Search results for: effective computing
9141 Iot Device Cost Effective Storage Architecture and Real-Time Data Analysis/Data Privacy Framework
Authors: Femi Elegbeleye, Omobayo Esan, Muienge Mbodila, Patrick Bowe
Abstract:
This paper focused on cost effective storage architecture using fog and cloud data storage gateway and presented the design of the framework for the data privacy model and data analytics framework on a real-time analysis when using machine learning method. The paper began with the system analysis, system architecture and its component design, as well as the overall system operations. The several results obtained from this study on data privacy model shows that when two or more data privacy model is combined we tend to have a more stronger privacy to our data, and when fog storage gateway have several advantages over using the traditional cloud storage, from our result shows fog has reduced latency/delay, low bandwidth consumption, and energy usage when been compare with cloud storage, therefore, fog storage will help to lessen excessive cost. This paper dwelt more on the system descriptions, the researchers focused on the research design and framework design for the data privacy model, data storage, and real-time analytics. This paper also shows the major system components and their framework specification. And lastly, the overall research system architecture was shown, its structure, and its interrelationships.Keywords: IoT, fog, cloud, data analysis, data privacy
Procedia PDF Downloads 969140 Solving Linear Systems Involved in Convex Programming Problems
Authors: Yixun Shi
Abstract:
Many interior point methods for convex programming solve an (n+m)x(n+m)linear system in each iteration. Many implementations solve this system in each iteration by considering an equivalent mXm system (4) as listed in the paper, and thus the job is reduced into solving the system (4). However, the system(4) has to be solved exactly since otherwise the error would be entirely passed onto the last m equations of the original system. Often the Cholesky factorization is computed to obtain the exact solution of (4). One Cholesky factorization is to be done in every iteration, resulting in higher computational costs. In this paper, two iterative methods for solving linear systems using vector division are combined together and embedded into interior point methods. Instead of computing one Cholesky factorization in each iteration, it requires only one Cholesky factorization in the entire procedure, thus significantly reduces the amount of computation needed for solving the problem. Based on that, a hybrid algorithm for solving convex programming problems is proposed.Keywords: convex programming, interior point method, linear systems, vector division
Procedia PDF Downloads 4019139 Optimal Design of Redundant Hybrid Manipulator for Minimum Singularity
Authors: Arash Rahmani, Ahmad Ghanbari, Abbas Baghernezhad, Babak Safaei
Abstract:
In the design of parallel manipulators, usually mean value of a dexterity measure over the workspace volume is considered as the objective function to be used in optimization algorithms. The mentioned indexes in a hybrid parallel manipulator (HPM) are quite complicated to solve thanks to infinite solutions for every point within the workspace of the redundant manipulators. In this paper, spatial isotropic design axioms are extended as a well-known method for optimum design of manipulators. An upper limit for the isotropy measure of HPM is calculated and instead of computing and minimizing isotropy measure, minimizing the obtained limit is considered. To this end, two different objective functions are suggested which are obtained from objective functions of comprising modules. Finally, by using genetic algorithm (GA), the best geometric parameters for a specific hybrid parallel robot which is composed of two modified Gough-Stewart platforms (MGSP) are achieved.Keywords: hybrid manipulator, spatial isotropy, genetic algorithm, optimum design
Procedia PDF Downloads 3349138 Bacterial Decontamination of Nurses' White Coats by Application of Antimicrobial Finish
Authors: Priyanka Gupta, Nilanjana Bairagi, Deepti Gupta
Abstract:
New pathogenic strains of microbes are continually emerging and resistance of bacteria to antibiotics is growing. Hospitals in India have a high burden of infections in their intensive care units and general wards. Rising incidence of hospital infections is a matter of great concern in India. This growth is often attributed to the absence of effective infection control strategies in healthcare facilities. Government, therefore, is looking for cost effective strategies that are effective against HAIs. One possible method is by application of an antimicrobial finish on the uniform. But there are limited studies to show the effect of antimicrobial activity of antimicrobial finish treated nurses’ uniforms in a real hospital set up. This paper proposes a prospective non-destructive sampling technique, based on the use of a detachable fabric patch, to assess the effectiveness of silver based antimicrobial agent across five wards in a tertiary care government hospital in Delhi, India. Fabrics like polyester and polyester cotton blend fabric which are more prevalent for making coats were selected for the study. Polyester and polyester cotton blend fabric was treated with silver based antimicrobial (AM) finish. At the beginning of shift, a composite patch of untreated and treated fabric respectively was stitched on the abdominal region on the left and right side of the washed white coat of participating nurse. At the end of the shift, the patch was removed and taken for bacterial sampling on Brain Heart Infusion (BHI) plates. Microbial contamination on polyester and blend fabrics after 6 hours shift was compared in Brain Heart Infusion broth (BHI). All patches treated with silver based antimicrobial agent showed decreased bacterial counts. Percent reduction in the bacterial colonies after the antimicrobial treatment in both fabrics was 81.0 %. Antimicrobial finish was equally effective in reducing microbial adhesion on both fabric types. White coats of nurses become progressively contaminated during clinical care. Type of fabric used to make the coat can affect the extent of contamination which is higher on polyester cotton blend as compared to 100% polyester. The study highlights the importance of silver based antimicrobial finish in the area of uniform hygiene. Bacterial load can be reduced by using antimicrobial finish on hospital uniforms. Hospital staff uniforms endowed with antimicrobial properties may be of great help in reducing the occurrence and spread of infections.Keywords: antimicrobial finish, bacteria, infection control, silver, white coat
