Search results for: time sensitive networking
18074 The On-Board Critical Message Transmission Design for Navigation Satellite Delay/Disruption Tolerant Network
Authors: Ji-yang Yu, Dan Huang, Guo-ping Feng, Xin Li, Lu-yuan Wang
Abstract:
The navigation satellite network, especially the Beidou MEO Constellation, can relay data effectively with wide coverage and is applied in navigation, detection, and position widely. But the constellation has not been completed, and the amount of satellites on-board is not enough to cover the earth, which makes the data-relay disrupted or delayed in the transition process. The data-relay function needs to tolerant the delay or disruption in some extension, which make the Beidou MEO Constellation a delay/disruption-tolerant network (DTN). The traditional DTN designs mainly employ the relay table as the basic of data path schedule computing. But in practical application, especially in critical condition, such as the war-time or the infliction heavy losses on the constellation, parts of the nodes may become invalid, then the traditional DTN design could be useless. Furthermore, when transmitting the critical message in the navigation system, the maximum priority strategy is used, but the nodes still inquiry the relay table to design the path, which makes the delay more than minutes. Under this circumstances, it needs a function which could compute the optimum data path on-board in real-time according to the constellation states. The on-board critical message transmission design for navigation satellite delay/disruption-tolerant network (DTN) is proposed, according to the characteristics of navigation satellite network. With the real-time computation of parameters in the network link, the least-delay transition path is deduced to retransmit the critical message in urgent conditions. First, the DTN model for constellation is established based on the time-varying matrix (TVM) instead of the time-varying graph (TVG); then, the least transition delay data path is deduced with the parameters of the current node; at last, the critical message transits to the next best node. For the on-board real-time computing, the time delay and misjudges of constellation states in ground stations are eliminated, and the residual information channel for each node can be used flexibly. Compare with the minute’s delay of traditional DTN; the proposed transmits the critical message in seconds, which improves the re-transition efficiency. The hardware is implemented in FPGA based on the proposed model, and the tests prove the validity.Keywords: critical message, DTN, navigation satellite, on-board, real-time
Procedia PDF Downloads 34318073 Novel Ultrasensitive Point of Care Device for Diagnosis of Human Schistosomiasis Mansoni
Authors: Ibrahim Aly, Waleed Elawamy, Hanan Taher, Amira Matar
Abstract:
Schistosomiasis is infection with blood flukes of the genus Schistosoma, which are acquired trans-cutaneously by swimming or wading in contaminated freshwater. The present study was proposed to produce ultra-sensitive, field-friendly high-throughput rapid immunochromatography diagnostic device for accurate detection of asymptomatic parasite carriers in schistosomiasis pre-elimination settings.For assessing diagnostic potential of rapid device, 50 blood samples from patients with schistosomiasis mansoni, 29 other proven parasitic diseases and 25 blood samples as negative control were from healthy individuals were used. The sensitivity of Quantitative antigen-capture nano-ELISAwas 82 %, and specificity was 87.1 %, where the sensitivity of Nano Dot- ELISA was 86 % and specificity was 90.7 %. The sensitivity of diagnostic device was 78 % and specificity was 85.2 %, with PPV and NPV of 86.2 % and 83.1 %, respectively.The Point of care device resulted in a good performance for the diagnosis of low-intensity infections, it was able to identify 19 out of 25 (76 %) individuals with ⩽7 eggs, 10 out of 14 individuals (71.4 %) with 11–99 eggs and 100 % of individuals with 100–399 eggs.Keywords: schistosomiasis, immunochromatography, naon-dot-ELISa, diagnostis device
Procedia PDF Downloads 7618072 A Double Acceptance Sampling Plan for Truncated Life Test Having Exponentiated Transmuted Weibull Distribution
Authors: A. D. Abdellatif, A. N. Ahmed, M. E. Abdelaziz
Abstract:
The main purpose of this paper is to design a double acceptance sampling plan under the time truncated life test when the product lifetime follows an exponentiated transmuted Weibull distribution. Here, the motive is to meet both the consumer’s risk and producer’s risk simultaneously at the specified quality levels, while the termination time is specified. A comparison between the results of the double and single acceptance sampling plans is conducted. We demonstrate the applicability of our results to real data sets.Keywords: double sampling plan, single sampling plan, producer’s risk, consumer’s risk, exponentiated transmuted weibull distribution, time truncated experiment, single, double, Marshal-Olkin
