 months. CBCT scans were taken immediately after surgery completion and at 9 months to evaluate bone density at the bone-implant interface. Results after 6 months; collagen group showed statistically significantly lower mean modified bleeding index than the other groups. After 3 months, the PRF group showed statistically significantly higher mean implant stability with ostell ISQ units' than the other groups. After 6 months, the PRF group showed statistically significantly higher mean implant stability with ostell ISQ units' than the other groups. After 6 months, the PRF group showed statistically significantly higher mean bone density than the collagen group. Conclusion: Ultrasonic bone surgery in split-crest technique can be a successful option for increasing implant stability values throughout the healing period. The use of a combined technique of ultrasonic bone surgery with PRF and simultaneous implant placement potentially improves osseointegration (bone density). PRF membranes represent advanced technology for the stimulation and acceleration of bone regeneration.Keywords: dental implants, split-crest, PRF, PRP
Procedia PDF Downloads 1646483 Image Steganography Using Least Significant Bit Technique
Authors: Preeti Kumari, Ridhi Kapoor
Abstract:
In any communication, security is the most important issue in today’s world. In this paper, steganography is the process of hiding the important data into other data, such as text, audio, video, and image. The interest in this topic is to provide availability, confidentiality, integrity, and authenticity of data. The steganographic technique that embeds hides content with unremarkable cover media so as not to provoke eavesdropper’s suspicion or third party and hackers. In which many applications of compression, encryption, decryption, and embedding methods are used for digital image steganography. Due to compression, the nose produces in the image. To sustain noise in the image, the LSB insertion technique is used. The performance of the proposed embedding system with respect to providing security to secret message and robustness is discussed. We also demonstrate the maximum steganography capacity and visual distortion.Keywords: steganography, LSB, encoding, information hiding, color image
Procedia PDF Downloads 4756482 Contrast Enhancement of Color Images with Color Morphing Approach
Authors: Javed Khan, Aamir Saeed Malik, Nidal Kamel, Sarat Chandra Dass, Azura Mohd Affandi
Abstract:
Low contrast images can result from the wrong setting of image acquisition or poor illumination conditions. Such images may not be visually appealing and can be difficult for feature extraction. Contrast enhancement of color images can be useful in medical area for visual inspection. In this paper, a new technique is proposed to improve the contrast of color images. The RGB (red, green, blue) color image is transformed into normalized RGB color space. Adaptive histogram equalization technique is applied to each of the three channels of normalized RGB color space. The corresponding channels in the original image (low contrast) and that of contrast enhanced image with adaptive histogram equalization (AHE) are morphed together in proper proportions. The proposed technique is tested on seventy color images of acne patients. The results of the proposed technique are analyzed using cumulative variance and contrast improvement factor measures. The results are also compared with decorrelation stretch. Both subjective and quantitative analysis demonstrates that the proposed techniques outperform the other techniques.Keywords: contrast enhacement, normalized RGB, adaptive histogram equalization, cumulative variance.
