Search results for: paper based analytical device
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 44562

Search results for: paper based analytical device

43092 Dancing Calligraphy: An Aesthetic Study of Dancing Ink (2017)

Authors: Chingwen Yeh, Chang Ning Hung

Abstract:

This paper aims to analysis the aesthetic qualities of Dancing Ink (2017) performed by Miao-Hsuan Dance Group in Taiwan. The premiere was performed at Taichung Seaport Art Center Exhibition Hall Room A, in Taichung Taiwan on March 11th, 2017. What calligraphic elements were applied into the contemporary dance choreography was examed by these authors. Although calligraphy and dance are two different art forms, one can see in Dancing Ink that the beauty of Yin Yang force circling; the flow of Chi from inner meditation to the outer physical action are resonated in both art forms. The aesthetic experience was documented through qualitative research methods. In-depth interviews were conducted within a focus group including the calligrapher, the choreographer, the participated professional dancers and the appreciators. Subject matter, movement qualities, characteristic and meaning are the four main areas of interpretation originated from Janet Adshead’s dance analytical theory. Based on all the research data collection and analysis, this research found: 1) Making invisible spirituality visible in relations to creative process, 2) An artistic symbol that transforms from two-dimensional into three-dimensional generates a new aesthetic value, 3) Choreography and calligraphy require different artistic skills and disciplines but expressed the similar dynamic and rhythm in their movement.

Keywords: Chi, Dancing Ink, Miao Hsuan Dance Group, Yin Yang force

Procedia PDF Downloads 380
43091 Real-Time Mine Safety System with the Internet of Things

Authors: Şakir Bingöl, Bayram İslamoğlu, Ebubekir Furkan Tepeli, Fatih Mehmet Karakule, Fatih Küçük, Merve Sena Arpacık, Mustafa Taha Kabar, Muhammet Metin Molak, Osman Emre Turan, Ömer Faruk Yesir, Sıla İnanır

Abstract:

This study introduces an IoT-based real-time safety system for mining, addressing global safety challenges. The wearable device, seamlessly integrated into miners' jackets, employs LoRa technology for communication and offers real-time monitoring of vital health and environmental data. Unique features include an LCD panel for immediate information display and sound-based location tracking for emergency response. The methodology involves sensor integration, data transmission, and ethical testing. Validation confirms the system's effectiveness in diverse mining scenarios. The study calls for ongoing research to adapt the system to different mining contexts, emphasizing its potential to significantly enhance safety standards in the industry.

Keywords: mining safety, internet of things, wearable technology, LoRa, RFID tracking, real-time safety system, safety alerts, safety measures

Procedia PDF Downloads 38
43090 The AI Method and System for Analyzing Wound Status in Wound Care Nursing

Authors: Ho-Hsin Lee, Yue-Min Jiang, Shu-Hui Tsai, Jian-Ren Chen, Mei-Yu XU, Wen-Tien Wu

Abstract:

This project presents an AI-based method and system for wound status analysis. The system uses a three-in-one sensor device to analyze wound status, including color, temperature, and a 3D sensor to provide wound information up to 2mm below the surface, such as redness, heat, and blood circulation information. The system has a 90% accuracy rate, requiring only one manual correction in 70% of cases, with a one-second delay. The system also provides an offline application that allows for manual correction of the wound bed range using color-based guidance to estimate wound bed size with 96% accuracy and a maximum of one manual correction in 96% of cases, with a one-second delay. Additionally, AI-assisted wound bed range selection achieves 100% of cases without manual intervention, with an accuracy rate of 76%, while AI-based wound tissue type classification achieves an 85.3% accuracy rate for five categories. The AI system also includes similar case search and expert recommendation capabilities. For AI-assisted wound range selection, the system uses WIFI6 technology, increasing data transmission speeds by 22 times. The project aims to save up to 64% of the time required for human wound record keeping and reduce the estimated time to assess wound status by 96%, with an 80% accuracy rate. Overall, the proposed AI method and system integrate multiple sensors to provide accurate wound information and offer offline and online AI-assisted wound bed size estimation and wound tissue type classification. The system decreases delay time to one second, reduces the number of manual corrections required, saves time on wound record keeping, and increases data transmission speed, all of which have the potential to significantly improve wound care and management efficiency and accuracy.

