Search results for: motivational functions
1224 Case Study about Women Driving in Saudi Arabia Announced in 2018: Netnographic and Data Mining Study
Authors: Majdah Alnefaie
Abstract:
The ‘netnographic study’ and data mining have been used to monitor the public interaction on Social Media Sites (SMSs) to understand what the motivational factors influence the Saudi intentions regarding allowing women driving in Saudi Arabia in 2018. The netnographic study monitored the publics’ textual and visual communications in Twitter, Snapchat, and YouTube. SMSs users’ communications method is also known as electronic word of mouth (eWOM). Netnography methodology is still in its initial stages as it depends on manual extraction, reading and classification of SMSs users text. On the other hand, data mining is come from the computer and physical sciences background, therefore it is much harder to extract meaning from unstructured qualitative data. In addition, the new development in data mining software does not support the Arabic text, especially local slang in Saudi Arabia. Therefore, collaborations between social and computer scientists such as ‘netnographic study’ and data mining will enhance the efficiency of this study methodology leading to comprehensive research outcome. The eWOM communications between individuals on SMSs can promote a sense that sharing their preferences and experiences regarding politics and social government regulations is a part of their daily life, highlighting the importance of using SMSs as assistance in promoting participation in political and social. Therefore, public interactions on SMSs are important tools to comprehend people’s intentions regarding the new government regulations in the country. This study aims to answer this question, "What factors influence the Saudi Arabians' intentions of Saudi female's car-driving in 2018". The study utilized qualitative method known as netnographic study. The study used R studio to collect and analyses 27000 Saudi users’ comments from 25th May until 25th June 2018. The study has developed data collection model that support importing and analysing the Arabic text in the local slang. The data collection model in this study has been clustered based on different type of social networks, gender and the study main factors. The social network analysis was employed to collect comments from SMSs owned by governments’ originations, celebrities, vloggers, social activist and news SMSs accounts. The comments were collected from both males and females SMSs users. The sentiment analysis shows that the total number of positive comments Saudi females car driving was higher than negative comments. The data have provided the most important factors influenced the Saudi Arabians’ intention of Saudi females car driving including, culture and environment, freedom of choice, equal opportunities, security and safety. The most interesting finding indicted that women driving would play a role in increasing the individual freedom of choice. Saudi female will be able to drive cars to fulfill her daily life and family needs without being stressed due to the lack of transportation. The study outcome will help Saudi government to improve woman quality of life by increasing the ability to find more jobs and studies, increasing income through decreasing the spending on transport means such as taxi and having more freedom of choice in woman daily life needs. The study enhances the importance of using use marketing research to measure the public opinions on the new government regulations in the country. The study has explained the limitations and suggestions for future research.Keywords: netnographic study, data mining, social media, Saudi Arabia, female driving
Procedia PDF Downloads 1531223 Effective Glosses in Reading to Help L2 Vocabulary Learning for Low-Intermediate Technology University Students in Taiwan
Authors: Pi-Lan Yang
Abstract:
It is controversial which type of gloss condition (i.e., gloss language or gloss position) is more effective in second or foreign language (L2) vocabulary learning. The present study compared the performance on learning ten English words in the conditions of L2 English reading with no glosses and with glosses of Chinese equivalents/translations and L2 English definitions at the side of a page and at an attached sheet for low-intermediate Chinese-speaking learners of English, who were technology university students in Taiwan. It is found first that the performances on the immediate posttest and the delayed posttest were overall better in the gloss condition than those in the no-gloss condition. Next, it is found that the glosses of Chinese translations were more effective and sustainable than those of L2 English definitions. Finally, the effects of L2 English glosses at the side of a page were observed to be less sustainable than those at an attached sheet. In addition, an opinion questionnaire used also showed a preference for the glosses of Chinese translations in L2 English reading. These results would be discussed in terms of automated lexical access, sentence processing mechanisms, and the trade-off nature of storage and processing functions in working memory system, proposed by the capacity theory of language comprehension.Keywords: glosses of Chinese equivalents/translations, glosses of L2 English definitions, L2 vocabulary learning, L2 English reading
Procedia PDF Downloads 2471222 Video Text Information Detection and Localization in Lecture Videos Using Moments
Authors: Belkacem Soundes, Guezouli Larbi
Abstract:
This paper presents a robust and accurate method for text detection and localization over lecture videos. Frame regions are classified into text or background based on visual feature analysis. However, lecture video shows significant degradation mainly related to acquisition conditions, camera motion and environmental changes resulting in low quality videos. Hence, affecting feature extraction and description efficiency. Moreover, traditional text detection methods cannot be directly applied to lecture videos. Therefore, robust feature extraction methods dedicated to this specific video genre are required for robust and accurate text detection and extraction. Method consists of a three-step process: Slide region detection and segmentation; Feature extraction and non-text filtering. For robust and effective features extraction moment functions are used. Two distinct types of moments are used: orthogonal and non-orthogonal. For orthogonal Zernike Moments, both Pseudo Zernike moments are used, whereas for non-orthogonal ones Hu moments are used. Expressivity and description efficiency are given and discussed. Proposed approach shows that in general, orthogonal moments show high accuracy in comparison to the non-orthogonal one. Pseudo Zernike moments are more effective than Zernike with better computation time.Keywords: text detection, text localization, lecture videos, pseudo zernike moments