Procedia PDF Downloads 3796481 Non Interferometric Quantitative Phase Imaging of Yeast Cells
Authors: P. Praveen Kumar, P. Vimal Prabhu, Renu John
Abstract:
In biology most microscopy specimens, in particular living cells are transparent. In cell imaging, it is hard to create an image of a cell which is transparent with a very small refractive index change with respect to the surrounding media. Various techniques like addition of staining and contrast agents, markers have been applied in the past for creating contrast. Many of the staining agents or markers are not applicable to live cell imaging as they are toxic. In this paper, we report theoretical and experimental results from quantitative phase imaging of yeast cells with a commercial bright field microscope. We reconstruct the phase of cells non-interferometrically based on the transport of intensity equations (TIE). This technique estimates the axial derivative from positive through-focus intensity measurements. This technique allows phase imaging using a regular microscope with white light illumination. We demonstrate nano-metric depth sensitivity in imaging live yeast cells using this technique. Experimental results will be shown in the paper demonstrating the capability of the technique in 3-D volume estimation of living cells. This real-time imaging technique would be highly promising in real-time digital pathology applications, screening of pathogens and staging of diseases like malaria as it does not need any pre-processing of samples.Keywords: axial derivative, non-interferometric imaging, quantitative phase imaging, transport of intensity equation
Procedia PDF Downloads 3856480 Symmetric Arabic Language Encryption Technique Based on Modified Playfair Algorithm
Authors: Fairouz Beggas
Abstract:
Due to the large number of exchanges in the networks, the security of communications is essential. Most ways of keeping communication secure rely on encryption. In this work, a symmetric encryption technique is offered to encrypt and decrypt simple Arabic scripts based on a multi-level security. A proposed technique uses an idea of Playfair encryption with a larger table size and an additional layer of encryption to ensure more security. The idea of the proposed algorithm aims to generate a dynamic table that depends on a secret key. The same secret key is also used to create other secret keys to over-encrypt the plaintext in three steps. The obtained results show that the proposed algorithm is faster in terms of encryption/decryption speed and can resist to many types of attacks.Keywords: arabic data, encryption, playfair, symmetric algorithm
Procedia PDF Downloads 906479 Development of Polybenzoxazine Membranes on Al2O3 Support for Water-Ethanol Separation via Pervaporation Technique
Authors: Chonlada Choedchun, Ni-on Saelim, Panupong Chuntanalerg, Thanyalak Chaisuwan, Sujitra Wongkasemjit
Abstract:
Bioethanol is one of the candidates to replace fossil fuels. Membrane technique is one of the attractive processes to produce high purity of ethanol. In this work, polybenzoxazine (PBZ) membrane successfully synthesized from bisphenol-A (BPA), formaldehyde, and two different types of multifunctionalamines: tetraethylenepentamine (tepa), and diethylenetriamine (deta), was evaluated for water-ethanol separation. The membrane thickness was determined by scanning electron microscopy (SEM). Pervaporation technique was carried out to find separation performance. It was found that the optimum PBZ concentration for the preparation of the membranes is 25%. The dipping cycles of PBZ-tepa and PBZ-deta was found to be 4 and 5, giving the total permeation flux of 28.97 and 14.75 g/m2.h, respectively. The separation factor of both membranes was higher than 10,000.Keywords: polybenzoxazine, pervaporation, permeation flux, separation factor
Procedia PDF Downloads 4196478 Comparison Between Two Techniques (Extended Source to Surface Distance & Field Alignment) Of Craniospinal Irradiation (CSI) In the Eclipse Treatment Planning System
Authors: Naima Jannat, Ariful Islam, Sharafat Hossain
Abstract:
Due to the involvement of the large target volume, Craniospinal Irradiation makes it challenging to achieve a uniform dose, and it requires different isocenters. This isocentric junction needs to shift after every five fractions to overcome the possibility of hot and cold spots. This study aims to evaluate the Planning Target Volume coverage & sparing Organ at Risk between two techniques and shows that the Field Alignment Technique does not need replanning and resetting. Planning method for Craniospinal Irradiation by Eclipse treatment planning system Field Alignment and Extended Source to Surface Distance technique was developed where 36 Gy in 20 Fraction at the rate of 1.8 Gy was prescribed. The patient was immobilized in the prone position. In the Field Alignment technique, the plan consists of half beam blocked parallel opposed cranium and a single posterior cervicospine field was developed by sharing the same isocenter, which obviates divergence matching. Further, a single field was created to treat the