Keywords: wound status analysis, AI-based system, multi-sensor integration, color-based guidance

Procedia PDF Downloads 91
43089 Refuge(e)s in Digital Diaspora: Reimagining and Reimaging ‘Ethnically Cleansed’ Villages as ‘Cyber Villages’

Authors: Hariz Halilovich

Abstract:

Based on conventional and digital ethnography, this paper discusses the ways Bosnian refugees utilise digital technologies and new media to recreate, synchronise and sustain their identities and memories in the aftermath of ‘ethnic cleansing’ and genocide and in the contexts of their new emplacements and home-making practices in diaspora. In addition to discussing representations of displacement and emplacement in the ‘digital age’, the paper also aims to make a contribution to the understanding and application of digital ethnography as an emerging method of inquiry in anthropology and related social science disciplines. While some researchers see digital ethnography as an exclusively online–based research, the author of this paper argues that it is critical to understand the online world in the context of the real world—made of real people, places, and social relations.

Keywords: Bosnia, cyber villages, digital diaspora, refugees

Procedia PDF Downloads 222
43088 A Probabilistic Study on Time to Cover Cracking Due to Corrosion

Authors: Chun-Qing Li, Hassan Baji, Wei Yang

Abstract:

Corrosion of steel in reinforced concrete structures is a major problem worldwide. The volume expansion of corrosion products causes concrete cover cracking, which could lead to delamination of concrete cover. The time to cover cracking plays a key role to the assessment of serviceability of reinforced concrete structures subjected to corrosion. Many analytical, numerical, and empirical models have been developed to predict the time to cracking initiation due to corrosion. In this study, a numerical model based on finite element modeling of corrosion-induced cracking process is used. In order to predict the service life based on time to cover initiation, the numerical approach is coupled with a probabilistic procedure. In this procedure, all the influential factors affecting time to cover cracking are modeled as random variables. The results show that the time to cover cracking is highly variables. It is also shown that rust product expansion ratio and the size of more porous concrete zone around the rebar are the most influential factors in predicting service life of corrosion-affected structures.

Keywords: corrosion, crack width, probabilistic, service life

Procedia PDF Downloads 194
43087 Mathematical Model for Defection between Two Political Parties

Authors: Abdullahi Mohammed Auwal

Abstract:

Formation and change or decamping from one political party to another have now become a common trend in Nigeria. Many of the parties’ members who could not secure positions and or win elections in their parties or are not very much satisfied with the trends occurring in the party’s internal democratic principles and mechanisms, change their respective parties. This paper developed/presented and analyzed the used of non linear mathematical model for defections between two political parties using epidemiological approach. The whole population was assumed to be a constant and homogeneously mixed. Equilibria have been analytically obtained and their local and global stability discussed. Conditions for the co-existence of both the political parties have been determined, in the study of defections between People Democratic Party (PDP) and All Progressive Congress (APC) in Nigeria using numerical simulations to support the analytical results.

Keywords: model, political parties, deffection, stability, equilibrium, epidemiology

Procedia PDF Downloads 612
43086 Pervasive Computing: Model to Increase Arable Crop Yield through Detection Intrusion System (IDS)

Authors: Idowu Olugbenga Adewumi, Foluke Iyabo Oluwatoyinbo

Abstract:

Presently, there are several discussions on the food security with increase in yield of arable crop throughout the world. This article, briefly present research efforts to create digital interfaces to nature, in particular to area of crop production in agriculture with increase in yield with interest on pervasive computing. The approach goes beyond the use of sensor networks for environmental monitoring but also by emphasizing the development of a system architecture that detect intruder (Intrusion Process) which reduce the yield of the farmer at the end of the planting/harvesting period. The objective of the work is to set a model for setting up the hand held or portable device for increasing the quality and quantity of arable crop. This process incorporates the use of infrared motion image sensor with security alarm system which can send a noise signal to intruder on the farm. This model of the portable image sensing device in monitoring or scaring human, rodent, birds and even pests activities will reduce post harvest loss which will increase the yield on farm. The nano intelligence technology was proposed to combat and minimize intrusion process that usually leads to low quality and quantity of produce from farm. Intranet system will be in place with wireless radio (WLAN), router, server, and client computer system or hand held device e.g PDAs or mobile phone. This approach enables the development of hybrid systems which will be effective as a security measure on farm. Since, precision agriculture has developed with the computerization of agricultural production systems and the networking of computerized control systems. In the intelligent plant production system of controlled greenhouses, information on plant responses, measured by sensors, is used to optimize the system. Further work must be carry out on modeling using pervasive computing environment to solve problems of agriculture, as the use of electronics in agriculture will attracts more youth involvement in the industry.

