Search results for: embedded sensor
817 Twitter Ego Networks and the Capital Markets: A Social Network Analysis Perspective of Market Reactions to Earnings Announcement Events
Authors: Gregory D. Saxton
Abstract:
Networks are everywhere: lunch ties among co-workers, golfing partnerships among employees, interlocking board-of-director connections, Facebook friendship ties, etc. Each network varies in terms of its structure -its size, how inter-connected network members are, and the prevalence of sub-groups and cliques. At the same time, within any given network, some network members will have a more important, more central position on account of their greater number of connections or their capacity as “bridges” connecting members of different network cliques. The logic of network structure and position is at the heart of what is known as social network analysis, and this paper applies this logic to the study of the stock market. Using an array of data analytics and machine learning tools, this study will examine 17 million Twitter messages discussing the stocks of the firms in the S&P 1,500 index in 2018. Each of these 1,500 stocks has a distinct Twitter discussion network that varies in terms of core network characteristics such as size, density, influence, norms and values, level of activity, and embedded resources. The study’s core proposition is that the ultimate effect of any market-relevant information is contingent on the characteristics of the network through which it flows. To test this proposition, this study operationalizes each of the core network characteristics and examines their influence on market reactions to 2018 quarterly earnings announcement events.Keywords: data analytics, investor-to-investor communication, social network analysis, Twitter
Procedia PDF Downloads 123816 The Effect of Yb3+ Concentration on Spectroscopic properties of Strontium Cerate Doped with Tm3+ and Yb3+
Authors: Yeon Woo Seo, Haeyoung Choi, Jung Hyun Jeong
Abstract:
Recently, the UC phosphors have attracted much attention owing to their wide applicability in areas such as biological fluorescence labeling, three-dimensional color displays, temperature sensor, solar cells, white light emitting diodes (WLEDs), fiber optic communication, anti-counterfeiting and other areas. The UC efficiency is mainly dependent on the host lattice and the interaction between the host lattice and doped ions. Up to date, various host matrices, such as oxides, fluorides, vanadates and phosphates, have been investigated as efficient UC luminescent hosts. Recently, oxide materials with low phonon energy have been investigated as the host matrices of UC materials due to their high chemical durability and physical stability. A series of Sr2CeO4: Tm3+/Yb3+ phosphors with different concentrations of Yb3+ ions have been successfully prepared using the high-energy ball milling method. In this study, we reported the UC luminescent properties of Tm3+/Yb3+ ions co-doped Sr2CeO4 phosphors under an excitation wavelength of 975 nm. Furthermore, the structural and morphological characteristics, as well as the UC luminescence mechanism were investigated in detail. The X-ray diffraction patterns confirmed their orthorhombic structure. Under 975 nm excitation, the emission peaks were observed at 478 nm (blue) and 652 nm (red), corresponding to the 1G4 → 3H6 and 1G4 → 3F4 transitions of Tm3+, respectively. The optimized doping concentration of Yb3+ ion was 10 mol%.Keywords: Strontium Cerate, up-conversion, luminescence, Tm3+, Yb3+
Procedia PDF Downloads 265815 Challenges in Translating Malay Idiomatic Expressions: A Study
Authors: Nor Ruba’Yah Binti Abd Rahim, Norsyahidah Binti Jaafar
Abstract:
Translating Malay idiomatic expressions into other languages presents unique challenges due to the deep cultural nuances and linguistic intricacies embedded within these expressions. This study examined these challenges through a two-pronged methodology: a comparative analysis using survey questionnaires and a quiz administered to 50 semester 6 students who are taking Translation 1 course, and in-depth interviews with their lecturers. The survey aimed to capture students’ experiences and difficulties in translating selected Malay idioms into English, highlighting common errors and misunderstandings. Complementing this, interviews with lecturers provided expert insights into the nuances of these expressions and effective translation strategies. The findings revealed that literal translations often fail to convey the intended meanings, underscoring the importance of cultural competence and contextual awareness. The study also identified key factors that contribute to successful translations, such as the translator’s familiarity with both source and target cultures and their ability to adapt expressions creatively. This research contributed to the field of translation studies by offering practical recommendations for improving the translation of idiomatic expressions, thereby enhancing cross-cultural communication. The insights gained from this study are valuable for translators, educators, and students, emphasizing the need for a nuanced approach that respects the cultural richness of the source language while ensuring clarity in the target language.Keywords: idiomatic expressions, cultural competence, translation strategies, cross-cultural communication, students’ difficulties
Procedia PDF Downloads 16814 Visual Inspection of Road Conditions Using Deep Convolutional Neural Networks
Authors: Christos Theoharatos, Dimitris Tsourounis, Spiros Oikonomou, Andreas Makedonas
Abstract:
This paper focuses on the problem of visually inspecting and recognizing the road conditions in front of moving vehicles, targeting automotive scenarios. The goal of road inspection is to identify whether the road is slippery or not, as well as to detect possible anomalies on the road surface like potholes or body bumps/humps. Our work is based on an artificial intelligence methodology for real-time monitoring of road conditions in autonomous driving scenarios, using state-of-the-art deep convolutional neural network (CNN) techniques. Initially, the road and ego lane are segmented within the field of view of the camera that is integrated into the front part of the vehicle. A novel classification CNN is utilized to identify among plain and slippery road textures (e.g., wet, snow, etc.). Simultaneously, a robust detection CNN identifies severe surface anomalies within the ego lane, such as potholes and speed bumps/humps, within a distance of 5 to 25 meters. The overall methodology is illustrated under the scope of an integrated application (or system), which can be integrated into complete Advanced Driver-Assistance Systems (ADAS) systems that provide a full range of functionalities. The outcome of the proposed techniques present state-of-the-art detection and classification results and real-time performance running on AI accelerator devices like Intel’s Myriad 2/X Vision Processing Unit (VPU).Keywords: deep learning, convolutional neural networks, road condition classification, embedded systems
