Search results for: early warning systems
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 12748

Search results for: early warning systems

11518 Pyramidal Lucas-Kanade Optical Flow Based Moving Object Detection in Dynamic Scenes

Authors: Hyojin Lim, Cuong Nguyen Khac, Yeongyu Choi, Ho-Youl Jung

Abstract:

In this paper, we propose a simple moving object detection, which is based on motion vectors obtained from pyramidal Lucas-Kanade optical flow. The proposed method detects moving objects such as pedestrians, the other vehicles and some obstacles at the front-side of the host vehicle, and it can provide the warning to the driver. Motion vectors are obtained by using pyramidal Lucas-Kanade optical flow, and some outliers are eliminated by comparing the amplitude of each vector with the pre-defined threshold value. The background model is obtained by calculating the mean and the variance of the amplitude of recent motion vectors in the rectangular shaped local region called the cell. The model is applied as the reference to classify motion vectors of moving objects and those of background. Motion vectors are clustered to rectangular regions by using the unsupervised clustering K-means algorithm. Labeling method is applied to label groups which is close to each other, using by distance between each center points of rectangular. Through the simulations tested on four kinds of scenarios such as approaching motorbike, vehicle, and pedestrians to host vehicle, we prove that the proposed is simple but efficient for moving object detection in parking lots.

Keywords: moving object detection, dynamic scene, optical flow, pyramidal optical flow

Procedia PDF Downloads 349
11517 An Evaluation Model for Enhancing Flexibility in Production Systems through Additive Manufacturing

Authors: Angela Luft, Sebastian Bremen, Nicolae Balc

Abstract:

Additive manufacturing processes have entered large parts of the industry and their range of application have progressed and grown significantly in the course of time. A major advantage of additive manufacturing is the innate flexibility of the machines. This corelates with the ongoing demand of creating highly flexible production environments. However, the potential of additive manufacturing technologies to enhance the flexibility of production systems has not yet been truly considered and quantified in a systematic way. In order to determine the potential of additive manufacturing technologies with regards to the strategic flexibility design in production systems, an integrated evaluation model has been developed, that allows for the simultaneous consideration of both conventional as well as additive production resources. With the described model, an operational scope of action can be identified and quantified in terms of mix and volume flexibility, process complexity, and machine capacity that goes beyond the current cost-oriented approaches and offers a much broader and more holistic view on the potential of additive manufacturing. A respective evaluation model is presented this paper.

Keywords: additive manufacturing, capacity planning, production systems, strategic production planning, flexibility enhancement

Procedia PDF Downloads 157
11516 A Pragma-Rhetorical Study of Christian Religious Pentecostal Sermons in Nigeria

Authors: Samuel Alaba Akinwotu

Abstract:

Effectiveness in communication requires the deployment of pragmatic and rhetorical strategies in religious sermons. In spite of high volume of works in religious discourse, scholars have not adequately accounted for the persuasive and argumentation strategies employed in Christian religious Pentecostal sermons. This study examines communicative intentions and the pragma-rhetorical strategies deployed to maintain balance and effectiveness in selected sermons of Pastor E. A. Adeboye, Bishop D. Oyedepo and Pastor W. F. Kumuyi. Fifteen sermons, delivered orally and transcribed into the written mode, were selected and analysed using Jacob Mey’s theory of pragmeme, Aristotle’s rhetoric and the theory of argumentation by van Eemeren and Grootendorst. Speakers pract stating, encouraging, assuring, warning, condemning, directing, praising, thanking, etc. through rhetorical question, repetition, direct address, direct command and structural parallelism. They assume divine role by speaking authoritatively and they tactically and logically select words to legitimise their ideology. They also categorise and portray individuals and/or issues either as good or bad, sinner/sin or righteous/righteousness, etc. The study provides clearer insight into the pragmatic import and the communicative effectiveness of Christian Pentecostal sermons. Further research can juxtapose the pragma-rhetorical and argumentation strategies of preachers of two clearly differentiated movements within the Christian religion.

Keywords: argumentation, communicative intentions, pentecostal sermons, pragmeme, rhetoric

Procedia PDF Downloads 200
11515 Potential Serological Biomarker for Early Detection of Pregnancy in Cows

Authors: Shveta Bathla, Preeti Rawat, Sudarshan Kumar, Rubina Baithalu, Jogender Singh Rana, Tushar Kumar Mohanty, Ashok Kumar Mohanty

Abstract:

Pregnancy is a complex process which includes series of events such as fertilization, formation of blastocyst, implantation of embryo, placental formation and development of fetus. The success of these events depends on various interactions which are synchronized by endocrine interaction between a receptive dam and competent embryo. These interactions lead to change in expression of hormones and proteins. But till date no protein biomarker is available which can be used to detect successful completion of these events. We employed quantitative proteomics approach to develop putative serological biomarker which has diagnostic applicability for early detection of pregnancy in cows. For this study, sera were collected from control (non-pregnant, n=6) and pregnant animals on successive days of pregnancy (7, 19, 45, n=6). The sera were subjected to depletion for removal of albumin using Norgen depletion kit. The tryptic peptides were labeled with iTRAQ. The peptides were pooled and fractionated using bRPLC over 80 min gradient. Then 12 fractions were injected to nLC for identification and quantitation in DDA mode using ESI. Identification using Mascot search revealed 2056 proteins out of which 352 proteins were differentially expressed. Twenty proteins were upregulated and twelve proteins were down-regulated with fold change > 1.5 and < 0.6 respectively (p < 0.05). The gene ontology studies of DEPs using Panther software revealed that majority of proteins are actively involved in catalytic activities, binding and enzyme regulatory activities. The DEP'S such as NF2, MAPK, GRIPI, UGT1A1, PARP, CD68 were further subjected to pathway analysis using KEGG and Cytoscape plugin Cluego that showed involvement of proteins in successful implantation, maintenance of pluripotency, regulation of luteal function, differentiation of endometrial macrophages, protection from oxidative stress and developmental pathways such as Hippo. Further efforts are continuing for targeted proteomics, western blot to validate potential biomarkers and development of diagnostic kit for early pregnancy diagnosis in cows.