remaining lumbosacral spine. Matching between the inferior diverging edge of the cervicospine field and the superior diverging edge of a lumbosacral field, the field alignment option was used, which automatically matches the field edge divergence as per the field alignment rule in Eclipse Treatment Planning System where the couch was set to 2700. In the Extended Source to Surface Distance technique, two parallel opposed fields were created for the cranium, and a single posterior cervicospine field was created where the Source to Surface Distance was from 120-140 cm. Dose Volume Histograms were obtained for each organ contoured and for each technique used. In all, the patient’s maximum dose to Planning Target Volume is higher for the Extended Source to Surface Distance technique to Field Alignment technique. The dose to all surrounding structures was increased with the use of a single Extended Source to Surface Distance when compared to the Field Alignment technique. The average mean dose to Eye, Brain Steam, Kidney, Oesophagus, Heart, Liver, Lung, and Ovaries were respectively (58% & 60 %), (103% & 98%), (13% & 15%), (10% & 63%), (12% & 16%), (33% & 30%), (14% & 18%), (69% & 61%) for Field Alignment and Extended Source to Surface Distance technique. However, the clinical target volume at the spine junction site received a less homogeneous dose with the Field Alignment technique as compared to Extended Source to Surface Distance. We conclude that, although the use of a single field Extended Source to Surface Distance delivered a more homogenous, but its maximum dose is higher than the Field Alignment technique. Also, a huge advantage of the Field Alignment technique for Craniospinal Irradiation is that it doesn’t need replanning and resetting up of patients after every five fractions and 95% prescribed dose was received by more than 95% of the Planning Target Volume in all the plane with the acceptable hot spot.Keywords: craniospinalirradiation, cranium, cervicospine, immobilize, lumbosacral spine
Procedia PDF Downloads 1186477 ANFIS Based Technique to Estimate Remnant Life of Power Transformer by Predicting Furan Contents
Authors: Priyesh Kumar Pandey, Zakir Husain, R. K. Jarial
Abstract:
Condition monitoring and diagnostic is important for testing of power transformer in order to estimate the remnant life. Concentration of furan content in transformer oil can be a promising indirect measurement of the aging of transformer insulation. The oil gets contaminated mainly due to ageing. The present paper introduces adaptive neuro fuzzy technique to correlate furanic compounds obtained by high performance liquid chromatography (HPLC) test and remnant life of the power transformer. The results are obtained by conducting HPLC test at TIFAC-CORE lab, NIT Hamirpur on thirteen power transformer oil samples taken from Himachal State Electricity Board, India.Keywords: adaptive neuro fuzzy technique, furan compounds, remnant life, transformer oil
Procedia PDF Downloads 4646476 Mathematical Model That Using Scrambling and Message Integrity Methods in Audio Steganography
Authors: Mohammed Salem Atoum
Abstract:
The success of audio steganography is to ensure imperceptibility of the embedded message in stego file and withstand any form of intentional or un-intentional degradation of message (robustness). Audio steganographic that utilized LSB of audio stream to embed message gain a lot of popularity over the years in meeting the perceptual transparency, robustness and capacity. This research proposes an XLSB technique in order to circumvent the weakness observed in LSB technique. Scrambling technique is introduce in two steps; partitioning the message into blocks followed by permutation each blocks in order to confuse the contents of the message. The message is embedded in the MP3 audio sample. After extracting the message, the permutation codebook is used to re-order it into its original form. Md5sum and SHA-256 are used to verify whether the message is altered or not during transmission. Experimental result shows that the XLSB performs better than LSB.Keywords: XLSB, scrambling, audio steganography, security
Procedia PDF Downloads 3646475 Analysis of Active Compounds in Thai Herbs by near Infrared Spectroscopy
Authors: Chaluntorn Vichasilp, Sutee Wangtueai
Abstract:
This study aims to develop a new method to detect active compounds in Thai herbs (1-deoxynojirimycin (DNJ) in mulberry leave, anthocyanin in Mao and curcumin in turmeric) using near infrared spectroscopy (NIRs). NIRs is non-destructive technique that rapid, non-chemical involved and low-cost determination. By NIRs and chemometrics technique, it was found that the DNJ prediction equation conducted with partial least square regression with cross-validation had low accuracy R2 (0.42) and SEP (31.87 mg/100g). On the other hand, the anthocyanin prediction equation showed moderate good results (R2 and SEP of 0.78 and 0.51 mg/g) with Multiplication scattering correction at wavelength of 2000-2200 nm. The high absorption could be observed at wavelength of 2047 nm and this model could be used as screening level. For curcumin prediction, the good result was obtained when applied original spectra with smoothing technique. The wavelength of 1400-2500 nm was created regression model with R2 (0.68) and SEP (0.17 mg/g). This model had high NIRs absorption at a wavelength of 1476, 1665, 1986 and 2395 nm, respectively. NIRs showed prospective technique for detection of some active compounds in Thai herbs.Keywords: anthocyanin, curcumin, 1-deoxynojirimycin (DNJ), near infrared spectroscopy (NIRs)