Procedia PDF Downloads 2159137 Graph Codes - 2D Projections of Multimedia Feature Graphs for Fast and Effective Retrieval
Authors: Stefan Wagenpfeil, Felix Engel, Paul McKevitt, Matthias Hemmje
Abstract:
Multimedia Indexing and Retrieval is generally designed and implemented by employing feature graphs. These graphs typically contain a significant number of nodes and edges to reflect the level of detail in feature detection. A higher level of detail increases the effectiveness of the results but also leads to more complex graph structures. However, graph-traversal-based algorithms for similarity are quite inefficient and computation intensive, especially for large data structures. To deliver fast and effective retrieval, an efficient similarity algorithm, particularly for large graphs, is mandatory. Hence, in this paper, we define a graph-projection into a 2D space (Graph Code) as well as the corresponding algorithms for indexing and retrieval. We show that calculations in this space can be performed more efficiently than graph-traversals due to a simpler processing model and a high level of parallelization. In consequence, we prove that the effectiveness of retrieval also increases substantially, as Graph Codes facilitate more levels of detail in feature fusion. Thus, Graph Codes provide a significant increase in efficiency and effectiveness (especially for Multimedia indexing and retrieval) and can be applied to images, videos, audio, and text information.Keywords: indexing, retrieval, multimedia, graph algorithm, graph code
Procedia PDF Downloads 1589136 Data Poisoning Attacks on Federated Learning and Preventive Measures
Authors: Beulah Rani Inbanathan
Abstract:
In the present era, it is vivid from the numerous outcomes that data privacy is being compromised in various ways. Machine learning is one technology that uses the centralized server, and then data is given as input which is being analyzed by the algorithms present on this mentioned server, and hence outputs are predicted. However, each time the data must be sent by the user as the algorithm will analyze the input data in order to predict the output, which is prone to threats. The solution to overcome this issue is federated learning, where the models alone get updated while the data resides on the local machine and does not get exchanged with the other local models. Nevertheless, even on these local models, there are chances of data poisoning, and it is crystal clear from various experiments done by many people. This paper delves into many ways where data poisoning occurs and the many methods through which it is prevalent that data poisoning still exists. It includes the poisoning attacks on IoT devices, Edge devices, Autoregressive model, and also, on Industrial IoT systems and also, few points on how these could be evadible in order to protect our data which is personal, or sensitive, or harmful when exposed.Keywords: data poisoning, federated learning, Internet of Things, edge computing
Procedia PDF Downloads 859135 Application of Acinetobacter sp. KKU44 for Cellulase Production from Agricultural Waste
Authors: Surasak Siripornadulsil, Nutt Poomai, Wilailak Siripornadulsil
Abstract:
Due to a high ethanol demand, the approach for effective ethanol production is important and has been developed rapidly worldwide. Several agricultural wastes are highly abundant in celluloses and the effective cellulose enzymes do exist widely among microorganisms. Accordingly, the cellulose degradation using microbial cellulose to produce a low-cost substrate for ethanol production has attracted more attention. In this study, the cellulose producing bacterial strain has been isolated from rich straw and identified by 16S rDNA sequence analysis as Acinetobacter sp. KKU44. This strain is able to grow and exhibit the cellulose activity. The optimal temperature for its growth and cellulose production is 37 °C. The optimal temperature of bacterial cellulose activity is 60 °C. The cellulose enzyme from Acinetobacter sp. KKU44 is heat-tolerant enzyme. The bacterial culture of 36 h. showed highest cellulose activity at 120 U/mL when grown in LB medium containing 2% (w/v). The capability of Acinetobacter sp. KKU44 to grow in cellulosic agricultural wastes as a sole carbon source and exhibiting the high cellulose activity at high temperature suggested that this strain could be potentially developed further as a cellulose degrading strain for a production of low-cost substrate used in ethanol production.Keywords: cellulose enzyme, bagasse, rice straw, rice husk, acinetobacter sp. KKU44
Procedia PDF Downloads 3129134 Adapting an Accurate Reverse-time Migration Method to USCT Imaging
Authors: Brayden Mi
Abstract:
Reverse time migration has been widely used in the Petroleum exploration industry to reveal subsurface images and to detect rock and fluid properties since the early 1980s. The seismic technology involves the construction of a velocity model through interpretive model construction, seismic tomography, or full waveform inversion, and the application of the reverse-time propagation of acquired seismic data and the original wavelet used in the acquisition. The methodology has matured from 2D, simple media to present-day to handle full 3D imaging challenges in extremely complex geological conditions. Conventional Ultrasound computed tomography (USCT) utilize travel-time-inversion to reconstruct the velocity structure of an organ. With the velocity structure, USCT data can be migrated with the “bend-ray” method, also known as migration. Its seismic application counterpart is called Kirchhoff depth migration, in which the source of reflective energy is traced by ray-tracing and summed to produce a subsurface image. It is well known that ray-tracing-based migration has severe limitations in strongly heterogeneous media and irregular acquisition geometries. Reverse time migration (RTM), on the other hand, fully accounts for the wave phenomena, including multiple arrives and turning rays due to complex velocity structure. It has the capability to fully reconstruct the image detectable in its acquisition aperture. The RTM algorithms typically require a rather accurate velocity model and demand high computing powers, and may not be applicable to real-time imaging as