Keywords: bRPLC, Cluego, ESI, iTRAQ, KEGG, Panther

Procedia PDF Downloads 461
11514 The Economic Implications of Cryptocurrency and Its Potential to Disrupt Traditional Financial Systems as a Store of Value

Authors: G. L. Rithika, Arvind B. S., Akash R., Ananda Vinayak, Hema M. S.

Abstract:

Cryptocurrencies were first launched in the year 2009 and have been a great asset to own. Cryptocurrencies are a representation of a completely distinct decentralization model for money. They also contribute to the elimination of currency monopolies and the liberation of money from control. The fact that no government agency can determine a coin's value or flow is what cryptocurrency advocates believe makes them safe and secure. The aim of this paper is to analyze the economic implications of cryptocurrency and how it would disrupt traditional financial systems. This paper analyses the growth of Cryptocurrency over the years and the potential threats of cryptocurrency to financial systems. Our analysis shows that although the DeFi design, like the traditional financial system, may have the ability to lower transaction costs, there are multiple layers where rents might build up because of endogenous competition limitations. The permissionless and anonymous design of DeFi poses issues for ensuring tax compliance, anti-money laundering laws and regulations, and preventing financial misconduct.

Keywords: cryptocurrencies, bitcoin, blockchain technology, traditional financial systems, decentralisation, regulatory framework

Procedia PDF Downloads 50
11513 Attention Deficit Hyperactivity Disorder and Criminality: A Psychological Profile of Convicts Serving Prison Sentences

Authors: Agnieszka Nowogrodzka

Abstract:

Objectives: ADHD is a neurodevelopmental disorder in which symptoms are most prominent throughout childhood. In the longer term, these symptoms, as well as the behaviour of the child, the experiences arising from the response of the community to the child's symptoms, as well as the functioning of the community itself, all contribute to the onset of secondary symptoms and subsequent outcomes of the disorder, such as crime or mental disorders. The purpose of this study is to estimate the prevalence of ADHD among Polish convicts serving a prison sentence. To that end, the study will focus on the relationship between the severity of ADHD and early childhood trauma, family relations, maladaptive cognitive schemas, as well as mental disorders. It is an attempt to assess the interdependence between ADHD, childhood experiences, and secondary outcomes. Methods: The study enrolled two groups of first-time convicts and repeat offenders aged between 21 and 65 –each of the study groups comprised 120 participants; 240 participants in total took part in the study. Participants were recruited in semi-open penal institutions in Poland (Poznań Custody Suite, Wronki Penal Institution, Iława Penal Institution). The control group comprised 110 men without criminal records aged 21 to 65. The DIVA 5.0 questionnaire was employed to identify the severity of ADHD symptoms. Other questionnaires employed in the course of the study included the Childhood Trauma Questionnaire (CTQ), The Family Adaptability and Cohesion Scale IV (FACES-IV), Young Schema Questionnaire (YSQ), and the General Health Questionnaire (GHQ-30). Results: The findings of the study in question are currently still being compiled and will be shared during the conference. The findings of a pilot study involving two cohorts of convicts (each numbering 20 men) and a control group (20 men with no criminal records) indicate a significant correlation between ADHD and the experience of early childhood trauma. The severity of ADHD also shows a correlation with the assessment of the functioning of the family, with the subjects assessing the relationships in their families more negatively than the control group. Furthermore, the severity of ADHD is also correlated with maladaptive emotional schemas manifesting in the participants. The findings also show a correlation between selected dimensions and the severity of offenses.

Keywords: ADHD, social impairments, mental disorders, early childhood traumas, criminality

Procedia PDF Downloads 92
11512 Automated Feature Extraction and Object-Based Detection from High-Resolution Aerial Photos Based on Machine Learning and Artificial Intelligence

Authors: Mohammed Al Sulaimani, Hamad Al Manhi

Abstract:

With the development of Remote Sensing technology, the resolution of optical Remote Sensing images has greatly improved, and images have become largely available. Numerous detectors have been developed for detecting different types of objects. In the past few years, Remote Sensing has benefited a lot from deep learning, particularly Deep Convolution Neural Networks (CNNs). Deep learning holds great promise to fulfill the challenging needs of Remote Sensing and solving various problems within different fields and applications. The use of Unmanned Aerial Systems in acquiring Aerial Photos has become highly used and preferred by most organizations to support their activities because of their high resolution and accuracy, which make the identification and detection of very small features much easier than Satellite Images. And this has opened an extreme era of Deep Learning in different applications not only in feature extraction and prediction but also in analysis. This work addresses the capacity of Machine Learning and Deep Learning in detecting and extracting Oil Leaks from Flowlines (Onshore) using High-Resolution Aerial Photos which have been acquired by UAS fixed with RGB Sensor to support early detection of these leaks and prevent the company from the leak’s losses and the most important thing environmental damage. Here, there are two different approaches and different methods of DL have been demonstrated. The first approach focuses on detecting the Oil Leaks from the RAW Aerial Photos (not processed) using a Deep Learning called Single Shoot Detector (SSD). The model draws bounding boxes around the leaks, and the results were extremely good. The second approach focuses on detecting the Oil Leaks from the Ortho-mosaiced Images (Georeferenced Images) by developing three Deep Learning Models using (MaskRCNN, U-Net and PSP-Net Classifier). Then, post-processing is performed to combine the results of these three Deep Learning Models to achieve a better detection result and improved accuracy. Although there is a relatively small amount of datasets available for training purposes, the Trained DL Models have shown good results in extracting the extent of the Oil Leaks and obtaining excellent and accurate detection.

Keywords: GIS, remote sensing, oil leak detection, machine learning, aerial photos, unmanned aerial systems

Procedia PDF Downloads 34
11511 Severity Index Level in Effectively Managing Medium Voltage Underground Power Cable

Authors: Mohd Azraei Pangah Pa'at, Mohd Ruzlin Mohd Mokhtar, Norhidayu Rameli, Tashia Marie Anthony, Huzainie Shafi Abd Halim

Abstract:

Partial Discharge (PD) diagnostic mapping testing is one of the main diagnostic testing techniques that are widely used in the field or onsite testing for underground power cable in medium voltage level. The existence of PD activities is an early indication of insulation weakness hence early detection of PD activities can be determined and provides an initial prediction on the condition of the cable. To effectively manage the results of PD Mapping test, it is important to have acceptable criteria to facilitate prioritization of mitigation action. Tenaga Nasional Berhad (TNB) through Distribution Network (DN) division have developed PD severity model name Severity Index (SI) for offline PD mapping test since 2007 based on onsite test experience. However, this severity index recommendation action had never been revised since its establishment. At presence, PD measurements data have been extensively increased, hence the severity level indication and the effectiveness of the recommendation actions can be analyzed and verified again. Based on the new revision, the recommended action to be taken will be able to reflect the actual defect condition. Hence, will be accurately prioritizing preventive action plan and minimizing maintenance expenditure.

Keywords: partial discharge, severity index, diagnostic testing, medium voltage, power cable

Procedia PDF Downloads 186
11510 Experimental Investigation of Cold-Formed Steel-Timber Board Composite Floor Systems

Authors: Samar Raffoul, Martin Heywood, Dimitrios Moutaftsis, Michael Rowell

Abstract:

This paper comprises an experimental investigation into the structural performance of cold formed steel (CFS) and timber board composite floor systems. The tests include a series of small-scale pushout tests and full-scale bending tests carried out using a refined loading system to simulate uniformly distributed constant load. The influence of connection details (screw spacing and adhesives) on floor performance was investigated. The results are then compared to predictions from relevant existing models for composite floor systems. The results of this research demonstrate the significant benefits of considering the composite action of the boards in floor design. Depending on connection detail, an increase in flexural stiffness of up to 40% was observed in the floor system, when compared to designing joists individually.

Keywords: cold formed steel joists, composite action, flooring systems, shear connection

Procedia PDF Downloads 129
11509 Epistemic Uncertainty Analysis of Queue with Vacations

Authors: Baya Takhedmit, Karim Abbas, Sofiane Ouazine

Abstract:

The vacations queues are often employed to model many real situations such as computer systems, communication networks, manufacturing and production systems, transportation systems and so forth. These queueing models are solved at fixed parameters values. However, the parameter values themselves are determined from a finite number of observations and hence have uncertainty associated with them (epistemic uncertainty). In this paper, we consider the M/G/1/N queue with server vacation and exhaustive discipline where we assume that the vacation parameter values have uncertainty. We use the Taylor series expansions approach to estimate the expectation and variance of model output, due to epistemic uncertainties in the model input parameters.

Keywords: epistemic uncertainty, M/G/1/N queue with vacations, non-parametric sensitivity analysis, Taylor series expansion

Procedia PDF Downloads 433
11508 Vehicle Risk Evaluation in Low Speed Accidents: Consequences for Relevant Test Scenarios

Authors: Philip Feig, Klaus Gschwendtner, Julian Schatz, Frank Diermeyer

Abstract:

Projects of accident research analysis are mostly focused on accidents involving personal damage. Property damage only has a high frequency of occurrence combined with high economic impact. This paper describes main influencing parameters for the extent of damage and presents a repair cost model. For a prospective evaluation method of the monetary effect of advanced driver assistance systems (ADAS), it is necessary to be aware of and quantify all influencing parameters. Furthermore, this method allows the evaluation of vehicle concepts in combination with an ADAS at an early point in time of the product development process. In combination with a property damage database and the introduced repair cost model relevant test scenarios for specific vehicle configurations and their individual property damage risk may be determined. Currently, equipment rates of ADAS are low and a purchase incentive for customers would be beneficial. The next ADAS generation will prevent property damage to a large extent or at least reduce damage severity. Both effects may be a purchasing incentive for the customer and furthermore contribute to increased traffic safety.