Procedia PDF Downloads 3826474 Thai Travel Agencies, English Communication and AEC: A Case Study
Authors: Nalin Simasathiansophon
Abstract:
This research aims to study English communication of Thai travel agencies and the impact of the ASEAN Economic Community (AEC) on Thai travel industry. A questionnaire was used in this research. The multi-stage sampling method was also utilized with 474 respondents from 79 Thai travel agencies. Descriptive statistics included percentage, average, and standard deviation. The findings revealed that English communication for most travel agencies was between the poor and intermediate level and therefore improvement is needed, especially the listening and speaking skills. In other words, the majority of respondents needed more training in terms of communicating in English. Since the age average of travel agencies was around 30-39 years, the training technique should integrate communicating skills together, such as stimulating technique or cooperating technique that could encourage travel agencies to use English in communicating with foreigners.Keywords: travel agencies, English communication, AEC, Thai
Procedia PDF Downloads 3226473 Stochastic Age-Structured Population Models
Authors: Arcady Ponosov
Abstract:
Many well-known age-structured population models are derived from the celebrated McKendrick-von Foerster equation (MFE), also called the biological conservation law. A similar technique is suggested for the stochastically perturbed MFE. This technique is shown to produce stochastic versions of the deterministic population models, which appear to be very different from those one can construct by simply appending additive stochasticity to deterministic equations. In particular, it is shown that stochastic Nicholson’s blowflies model should contain both additive and multiplicative stochastic noises. The suggested transformation technique is similar to that used in the deterministic case. The difference is hidden in the formulas for the exact solutions of the simplified boundary value problem for the stochastically perturbed MFE. The analysis is also based on the theory of stochastic delay differential equations.Keywords: boundary value problems, population models, stochastic delay differential equations, stochastic partial differential equation
Procedia PDF Downloads 2556472 Actual Fracture Length Determination Using a Technique for Shale Fracturing Data Analysis in Real Time
Authors: M. Wigwe, M. Y Soloman, E. Pirayesh, R. Eghorieta, N. Stegent
Abstract:
The moving reference point (MRP) technique has been used in the analyses of the first three stages of two fracturing jobs. The results obtained verify the proposition that a hydraulic fracture in shale grows in spurts rather than in a continuous pattern as originally interpreted by Nolte-Smith technique. Rather than a continuous Mode I fracture that is followed by Mode II, III or IV fractures, these fracture modes could alternate throughout the pumping period. It is also shown that the Nolte-Smith time parameter plot can be very helpful in identifying the presence of natural fractures that have been intersected by the hydraulic fracture. In addition, with the aid of a fracture length-time plot generated from any fracture simulation that matches the data, the distance from the wellbore to the natural fractures, which also translates to the actual fracture length for the stage, can be determined. An algorithm for this technique is developed. This procedure was used for the first 9 minutes of the simulated frac job data. It was observed that after 7mins, the actual fracture length is about 150ft, instead of 250ft predicted by the simulator output. This difference gets larger as the analysis proceeds.Keywords: shale, fracturing, reservoir, simulation, frac-length, moving-reference-point
Procedia PDF Downloads 7576471 A Digital Filter for Symmetrical Components Identification
Authors: Khaled M. El-Naggar
Abstract:
This paper presents a fast and efficient technique for monitoring and supervising power system disturbances generated due to dynamic performance of power systems or faults. Monitoring power system quantities involve monitoring fundamental voltage, current magnitudes, and their frequencies as well as their negative and zero sequence components under different operating conditions. The proposed technique is based on simulated annealing optimization technique (SA). The method uses digital set of measurements for the voltage or current waveforms at power system bus to perform the estimation process digitally. The algorithm is tested using different simulated data to monitor the symmetrical components of power system waveforms. Different study cases are considered in this work. Effects of number of samples, sampling frequency and the sample window size are studied. Results are reported and discussed.Keywords: estimation, faults, measurement, symmetrical components