normally required in day-to-day medical operations. However, with the improvement of computing technology, such a computational bottleneck may not present a challenge in the near future. The present-day (RTM) algorithms are typically implemented from a flat datum for the seismic industry. It can be modified to accommodate any acquisition geometry and aperture, as long as sufficient illumination is provided. Such flexibility of RTM can be conveniently implemented for the application in USCT imaging if the spatial coordinates of the transmitters and receivers are known and enough data is collected to provide full illumination. This paper proposes an implementation of a full 3D RTM algorithm for USCT imaging to produce an accurate 3D acoustic image based on the Phase-shift-plus-interpolation (PSPI) method for wavefield extrapolation. In this method, each acquired data set (shot) is propagated back in time, and a known ultrasound wavelet is propagated forward in time, with PSPI wavefield extrapolation and a piece-wise constant velocity model of the organ (breast). The imaging condition is then applied to produce a partial image. Although each image is subject to the limitation of its own illumination aperture, the stack of multiple partial images will produce a full image of the organ, with a much-reduced noise level if compared with individual partial images.Keywords: illumination, reverse time migration (RTM), ultrasound computed tomography (USCT), wavefield extrapolation
Procedia PDF Downloads 739133 Addressing Differentiation Using Mobile-Assisted Language Learning
Authors: Ajda Osifo, Fatma Elshafie
Abstract:
Mobile-assisted language learning favors social-constructivist and connectivist theories to learning and adaptive approaches to teaching. It offers many opportunities to differentiated instruction in meaningful ways as it enables learners to become more collaborative, engaged and independent through additional dimensions such as web-based media, virtual learning environments, online publishing to an imagined audience and digitally mediated communication. MALL applications can be a tool for the teacher to personalize and adjust instruction according to the learners’ needs and give continuous feedback to improve learning and performance in the process, which support differentiated instruction practices. This paper explores the utilization of Mobile Assisted Language Learning applications as a supporting tool for effective differentiation in the language classroom. It reports overall experience in terms of implementing MALL to shape and apply differentiated instruction and expand learning options. This session is structured in three main parts: first, a review of literature and effective practice of academically responsive instruction will be discussed. Second, samples of differentiated tasks, activities, projects and learner work will be demonstrated with relevant learning outcomes and learners’ survey results. Finally, project findings and conclusions will be given.Keywords: academically responsive instruction, differentiation, mobile learning, mobile-assisted language learning
Procedia PDF Downloads 4159132 Investigation of Dry Ice Mixed Novel Hybrid Lubri-Coolant in Sustainable Machining of Ti-6AL-4V Alloy: A Comparison of Experimental and Modelling
Authors: Muhammad Jamil, Ning He, Aqib Mashood Khan, Munish Kumar Gupta
Abstract:
Ti-6Al-4V has numerous applications in the medical, automobile, and aerospace industries due to corrosion resistivity, structural stability, and chemical inertness to most fluids at room temperature. These peculiar characteristics are beneficial for their application and present formidable challenges during machining. Machining of Ti-6Al-4V produces an elevated cutting temperature above 1000oC at dry conditions. This accelerates tool wear and reduces product quality. Therefore, there is always a need to employ sustainable/effective coolant/lubricant when machining such alloy. In this study, Finite Element Modeling (FEM) and experimental analysis when cutting Ti-6Al-4V under a distinctly developed dry ice mixed hybrid lubri-coolant are presented. This study aims to model the milling process of Ti-6Al-4V under a proposed novel hybrid lubri-coolant using different cutting speeds and feed per tooth DEFORM® software package was used to conduct the FEM and the numerical model was experimentally validated. A comparison of experimental and simulation results showed a maximum error of no more than 6% for all experimental conditions. In a nutshell, it can be said that the proposed model is effective in predicting the machining temperature precisely.Keywords: friction coefficient, heat transfer, finite element modeling (FEM), milling Ti-6Al-4V
Procedia PDF Downloads 579131 Affective (And Effective) Teaching and Learning: Higher Education Gets Social Again
Authors: Laura Zizka, Gaby Probst
Abstract:
The Covid-19 pandemic has affected the way Higher Education Institutions (HEIs) have given their courses. From emergency remote where all students and faculty were immediately confined to home teaching and learning, the continuing evolving sanitary situation obliged HEIs to adopt other methods of teaching and learning from blended courses that included both synchronous and asynchronous courses and activities to hy-flex models where some students were on campus while others followed the course simultaneously online. Each semester brought new challenges for HEIs and, subsequently, additional emotional reactions. This paper investigates the affective side of teaching and learning in various online modalities and its toll on students and faculty members over the past three semesters. The findings confirm that students and faculty who have more self-efficacy, flexibility, and resilience reported positive emotions and embraced the opportunities that these past semesters have offered. While HEIs have begun a new semester in an attempt to return to ‘normal’ face-to-face courses, this paper posits that there are lessons to be learned from these past three semesters. The opportunities that arose from the challenge of the pandemic should be considered when moving forward by focusing on a greater emphasis on the affective aspect of teaching and learning in HEIs worldwide.Keywords: effective teaching and learning, higher education, engagement, interaction, motivation
Procedia PDF Downloads 1159130 Integration of Wireless Sensor Networks and Radio Frequency Identification (RFID): An Assesment
Authors: Arslan Murtaza
Abstract:
RFID (Radio Frequency Identification) and WSN (Wireless sensor network) are two significant wireless technologies that have extensive diversity of applications and provide limitless forthcoming potentials. RFID is used to identify existence and location of objects whereas WSN is used to intellect and monitor the environment. Incorporating RFID with WSN not only provides identity and location of an object but also provides information regarding the condition of the object carrying the sensors enabled RFID tag. It can be widely used in stock management, asset tracking, asset counting, security, military, environmental monitoring and forecasting, healthcare, intelligent home, intelligent transport vehicles, warehouse management, and precision agriculture. This assessment presents a brief introduction of RFID, WSN, and integration of WSN and RFID, and then applications related to both RFID and WSN. This assessment also deliberates status of the projects on RFID technology carried out in different computing group projects to be taken on WSN and RFID technology.Keywords: wireless sensor network, RFID, embedded sensor, Wi-Fi, Bluetooth, integration, time saving, cost efficient
Procedia PDF Downloads 3339129 Drivers for Relationship Building in the Supply Chain: The Case of Luxury Food
Authors: Kateryna Merkulova, Alessio Castello, Maria Kreuzer
Abstract:
This research investigates the drivers of long-term relationship building between customers and suppliers within the luxury food supply chain, a topic that remains largely unexplored in the current state of academic literature. This paper identifies for the first time the key elements that influence the formation and maintenance of effective supply chain relationships, which are crucial for navigating the complexities of the luxury food industry. In particular, it explores the critical role of trust in a business-to-business context, specifically emphasizing its significance in the luxury food supply chain. Empirically, this research is contextualized in the region of the French Riviera, which offers a gastronomic playground for food enthusiasts, making it ideally suited to explore the luxury food sector. Qualitative in-depth interviews with stakeholders along the luxury supply chain (i.e., suppliers, chefs, restaurant owners, and fine food shop managers) allow identifying key drivers of trustful business relationships. Triangulating different perspectives of stakeholders within the luxury supply chain adds validity and robustness to the findings. The findings have important theoretical and managerial implications for the effective functioning of long-term supplier-buyer relationships.Keywords: luxury food, relationship building, B2B, supply chain, trust
Procedia PDF Downloads 529128 Easily Memorable Strong Password Generation and Retrieval
Authors: Shatadru Das, Natarajan Vijayarangan
Abstract:
In this paper, a system and method for generating and recovering an authorization code has been designed and analyzed. The system creates an authorization code by accepting a base-sentence from a user. Based on the characters present in this base-sentence, the system computes a base-sentence matrix. The system also generates a plurality of patterns. The user can either select the pattern from the multiple patterns suggested by the system or can create his/her own pattern. The system then performs multiplications between the base-sentence matrix and the selected pattern matrix at different stages in the path forward, for obtaining a strong authorization code. In case the user forgets the base sentence, the system has a provision to manage and retrieve 'forgotten authorization code'. This is done by fragmenting the base sentence into different matrices and storing the fragmented matrices into a repository after computing matrix multiplication with a security question-answer approach and with a secret key provided by the user.Keywords: easy authentication, key retrieval, memorable passwords, strong password generation
Procedia PDF Downloads 3999127 Integration of Smart Grid Technologies with Smart Phones for Energy Monitoring and Management
Authors: Arjmand Khaliq, Pemra Sohaib
Abstract:
There is increasing trend of use of smart devices in the present age. The growth of computing techniques and advancement in hardware has also brought the use of sensors and smart devices to a high degree during the course of time. So use of smart devices for control, management communication and optimization has become very popular. This paper gives proposed methodology which involves sensing and switching unite for load, two way communications between utility company and smart phones of consumers using cellular techniques and price signaling resulting active participation of user in energy management .The goal of this proposed control methodology is active participation of user in energy management with accommodation of renewable energy resource. This will provide load adjustment according to consumer’s choice, increased security and reliability for consumer, switching of load according to consumer need and monitoring and management of energy.Keywords: cellular networks, energy management, renewable energy source, smart grid technology
Procedia PDF Downloads 4129126 Influence of Emotional Intelligence on Educational Supervision and Leadership Style in Saudi Arabia
Authors: Jawaher Bakheet Almudarra
Abstract:
An Educational Supervisor assists teachers to develop their competence and skills in teaching, solving educational problems, and to improve the teaching methods to suit the educational process. They evaluate their teachers and write reports based on their assessments. In 1957, the Saudi Ministry of Education instituted Educational Supervision to facilitate effective management of schools, however, there have been concerns that the Educational Supervision has not been effective in executing its mandate. Studies depicted that Educational supervision has not been effective because it has been marred by poor and autocratic leadership practices such as stringent inspection, commanding and judging. Therefore, there is need to consider some of the ways in which school outcomes can be enhanced through the improvement of Educational supervision practices. Emotional intelligence is a relatively new concept that can be integrated into the Saudi education system that is yet to be examined in-depth and embraced particularly in the realm of educational leadership. Its recognition and adoption may improve leadership practices among Educational