Keywords: accident research, accident scenarios, ADAS, effectiveness, property damage analysis

Procedia PDF Downloads 340
11507 Encouraging the Development of Scientific Literacy in Early Childhood Institutions: Croatian Experience

Authors: L. Vujičić, Ž. Ivković, Ž. Boneta

Abstract:

There is a widespread belief in everyday discourse that science subjects (physics, chemistry and biology) are, along with math, the most difficult school subjects in the education of an individual. This assumption is usually justified by the following facts: low GPA in these subjects, the number of pupils who fail these subjects is high in comparison to other subjects, and the number of pupils interested in continuing their studies in the fields with a focus on science subjects is lower compared to non-science-oriented fields. From that perspective, the project: “Could it be different? How do children explore it?” becomes extremely interesting because it is focused on young children and on the introduction of new methods, with aim of arousing interest in scientific literacy development in 10 kindergartens by applying the methodology of an action research, with an ethnographic approach. We define scientific literacy as a process of encouraging and nurturing the research and explorative spirit in children, as well as their natural potential and abilities that represent an object of scientific research: to learn about exploration by conducting exploration. Upon project completion, an evaluation questionnaire was created for the parents of the children who had participated in the project, as well as for those whose children had not been involved in the project. The purpose of the first questionnaire was to examine the level of satisfaction with the project implementation and its outcomes among those parents whose children had been involved in the project (N=142), while the aim of the second questionnaire was to find out how much the parents of the children not involved (N=154) in this activity were interested in this topic.

Keywords: documenting, early childhood education, evaluation questionnaire for parents, scientific literacy development

Procedia PDF Downloads 253
11506 Comparative Performance of Retting Methods on Quality Jute Fibre Production and Water Pollution for Environmental Safety

Authors: A. K. M. Zakir Hossain, Faruk-Ul Islam, Muhammad Alamgir Chowdhury, Kazi Morshed Alam, Md. Rashidul Islam, Muhammad Humayun Kabir, Noshin Ara Tunazzina, Taufiqur Rahman, Md. Ashik Mia, Ashaduzzaman Sagar

Abstract:

The jute retting process is one of the key factors for the excellent jute fibre production as well as maintaining water quality. The traditional method of jute retting is time-consuming and hampers the fish cultivation by polluting the water body. Therefore, a low cost, time-saving, environment-friendly, and improved technique is essential for jute retting to overcome this problem. Thus the study was focused to compare the extent of water pollution and fibre quality of two retting systems, i.e., traditional retting practices over-improved retting method (macha retting) by assessing different physico-chemical and microbiological properties of water and fibre quality parameters. Water samples were collected from the top and bottom of the retting place at the early, mid, and final stages of retting from four districts of Bangladesh viz., Gaibandha, Kurigram, Lalmonirhat, and Rangpur. Different physico-chemical parameters of water samples viz., pH, dissolved oxygen (DO), conductivity (CD), total dissolved solids (TDS), hardness, calcium, magnesium, carbonate, bicarbonate, chloride, phosphorus and sulphur content were measured. Irrespective of locations, the DO of the final stage retting water samples was very low as compared to the mid and early stage, and the DO of traditional jute retting method was significantly lower than the improved macha method. The pH of the water samples was slightly more acidic in the traditional retting method than that of the improved macha method. Other physico-chemical parameters of the water sample were found higher in the traditional method over-improved macha retting in all the stages of retting. Bacterial species were isolated from the collected water samples following the dilution plate technique. Microbiological results revealed that water samples of improved macha method contained more bacterial species that are supposed to involve in jute retting as compared to water samples of the traditional retting method. The bacterial species were then identified by the sequencing of 16SrDNA. Most of the bacterial species identified belong to the genera Pseudomonas, Bacillus, Pectobacterium, and Stenotrophomonas. In addition, the tensile strength of the jute fibre was tested, and the results revealed that the improved macha method showed higher mechanical strength than the traditional method in most of the locations. The overall results indicate that the water and fibre quality were found better in the improved macha retting method than the traditional method. Therefore, a time-saving and cost-friendly improved macha retting method can be widely adopted for the jute retting process to get the quality jute fiber and to keep the environment clean and safe.

Keywords: jute retting methods, physico-chemical parameters, retting microbes, tensile strength, water quality

Procedia PDF Downloads 157
11505 Intrusion Detection System Based on Peer to Peer

Authors: Alireza Pour Ebrahimi, Vahid Abasi

Abstract:

Recently by the extension of internet usage, Research on the intrusion detection system takes a significant importance. Many of improvement systems prevent internal and external network attacks by providing security through firewalls and antivirus. In recently years, intrusion detection systems gradually turn from host-based systems and depend on O.S to the distributed systems which are running on multiple O.S. In this work, by considering the diversity of computer networks whit respect to structure, architecture, resource, services, users and also security goals requirement a fully distributed collaborative intrusion detection system based on peer to peer architecture is suggested. in this platform each partner device (matched device) considered as a peer-to-peer network. All transmitted information to network are visible only for device that use security scanning of a source. Experimental results show that the distributed architecture is significantly upgradeable in respect to centralized approach.