Procedia PDF Downloads 135813 Programming without Code: An Approach and Environment to Conditions-On-Data Programming
Authors: Philippe Larvet
Abstract:
This paper presents the concept of an object-based programming language where tests (if... then... else) and control structures (while, repeat, for...) disappear and are replaced by conditions on data. According to the object paradigm, by using this concept, data are still embedded inside objects, as variable-value couples, but object methods are expressed into the form of logical propositions (‘conditions on data’ or COD).For instance : variable1 = value1 AND variable2 > value2 => variable3 = value3. Implementing this approach, a central inference engine turns and examines objects one after another, collecting all CODs of each object. CODs are considered as rules in a rule-based system: the left part of each proposition (left side of the ‘=>‘ sign) is the premise and the right part is the conclusion. So, premises are evaluated and conclusions are fired. Conclusions modify the variable-value couples of the object and the engine goes to examine the next object. The paper develops the principles of writing CODs instead of complex algorithms. Through samples, the paper also presents several hints for implementing a simple mechanism able to process this ‘COD language’. The proposed approach can be used within the context of simulation, process control, industrial systems validation, etc. By writing simple and rigorous conditions on data, instead of using classical and long-to-learn languages, engineers and specialists can easily simulate and validate the functioning of complex systems.Keywords: conditions on data, logical proposition, programming without code, object-oriented programming, system simulation, system validation
Procedia PDF Downloads 222812 Design and Implementation Wireless System by Using Microcontrollers.Application for Drive Acquisition System with Multiple Sensors
Authors: H. Fekhar
Abstract:
Design and implementation acquisition system using radio frequency (RF) ASK module and micro controllers PIC is proposed in this work. The paper includes hardware and software design. The design tools are divided into two units , namely the sender MCU and receiver.The system was designed to measure temperatures of two furnaces and pressure pneumatic process. The wireless transmitter unit use the 433.95 MHz band directly interfaced to micro controller PIC18F4620. The sender unit consists of temperatures-pressure sensors , conditioning circuits , keypad GLCD display and RF module.Signal conditioner converts the output of the sensors into an electric quantity suitable for operation of the display and recording system.The measurements circuits are connected directly to 10 bits multiplexed A/D converter.The graphic liquid crystal display (GLCD) is used . The receiver (RF) module connected to a second microcontroller ,receive the signal via RF receiver , decode the Address/data and reproduces the original data . The strategy adopted for establishing communication between the sender MCU and receiver uses the specific protocol “Header, Address and data”.The communication protocol dealing with transmission and reception have been successfully implemented . Some experimental results are provided to demonstrate the effectiveness of the proposed wireless system. This embedded system track temperatures – pressure signal reasonably well with a small error.Keywords: microcontrollers, sensors, graphic liquid cristal display, protocol, temperature, pressure
Procedia PDF Downloads 461811 Hybrid Equity Warrants Pricing Formulation under Stochastic Dynamics
Authors: Teh Raihana Nazirah Roslan, Siti Zulaiha Ibrahim, Sharmila Karim
Abstract:
A warrant is a financial contract that confers the right but not the obligation, to buy or sell a security at a certain price before expiration. The standard procedure to value equity warrants using call option pricing models such as the Black–Scholes model had been proven to contain many flaws, such as the assumption of constant interest rate and constant volatility. In fact, existing alternative models were found focusing more on demonstrating techniques for pricing, rather than empirical testing. Therefore, a mathematical model for pricing and analyzing equity warrants which comprises stochastic interest rate and stochastic volatility is essential to incorporate the dynamic relationships between the identified variables and illustrate the real market. Here, the aim is to develop dynamic pricing formulations for hybrid equity warrants by incorporating stochastic interest rates from the Cox-Ingersoll-Ross (CIR) model, along with stochastic volatility from the Heston model. The development of the model involves the derivations of stochastic differential equations that govern the model dynamics. The resulting equations which involve Cauchy problem and heat equations are then solved using partial differential equation approaches. The analytical pricing formulas obtained in this study comply with the form of analytical expressions embedded in the Black-Scholes model and other existing pricing models for equity warrants. This facilitates the practicality of this proposed formula for comparison purposes and further empirical study.Keywords: Cox-Ingersoll-Ross model, equity warrants, Heston model, hybrid models, stochastic
Procedia PDF Downloads 131810 Micromechanics Modeling of 3D Network Smart Orthotropic Structures
Authors: E. M. Hassan, A. L. Kalamkarov
Abstract:
Two micromechanical models for 3D smart composite with embedded periodic or nearly periodic network of generally orthotropic reinforcements and actuators are developed and applied to cubic structures with unidirectional orientation of constituents. Analytical formulas for the effective piezothermoelastic coefficients are derived using the Asymptotic Homogenization Method (AHM). Finite Element Analysis (FEA) is subsequently developed and used to examine the aforementioned periodic 3D network reinforced smart structures. The deformation responses from the FE simulations are used to extract effective coefficients. The results from both techniques are compared. This work considers piezoelectric materials that respond linearly to changes in electric field, electric displacement, mechanical stress and strain and thermal effects. This combination of electric fields and thermo-mechanical response in smart composite structures is characterized by piezoelectric and thermal expansion coefficients. The problem is represented by unit-cell and the models are developed using the AHM and the FEA to determine the effective piezoelectric and thermal expansion coefficients. Each unit cell contains a number of orthotropic inclusions in the form of structural reinforcements and actuators. Using matrix representation of the coupled response of the unit cell, the effective piezoelectric and thermal expansion coefficients are calculated and compared with results of the asymptotic homogenization method. A very good agreement is shown between these two approaches.Keywords: asymptotic homogenization method, finite element analysis, effective piezothermoelastic coefficients, 3D smart network composite structures
Procedia PDF Downloads 400809 Design of Demand Pacemaker Using an Embedded Controller
Authors: C. Bala Prashanth Reddy, B. Abhinay, C. Sreekar, D. V. Shobhana Priscilla
Abstract:
The project aims in designing an emergency pacemaker which is capable of giving shocks to a human heart which has stopped working suddenly. A pacemaker is a machine commonly used by cardiologists. This machine is used in order to shock a human’s heart back into usage. The way the heart works is that there are small cells called pacemakers sending electrical pulses to cardiac muscles that tell the heart when to pump blood. When these electrical pulses stop, the heart stops beating. When this happens, a pacemaker is used to shock the heart muscles and the pacemakers back into action. The way this is achieved is by rubbing the two panels of the pacemaker together to create an adequate electrical current, and then the heart gets back to the normal state. The project aims in designing a system which is capable of continuously displaying the heart beat and blood pressure of a person on LCD. The concerned doctor gets the heart beat and also the blood pressure details continuously through the GSM Modem in the form of SMS alerts. In case of abnormal condition, the doctor sends message format regarding the amount of electric shock needed. Automatically the microcontroller gives the input to the pacemaker which in turn gives the shock to the patient. Heart beat monitor and display system is a portable and a best replacement for the old model stethoscope which is less efficient. The heart beat rate is calculated manually using stethoscope where the probability of error is high because the heart beat rate lies in the range of 70 to 90 per minute whose occurrence is less than 1 sec, so this device can be considered as a very good alternative instead of a stethoscope.Keywords: missing R wave, PWM, demand pacemaker, heart
Procedia PDF Downloads 482808 A Building Structure Health Monitoring DeviceBased on Cost Effective 1-Axis Accelerometers
Authors: Chih Hsing Lin, Wen-Ching Chen, Ssu-Ying Chen, Chih-Chyau Yang, Chien-Ming Wu, Chun-Ming Huang
Abstract:
Critical structures such as buildings, bridges and dams require periodic inspections to ensure safe operation. The reliable inspection of structures can be achieved by combing temperature sensor and accelerometers. In this work, we propose a building structure health monitoring device (BSHMD) with using three 1-axis accelerometers, gateway, analog to digital converter (ADC), and data logger to monitoring the building structure. The proposed BSHMD achieves the features of low cost by using three 1-axis accelerometers with the data synchronization problem being solved, and easily installation and removal. Furthermore, we develop a packet acquisition program to receive the sensed data and then classify it based on time and date. Compared with 3-axis accelerometer, our proposed 1-axis accelerometers based device achieves 64.3% cost saving. Compared with previous structural monitoring device, the BSHMD achieves 89% area saving. Therefore, with using the proposed device, the realtime diagnosis system for building damage monitoring can be conducted effectively.Keywords: building structure health monitoring, cost effective, 1-axis accelerometers, real-time diagnosis
Procedia PDF Downloads 372807 Towards Human-Interpretable, Automated Learning of Feedback Control for the Mixing Layer
Authors: Hao Li, Guy Y. Cornejo Maceda, Yiqing Li, Jianguo Tan, Marek Morzynski, Bernd R. Noack
Abstract:
We propose an automated analysis of the flow control behaviour from an ensemble of control laws and associated time-resolved flow snapshots. The input may be the rich database of machine learning control (MLC) optimizing a feedback law for a cost function in the plant. The proposed methodology provides (1) insights into the control landscape, which maps control laws to performance, including extrema and ridge-lines, (2) a catalogue of representative flow states and their contribution to cost function for investigated control laws and (3) visualization of the dynamics. Key enablers are classification and feature extraction methods of machine learning. The analysis is successfully applied to the stabilization of a mixing layer with sensor-based feedback driving an upstream actuator. The fluctuation energy is reduced by 26%. The control replaces unforced Kelvin-Helmholtz vortices with subsequent vortex pairing by higher-frequency Kelvin-Helmholtz structures of lower energy. These efforts target a human interpretable, fully automated analysis of MLC identifying qualitatively different actuation regimes, distilling corresponding coherent structures, and developing a digital twin of the plant.Keywords: machine learning control, mixing layer, feedback control, model-free control
Procedia PDF Downloads 225806 Notions of Social Justice and Educational Globalization: Evaluations of Israeli Teachers and Students across Sectors
Authors: Clara Sabbagh, Nura Resh
Abstract:
The study delves into students’ and teachers’ notions of social justice (social justice judgments or SJJ), examining how they are shaped by both educational globalization and local (nation-state) conditions. Using the Israeli school setting as a case study, we discuss the status of hegemonic Zionism and two influential perspectives of educational globalization – world culture and the post-colonial critique of neo-liberalism – and derive competing hypotheses about the notions of social justice embedded in them. Against this background, we investigate how SJJ are affected by generation – Israeli teachers and students – and by educational sectors that mirror the society’s major divide: Jewish and Israeli Arab. In order to examine these issues, we used a representative sample of 2000 Israeli students, as well as a sample of 800 social studies teachers. We applied MANOVA repeated-measure for examining to what extent SSJ are dependent upon the type of resource that is distributed (repeated measures) and generational (teachers vs students) and sectorial (Jewish vs. Arab) group variables. As expected, findings revealed that the local context does matter. In other words, rather than being consistent with any of the three perspectives above, findings suggest that respondents elaborate the intersection between global and local traditions by creating various forms of mingled notions of social justice. In other words, Israeli (Jewish and Arab) teachers and students can be conceived as agents who play an important role in recreating national heritages and who differently interpret the ways educational globalization impacts their lives.Keywords: educational globalization, social justice, teachers, Israel, Arab
Procedia PDF Downloads 227805 Understanding the Multilingualism of the Mauritian Multilingual Primary School Learner and Translanguaging: A Linguistic Ethnographic Study
Authors: Yesha Devi Mahadeo-Doorgakant
Abstract:
The Mauritian landscape is well-known for its multilingualism with the daily interaction of the number of languages that are used in the island; namely Kreol Morisien, the European languages (English and French) and the Oriental/Asian languages (Hindi, Arabic/Urdu, Tamil, Telegu, Marathi, Mandarin, etc.). However, within Mauritius’ multilingual educational system, English is the official medium of instruction while French is taught as compulsory subject till upper secondary and oriental languages are offered as optional languages at primary level. Usually, Mauritians choose one oriental language based on their ethnic/religious identity, when they start their primary schooling as an additional language to learn. In January 2012, Kreol Morisien, which is the considered the language of daily interaction of the majority of Mauritians, was introduced as an optional subject at primary level, taught at the same time as the oriental languages. The introduction of Kreol Morisien has spurred linguistic debates about the issue of multilingualism within the curriculum. Taking this into account, researchers have started pondering on the multilingual educational system of the country and questioning whether the current language curriculum caters for the complex everyday linguistic reality of the multilingual Mauritian learner, given most learners are embedded within an environment where the different languages interact with each other daily. This paper, therefore, proposes translanguaging as being a more befitting theoretical lens through which the multilingualism and the linguistic repertoire of Mauritian learners’ can best be understood.Keywords: multilingualism, translanguaging, multilingual learner, linguistic ethnography
Procedia PDF Downloads 171804 Battery Grading Algorithm in 2nd-Life Repurposing LI-Ion Battery System
Authors: Ya L. V., Benjamin Ong Wei Lin, Wanli Niu, Benjamin Seah Chin Tat
Abstract:
This article introduces a methodology that improves reliability and cyclability of 2nd-life Li-ion battery system repurposed as an energy storage system (ESS). Most of the 2nd-life retired battery systems in the market have module/pack-level state-of-health (SOH) indicator, which is utilized for guiding appropriate depth-of-discharge (DOD) in the application of ESS. Due to the lack of cell-level SOH indication, the different degrading behaviors among various cells cannot be identified upon reaching retired status; in the end, considering end-of-life (EOL) loss and pack-level DOD, the repurposed ESS has to be oversized by > 1.5 times to complement the application requirement of reliability and cyclability. This proposed battery grading algorithm, using non-invasive methodology, is able to detect outlier cells based on historical voltage data and calculate cell-level historical maximum temperature data using semi-analytic methodology. In this way, the individual battery cell in the 2nd-life battery system can be graded in terms of SOH on basis of the historical voltage fluctuation and estimated historical maximum temperature variation. These grades will have corresponding DOD grades in the application of the repurposed ESS to enhance system reliability and cyclability. In all, this introduced battery grading algorithm is non-invasive, compatible with all kinds of retired Li-ion battery systems which lack of cell-level SOH indication, as well as potentially being embedded into battery management software for preventive maintenance and real-time cyclability optimization.Keywords: battery grading algorithm, 2nd-life repurposing battery system, semi-analytic methodology, reliability and cyclability
Procedia PDF Downloads 204803 Blood Glucose Level Measurement from Breath Analysis
Authors: Tayyab Hassan, Talha Rehman, Qasim Abdul Aziz, Ahmad Salman
Abstract:
The constant monitoring of blood glucose level is necessary for maintaining health of patients and to alert medical specialists to take preemptive measures before the onset of any complication as a result of diabetes. The current clinical monitoring of blood glucose uses invasive methods repeatedly which are uncomfortable and may result in infections in diabetic patients. Several attempts have been made to develop non-invasive techniques for blood glucose measurement. In this regard, the existing methods are not reliable and are less accurate. Other approaches claiming high accuracy have not been tested on extended dataset, and thus, results are not statistically significant. It is a well-known fact that acetone concentration in breath has a direct relation with blood glucose level. In this paper, we have developed the first of its kind, reliable and high accuracy breath analyzer for non-invasive blood glucose measurement. The acetone concentration in breath was measured using MQ 138 sensor in the samples collected from local hospitals in Pakistan involving one hundred patients. The blood glucose levels of these patients are determined using conventional invasive clinical method. We propose a linear regression classifier that is trained to map breath acetone level to the collected blood glucose level achieving high accuracy.Keywords: blood glucose level, breath acetone concentration, diabetes, linear regression