Procedia PDF Downloads 1511221 A Comparative Study between FEM and Meshless Methods
Authors: Jay N. Vyas, Sachin Daxini
Abstract:
Numerical simulation techniques are widely used now in product development and testing instead of expensive, time-consuming and sometimes dangerous laboratory experiments. Numerous numerical methods are available for performing simulation of physical problems of different engineering fields. Grid based methods, like Finite Element Method, are extensively used in performing various kinds of static, dynamic, structural and non-structural analysis during product development phase. Drawbacks of grid based methods in terms of discontinuous secondary field variable, dealing fracture mechanics and large deformation problems led to development of a relatively a new class of numerical simulation techniques in last few years, which are popular as Meshless methods or Meshfree Methods. Meshless Methods are expected to be more adaptive and flexible than Finite Element Method because domain descretization in Meshless Method requires only nodes. Present paper introduces Meshless Methods and differentiates it with Finite Element Method in terms of following aspects: Shape functions used, role of weight function, techniques to impose essential boundary conditions, integration techniques for discrete system equations, convergence rate, accuracy of solution and computational effort. Capabilities, benefits and limitations of Meshless Methods are discussed and concluded at the end of paper.Keywords: numerical simulation, Grid-based methods, Finite Element Method, Meshless Methods
Procedia PDF Downloads 3891220 The Multifunctional Medical Centers’ Architectural Shaping
Authors: Griaznova Svetlana, Umedov Mekhroz
Abstract:
The current healthcare facilities trend is the creation of multidisciplinary large-scale centers to provide the maximum possible services in one place, minimizing the number of possible instances in the path of patient treatment. The multifunctional medical centers are mainly designed in urban infrastructure for good accessibility. However, many functions and connections define the building shape, often make it inharmonious, that greatly destroys the city's appearance. The purpose of the research is to scientifically substantiate the factors influencing the shaping, the formation of architectural solutions principles, the formation of recommendations and principles for the multifunctional medical centers' design. The result of the research is the elaboration of architectural and planning solutions principles and the determination of factors affecting the multifunctional healthcare facilities shaping. Research method: Study and generalization of international experience in scientific research, literature, standards, teaching aids, and design materials on the topic of research. An integrated approach to the study of existing international experience of multidisciplinary medical centers. Elaboration of graphical analysis and diagrams based on the system analysis of the processed information. Identification of methods and principles of functional zoning of nuclear medicine centers.Keywords: health care, multifunctionality, form, medical center, hospital, PET, CT scan
Procedia PDF Downloads 1041219 Effect of Degree of Phosphorylation on Electrospinning and In vitro Cell Behavior of Phosphorylated Polymers as Biomimetic Materials for Tissue Engineering Applications
Authors: Pallab Datta, Jyotirmoy Chatterjee, Santanu Dhara
Abstract:
Over the past few years, phosphorous containing polymers have received widespread attention for applications such as high performance optical fibers, flame retardant materials, drug delivery and tissue engineering. Being pentavalent, phosphorous can exist in different chemical environments in these polymers which increase their versatility. In human biochemistry, phosphorous based compounds exert their functions both in soluble and insoluble form occurring as inorganic or as organophosphorous compounds. Specifically in case of biomacromolecules, phosphates are critical for functions of DNA, ATP, phosphoproteins, phospholipids, phosphoglycans and several coenzymes. Inspired by the role of phosphorous in functional biomacromolecules, design and synthesis of biomimetic materials are thus carried out by several authors to study macromolecular function or as substitutes in clinical tissue regeneration conditions. In addition, many regulatory signals of the body are controlled by phoshphorylation of key proteins present either in form of growth factors or matrix-bound scaffold proteins. This inspires works on synthesis of phospho-peptidomimetic amino acids for understanding key signaling pathways and this is extended to obtain molecules with potentially useful biological properties. Apart from above applications, phosphate groups bound to polymer backbones have also been demonstrated to improve function of osteoblast cells and augment performance of bone grafts. Despite the advantages of phosphate grafting, however, there is limited understanding on effect of degree of phosphorylation on macromolecular physicochemical and/or biological properties. Such investigations are necessary to effectively translate knowledge of macromolecular biochemistry into relevant clinical products since they directly influence processability of these polymers into suitable scaffold structures and control subsequent biological response. Amongst various techniques for fabrication of biomimetic scaffolds, nanofibrous scaffolds fabricated by electrospinning technique offer some special advantages in resembling the attributes of natural extracellular matrix. Understanding changes in physico-chemical properties of polymers as function of phosphorylation is therefore going to be crucial in development of nanofiber scaffolds based on phosphorylated polymers. The aim of the present work is to investigate the effect of phosphorous grafting on the electrospinning behavior of polymers with aim to obtain biomaterials for bone regeneration applications. For this purpose, phosphorylated derivatives of two polymers of widely different electrospinning behaviors were selected as starting materials. Poly(vinyl alcohol) is a conveniently electrospinnable polymer at different conditions and concentrations. On the other hand, electrospinning of chitosan backbone based polymers have been viewed as a critical challenge. The phosphorylated derivatives of these polymers were synthesized, characterized and electrospinning behavior of various solutions containing these derivatives was compared with electrospinning of pure poly (vinyl alcohol). In PVA, phosphorylation adversely impacted electrospinnability while in NMPC, higher phosphate content widened concentration range for nanofiber formation. Culture of MG-63 cells on electrospun nanofibers, revealed that degree of phosphate modification of a polymer significantly improves cell adhesion or osteoblast function of cultured cells. It is concluded that improvement of cell response parameters of nanofiber scaffolds can be attained as a function of controlled degree of phosphate grafting in polymeric biomaterials with implications for bone tissue engineering applications.Keywords: bone regeneration, chitosan, electrospinning, phosphorylation