Keywords: pervasive computing, intrusion detection, precision agriculture, security, arable crop

Procedia PDF Downloads 385
43085 About the Interface Bonding Safety of Adhesively Bonded Concrete Joints Under Cracking: A Fracture Energetic Approach

Authors: Brandtner-Hafner Martin

Abstract:

Adhesives are increasingly being used in the construction sector. On the one hand, this concerns dowel reinforcements using chemical anchors. On the other hand, the sealing and repair of cracks in structural concrete components are still on the rise. In the field of bonding, the interface between the joined materials is the most critical area. Therefore, it is of immense importance to characterize and investigate this section sufficiently by fracture analysis. Since standardized mechanical test methods are not sufficiently capable of doing this, recourse is made to an innovative concept based on fracture energy. Therefore, a series of experimental tests were performed using the so-called GF-principle to study the interface bonding safety of adhesively bonded concrete joints. Several different structural adhesive systems based on epoxy, CA/A hybrid, PUR, MS polymer, dispersion, and acrylate were selected for bonding concrete substrates. The results show that stable crack propagation and prevention of uncontrolled failure in bonded concrete joints depend very much on the adhesive system used, and only fracture analytical evaluation methods can provide empirical information on this.

Keywords: interface bonding safety, adhesively bonded concrete joints, GF-principle, fracture analysis

Procedia PDF Downloads 290
43084 A Real Time Development Study for Automated Centralized Remote Monitoring System at Royal Belum Forest

Authors: Amri Yusoff, Shahrizuan Shafiril, Ashardi Abas, Norma Che Yusoff

Abstract:

Nowadays, illegal logging has been causing much effect to our forest. Some of it causes a flash flood, avalanche, global warming, and etc. This comprehensibly makes us wonder why, what, and who has made it happened. Often, it already has been too late after we have known the cause of it. Even the Malaysian Royal Belum forest has not been spared from land clearing or illegal activity by the natives although this area has been gazetted as a protected area preserved for future generations. Furthermore, because of its sizeable and wide area, these illegal activities are difficult to monitor and to maintain. A critical action must be called upon to prevent all of these unhealthy activities from recurrence. Therefore, a remote monitoring device must be developed in order to capture critical real-time data such as temperature, humidity, gaseous, fire, and rain detection which indicates the current and preserved natural state and habitat in the forest. Besides, this device location can be detected via GPS by showing the latitudes and longitudes of its current location and then to be transmitted by SMS via GSM system. All of its readings will be sent in real-time for data management and analysis. This result will be benefited to the monitoring bodies or relevant authority in keeping the forest in the natural habitat. Furthermore, this research is to gather a unified data and then will be analysed for its comparison with an existing method.

Keywords: remote monitoring system, forest data, GSM, GPS, wireless sensor

Procedia PDF Downloads 400
43083 Economic Characteristics of Bitcoin: "An Analytical Study"

Authors: Abdelhalem Shahen

Abstract:

The world is now experiencing a digital revolution and greatly accelerated technological developments, in addition to the transition from the economy in its traditional form to the digital economy, which has resulted in the emergence of new tools that are appropriate to those developments, and from this, this paper attempts to explore the economic characteristics of the bitcoin currency that circulated recently. Due to the many advantages that distinguish it from money in its traditional forms, which have a range of economic effects. The study found that Bitcoin is among the technological innovations, which contain a set of characteristics that are worth studying, those that make it the focus of attention, such as the digital currency, the peer-to-peer property, Lower and Faster Transaction Costs, transparency, decentralized control, privacy, and Double-Spending, as well as security and Cryptographic, and finally mining.

Keywords: Digital Economics, Digital Currencies, Bitcoin, Features of Bitcoin

Procedia PDF Downloads 119
43082 Sportband: An Idea for Workout Monitoring in Amateur and Recreational Sports

Authors: Kamila Mazur-Oleszczuk, Rafal Banasiuk, Dawid Krasnowski, Maciej Pek, Marcin Podgorski, Krzysztof Rykaczewski, Sabina Zoledowska, Dawid Nidzworski

Abstract:

Workout safety is one of the most significant challenges of recreational sports. Loss of water and electrolytes is a consequence of thermoregulatory sweating during exercise. The rate of sweat loss and its chemical composition can fluctuate within and among individuals. That is why we propose our sportband 'Flow' as a device for monitoring these parameters. 'Flow' consists of two parts: an intelligent module and a mobile application. The application allows verifying the training progress and data archiving. The sportband intelligent module includes temperature, heart rate and pulse measurement (non-invasive, continuous methods of workout monitoring). Apart from the standard components, the device will consist of a sweat composition analyzer situated in sportband intelligent module. Sweat is a water solution of numerous compounds such as ions (sodium up to 1609 µg/ml, potassium up to 274 µg/ml), lactic acid (skin pH is between 4.5 - 6) and a small amount of glucose. Awareness of sweat composition allows personalizing electrolyte intake after training. A comprehensive workout monitoring (sweat composition, heart rate, blood oxygen level) will provide improvement in the training routine and time management, which is our goal for the development of the sweat composition analyzer.

