Search results for: network formation
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7869

Search results for: network formation

6339 Multi Tier Data Collection and Estimation, Utilizing Queue Model in Wireless Sensor Networks

Authors: Amirhossein Mohajerzadeh, Abolghasem Mohajerzadeh

Abstract:

In this paper, target parameter is estimated with desirable precision in hierarchical wireless sensor networks (WSN) while the proposed algorithm also tries to prolong network lifetime as much as possible, using efficient data collecting algorithm. Target parameter distribution function is considered unknown. Sensor nodes sense the environment and send the data to the base station called fusion center (FC) using hierarchical data collecting algorithm. FC builds underlying phenomena based on collected data. Considering the aggregation level, x, the goal is providing the essential infrastructure to find the best value for aggregation level in order to prolong network lifetime as much as possible, while desirable accuracy is guaranteed (required sample size is fully depended on desirable precision). First, the sample size calculation algorithm is discussed, second, the average queue length based on M/M[x]/1/K queue model is determined and it is used for energy consumption calculation. Nodes can decrease transmission cost by aggregating incoming data. Furthermore, the performance of the new algorithm is evaluated in terms of lifetime and estimation accuracy.

Keywords: aggregation, estimation, queuing, wireless sensor network

Procedia PDF Downloads 183
6338 Characterization and Detection of Cadmium Ion Using Modification Calixarene with Multiwalled Carbon Nanotubes

Authors: Amira Shakila Razali, Faridah Lisa Supian, Muhammad Mat Salleh, Suriani Abu Bakar

Abstract:

Water contamination by toxic compound is one of the serious environmental problems today. These toxic compounds mostly originated from industrial effluents, agriculture, natural sources and human waste. These study are focused on modification of multiwalled carbon nanotube (MWCNTs) with nanoparticle of calixarene and explore the possibility of using this nanocomposites for the remediation of cadmium in water. The nanocomposites were prepared by dissolving calixarene in chloroform solution as solvent, followed by additional multiwalled carbon nanotube (MWCNTs) then sonication process for 3 hour and fabricated the nanocomposites on substrate by spin coating method. Finally, the nanocomposites were tested on cadmium ion (10 mg/ml). The morphology of nanocomposites was investigated by FESEM showing the formation of calixarene on the outer walls of carbon nanotube and cadmium ion also clearly seen from the micrograph. This formation was supported by using energy dispersive x-ray (EDX). The presence of cadmium ions in the films, leads to some changes in the surface potential and Fourier Transform Infrared spectroscopy (FTIR).This nanocomposites have potential for development of sensor for pollutant monitoring and nanoelectronics devices applications

Keywords: calixarene, multiwalled carbon nanotubes, cadmium, surface potential

Procedia PDF Downloads 488
6337 An Application of Graph Theory to The Electrical Circuit Using Matrix Method

Authors: Samai'la Abdullahi

Abstract:

A graph is a pair of two set and so that a graph is a pictorial representation of a system using two basic element nodes and edges. A node is represented by a circle (either hallo shade) and edge is represented by a line segment connecting two nodes together. In this paper, we present a circuit network in the concept of graph theory application and also circuit models of graph are represented in logical connection method were we formulate matrix method of adjacency and incidence of matrix and application of truth table.

Keywords: euler circuit and path, graph representation of circuit networks, representation of graph models, representation of circuit network using logical truth table

Procedia PDF Downloads 558
6336 Features of Formation and Development of Possessory Risk Management Systems of Organization in the Russian Economy

Authors: Mikhail V. Khachaturyan, Inga A. Koryagina, Maria Nikishova

Abstract:

The study investigates the impact of the ongoing financial crisis, started in the 2nd half of 2014, on marketing budgets spent by Fast-moving consumer goods companies. In these conditions, special importance is given to efficient possessory risk management systems. The main objective for establishing and developing possessory risk management systems for FMCG companies in a crisis is to analyze the data relating to the external environment and consumer behavior in a crisis. Another important objective for possessory risk management systems of FMCG companies is to develop measures and mechanisms to maintain and stimulate sales. In this regard, analysis of risks and threats which consumers define as the main reasons affecting their level of consumption become important. It is obvious that in crisis conditions the effective risk management systems responsible for development and implementation of strategies for consumer demand stimulation, as well as the identification, analysis, assessment and management of other types of risks of economic security will be the key to sustainability of a company. In terms of financial and economic crisis, the problem of forming and developing possessory risk management systems becomes critical not only in the context of management models of FMCG companies, but for all the companies operating in other sectors of the Russian economy. This study attempts to analyze the specifics of formation and development of company possessory risk management systems. In the modern economy, special importance among all the types of owner’s risks has the risk of reduction in consumer activity. This type of risk is common not only for the consumer goods trade. Study of consumer activity decline is especially important for Russia due to domestic market of consumer goods being still in the development stage, despite its significant growth. In this regard, it is especially important to form and develop possessory risk management systems for FMCG companies. The authors offer their own interpretation of the process of forming and developing possessory risk management systems within owner’s management models of FMCG companies as well as in Russian economy in general. Proposed methods and mechanisms of problem analysis of formation and development of possessory risk management systems in FMCG companies and the results received can be helpful for researchers interested in problems of consumer goods market development in Russia and overseas.