Procedia PDF Downloads 2211218 Forecasting Optimal Production Program Using Profitability Optimization by Genetic Algorithm and Neural Network
Authors: Galal H. Senussi, Muamar Benisa, Sanja Vasin
Abstract:
In our business field today, one of the most important issues for any enterprises is cost minimization and profit maximization. Second issue is how to develop a strong and capable model that is able to give us desired forecasting of these two issues. Many researches deal with these issues using different methods. In this study, we developed a model for multi-criteria production program optimization, integrated with Artificial Neural Network. The prediction of the production cost and profit per unit of a product, dealing with two obverse functions at same time can be extremely difficult, especially if there is a great amount of conflict information about production parameters. Feed-Forward Neural Networks are suitable for generalization, which means that the network will generate a proper output as a result to input it has never seen. Therefore, with small set of examples the network will adjust its weight coefficients so the input will generate a proper output. This essential characteristic is of the most important abilities enabling this network to be used in variety of problems spreading from engineering to finance etc. From our results as we will see later, Feed-Forward Neural Networks has a strong ability and capability to map inputs into desired outputs.Keywords: project profitability, multi-objective optimization, genetic algorithm, Pareto set, neural networks
Procedia PDF Downloads 4451217 The Artificial Intelligence (AI) Impact on Project Management: A Destructive or Transformative Agent
Authors: Kwame Amoah
Abstract:
Artificial intelligence (AI) has the prospect of transforming project management, significantly improving efficiency and accuracy. By automating specific tasks with defined guidelines, AI can assist project managers in making better decisions and allocating resources efficiently, with possible risk mitigation. This study explores how AI is already impacting project management and likely future AI's impact on the field. The AI's reaction has been a divided opinion; while others picture it as a destroyer of jobs, some welcome it as an innovation advocate. Both sides agree that AI will be disruptive and revolutionize PM's functions. If current research is to go by, AI or some form will replace one-third of all learning graduate PM jobs by as early as 2030. A recent survey indicates AI spending will reach $97.9 billion by the end of 2023. Considering such a profound impact, the project management profession will also see a paradigm shift driven by AI. The study examines what the project management profession will look like in the next 5-10 years after this technological disruption. The research methods incorporate existing literature, develop trend analysis, and conduct structured interviews with project management stakeholders from North America to gauge the trend. PM professionals can harness the power of AI, ensuring a smooth transition and positive outcomes. AI adoption will maximize benefits, minimize adverse consequences, and uphold ethical standards, leading to improved project performance.Keywords: project management, disruptive teacnologies, project management function, AL applications, artificial intelligence
Procedia PDF Downloads 831216 Uncontrolled Urbanization Leads to Main Challenge for Sustainable Development of Mongolia
Authors: Davaanyam Surenjav, Chinzolboo Dandarbaatar, Ganbold Batkhuyag
Abstract:
Primate city induced rapid urbanization has been become one of the main challenges in sustainable development in Mongolia like other developing countries since transition to market economy in 1990. According due to statistical yearbook, population number of Ulaanbaatar city has increased from 0.5 million to 1.5 million for last 30 years and contains now almost half (47%) of total Mongolian population. Rural-Ulaanbaatar and local Cities-Ulaanbaatar city migration leads to social issues like uncontrolled urbanization, income inequality, poverty, overwork of public service, economic over cost for redevelopment and limitation of transport and environmental degradation including air, noise, water and soil pollution. Most thresholds of all of the sustainable urban development main and sub-indicators over exceeded from safety level to unsafety level in Ulaanbaatar. So, there is an urgent need to remove migration pull factors including some administrative and high education functions from Ulaanbaatar city to its satellite cities or secondary cities. Moreover, urban smart transport system and green and renewable energy technologies should be introduced to urban development master plan of Ulaanbaatar city.Keywords: challenge for sustainable urban development, migration factors, primate city , urban safety thresholds
Procedia PDF Downloads 1301215 Context Aware Anomaly Behavior Analysis for Smart Home Systems
Authors: Zhiwen Pan, Jesus Pacheco, Salim Hariri, Yiqiang Chen, Bozhi Liu
Abstract:
The Internet of Things (IoT) will lead to the development of advanced Smart Home services that are pervasive, cost-effective, and can be accessed by home occupants from anywhere and at any time. However, advanced smart home applications will introduce grand security challenges due to the increase in the attack surface. Current approaches do not handle cybersecurity from a holistic point of view; hence, a systematic cybersecurity mechanism needs to be adopted when designing smart home applications. In this paper, we present a generic intrusion detection methodology to detect and mitigate the anomaly behaviors happened in Smart Home Systems (SHS). By utilizing our Smart Home Context Data Structure, the heterogeneous information and services acquired from SHS are mapped in context attributes which can describe the context of smart home operation precisely and accurately. Runtime models for describing usage patterns of home assets are developed based on characterization functions. A threat-aware action management methodology, used to efficiently mitigate anomaly behaviors, is proposed at the end. Our preliminary experimental results show that our methodology can be used to detect and mitigate known and unknown threats, as well as to protect SHS premises and services.Keywords: Internet of Things, network security, context awareness, intrusion detection
