Search results for: SIM card
92 A Study on the Annual Doses Received by the Workers of Some Medical Practices
Authors: Eltayeb Hamad Elneel Yousif
Abstract:
This paper describes occupational radiation doses of workers in non-destructive testing (NDT) and some medical practices during the year 2007. The annual doses received by the workers of a public hospital are presented in this report. The Department is facilitated with HARSHAW Reader model 6600 and assigned the rule of personal monitoring to contribute in controlling and reducing the doses received by radiation workers. TLD cards with two TLD chips type LiF: Mg, Ti (TLD-100) were calibrated to measure the personal dose equivalent Hp(10). Around 150 medical radiation workers were monitored throughout the year. Each worker received a single TLD card worn on the chest above lead apron and returned for laboratory reading every two months. The average annual doses received by the workers of radiotherapy, nuclear medicine and diagnostic radiology were evaluated. The annual doses for individual radiation workers ranged between 0.55-4.42 mSv, 0.48-1.86 mSv, and 0.48-0.91 mSv for the workers of radiotherapy, nuclear medicine and diagnostic radiology, respectively. The mean dose per worker was 1.29±1, 1.03±0.4, and 0.69±0.2 mSv, respectively. The results showed compliance with international dose limits. Our results reconfirm the importance of personal dosimetry service in assuring the radiation protection of medical staff in developing countries.Keywords: radiation medicine, non-destructive testing, TLD, public hospital
Procedia PDF Downloads 37991 Regionalism or Ladder-Up: A Theoretical Perspective of Association of Southeast Asian Nations’ Reactions to Belt and Road Initiative
Authors: Yunqi Wang
Abstract:
As a vital region to the Chinese Belt and Road Initiative (BRI), members of the Association of Southeast Asian Nations (ASEAN) have responded to the grand strategy differently. Some expressed fervent support, while others played the 'hedging' card between great powers. This paper explores the underlying rationale behind such complexity by proposing two theoretical explanations: a Regionalism Hypothesis, where countries respond with hedging, balancing, and bandwagoning behaviours in line with national interests and norm-based 'ASEAN-Way'; and a Ladder-up Hypothesis, where countries consider the initiative as an incentive to remove bottlenecks of climbing up the economic ladder in Rostow's stage of the growth model. By analysing reactions from Myanmar, Laos, Indonesia, and Singapore, two patterns are observed. On an empirical note, the more developed economies are more inclined to the Regionalist explanation. On a theoretical note, there has been a gradual convergence between the two explanations, given the impact of economic globalisation on ASEAN. This paper will contribute to the current theoretical vacancy in the study of ASEAN and BRI by capturing the particular norms shared by this regional entity.Keywords: ASEAN, belt and road initiative, hedging, Rostow's stages of growth, regionalism
Procedia PDF Downloads 11790 Migrating Words and Voices in Joseph O’Neill’s Netherland and The Dog
Authors: Masami Usui
Abstract:
The 21th century has already witnessed the rapid globalization of catastrophes caused by layered political, social, religious, cultural, and environmental conflicts. The post 9/11 literature that reflects these characteristics retells the experiences of those who are, whether directly or indirectly, involved in the globalized catastrophes of enlarging and endangering their boundaries and consequences. With an Irish-Turkish origin, a Dutch and British educational background, and as an American green-card holder, Joseph O’Neill challenges this changing circumstances of the expanding crisis. In his controversial novel, Netherland (2008), O’Neill embodies the deeply-rooted compromises, the transplanted conflicts, and human internalized crisis in post 9/11 New York City. O’Neill presents to us the transition between Netherland to New York with a post-colonial perspective. This internalized conflicts are revised in The Dog (2014) in which a newly-constructing and expanding global city of gold, Dubai, represents the transitional location from New York City. Through these two novels, words and voices are migrating beyond cultural and political boundaries and discussing what a collective mind embodies in this globalized society.Keywords: American literature, global literature, cultural studies, political science
Procedia PDF Downloads 36789 Developing a Secure Iris Recognition System by Using Advance Convolutional Neural Network
Authors: Kamyar Fakhr, Roozbeh Salmani
Abstract:
Alphonse Bertillon developed the first biometric security system in the 1800s. Today, many governments and giant companies are considering or have procured biometrically enabled security schemes. Iris is a kaleidoscope of patterns and colors. Each individual holds a set of irises more unique than their thumbprint. Every single day, giant companies like Google and Apple are experimenting with reliable biometric systems. Now, after almost 200 years of improvements, face ID does not work with masks, it gives access to fake 3D images, and there is no global usage of biometric recognition systems as national identity (ID) card. The goal of this paper is to demonstrate the advantages of iris recognition overall biometric recognition systems. It make two extensions: first, we illustrate how a very large amount of internet fraud and cyber abuse is happening due to bugs in face recognition systems and in a very large dataset of 3.4M people; second, we discuss how establishing a secure global network of iris recognition devices connected to authoritative convolutional neural networks could be the safest solution to this dilemma. Another aim of this study is to provide a system that will prevent system infiltration caused by cyber-attacks and will block all wireframes to the data until the main user ceases the procedure.Keywords: biometric system, convolutional neural network, cyber-attack, secure
Procedia PDF Downloads 21888 Evaluating Effect of Business Process Reengineering Performance of Private Banks
Authors: Elham Fakhrpoor, Daryush Mohammadi Zanjirani, Maziyar Nojaba
Abstract:
Business process reengineering is one of the most important strategies in banks in recent years that not only it increases customers’ satisfaction, but also it increases performance of banks. The purpose of elementary (initial) business process reengineering is reinforcing banks abilities to obtain new customers and making long-term relationships with existed customers and increasing customers’ satisfaction among service quality in global level. Banks specially the private ones are the main streams of state, because cash flow is necessary to survive a state. What guarantees survival and permanency of financial institutes’ activities is providing favorite, certain, and proper services. Capital market being small and state financial system being bank-oriented needs optimum usage from banks. According to this fact and role and importance of developing banking system, the present study tried to offer a constructed model using Lisrel and also spss software to evaluate effects of business process reengineering on performance of private banks. We have one min hypothesis and four sub-hypotheses. The main hypothesis says reengineering factors have positive effects on bank performances (balanced- scores card aspects). These hypotheses were tested by structural equations modeling.Keywords: effect, business, reengineering, private bank
Procedia PDF Downloads 28087 Open Circuit MPPT Control Implemented for PV Water Pumping System
Authors: Rabiaa Gammoudi, Najet Rebei, Othman Hasnaoui
Abstract:
Photovoltaic systems use different techniques for tracking the Maximum Power Point (MPPT) to provide the highest possible power to the load regardless of the climatic conditions variation. In this paper, the proposed method is the Open Circuit (OC) method with sudden and random variations of insolation. The simulation results of the water pumping system controlled by OC method are validated by an experimental experience in real-time using a test bench composed by a centrifugal pump powered by a PVG via a boost chopper for the adaptation between the source and the load. The output of the DC/DC converter supplies the motor pump LOWARA type, assembly by means of a DC/AC inverter. The control part is provided by a computer incorporating a card DS1104 running environment Matlab/Simulink for visualization and data acquisition. These results show clearly the effectiveness of our control with a very good performance. The results obtained show the usefulness of the developed algorithm in solving the problem of degradation of PVG performance depending on the variation of climatic factors with a very good yield.Keywords: PVWPS (PV Water Pumping System), maximum power point tracking (MPPT), open circuit method (OC), boost converter, DC/AC inverter
Procedia PDF Downloads 45486 RFID Based Indoor Navigation with Obstacle Detection Based on A* Algorithm for the Visually Impaired
Authors: Jayron Sanchez, Analyn Yumang, Felicito Caluyo
Abstract:
The visually impaired individual may use a cane, guide dog or ask for assistance from a person. This study implemented the RFID technology which consists of a low-cost RFID reader and passive RFID tag cards. The passive RFID tag cards served as checkpoints for the visually impaired. The visually impaired was guided through audio output from the system while traversing the path. The study implemented an ultrasonic sensor in detecting static obstacles. The system generated an alternate path based on A* algorithm to avoid the obstacles. Alternate paths were also generated in case the visually impaired traversed outside the intended path to the destination. A* algorithm generated the shortest path to the destination by calculating the total cost of movement. The algorithm then selected the smallest movement cost as a successor to the current tag card. Several trials were conducted to determine the effect of obstacles in the time traversal of the visually impaired. A dependent sample t-test was applied for the statistical analysis of the study. Based on the analysis, the obstacles along the path generated delays while requesting for the alternate path because of the delay in transmission from the laptop to the device via ZigBee modules.Keywords: A* algorithm, RFID technology, ultrasonic sensor, ZigBee module
Procedia PDF Downloads 40985 Experiencing the Shattered: Managing Countertransference Experiences with Anorexia Patients in Psychotherapy
Authors: M. Card
Abstract:
Working with anorexia patients can be a challenging experience for mental and health care professionals. The reasons for not wanting to work with this patient population stems from the numerous concerns surrounding the patient’s health – physically and mentally. Many health care professionals reported having strong negative feelings, such as; anger, hopelessness and helplessness when working with anorexia patients. These feelings often impaired their judgement to treatment and affected how they related to the patient. This research focused on psychotherapists who preferred to work with anorexia patients; what countertransference feelings were evoked in them during sessions with patients and most importantly, how they managed the feelings. The research used interpretative phenomenological analysis (IPA) as the theoretical framework and data analysis method. Semi-structured interviews were used with ten experienced psychotherapists to obtain their countertransference experiences with anorexia patients and how they manage it. There were three main themes discovered; (1) the use of supervision, (2) their own personal therapy and finally (3) experience and evolution. The research unearthed that experienced psychotherapists also experienced strong countertransference feelings towards their patients; some positive and some negative. However, these feelings could actually be interpreted as co-transference with their anorexia patients. The psychotherapists were able to own their part in the evocative unconscious nature of a relational therapeutic space, where their personal issues may be entangled in their anorexia patient’s symptomatology.Keywords: anorexia nervosa, countertransference, co-transference, psychotherapy, relational psychotherapy
Procedia PDF Downloads 16584 Development of 3D Laser Scanner for Robot Navigation
Authors: Ali Emre Öztürk, Ergun Ercelebi
Abstract:
Autonomous robotic systems needs an equipment like a human eye for their movement. Robotic camera systems, distance sensors and 3D laser scanners have been used in the literature. In this study a 3D laser scanner has been produced for those autonomous robotic systems. In general 3D laser scanners are using 2 dimension laser range finders that are moving on one-axis (1D) to generate the model. In this study, the model has been obtained by a one-dimensional laser range finder that is moving in two –axis (2D) and because of this the laser scanner has been produced cheaper. Furthermore for the laser scanner a motor driver, an embedded system control board has been used and at the same time a user interface card has been used to make the communication between those cards and computer. Due to this laser scanner, the density of the objects, the distance between the objects and the necessary path ways for the robot can be calculated. The data collected by the laser scanner system is converted in to cartesian coordinates to be modeled in AutoCAD program. This study shows also the synchronization between the computer user interface, AutoCAD and the embedded systems. As a result it makes the solution cheaper for such systems. The scanning results are enough for an autonomous robot but the scan cycle time should be developed. This study makes also contribution for further studies between the hardware and software needs since it has a powerful performance and a low cost.Keywords: 3D laser scanner, embedded system, 1D laser range finder, 3D model
Procedia PDF Downloads 27483 Predicting Destination Station Based on Public Transit Passenger Profiling
Authors: Xuyang Song, Jun Yin
Abstract:
The smart card has been an extremely universal tool in public transit. It collects a large amount of data on buses, urban railway transit, and ferries and provides possibilities for passenger profiling. This paper combines offline analysis of passenger profiling and real-time prediction to propose a method that can accurately predict the destination station in real-time when passengers tag on. Firstly, this article constructs a static database of user travel characteristics after identifying passenger travel patterns based on the Density-Based Spatial Clustering of Applications with Noise (DBSCAN). The dual travel passenger habits are identified: OD travel habits and D station travel habits. Then a rapid real-time prediction algorithm based on Transit Passenger Profiling is proposed, which can predict the destination of in-board passengers. This article combines offline learning with online prediction, providing a technical foundation for real-time passenger flow prediction, monitoring and simulation, and short-term passenger behavior and demand prediction. This technology facilitates the efficient and real-time acquisition of passengers' travel destinations and demand. The last, an actual case was simulated and demonstrated feasibility and efficiency.Keywords: travel behavior, destination prediction, public transit, passenger profiling
Procedia PDF Downloads 1982 Field-Programmable Gate Array Based Tester for Protective Relay
Authors: H. Bentarzi, A. Zitouni
Abstract:
The reliability of the power grid depends on the successful operation of thousands of protective relays. The failure of one relay to operate as intended may lead the entire power grid to blackout. In fact, major power system failures during transient disturbances may be caused by unnecessary protective relay tripping rather than by the failure of a relay to operate. Adequate relay testing provides a first defense against false trips of the relay and hence improves power grid stability and prevents catastrophic bulk power system failures. The goal of this research project is to design and enhance the relay tester using a technology such as Field Programmable Gate Array (FPGA) card NI 7851. A PC based tester framework has been developed using Simulink power system model for generating signals under different conditions (faults or transient disturbances) and LabVIEW for developing the graphical user interface and configuring the FPGA. Besides, the interface system has been developed for outputting and amplifying the signals without distortion. These signals should be like the generated ones by the real power system and large enough for testing the relay’s functionality. The signals generated that have been displayed on the scope are satisfactory. Furthermore, the proposed testing system can be used for improving the performance of protective relay.Keywords: amplifier class D, field-programmable gate array (FPGA), protective relay, tester
Procedia PDF Downloads 21681 Development of Advanced Linear Calibration Technique for Air Flow Sensing by Using CTA-Based Hot Wire Anemometry
Authors: Ming-Jong Tsai, T. M. Wu, R. C. Chu
Abstract:
The purpose of this study is to develop an Advanced linear calibration Technique for air flow sensing by using CTA-based Hot wire Anemometry. It contains a host PC with Human Machine Interface, a wind tunnel, a wind speed controller, an automatic data acquisition module, and nonlinear calibration model. To improve the fitting error by using single fitting polynomial, this study proposes a Multiple three-order Polynomial Fitting Method (MPFM) for fitting the non-linear output of a CTA-based Hot wire Anemometry. The CTA-based anemometer with built-in fitting parameters is installed in the wind tunnel, and the wind speed is controlled by the PC-based controller. The Hot-Wire anemometer's thermistor resistance change is converted into a voltage signal or temperature differences, and then sent to the PC through a DAQ card. After completion measurements of original signal, the Multiple polynomial mathematical coefficients can be automatically calculated, and then sent into the micro-processor in the Hot-Wire anemometer. Finally, the corrected Hot-Wire anemometer is verified for the linearity, the repeatability, error percentage, and the system outputs quality control reports.Keywords: flow rate sensing, hot wire, constant temperature anemometry (CTA), linear calibration, multiple three-order polynomial fitting method (MPFM), temperature compensation
Procedia PDF Downloads 41680 Accurate Position Electromagnetic Sensor Using Data Acquisition System
Authors: Z. Ezzouine, A. Nakheli
Abstract:
This paper presents a high position electromagnetic sensor system (HPESS) that is applicable for moving object detection. The authors have developed a high-performance position sensor prototype dedicated to students’ laboratory. The challenge was to obtain a highly accurate and real-time sensor that is able to calculate position, length or displacement. An electromagnetic solution based on a two coil induction principal was adopted. The HPESS converts mechanical motion to electric energy with direct contact. The output signal can then be fed to an electronic circuit. The voltage output change from the sensor is captured by data acquisition system using LabVIEW software. The displacement of the moving object is determined. The measured data are transmitted to a PC in real-time via a DAQ (NI USB -6281). This paper also describes the data acquisition analysis and the conditioning card developed specially for sensor signal monitoring. The data is then recorded and viewed using a user interface written using National Instrument LabVIEW software. On-line displays of time and voltage of the sensor signal provide a user-friendly data acquisition interface. The sensor provides an uncomplicated, accurate, reliable, inexpensive transducer for highly sophisticated control systems.Keywords: electromagnetic sensor, accurately, data acquisition, position measurement