Procedia PDF Downloads 173802 US-Iran Hostage Crisis by the Metaphor of Argo in the Light of Post-Modernist Post-Colonial and Realist Theories
Authors: Hatice Idil Gorgen
Abstract:
This paper argues that discourses and textuality which is literary tool of Western ethnocentrism create aggressive foreign policy against the West by Non-West countries. Quasi-colonial experiences create an inferiority complex on officially or not colonized areas by reconstructing their identity. This reconstructed identity leads revolution and resistance movement to feel secure themselves as a psychological defense against colonial powers. Knowledge learned by successful implementation of discourses grants right to has power for authority, in addition to serving as a tool to reinforce power of authority by its cognitive traits on foreign policy decision making. The combination of these points contributes to shaping and then make predictable state policies. In the methodology of paper, secondary data was firstly reviewed through university library using a range of sources such as academic abstract, OPAC system, bibliography databases and internet search engines. The film of Argo was used to strengthen and materialize theoretical explanations as a metaphor. This paper aims to highlight the cumulative effects on the construction of the identity throughout embedded discourses by textuality. To demonstrate it by a metaphor, Argo will be used as a primary source for good story-telling about history. U.S-Iran hostage crisis is mainly applied by aiming to see foundations Iran’s behavior in the context of its revolutionary identity and major influences of actions of U.S on it.Keywords: discourse, post colonialism, post modernism, objectivity
Procedia PDF Downloads 160801 Students' Perception of Virtual Learning Environment (VLE) Skills in Setting up the Simulator Welding Technology
Authors: Mohd Afif Md Nasir, Faizal Amin Nur Yunus, Jamaluddin Hashim, Abd Samad Hassan Basari, A. Halim Sahelan
Abstract:
The aim of this study is to identify the suitability of Virtual Learning Environment (VLE) in welding simulator application towards Computer-Based Training (CBT) in developing skills upon new students at the Advanced Technology Training Center (ADTEC), Batu Pahat, Johor, Malaysia and GIATMARA, Batu Pahat, Johor, Malaysia. The purpose of the study is to create a computer-based skills development approach in welding technology among new students in ADTEC and GIATMARA, as well as cultivating the elements of general skills among them. This study is also important in elevating the number of individual knowledge workers (K-workers) working in manufacturing industry in order to achieve a national vision which is to be an industrial nation in the year of 2020. The design of the study is a survey type of research which uses questionnaires as the instruments and 136 students from ADTEC and GIATMARA were interviewed. Descriptive analysis is used to identify the frequency and mean values. The findings of the study shows that the welding technology skills have developed in the students as a result of the application of VLE simulator at a high level and the respondents agreed that the skills could be embedded through the application of the VLE simulator. In summary, the VLE simulator is suitable in welding skills development training in terms of exposing new students with the relevant characteristics of welding skills and at the same time spurring the students’ interest towards learning more about the skills.Keywords: computer-based training (CBT), knowledge workers (K-workers), virtual learning environment, welding simulator, welding technology
Procedia PDF Downloads 349800 Machine Learning Based Smart Beehive Monitoring System Without Internet
Authors: Esra Ece Var
Abstract:
Beekeeping plays essential role both in terms of agricultural yields and agricultural economy; they produce honey, wax, royal jelly, apitoxin, pollen, and propolis. Nowadays, these natural products become more importantly suitable and preferable for nutrition, food supplement, medicine, and industry. However, to produce organic honey, majority of the apiaries are located in remote or distant rural areas where utilities such as electricity and Internet network are not available. Additionally, due to colony failures, world honey production decreases year by year despite the increase in the number of beehives. The objective of this paper is to develop a smart beehive monitoring system for apiaries including those that do not have access to Internet network. In this context, temperature and humidity inside the beehive, and ambient temperature were measured with RFID sensors. Control center, where all sensor data was sent and stored at, has a GSM module used to warn the beekeeper via SMS when an anomaly is detected. Simultaneously, using the collected data, an unsupervised machine learning algorithm is used for detecting anomalies and calibrating the warning system. The results show that the smart beehive monitoring system can detect fatal anomalies up to 4 weeks prior to colony loss.Keywords: beekeeping, smart systems, machine learning, anomaly detection, apiculture
Procedia PDF Downloads 241799 Molecular Dynamics Simulation for Vibration Analysis at Nanocomposite Plates
Authors: Babak Safaei, A. M. Fattahi
Abstract:
Polymer/carbon nanotube nanocomposites have a wide range of promising applications Due to their enhanced properties. In this work, free vibration analysis of single-walled carbon nanotube-reinforced composite plates is conducted in which carbon nanotubes are embedded in an amorphous polyethylene. The rule of mixture based on various types of plate model namely classical plate theory (CLPT), first-order shear deformation theory (FSDT), and higher-order shear deformation theory (HSDT) was employed to obtain fundamental frequencies of the nanocomposite plates. Generalized differential quadrature (GDQ) method was used to discretize the governing differential equations along with the simply supported and clamped boundary conditions. The material properties of the nanocomposite plates were evaluated using molecular dynamic (MD) simulation corresponding to both short-(10,10) SWCNT and long-(10,10) SWCNT composites. Then the results obtained directly from MD simulations were fitted with those calculated by the rule of mixture to extract appropriate values of carbon nanotube efficiency parameters accounting for the scale-dependent material properties. The selected numerical results are presented to address the influences of nanotube volume fraction and edge supports on the value of fundamental frequency of carbon nanotube-reinforced composite plates corresponding to both long- and short-nanotube composites.Keywords: nanocomposites, molecular dynamics simulation, free vibration, generalized, differential quadrature (GDQ) method