Keywords: FMCG companies, marketing budget, risk management, owner, Russian economy, organization, formation, development, system

Procedia PDF Downloads 374
6335 Nighttime Dehaze - Enhancement

Authors: Harshan Baskar, Anirudh S. Chakravarthy, Prateek Garg, Divyam Goel, Abhijith S. Raj, Kshitij Kumar, Lakshya, Ravichandra Parvatham, V. Sushant, Bijay Kumar Rout

Abstract:

In this paper, we introduce a new computer vision task called nighttime dehaze-enhancement. This task aims to jointly perform dehazing and lightness enhancement. Our task fundamentally differs from nighttime dehazing – our goal is to jointly dehaze and enhance scenes, while nighttime dehazing aims to dehaze scenes under a nighttime setting. In order to facilitate further research on this task, we release a new benchmark dataset called Reside-β Night dataset, consisting of 4122 nighttime hazed images from 2061 scenes and 2061 ground truth images. Moreover, we also propose a new network called NDENet (Nighttime Dehaze-Enhancement Network), which jointly performs dehazing and low-light enhancement in an end-to-end manner. We evaluate our method on the proposed benchmark and achieve SSIM of 0.8962 and PSNR of 26.25. We also compare our network with other baseline networks on our benchmark to demonstrate the effectiveness of our approach. We believe that nighttime dehaze-enhancement is an essential task, particularly for autonomous navigation applications, and we hope that our work will open up new frontiers in research. Our dataset and code will be made publicly available upon acceptance of our paper.

Keywords: dehazing, image enhancement, nighttime, computer vision

Procedia PDF Downloads 154
6334 Synthesizing CuFe2O4 Spinel Powders by a Combustion-Like Process for Solid Oxide Fuel Cell Interconnects Coating

Authors: Seyedeh Narjes Hosseini, Mohammad Hossein Enayati, Fathallah Karimzadeh, Nigel Mark Sammes

Abstract:

The synthesis of CuFe2O4 spinel powders by an optimized combustion-like process followed by calcinations is described herein. The samples were characterized by X-ray diffraction (XRD), differential thermal analysis (TG/DTA), scanning electron microscopy (SEM), dilatometry and 4-probe DC methods. Different glycine to nitrate (G/N) ratios of 1 (fuel-deficient), 1.48 (stoichiometric) and 2 (fuel-rich) were employed. Calcining the as-prepared powders at 800 and 1000°C for 5 hours showed that the 2 ratio results in the formation of desired copper spinel single phase at both calcinations temperatures. For G/N=1, formation of CuFe2O4 takes place in three steps. First, iron and copper nitrates decomposes to iron oxide and pure copper. Then, copper transforms to copper oxide and finally, copper and iron oxides react to each other to form copper ferrite spinel phase. The electrical conductivity and the coefficient of thermal expansion of the sintered pelletized samples were obtained 2 S.cm-1 (800°C) and 11×10-6 °C-1 (25-800°C), respectively.

Keywords: SOFC interconnect coatings, Copper ferrite, Spinels, electrical conductivity, Glycine–nitrate process

Procedia PDF Downloads 477
6333 Developing a Secure Iris Recognition System by Using Advance Convolutional Neural Network

Authors: Kamyar Fakhr, Roozbeh Salmani

Abstract:

Alphonse Bertillon developed the first biometric security system in the 1800s. Today, many governments and giant companies are considering or have procured biometrically enabled security schemes. Iris is a kaleidoscope of patterns and colors. Each individual holds a set of irises more unique than their thumbprint. Every single day, giant companies like Google and Apple are experimenting with reliable biometric systems. Now, after almost 200 years of improvements, face ID does not work with masks, it gives access to fake 3D images, and there is no global usage of biometric recognition systems as national identity (ID) card. The goal of this paper is to demonstrate the advantages of iris recognition overall biometric recognition systems. It make two extensions: first, we illustrate how a very large amount of internet fraud and cyber abuse is happening due to bugs in face recognition systems and in a very large dataset of 3.4M people; second, we discuss how establishing a secure global network of iris recognition devices connected to authoritative convolutional neural networks could be the safest solution to this dilemma. Another aim of this study is to provide a system that will prevent system infiltration caused by cyber-attacks and will block all wireframes to the data until the main user ceases the procedure.

Keywords: biometric system, convolutional neural network, cyber-attack, secure

Procedia PDF Downloads 214
6332 Internal and External Influences on the Firm Objective

Authors: A. Briseno, A, Zorrilla

Abstract:

Firms are increasingly responding to social and environmental claims from society. Practices oriented to attend issues such as poverty, work equality, or renewable energy, are being implemented more frequently by firms to address impacts on sustainability. However, questions remain on how the responses of firms vary across industries and regions between the social and the economic objectives. Using concepts from organizational theory and social network theory, this paper aims to create a theoretical framework that explains the internal and external influences that make a firm establish its objective. The framework explains why firms might have a different objective orientation in terms of its economic and social prioritization.

Keywords: organizational identity, social network theory, firm objective, value maximization, social responsibility

Procedia PDF Downloads 307
6331 Cyber-Social Networks in Preventing Terrorism: Topological Scope

Authors: Alessandra Rossodivita, Alexei Tikhomirov, Andrey Trufanov, Nikolay Kinash, Olga Berestneva, Svetlana Nikitina, Fabio Casati, Alessandro Visconti, Tommaso Saporito

Abstract:

It is well known that world and national societies are exposed to diverse threats: anthropogenic, technological, and natural. Anthropogenic ones are of greater risks and, thus, attract special interest to researchers within wide spectrum of disciplines in efforts to lower the pertinent risks. Some researchers showed by means of multilayered, complex network models how media promotes the prevention of disease spread. To go further, not only are mass-media sources included in scope the paper suggests but also personificated social bots (socbots) linked according to reflexive theory. The novel scope considers information spread over conscious and unconscious agents while counteracting both natural and man-made threats, i.e., infections and terrorist hazards. Contrary to numerous publications on misinformation disseminated by ‘bad’ bots within social networks, this study focuses on ‘good’ bots, which should be mobilized to counter the former ones. These social bots deployed mixture with real social actors that are engaged in concerted actions at spreading, receiving and analyzing information. All the contemporary complex network platforms (multiplexes, interdependent networks, combined stem networks et al.) are comprised to describe and test socbots activities within competing information sharing tools, namely mass-media hubs, social networks, messengers, and e-mail at all phases of disasters. The scope and concomitant techniques present evidence that embedding such socbots into information sharing process crucially change the network topology of actor interactions. The change might improve or impair robustness of social network environment: it depends on who and how controls the socbots. It is demonstrated that the topological approach elucidates techno-social processes within the field and outline the roadmap to a safer world.