Procedia PDF Downloads 28579 Scientific Linux Cluster for BIG-DATA Analysis (SLBD): A Case of Fayoum University
Authors: Hassan S. Hussein, Rania A. Abul Seoud, Amr M. Refaat
Abstract:
Scientific researchers face in the analysis of very large data sets that is increasing noticeable rate in today’s and tomorrow’s technologies. Hadoop and Spark are types of software that developed frameworks. Hadoop framework is suitable for many Different hardware platforms. In this research, a scientific Linux cluster for Big Data analysis (SLBD) is presented. SLBD runs open source software with large computational capacity and high performance cluster infrastructure. SLBD composed of one cluster contains identical, commodity-grade computers interconnected via a small LAN. SLBD consists of a fast switch and Gigabit-Ethernet card which connect four (nodes). Cloudera Manager is used to configure and manage an Apache Hadoop stack. Hadoop is a framework allows storing and processing big data across the cluster by using MapReduce algorithm. MapReduce algorithm divides the task into smaller tasks which to be assigned to the network nodes. Algorithm then collects the results and form the final result dataset. SLBD clustering system allows fast and efficient processing of large amount of data resulting from different applications. SLBD also provides high performance, high throughput, high availability, expandability and cluster scalability.Keywords: big data platforms, cloudera manager, Hadoop, MapReduce
Procedia PDF Downloads 35878 The Effect of Experimentally Induced Stress on Facial Recognition Ability of Security Personnel’s
Authors: Zunjarrao Kadam, Vikas Minchekar
Abstract:
The facial recognition is an important task in criminal investigation procedure. The security guards-constantly watching the persons-can help to identify the suspected accused. The forensic psychologists are tackled such cases in the criminal justice system. The security personnel may loss their ability to correctly identify the persons due to constant stress while performing the duty. The present study aimed at to identify the effect of experimentally induced stress on facial recognition ability of security personnel’s. For this study 50, security guards from Sangli, Miraj & Jaysingpur city of the Maharashtra States of India were recruited in the experimental study. The randomized two group design was employed to carry out the research. In the initial condition twenty identity card size photographs were shown to both groups. Afterward, artificial stress was induced in the experimental group through the difficultpuzzle-solvingtask in a limited period. In the second condition, both groups were presented earlier photographs with another additional thirty new photographs. The subjects were asked to recognize the photographs which are shown earliest. The analyzed data revealed that control group has ahighest mean score of facial recognition than experimental group. The results were discussed in the present research.Keywords: experimentally induced stress, facial recognition, cognition, security personnel
Procedia PDF Downloads 26177 Design and Application of NFC-Based Identity and Access Management in Cloud Services
Authors: Shin-Jer Yang, Kai-Tai Yang
Abstract:
In response to a changing world and the fast growth of the Internet, more and more enterprises are replacing web-based services with cloud-based ones. Multi-tenancy technology is becoming more important especially with Software as a Service (SaaS). This in turn leads to a greater focus on the application of Identity and Access Management (IAM). Conventional Near-Field Communication (NFC) based verification relies on a computer browser and a card reader to access an NFC tag. This type of verification does not support mobile device login and user-based access management functions. This study designs an NFC-based third-party cloud identity and access management scheme (NFC-IAM) addressing this shortcoming. Data from simulation tests analyzed with Key Performance Indicators (KPIs) suggest that the NFC-IAM not only takes less time in identity identification but also cuts time by 80% in terms of two-factor authentication and improves verification accuracy to 99.9% or better. In functional performance analyses, NFC-IAM performed better in salability and portability. The NFC-IAM App (Application Software) and back-end system to be developed and deployed in mobile device are to support IAM features and also offers users a more user-friendly experience and stronger security protection. In the future, our NFC-IAM can be employed to different environments including identification for mobile payment systems, permission management for remote equipment monitoring, among other applications.Keywords: cloud service, multi-tenancy, NFC, IAM, mobile device
Procedia PDF Downloads 43576 Arduino Pressure Sensor Cushion for Tracking and Improving Sitting Posture
Authors: Andrew Hwang
Abstract:
The average American worker sits for thirteen hours a day, often with poor posture and infrequent breaks, which can lead to health issues and back problems. The Smart Cushion was created to alert individuals of their poor postures, and may potentially alleviate back problems and correct poor posture. The Smart Cushion is a portable, rectangular, foam cushion, with five strategically placed pressure sensors, that utilizes an Arduino Uno circuit board and specifically designed software, allowing it to collect data from the five pressure sensors and store the data on an SD card. The data is then compiled into graphs and compared to controlled postures. Before volunteers sat on the cushion, their levels of back pain were recorded on a scale from 1-10. Data was recorded for an hour during sitting, and then a new, corrected posture was suggested. After using the suggested posture for an hour, the volunteers described their level of discomfort on a scale from 1-10. Different patterns of sitting postures were generated that were able to serve as early warnings of potential back problems. By using the Smart Cushion, the areas where different volunteers were applying the most pressure while sitting could be identified, and the sitting postures could be corrected. Further studies regarding the relationships between posture and specific regions of the body are necessary to better understand the origins of back pain; however, the Smart Cushion is sufficient for correcting sitting posture and preventing the development of additional back pain.Keywords: Arduino Sketch Algorithm, biomedical technology, pressure sensors, Smart Cushion