Procedia PDF Downloads 330798 Determination of Bisphenol A and Uric Acid by Modified Single-Walled Carbon Nanotube with Magnesium Layered Hydroxide 3-(4-Methoxyphenyl)Propionic Acid Nanocomposite
Authors: Illyas Md Isa, Maryam Musfirah Che Sobry, Mohamad Syahrizal Ahmad, Nurashikin Abd Azis
Abstract:
A single-walled carbon nanotube (SWCNT) that has been modified with magnesium layered hydroxide 3-(4-methoxyphenyl)propionic acid nanocomposite was proposed for the determination of uric acid and bisphenol A by square wave voltammetry. The results obtained denote that MLH-MPP nanocomposites enhance the sensitivity of the voltammetry detection responses. The best performance is shown by the modified carbon nanotube paste electrode (CNTPE) with the composition of single-walled carbon nanotube: magnesium layered hydroxide 3-(4-methoxyphenyl)propionic acid nanocomposite at 100:15 (% w/w). The linear range where the sensor works well is within the concentration 1.0 10-7 – 1.0 10-4 and 3.0 10-7 – 1.0 10-4 for uric acid and bisphenol A respectively with the limit of detection of 1.0 10-7 M for both organics. The interferences of uric acid and bisphenol A with other organic were studied and most of them did not interfere. The results shown for each experimental parameter on the proposed CNTPE showed that it has high sensitivity, good selectivity, repeatability and reproducibility. Therefore, the modified CNTPE can be used for the determination of uric acid and bisphenol A in real samples such as blood, plastic bottles and foods.Keywords: bisphenol A, magnesium layered hydroxide 3-(4-methoxyphenyl)propionic acid nanocomposite, Nanocomposite, uric acid
Procedia PDF Downloads 212797 Strap Tension Adjusting Device for Non-Invasive Positive Pressure Ventilation Mask Fitting
Authors: Yoshie Asahara, Hidekuni Takao
Abstract:
Non-invasive positive pressure ventilation (NPPV), a type of ventilation therapy, is a treatment in which a mask is attached to the patient's face and delivers gas into the mask to support breathing. The NPPV mask uses a strap, which is necessary to attach and secure the mask in the appropriate facial position, but the tensile strength of the strap is adjusted by the sensation of the hands. The strap uniformity and fine-tuning strap tension are judged by the skill of the operator and the amount felt by the finger. In the future, additional strap operation and adjustment methods will be required to meet the needs for reducing the burden on the patient’s face. In this study, we fabricated a mechanism that can measure, adjust and fix the tension of the straps. A small amount of strap tension can be adjusted by rotating the shaft. This makes it possible to control the slight strap tension that is difficult to grasp with the sense of the operator's hand. In addition, this mechanism allows the operator to control the strap while controlling the movement of the mask body. This leads to the establishment of a suitable mask fitting method for each patient. The developed mechanism enables the operation and fine reproducible adjustment of the strap tension and the mask balance, reducing the burden on the face.Keywords: balance of the mask strap, fine adjustment, film sensor, mask fitting technique, mask strap tension
Procedia PDF Downloads 240796 Vertical Uplift Capacity of a Group of Equally Spaced Helical Screw Anchors in Sand
Authors: Sanjeev Mukherjee, Satyendra Mittal
Abstract:
This paper presents the experimental investigations on the behaviour of a group of single, double and triple helical screw anchors embedded vertically at the same level in sand. The tests were carried out on one, two, three and four numbers of anchors in sand for different depths of embedment keeping shallow and deep mode of behaviour in mind. The testing program included 48 tests conducted on three model anchors installed in sand whose density kept constant throughout the tests. It was observed that the ultimate pullout load varied significantly with the installation depth of the anchor and the number of anchors. The apparent coefficient of friction (f*) between anchor and soil was also calculated based on the test results. It was found that the apparent coefficient of friction varies between 1.02 and 4.76 for 1, 2, 3, and 4 numbers of single, double and triple helical screw anchors. Plate load tests conducted on model soil showed that the value of ф increases from 35o for virgin soil to 48o for soil with four double screw helical anchors. The graphs of ultimate pullout capacity of a group of two, three and four no. of anchors with respect to one anchor were plotted and design equations have been proposed correlating them. Based on these findings, it has been concluded that the load-displacement relationships for all groups can be reduced to a common curve. A 3-D finite element model, PLAXIS, was used to confirm the results obtained from laboratory tests and the agreement is excellent.Keywords: apparent coefficient of friction, helical screw anchor, installation depth, plate load test
Procedia PDF Downloads 556795 Message Authentication Scheme for Vehicular Ad-Hoc Networks under Sparse RSUs Environment
Authors: Wen Shyong Hsieh, Chih Hsueh Lin
Abstract:
In this paper, we combine the concepts of chameleon hash function (CHF) and identification based cryptography (IBC) to build a message authentication environment for VANET under sparse RSUs. Based on the CHF, TA keeps two common secrets that will be embedded to all identities to be as the evidence of mutual trusting. TA will issue one original identity to every RSU and vehicle. An identity contains one public ID and one private key. The public ID, includes three components: pseudonym, random key, and public key, is used to present one entity and can be verified to be a legal one. The private key is used to claim the ownership of the public ID. Based on the concept of IBC, without any negotiating process, a CHF pairing key multiplied by one private key and other’s public key will be used for mutually trusting and to be utilized as the session key of secure communicating between RSUs and vehicles. To help the vehicles to do message authenticating, the RSUs are assigned to response the vehicle’s temple identity request using two short time secretes that are broadcasted by TA. To light the loading of request information, one day is divided into M time slots. At every time slot, TA will broadcast two short time secretes to all valid RSUs for that time slot. Any RSU can response the temple identity request from legal vehicles. With the collected announcement of public IDs from the neighbor vehicles, a vehicle can set up its neighboring set, which includes the information about the neighbor vehicle’s temple public ID and temple CHF pairing key that can be derived by the private key and neighbor’s public key and will be used to do message authenticating or secure communicating without the help of RSU.Keywords: Internet of Vehicles (IOV), Vehicular Ad-hoc Networks (VANETs), Chameleon Hash Function (CHF), message authentication