Keywords: complex network platform, counterterrorism, information sharing topology, social bots

Procedia PDF Downloads 160
6330 The Charge Exchange and Mixture Formation Model in the ASz-62IR Radial Aircraft Engine

Authors: Pawel Magryta, Tytus Tulwin, Paweł Karpiński

Abstract:

The ASz62IR engine is a radial aircraft engine with 9 cylinders. This object is produced by the Polish company WSK "PZL-KALISZ" S.A. This is engine is currently being developed by the above company and Lublin University of Technology. In order to provide an effective work of the technological development of this unit it was decided to made the simulation model. The model of ASz-62IR was developed with AVL BOOST software which is a tool dedicated to the one-dimensional modeling of internal combustion engines. This model can be used to calculate parameters of an air and fuel flow in an intake system including charging devices as well as combustion and exhaust flow to the environment. The main purpose of this model is the analysis of the charge exchange and mixture formation in this engine. For this purpose, the model consists of elements such: as air inlet, throttle system, compressor connector, charging compressor, inlet pipes and injectors, outlet pipes, fuel injection and model of fuel mixing and evaporation. The model of charge exchange and mixture formation was based on the model of mass flow rate in intake and exhaust pipes, and also on the calculation of gas properties values like gas constant or thermal capacity. This model was based on the equations to describe isentropic flow. The energy equation to describe flow under steady conditions was transformed into the mass flow equation. In the model the flow coefficient μσ was used, that varies with the stroke/valve opening and was determined in a steady flow state. The geometry of the inlet channels and other key components was mapped with reference to the technical documentation of the engine and empirical measurements of the structure elements. The volume of elements on the charge flow path between the air inlet and the exhaust outlet was measured by the CAD mapping of the structure. Taken from the technical documentation, the original characteristics of the compressor engine was entered into the model. Additionally, the model uses a general model for the transport of chemical compounds of the mixture. There are 7 compounds used, i.e. fuel, O2, N2, CO2, H2O, CO, H2. A gasoline fuel of a calorific value of 43.5 MJ/kg and an air mass fraction for stoichiometric mixture of 14.5 were used. Indirect injection into the intake manifold is used in this model. The model assumes the following simplifications: the mixture is homogenous at the beginning of combustion, accordingly, mixture stoichiometric coefficient A/F remains constant during combustion, combusted and non-combusted charges show identical pressures and temperatures although their compositions change. As a result of the simulation studies based on the model described above, the basic parameters of combustion process, charge exchange, mixture formation in cylinders were obtained. The AVL Boost software is very useful for the piston engine performance simulations. This work has been financed by the Polish National Centre for Research and Development, INNOLOT, under Grant Agreement No. INNOLOT/I/1/NCBR/2013.

Keywords: aviation propulsion, AVL Boost, engine model, charge exchange, mixture formation

Procedia PDF Downloads 328
6329 Analytic Network Process in Location Selection and Its Application to a Real Life Problem

Authors: Eylem Koç, Hasan Arda Burhan

Abstract:

Location selection presents a crucial decision problem in today’s business world where strategic decision making processes have critical importance. Thus, location selection has strategic importance for companies in boosting their strength regarding competition, increasing corporate performances and efficiency in addition to lowering production and transportation costs. A right choice in location selection has a direct impact on companies’ commercial success. In this study, a store location selection problem of Carglass Turkey which operates in vehicle glass branch is handled. As this problem includes both tangible and intangible criteria, Analytic Network Process (ANP) was accepted as the main methodology. The model consists of control hierarchy and BOCR subnetworks which include clusters of actors, alternatives and criteria. In accordance with the management’s choices, five different locations were selected. In addition to the literature review, a strict cooperation with the actor group was ensured and maintained while determining the criteria and during whole process. Obtained results were presented to the management as a report and its feasibility was confirmed accordingly.

Keywords: analytic network process (ANP), BOCR, multi-actor decision making, multi-criteria decision making, real-life problem, location selection

Procedia PDF Downloads 468
6328 TopClosure® of Large Abdominal Wall Defect Instead of Staged Hernia Repair as Part of Damage Control Laparotomy

Authors: Andriy Fedorenko

Abstract:

Background Early closure of the open abdomen is a priority after damage control laparotomy to prevent retraction of fascial layers and prevent hernia formation that requires definitive repair at a later stage. This substantially reduces the complications associated with ventral hernia formation for up to a year after initial surgery. TopClosure® is an innovative method that employs stress-relaxation and mechanical creep for skin stretching. Its use enables the primary closure of large abdominal wall defects and mitigates large ventral hernia formation. Materials and Methods A 7-year-old girl presented with severe blast injury. She underwent initial laparotomy in a facility within the conflict zone and was transferred in a state of septic shock to our facility for further care. Her abdominal injuries included liver lacerations, multiple perforations of the transverse colon and ileum, and a 8x16cm oblique abdominal wall defect. Further damage control laparotomy was performed with primary suture of the colon and ileum and temporary closure of the abdomen using a Bagota bag. Twelve hours later, negative pressure wound therapy (NPWT) was applied to the abdominal wound after relook laparotomy. Five days later, TopClosure® was applied to the lower part of the wound incorporating NPWT to the upper wound. Results The patient suffered leak from the colonic suture line and required relaparotomy. TopClosure® abdominal closure was achieved after every laparotomy. Conclusion TopClosure® utilizes the viscoelastic properties of the skin achieving full closure of the abdominal wall (including the fascia and skin),eliminating the need for prolonged NPWT, skin graft, and delayed ventral hernia repair surgery.