Procedia PDF Downloads 1911214 The Use of Network Tool for Brain Signal Data Analysis: A Case Study with Blind and Sighted Individuals
Authors: Cleiton Pons Ferreira, Diana Francisca Adamatti
Abstract:
Advancements in computers technology have allowed to obtain information for research in biology and neuroscience. In order to transform the data from these surveys, networks have long been used to represent important biological processes, changing the use of this tools from purely illustrative and didactic to more analytic, even including interaction analysis and hypothesis formulation. Many studies have involved this application, but not directly for interpretation of data obtained from brain functions, asking for new perspectives of development in neuroinformatics using existent models of tools already disseminated by the bioinformatics. This study includes an analysis of neurological data through electroencephalogram (EEG) signals, using the Cytoscape, an open source software tool for visualizing complex networks in biological databases. The data were obtained from a comparative case study developed in a research from the University of Rio Grande (FURG), using the EEG signals from a Brain Computer Interface (BCI) with 32 eletrodes prepared in the brain of a blind and a sighted individuals during the execution of an activity that stimulated the spatial ability. This study intends to present results that lead to better ways for use and adapt techniques that support the data treatment of brain signals for elevate the understanding and learning in neuroscience.Keywords: neuroinformatics, bioinformatics, network tools, brain mapping
Procedia PDF Downloads 1821213 The Effect of Customs Commission Customer Satisfaction
Authors: Menelik Tilahun Alemu
Abstract:
Customs administrations are now increasingly regarded as the key border agencies responsible for all transactions related to issues arising from the border crossings of goods and people. Raising revenue has traditionally been high on the agenda of governments, represented by the Ministry of Finance (MOF), because of the critical importance of import duties as a source of budget revenue for many developing countries. Most of these functions are undertaken in close cooperation with other national agencies. Due to the need to make structural reforms that consider the nature of business activities in the world and the needs of consumers, the institution was previously divided into the Ministry of Revenue and the Customs Commission. Accordingly, the Ministry of Revenue is primarily responsible for administering and collecting local taxes, while the Customs Commission is responsible for administering customs matters; It supports exports and collects revenue from it. The National Import and Export Trade Service System is working to make the world more transparent and standardized and adapt to the current situation by formulating various guidelines, rules and procedures to provide a clear, simple, predictable and accessible service to customers. As a result, the commission will be able to streamline the business process by enabling Paperless customer service to support the service delivery technology and eliminate the customer iteration without having to incur unnecessary costs and inconveniences.Keywords: business, consumers, adapt, transparent
Procedia PDF Downloads 501212 Effect of TPA and HTLV-1 Tax on BRCA-1 and ERE Controlled Genes Expression
Authors: Azhar Jabareen, Mahmoud Huleihel
Abstract:
BRCA-1 is a multifunctional tumor suppressor, whose expression is activated by the estrogen (E2)-liganded ERα receptor. The activated ERα is a transcriptional factor which activates various genes either by direct binding to the DNA at E2-responsive elements (EREs) and indirectly associated with a range of alternative non-ERE elements. Interference with BRCA-1 expression and/or functions leads to high risk of breast or/and ovarian cancer. Our lab investigated the involvement of Human T-cell leukemia Virus Type 1 (HTLV-1) in breast cancer, since HTLV-1 Tax was found to strongly inhibit BRCA-1 expression. In addition, long exposure of 12-O-tetradecanoylphorbol-13-acetate (TPA), which is one of the stress-inducing agents activated the HTLV-1 promoter. So here the involvement of TPA in breast cancer had been examined by testing the effect of TPA on BRCA-1 and ERE expression. The results showed that TPA activated both BRCA-1 and ERE expression. In the 12 hours TPA activated the tow promoters more than others time, and after 24 hours the level of the tow promoters was decreased. Tax inhibited BRCA-1 expression but did not succeed to inhibit the effect of TPA. Then the activation of the two promoters was not through ERα pathway because TPA had no effect on ERα binding to the two promoters of the BRCA-1 and ERE. Also, the activation was not via nuclear factor kappa B (NF-κB) pathway because when the inhibitory of NF-κB had been added to the TPA, it still activated the tow promoters. However, it seems that 53BP1 may be involved in TPA activation of these promoters because ectopic high expression of 53BP1 significantly reduced the TPA activity. In addition, in the presence of Bisindolylmaleimide-I (BI)- the inhibitor of Protein Kinase C (PKC)- there was no activation for the two promoters, so the PKC is agonized BRCA-1 and ERE activation.Keywords: BRCA-1, ERE, HTLV-1, TPA
Procedia PDF Downloads 2481211 LncRNA NEAT1 Promotes NSCLC Progression through Acting as a ceRNA of miR-377-3p
Authors: Chengcao Sun, Shujun Li, Cuili Yang, Yongyong Xi, Liang Wang, Feng Zhang, Dejia Li
Abstract:
Recently, the long non-coding RNA (lncRNA) NEAT1 has been identified as an oncogenic gene in multiple cancer types and elevated expression of NEAT1 was tightly linked to tumorigenesis and cancer progression. However, the molecular basis for this observation has not been characterized in progression of non-small cell lung cancer (NSCLC). In our studies, we identified NEAT1 was highly expressed in NSCLC patients and was a novel regulator of NSCLC progression. Patients whose tumors had high NEAT1 expression had a shorter overall survival than patients whose tumors had low NEAT1 expression. Further, NEAT1 significantly accelerates NSCLC cell growth and metastasis in vitro and tumor growth in vivo. Additionally, by using bioinformatics study and RNA pull down combined with luciferase reporter assays, we demonstrated that NEAT1 functioned as a competing endogenous RNA (ceRNA) for has-miR-377-3p, antagonized its functions and led to the de-repression of its endogenous targets E2F3, which was a core oncogene in promoting NSCLC progression. Taken together, these observations imply that the NEAT1 modulated the expression of E2F3 gene by acting as a competing endogenous RNA, which may build up the missing link between the regulatory miRNA network and NSCLC progression.Keywords: long non-coding RNA NEAT1, hsa-miRNA-377-3p, E2F3, non-small cell lung cancer, tumorigenesis
Procedia PDF Downloads 3691210 First-Year Undergraduate Students' Dilemma with Kinematics Graphs
Authors: Itumeleng Phage
Abstract:
Students’ comprehension of graphs may be affected by the characteristics of the discipline in which the graph is used, the type of the task as well as the background of the students who are the readers or interpreters of the graph. This research study investigated these aspects of the graph comprehension of 152 first-year undergraduate physics students by comparing their responses to corresponding tasks in the mathematics and physics disciplines. The discipline characteristics were analysed for four task-related constructs namely coordinates, representations, area and slope. Students’ responses to corresponding visual decoding and judgement tasks set in mathematics and kinematics contexts were statistically compared. The effects of the participants’ gender, year of school completion and study course were determined as reader characteristics. The results of the empirical study indicated that participants generally transferred their mathematics knowledge on coordinates and representation of straight line graphs to the physics contexts, but not in the cases of parabolic and hyperbolic functions or area under graphs. Insufficient understanding of the slope concept contributed to weak performances on this construct in both mathematics and physics contexts. Discipline characteristics seem to play a vital role in students’ understanding, while reader characteristics had insignificant to medium effects on their responses.Keywords: kinematics graph, discipline characteristics, constructs, coordinates, representations, area and slope
Procedia PDF Downloads 2601209 Algorithms for Computing of Optimization Problems with a Common Minimum-Norm Fixed Point with Applications
Authors: Apirak Sombat, Teerapol Saleewong, Poom Kumam, Parin Chaipunya, Wiyada Kumam, Anantachai Padcharoen, Yeol Je Cho, Thana Sutthibutpong
Abstract:
This research is aimed to study a two-step iteration process defined over a finite family of σ-asymptotically quasi-nonexpansive nonself-mappings. The strong convergence is guaranteed under the framework of Banach spaces with some additional structural properties including strict and uniform convexity, reflexivity, and smoothness assumptions. With similar projection technique for nonself-mapping in Hilbert spaces, we hereby use the generalized projection to construct a point within the corresponding domain. Moreover, we have to introduce the use of duality mapping and its inverse to overcome the unavailability of duality representation that is exploit by Hilbert space theorists. We then apply our results for σ-asymptotically quasi-nonexpansive nonself-mappings to solve for ideal efficiency of vector optimization problems composed of finitely many objective functions. We also showed that the obtained solution from our process is the closest to the origin. Moreover, we also give an illustrative numerical example to support our results.Keywords: asymptotically quasi-nonexpansive nonself-mapping, strong convergence, fixed point, uniformly convex and uniformly smooth Banach space
Procedia PDF Downloads 2601208 A Data Driven Approach for the Degradation of a Lithium-Ion Battery Based on Accelerated Life Test
Authors: Alyaa M. Younes, Nermine Harraz, Mohammad H. Elwany
Abstract:
Lithium ion batteries are currently used for many applications including satellites, electric vehicles and mobile electronics. Their ability to store relatively large amount of energy in a limited space make them most appropriate for critical applications. Evaluation of the life of these batteries and their reliability becomes crucial to the systems they support. Reliability of Li-Ion batteries has been mainly considered based on its lifetime. However, another important factor that can be considered critical in many applications such as in electric vehicles is the cycle duration. The present work presents the results of an experimental investigation on the degradation behavior of a Laptop Li-ion battery (type TKV2V) and the effect of applied load on the battery cycle time. The reliability was evaluated using an accelerated life test. Least squares linear regression with median rank estimation was used to estimate the Weibull distribution parameters needed for the reliability functions estimation. The probability density function, failure rate and reliability function under each of the applied loads were evaluated and compared. An inverse power model is introduced that can predict cycle time at any stress level given.Keywords: accelerated life test, inverse power law, lithium-ion battery, reliability evaluation, Weibull distribution
Procedia PDF Downloads 1681207 Modeling of the Cellular Uptake of Rigid Nanoparticles: Investigating the Influence of the Adaptation of the Cell’s Mechanical Properties during Endocytosis
Authors: Sarah Iaquinta, Christophe Blanquart, Elena Ishow, Sylvain Freour, Frederic Jacquemin, Shahram Khazaie
Abstract:
Nanoparticles have recently emerged as a possible cancer treatment tool. Several formulations have been used to enhance the uptake of these nanoparticles by cancer cells and avoid their immediate clearance when administrated in vivo. Most of the previous studies focus on the investigation of the influence of the mechanical properties of the cell membrane and the particle. However, these studies do not account for the variation of adhesion and tension during the wrapping of the nanoparticle by the membrane. These couplings should be considered since the cell adapts to the interaction with the nanoparticle by, e.g., increasing the number of interactions (consequently leading to an increase of the cell membrane/nanoparticle adhesion) and by reorganizing its cytoskeleton, leading to the releasing of the tension of the cell membrane. The main contribution of this work is the proposal of a novel model for representing the cellular uptake of rigid circular nanoparticles based on an energetic model tailored to take into account the adaptation of the nanoparticle/cell membrane adhesion and of the membrane stress during wrapping. Several coupling models using sigmoidal functions are considered and compared. The study calculations revealed that the results considering constant parameters underestimated the final wrapping degree of the particle by up to 50%.Keywords: adhesion, cellular adaptation, cellular uptake, mechanical properties, tension