Keywords: network, intrusion detection system, peer to peer, internal and external network

Procedia PDF Downloads 548
11504 ECG Based Reliable User Identification Using Deep Learning

Authors: R. N. Begum, Ambalika Sharma, G. K. Singh

Abstract:

Identity theft has serious ramifications beyond data and personal information loss. This necessitates the implementation of robust and efficient user identification systems. Therefore, automatic biometric recognition systems are the need of the hour, and ECG-based systems are unquestionably the best choice due to their appealing inherent characteristics. The CNNs are the recent state-of-the-art techniques for ECG-based user identification systems. However, the results obtained are significantly below standards, and the situation worsens as the number of users and types of heartbeats in the dataset grows. As a result, this study proposes a highly accurate and resilient ECG-based person identification system using CNN's dense learning framework. The proposed research explores explicitly the calibre of dense CNNs in the field of ECG-based human recognition. The study tests four different configurations of dense CNN which are trained on a dataset of recordings collected from eight popular ECG databases. With the highest FAR of 0.04 percent and the highest FRR of 5%, the best performing network achieved an identification accuracy of 99.94 percent. The best network is also tested with various train/test split ratios. The findings show that DenseNets are not only extremely reliable but also highly efficient. Thus, they might also be implemented in real-time ECG-based human recognition systems.

Keywords: Biometrics, Dense Networks, Identification Rate, Train/Test split ratio

Procedia PDF Downloads 161
11503 The Great Mimicker: A Case of Disseminated Tuberculosis

Authors: W. Ling, Mohamed Saufi Bin Awang

Abstract:

Introduction: Mycobacterium tuberculosis post a major health problem worldwide. Central nervous system (CNS) infection by mycobacterium tuberculosis is one of the most devastating complications of tuberculosis. Although with advancement in medical fields, we are yet to understand the pathophysiology of how mycobacterium tuberculosis was able to cross the blood-brain barrier (BBB) and infect the CNS. CNS TB may present with nonspecific clinical symptoms which can mimic other diseases/conditions; this is what makes the diagnosis relatively difficult and challenging. Public health has to be informed and educated about the spread of TB, and early identification of TB is important as it is a curable disease. Case Report: A young 21-year-old Malay gentleman was initially presented to us with symptoms of ear discharge, tinnitus, and right-sided headache for the past one year. Further history reveals that the symptoms have been mismanaged and neglected over the period of 1 year. Initial investigation reveals features of inflammation of the ear. Further imaging showed the feature of chronic inflammation of the otitis media and atypical right cerebral abscess, which has the same characteristic features and consistency. He further underwent a biopsy, and results reveal positive Mycobacterium tuberculosis of the otitis media. With the results and the available imaging, we were certain that this is likely a case of disseminated tuberculosis causing CNS TB. Conclusion: We aim to highlight the challenge and difficult face in our health care system and public health in early identification and treatment.

Keywords: central nervous system tuberculosis, intracranial tuberculosis, tuberculous encephalopathy, tuberculous meningitis

Procedia PDF Downloads 189
11502 An Architectural Model of Multi-Agent Systems for Student Evaluation in Collaborative Game Software

Authors: Monica Hoeldtke Pietruchinski, Andrey Ricardo Pimentel

Abstract:

The teaching of computer programming for beginners has been presented to the community as a not simple or trivial task. Several methodologies and research tools have been developed; however, the problem still remains. This paper aims to present multi-agent system architecture to be incorporated to the educational collaborative game software for teaching programming that monitors, evaluates and encourages collaboration by the participants. A literature review has been made on the concepts of Collaborative Learning, Multi-agents systems, collaborative games and techniques to teach programming using these concepts simultaneously.

Keywords: architecture of multi-agent systems, collaborative evaluation, collaboration assessment, gamifying educational software

Procedia PDF Downloads 464
11501 Electrical Cardiac Remodeling in Elite Athletes: A Comparative Study between Triathletes and Cyclists

Authors: Lingxia Li, Frédéric Schnell, Thibault Lachard, Anne-Charlotte Dupont, Shuzhe Ding, Solène Le Douairon Lahaye

Abstract:

Background: Repetitive participation in triathlon training results in significant myocardial changes. However, whether the cardiac remodeling in triathletes is related to the specificities of the sport (consisting of three sports) raises questions. Methods: Elite triathletes and cyclists registered on the French ministerial lists of high-level athletes were involved. The basic information and routine electrocardiogram records were obtained. Electrocardiograms were evaluated according to clinical criteria. Results: Of the 105 athletes included in the study, 42 were from the short-distance triathlon (40%), and 63 were from the road cycling (60%). The average age was 22.1±4.2 years. The P wave amplitude was significantly lower in triathletes than in cyclists (p=0.005), and no significant statistical difference was found in heart rate, RR interval, PR or PQ interval, QRS complex, QRS axe, QT interval, and QTc (p>0.05). All the measured parameters were within normal ranges. The most common electrical manifestations were early repolarization (60.95%) and incomplete right bundle branch block (43.81%); there was no statistical difference between the groups (p>0.05). Conclusions: Prolonged intensive endurance exercise training induces physiological cardiac remodeling in both triathletes and cyclists. The most common electrocardiogram manifestations were early repolarization and incomplete right bundle branch block.

Keywords: cardiac screening, electrocardiogram, triathlon, cycling, elite athletes

Procedia PDF Downloads 7
11500 Survey of Intrusion Detection Systems and Their Assessment of the Internet of Things

Authors: James Kaweesa

Abstract:

The Internet of Things (IoT) has become a critical component of modern technology, enabling the connection of numerous devices to the internet. The interconnected nature of IoT devices, along with their heterogeneous and resource-constrained nature, makes them vulnerable to various types of attacks, such as malware, denial-of-service attacks, and network scanning. Intrusion Detection Systems (IDSs) are a key mechanism for protecting IoT networks and from attacks by identifying and alerting administrators to suspicious activities. In this review, the paper will discuss the different types of IDSs available for IoT systems and evaluate their effectiveness in detecting and preventing attacks. Also, examine the various evaluation methods used to assess the performance of IDSs and the challenges associated with evaluating them in IoT environments. The review will highlight the need for effective and efficient IDSs that can cope with the unique characteristics of IoT networks, including their heterogeneity, dynamic topology, and resource constraints. The paper will conclude by indicating where further research is needed to develop IDSs that can address these challenges and effectively protect IoT systems from cyber threats.