Keywords: topclosure, abdominal wall defect, hernia, damage control

Procedia PDF Downloads 74
6327 Scour Depth Prediction around Bridge Piers Using Neuro-Fuzzy and Neural Network Approaches

Authors: H. Bonakdari, I. Ebtehaj

Abstract:

The prediction of scour depth around bridge piers is frequently considered in river engineering. One of the key aspects in efficient and optimum bridge structure design is considered to be scour depth estimation around bridge piers. In this study, scour depth around bridge piers is estimated using two methods, namely the Adaptive Neuro-Fuzzy Inference System (ANFIS) and Artificial Neural Network (ANN). Therefore, the effective parameters in scour depth prediction are determined using the ANN and ANFIS methods via dimensional analysis, and subsequently, the parameters are predicted. In the current study, the methods’ performances are compared with the nonlinear regression (NLR) method. The results show that both methods presented in this study outperform existing methods. Moreover, using the ratio of pier length to flow depth, ratio of median diameter of particles to flow depth, ratio of pier width to flow depth, the Froude number and standard deviation of bed grain size parameters leads to optimal performance in scour depth estimation.

Keywords: adaptive neuro-fuzzy inference system (ANFIS), artificial neural network (ANN), bridge pier, scour depth, nonlinear regression (NLR)

Procedia PDF Downloads 215
6326 Constructing a Semi-Supervised Model for Network Intrusion Detection

Authors: Tigabu Dagne Akal

Abstract:

While advances in computer and communications technology have made the network ubiquitous, they have also rendered networked systems vulnerable to malicious attacks devised from a distance. These attacks or intrusions start with attackers infiltrating a network through a vulnerable host and then launching further attacks on the local network or Intranet. Nowadays, system administrators and network professionals can attempt to prevent such attacks by developing intrusion detection tools and systems using data mining technology. In this study, the experiments were conducted following the Knowledge Discovery in Database Process Model. The Knowledge Discovery in Database Process Model starts from selection of the datasets. The dataset used in this study has been taken from Massachusetts Institute of Technology Lincoln Laboratory. After taking the data, it has been pre-processed. The major pre-processing activities include fill in missed values, remove outliers; resolve inconsistencies, integration of data that contains both labelled and unlabelled datasets, dimensionality reduction, size reduction and data transformation activity like discretization tasks were done for this study. A total of 21,533 intrusion records are used for training the models. For validating the performance of the selected model a separate 3,397 records are used as a testing set. For building a predictive model for intrusion detection J48 decision tree and the Naïve Bayes algorithms have been tested as a classification approach for both with and without feature selection approaches. The model that was created using 10-fold cross validation using the J48 decision tree algorithm with the default parameter values showed the best classification accuracy. The model has a prediction accuracy of 96.11% on the training datasets and 93.2% on the test dataset to classify the new instances as normal, DOS, U2R, R2L and probe classes. The findings of this study have shown that the data mining methods generates interesting rules that are crucial for intrusion detection and prevention in the networking industry. Future research directions are forwarded to come up an applicable system in the area of the study.

Keywords: intrusion detection, data mining, computer science, data mining

Procedia PDF Downloads 294
6325 Stock Market Prediction Using Convolutional Neural Network That Learns from a Graph

Authors: Mo-Se Lee, Cheol-Hwi Ahn, Kee-Young Kwahk, Hyunchul Ahn

Abstract:

Over the past decade, deep learning has been in spotlight among various machine learning algorithms. In particular, CNN (Convolutional Neural Network), which is known as effective solution for recognizing and classifying images, has been popularly applied to classification and prediction problems in various fields. In this study, we try to apply CNN to stock market prediction, one of the most challenging tasks in the machine learning research. In specific, we propose to apply CNN as the binary classifier that predicts stock market direction (up or down) by using a graph as its input. That is, our proposal is to build a machine learning algorithm that mimics a person who looks at the graph and predicts whether the trend will go up or down. Our proposed model consists of four steps. In the first step, it divides the dataset into 5 days, 10 days, 15 days, and 20 days. And then, it creates graphs for each interval in step 2. In the next step, CNN classifiers are trained using the graphs generated in the previous step. In step 4, it optimizes the hyper parameters of the trained model by using the validation dataset. To validate our model, we will apply it to the prediction of KOSPI200 for 1,986 days in eight years (from 2009 to 2016). The experimental dataset will include 14 technical indicators such as CCI, Momentum, ROC and daily closing price of KOSPI200 of Korean stock market.