Procedia PDF Downloads 2121206 Analysis of Combined Heat Transfer through the Core Materials of VIPs with Various Scattering Properties
Authors: Jaehyug Lee, Tae-Ho Song
Abstract:
Vacuum insulation panel (VIP) can achieve very low thermal conductivity by evacuating its inner space. Heat transfer in the core materials of highly-evacuated VIP occurs by conduction through the solid structure and radiation through the pore. The effect of various scattering modes in combined conduction-radiation in VIP is investigated through numerical analysis. The discrete ordinates interpolation method (DOIM) incorporated with the commercial code FLUENT® is employed. It is found that backward scattering is more effective in reducing the total heat transfer while isotropic scattering is almost identical with pure absorbing/emitting case of the same optical thickness. For a purely scattering medium, the results agree well with additive solution with diffusion approximation, while a modified term is added in the effect of optical thickness to backward scattering is employed. For other scattering phase functions, it is also confirmed that backwardly scattering phase function gives a lower effective thermal conductivity. Thus, the materials with backward scattering properties, with radiation shields are desirable to lower the thermal conductivity of VIPs.Keywords: combined conduction and radiation, discrete ordinates interpolation method, scattering phase function, vacuum insulation panel
Procedia PDF Downloads 3661205 A Distributed Cryptographically Generated Address Computing Algorithm for Secure Neighbor Discovery Protocol in IPv6
Authors: M. Moslehpour, S. Khorsandi
Abstract:
Due to shortage in IPv4 addresses, transition to IPv6 has gained significant momentum in recent years. Like Address Resolution Protocol (ARP) in IPv4, Neighbor Discovery Protocol (NDP) provides some functions like address resolution in IPv6. Besides functionality of NDP, it is vulnerable to some attacks. To mitigate these attacks, Internet Protocol Security (IPsec) was introduced, but it was not efficient due to its limitation. Therefore, SEND protocol is proposed to automatic protection of auto-configuration process. It is secure neighbor discovery and address resolution process. To defend against threats on NDP’s integrity and identity, Cryptographically Generated Address (CGA) and asymmetric cryptography are used by SEND. Besides advantages of SEND, its disadvantages like the computation process of CGA algorithm and sequentially of CGA generation algorithm are considerable. In this paper, we parallel this process between network resources in order to improve it. In addition, we compare the CGA generation time in self-computing and distributed-computing process. We focus on the impact of the malicious nodes on the CGA generation time in the network. According to the result, although malicious nodes participate in the generation process, CGA generation time is less than when it is computed in a one-way. By Trust Management System, detecting and insulating malicious nodes is easier.Keywords: NDP, IPsec, SEND, CGA, modifier, malicious node, self-computing, distributed-computing
Procedia PDF Downloads 2781204 Estimation of Optimum Parameters of Non-Linear Muskingum Model of Routing Using Imperialist Competition Algorithm (ICA)
Authors: Davood Rajabi, Mojgan Yazdani
Abstract:
Non-linear Muskingum model is an efficient method for flood routing, however, the efficiency of this method is influenced by three applied parameters. Therefore, efficiency assessment of Imperialist Competition Algorithm (ICA) to evaluate optimum parameters of non-linear Muskingum model was addressed through this study. In addition to ICA, Genetic Algorithm (GA) and Particle Swarm Optimization (PSO) were also used aiming at an available criterion to verdict ICA. In this regard, ICA was applied for Wilson flood routing; then, routing of two flood events of DoAab Samsami River was investigated. In case of Wilson flood that the target function was considered as the sum of squared deviation (SSQ) of observed and calculated discharges. Routing two other floods, in addition to SSQ, another target function was also considered as the sum of absolute deviations of observed and calculated discharge. For the first floodwater based on SSQ, GA indicated the best performance, however, ICA was on first place, based on SAD. For the second floodwater, based on both target functions, ICA indicated a better operation. According to the obtained results, it can be said that ICA could be used as an appropriate method to evaluate the parameters of Muskingum non-linear model.Keywords: Doab Samsami river, genetic algorithm, imperialist competition algorithm, meta-exploratory algorithms, particle swarm optimization, Wilson flood
Procedia PDF Downloads 5041203 Skin Substitutes for Wound Healing: An Advanced Formulation
Authors: Pennisi Stefania, Giuffrida Graziella, Coppa Federica, Iannello Giulia, Cartelli Simone, Lo Faro Riccardo, Ferruggia Greta, Brundo Maria Violetta
Abstract:
Tissue engineering aims to develop advanced medical devices to restore normal functions of damaged tissue. These devices, even more effective than conventional methods, are called skin substitutes and are configured as drugs to be applied to the damaged area, to heal extensive and deep wounds which could otherwise lead to chronic wounds lasting over time. Among the variety of commercially available skin substitutes, those that have proven to be most effective are those consisting of a bilayer scaffold. The aim of our research was to design a skin substitute which can promote cell proliferation, cell migration and angiogenesis, and which can guarantee timely closure of the wound with satisfactory aesthetic results, in order to avoid the patient excessive pain, risk of contracting infections and long-term hospitalization. The product was tested in vitro using the Scratch Assay. The assay was carried out both on the matrix modified with hyaluronic acid and on the matrix based only on collagen. In both cases, after 48 hours of exposure the wound scratch was almost completely closed in treated cells compared to untreated control.Keywords: collagen, hyaluronic acid, scratch- wound-healing assay, tissue regeneration