Keywords: cyber-threats, iot, intrusion detection system, networks

Procedia PDF Downloads 80
11499 Space Time Adaptive Algorithm in Bi-Static Passive Radar Systems for Clutter Mitigation

Authors: D. Venu, N. V. Koteswara Rao

Abstract:

Space – time adaptive processing (STAP) is an effective tool for detecting a moving target in spaceborne or airborne radar systems. Since airborne passive radar systems utilize broadcast, navigation and excellent communication signals to perform various surveillance tasks and also has attracted significant interest from the distinct past, therefore the need of the hour is to have cost effective systems as compared to conventional active radar systems. Moreover, requirements of small number of secondary samples for effective clutter suppression in bi-static passive radar offer abundant illuminator resources for passive surveillance radar systems. This paper presents a framework for incorporating knowledge sources directly in the space-time beam former of airborne adaptive radars. STAP algorithm for clutter mitigation for passive bi-static radar has better quantitation of the reduction in sample size thereby amalgamating the earlier data bank with existing radar data sets. Also, we proposed a novel method to estimate the clutter matrix and perform STAP for efficient clutter suppression based on small sample size. Furthermore, the effectiveness of the proposed algorithm is verified using MATLAB simulations in order to validate STAP algorithm for passive bi-static radar. In conclusion, this study highlights the importance for various applications which augments traditional active radars using cost-effective measures.

Keywords: bistatic radar, clutter, covariance matrix passive radar, STAP

Procedia PDF Downloads 296
11498 Prevalence of Tobacco Use and Practice among Patients Attending Dental Institution: A Cross-Sectional Study

Authors: Vinay Gupta, Seema Malhotra

Abstract:

Background: Patients who usually consume tobacco are unaware of its ill effects completely therefore it becomes necessary to educate and counselling them after obtaining their knowledge about tobacco. Aim: To measure prevalence of tobacco use among dental outpatients and to evaluation of tobacco user attending dental outpatients (OPD) prepared to quit. Methods: A cross-sectional survey, which was carried out on patients attending Outside Patient Department (OPD) of dental college of King Georges Medical University, Lucknow, India. All the patients who consumed tobacco attending the Dental College were asked to participate in the study. The questionnaire was written in English/ Hindi (local language). Participation in this study was voluntary and the questionnaire was anonymous and self-administered. The proposal of this survey had been approved by the ethical committee of institution. Informed consent was obtained from all the participants. Results: Prevalence of tobacco user attending the Dental OPD was 46.4%. Male tobacco user represented 85.9%. Smokeless tobacco (57%) user were more than smoking (1.4%) and 18.9% were using both smokeless and smoking tobacco. 40.7% start using tobacco since less than 5 years. 55.3% uses tobacco after get up in the morning. 87.1% tobacco user knows that it cause cancer. 54.8% respond that warning sign on packet/pouch effect on mind but due to addiction, it would not work out. 54.8% attempted for quitting but not successful. 90.0% willing to quit in future if facility provide. Conclusion: Higher prevalence of tobacco usage among study population and will to quit in future shows need of cessation clinic in every dental institution in India.

Keywords: tobacco, knowledge, practice, counselling

Procedia PDF Downloads 345
11497 Application of Imperialist Competitive Algorithm for Optimal Location and Sizing of Static Compensator Considering Voltage Profile

Authors: Vahid Rashtchi, Ashkan Pirooz

Abstract:

This paper applies the Imperialist Competitive Algorithm (ICA) to find the optimal place and size of Static Compensator (STATCOM) in power systems. The output of the algorithm is a two dimensional array which indicates the best bus number and STATCOM's optimal size that minimizes all bus voltage deviations from their nominal value. Simulations are performed on IEEE 5, 14, and 30 bus test systems. Also some comparisons have been done between ICA and the famous Particle Swarm Optimization (PSO) algorithm. Results show that how this method can be considered as one of the most precise evolutionary methods for the use of optimum compensator placement in electrical grids.

Keywords: evolutionary computation, imperialist competitive algorithm, power systems compensation, static compensators, voltage profile

Procedia PDF Downloads 605
11496 Prevalent Affective-Cognitive Functioning of Intimate Partner Offenders: A study with Inmates

Authors: Alexandra Serra, Nair Torrão, Rui G. Serôdio, José A. Lima

Abstract:

The present study aimed to evaluate the incidence and the prevalence of domestic violence legitimatory beliefs, emotional regulation difficulties and, early maladaptive schemas regarding intimidate partner violence in a sample of 50 Portuguese inmates. As expected, results show high levels of legitimatory beliefs, significant difficulties of emotional regulation and a set of high levels of early maladaptive schemas that clearly compromise the inmates affective-cognitive functioning. The most prevalent set of maladaptive schemas are associated with depression, anxiety, hostility, reduced ability to empathize and, dependence on the approval of others, which, combined, may trigger aggressive responses towards the intimate’s partner. Being victimized in their childhood and having committing murder are not differentiating factors on the measures we analyzed, but alcohol consumption may be associated with an intensification of domestic violence legitimatory beliefs. In the discussion of our findings, we compare the pattern of the psychosocial measures we used with the equivalent results obtained with convicted individuals that attend a community compulsory program, specifically designed for domestic violence perpetrators. We also highlight the importance of implementing specialized interventions in prison settings focusing on an evidence-based-practice.