Keywords: convolutional neural network, deep learning, Korean stock market, stock market prediction

Procedia PDF Downloads 423
6324 Songwriting in the Postdigital Age: Using TikTok and Instagram as Online Informal Learning Technologies

Authors: Matthias Haenisch, Marc Godau, Julia Barreiro, Dominik Maxelon

Abstract:

In times of ubiquitous digitalization and the increasing entanglement of humans and technologies in musical practices in the 21st century, it is to be asked, how popular musicians learn in the (post)digital Age. Against the backdrop of the increasing interest in transferring informal learning practices into formal settings of music education the interdisciplinary research association »MusCoDA – Musical Communities in the (Post)Digital Age« (University of Erfurt/University of Applied Sciences Clara Hoffbauer Potsdam, funded by the German Ministry of Education and Research, pursues the goal to derive an empirical model of collective songwriting practices from the study of informal lelearningf songwriters and bands that can be translated into pedagogical concepts for music education in schools. Drawing on concepts from Community of Musical Practice and Actor Network Theory, lelearnings considered not only as social practice and as participation in online and offline communities, but also as an effect of heterogeneous networks composed of human and non-human actors. Learning is not seen as an individual, cognitive process, but as the formation and transformation of actor networks, i.e., as a practice of assembling and mediating humans and technologies. Based on video stimulated recall interviews and videography of online and offline activities, songwriting practices are followed from the initial idea to different forms of performance and distribution. The data evaluation combines coding and mapping methods of Grounded Theory Methodology and Situational Analysis. This results in network maps in which both the temporality of creative practices and the material and spatial relations of human and technological actors are reconstructed. In addition, positional analyses document the power relations between the participants that structure the learning process of the field. In the area of online informal lelearninginitial key research findings reveal a transformation of the learning subject through the specific technological affordances of TikTok and Instagram and the accompanying changes in the learning practices of the corresponding online communities. Learning is explicitly shaped by the material agency of online tools and features and the social practices entangled with these technologies. Thus, any human online community member can be invited to directly intervene in creative decisions that contribute to the further compositional and structural development of songs. At the same time, participants can provide each other with intimate insights into songwriting processes in progress and have the opportunity to perform together with strangers and idols. Online Lelearnings characterized by an increase in social proximity, distribution of creative agency and informational exchange between participants. While it seems obvious that traditional notions not only of lelearningut also of the learning subject cannot be maintained, the question arises, how exactly the observed informal learning practices and the subject that emerges from the use of social media as online learning technologies can be transferred into contexts of formal learning

Keywords: informal learning, postdigitality, songwriting, actor-network theory, community of musical practice, social media, TikTok, Instagram, apps

Procedia PDF Downloads 124
6323 Graph Neural Network-Based Classification for Disease Prediction in Health Care Heterogeneous Data Structures of Electronic Health Record

Authors: Raghavi C. Janaswamy

Abstract:

In the healthcare sector, heterogenous data elements such as patients, diagnosis, symptoms, conditions, observation text from physician notes, and prescriptions form the essentials of the Electronic Health Record (EHR). The data in the form of clear text and images are stored or processed in a relational format in most systems. However, the intrinsic structure restrictions and complex joins of relational databases limit the widespread utility. In this regard, the design and development of realistic mapping and deep connections as real-time objects offer unparallel advantages. Herein, a graph neural network-based classification of EHR data has been developed. The patient conditions have been predicted as a node classification task using a graph-based open source EHR data, Synthea Database, stored in Tigergraph. The Synthea DB dataset is leveraged due to its closer representation of the real-time data and being voluminous. The graph model is built from the EHR heterogeneous data using python modules, namely, pyTigerGraph to get nodes and edges from the Tigergraph database, PyTorch to tensorize the nodes and edges, PyTorch-Geometric (PyG) to train the Graph Neural Network (GNN) and adopt the self-supervised learning techniques with the AutoEncoders to generate the node embeddings and eventually perform the node classifications using the node embeddings. The model predicts patient conditions ranging from common to rare situations. The outcome is deemed to open up opportunities for data querying toward better predictions and accuracy.

Keywords: electronic health record, graph neural network, heterogeneous data, prediction

Procedia PDF Downloads 82
6322 Secrecy Analysis in Downlink Cellular Networks in the Presence of D2D Pairs and Hardware Impairment

Authors: Mahdi Rahimi, Mohammad Mahdi Mojahedian, Mohammad Reza Aref

Abstract:

In this paper, a cellular communication scenario with a transmitter and an authorized user is considered to analyze its secrecy in the face of eavesdroppers and the interferences propagated unintentionally through the communication network. It is also assumed that some D2D pairs and eavesdroppers are randomly located in the cell. Assuming hardware impairment, perfect connection probability is analytically calculated, and upper bound is provided for the secrecy outage probability. In addition, a method based on random activation of D2Ds is proposed to improve network security. Finally, the analytical results are verified by simulations.

Keywords: physical layer security, stochastic geometry, device-to-device, hardware impairment

Procedia PDF Downloads 177
6321 Cratoxy Formosum (Jack) Dyer Leaf Extract-Induced Human Breast and Liver Cancer Cells Death

Authors: Benjaporn Buranrat, Nootchanat Mairuae

Abstract:

Cratoxylum formosum (Jack) Dyer (CF) has been used for the traditional medicines in South East Asian and Thailand. Normally, northeast Thai vegetables have proven cytotoxic to many cancer cells. Therefore, the present study aims to explore the molecular mechanisms underlying CF-induced cancer cell death and apoptosis on breast and liver cancer cells. The cytotoxicity and antiproliferative effects of CF on the human breast MCF-7 and liver HepG2 cancer cell lines were evaluated using sulforhodamine B assay and colony formation assay. Cell migration assay was measured using wound healing assay. The apoptosis induction mechanisms were investigated through reactive oxygen species formation, caspase 3 activity, and JC-1 activity. Gene expression by real-time PCR and apoptosis related protein levels by Western blot analysis. CF induced MCF-7 and HepG2 cell death by time- and dose-dependent manner. Furthermore, CF had the greater cytotoxic potency on MCF-7 more than HepG2 cells with IC50 values of 85.70+4.52 μM and 219.03±9.96 μM respectively, at 24 h. Treatment with CF also caused a dose-dependent decrease in colony forming ability and cell migration, especially on MCF-7 cells. CF induced ROS formation, increased caspase 3 activities, and decreased the mitochondrial membrane potential, and causing apoptotic body production and DNA fragmentation. CF significantly decreased expression of the cell cycle regulatory protein RAC1 and downstream proteins, cdk6. Additionally, CF enhanced p21 and reduced cyclin D1 protein levels. CF leaf extract induced cell death, apoptosis, antimigration in both of MCF-7 and HepG2 cells. CF could be useful for developing to anticancer drug candidate for breast and liver cancer therapy.