Procedia PDF Downloads 251202 Performance Analysis of Domotics System as Real-Time Non-Intrusive Load Monitoring
Authors: Dauda A. Oladosu, Kamorudeen A Olaiya, Abdurahman Bello
Abstract:
The deployment of smart meters by utility providers to gather fine grained spatiotemporal consumption data has grossly influenced the consumers’ emotion and behavior towards energy utilization. The quest for reduction in power consumption is now a subject of concern and one the methods adopted by the consumers to achieve this is Non-intrusive Load (appliance) Monitoring. Hence, this work presents performance Analysis of Domotics System as a tool for load monitoring when integrated with Consumer Control Unit of residential building. The system was developed with basic elements which enhance remote sensing, DTMF (Dual Tone Multi-frequency) recognition and cryptic messaging when specific task was performed. To demonstrate its applicability and suitability, this prototype was used consistently for six months at different load demands and the utilities consumed were documented. The results obtained shows good response when phone dialed, and the packet delivery of feedback SMS was quite satisfactory, making the implemented system to be of good quality with affordable cost and performs the desired functions. Besides, comparative analysis showed notable reduction in energy consumption and invariably lessened electrical bill of the consumer.Keywords: automation, domotics, energy, load, remote, schedule
Procedia PDF Downloads 3171201 Immuno-field Effect Transistor Using Carbon Nanotubes Network – Based for Human Serum Albumin Highly Sensitive Detection
Authors: Muhamad Azuddin Hassan, Siti Shafura Karim, Ambri Mohamed, Iskandar Yahya
Abstract:
Human serum albumin plays a significant part in the physiological functions of the human body system (HSA).HSA level monitoring is critical for early detection of HSA-related illnesses. The goal of this study is to show that a field effect transistor (FET)-based immunosensor can assess HSA using high aspect ratio carbon nanotubes network (CNT) as a transducer. The CNT network were deposited using air brush technique, and the FET device was made using a shadow mask process. Field emission scanning electron microscopy and a current-voltage measurement system were used to examine the morphology and electrical properties of the CNT network, respectively. X-ray photoelectron spectroscopy and Fourier transform infrared spectroscopy were used to confirm the surface alteration of the CNT. The detection process is based on covalent binding interactions between an antibody and an HSA target, which resulted in a change in the manufactured biosensor's drain current (Id).In a linear range between 1 ng/ml and 10zg/ml, the biosensor has a high sensitivity of 0.826 mA (g/ml)-1 and a LOD value of 1.9zg/ml.HSA was also identified in a genuine serum despite interference from other biomolecules, demonstrating the CNT-FET immunosensor's ability to quantify HSA in a complex biological environment.Keywords: carbon nanotubes network, biosensor, human serum albumin
Procedia PDF Downloads 1371200 Parallel Gripper Modelling and Design Optimization Using Multi-Objective Grey Wolf Optimizer
Authors: Golak Bihari Mahanta, Bibhuti Bhusan Biswal, B. B. V. L. Deepak, Amruta Rout, Gunji Balamurali
Abstract:
Robots are widely used in the manufacturing industry for rapid production with higher accuracy and precision. With the help of End-of-Arm Tools (EOATs), robots are interacting with the environment. Robotic grippers are such EOATs which help to grasp the object in an automation system for improving the efficiency. As the robotic gripper directly influence the quality of the product due to the contact between the gripper surface and the object to be grasped, it is necessary to design and optimize the gripper mechanism configuration. In this study, geometric and kinematic modeling of the parallel gripper is proposed. Grey wolf optimizer algorithm is introduced for solving the proposed multiobjective gripper optimization problem. Two objective functions developed from the geometric and kinematic modeling along with several nonlinear constraints of the proposed gripper mechanism is used to optimize the design variables of the systems. Finally, the proposed methodology compared with a previously proposed method such as Teaching Learning Based Optimization (TLBO) algorithm, NSGA II, MODE and it was seen that the proposed method is more efficient compared to the earlier proposed methodology.Keywords: gripper optimization, metaheuristics, , teaching learning based algorithm, multi-objective optimization, optimal gripper design
Procedia PDF Downloads 1881199 Strict Stability of Fuzzy Differential Equations by Lyapunov Functions
Authors: Mustafa Bayram Gücen, Coşkun Yakar
Abstract:
In this study, we have investigated the strict stability of fuzzy differential systems and we compare the classical notion of strict stability criteria of ordinary differential equations and the notion of strict stability of fuzzy differential systems. In addition that, we present definitions of stability and strict stability of fuzzy differential equations and also we have some theorems and comparison results. Strict Stability is a different stability definition and this stability type can give us an information about the rate of decay of the solutions. Lyapunov’s second method is a standard technique used in the study of the qualitative behavior of fuzzy differential systems along with a comparison result that allows the prediction of behavior of a fuzzy differential system when the behavior of the null solution of a fuzzy comparison system is known. This method is a usefull for investigating strict stability of fuzzy systems. First of all, we present definitions and necessary background material. Secondly, we discuss and compare the differences between the classical notion of stability and the recent notion of strict stability. And then, we have a comparison result in which the stability properties of the null solution of the comparison system imply the corresponding stability properties of the fuzzy differential system. Consequently, we give the strict stability results and a comparison theorem. We have used Lyapunov second method and we have proved a comparison result with scalar differential equations.Keywords: fuzzy systems, fuzzy differential equations, fuzzy stability, strict stability
Procedia PDF Downloads 2501198 Judicial Analysis of the Burden of Proof on the Perpetrator of Corruption Criminal Act
