Search results for: precision application
7614 Protocol for Dynamic Load Distributed Low Latency Web-Based Augmented Reality and Virtual Reality
Authors: Rohit T. P., Sahil Athrij, Sasi Gopalan
Abstract:
Currently, the content entertainment industry is dominated by mobile devices. As the trends slowly shift towards Augmented/Virtual Reality applications the computational demands on these devices are increasing exponentially and we are already reaching the limits of hardware optimizations. This paper proposes a software solution to this problem. By leveraging the capabilities of cloud computing we can offload the work from mobile devices to dedicated rendering servers that are way more powerful. But this introduces the problem of latency. This paper introduces a protocol that can achieve high-performance low latency Augmented/Virtual Reality experience. There are two parts to the protocol, 1) In-flight compression The main cause of latency in the system is the time required to transmit the camera frame from client to server. The round trip time is directly proportional to the amount of data transmitted. This can therefore be reduced by compressing the frames before sending. Using some standard compression algorithms like JPEG can result in minor size reduction only. Since the images to be compressed are consecutive camera frames there won't be a lot of changes between two consecutive images. So inter-frame compression is preferred. Inter-frame compression can be implemented efficiently using WebGL but the implementation of WebGL limits the precision of floating point numbers to 16bit in most devices. This can introduce noise to the image due to rounding errors, which will add up eventually. This can be solved using an improved interframe compression algorithm. The algorithm detects changes between frames and reuses unchanged pixels from the previous frame. This eliminates the need for floating point subtraction thereby cutting down on noise. The change detection is also improved drastically by taking the weighted average difference of pixels instead of the absolute difference. The kernel weights for this comparison can be fine-tuned to match the type of image to be compressed. 2) Dynamic Load distribution Conventional cloud computing architectures work by offloading as much work as possible to the servers, but this approach can cause a hit on bandwidth and server costs. The most optimal solution is obtained when the device utilizes 100% of its resources and the rest is done by the server. The protocol balances the load between the server and the client by doing a fraction of the computing on the device depending on the power of the device and network conditions. The protocol will be responsible for dynamically partitioning the tasks. Special flags will be used to communicate the workload fraction between the client and the server and will be updated in a constant interval of time ( or frames ). The whole of the protocol is designed so that it can be client agnostic. Flags are available to the client for resetting the frame, indicating latency, switching mode, etc. The server can react to client-side changes on the fly and adapt accordingly by switching to different pipelines. The server is designed to effectively spread the load and thereby scale horizontally. This is achieved by isolating client connections into different processes.Keywords: 2D kernelling, augmented reality, cloud computing, dynamic load distribution, immersive experience, mobile computing, motion tracking, protocols, real-time systems, web-based augmented reality application
Procedia PDF Downloads 777613 Application of Data Mining Techniques for Tourism Knowledge Discovery
Authors: Teklu Urgessa, Wookjae Maeng, Joong Seek Lee
Abstract:
Application of five implementations of three data mining classification techniques was experimented for extracting important insights from tourism data. The aim was to find out the best performing algorithm among the compared ones for tourism knowledge discovery. Knowledge discovery process from data was used as a process model. 10-fold cross validation method is used for testing purpose. Various data preprocessing activities were performed to get the final dataset for model building. Classification models of the selected algorithms were built with different scenarios on the preprocessed dataset. The outperformed algorithm tourism dataset was Random Forest (76%) before applying information gain based attribute selection and J48 (C4.5) (75%) after selection of top relevant attributes to the class (target) attribute. In terms of time for model building, attribute selection improves the efficiency of all algorithms. Artificial Neural Network (multilayer perceptron) showed the highest improvement (90%). The rules extracted from the decision tree model are presented, which showed intricate, non-trivial knowledge/insight that would otherwise not be discovered by simple statistical analysis with mediocre accuracy of the machine using classification algorithms.Keywords: classification algorithms, data mining, knowledge discovery, tourism
Procedia PDF Downloads 2977612 Applications of Engineering Geology in Hydro Power Tunnel Projects in Himalayan Geological Regime
Authors: Rameh Chauhan
Abstract:
Tunnel construction in Himalayan rock is a challenging task due to fragile nature of the strata. Tunnel excavation carried out from lower Himalayas to high Himalayas in different metamorphic rock. Therefore application of engineering geology plays a vital role during various stage of the tunneling projects. Engineering geology is defined as application of geology to construction of civil structures through engineering practice. It is applied to the design, construction and performance aspects of engineering structure on the surface or sub-surface like dam, underground and surface power house, cut slopes, tunnels and underground storage cavern for nuclear material. But this paper emphasized mostly on underground structures like big caverns of Power house, desilting chambers, and tunnels of various sizes. Construction of these structures in the fragile rock conditions of Himalayan geology from Western Himalayas to Eastern Himalayas necessitated the application of the engineering geology on the micro-scale base for the stability, performance, and longevity of the civil structures. Number of hydropower projects have been constructed, some of them are under construction and under investigation stage. These projects are located in various parts of Himalayas under various seismic-tectonic zones. Tunneling works are involved in these projects. This paper represents the various engineering geological practices adopted in investigation and construction stage of various projects based on experiences gained during past construction histories in Himalayan geology of young mountains in very fragile geological conditions. Highlighting and sharing of use of these techniques on various platforms will definitely enhance the knowledge for carrying out the construction of various projects for the development of society. Construction of the tunnels, surface, and sub-surface caverns, dams, highway, metro, highway tunnels are all based on engineering geological parameters in combinations with other engineering considerations.Keywords: cavern-power house, desilting chambers and tunnels, seismic-tectonic-zones, earthquake-prone zones based on intensities