Procedia PDF Downloads 392794 Mobile Augmented Reality for Collaboration in Operation
Authors: Chong-Yang Qiao
Abstract:
Mobile augmented reality (MAR) tracking targets from the surroundings and aids operators for interactive data and procedures visualization, potential equipment and system understandably. Operators remotely communicate and coordinate with each other for the continuous tasks, information and data exchange between control room and work-site. In the routine work, distributed control system (DCS) monitoring and work-site manipulation require operators interact in real-time manners. The critical question is the improvement of user experience in cooperative works through applying Augmented Reality in the traditional industrial field. The purpose of this exploratory study is to find the cognitive model for the multiple task performance by MAR. In particular, the focus will be on the comparison between different tasks and environment factors which influence information processing. Three experiments use interface and interaction design, the content of start-up, maintenance and stop embedded in the mobile application. With the evaluation criteria of time demands and human errors, and analysis of the mental process and the behavior action during the multiple tasks, heuristic evaluation was used to find the operators performance with different situation factors, and record the information processing in recognition, interpretation, judgment and reasoning. The research will find the functional properties of MAR and constrain the development of the cognitive model. Conclusions can be drawn that suggest MAR is easy to use and useful for operators in the remote collaborative works.Keywords: mobile augmented reality, remote collaboration, user experience, cognition model
Procedia PDF Downloads 198793 Detection of Leptospira interrogans in Kidney and Urine of water Buffalo and its Relationship with Histopathological and Serological Findings
Authors: M. R. Haji Hajikolaei, A. A. Nikvand, A. R. Ghadrdan, M. Ghorbanpoor, B. Mohammadian
Abstract:
This study was carried out on water buffalo for detection of Leptospira interrogans in kidney and urine and its relationship with serological findings. Blood, urine and kidney samples were taken immediately after slaughter from 353 water buffalos at Ahvaz abattoir in Khouzestan province, Iran. Sera were initially screened at serum dilution of 1:100 against seven live antigens of Leptospira interrogans: pomona, hardjo, ballum, icterohemorrhagiae, tarasovi, australis and grippotyphosa using the microscopic agglutination test (MAT) and sera with positive results were titrated against reacting antigens in serial twofold dilution from 1:100 to 1:800. The samples of kidney were embedded in paraffin wax and 5µm thick sections were stained routinely with Haematoxylin and Eosin (H&E). Polymerase chain reaction (PCR) examination was done on urine and kidney by using LipL32 gene primers. Antibodies against one or more serovars at dilution >:100 were detected in sera. The most frequent reactor was hardjo (56.2%), followed by pomona (52.3%), australis (9.8%), tarassovi (5.9%), grippotyphosa (4.5%) and icterohaemorrhagiae (3.9%). The L. interrogans were detected in 43 (12.2%) of examined buffaloes, so that 26 (8.2%) of kidney tissues, 14 (4.8%) of urine samples separately and 3 (0.84%) of both kidney and urine samples were positive in PCR. From 153 (43.3%) buffaloes with positive MAT, 24 cases were positive by PCR of kidney and/or urine samples, synchronously. Renal lesions such as interstitial nephritis, acute tubular necrosis (ATN), pyelonephritis, glomerolonephritis, renal fibrosis and hydronephrosis were found in 128 (36.3%) cases. Statistical analysis indicated that there was no significant association between results of MAT, PCR and interstitial nephritis.Keywords: leptospiral infection, PCR, MAT, histopathology, river buffalo
Procedia PDF Downloads 332792 De/Reconstructing the Notion of Women as Perpetrators of Terrorism: The Case of Boko Haram
Authors: Damilohun D. Ayoyo, Anthony Mpiani, Temitope B. Oriola
Abstract:
The debate on women’s roles in insurgencies and terrorist organizations continues to garner scholarly attention. While some scholars view women insurgents and terrorists as perpetrators, others have argued that they are non-agents and victims. This paper de/reconstructs the notion of ‘women as perpetrators’ of terrorism. Drawing on the narratives of rescued female Boko Haram operatives, and Boko Haram’s tactics for recruiting and deploying women and girls, the paper advances three main arguments. First, the growing social construction of women as perpetrators of terrorism – particularly radical Islamic terrorism – downplays the socio-cultural and structural processes leading to women’s involvement with terrorist organizations. Second, women agency in Boko Haram activities is better understood when grounded in the cultural and structural contexts of Northern Nigeria, Boko Haram’s construction of ‘female,’ and the experiences of female Boko Haram operatives. Third, the mechanisms through which female Boko Haram operatives are recruited and deployed make them more of non-agents and victims than perpetrators of terrorism. The paper draws on the agency-structure approach and argues that the gendered power asymmetries embedded in the cultures and structures of Northern Nigeria –the base of Boko Haram– contribute to the nature and dynamics of women’s involvement in the insurgency. Although the paper does not negate the agency of women in terrorism, it aligns with the studies that consider women insurgents as more victims than perpetrators of terror.Keywords: Boko Haram, female agency, Northern Nigeria, patriarchy, perpetrator of terror, radical Islamic terrorism, sharia, victim of terror, women insurgents
Procedia PDF Downloads 123791 Healthcare Social Entrepreneurship: A Positive Theory Applied to the Case of YOU Foundation in Nepal