Authors: Rahmayanti, Theresia Simatupang, Ronald H. Sianturi
Abstract:
Corruption criminal act develops rapidly since in the transition era there is weakness in law. Consequently, there is an opportunity for a few people to do fraud and illegal acts and to misuse their positions and formal functions in order to make them rich, and the criminal acts are done systematically and sophisticatedly. Some people believe that legal provisions which specifically regulate the corruption criminal act; namely, Law No. 31/1999 in conjunction with Law No. 20/2001 on the Eradication of Corruption Criminal Act are not effective any more, especially in onus probandi (the burden of proof) on corruptors. The research was a descriptive analysis, a research method which is used to obtain description on a certain situation or condition by explaining the data, and the conclusion is drawn through some analyses. The research used judicial normative approach since it used secondary data as the main data by conducting library research. The system of the burden of proof, which follows the principles of reversal of the burden of proof stipulated in Article 12B, paragraph 1 a and b, Article 37A, and Article 38B of Law No. 20/2001 on the Amendment of Law No. 31/1999, is used only as supporting evidence when the principal case is proved. Meanwhile, how to maximize the implementation of the burden of proof on the perpetrators of corruption criminal act in which the public prosecutor brings a corruption case to Court, depends upon the nature of the case and the type of indictment. The system of burden of proof can be used to eradicate corruption in the Court if some policies and general principles of justice such as independency, impartiality, and legal certainty, are applied.Keywords: burden of proof, perpetrator, corruption criminal act
Procedia PDF Downloads 3211197 Children and Parents Left behind in Transnational Families: The Problem of Care Deficit
Authors: Joanna Bielecka-Prus
Abstract:
In the view of increasing number of labour migrations associated with broadly understood economic crisis, many families experience migration separation. Currently, in the era of globalization, migration movements include an increasing number of families, more and more frequently a new type of family, a transnational family. Accordingly, the functions of the family, family practice of care, and the relationships between members of the group change especially in the case of female migration. Sociologists highlight the emotional aspects of migrants’ family lives: managing emotions, coping with guilt, loneliness and rejection. Not without significance is the fact that today's public discourse often represents migrant women in a negative light. On the one hand, consumption and expanding material resources are assessed positively, on the other hand, deficits emotional and devastation of family life in the transnational families appear. Opinions expressed by different environments: the media, the political environment, etc. do not always take into account the context of mobility and their different effects on family life. The paper will present the analysis of qualitative studies of Polish female migrants’ families left-behind (children, parents, caregivers N = 100) and their coping strategies in different situations in the event of migration separation. The main area of care deficit will be defined and it will be showed who and how help to solve the problems.Keywords: care, children left behind, female migration, parents left behind
Procedia PDF Downloads 3951196 Photoleap: An AI-Powered Photo Editing App with Advanced Features and User Satisfaction Analysis
Authors: Joud Basyouni, Rama Zagzoog, Mashael Al Faleh, Jana Alireza
Abstract:
AI is changing many fields and speeding up tasks that used to take a long time. It used to take too long to edit photos. However, many AI-powered apps make photo editing, automatic effects, and animations much easier than other manual editing apps with no AI. The mobile app Photoleap edits photos and creates digital art using AI. Editing photos with text prompts is also becoming a standard these days with the help of apps like Photoleap. Now, users can change backgrounds, add animations, turn text into images, and create scenes with AI. This project report discusses the photo editing app's history and popularity. Photoleap resembles Photoshop, Canva, Photos, and Pixlr. The report includes survey questions to assess Photoleap user satisfaction. The report describes Photoleap's features and functions with screenshots. Photoleap uses AI well. Charts and graphs show Photoleap user ratings and comments from the survey. This project found that most Photoleap users liked how well it worked, was made, and was easy to use. People liked changing photos and adding backgrounds. Users can create stunning photo animations. A few users dislike the app's animations, AI art, and photo effects. The project report discusses the app's pros and cons and offers improvements.Keywords: artificial intelligence, photoleap, images, background, photo editing
Procedia PDF Downloads 601195 A Functional Analysis of the 2016 United States Presidential Debates through the Application of the Functional Theory of Political Campaign Discourse
Authors: Maryam Vaezi
Abstract:
In this study, the Functional Theory of Political Campaign Discourse has been applied in order to investigate the 2016 Clinton-Trump presidential debates. All three kinds of utterances (acclaims, attacks, and defenses) were produced by the candidates supporting the usefulness of the Functional Theory of Political Campaign Discourse for the analysis of the presidential debates as a type of political discourse. Attacks comprised 45% of the candidates’ utterances, followed by acclaims at 33%; defenses were the least common function at 22%. The candidate from the Democratic Party, Hillary Clinton, acclaimed more, whereas the Republican Party presidential candidate, Donald Trump, attacked more. Simple denial was the most common form of defense used by the candidates. Both candidates directed more of their utterances to policy (past deeds, future plans, and general goals) than character (personal qualities, leadership abilities, and ideals). Analyzing debates in terms of the functions performed by the candidates to increase their desirability and chance of winning the election, can lead to a better understanding of these significant political events as well as other forms of political discourse.Keywords: acclaim, attack, defend, character, Democratic Party, Donald Trump, Hillary Clinton, policy, presidential debates, Republican Party
Procedia PDF Downloads 335