Keywords: cratoxylum formosum (jack) dyer, breast cancer, liver cancer, cell death

Procedia PDF Downloads 207
6320 Colorimetric Detection of Ceftazdime through Azo Dye Formation on Polyethylenimine-Melamine Foam

Authors: Pajaree Donkhampa, Fuangfa Unob

Abstract:

Ceftazidime is an antibiotic drug commonly used to treat several human and veterinary infections. However, the presence of ceftazidime residues in the environment may induce microbial resistance and cause side effects to humans. Therefore, monitoring the level of ceftazidime in environmental resources is important. In this work, a melamine foam platform was proposed for simultaneous extraction and colorimetric detection of ceftazidime based on the azo dye formation on the surface. The melamine foam was chemically modified with polyethyleneimine (PEI) and characterized by scanning electron microscopy (SEM) and Fourier transform infrared spectroscopy (FTIR). Ceftazidime is a sample that was extracted on the PEI-modified melamine foam and further reacted with nitrite in an acidic medium to form an intermediate diazonium ion. The diazotized molecule underwent an azo coupling reaction with chromotropic acid to generate a red-colored compound. The material color changed from pale yellow to pink depending on the ceftazidime concentration. The photo of the obtained material was taken by a smartphone camera and the color intensity was determined by Image J software. The material fabrication and ceftazidime extraction and detection procedures were optimized. The detection of a sub-ppm level of ceftazidime was achieved without using a complex analytical instrument.

Keywords: colorimetric detection, ceftazidime, melamine foam, extraction, azo dye

Procedia PDF Downloads 165
6319 Energy Management System and Interactive Functions of Smart Plug for Smart Home

Authors: Win Thandar Soe, Innocent Mpawenimana, Mathieu Di Fazio, Cécile Belleudy, Aung Ze Ya

Abstract:

Intelligent electronic equipment and automation network is the brain of high-tech energy management systems in critical role of smart homes dominance. Smart home is a technology integration for greater comfort, autonomy, reduced cost, and energy saving as well. These services can be provided to home owners for managing their home appliances locally or remotely and consequently allow them to automate intelligently and responsibly their consumption by individual or collective control systems. In this study, three smart plugs are described and one of them tested on typical household appliances. This article proposes to collect the data from the wireless technology and to extract some smart data for energy management system. This smart data is to quantify for three kinds of load: intermittent load, phantom load and continuous load. Phantom load is a waste power that is one of unnoticed power of each appliance while connected or disconnected to the main. Intermittent load and continuous load take in to consideration the power and using time of home appliances. By analysing the classification of loads, this smart data will be provided to reduce the communication of wireless sensor network for energy management system.

Keywords: energy management, load profile, smart plug, wireless sensor network

Procedia PDF Downloads 268
6318 Synthesis of Gold Nanoparticles Stabilized in Na-Montmorillonite for Nitrophenol Reduction

Authors: Fatima Ammari, Meriem Chenouf

Abstract:

Synthesis of gold nano particles has attracted much attention since the pioneering discovery of the high catalytic activity of supported gold nano particles in the reaction of CO oxidation at low temperature. In this research field, we used Na-montmorillonite for gold nanoparticles stabilization; different loading percentage 1, 2 and 5%. The gold nano particles were obtained using chemical reduction method using NaBH4 as reductant agent. The obtained gold nano particles Au-mont stabilized in Na-montmorillonite were used as catalysts for reduction of 4-nitrophenol to aminophenol with sodium borohydride at room temperature. The UV-Vis results confirm directly the gold nano particles formation. The XRD and N2 adsorption results showed the formation of gold nano particles in the pores of montmorillonite with an average size of 5 nm obtained on samples with 2%Au-mont. The gold particles size increased with the increase of gold loading percentage. The reduction reaction of 4-nitrophenol into 4-aminophenol with NaBH4 catalyzed by Au-Na-montmorillonite catalyst exhibits remarkably a high activity; the reaction was completed within 9 min for 1Au-mont and within 3 min for 2Au-mont.

Keywords: chemical reduction, gold, montmorillonite, nano particles, 4-nitrophenol

Procedia PDF Downloads 326
6317 Performance Evaluation of Clustered Routing Protocols for Heterogeneous Wireless Sensor Networks

Authors: Awatef Chniguir, Tarek Farah, Zouhair Ben Jemaa, Safya Belguith

Abstract:

Optimal routing allows minimizing energy consumption in wireless sensor networks (WSN). Clustering has proven its effectiveness in organizing WSN by reducing channel contention and packet collision and enhancing network throughput under heavy load. Therefore, nowadays, with the emergence of the Internet of Things, heterogeneity is essential. Stable election protocol (SEP) that has increased the network stability period and lifetime is the first clustering protocol for heterogeneous WSN. SEP and its descendants, namely SEP, Threshold Sensitive SEP (TSEP), Enhanced TSEP (ETSSEP) and Current Energy Allotted TSEP (CEATSEP), were studied. These algorithms’ performance was evaluated based on different metrics, especially first node death (FND), to compare their stability. Simulations were conducted on the MATLAB tool considering two scenarios: The first one demonstrates the fraction variation of advanced nodes by setting the number of total nodes. The second considers the interpretation of the number of nodes while keeping the number of advanced nodes permanent. CEATSEP outperforms its antecedents by increasing stability and, at the same time, keeping a low throughput. It also operates very well in a large-scale network. Consequently, CEATSEP has a useful lifespan and energy efficiency compared to the other routing protocol for heterogeneous WSN.