supervisors. This study employed a qualitative interpretive approach that will focus on decoding, describing and interpreting the connection between emotional intelligence and leadership. The study also took into account the social constructions that include consciousness, language and shared meanings. The data collection took place in the Office of Educational Supervisors in Riyadh and involved 4 Educational supervisors and 20 teachers from both genders- male and female. The data collection process encompasses three methods namely; qualitative emotional intelligence self-assessment questionnaires, reflective semi-structured interviews, and open workshops. The questionnaires would explore whether the Educational supervisors understand the meaning of emotional intelligence and its significance in enhancing the quality of education system in Saudi Arabia. Subsequently, reflective semi-structured interviews were carried out with the Educational supervisors to explore the connection between their leadership styles and the way they conceptualise their emotionality. The open workshops will include discussions on emotional aspects of Educational supervisors’ practices and how Educational supervisors make use of the emotional intelligence discourse in their leadership and supervisory relationships.Keywords: directors of educational supervision, emotional intelligence, educational leadership, education management
Procedia PDF Downloads 4279125 Simulation and Modeling of High Voltage Pulse Transformer
Authors: Zahra Emami, H. Reza Mesgarzade, A. Morad Ghorbami, S. Reza Motahari
Abstract:
This paper presents a method for calculation of parasitic elements consisting of leakage inductance and parasitic capacitance in a high voltage pulse transformer. The parasitic elements of pulse transformers significantly influence the resulting pulse shape of a power modulator system. In order to prevent the effects on the pulse shape before constructing the transformer an electrical model is needed. The technique procedures for computing these elements are based on finite element analysis. The finite element model of pulse transformer is created using software "Ansys Maxwell 3D". Finally, the transformer parasitic elements is calculated and compared with the value obtained from the actual test and pulse modulator is simulated and results is compared with actual test of pulse modulator. The results obtained are very similar with the test values.Keywords: pulse transformer, simulation, modeling, Maxwell 3D, modulator
Procedia PDF Downloads 4579124 A Comprehensive Review of Yoga and Core Strength: Strengthening Core Muscles as Important Method for Injury Prevention (Lower Back Pain) and Performance Enhancement in Sports
Authors: Pintu Modak
Abstract:
The core strength is essential not only for athletes but also for everyone to perform everyday's household chores with ease and efficiency. Core strength means to strengthen the muscles deep within the abdomen which connect to the spine and pelvis which control the position and movement of the central portion of the body. Strengthening of core muscles is important for injury prevention (lower back pain) and performance enhancement in sports. The purpose of the study was to review the literature and findings on the effects of Yoga exercise as a part of sports training method and fitness programs. Fifteen papers were found to be relevant for this review. There are five simple yoga poses: Ardha Phalakasana (Low plank), Vasisthasana (side plank), Purvottanasana (inclined plane), Sarvangasana (shoulder stand), and Virabhadrasana (Warrior) are found to be very effective for strengthening core muscles. They are the most effective poses to build core strength and flexibility to the core muscles. The study suggests that sports and fitness trainers should include these yoga exercises in their programs to strengthen core muscles.Keywords: core strength, yoga, injuries, lower back
Procedia PDF Downloads 2749123 Blockchain’s Feasibility in Military Data Networks
Authors: Brenden M. Shutt, Lubjana Beshaj, Paul L. Goethals, Ambrose Kam
Abstract:
Communication security is of particular interest to military data networks. A relatively novel approach to network security is blockchain, a cryptographically secured distribution ledger with a decentralized consensus mechanism for data transaction processing. Recent advances in blockchain technology have proposed new techniques for both data validation and trust management, as well as different frameworks for managing dataflow. The purpose of this work is to test the feasibility of different blockchain architectures as applied to military command and control networks. Various architectures are tested through discrete-event simulation and the feasibility is determined based upon a blockchain design’s ability to maintain long-term stable performance at industry standards of throughput, network latency, and security. This work proposes a consortium blockchain architecture with a computationally inexpensive consensus mechanism, one that leverages a Proof-of-Identity (PoI) concept and a reputation management mechanism.Keywords: blockchain, consensus mechanism, discrete-event simulation, fog computing
Procedia PDF Downloads 1379122 Intervention of Threat and Surveillance on the Obedience of Preschool Children
Authors: Sarah Mhae Diaz, Erika Anna De Leon, Jacklin Alwil Cartagena, Geordan Caruncong, Micah Riezl Gonzales
Abstract:
This study examined the intervention of threat and surveillance on the obedience of 100 preschool children through a task variable experiment replicated from the previous studies of Higbee (1979), and Chua, J., Chua, M., & Pico (1983). Nowadays, obedience among Filipino children to authority is disregarded since they are more outspoken and rebel due to social influences. With this, aside from corporal punishment, threat and surveillance became a mean of inducing obedience. Threat, according to the Dissonance Theory, can give attitudinal change. On the other hand, surveillance, according to the Theory of Social Facilitation, can either contribute to the completion or failure to do a task. Through a 2x2 factorial design, results show; (1) threat (F(1,96) = 12.487, p < 0.05) and (2) surveillance (F(1,96)=9.942, p<.05) had a significant main effect on obedience, suggesting that the Dissonance Theory and Theory of Social Facilitation is respectively true in the study. On the other hand, (3) no interaction (F(1,96)=1.303, p > .05) was seen since threat and surveillance both have a main effect that could be positive or negative, or could be because of their complementary property as supported by the post-hoc results. Also, (4) most effective commanding style is threat and surveillance setting (M = 30.04, SD = 7.971) due to the significant main effect of the two variables. With this, in the Filipino Setting, threat and surveillance has proven to be a very effective strategy to discipline and induce obedience from a child.Keywords: experimental study, obedience, preschool children, surveillance, threat