Procedia PDF Downloads 2247611 Financial Assessment of the Hard Coal Mining in the Chosen Region in the Czech Republic: Real Options Methodology Application
Authors: Miroslav Čulík, Petr Gurný
Abstract:
This paper is aimed at the financial assessment of the hard coal mining in a given region by real option methodology application. Hard coal mining in this mine makes net loss for the owner during the last years due to the long-term unfavourable mining conditions and significant drop in the coal prices during the last years. Management is going to shut down the operation and abandon the project to reduce the loss of the company. The goal is to assess whether the shutting down the operation is the only and correct solution of the problem. Due to the uncertainty in the future hard coal price evolution, the production might be again restarted if the price raises enough to cover the cost of the production. For the assessment, real option methodology is applied, which captures two important aspect of the financial decision-making: risk and flexibility. The paper is structured as follows: first, current state is described and problem is analysed. Next, methodology of real options is described. At last, project is evaluated by applying real option methodology. The results are commented and recommendations are provided.Keywords: real option, investment, option to abandon, option to shut down and restart, risk, flexibility
Procedia PDF Downloads 5497610 Intelligent Rainwater Reuse System for Irrigation
Authors: Maria M. S. Pires, Andre F. X. Gloria, Pedro J. A. Sebastiao
Abstract:
The technological advances in the area of Internet of Things have been creating more and more solutions in the area of agriculture. These solutions are quite important for life, as they lead to the saving of the most precious resource, water, being this need to save water a concern worldwide. The paper proposes the creation of an Internet of Things system based on a network of sensors and interconnected actuators that automatically monitors the quality of the rainwater that is stored inside a tank in order to be used for irrigation. The main objective is to promote sustainability by reusing rainwater for irrigation systems instead of water that is usually available for other functions, such as other productions or even domestic tasks. A mobile application was developed for Android so that the user can control and monitor his system in real time. In the application, it is possible to visualize the data that translate the quality of the water inserted in the tank, as well as perform some actions on the implemented actuators, such as start/stop the irrigation system and pour the water in case of poor water quality. The implemented system translates a simple solution with a high level of efficiency and tests and results obtained within the possible environment.Keywords: internet of things, irrigation system, wireless sensor and actuator network, ESP32, sustainability, water reuse, water efficiency
Procedia PDF Downloads 1527609 An Informative Marketing Platform: Methodology and Architecture
Authors: Martina Marinelli, Samanta Vellante, Francesco Pilotti, Daniele Di Valerio, Gaetanino Paolone
Abstract:
Any development in web marketing technology requires changes in information engineering to identify instruments and techniques suitable for the production of software applications for informative marketing. Moreover, for large web solutions, designing an interface that enables human interactions is a complex process that must bridge between informative marketing requirements and the developed solution. A user-friendly interface in web marketing applications is crucial for a successful business. The paper introduces mkInfo - a software platform that implements informative marketing. Informative marketing is a new interpretation of marketing which places the information at the center of every marketing action. The creative team includes software engineering researchers who have recently authored an article on automatic code generation. The authors have created the mkInfo software platform to generate informative marketing web applications. For each web application, it is possible to automatically implement an opt in page, a landing page, a sales page, and a thank you page: one only needs to insert the content. mkInfo implements an autoresponder to send mail according to a predetermined schedule. The mkInfo platform also includes e-commerce for a product or service. The stakeholder can access any opt-in page and get basic information about a product or service. If he wants to know more, he will need to provide an e-mail address to access a landing page that will generate an e-mail sequence. It will provide him with complete information about the product or the service. From this point on, the stakeholder becomes a user and is now able to purchase the product or related services through the mkInfo platform. This paper suggests a possible definition for Informative Marketing, illustrates its basic principles, and finally details the mkInfo platform that implements it. This paper also offers some Informative Marketing models, which are implemented in the mkInfo platform. Informative marketing can be applied to products or services. It is necessary to realize a web application for each product or service. The mkInfo platform enables the product or the service producer to send information concerning a specific product or service to all stakeholders. In conclusion, the technical contributions of this paper are: a different interpretation of marketing based on information; a modular architecture for web applications, particularly for one with standard features such as information storage, exchange, and delivery; multiple models to implement informative marketing; a software platform enabling the implementation of such models in a web application. Future research aims to enable stakeholders to provide information about a product or a service so that the information gathered about a product or a service includes both the producer’s and the stakeholders' point of view. The purpose is to create an all-inclusive management system of the knowledge regarding a specific product or service: a system that includes everything about the product or service and is able to address even unexpected questions.Keywords: informative marketing, opt in page, software platform, web application