Authors: Simone Rondelli, Damiano Rondelli, Bishesh Poudyal, Juan Jose Cabrera-Lazarini
Abstract:
One of the main obstacles for Social Entrepreneurship is to find a business model that is financially sustainable. In other words, the captured value generates enough cash flow to ensure business continuity and reinvestment for growth. Providing Health Services in poor countries for the uninsured population affected by a high-cost chronical disease is not the exception for this challenge. As a prime example, cancer has become a high impact on a global disease not only because of the high morbidity but also of the financial impact on both the patient family and health services in underdeveloped countries. Therefore, it is relevant to find a Social Entrepreneurship Model that provides affordable treatment for this disease while maintaining healthy finances not only for the patient but also for the organization providing the treatment. Using the methodology of Constructive Research, this paper applied a Positive Theory and four business models of Social Entrepreneurship to a case of a Private Foundation model whose mission is to address the challenge previously described. It was found that the Foundation analyzed, in this case, is organized as an Embedded Business Model and complies with the four propositions of the Positive Theory considered. It is recommended for this Private Foundation to explore implementing the Integrated Business Model to ensure more robust sustainability in the long term. It evolves as a scalable model that can attract investors interested in contributing to expanding this initiative globally.Keywords: affordable treatment, global healthcare, social entrepreneurship theory, sustainable business model
Procedia PDF Downloads 145790 Presuppositions and Implicatures in Four Selected Speeches of Osama Bin Laden's Legitimisation of 'Jihad'
Authors: Sawsan Al-Saaidi, Ghayth K. Shaker Al-Shaibani
Abstract:
This paper investigates certain linguistics properties of four selected speeches by Al-Qaeda’s former leader Osama bin Laden who legitimated the use of jihad by Muslims in various countries when he was alive. The researchers adopt van Dijk’s (2009; 1998) Socio-Cognitive approach and Ideological Square theory respectively. Socio-Cognitive approach revolves around various cognitive, socio-political, and discursive aspects that can be found in political discourse as in Osama bin Laden’s one. The political discourse can be defined in terms of textual properties and contextual models. Pertaining to the ideological square, it refers to positive self-presentation and negative other-presentation which help to enhance the textual and contextual analyses. Therefore, among the most significant properties in Osama bin Laden’s discourse are the use of presuppositions and implicatures which are based on background knowledge and contextual models as well. Thus, the paper concludes that Osama bin Laden used a number of manipulative strategies which augmented and embellished the use of ‘jihad’ in order to develop a more effective discourse for his audience. In addition, the findings have revealed that bin Laden used different implicit and embedded interpretations of different topics which have been accepted as taken-for-granted truths for him to legitimate Jihad against his enemies. There are many presuppositions in the speeches analysed that result in particular common-sense assumptions and a world-view about the selected speeches. More importantly, the assumptions in the analysed speeches help consolidate the ideological analysis in terms of in-group and out-group members.Keywords: Al-Qaeda, cognition, critical discourse analysis, Osama Bin Laden, jihad, implicature, legitimisation, presupposition, political discourse
Procedia PDF Downloads 240789 Speed Breaker/Pothole Detection Using Hidden Markov Models: A Deep Learning Approach
Authors: Surajit Chakrabarty, Piyush Chauhan, Subhasis Panda, Sujoy Bhattacharya
Abstract:
A large proportion of roads in India are not well maintained as per the laid down public safety guidelines leading to loss of direction control and fatal accidents. We propose a technique to detect speed breakers and potholes using mobile sensor data captured from multiple vehicles and provide a profile of the road. This would, in turn, help in monitoring roads and revolutionize digital maps. Incorporating randomness in the model formulation for detection of speed breakers and potholes is crucial due to substantial heterogeneity observed in data obtained using a mobile application from multiple vehicles driven by different drivers. This is accomplished with Hidden Markov Models, whose hidden state sequence is found for each time step given the observables sequence, and are then fed as input to LSTM network with peephole connections. A precision score of 0.96 and 0.63 is obtained for classifying bumps and potholes, respectively, a significant improvement from the machine learning based models. Further visualization of bumps/potholes is done by converting time series to images using Markov Transition Fields where a significant demarcation among bump/potholes is observed.Keywords: deep learning, hidden Markov model, pothole, speed breaker
Procedia PDF Downloads 145788 Intelligent Decision Support for Wind Park Operation: Machine-Learning Based Detection and Diagnosis of Anomalous Operating States
Authors: Angela Meyer
Abstract:
The operation and maintenance cost for wind parks make up a major fraction of the park’s overall lifetime cost. To minimize the cost and risk involved, an optimal operation and maintenance strategy requires continuous monitoring and analysis. In order to facilitate this, we present a decision support system that automatically scans the stream of telemetry sensor data generated from the turbines. By learning decision boundaries and normal reference operating states using machine learning algorithms, the decision support system can detect anomalous operating behavior in individual wind turbines and diagnose the involved turbine sub-systems. Operating personal can be alerted if a normal operating state boundary is exceeded. The presented decision support system and method are applicable for any turbine type and manufacturer providing telemetry data of the turbine operating state. We demonstrate the successful detection and diagnosis of anomalous operating states in a case study at a German onshore wind park comprised of Vestas V112 turbines.Keywords: anomaly detection, decision support, machine learning, monitoring, performance optimization, wind turbines
Procedia PDF Downloads 167