Keywords: flow, sportband, sweat, workout monitoring

Procedia PDF Downloads 134
43081 Arabic Quran Search Tool Based on Ontology

Authors: Mohammad Alqahtani, Eric Atwell

Abstract:

This paper reviews and classifies most of the important types of search techniques that have been applied on the holy Quran. Then, it addresses the limitations in these techniques. Additionally, this paper surveys most existing Quranic ontologies and what are their deficiencies. Finally, it explains a new search tool called: A semantic search tool for Al Quran based on Qur’anic ontologies. This tool will overcome all limitations in the existing Quranic search applications.

Keywords: holy Quran, natural language processing (NLP), semantic search, information retrieval (IR), ontology

Procedia PDF Downloads 552
43080 Design of Orientation-Free Handler and Fuzzy Controller for Wire-Driven Heavy Object Lifting System

Authors: Bo-Wei Song, Yun-Jung Lee

Abstract:

This paper presents an intention interface and controller for a wire-driven heavy object lifting system that assists the operator with moving a heavy object. The handler is designed to allow a comfortable working posture for the operator. Plus, as a human assistive system, the operator is involved in the control loop, where a fuzzy control system is used to consider the human control characteristics. The effectiveness and performance of the proposed system are proved by experiments.

Keywords: fuzzy controller, handler design, heavy object lifting system, human-assistive device, human-in-the-loop system

Procedia PDF Downloads 498
43079 Optimal Design of Submersible Permanent Magnet Linear Synchronous Motor Based Design of Experiment and Genetic Algorithm

Authors: Xiao Zhang, Wensheng Xiao, Junguo Cui, Hongmin Wang

Abstract:

Submersible permanent magnet linear synchronous motors (SPMLSMs) are electromagnetic devices, which can directly drive plunger pump to obtain the crude oil. Those motors have been gradually applied in oil fields due to high thrust force density and high efficiency. Since the force performance closely depends on the concrete structural parameters, the seven different structural parameters are investigated in detail. This paper presents an optimum design of an SPMLSM to minimize the detent force and maximize the thrust by using design of experiment (DOE) and genetic algorithm (GA). The three significant structural parameters (air-gap length, slot width, pole-arc coefficient) are separately screened using 27 1/16 fractional factorial design (FFD) to investigate the significant effect of seven parameters used in this research on the force performance. Response surface methodology (RSM) is well adapted to make analytical model of thrust and detent force with constraints of corresponding significant parameters and enable objective function to be easily created, respectively. GA is performed as a searching tool to search for the Pareto-optimal solutions. By finite element analysis, the proposed PMLSM shows merits in improving thrust and reducing the detent force dramatically.

Keywords: optimization, force performance, design of experiment (DOE), genetic algorithm (GA)

Procedia PDF Downloads 275
43078 Aspects Regarding the Structural Behaviour of Autonomous Underwater Vehicle for Emergency Response

Authors: Lucian Stefanita Grigore, Damian Gorgoteanu, Cristian Molder, Amado Stefan, Daniel Constantin

Abstract:

The purpose of this article is to present an analytical-numerical study on the structural behavior of a sunken autonomous underwater vehicle (AUV) for emergency intervention. The need for such a study was generated by the key objective of the ERL-Emergency project. The project aims to develop a system of collaborative robots for emergency response. The system consists of two robots: unmanned ground vehicles (UGV) on tracks and the second is an AUV. The system of collaborative robots, AUV and UGV, will be used to perform missions of monitoring, intervention, and rescue. The main mission of the AUV is to dive into the maritime space of an industrial port to detect possible leaks in a pipeline transporting petroleum products. Another mission is to close and open the valves with which the pipes are provided. Finally, you will need to be able to lift a manikin to the surface, which you can take to land. Numerical analysis was performed by the finite element method (FEM). The conditions for immersing the AUV at 100 m depth were simulated, and the calculations for different fluid flow rates were repeated. From a structural point of view, the stiffening areas and the enclosures in which the command-and-control elements and the accumulators are located have been especially analyzed. The conclusion of this research is that the AUV meets very well the established requirements.