Procedia PDF Downloads 1307608 Research of Control System for Space Intelligent Robot Based on Vision Servo
Authors: Changchun Liang, Xiaodong Zhang, Xin Liu, Pengfei Sun
Abstract:
Space intelligent robotic systems are expected to play an increasingly important role in the future. The robotic on-orbital service, whose key is the tracking and capturing technology, becomes research hot in recent years. In this paper, the authors propose a vision servo control system for target capturing. Robotic manipulator will be an intelligent robotic system with large-scale movement, functional agility, and autonomous ability, and it can be operated by astronauts in the space station or be controlled by the ground operator in the remote operation mode. To realize the autonomous movement and capture mission of SRM, a kind of autonomous programming strategy based on multi-camera vision fusion is designed and the selection principle of object visual position and orientation measurement information is defined for the better precision. Distributed control system hierarchy is designed and reliability is considering to guarantee the abilities of control system. At last, a ground experiment system is set up based on the concept of robotic control system. With that, the autonomous target capturing experiments are conducted. The experiment results validate the proposed algorithm, and demonstrates that the control system can fulfill the needs of function, real-time and reliability.Keywords: control system, on-orbital service, space robot, vision servo
Procedia PDF Downloads 4207607 Harnessing Microorganism Having Potential for Biotreatment of Wastewater
Authors: Haruna Saidu, Sulaiman Mohammed, Abdulkarim Ali Deba, Shaza Eva Mohamad
Abstract:
Determining the diversity of the indigenous microorganisms in Palm Oil Mill Effluent (POME) could allow their wider application for the treatment of recalcitrant agro-based wastewater discharge into the environment. Many research studies mainly determined the efficiency of microorganism or their co-cultivation with microalgae for enhanced treatment of wastewater, suggesting a limited emphasis on the application of microbial diversity. In this study, the microorganism was cultured in POME for a period of 15 days using microalgae as a source of carbon. Pyrosequencing analysis reveals a diversity of microbial community in 20% (v/v) culture than the control experiment. Most of the bacterial species identified in POME belong to the families of Bacillaceae, Paenibacillaceae, Enterococcaceae, Clostridiaceae, Peptostreptococcaceae, Caulobacteraceae, Enterobacteriaceae, Moraxellaceae, and Pseudomonadaceae. Alpha (α) diversity analysis reveals the high composition of the microbial community of 52 in both samples. Beta (β) diversity index indicated the occurrence of similar species of microorganisms in unweighted uni fra than the weighted uni fra of both samples. It is therefore suggested that bacteria found in these families could have a potential for synergistic treatment of high-strength wastewater generated from the palm oil industry.Keywords: diversity, microorganism, wastewater, pyrosequencing, palm oil mill effluent
Procedia PDF Downloads 417606 Design and Development of an Application for the Evaluation of Personal Injury and Disability in Occupational and Forensic Medicine
Authors: Daniel Suárez, Jesús Tomas, Sandra Sendra, Sandra Viciano-Tudela, Luis Felipe Calle, Javier Urios, Jaime Lloret
Abstract:
Our study is to develop a tool for the mobile phone to an assessment of body damage or determination of the degree of disability. This is a field of action of legal medicine and insurance with obvious economic implications. Those people who have suffered an accident or bodily harm demand a quantification of it. The assessment of bodily harm or disability by the expert medical professional is not exempt from complexity. Sometimes it is difficult to quantify pain; other times, the doctor faces simulators or exaggerators, and on many occasions, it is difficult to remember the extensive tables of scales whose details are complex to remember and apply. We present a tool, as a mobile application, that allows entering the sociodemographic date of the patient as well as the characteristics of the accident suffered by the person. With these preliminary data and introducing bodily damage, an approximate calculation of the compensation that the injured party should receive can be made. One of the results of this study is that it allows calculating joint mobility angles without the need to use a goniometer.Keywords: mobile tool, body damage, personal injury and disability, telemedicine
Procedia PDF Downloads 907605 Applications for Additive Manufacturing Technology for Reducing the Weight of Body Parts of Gas Turbine Engines
Authors: Liubov Magerramova, Mikhail Petrov, Vladimir Isakov, Liana Shcherbinina, Suren Gukasyan, Daniil Povalyukhin, Olga Klimova-Korsmik, Darya Volosevich
Abstract:
Aircraft engines are developing along the path of increasing resource, strength, reliability, and safety. The building of gas turbine engine body parts is a complex design and technological task. Particularly complex in the design and manufacturing are the casings of the input stages of helicopter gearboxes and central drives of aircraft engines. Traditional technologies, such as precision casting or isothermal forging, are characterized by significant limitations in parts production. For parts like housing, additive technologies guarantee spatial freedom and limitless or flexible design. This article presents the results of computational and experimental studies. These investigations justify the applicability of additive technologies (AT) to reduce the weight of aircraft housing gearbox parts by up to 32%. This is possible due to geometrical optimization compared to the classical, less flexible manufacturing methods and as-casted aircraft parts with over-insured values of safety factors. Using an example of the body of the input stage of an aircraft gearbox, visualization of the layer-by-layer manufacturing of a part based on thermal deformation was demonstrated.Keywords: additive technologies, gas turbine engines, topological optimization, synthesis process
Procedia PDF Downloads 1207604 Comparison of Chest Weight of Pure and Mixed Races Kabood 30-Day Squab
Authors: Sepehr Moradi, Mehdi Asadi Rad
Abstract:
The aim of this study is to evaluate and compare chest weight of pure and mixed races Kabood 30-day Pigeons to investigate about their sex, race, and some auxiliary variables. In this paper, 62 pieces of pigeons as 31 male and female pairs with equal age are studied randomly. A natural incubation was done from each pair. All produced chickens were slaughtered at 30 days age after 12 hours hunger. Then their chests were weighted by a scale with one gram precision. A covariance analysis was used since there were many auxiliary variables and unequal observations. SAS software was used for statistical analysis. Mean weight of chests in pure race (Kabood-Kabood) with 8 records, 123.8±32.3g and mixed races of Kabood-Namebar, Kabood-Parvazy, Kabood-Tizpar, Namebar-Kabood, Tizpar-Kabood, and Parvazi-Kabood with 8, 8, 6, 12, 10, and 10 records were 139.4±23.5, 7/122±23.8, 124.7±30.1, 50.3±29.3, 51.4±26.4, and 137±28.6 gr, respectively. Mean weight of 30-day chests in male and female sex were 87.3±2.5 and 82.7±2.6g, respectively. Difference chest weight of 30-day chests of Kabood-Kabood race with Kabood-Namebar, Kabood-Parvazi, Tizpar-Kabood, Kabood-Tizpar, Namebar-Kabood and Parvazi-Kabood mixed races was not significant. Effect of sex was also significant in 5% level (P<0.05), but mutual effect of sex and race was not significant. Auxiliary variable of father weight was significant in 1% level (p < 0.01), but auxiliary variable of mother weight was not significant. The results showed that most and least weights belonged to Kabood-Namebar and Namebar-Kabood.Keywords: squab, Kabood race, 30-day chest weight, pigeons
Procedia PDF Downloads 1537603 Web-GIS Technology: A Tool for Farm-to-Market Road Project Profiling and Proposal Prioritization of the Philippines’ Department of Agriculture
Authors: Elbert S. Moyon, Edsel Matt O. Morales, Jaymer M. Jayoma, Kent C. Espejon, Jayson C. Dollete, Mark Phil B. Pacot
Abstract:
This research paper focuses on the potential of using Web-GIS technology in prioritizing farm-to-market road projects by the Philippines’ Department of Agriculture (DA). The study aimed to explore the benefits of Web-GIS in addressing the limitations faced by the DA in terms of Farm to Market Road profiling and project prioritization, which include a lack of access to updated data, limited spatial analysis capabilities, and difficulties in sharing information between stakeholders. The research methodology involves a comprehensive literature review and a case study of a Web-GIS application developed for the DA, which was used to profile and prioritize farm-to-market road projects in the Philippines. The results showed that the Web-GIS technology provides the DA with an effective tool for analyzing and visualizing data, which can help in profiling and prioritizing road projects based on various criteria such as economic, social, and environmental impacts. The study also showed that Web-GIS technology could help in reducing the time and effort required for road project prioritization and improve communication between stakeholders.Keywords: GIS, web application, farm-to-market road, FMR prioritization, Django, GeoServer
Procedia PDF Downloads 837602 Up-regulation of KRT14 Promotes EMT in Basal Muscle-invasive Bladder Cancer through IGF2BP1/FTO Dependence on Methyladenosine-modified SNAI1
Authors: Shirui Huang, Wei Chen, Chuanshu Huang
Abstract:
Basal muscle-invasive bladder cancer (BMIBC) is considered one of the subtypes of BC with the highest metastatic rate and the poorest prognosis. Therefore, elucidating the mechanisms underlying BMIBC metastasis and identifying novel precision therapeutic targets are current research hotspots and challenges to cancer researchers. Through a series of in vitro and in vivo functional experiments, we have identified the crucial role of KRT14 in the high invasiveness and adverse prognosis of BMIBC. We found that the K294 site within the IGF2BP1-KH2 domain is responsible for reading the conserved genetic information carried by D226/E227 in the KRT14 nuclear export signal (NES). Activation of the KRT14-IGF2BP1 signaling axis is essential for IGF2BP1-mediated stabilization of SNAI1 mRNA through FTO modification. Additionally, IGF2BP1 forms a positive feedback loop by stabilizing its own mRNA, thereby accelerating the invasion and metastasis of BMIBC. Collectively, our study identifies the KRT14/IGF2BP1/FTO/Snail signaling axis as an essential regulatory mechanism associated with poor prognosis in BMIBC, providing a theoretical basis for KRT14 and its downstream regulated molecules as therapeutic targets for BMIBC and the development of corresponding targeted therapies.Keywords: BMIBC, KRT4, IFGF2BP1, DNA methylation
Procedia PDF Downloads 187601 Influence of Compactive Efforts on the Hydraulic Conductivity of Bagasse Ash Treated Black Cotton Soil
Authors: T. S. Ijimdiya, K. J. Osinubi
Abstract:
This study examines the influence of compactive efforts on hydraulic conductivity behaviour of compacted black cotton soil treated with bagasse ash which is necessary in assessing the performance of the soil - bagasse ash mixture for use as a suitable barrier material in waste containment application. Black cotton soil treated with up to 12% bagasse ash (obtained from burning the fibrous residue from the extraction of sugar juice from sugarcane) by dry weight of soil for use in waste containment application. The natural soil classifies as A-7-6 or CH in accordance with the AASHTO and the Unified Soil Classification System, respectively. The treated soil samples were prepared at molding water contents of -2, 0, +2, and +4 % of optimum moisture contents and compacted using four compactive efforts of Reduced British Standard Light (RBSL), British Standard light (BSL), West African Standard (WAS) and British Standard Heavy (BSH). The results obtained show that hydraulic conductivity decreased with increase in bagasse ash content, moulding water content and compaction energy.Keywords: bagasse ash treatment, black cotton soil, hydraulic conductivity, moulding water contents, compactive efforts
Procedia PDF Downloads 4387600 Investigating the Impact of Solar Radiation on Electricity Meters’ Accuracy Using A Modified Climatic Chamber
Authors: Hala M. Abdel Mageed, Eman M. Hosny, Adel S. Nada
Abstract:
Solar radiation test is one of the essential tests performed on electricity meters that is carried out using solar simulators. In this work, the (MKF-240) climatic chamber has been modified to act as a solar simulator at the Egyptian national institute of standard, NIS. Quartz Tungsten Halogen (QTH) lamps and an Aluminum plate are added to the climatic chamber to realize the solar test conditions. Many experimental trials have been performed to reach the optimum number of lamps needed to fulfil the test requirements and to adjust the best uniform test area. The proposed solar simulator design is capable to produce irradiance up to 1066 W/m2. Its output radiation is controlled by changing the number of illuminated lamps as well as changing the distance between lamps and tested electricity meter. The uniformity of radiation within the simulator has been recognized to be 91.5 % at maximum irradiance. Three samples of electricity meters have been tested under different irradiances, temperatures, and electric loads. The electricity meters’ accuracies have been recorded and analyzedfor eachsample. Moreover, measurement uncertainty contribution has been considered in all tests to get precision value. There were noticeable changes in the accuracies of the electricity meters while exposed to solar radiation, although there were no noticeable distortions of their insulationsand outer surfaces.Keywords: solar radiation, solar simulator, climatic chamber, halogen lamp, electricity meter