Keywords: domestic violence, intimate partner offenders, incidence and prevalence of legitimatory beliefs, Portuguese inmates

Procedia PDF Downloads 531
11495 Stability and Boundedness Theorems of Solutions of Certain Systems of Differential Equations

Authors: Adetunji A. Adeyanju., Mathew O. Omeike, Johnson O. Adeniran, Biodun S. Badmus

Abstract:

In this paper, we discuss certain conditions for uniform asymptotic stability and uniform ultimate boundedness of solutions to some systems of Aizermann-type of differential equations by means of second method of Lyapunov. In achieving our goal, some Lyapunov functions are constructed to serve as basic tools. The stability results in this paper, extend some stability results for some Aizermann-type of differential equations found in literature. Also, we prove some results on uniform boundedness and uniform ultimate boundedness of solutions of systems of equations study.

Keywords: Aizermann, boundedness, first order, Lyapunov function, stability

Procedia PDF Downloads 84
11494 Expression of Hypoxia-Inducible Transmembrane Carbonic Anhydrases IX, Ca XII and Glut 1 in Ovarian Cancer

Authors: M. Sunitha, B. Nithyavani, Mathew Yohannan, S. Thiruvieni Balajji, M. A. Rathi, C. Arul Raj, P. Ragavendran, V. K. Gopalkrishnan

Abstract:

Establishment of an early and reliable biomarker for ovarian carcinogenesis whose expression can be monitored through noninvasive techniques will enable early diagnosis of cancer. Carbonic anhydrases (CA) isozymes IX and XII have been suggested to play a role in oncogenic processes. In von Hippel-Lindau (VHL)-defective tumors, the cell surface transmembrane carbonic anhydrase (CA) CA XI and CA XII genes are overexpressed because of the absence of pVHL. These enzymes are involved in causing a hypoxia condition, thereby providing an environment for metastasis. Aberrant expression of the facilitative glucose transporter GLUT I is found in a wide spectrum of epithelial malignancies. Studying the mRNA expression of CA IX, CA XII and Glut I isozymes in ovarian cancer cell lines (OAW-42 and PA-1) revealed the expression of these hypoxia genes. Immunohistochemical staining of carbonic anhydrases was also performed in 40 ovarian cancer tissues. CA IX and CA XII were expressed at 540 bp and 520 bp in OAW42, PA1 in ovarian cancer cell lines. GLUT-1 was expressed at 325bp in OAW 42, PA1 genes in ovarian cancer cell lines. Immunohistochemistry revealed high to moderate levels of expression of these enzymes. The immuostaining was seen predominantly on the cell surface membrane. The study concluded that these genes CA IX, CA XII and Glut I are expressed under hypoxic condition in tumor cells. From the present results expression of CA IX, XII and Glut I may represent potential targets in ovarian cancer therapy.

Keywords: ovarian cancer, carbonic anhydrase IX, XII, Glut I, tumor markers

Procedia PDF Downloads 369
11493 Research on the Strategy of Orbital Avoidance for Optical Remote Sensing Satellite

Authors: Zheng DianXun, Cheng Bo, Lin Hetong

Abstract:

This paper focuses on the orbit avoidance strategies of optical remote sensing satellite. The optical remote sensing satellite, moving along the Sun-synchronous orbit, is equipped with laser warning equipment to alert CCD camera from laser attacks. There are three ways to protect the CCD camera: closing the camera cover, satellite attitude maneuver and satellite orbit avoidance. In order to enhance the safety of optical remote sensing satellite in orbit, this paper explores the strategy of satellite avoidance. The avoidance strategy is expressed as the evasion of pre-determined target points in the orbital coordinates of virtual satellite. The so-called virtual satellite is a passive vehicle which superposes the satellite at the initial stage of avoidance. The target points share the consistent cycle time and the same semi-major axis with the virtual satellite, which ensures the properties of the satellite’s Sun-synchronous orbit remain unchanged. Moreover, to further strengthen the avoidance capability of satellite, it can perform multi-target-points avoid maneuvers. On occasions of fulfilling the satellite orbit tasks, the orbit can be restored back to virtual satellite through orbit maneuvers. Thereinto, the avoid maneuvers adopts pulse guidance. And the fuel consumption is also optimized. The avoidance strategy discussed in this article is applicable to optical remote sensing satellite when it is encountered with hostile attack of space-based laser anti-satellite.