Keywords: analytical-numerical, emergency, FEM, robotics, underwater

Procedia PDF Downloads 138
43077 A Prediction Method of Pollutants Distribution Pattern: Flare Motion Using Computational Fluid Dynamics (CFD) Fluent Model with Weather Research Forecast Input Model during Transition Season

Authors: Benedictus Asriparusa, Lathifah Al Hakimi, Aulia Husada

Abstract:

A large amount of energy is being wasted by the release of natural gas associated with the oil industry. This release interrupts the environment particularly atmosphere layer condition globally which contributes to global warming impact. This research presents an overview of the methods employed by researchers in PT. Chevron Pacific Indonesia in the Minas area to determine a new prediction method of measuring and reducing gas flaring and its emission. The method emphasizes advanced research which involved analytical studies, numerical studies, modeling, and computer simulations, amongst other techniques. A flaring system is the controlled burning of natural gas in the course of routine oil and gas production operations. This burning occurs at the end of a flare stack or boom. The combustion process releases emissions of greenhouse gases such as NO2, CO2, SO2, etc. This condition will affect the chemical composition of air and environment around the boundary layer mainly during transition season. Transition season in Indonesia is absolutely very difficult condition to predict its pattern caused by the difference of two air mass conditions. This paper research focused on transition season in 2013. A simulation to create the new pattern of the pollutants distribution is needed. This paper has outlines trends in gas flaring modeling and current developments to predict the dominant variables in the pollutants distribution. A Fluent model is used to simulate the distribution of pollutants gas coming out of the stack, whereas WRF model output is used to overcome the limitations of the analysis of meteorological data and atmospheric conditions in the study area. Based on the running model, the most influence factor was wind speed. The goal of the simulation is to predict the new pattern based on the time of fastest wind and slowest wind occurs for pollutants distribution. According to the simulation results, it can be seen that the fastest wind (last of March) moves pollutants in a horizontal direction and the slowest wind (middle of May) moves pollutants vertically. Besides, the design of flare stack in compliance according to EPA Oil and Gas Facility Stack Parameters likely shows pollutants concentration remains on the under threshold NAAQS (National Ambient Air Quality Standards).

Keywords: flare motion, new prediction, pollutants distribution, transition season, WRF model

Procedia PDF Downloads 527
43076 A Test Methodology to Measure the Open-Loop Voltage Gain of an Operational Amplifier

Authors: Maninder Kaur Gill, Alpana Agarwal

Abstract:

It is practically not feasible to measure the open-loop voltage gain of the operational amplifier in the open loop configuration. It is because the open-loop voltage gain of the operational amplifier is very large. In order to avoid the saturation of the output voltage, a very small input should be given to operational amplifier which is not possible to be measured practically by a digital multimeter. A test circuit for measurement of open loop voltage gain of an operational amplifier has been proposed and verified using simulation tools as well as by experimental methods on breadboard. The main advantage of this test circuit is that it is simple, fast, accurate, cost effective, and easy to handle even on a breadboard. The test circuit requires only the device under test (DUT) along with resistors. This circuit has been tested for measurement of open loop voltage gain for different operational amplifiers. The underlying goal is to design testable circuits for various analog devices that are simple to realize in VLSI systems, giving accurate results and without changing the characteristics of the original system. The DUTs used are LM741CN and UA741CP. For LM741CN, the simulated gain and experimentally measured gain (average) are calculated as 89.71 dB and 87.71 dB, respectively. For UA741CP, the simulated gain and experimentally measured gain (average) are calculated as 101.15 dB and 105.15 dB, respectively. These values are found to be close to the datasheet values.

Keywords: Device Under Test (DUT), open loop voltage gain, operational amplifier, test circuit

Procedia PDF Downloads 428
43075 Terrorism: Definition, History and Different Approaches in the Analysis of Terrorism Phenomenon

Authors: Shabnam Dadparvar, Laijin Shen, Farzad Ravanbod

Abstract:

Nowadays, the political phenomenon of terrorism is considered as an effective factor on political, social, and economic changes. It has replaced the recognized political phenomena such as revolutions, wars (total war among two or more political units with distinct identities in the form of national states), coups d’état, insurgencies and etc. and has challenged political life in all its levels (sub national, national, and international political groups). In this paper by using descriptive-analytical method, the authors try to explain the spread of this political phenomenon across the world, its definition and types, also analyze different approaches to understand it. The authors believe that the Logical-Rational approach is the best way to explain and understand this phenomenon.

Keywords: logical approach, psychological- social approach, religious approach, terrorism

Procedia PDF Downloads 314
43074 Application of WebGIS-Based Water Environment Capacity Inquiry and Planning System in Water Resources Management

Authors: Tao Ding, Danjia Yan, Jinye Li, Chao Ren, Xinhua Hu

Abstract:

The paper based on the research background of the current situation of water shortage in China and intelligent management of water resources in the information era. And the paper adopts WebGIS technology, combining the mathematical model of water resources management to develop a WebGIS-based water environment capacity inquiry and polluted water emission planning. The research significance of the paper is that it can inquiry the water environment capacity of Jinhua City in real time and plan how to drain polluted water into the river, so as to realize the effective management of water resources. This system makes sewage planning more convenient and faster. For the planning of the discharge enterprise, the decision on the optimal location of the sewage outlet can be achieved through calculation of the Sewage discharge planning model in the river, without the need for site visits. The system can achieve effective management of water resources and has great application value.