Procedia PDF Downloads 1297599 Parallel Gripper Modelling and Design Optimization Using Multi-Objective Grey Wolf Optimizer
Authors: Golak Bihari Mahanta, Bibhuti Bhusan Biswal, B. B. V. L. Deepak, Amruta Rout, Gunji Balamurali
Abstract:
Robots are widely used in the manufacturing industry for rapid production with higher accuracy and precision. With the help of End-of-Arm Tools (EOATs), robots are interacting with the environment. Robotic grippers are such EOATs which help to grasp the object in an automation system for improving the efficiency. As the robotic gripper directly influence the quality of the product due to the contact between the gripper surface and the object to be grasped, it is necessary to design and optimize the gripper mechanism configuration. In this study, geometric and kinematic modeling of the parallel gripper is proposed. Grey wolf optimizer algorithm is introduced for solving the proposed multiobjective gripper optimization problem. Two objective functions developed from the geometric and kinematic modeling along with several nonlinear constraints of the proposed gripper mechanism is used to optimize the design variables of the systems. Finally, the proposed methodology compared with a previously proposed method such as Teaching Learning Based Optimization (TLBO) algorithm, NSGA II, MODE and it was seen that the proposed method is more efficient compared to the earlier proposed methodology.Keywords: gripper optimization, metaheuristics, , teaching learning based algorithm, multi-objective optimization, optimal gripper design
Procedia PDF Downloads 1897598 The Prevalence of Coronary Artery Disease and Its Risk Factors in Rural and Urban Areas of Pakistan
Authors: Muhammad Kamran Hanif Khan, Fahad Mushtaq
Abstract:
Background: In both developed and underdeveloped countries, coronary artery disease (CAD) is a serious cause of death and disability. Cardiovascular disease (CVD) is becoming more prevalent in emerging countries like Pakistan due to the spread and acceptance of Western lifestyles. Material and Methods: An observational cross-sectional investigation was conducted, and data collection relied on a random cluster sampling method. The sample size for this cross-sectional study was calculated using the following factors: estimated true proportion of 17.5%, desired precision of 2%, and confidence interval of 95%. The data for this study was collected from a sample of 1387 adults. Results: The average age of those living in rural areas is 55.24 years, compared to 52.60 years for those living in urban areas. The mean fasting blood glucose of the urban participants is 105.28 mg/dL, which is higher than the mean fasting blood glucose of the rural participants, which is 102.06 mg/dL. The mean total cholesterol of the urban participants is 192.20 mg/dL, which is slightly higher than the mean total cholesterol of the rural participants, which is 191.97 mg/dL. CAD prevalence is greater in urban areas than in rural areas. ECG abnormalities prevalence is 16.1% in females compared to 12.5% in men. Conclusion: The prevalence of CAD is more common in urban areas than in rural ones for all of the measures of CAD used in the study.Keywords: CVD prevalence, CVD risk factors, rural area, urban area
Procedia PDF Downloads 827597 Adsorptive Removal of Cd(II) Ions from Aqueous Systems by Wood Ash-Alginate Composite Beads
Authors: Tichaona Nharingo, Hope Tauya, Mambo Moyo
Abstract:
Wood ash has been demonstrated to have favourable adsorption capacity for heavy metal ions but suffers the application problem of difficult to separate/isolate from the batch adsorption systems. Fabrication of wood ash beads using multifunctional group and non-toxic carbohydrate, alginate, may improve the applicability of wood ash in environmental pollutant remediation. In this work, alginate-wood ash beads (AWAB) were fabricated and applied to the removal of cadmium ions from aqueous systems. The beads were characterized by FTIR, TGA/DSC, SEM-EDX and their pHZPC before and after the adsorption of Cd(II) ions. Important adsorption parameters i.e. pH, AWAB dosage, contact time and ionic strength were optimized and the effect of initial concentration of Cd(II) ions to the adsorption process was established. Adsorption kinetics, adsorption isotherms, adsorption mechanism and application of AWAB to real water samples spiked with Cd(II) ions were ascertained. The composite adsorbent was characterized by a heterogeneous macro pore surface comprising of metal oxides, multiple hydroxyl groups and carbonyl groups that were involved in electrostatic interaction and Lewis acid-base interactions with the Cd(II) ions. The pseudo second order and the Freundlich isotherm models best fitted the adsorption kinetics and isotherm data respectively suggesting chemical sorption process and surface heterogeneity. The presence of Pb(II) ions inhibited the adsorption of Cd(II) ions (reduced by 40 %) attributed to the competition for the adsorption sites. The Cd(II) loaded beads could be regenerated using 0.1 M HCl and could be applied to four sorption-desorption cycles without significant loss in its initial adsorption capacity. The high maximum adsorption capacity, stability, selectivity and reusability of AWAB make the adsorbent ideal for application in the removal of Cd(II) ions from real water samples. Column type adsorption experiments need to be explored to establish the potential of the adsorbent in removing Cd(II) ions using continuous flow systems.Keywords: adsorption, Cd(II) ions, regeneration, wastewater, wood ash-alginate beads
Procedia PDF Downloads 2487596 Using Blockchain Technology to Extend the Vendor Managed Inventory for Sustainability
Authors: Elham Ahmadi, Roshaali Khaturia, Pardis Sahraei, Mohammad Niyayesh, Omid Fatahi Valilai
Abstract:
Nowadays, Information Technology (IT) is changing the way traditional enterprise management concepts work. One of the most dominant IT achievements is the Blockchain Technology. This technology enables the distributed collaboration of stakeholders for their interactions while fulfilling the security and consensus rules among them. This paper has focused on the application of Blockchain technology to enhance one of traditional inventory management models. The Vendor Managed Inventory (VMI) has been considered one of the most efficient mechanisms for vendor inventory planning by the suppliers. While VMI has brought competitive advantages for many industries, however its centralized mechanism limits the collaboration of a pool of suppliers and vendors simultaneously. This paper has studied the recent research for VMI application in industries and also has investigated the applications of Blockchain technology for decentralized collaboration of stakeholders. Focusing on sustainability issue for total supply chain consisting suppliers and vendors, it has proposed a Blockchain based VMI conceptual model. The different capabilities of this model for enabling the collaboration of stakeholders while maintaining the competitive advantages and sustainability issues have been discussed.Keywords: vendor managed inventory, VMI, blockchain technology, supply chain planning, sustainability