Keywords: clustering, heterogeneous, stability, scalability, IoT, WSN

Procedia PDF Downloads 128
6316 Improved Benzene Selctivity for Methane Dehydroaromatization via Modifying the Zeolitic Pores by Dual Templating Approach

Authors: Deepti Mishra, K. K Pant, Xiu Song Zhao, Muxina Konarova

Abstract:

Catalytic transformation of simplest hydrocarbon methane into benzene and valuable chemicals over Mo/HZSM-5 has a great economic potential, however, it suffers serious hurdles due to the blockage in the micropores because of extensive coking at high temperature during methane dehydroaromatization (MDA). Under such conditions, it necessitates the design of micro/mesoporous ZSM-5, which has the advantages viz. uniform dispersibility of MoOx species, consequently the formation of active Mo sites in the micro/mesoporous channel and lower carbon deposition because of improved mass transfer rate within the hierarchical pores. In this study, we report a unique strategy to control the porous structures of ZSM-5 through a dual templating approach, utilizing C6 and C12 -surfactants as porogen. DFT studies were carried out to correlate the ZSM-5 framework development using the C6 and C12 surfactants with structure directing agent. The structural and morphological parameters of the synthesized ZSM-5 were explored in detail to determine the crystallinity, porosity, Si/Al ratio, particle shape, size, and acidic strength, which were further correlated with the physicochemical and catalytic properties of Mo modified HZSM-5 catalysts. After Mo incorporation, all the catalysts were tested for MDA reaction. From the activity test, it was observed that C6 surfactant-modified hierarchically porous Mo/HZSM-5(H) showed the highest benzene formation rate (1.5 μmol/gcat. s) and longer catalytic stability up to 270 min of reaction as compared to the conventional microporous Mo/HZSM-5(C). In contrary, C12 surfactant modified Mo/HZSM-5(D) is inferior towards MDA reaction (benzene formation rate: 0.5 μmol/gcat. s). We ascribed that the difference in MDA activity could be due to the hierarchically interconnected meso/microporous feature of Mo/HZSM-5(H) that precludes secondary reaction of coking from benzene and hence contributing substantial stability towards MDA reaction.

Keywords: hierarchical pores, Mo/HZSM-5, methane dehydroaromatization, coke deposition

Procedia PDF Downloads 76
6315 Cost Analysis of Optimized Fast Network Mobility in IEEE 802.16e Networks

Authors: Seyyed Masoud Seyyedoshohadaei, Borhanuddin Mohd Ali

Abstract:

To support group mobility, the NEMO Basic Support Protocol has been standardized as an extension of Mobile IP that enables an entire network to change its point of attachment to the Internet. Using NEMO in IEEE 802.16e (WiMax) networks causes latency in handover procedure and affects seamless communication of real-time applications. To decrease handover latency and service disruption time, an integrated scheme named Optimized Fast NEMO (OFNEMO) was introduced by authors of this paper. In OFNEMO a pre-establish multi tunnels concept, cross function optimization and cross layer design are used. In this paper, an analytical model is developed to evaluate total cost consisting of signaling and packet delivery costs of the OFNEMO compared with RFC3963. Results show that OFNEMO increases probability of predictive mode compared with RFC3963 due to smaller handover latency. Even though OFNEMO needs extra signalling to pre-establish multi tunnel, it has less total cost thanks to its optimized algorithm. OFNEMO can minimize handover latency for supporting real time application in moving networks.

Keywords: fast mobile IPv6, handover latency, IEEE802.16e, network mobility

Procedia PDF Downloads 193
6314 Enhancing Disaster Response Capabilities in Asia-Pacific: An Explorative Study Applied to Decision Support Tools for Logistics Network Design

Authors: Giuseppe Timperio, Robert de Souza

Abstract:

Logistics operations in the context of disaster response are characterized by a high degree of complexity due to the combined effect of a large number of stakeholders involved, time pressure, uncertainties at various levels, massive deployment of goods and personnel, and gigantic financial flow to be managed. It also involves several autonomous parties such as government agencies, militaries, NGOs, UN agencies, private sector to name few, to have a highly collaborative approach especially in the critical phase of the immediate response. This is particularly true in the context of L3 emergencies that are the most severe, large-scale humanitarian crises. Decision-making processes in disaster management are thus extremely difficult due to the presence of multiple decision-makers involved, and the complexity of the tasks being tackled. Hence, in this paper, we look at applying ICT based solutions to enable a speedy and effective decision making in the golden window of humanitarian operations. A high-level view of ICT based solutions in the context of logistics operations for humanitarian response in Southeast Asia is presented, and their viability in a real-life case about logistics network design is explored.