Keywords: sewerage planning, water environment capacity, water resources management, WebGIS

Procedia PDF Downloads 162
43073 RAPDAC: Role Centric Attribute Based Policy Driven Access Control Model

Authors: Jamil Ahmed

Abstract:

Access control models aim to decide whether a user should be denied or granted access to the user‟s requested activity. Various access control models have been established and proposed. The most prominent of these models include role-based, attribute-based, policy based access control models as well as role-centric attribute based access control model. In this paper, a novel access control model is presented called “Role centric Attribute based Policy Driven Access Control (RAPDAC) model”. RAPDAC incorporates the concept of “policy” in the “role centric attribute based access control model”. It leverages the concept of "policy‟ by precisely combining the evaluation of conditions, attributes, permissions and roles in order to allow authorization access. This approach allows capturing the "access control policy‟ of a real time application in a well defined manner. RAPDAC model allows making access decision at much finer granularity as illustrated by the case study of a real time library information system.

Keywords: authorization, access control model, role based access control, attribute based access control

Procedia PDF Downloads 138
43072 Optimal Feature Extraction Dimension in Finger Vein Recognition Using Kernel Principal Component Analysis

Authors: Amir Hajian, Sepehr Damavandinejadmonfared

Abstract:

In this paper the issue of dimensionality reduction is investigated in finger vein recognition systems using kernel Principal Component Analysis (KPCA). One aspect of KPCA is to find the most appropriate kernel function on finger vein recognition as there are several kernel functions which can be used within PCA-based algorithms. In this paper, however, another side of PCA-based algorithms -particularly KPCA- is investigated. The aspect of dimension of feature vector in PCA-based algorithms is of importance especially when it comes to the real-world applications and usage of such algorithms. It means that a fixed dimension of feature vector has to be set to reduce the dimension of the input and output data and extract the features from them. Then a classifier is performed to classify the data and make the final decision. We analyze KPCA (Polynomial, Gaussian, and Laplacian) in details in this paper and investigate the optimal feature extraction dimension in finger vein recognition using KPCA.

Keywords: biometrics, finger vein recognition, principal component analysis (PCA), kernel principal component analysis (KPCA)

Procedia PDF Downloads 347
43071 Embedded Electrochemistry with Miniaturized, Drone-Based, Potentiostat System for Remote Detection Chemical Warfare Agents

Authors: Amer Dawoud, Jesy Motchaalangaram, Arati Biswakarma, Wujan Mio, Karl Wallace

Abstract:

The development of an embedded miniaturized drone-based system for remote detection of Chemical Warfare Agents (CWA) is proposed. The paper focuses on the software/hardware system design of the electrochemical Cyclic Voltammetry (CV) and Differential Pulse Voltammetry (DPV) signal processing for future deployment on drones. The paper summarizes the progress made towards hardware and electrochemical signal processing for signature detection of CWA. Also, the miniature potentiostat signal is validated by comparing it with the high-end lab potentiostat signal.

Keywords: drone-based, remote detection chemical warfare agents, miniaturized, potentiostat

Procedia PDF Downloads 115
43070 Factors Underlying the Digital Divide for Disabled People: Focus on a Korean Case Study

Authors: Soungwan Kim

Abstract:

This study identifies factors underlying the digital divide that is faced by the disabled. The results of its analysis showed that the digital divide in PC use is affected by age, number of years of education, employment status, and household income of more than KRW 3 million. The digital divide in smart device use is affected by sex, age, number of years of education, time when disability struck, and household income of more than KRW 3 million. Based on these results, this study proposes methods for bridging the digital divide faced by the disabled.

Keywords: digital divide, digital divide for the disabled, information accessibility for PCs and smart devices, information accessibility

Procedia PDF Downloads 242
43069 An Overview of Evaluations Using Augmented Reality for Assembly Training Tasks

Authors: S. Werrlich, E. Eichstetter, K. Nitsche, G. Notni

Abstract:

Augmented Reality (AR) is a strong growing research topic in different training domains such as medicine, sports, military, education and industrial use cases like assembly and maintenance tasks. AR claims to improve the efficiency and skill-transfer of training tasks. This paper gives a comprehensive overview of evaluations using AR for assembly and maintenance training tasks published between 1992 and 2017. We search in a structured way in four different online databases and get 862 results. We select 17 relevant articles focusing on evaluating AR-based training applications for assembly and maintenance tasks. This paper also indicates design guidelines which are necessary for creating a successful application for an AR-based training. We also present five scientific limitations in the field of AR-based training for assembly tasks. Finally, we show our approach to solve current research problems using Design Science Research (DSR).