Procedia PDF Downloads 2277595 Nanopriming Potential of Metal Nanoparticles against Internally Seed Borne Pathogen Ustilago triciti
Authors: Anjali Sidhu, Anju Bala, Amit Kumar
Abstract:
Metal nanoparticles have the potential to revolutionize the agriculture owing to sizzling interdisciplinary nano-technological application domain. Numerous patents and products incorporating engineered nanoparticles (NPs) entered into agro-applications with the collective goal to promote proficiency as well as sustainability with lower input and generating meager waste than conventional products and approaches. Loose smut of wheat caused by Ustilago segetum tritici is an internally seed-borne pathogen. It is dormant in the seed unless the seed germinates and its symptoms are expressed at the reproductive stage of the plant only. Various seed treatment agents are recommended for this disease but due to the inappropriate methods of seed treatments used by farmers, each and every seed may not get treated, and the infected seeds escape the fungicidal action. The antimicrobial potential and small size of nanoparticles made them the material of choice as they could enter each seed and restrict the pathogen inside the seed due to the availability of more number of nanoparticles per unit volume of the nanoformulations. Nanoparticles of diverse nature known for their in vitro antimicrobial activity viz. ZnO, MgO, CuS and AgNPs were synthesized, surface modified and characterized by traditional methods. They were applied on infected wheat seeds which were then grown in pot conditions, and their mycelium was tracked in the shoot and leaf region of the seedlings by microscopic staining techniques. Mixed responses of inhibition of this internal mycelium were observed. The time and method of application concluded to be critical for application, which was optimised in the present work. The results implicated that there should be field trails to get final fate of these pot trails up to commercial level. The success of their field trials could be interpreted as a revolution to replace high dose organic fungicides of high residue behaviour.Keywords: metal nanoparticles, nanopriming, seed borne pathogen, Ustilago segetum tritici
Procedia PDF Downloads 1467594 Application of Ground Penetrating Radar and Light Falling Weight Deflectometer in Ballast Quality Assessment
Authors: S. Cafiso, B. Capace, A. Di Graziano, C. D’Agostino
Abstract:
Systematic monitoring of the trackbed is necessary to assure safety and quality of service in the railway system. Moreover, to produce effective management of the maintenance treatments, the assessment of bearing capacity of the railway trackbed must include ballast, sub-ballast and subgrade layers at different depths. Consequently, there is an increasing interest in obtaining a consistent measure of ballast bearing capacity with no destructive tests (NDTs) able to work in the physical and time restrictions of railway tracks in operation. Moreover, in the case of the local railway with reduced gauge, the use of the traditional high-speed track monitoring systems is not feasible. In that framework, this paper presents results from in site investigation carried out on ballast and sleepers with Ground Penetrating Radar (GPR) and Light Falling Weight Deflectometer (LWD). These equipment are currently used in road pavement maintenance where they have shown their reliability and effectiveness. Application of such Non-Destructive Tests in railway maintenance is promising but in the early stage of the investigation. More specifically, LWD was used to estimate the stiffness of ballast and sleeper support, as well. LWD, despite the limited load (6 kN in the trial test) applied directly on the sleeper, was able to detect defects in the bearing capacity at the Sleeper/Ballast interface. A dual frequency GPR was applied to detect the presence of layers’ discontinuities at different depths due to fouling phenomena that are the main causes of changing in the layer dielectric proprieties within the ballast thickness. The frequency of 2000Mhz provided high-resolution data to approximately 0.4m depth, while frequency of 600Mhz showed greater depth penetration up to 1.5 m. In the paper literature review and trial in site experience are used to identify Strengths, Weaknesses, Opportunities, and Threats (SWOT analysis) of the application of GPR and LWD for the assessment of bearing capacity of railway track-bed.Keywords: bearing capacity, GPR, LWD, no destructive test, railway track
Procedia PDF Downloads 1317593 Diabetes Diagnosis Model Using Rough Set and K- Nearest Neighbor Classifier
Authors: Usiobaifo Agharese Rosemary, Osaseri Roseline Oghogho
Abstract:
Diabetes is a complex group of disease with a variety of causes; it is a disorder of the body metabolism in the digestion of carbohydrates food. The application of machine learning in the field of medical diagnosis has been the focus of many researchers and the use of recognition and classification model as a decision support tools has help the medical expert in diagnosis of diseases. Considering the large volume of medical data which require special techniques, experience, and high diagnostic skill in the diagnosis of diseases, the application of an artificial intelligent system to assist medical personnel in order to enhance their efficiency and accuracy in diagnosis will be an invaluable tool. In this study will propose a diabetes diagnosis model using rough set and K-nearest Neighbor classifier algorithm. The system consists of two modules: the feature extraction module and predictor module, rough data set is used to preprocess the attributes while K-nearest neighbor classifier is used to classify the given data. The dataset used for this model was taken for University of Benin Teaching Hospital (UBTH) database. Half of the data was used in the training while the other half was used in testing the system. The proposed model was able to achieve over 80% accuracy.Keywords: classifier algorithm, diabetes, diagnostic model, machine learning
Procedia PDF Downloads 3377592 Searching for Forensic Evidence in a Compromised Virtual Web Server against SQL Injection Attacks and PHP Web Shell
Authors: Gigih Supriyatno
Abstract:
SQL injection is one of the most common types of attacks and has a very critical impact on web servers. In the worst case, an attacker can perform post-exploitation after a successful SQL injection attack. In the case of forensics web servers, web server analysis is closely related to log file analysis. But sometimes large file sizes and different log types make it difficult for investigators to look for traces of attackers on the server. The purpose of this paper is to help investigator take appropriate steps to investigate when the web server gets attacked. We use attack scenarios using SQL injection attacks including PHP backdoor injection as post-exploitation. We perform post-mortem analysis of web server logs based on Hypertext Transfer Protocol (HTTP) POST and HTTP GET method approaches that are characteristic of SQL injection attacks. In addition, we also propose structured analysis method between the web server application log file, database application, and other additional logs that exist on the webserver. This method makes the investigator more structured to analyze the log file so as to produce evidence of attack with acceptable time. There is also the possibility that other attack techniques can be detected with this method. On the other side, it can help web administrators to prepare their systems for the forensic readiness.Keywords: web forensic, SQL injection, investigation, web shell
Procedia PDF Downloads 1497591 The Standard of Best Interest of the Child in Custody Adjudication under the Malaysian Laws
Authors: Roslina Che Soh
Abstract:
Best interest of the child has been the prevailing principle of the custody legislations of most nations in the world. The tremendous shift from parental rights to parental responsibilities throughout the centuries had made the principle of best interests of the child as the utmost matter which parents must uphold in child upbringing. Despite the commitment to this principle is significantly enshrined in the United Nation Convention on Rights of the Child, the content and application of the principle differs across borders. Differences persist notwithstanding many countries have experienced a substantial shift over the last several decades in the types of custodial arrangements that are thought to best serve children’s interests. The laws in Malaysia similarly uphold this principle but do not provide further deliberation on the principle itself. The principle is entirely developed by the courts through decided cases. Thus, this paper seeks to discuss the extent of the application of best interest of the child principle in custody disputes. In doing so, it attempts to provide an overview of the current laws and the approach of the Civil and the Shariah courts in Malaysia in applying the principle in determining custody disputes. For purposes of comparison, it briefly examines the legislations and the courts practices in Australia and England on this matter. The purpose is to determine the best standard to be adopted by Malaysia and to propose improvement to the laws whenever appropriate.Keywords: child custody, best interest, Malaysian law, bioinformatics, biomedicine
Procedia PDF Downloads 2777590 Developing Fault Tolerance Metrics of Web and Mobile Applications
Authors: Ahmad Mohsin, Irfan Raza Naqvi, Syda Fatima Usamn
Abstract:
Applications with higher fault tolerance index are considered more reliable and trustworthy to drive quality. In recent years application development has been shifted from traditional desktop and web to native and hybrid application(s) for the web and mobile platforms. With the emergence of Internet of things IOTs, cloud and big data trends, the need for measuring Fault Tolerance for these complex nature applications has increased to evaluate their performance. There is a phenomenal gap between fault tolerance metrics development and measurement. Classic quality metric models focused on metrics for traditional systems ignoring the essence of today’s applications software, hardware & deployment characteristics. In this paper, we have proposed simple metrics to measure fault tolerance considering general requirements for Web and Mobile Applications. We have aligned factors – subfactors, using GQM for metrics development considering the nature of mobile we apps. Systematic Mathematical formulation is done to measure metrics quantitatively. Three web mobile applications are selected to measure Fault Tolerance factors using formulated metrics. Applications are then analysed on the basis of results from observations in a controlled environment on different mobile devices. Quantitative results are presented depicting Fault tolerance in respective applications.Keywords: web and mobile applications, reliability, fault tolerance metric, quality metrics, GQM based metrics
Procedia PDF Downloads 3467589 Model of Application of Blockchain Technology in Public Finances
Authors: M. Vlahovic
Abstract:
This paper presents a model of public finances, which combines three concepts: participatory budgeting, crowdfunding and blockchain technology. Participatory budgeting is defined as a process in which community members decide how to spend a part of community’s budget. Crowdfunding is a practice of funding a project by collecting small monetary contributions from a large number of people via an Internet platform. Blockchain technology is a distributed ledger that enables efficient and reliable transactions that are secure and transparent. In this hypothetical model, the government or authorities on local/regional level would set up a platform where they would propose public projects to citizens. Citizens would browse through projects and support or vote for those which they consider justified and necessary. In return, they would be entitled to a tax relief in the amount of their monetary contribution. Since the blockchain technology enables tracking of transactions, it can be used to mitigate corruption, money laundering and lack of transparency in public finances. Models of its application have already been created for e-voting, health records or land registries. By presenting a model of application of blockchain technology in public finances, this paper takes into consideration the potential of blockchain technology to disrupt governments and make processes more democratic, secure, transparent and efficient. The framework for this paper consists of multiple streams of research, including key concepts of direct democracy, public finance (especially the voluntary theory of public finance), information and communication technology, especially blockchain technology and crowdfunding. The framework defines rules of the game, basic conditions for the implementation of the model, benefits, potential problems and development perspectives. As an oversimplified map of a new form of public finances, the proposed model identifies primary factors, that influence the possibility of implementation of the model, and that could be tracked, measured and controlled in case of experimentation with the model.Keywords: blockchain technology, distributed ledger, participatory budgeting, crowdfunding, direct democracy, internet platform, e-government, public finance