Keywords: optical remote sensing satellite, satellite avoidance, virtual satellite, avoid target-point, avoid maneuver

Procedia PDF Downloads 404
11492 An Analysis of a Relational Frame Skills Training Intervention to Increase General Intelligence in Early Childhood

Authors: Ian M. Grey, Bryan Roche, Anna Dillon, Justin Thomas, Sarah Cassidy, Dylan Colbert, Ian Stewart

Abstract:

This paper presents findings from a study conducted in two schools in Abu Dhabi. The hypothesis is that teaching young children to derive various relations between stimuli leads to increases in full-scale IQ scores of typically developing children. In the experimental group, sixteen 6-7-year-old children were exposed over six weeks to an intensive training intervention designed specifically for their age group. This training intervention, presented on a tablet, aimed to improve their understanding of the relations Same, Opposite, Different, contextual control over the concept of Sameness and Difference, and purely arbitrary derived relational responding for Sameness and Difference. In the control group, sixteen 6-7-year-old children interacted with KIBO robotics over six weeks. KIBO purports to improve cognitive skills through engagement with STEAM activities. Increases in full-scale IQ were recorded for most children in the experimental group, while no increases in full-scale IQ were recorded for the control group. These findings support the hypothesis that relational skills underlie many aspects of general cognitive ability.

Keywords: early childhood, derived relational responding, intelligence, relational frame theory, relational skills

Procedia PDF Downloads 185
11491 Ideological and Poetological Tensions: Wu Mi’s Enterprise of Imitating and Translating George Gordon Byron

Authors: Hanjin Yan

Abstract:

The English Romantic George Gordon Byron (1788-1824) was widely celebrated by men of letters in early republican China as a Satanic freedom fighter challenging classical poetics and traditional values. However, Wu Mi (1894-1978), the most persistent critic of contemporary iconoclasm, perceived Byron as a paragon of self-righteous poet-exiles who maintained moral integrity and achieved poetic excellence during times of frustration, just like canonized classical Chinese poets. Wu Mi not only composed lengthy imitations of the third canto of Byron’s Childe Harold’s Pilgrimage (1816) but also patronized a rendering of the canto. Taking André Lefevere’s rewriting theory as a framework, this paper explores the interplay of ideology and poetics by examining Wu Mi’s imitations against Byron’s original and its Chinese translation patronized by Wu Mi. Textual analysis shows that Wu Mi’s approach to Byron’s poetry was informed not only by his endeavor to invigorate classical Chinese poetics, but also by his program to preserve China’s cultural traditions and integrate Western new humanism, a theory proposed by his Harvard mentor Irving Babbitt (1865-1933). This study reveals how Byron was appropriated to serve conflicting poetic and ideological purposes in early republican China and suggests that imitation as a type of rewriting merits further attention.

Keywords: George Gordon Byron, ideology, imitation, poetics, translation

Procedia PDF Downloads 230
11490 The Implementation of Inclusive Education in Collaboration between Teachers of Special Education Classes and Regular Classes in a Preschool

Authors: Chiou-Shiue Ko

Abstract:

As is explicitly stipulated in Article 7 of the Enforcement Rules of the Special Education Act as amended in 1998, "in principle, children with disabilities should be integrated with normal children for preschool education". Since then, all cities and counties have been committed to promoting preschool inclusive education. The Education Department, New Taipei City Government, has been actively recruiting advisory groups of professors to assist in the implementation of inclusive education in preschools since 2001. Since 2011, the author of this study has been guiding Preschool Rainbow to implement inclusive education. Through field observations, meetings, and teaching demonstration seminars, this study explored the process of how inclusive education has been successfully implemented in collaboration with teachers of special education classes and regular classes in Preschool Rainbow. The implementation phases for inclusive education in a single academic year include the following: 1) Preparatory stage. Prior to implementation, teachers in special education and regular classes discuss ways of conducting inclusive education and organize reading clubs to read books related to curriculum modifications that integrate the eight education strategies, early treatment and education, and early childhood education programs to enhance their capacity to implement and compose teaching plans for inclusive education. In addition to the general objectives of inclusive education, the objective of inclusive education for special children is also embedded into the Individualized Education Program (IEP). 2) Implementation stage. Initially, a promotional program for special education is implemented for the children to allow all the children in the preschool to understand their own special qualities and those of special children. After the implementation of three weeks of reverse inclusion, the children in the special education classes are put into groups and enter the regular classes twice a week to implement adjustments to their inclusion in the learning area and the curriculum. In 2013, further cooperation was carried out with adjacent hospitals to perform development screening activities for the early detection of children with developmental delays. 3) Review and reflection stage. After the implementation of inclusive education, all teachers in the preschool are divided into two groups to record their teaching plans and the lessons learned during implementation. The effectiveness of implementing the objective of inclusive education is also reviewed. With the collaboration of all teachers, in 2015, Preschool Rainbow won New Taipei City’s “Preschool Light” award as an exceptional model for inclusive education. Its model of implementing inclusive education can be used as a reference for other preschools.

Keywords: collaboration, inclusive education, preschool, teachers, special education classes, regular classes

Procedia PDF Downloads 429
11489 Comparing the Durability of Saudi Silica Sands for Use in Foundry Processing

Authors: Mahdi Alsagour, Sam Ramrattan

Abstract:

This paper was developed to investigate two types of sands from the Kingdom of Saudi Arabia (KSA) for potential use in the global metal casting industry. Four types of sands were selected for study, two of the sand systems investigated are natural sands from the KSA. The third sand sample is a heat processed synthetic sand and the last sample is commercially available US silica sand that is used as a control in the study. The purpose of this study is to define the durability of the four sand systems selected for foundry usage. Additionally, chemical analysis of the sand systems is presented before and after elevated temperature exposure. Results show that Saudi silica sands are durable and can be used in foundry processing.

Keywords: alternative molding media, foundry sand, reclamation, silica sand, specialty sand

Procedia PDF Downloads 138