Keywords: assembly, augmented reality, survey, training

Procedia PDF Downloads 254
43068 Distracted Driving among Young Drivers in Qatar

Authors: Khaled Shaaban

Abstract:

Distracted driving, which includes anything that distracts a driver from the main task of driving, is one of the main causes of traffic accidents in modern societies. The objective of this research was to understand the type of activities that young drivers perform while driving in Qatar and to identify which activities cause the most distraction to the driver based on their experience. The data was collected through administered questionnaires in the city of Doha, Qatar. According to the participants, the majority reported that they use their cell phone all the time or occasionally while driving. Other significantly cited activities while driving included listening to music or radio, talking with passengers, and eating, drinking or smoking. When asked about the activities that distract the driver, using cell phone was listed as the most distracting activity followed by mental activities and adjusting GPS and audio device vehicle.

Keywords: driver distraction, young drivers, cell phone use, Qatar

Procedia PDF Downloads 475
43067 Experimental and Analytical Study of Various Types of Shear Connector Used for Cold-Formed Steel-Ferrocement Composite Beam

Authors: Talal Alhajri, Mahmood M. Tahir, Khaled Alenezi, Mohamad Ragaee

Abstract:

This work presents the experimental tests carried out to evaluate the behaviour of different types of shear connectors proposed for cold formed steel (CFS) section integrated with ferrocement slab as potential used for composite beam. Ten push-out test specimens of cold-formed steel lipped channel sections connected with ferrocement slab were tested. Three types of shear connectors were studied comprised of bolts, self-drilling-screw and bar angle. The connection behavior is analysed in terms of its load-slip relationship and the failure mode. The parametric studies were performed to investigate the effect on the shear connector’s capacity by varying the number of layers of wire mesh used in ferrocement slab and types of shear connector used. An analytical analysis using ANSYS program and theoretical analysis (Eurocode 4) were carried out to verify the experiment results. The results show that the experimental, theoretical, and numerical values proved to have good agreement with each other.

Keywords: cold-formed steel, composite beam, ferrocement, finite element method, push-out test, shear connector

Procedia PDF Downloads 343
43066 Efficacy and Safety of Electrical Vestibular Stimulation on Adults with Symptoms of Insomnia: A Double-Blind, Randomized, Sham-Controlled Trial

Authors: Teris Cheung, Joyce Yuen Ting Lam, Kwan Hin Fong, Calvin Pak-Wing Cheng, Julie Sittlington, Yu-Tao Xiang, Tim Man Ho Li

Abstract:

Insomnia is one of the most common health problems in the general population. Insomnia can be acute, intermittent, and become chronic, often due to comorbidity with other physical and mental health conditions. Although there are conventional pharmaceutical and psychotherapeutic treatments to treat symptoms of insomnia, however; there is no robust and novel randomized controlled trial (RCT) using transdermal neurostimulation on individuals with insomnia symptoms. This gives us the impetus to execute the first nationwide RCT. Aim: To evaluate the efficacy of Electrical Vestibular Stimulation (VeNS) on individuals with insomnia in Hong Kong. Design: This study was a two-armed, double blinded, randomized, sham-controlled trial. Sampling: 60 community-dwelling adults aged 18 and 60 years with moderate insomnia symptoms or above (Insomnia Severity Index > 14) were recruited. All subjects were computerized randomized into either the active VeNS group or the sham VeNS group on a 1:1 ratio. Intervention: All participants received a home-use VeNS device and used 30-min VeNS sessions during five consecutive days across a 4-week period (total treatment hours: 10). Baseline measurements and post-VeNS evaluation of the psychological outcomes, including 1) insomnia severity, 2) sleep quality, and 3) quality of life were investigated. The short-and long-term sustainability of the VeNS intervention was assessed immediately after poststim and at a 1-month and 3-month follow-up period. Data analysis: A mixed GEE model was used to analyze the repeated measures data. Missing data were managed by multiple imputations. The level of significance was set to p < 0.05. Significance of the study: This is the first trial to examine the efficacy and safety of VeNS among adults with insomnia symptoms in Hong Kong. Findings that emerged were used to determine whether this VeNS device can be considered a self-help technological device to reduce the severity of insomnia in the community setting and to reduce the global disease burden. Clinical Trial Registration: ClinicalTrials.gov, identifier: NCT04452981.