Procedia PDF Downloads 1537588 The Impact of Emoticons in the Workplace: Legal Challenges and Regulatory Change
Authors: Jacques C. Duvenhage
Abstract:
The use of emoticons or so-called ‘emojis’ has gained much attention, not only in the daily use thereof with friends or family but also within the workplace amongst co-workers and employers. Even though emojis may be seen as a way to express feelings or even ideas, it may present legal challenges in the workplace. With new emojis being created on a daily basis, communicating through emojis, whether via phone, email or social media platforms, can become convoluted, especially within the working environment. The question to be addressed is how and/or whether Australian legislators will regulate the use of emojis (as a form of technology) in the workplace to prevent harassment, discrimination and other forms of prejudice. The emojis sent to co-workers may be interpreted by employees and even employers in different ways depending on their age, sexual orientation, and cultural background. Therefore, Australian courts will need to interpret an emoji’s meaning on a case-by-case basis. This paper will explore the use of emojis in the workplace (drawing on a desktop study), the impact emojis have on the employer-employee relationship as well as co-worker relationships, its legal application through case studies and whether a legal framework should be adopted by Australian legislators on this issue. Furthermore, this paper will reflect on the legal framework and application of emojis in the workplace considering foreign jurisdictions such as the United Kingdom and the United States of America and whether Australia should adopt similar legal approaches to these jurisdictions.Keywords: emoticons, legal approaches, regulation, workplace
Procedia PDF Downloads 1527587 A Simple Device for Characterizing High Power Electron Beams for Welding
Authors: Aman Kaur, Colin Ribton, Wamadeva Balachandaran
Abstract:
Electron beam welding due to its inherent advantages is being extensively used for material processing where high precision is required. Especially in aerospace or nuclear industries, there are high quality requirements and the cost of materials and processes is very high which makes it very important to ensure the beam quality is maintained and checked prior to carrying out the welds. Although the processes in these industries are highly controlled, however, even the minor changes in the operating parameters of the electron gun can make large enough variations in the beam quality that can result in poor welding. To measure the beam quality a simple device has been designed that can be used at high powers. The device consists of two slits in x and y axis which collects a small portion of the beam current when the beam is deflected over the slits. The signals received from the device are processed in data acquisition hardware and the dedicated software developed for the device. The device has been used in controlled laboratory environments to analyse the signals and the weld quality relationships by varying the focus current. The results showed matching trends in the weld dimensions and the beam characteristics. Further experimental work is being carried out to determine the ability of the device and signal processing software to detect subtle changes in the beam quality and to relate these to the physical weld quality indicators.Keywords: electron beam welding, beam quality, high power, weld quality indicators
Procedia PDF Downloads 3247586 Domain specific Ontology-Based Knowledge Extraction Using R-GNN and Large Language Models
Authors: Andrey Khalov
Abstract:
The rapid proliferation of unstructured data in IT infrastructure management demands innovative approaches for extracting actionable knowledge. This paper presents a framework for ontology-based knowledge extraction that combines relational graph neural networks (R-GNN) with large language models (LLMs). The proposed method leverages the DOLCE framework as the foundational ontology, extending it with concepts from ITSMO for domain-specific applications in IT service management and outsourcing. A key component of this research is the use of transformer-based models, such as DeBERTa-v3-large, for automatic entity and relationship extraction from unstructured texts. Furthermore, the paper explores how transfer learning techniques can be applied to fine-tune large language models (LLaMA) for using to generate synthetic datasets to improve precision in BERT-based entity recognition and ontology alignment. The resulting IT Ontology (ITO) serves as a comprehensive knowledge base that integrates domain-specific insights from ITIL processes, enabling more efficient decision-making. Experimental results demonstrate significant improvements in knowledge extraction and relationship mapping, offering a cutting-edge solution for enhancing cognitive computing in IT service environments.Keywords: ontology mapping, R-GNN, knowledge extraction, large language models, NER, knowlege graph
Procedia PDF Downloads 217585 An Entropy Based Novel Algorithm for Internal Attack Detection in Wireless Sensor Network
Authors: Muhammad R. Ahmed, Mohammed Aseeri
Abstract:
Wireless Sensor Network (WSN) consists of low-cost and multi functional resources constrain nodes that communicate at short distances through wireless links. It is open media and underpinned by an application driven technology for information gathering and processing. It can be used for many different applications range from military implementation in the battlefield, environmental monitoring, health sector as well as emergency response of surveillance. With its nature and application scenario, security of WSN had drawn a great attention. It is known to be valuable to variety of attacks for the construction of nodes and distributed network infrastructure. In order to ensure its functionality especially in malicious environments, security mechanisms are essential. Malicious or internal attacker has gained prominence and poses the most challenging attacks to WSN. Many works have been done to secure WSN from internal attacks but most of it relay on either training data set or predefined threshold. Without a fixed security infrastructure a WSN needs to find the internal attacks is a challenge. In this paper we present an internal attack detection method based on maximum entropy model. The final experimental works showed that the proposed algorithm does work well at the designed level.Keywords: internal attack, wireless sensor network, network security, entropy
Procedia PDF Downloads 456