Procedia PDF Downloads 13475 The Impact of Cybercrime on Youth Development in Nigeria
Authors: Christiana Ebobo
Abstract:
Cybercrime consists of numerous crimes that are perpetrated on the internet on daily basis. The forms include but not limited to Identity theft, Pretentious dating, Desktop counterfeiting, Internet chat room, Cyber harassment, Fraudulent electronic mails, Automated Teller Machine Spoofing, Pornography, Piracy, Hacking, Credit card frauds, Phishing and Spamming. The general term used among the youths for this type of crime in Nigeria is ‘Yahoo Yahoo’. Cybercrime is on the increase among the youths at all levels as such this study aims at examining the impact of cybercrime on youth development in Nigeria. The study examines the impact of cybercrime on youths’ academic performance, integrity, employment and religious practices. The study is a survey which made use of questionnaire and focus group discussion among 150 randomly selected youths in Gwagwalada LCDA, Federal Capital Territory, Nigeria. The study adopts the systems theory as its theoretical framework. The study also adopts the simple frequency table and percentage for its data analysis. The study reveals that cybercrime has eaten deep into the minds of some youths and some of them are practicing diabolic means to succeed in it. It is also reveals that majority (68%) of the respondents believe that cybercrime impacts negatively on youths’ academic performance in Nigeria. The major recommendation of this study is that cybercrime offenders should be treated like armed robbers in order to discourage other youths from getting involved in it.Keywords: armed robber, cybercrime, integrity, youth
Procedia PDF Downloads 52374 Pattern of Cybercrime Among Adolescents: An Exploratory Study
Authors: Mohamamd Shahjahan
Abstract:
Background: Cybercrime is common phenomenon at present both developed and developing countries. Young generation, especially adolescents now engaged internet frequently and they commit cybercrime frequently in Bangladesh. Objective: In this regard, the present study on the pattern of cybercrime among youngers of Bangladesh has been conducted. Methods and tools: This study was a cross-sectional study, descriptive in nature. Non-probability accidental sampling technique has been applied to select the sample because of the nonfinite population and the sample size was 167. A printed semi-structured questionnaire was used to collect data. Results: The study shows that adolescents mainly do hacking (94.6%), pornography (88.6%), software piracy (85 %), cyber theft (82.6%), credit card fraud (81.4%), cyber defamation (75.6%), sweet heart swindling (social network) (65.9%) etc. as cybercrime. According to findings the major causes of cybercrime among the respondents in Bangladesh were- weak laws (88.0%), defective socialization (81.4%), peer group influence (80.2%), easy accessibility to internet (74.3%), corruption (62.9%), unemployment (58.7%), and poverty (24.6%) etc. It is evident from the study that 91.0% respondents used password cracker as the techniques of cyber criminality. About 76.6%, 72.5%, 71.9%, 68.3% and 60.5% respondents’ technique was key loggers, network sniffer, exploiting, vulnerability scanner and port scanner consecutively. Conclusion: The study concluded that pattern of cybercrimes is frequently changing and increasing dramatically. Finally, it is recommending that the private public partnership and execution of existing laws can be controlling this crime.Keywords: cybercrime, adolescents, pattern, internet
Procedia PDF Downloads 8073 A Program Based on Artistic and Musical Activities to Acquire Some Educational Concepts for Children with Learning Difficulties
Authors: Ahmed Amin Mousa, Huda Mazeed, Eman Saad
Abstract:
The study aims to identify the extent of the effectiveness of the artistic formation program using some types of pastes to reduce the hyperactivity of the kindergarten child. The researcher has discussed the effectiveness of the artistic program using some types of pastes in reducing the hyperactivity of the kindergarten child. The research sample included 120 children of ages between 5 to 6 years old from the five schools for special needs section learning disability, Cairo Province. The study used the empirical like curriculum which depends on designing one group using the before and after application measurement for the group to validate the fidelity of both the hypothesis and the effectiveness of the program. The variables of the study were specified as follows; artistic formation program using paper Mache as an independent variable and its effect on skills of kindergarten child with learning disabilities as a subsequent variable. The researchers depended on applying a group of artistic formation program using pulp melding skills for kindergarten children with learning disabilities. The tools of the study, designed by the researcher, included: recording card used for recording the Effective program using pulp molding skills for kindergarten children with learning disabilities during practicing the artistic formation activity. In additional, there was a program using pulp molding skills for kindergarten children with learning disabilities. The results proved the effectiveness of the program using pulp molding skills for kindergarten children with learning disabilities.Keywords: artistic program, developing skills, kindergarten, children, learning disabilities
Procedia PDF Downloads 16072 Screening Deformed Red Blood Cells Irradiated by Ionizing Radiations Using Windowed Fourier Transform
Authors: Dahi Ghareab Abdelsalam Ibrahim, R. H. Bakr
Abstract:
Ionizing radiation, such as gamma radiation and X-rays, has many applications in medical diagnoses and cancer treatment. In this paper, we used the windowed Fourier transform to extract the complex image of the deformed red blood cells. The real values of the complex image are used to extract the best fitting of the deformed cell boundary. Male albino rats are irradiated by γ-rays from ⁶⁰Co. The male albino rats are anesthetized with ether, and then blood samples are collected from the eye vein by heparinized capillary tubes for studying the radiation-damaging effect in-vivo by the proposed windowed Fourier transform. The peripheral blood films are prepared according to the Brown method. The peripheral blood film is photographed by using an Automatic Image Contour Analysis system (SAMICA) from ELBEK-Bildanalyse GmbH, Siegen, Germany. The SAMICA system is provided with an electronic camera connected to a computer through a built-in interface card, and the image can be magnified up to 1200 times and displayed by the computer. The images of the peripheral blood films are then analyzed by the windowed Fourier transform method to extract the precise deformation from the best fitting. Based on accurate deformation evaluation of the red blood cells, diseases can be diagnosed in their primary stages.Keywords: windowed Fourier transform, red blood cells, phase wrapping, Image processing
Procedia PDF Downloads 8571 The Effect of Trans-Cranial Direct Current Stimulation (tDCS) on Cognitive Flexibility and Social Decision-Making in Football Players
Authors: Erfan Izadpanah
Abstract:
The present study was conducted to investigate the effect of the Trans-Cranial Direct Current Stimulation (tDCS) on cognitive flexibility and social decision-making in skilled, semi-skilled and novice football players. The present quasi-experimental pretest-posttest study was conducted on 60 randomly-selected subjects divided into trial and placebo groups (n=30 per group). The trial group received three 20-minute sessions of anodic stimulation at the intensity of 2 mA. The placebo group also received three sessions of sham anodic stimulation. Data were collected using the Wisconsin, Grant and Berg Card-Sorting Test (1948) and the ultimatum game and were then analyzed using the ANCOVA. The results showed significant differences between the skilled, semi-skilled and novice football players in the trial and placebo groups in terms of cognitive flexibility and social decision-making (P<0.01). TDCS appears to be able to improve cognitive flexibility and consequently social decision-making in football players and is recommended to sport psychologists and coaches as a useful intervention to increase cognitive flexibility and improve social decision-making in players.Keywords: TDCS, cognitive flexibility, social decision-making, skilled, semi-skilled and novice football players
Procedia PDF Downloads 14270 Developing a Cloud Intelligence-Based Energy Management Architecture Facilitated with Embedded Edge Analytics for Energy Conservation in Demand-Side Management
Authors: Yu-Hsiu Lin, Wen-Chun Lin, Yen-Chang Cheng, Chia-Ju Yeh, Yu-Chuan Chen, Tai-You Li
Abstract:
Demand-Side Management (DSM) has the potential to reduce electricity costs and carbon emission, which are associated with electricity used in the modern society. A home Energy Management System (EMS) commonly used by residential consumers in a down-stream sector of a smart grid to monitor, control, and optimize energy efficiency to domestic appliances is a system of computer-aided functionalities as an energy audit for residential DSM. Implementing fault detection and classification to domestic appliances monitored, controlled, and optimized is one of the most important steps to realize preventive maintenance, such as residential air conditioning and heating preventative maintenance in residential/industrial DSM. In this study, a cloud intelligence-based green EMS that comes up with an Internet of Things (IoT) technology stack for residential DSM is developed. In the EMS, Arduino MEGA Ethernet communication-based smart sockets that module a Real Time Clock chip to keep track of current time as timestamps via Network Time Protocol are designed and implemented for readings of load phenomena reflecting on voltage and current signals sensed. Also, a Network-Attached Storage providing data access to a heterogeneous group of IoT clients via Hypertext Transfer Protocol (HTTP) methods is configured to data stores of parsed sensor readings. Lastly, a desktop computer with a WAMP software bundle (the Microsoft® Windows operating system, Apache HTTP Server, MySQL relational database management system, and PHP programming language) serves as a data science analytics engine for dynamic Web APP/REpresentational State Transfer-ful web service of the residential DSM having globally-Advanced Internet of Artificial Intelligence (AI)/Computational Intelligence. Where, an abstract computing machine, Java Virtual Machine, enables the desktop computer to run Java programs, and a mash-up of Java, R language, and Python is well-suited and -configured for AI in this study. Having the ability of sending real-time push notifications to IoT clients, the desktop computer implements Google-maintained Firebase Cloud Messaging to engage IoT clients across Android/iOS devices and provide mobile notification service to residential/industrial DSM. In this study, in order to realize edge intelligence that edge devices avoiding network latency and much-needed connectivity of Internet connections for Internet of Services can support secure access to data stores and provide immediate analytical and real-time actionable insights at the edge of the network, we upgrade the designed and implemented smart sockets to be embedded AI Arduino ones (called embedded AIduino). With the realization of edge analytics by the proposed embedded AIduino for data analytics, an Arduino Ethernet shield WizNet W5100 having a micro SD card connector is conducted and used. The SD library is included for reading parsed data from and writing parsed data to an SD card. And, an Artificial Neural Network library, ArduinoANN, for Arduino MEGA is imported and used for locally-embedded AI implementation. The embedded AIduino in this study can be developed for further applications in manufacturing industry energy management and sustainable energy management, wherein in sustainable energy management rotating machinery diagnostics works to identify energy loss from gross misalignment and unbalance of rotating machines in power plants as an example.Keywords: demand-side management, edge intelligence, energy management system, fault detection and classification
Procedia PDF Downloads 25169 Bioethical Standards as a Tool for the Improvement of Human Relations Toward Health, Animals, and Plants: The Example of Three Croatian Mediterranean Local Communities