Keywords: decision support, disaster preparedness, humanitarian logistics, network design

Procedia PDF Downloads 162
6313 Effect of Organizational Resources on Improving Independency of People with Severe Disabilities: Vocational Rehabilitation Facilities in South Korea

Authors: Soungwan Kim

Abstract:

This paper discusses an analysis of how the characteristics of resources at vocational rehabilitation facilities for the disabled affect the improvement of independency skills among people with severe disabilities. The analysis results indicate that more internal financial resources and more connections to local communities among network resources had greater effects on improving the independency of people with severe disabilities. Based on this result, this paper presents strategies for mobilizing resources to improve the independency of people with severe disabilities at vocational rehabilitation facilities.

Keywords: vocational rehabilitation facility for people with disabilities, types of resources, independency, network resources

Procedia PDF Downloads 273
6312 Football Smart Coach: Analyzing Corner Kicks Using Computer Vision

Authors: Arth Bohra, Marwa Mahmoud

Abstract:

In this paper, we utilize computer vision to develop a tool for youth coaches to formulate set-piece tactics for their players. We used the Soccernet database to extract the ResNet features and camera calibration data for over 3000 corner kick across 500 professional matches in the top 6 European leagues (English Premier League, UEFA Champions League, Ligue 1, La Liga, Serie A, Bundesliga). Leveraging the provided homography matrix, we construct a feature vector representing the formation of players on these corner kicks. Additionally, labeling the videos manually, we obtained the pass-trajectory of each of the 3000+ corner kicks by segmenting the field into four zones. Next, after determining the localization of the players and ball, we used event data to give the corner kicks a rating on a 1-4 scale. By employing a Convolutional Neural Network, our model managed to predict the success of a corner kick given the formations of players. This suggests that with the right formations, teams can optimize the way they approach corner kicks. By understanding this, we can help coaches formulate set-piece tactics for their own teams in order to maximize the success of their play. The proposed model can be easily extended; our method could be applied to even more game situations, from free kicks to counterattacks. This research project also gives insight into the myriad of possibilities that artificial intelligence possesses in transforming the domain of sports.

Keywords: soccer, corner kicks, AI, computer vision

Procedia PDF Downloads 170
6311 The Angiogenic Activity of α-Mangostin in the Development of Zebrafish Embryo In Vivo

Authors: Titis Indah Adi Rahayu

Abstract:

Angiogenesis is the process of generating new capillary from pre-existing blood vessels. VEGFA is a major regulator in angiogenesis that binds and activates two tyrosine kinase receptors, VEGFR1 (Flt-1) and VEGFR2 (Flk-1/KDR) which regulate pathological and physiological angiogenesis. Disruption of VEGFA and VEGFR2 regulation lead to many diseases. The study of α-Mangostin (derivate of xanthone) as anti-oxidant and anti inflammation has been explored recently and both of them have relation to vasculature however the effect of α-Mangostin in blood vessel formation in healthy tissue in vivo has not been studied. Zebrafish is a powerful model in studying angiogenesis and shared many advantages that is a viable whole animal model for screening small molecules that affect blood vessel formation. Therefore the aim of this study is to evaluate angiogenic activity of α-Mangostin in healthy tissue in vivo in zebrafish embryo in relation of patterning blood vessel. Blood vessel patterning is highly characteristic in the developing of zebrafish embryo and the subintestinal vessel (SIV) can be stained and visualized microscopically as a primary screen for α-Mangostin that effect angiogenesis. The zebrafish embryos are divided into 2 groups. Group one consists of the zebrafish embryos at 1 dpf for 4 days which are tested to α-Mangostin in several concentration 2 µM, 4 µM, 6 µM, 8 µM and 10 µM whereas in group two the zebrafish larva at 4 dpf are exposed to α-Mangostin 1,75 µM, 2,3 µM, 2,9 µM, 3,8 µM dan 5 µM for 2 days. DMSO is served as a control for each group. The level expression of vegfa and vegfr2 are observed quantitatively using real time q-PCR and patterning of SIV are then analized via alkaline phospatase staining. Result shows that the level expression of vegfa and vegfr2 is repressed quantitatively as shown in real time q-PCR in the group of 1-4 days of α-Mangostin exposure where it is increased in the group of 4-6 days of α-Mangostin exposure. The result is then compared to alkaline phospatase staining of SIV using stereo microscope. It indicates that α-Mangostin does not disturb the patterning of SIV formation in zebrafish.

Keywords: angiogenesis, Danio rerio, α-Mangostin, SIV, vegfa, vegfr2

Procedia PDF Downloads 341
6310 An Approach to Building a Recommendation Engine for Travel Applications Using Genetic Algorithms and Neural Networks

Authors: Adrian Ionita, Ana-Maria Ghimes

Abstract:

The lack of features, design and the lack of promoting an integrated booking application are some of the reasons why most online travel platforms only offer automation of old booking processes, being limited to the integration of a smaller number of services without addressing the user experience. This paper represents a practical study on how to improve travel applications creating user-profiles through data-mining based on neural networks and genetic algorithms. Choices made by users and their ‘friends’ in the ‘social’ network context can be considered input data for a recommendation engine. The purpose of using these algorithms and this design is to improve user experience and to deliver more features to the users. The paper aims to highlight a broader range of improvements that could be applied to travel applications in terms of design and service integration, while the main scientific approach remains the technical implementation of the neural network solution. The motivation of the technologies used is also related to the initiative of some online booking providers that have made the fact that they use some ‘neural network’ related designs public. These companies use similar Big-Data technologies to provide recommendations for hotels, restaurants, and cinemas with a neural network based recommendation engine for building a user ‘DNA profile’. This implementation of the ‘profile’ a collection of neural networks trained from previous user choices, can improve the usability and design of any type of application.

Keywords: artificial intelligence, big data, cloud computing, DNA profile, genetic algorithms, machine learning, neural networks, optimization, recommendation system, user profiling

Procedia PDF Downloads 161