Procedia PDF Downloads 4666470 A Comparison of Implant Stability between Implant Placed without Bone Graft versus with Bone Graft Using Guided Bone Regeneration (GBR) Technique: A Resonance Frequency Analysis
Authors: R. Janyaphadungpong, A. Pimkhaokham
Abstract:
This prospective clinical study determined the insertion torque (IT) value and monitored the changes in implant stability quotient (ISQ) values during the 12 weeks healing period from implant placement without bone graft (control group) and with bone graft using the guided bone regeneration (GBR) technique (study group). The relationship between the IT and ISQ values of the implants was also assessed. The control and study groups each consisted of 6 patients with 8 implants per group. The ASTRA TECH Implant System™ EV 4.2 mm in diameter was placed in the posterior mandibular region. In the control group, implants were placed in bone without bone graft, whereas in the study group implants were placed simultaneously with the GBR technique at favorable bone defect. IT (Ncm) of each implant was recorded when fully inserted. ISQ values were obtained from the Osstell® ISQ at the time of implant placement, and at 2, 4, 8, and 12 weeks. No difference in IT was found between groups (P = 0.320). The ISQ values in the control group were significantly higher than in the study group at the time of implant placement and at 4 weeks. There was no significant association between IT and ISQ values either at baseline or after the 12 weeks. At 12 weeks of healing, the control and study groups displayed different trends. Mean ISQ values for the control group decreased over the first 2 weeks and then started to increase. ISQ value increases were statistically significant at 8 weeks and later, whereas mean ISQ values in the study group decreased over the first 4 weeks and then started to increase, with statistical significance after 12 weeks. At 12 weeks, all implants achieved osseointegration with mean ISQ values over the threshold value (ISQ>70). These results indicated that implants, in which guided bone regeneration technique was performed during implant placement for treating favorable bone defects, were as predictable as implants placed without bone graft. However, loading in implants placed with the GBR technique for correcting favorable bone defects should be performed after 12 weeks of healing to ensure implant stability and osseointegration.Keywords: dental implant, favorable bone defect, guided bone regeneration technique, implant stability
Procedia PDF Downloads 2976469 A Comprehensive Survey and Improvement to Existing Privacy Preserving Data Mining Techniques
Authors: Tosin Ige
Abstract:
Ethics must be a condition of the world, like logic. (Ludwig Wittgenstein, 1889-1951). As important as data mining is, it possess a significant threat to ethics, privacy, and legality, since data mining makes it difficult for an individual or consumer (in the case of a company) to control the accessibility and usage of his data. This research focuses on Current issues and the latest research and development on Privacy preserving data mining methods as at year 2022. It also discusses some advances in those techniques while at the same time highlighting and providing a new technique as a solution to an existing technique of privacy preserving data mining methods. This paper also bridges the wide gap between Data mining and the Web Application Programing Interface (web API), where research is urgently needed for an added layer of security in data mining while at the same time introducing a seamless and more efficient way of data mining.Keywords: data, privacy, data mining, association rule, privacy preserving, mining technique
Procedia PDF Downloads 1736468 Adiabatic Flame Temperature: New Calculation Methode
Authors: Muthana Abdul Mjed Jamel Al-gburi
Abstract:
The present paper introduces the methane-air flame and its main chemical reaction, the mass burning rate, the burning velocity, and the most important parameter, the adiabatic and its evaluation. Those major important flame parameters will be mathematically formulated and computerized using the MATLAB program. The present program established a new technique to decide the true adiabatic flame temperature. The new technique implements the trial and error procedure to obtained the calculated total internal energy of the product species then evaluate of the reactants ones, from both, we can draw two energy lines their intersection will decide the true required temperature. The obtained results show accurate evaluation for the atmospheric Stoichiometric (Φ=1.05) methane-air flame, and the value was 2136.36 K.Keywords: 1- methane-air flame, 2-, adiabatic flame temperature, 3-, reaction model, 4- matlab program, 5-, new technique
Procedia PDF Downloads 77