Procedia PDF Downloads 4869121 Geovisualisation for Defense Based on a Deep Learning Monocular Depth Reconstruction Approach
Authors: Daniel R. dos Santos, Mateus S. Maldonado, Estevão J. R. Batista
Abstract:
The military commanders increasingly dependent on spatial awareness, as knowing where enemy are, understanding how war battle scenarios change over time, and visualizing these trends in ways that offer insights for decision-making. Thanks to advancements in geospatial technologies and artificial intelligence algorithms, the commanders are now able to modernize military operations on a universal scale. Thus, geovisualisation has become an essential asset in the defense sector. It has become indispensable for better decisionmaking in dynamic/temporal scenarios, operation planning and management for the war field, situational awareness, effective planning, monitoring, and others. For example, a 3D visualization of war field data contributes to intelligence analysis, evaluation of postmission outcomes, and creation of predictive models to enhance decision-making and strategic planning capabilities. However, old-school visualization methods are slow, expensive, and unscalable. Despite modern technologies in generating 3D point clouds, such as LIDAR and stereo sensors, monocular depth values based on deep learning can offer a faster and more detailed view of the environment, transforming single images into visual information for valuable insights. We propose a dedicated monocular depth reconstruction approach via deep learning techniques for 3D geovisualisation of satellite images. It introduces scalability in terrain reconstruction and data visualization. First, a dataset with more than 7,000 satellite images and associated digital elevation model (DEM) is created. It is based on high resolution optical and radar imageries collected from Planet and Copernicus, on which we fuse highresolution topographic data obtained using technologies such as LiDAR and the associated geographic coordinates. Second, we developed an imagery-DEM fusion strategy that combine feature maps from two encoder-decoder networks. One network is trained with radar and optical bands, while the other is trained with DEM features to compute dense 3D depth. Finally, we constructed a benchmark with sparse depth annotations to facilitate future research. To demonstrate the proposed method's versatility, we evaluated its performance on no annotated satellite images and implemented an enclosed environment useful for Geovisualisation applications. The algorithms were developed in Python 3.0, employing open-source computing libraries, i.e., Open3D, TensorFlow, and Pythorch3D. The proposed method provides fast and accurate decision-making with GIS for localization of troops, position of the enemy, terrain and climate conditions. This analysis enhances situational consciousness, enabling commanders to fine-tune the strategies and distribute the resources proficiently.Keywords: depth, deep learning, geovisualisation, satellite images
Procedia PDF Downloads 59120 Continuous Dyeing of Graphene and Polyaniline on Textiles for Electromagnetic interference Shielding: An Application of Intelligent Fabrics
Authors: Mourad Makhlouf Sabrina Bouriche, Zoubir Benmaamar, Didier Villemin
Abstract:
Background: The increasing presence of electromagnetic interference (EMI) requires the development of effective protection solutions. Intelligent textiles offer a promising approach due to their wear ability and the possibility of integration into everyday clothing. In this study, the use of graphene and polyaniline for EMI shielding on cotton fabrics was examined. Methods: In this study, the continuous dyeing of recycled graphite-derived graphene and polyaniline was examined. Bottom-reforming technology was adopted to improve adhesion and achieve uniform distribution of conductive material on the fiber surface. The effect of material weight ratio on fabric performance and X-band EMI shielding effectiveness (SE) was evaluated. Significant Findings: The dyed cotton fabrics incorporating graphene, polyaniline, and their combination exhibited improved conductivity. Notably, these fabrics achieved EMI SE values ranging from 9 to 16 dB within the X-band frequency range (8-9 GHz). These findings demonstrate the potential of this approach for developing intelligent textiles with effective EMI shielding capabilities. Additionally, the utilization of recycled materials contributes to a more sustainable shielding solution.Keywords: Intelligent textiles, graphene, polyaniline, electromagnetic shielding, conductivity, recycling
Procedia PDF Downloads 419119 Studying on Pile Seismic Operation with Numerical Method by Using FLAC 3D Software
Authors: Hossein Motaghedi, Kaveh Arkani, Siavash Salamatpoor
Abstract:
Usually the piles are important tools for safety and economical design of high and heavy structures. For this aim the response of single pile under dynamic load is so effective. Also, the agents which have influence on single pile response are properties of pile geometrical, soil and subjected loads. In this study the finite difference numerical method and by using FLAC 3D software is used for evaluation of single pile behavior under peak ground acceleration (PGA) of El Centro earthquake record in California (1940). The results of this models compared by experimental results of other researchers and it will be seen that the results of this models are approximately coincide by experimental data's. For example the maximum moment and displacement in top of the pile is corresponding to the other experimental results of pervious researchers. Furthermore, in this paper is tried to evaluate the effective properties between soil and pile. The results is shown that by increasing the pile diagonal, the pile top displacement will be decreased. As well as, by increasing the length of pile, the top displacement will be increased. Also, by increasing the stiffness ratio of pile to soil, the produced moment in pile body will be increased and the taller piles have more interaction by soils and have high inertia. So, these results can help directly to optimization design of pile dimensions.Keywords: pile seismic response, interaction between soil and pile, numerical analysis, FLAC 3D