Keywords: adults, insomnia, neuromodulation, rct, vestibular stimulation

Procedia PDF Downloads 59
43065 Spectrophotometric Determination of 5-Aminosalicylic Acid in Pharmaceutical Samples

Authors: Chand Pasha

Abstract:

A Simple, accurate and precise spectrophotometric method for the quantitative analysis of determination of 5-aminosalicylic acid is described. This method is based on the reaction of 5-aminosalicylic acid with nitrite in acid medium to form diazonium ion, which is coupled with acetylacetone in basic medium to form azo dyes, which shows absorption maxima at 470 nm. The method obeys Beer’s law in the concentration range of 0.5-11.2 gml-1 of 5-aminosalicylic acid with acetylacetone. The molar absorptivity and Sandell’s sensitivity of 5-aminosalicylic acid -acetylacetone azo dye is 2.672 ×104 lmol-1cm-1, 5.731 × 10-3 gcm-2 respectively. The dye formed is stable for 10 hrs. The optimum reaction conditions and other analytical parameters are evaluated. Interference due to foreign organic compounds have been investigated. The method has been successfully applied to the determination of 5-aminosalicylic acid in pharmaceutical samples.

Keywords: spectrophotometry, diazotization, mesalazine, nitrite, acetylacetone

Procedia PDF Downloads 171
43064 Combination between Intrusion Systems and Honeypots

Authors: Majed Sanan, Mohammad Rammal, Wassim Rammal

Abstract:

Today, security is a major concern. Intrusion Detection, Prevention Systems and Honeypot can be used to moderate attacks. Many researchers have proposed to use many IDSs ((Intrusion Detection System) time to time. Some of these IDS’s combine their features of two or more IDSs which are called Hybrid Intrusion Detection Systems. Most of the researchers combine the features of Signature based detection methodology and Anomaly based detection methodology. For a signature based IDS, if an attacker attacks slowly and in organized way, the attack may go undetected through the IDS, as signatures include factors based on duration of the events but the actions of attacker do not match. Sometimes, for an unknown attack there is no signature updated or an attacker attack in the mean time when the database is updating. Thus, signature-based IDS fail to detect unknown attacks. Anomaly based IDS suffer from many false-positive readings. So there is a need to hybridize those IDS which can overcome the shortcomings of each other. In this paper we propose a new approach to IDS (Intrusion Detection System) which is more efficient than the traditional IDS (Intrusion Detection System). The IDS is based on Honeypot Technology and Anomaly based Detection Methodology. We have designed Architecture for the IDS in a packet tracer and then implemented it in real time. We have discussed experimental results performed: both the Honeypot and Anomaly based IDS have some shortcomings but if we hybridized these two technologies, the newly proposed Hybrid Intrusion Detection System (HIDS) is capable enough to overcome these shortcomings with much enhanced performance. In this paper, we present a modified Hybrid Intrusion Detection System (HIDS) that combines the positive features of two different detection methodologies - Honeypot methodology and anomaly based intrusion detection methodology. In the experiment, we ran both the Intrusion Detection System individually first and then together and recorded the data from time to time. From the data we can conclude that the resulting IDS are much better in detecting intrusions from the existing IDSs.

Keywords: security, intrusion detection, intrusion prevention, honeypot, anomaly-based detection, signature-based detection, cloud computing, kfsensor

Procedia PDF Downloads 359
43063 Shear Buckling of a Large Pultruded Composite I-Section under Asymmetric Loading

Authors: Jin Y. Park, Jeong Wan Lee

Abstract:

An experimental and analytical research on shear buckling of a comparably large polymer composite I-section is presented. It is known that shear buckling load of a large span composite beam is difficult to determine experimentally. In order to sensitively detect shear buckling of the tested I-section, twenty strain rosettes and eight displacement sensors were applied and attached on the web and flange surfaces. The tested specimen was a pultruded composite beam made of vinylester resin, E-glass, carbon fibers and micro-fillers. Various coupon tests were performed before the shear buckling test to obtain fundamental material properties of the I-section. An asymmetric four-point bending loading scheme was utilized for the shear test. The loading scheme resulted a high shear and almost zeros moment condition at the center of the web panel. The shear buckling load was successfully determined after analyzing the obtained test data from strain rosettes and displacement sensors. An analytical approach was also performed to verify the experimental results and to support the discussed experimental program.

Keywords: strain sensor, displacement sensor, shear buckling, polymer composite I-section, asymmetric loading

Procedia PDF Downloads 432