Authors: Toni Buterin, Robert Doričić
Abstract:
Mainstream bioethics, narrowed down mainly to human medicine and research, can hardly be expected to efficiently face modern challenges related to environmental issues. Departing from the interpretation of "European Bioethics" as a discipline considering ethical duties not only toward fellow humans, but to all living beings, this paper presents the results of a study conducted in three communities in Croatian Northern Adriatic region, selected for their recent experience of ecological threats (Labin – thermo-electric power plant; Bakar – cokery), or representing a highly-valuable and vulnerable natural insular pocket (Mali Lošinj – health tourism, dolphin wildlife refuge, fragrant gardens programme, etc.). After targeted workshops and interviews had been organised in those communities, the results of the obtained insights were combined with experts' opinion and a list of around hundred “bioethical standards” was formed. "Bioethical standards" represent a set of principles and measures of the correct attitude of people towards their own health, animals, plants, and the eco-system as a whole. "Bioethical standards" charter might improve the level of local community environmental consciousness, and provide direct guidance for its sustainable development (including its tourism-advertising ace card). The present paper discusses the standards' potential benefits and some implementational risks.Keywords: bioethical standards, croatia, European bioethics, local communities
Procedia PDF Downloads 15168 Precarious ID Cards - Studying Documentary Practices in India through the Lens of Internal Migration
Authors: Ambuja Raj
Abstract:
This research will attempt to understand how documents are materially indispensable civic artifacts for migrants in their encounters with the state. Documents such as ID cards are sites of mediation and bureaucratic manifestation which reveal the inherent dynamics of power between the state and a delocalized people. While ID cards allow the holder to retain a different identity and articulate their demands as a citizen, they at the same time transform subjects into ‘objects’ in the exercise of governmental power. The research is based on the study of internal migrants in India, who are ‘visible’ to the state through its host of ID documents such as the ‘Aadhaar card’, electoral IDs, Ration cards, and a variety of region-specific documents, without the possession of which, not only are they unable to access jobs, public goods and services, and accommodation, but are liable to exploitation from state forces and mediators. Through semi-structured interviews with social actors in the processes of documentation and welfare of migrants, as well as with settlements of migrants themselves located in the state of Kerala in India, the thesis will attempt to understand the salience of documentary practices in the lives of inter-state migrants who move within Indian states in the hope of bettering their economic conditions. The research will trace the material and evolving significance of ID cards in the tenacity of states dealing with these ‘illegible’ populations. It will try to bring theories of governmentality, biopolitics and Weberian bureaucracy into the migrant issue while critically grounding itself on secondary literature by scholars who have worked on South Asian ‘governments of paper’.Keywords: migration, historiography of documents, anthropology of state, documentary practices
Procedia PDF Downloads 18867 Dental Ethics versus Malpractice, as Phenomenon with a Growing Trend
Authors: Saimir Heta, Kers Kapaj, Rialda Xhizdari, Ilma Robo
Abstract:
Dealing with emerging cases of dental malpractice with justifications that stem from the clear rules of dental ethics is a phenomenon with an increasing trend in today's dental practice. Dentists should clearly understand how far the limit of malpractice goes, with or without minimal or major consequences, for the affected patient, which can be justified as a complication of dental treatment, in support of the rules of dental ethics in the dental office. Indeed, malpractice can occur in cases of lack of professionalism, but it can also come as a consequence of anatomical and physiological limitations in the implementation of the dental protocols, predetermined and indicated by the patient in the paragraph of the treatment plan in his personal card. This study is of the review type with the aim of the latest findings published in the literature about the problem of dealing with these phenomena. The combination of keywords is done in such a way with the aim to give the necessary space for collecting the right information in the networks of publications about this field, always first from the point of view of the dentist and not from that of the lawyer or jurist. From the findings included in this article, it was noticed the diversity of approaches towards the phenomenon depends on the different countries based on the legal basis that these countries have. There is a lack of or a small number of articles that touch on this topic, and these articles are presented with a limited number of data on the same topic. Conclusions: Dental malpractice should not be hidden under the guise of various dental complications that we justify with the strict rules of ethics for patients treated in the dental chair. The individual experience of dental malpractice must be published with the aim of serving as a source of experience for future generations of dentists.Keywords: dental ethics, malpractice, professional protocol, random deviation
Procedia PDF Downloads 9666 Transferring Data from Glucometer to Mobile Device via Bluetooth with Arduino Technology
Authors: Tolga Hayit, Ucman Ergun, Ugur Fidan
Abstract:
Being healthy is undoubtedly an indispensable necessity for human life. With technological improvements, in the literature, various health monitoring and imaging systems have been developed to satisfy your health needs. In this context, the work of monitoring and recording the data of individual health monitoring data via wireless technology is also being part of these studies. Nowadays, mobile devices which are located in almost every house and which become indispensable of our life and have wireless technology infrastructure have an important place of making follow-up health everywhere and every time because these devices were using in the health monitoring systems. In this study, Arduino an open-source microcontroller card was used in which a sample sugar measuring device was connected in series. In this way, the glucose data (glucose ratio, time) obtained with the glucometer is transferred to the mobile device based on the Android operating system with the Bluetooth technology channel. A mobile application was developed using the Apache Cordova framework for listing data, presenting graphically and reading data over Arduino. Apache Cordova, HTML, Javascript and CSS are used in coding section. The data received from the glucometer is stored in the local database of the mobile device. It is intended that people can transfer their measurements to their mobile device by using wireless technology and access the graphical representations of their data. In this context, the aim of the study is to be able to perform health monitoring by using different wireless technologies in mobile devices that can respond to different wireless technologies at present. Thus, that will contribute the other works done in this area.Keywords: Arduino, Bluetooth, glucose measurement, mobile health monitoring
Procedia PDF Downloads 32265 Haptic Robotic Glove for Tele-Exploration of Explosive Devices
Authors: Gizem Derya Demir, Ilayda Yankilic, Daglar Karamuftuoglu, Dante Dorantes
Abstract:
ABSTRACT HAPTIC ROBOTIC GLOVE FOR TELE-EXPLORATION OF EXPLOSIVE DEVICES Gizem Derya Demir, İlayda Yankılıç, Dağlar Karamüftüoğlu, Dante J. Dorantes-González Department of Mechanical Engineering, MEF University Ayazağa Cad. No.4, 34396 Maslak, Sarıyer, İstanbul, Turkey Nowadays, terror attacks are, unfortunately, a more common threat around the world. Therefore, safety measures have become much more essential. An alternative to providing safety and saving human lives is done by robots, such as disassembling and liquidation of bombs. In this article, remote exploration and manipulation of potential explosive devices from a safe-distance are addressed by designing a novel, simple and ergonomic haptic robotic glove. SolidWorks® Computer-Aided Design, computerized dynamic simulation, and MATLAB® kinematic and static analysis were used for the haptic robotic glove and finger design. Angle controls of servo motors were made using ARDUINO® IDE codes on a Makeblock® MegaPi control card. Simple grasping dexterity solutions for the fingers were obtained using one linear soft and one angle sensors for each finger, and six servo motors are used in total to remotely control a slave multi-tooled robotic hand. This project is still undergoing and presents current results. Future research steps are also presented.Keywords: Dexterity, Exoskeleton, Haptics , Position Control, Robotic Hand , Teleoperation
Procedia PDF Downloads 17664 A Proposal to Tackle Security Challenges of Distributed Systems in the Healthcare Sector
Authors: Ang Chia Hong, Julian Khoo Xubin, Burra Venkata Durga Kumar
Abstract:
Distributed systems offer many benefits to the healthcare industry. From big data analysis to business intelligence, the increased computational power and efficiency from distributed systems serve as an invaluable resource in the healthcare sector to utilize. However, as the usage of these distributed systems increases, many issues arise. The main focus of this paper will be on security issues. Many security issues stem from distributed systems in the healthcare industry, particularly information security. The data of people is especially sensitive in the healthcare industry. If important information gets leaked (Eg. IC, credit card number, address, etc.), a person’s identity, financial status, and safety might get compromised. This results in the responsible organization losing a lot of money in compensating these people and even more resources expended trying to fix the fault. Therefore, a framework for a blockchain-based healthcare data management system for healthcare was proposed. In this framework, the usage of a blockchain network is explored to store the encryption key of the patient’s data. As for the actual data, it is encrypted and its encrypted data, called ciphertext, is stored in a cloud storage platform. Furthermore, there are some issues that have to be emphasized and tackled for future improvements, such as a multi-user scheme that could be proposed, authentication issues that have to be tackled or migrating the backend processes into the blockchain network. Due to the nature of blockchain technology, the data will be tamper-proof, and its read-only function can only be accessed by authorized users such as doctors and nurses. This guarantees the confidentiality and immutability of the patient’s data.Keywords: distributed, healthcare, efficiency, security, blockchain, confidentiality and immutability
Procedia PDF Downloads 18463 Coherent All-Fiber and Polarization Maintaining Source for CO2 Range-Resolved Differential Absorption Lidar
Authors: Erwan Negre, Ewan J. O'Connor, Juha Toivonen
Abstract:
The need for CO2 monitoring technologies grows simultaneously with the worldwide concerns regarding environmental challenges. To that purpose, we developed a compact coherent all-fiber ranged-resolved Differential Absorption Lidar (RR-DIAL). It has been designed along a tunable 2x1fiber optic switch set to a frequency of 1 Hz between two Distributed FeedBack (DFB) lasers emitting in the continuous-wave mode at 1571.41 nm (absorption line of CO2) and 1571.25 nm (CO2 absorption-free line), with linewidth and tuning range of respectively 1 MHz and 3 nm over operating wavelength. A three stages amplification through Erbium and Erbium-Ytterbium doped fibers coupled to a Radio Frequency (RF) driven Acousto-Optic Modulator (AOM) generates 100 ns pulses at a repetition rate from 10 to 30 kHz with a peak power up to 2.5 kW and a spatial resolution of 15 m, allowing fast and highly resolved CO2 profiles. The same afocal collection system is used for the output of the laser source and the backscattered light which is then directed to a circulator before being mixed with the local oscillator for heterodyne detection. Packaged in an easily transportable box which also includes a server and a Field Programmable Gate Array (FPGA) card for on-line data processing and storing, our setup allows an effective and quick deployment for versatile in-situ analysis, whether it be vertical atmospheric monitoring, large field mapping or sequestration site continuous oversight. Setup operation and results from initial field measurements will be discussed.Keywords: CO2 profiles, coherent DIAL, in-situ atmospheric sensing, near infrared fiber source
Procedia PDF Downloads 128