Procedia PDF Downloads 3869118 Rethinking Military Aid to Civil Authorities for Internal Security Operations: A Sustainable Solution to Rebuilding Civil Military Relations in Nigeria
Authors: Emmanuela Ngozi Maduka
Abstract:
In Nigeria, civil-military relations is at its lowest point as a result of the challenges emanating from incessant initiation of military aid to civil authorities (MACA) for internal security operations. This paper is concerned with the question whether it is appropriate for the military to handle internal security crisis with exception to terrorism and armed militia. It analyses the legal framework for MACA in internal security operations which appear to be in contradiction with military tactical and equipment training. The paper argues that the expectation that transitional re-training of the military for internal security operations will reconcile these inconsistencies specifically on the issue of use of force is not practicable and will always pose challenges for both the military and the citizens. Accordingly, this paper adopts a socio-legal methodology for better clarity on the interactions between the legal framework on MACA and military internal security operations. The paper also identifies the lack of effective and proficient paramilitary within the security design of Nigeria as the key issue which results in incessant initiation of MACA and advocates for the establishment of an effective and proficient paramilitary to effectively handle internal security crisis within Nigeria.Keywords: civil-military relations, MACA, military training, operational challenges, paramilitary, use of force
Procedia PDF Downloads 1419117 Analysing Maximum Power Point Tracking in a Stand Alone Photovoltaic System
Authors: Osamede Asowata
Abstract:
Optimized gain in respect to output power of stand-alone photovoltaic (PV) systems is one of the major focus of PV in recent times. This is evident in its low carbon emission and efficiency. Power failure or outage from commercial providers, in general, does not promote development to public and private sector; these basically limit the development of industries. The need for a well-structured PV system is of importance for an efficient and cost effective monitoring system. The purpose of this paper is to validate the maximum power point of an off-grid PV system taking into consideration the most effective tilt and orientation angles for PV's in the southern hemisphere. This paper is based on analyzing the system using a solar charger with maximum power point tracking (MPPT) from a pulse width modulation (PWM) perspective. The power conditioning device chosen is a solar charger with MPPT. The practical setup consists of a PV panel that is set to an orientation angle of 0°N, with a corresponding tilt angle of 36°, 26°, and 16°. Preliminary results include regression analysis (normal probability plot) showing the maximum power point in the system as well the best tilt angle for maximum power point tracking.Keywords: poly-crystalline PV panels, solar chargers, tilt and orientation angles, maximum power point tracking, MPPT, Pulse Width Modulation (PWM).
Procedia PDF Downloads 1769116 The Use of Emergency Coronary Angiography in Patients Following Out-Of-Hospital Cardiac Arrest and Subsequent Cardio-Pulmonary Resuscitation
Authors: Scott Ashby, Emily Granger, Mark Connellan
Abstract:
Objectives: 1) To identify if emergency coronary angiography improves outcomes in studies examining OHCA from assumed cardiac aetiology? 2) If so, is it indicated in all patients resuscitated following OHCA, and if not, who is it indicated for? 3) How effective are investigations for screening for the appropriate patients? Background: Out-of-hospital cardiac arrest is one of the leading mechanisms of death, and the most common causative pathology is coronary artery disease. In-hospital treatment following resuscitation greatly affects outcomes, yet there is debate over the most effective protocol. Methods: A literature search was conducted over multiple databases to identify all relevant articles published from 2005. An inclusion criterion was applied to all publications retrieved, which were then sorted by type. Results: A total of 3 existing reviews and 29 clinical studies were analysed in this review. There were conflicting conclusions, however increased use of angiography has shown to improve outcomes in the majority of studies, which cover a variety of settings and cohorts. Recommendations: Currently, emergency coronary angiography appears to improve outcomes in all/most cases of OHCA of assumed cardiac aetiology, regardless of ECG findings. Until a better tool for screening is available to reduce unnecessary procedures, the benefits appear to outweigh the costs/risks.Keywords: out of hospital cardiac arrest, coronary angiography, resuscitation, emergency medicine
Procedia PDF Downloads 2979115 On Block Vandermonde Matrix Constructed from Matrix Polynomial Solvents
Authors: Malika Yaici, Kamel Hariche
Abstract:
In control engineering, systems described by matrix fractions are studied through properties of block roots, also called solvents. These solvents are usually dealt with in a block Vandermonde matrix form. Inverses and determinants of Vandermonde matrices and block Vandermonde matrices are used in solving problems of numerical analysis in many domains but require costly computations. Even though Vandermonde matrices are well known and method to compute inverse and determinants are many and, generally, based on interpolation techniques, methods to compute the inverse and determinant of a block Vandermonde matrix have not been well studied. In this paper, some properties of these matrices and iterative algorithms to compute the determinant and the inverse of a block Vandermonde matrix are given. These methods are deducted from the partitioned matrix inversion and determinant computing methods. Due to their great size, parallelization may be a solution to reduce the computations cost, so a parallelization of these algorithms is proposed and validated by a comparison using algorithmic complexity.Keywords: block vandermonde matrix, solvents, matrix polynomial, matrix inverse, matrix determinant, parallelization
Procedia PDF Downloads 2379114 Democratization, Market Liberalization and the Raise of Vested Interests and Its Impacts on Anti-Corruption Reform in Indonesia
Authors: Ahmad Khoirul Umam
Abstract:
This paper investigates the role of vested interests and its impacts on anti-corruption agenda in Indonesia following the collapse of authoritarian regime in 1998. A pervasive and rampant corruption has been believed as the main cause of the state economy’s fragility. Hence, anti-corruption measures were implemented by applying democratization and market liberalization since the establishment of a consolidated democracy which go hand in hand with a liberal market economy is convinced to be an efficacious prescription for effective anti-corruption. The reform movement has also mandated the establishment of the independent, neutral and professional special anti-corruption agency namely Corruption Eradication Commission (KPK) to more intensify the fight against the systemic corruption. This paper will examine whether these anti-corruption measures have been effective to combat corruption, and investigate to what extend have the anti-corruption efforts, especially those conducted by KPK, been impeded by the emergence of a nexus of vested interests as the side-effect of democratization and market liberalization. Based on interviews with key stakeholders from KPK, other law enforcement agencies, government, prominent scholars, journalists and NGOs in Indonesia, it is found that since the overthrow of Soeharto, anti-corruption movement in the country have become more active and serious. After gradually winning the hearth of people, KPK successfully touched the untouchable corruption perpetrators who were previously protected by political immunity, legal protection and bureaucratic barriers. However, these changes have not necessarily reduced systemic and structural corruption practices. Ironically, intensive and devastating counterattacks were frequently posed by the alignment of business actors, elites of political parties, government, and also law enforcement agencies by hijacking state’s instruments to make KPK deflated, powerless, and surrender. This paper concludes that attempts of democratization, market liberalization and the establishment of anti-corruption agency may have helped Indonesia to reduce corruption. However, it is still difficult to imply that such anti-corruption measures have fostered the more effective anti-corruption works in the newly democratized and weakly regulated liberal economic system.Keywords: vested interests, democratization, market liberalization, anti-corruption, Indonesia
Procedia PDF Downloads 2319113 Chemical Reaction Algorithm for Expectation Maximization Clustering
Authors: Li Ni, Pen ManMan, Li KenLi
Abstract:
Clustering is an intensive research for some years because of its multifaceted applications, such as biology, information retrieval, medicine, business and so on. The expectation maximization (EM) is a kind of algorithm framework in clustering methods, one of the ten algorithms of machine learning. Traditionally, optimization of objective function has been the standard approach in EM. Hence, research has investigated the utility of evolutionary computing and related techniques in the regard. Chemical Reaction Optimization (CRO) is a recently established method. So the property embedded in CRO is used to solve optimization problems. This paper presents an algorithm framework (EM-CRO) with modified CRO operators based on EM cluster problems. The hybrid algorithm is mainly to solve the problem of initial value sensitivity of the objective function optimization clustering algorithm. Our experiments mainly take the EM classic algorithm:k-means and fuzzy k-means as an example, through the CRO algorithm to optimize its initial value, get K-means-CRO and FKM-CRO algorithm. The experimental results of them show that there is improved efficiency for solving objective function optimization clustering problems.Keywords: chemical reaction optimization, expection maimization, initia, objective function clustering
Procedia PDF Downloads 7099112 Development of R³ UV Exposure for the UV Dose-Insensitive and Cost-Effective Fabrication of Biodegradable Polymer Microneedles
Authors: Sungmin Park, Gyungmok Nam, Seungpyo Woo, Young Choi, Sangheon Park, Sang-Hee Yoon
Abstract:
Puncturing human skin with microneedles is critically important for microneedle-mediate drug delivery. Despite of extensive efforts in the past decades, the scale-up fabrication of sharp-tipped and high-aspect-ratio microneedles, especially made of biodegradable polymers, is still a long way off. Here, we present a UV dose insensitive and cost-effective microfabrication method for the biodegradable polymer microneedles with sharp tips and long lengths which can pierce human skin with low insertion force. The biodegradable polymer microneedles are fabricated with the polymer solution casting where a poly(lactic-co-glycolic acid) (PLGA, 50:50) solution is coated onto a SU-8 mold prepared with a reverse, ramped, and rotational (R3) UV exposure. The R3 UV exposure is modified from the multidirectional UV exposure both to suppress UV reflection from the bottom surface without anti-reflection layers and to optimize solvent concentration in the SU-8 photoresist, therefore achieving robust (i.e., highly insensitive to UV dose) and cost-effective fabrication of biodegradable polymer microneedles. An optical model for describing the spatial distribution of UV irradiation dose of the R3 UV exposure is also developed to theoretically predict the microneedle geometry fabricated with the R3 UV exposure and also to demonstrate the insensitiveness of microneedle geometry to UV dose. In the experimental characterization, the microneedles fabricated with the R3 UV exposure are compared with those fabricated with a conventional method (i.e., multidirectional UV exposure). The R3 UV exposure-based microfabrication reduces the end-tip radius by a factor of 5.8 and the deviation from ideal aspect ratio by 74.8%, compared with conventional method-based microfabrication. The PLGA microneedles fabricated with the R3 UV exposure pierce full-thickness porcine skins successfully and are demonstrated to completely dissolve in PBS (phosphate-buffered saline). The findings of this study will lead to an explosive growth of the microneedle-mediated drug delivery market.Keywords: R³ UV exposure, optical model, UV dose, reflection, solvent concentration, biodegradable polymer microneedle
Procedia PDF Downloads 165