Procedia PDF Downloads 48818071 Transparent Photovoltaic Skin for Artificial Thermoreceptor and Nociceptor Memory
Authors: Priyanka Bhatnagar, Malkeshkumar Patel, Joondong Kim, Joonpyo Hong
Abstract:
Artificial skin and sensory memory platforms are produced using a flexible, transparent photovoltaic (TPV) device. The TPV device is composed of a metal oxide heterojunction (nZnO/p-NiO) and transmits visible light (> 50%) while producing substantial electric power (0.5 V and 200 μA cm-2 ). This TPV device is a transparent energy interface that can be used to detect signals and propagate information without an external energy supply. The TPV artificial skin offers a temperature detection range (0 C75 C) that is wider than that of natural skin (5 C48 °C) due to the temperature-sensitive pyrocurrent from the ZnO layer. Moreover, the TPV thermoreceptor offers sensory memory of extreme thermal stimuli. Much like natural skin, artificial skin uses the nociceptor mechanism to protect tissue from harmful damage via signal amplification (hyperalgesia) and early adaption (allodynia). This demonstrates the many features of TPV artificial skin, which can sense and transmit signals and memorize information under self-operation mode. This transparent photovoltaic skin can provide sustainable energy for use in human electronics.Keywords: transparent, photovoltaics, thermal memory, artificial skin, thermoreceptor
Procedia PDF Downloads 11018070 Analysis of the Interventions Performed in Pediatric Cardiology Unit Based on Nursing Interventions Classification (NIC-6th): A Pilot Study
Authors: Ji Wen Sun, Nan Ping Shen, Yi Bei Wu
Abstract:
This study used Nursing Interventions Classification (NIC-6th) to identify the interventions performed in a pediatric cardiology unit, and then to analysis its frequency, time and difficulty, so as to give a brief review on what our nurses have done. The research team selected a 35 beds pediatric cardiology unit, and drawn all the nursing interventions in the nursing record from our hospital information system (HIS) from 1 October 2015 to 30 November 2015, using NIC-6th to do the matching and then counting their frequencies. Then giving each intervention its own time and difficulty code according to NIC-6th. The results showed that nurses in pediatric cardiology unit performed totally 43 interventions from 5394 statements, and most of them were in RN(basic) education level needed and less than 15 minutes time needed. There still had some interventions just needed by a nursing assistant but done by nurses, which should call for nurse managers to think about the suitable staffing. Thus, counting the summary of the product of frequency, time and difficulty for each intervention of each nurse can know one's performance. Acknowledgement Clinical Management Optimization Project of Shanghai Shen Kang Hospital Development Center (SHDC2014615); Hundred-Talent Program of Construction of Nursing Plateau Discipline (hlgy16073qnhb).Keywords: nursing interventions, nursing interventions classification, nursing record, pediatric cardiology
Procedia PDF Downloads 36418069 The Search of New Laws for a Gluten Kingdom
Authors: Mohammed Saleem Tariq
Abstract:
The enthusiasm for gluten avoidance in a growing market is met by improvements in sensitive detection methods for analysing gluten content. Paradoxically, manufacturers employ no such systems in the production process but continue to market their product as gluten free, a significant risk posed to an undetermined coeliac population. The paper resonates with an immunological response that causes gastrointestinal scarring and villous atrophy with the conventional description of personal injury. The current developing regime in the UK however, it is discussed, has avoided creating specific rules to provide an adequate level of protection for this type of vulnerable ‘characteristic’. Due to the struggle involved with identifying an appropriate cause of action, this paper analyses whether a claim brought in misrepresentation, negligence and/or under the Consumer Protect Act 1987 could be sustained. A necessary comparison is then made with the approach adopted by the Americans with Disability Act 1990 which recognises this chronic disease as a disability. The ongoing failure to introduce a level of protection which matches that afforded to those who fall into any one of the ‘protected characteristics’ under the Equality Act 2010, is inconceivable given the outstanding level of legal vulnerability.Keywords: coeliac, litigation, misrepresentation, negligence
Procedia PDF Downloads 36518068 Email Phishing Detection Using Natural Language Processing and Convolutional Neural Network
Abstract:
Phishing is one of the oldest and best known scams on the Internet. It can be defined as any type of telecommunications fraud that uses social engineering tricks to obtain confidential data from its victims. It’s a cybercrime aimed at stealing your sensitive information. Phishing is generally done via private email, so scammers impersonate large companies or other trusted entities to encourage victims to voluntarily provide information such as login credentials or, worse yet, credit card numbers. The COVID-19 theme is used by cybercriminals in multiple malicious campaigns like phishing. In this environment, messaging filtering solutions have become essential to protect devices that will now be used outside of the secure perimeter. Despite constantly updating methods to avoid these cyberattacks, the end result is currently insufficient. Many researchers are looking for optimal solutions to filter phishing emails, but we still need good results. In this work, we concentrated on solving the problem of detecting phishing emails using the different steps of NLP preprocessing, and we proposed and trained a model using one-dimensional CNN. Our study results show that our model obtained an accuracy of 99.99%, which demonstrates how well our model is working.Keywords: phishing, e-mail, NLP preprocessing, CNN, e-mail filtering
Procedia PDF Downloads 12618067 Analytical Study Of Holographic Polymer Dispersed Liquid Crystals Using Finite Difference Time Domain Method
Authors: N. R. Mohamad, H. Ono, H. Haroon, A. Salleh, N. M. Z. Hashim
Abstract:
In this research, we have studied and analyzed the modulation of light and liquid crystal in HPDLCs using Finite Domain Time Difference (FDTD) method. HPDLCs are modeled as a mixture of polymer and liquid crystals (LCs) that categorized as an anisotropic medium. FDTD method is directly solves Maxwell’s equation with less approximation, so this method can analyze more flexible and general approach for the arbitrary anisotropic media. As the results from FDTD simulation, the highest diffraction efficiency occurred at ±19 degrees (Bragg angle) using p polarization incident beam to Bragg grating, Q > 10 when the pitch is 1µm. Therefore, the liquid crystal is assumed to be aligned parallel to the grating constant vector during these parameters.Keywords: birefringence, diffraction efficiency, finite domain time difference, nematic liquid crystals
Procedia PDF Downloads 46018066 Implementing Zero-Trust Security with Passwordless Authentication Gateways for Privacy-Oriented Organizations Using Keycloak
Authors: Andrei Bogdan Stanescu, Laura Diaconescu
Abstract:
With the increasing concerns about data breaches and privacy violations, organizations seek robust security measures to protect sensitive information. This research paper highlights the importance of implementing the Zero-Trust Security methodology using Passwordless Authentication Gateways that leverage Keycloak, an open-source Identity and Access Management (IAM) software, as a solution to address the security challenges these organizations face. The paper presents the successful implementation and deployment of such a solution in a mid-size, privacy-oriented organization. The implementation resulted in significant security improvements, reducing the risk of unauthorized access and potential data breaches. Moreover, user feedback indicated enhanced convenience and streamlined authentication experiences. The results of this study bring solid contributions in the field of cybersecurity and provide practical insights for organizations aiming to strengthen their security practices.Keywords: identity and access management, passwordless authentication, privacy, zero-trust security
Procedia PDF Downloads 9118065 An Improved Genetic Algorithm for Traveling Salesman Problem with Precedence Constraint
Authors: M. F. F. Ab Rashid, A. N. Mohd Rose, N. M. Z. Nik Mohamed, W. S. Wan Harun, S. A. Che Ghani
Abstract:
Traveling salesman problem with precedence constraint (TSPPC) is one of the most complex problems in combinatorial optimization. The existing algorithms to solve TSPPC cost large computational time to find the optimal solution. The purpose of this paper is to present an efficient genetic algorithm that guarantees optimal solution with less number of generations and iterations time. Unlike the existing algorithm that generates priority factor as chromosome, the proposed algorithm directly generates sequence of solution as chromosome. As a result, the proposed algorithm is capable of generating optimal solution with smaller number of generations and iteration time compare to existing algorithm.Keywords: traveling salesman problem, sequencing, genetic algorithm, precedence constraint
Procedia PDF Downloads 56018064 Cultural Tourism, The Gateway to Socioeconomic Development in Nigeria: Case Study on Osun State Nigeria
Authors: Osinubi Olufemi Bankole
Abstract:
Cultural tourism is an industry committed to making a low impact on the environment, locale culture, festival, etc. while helping to generate income and employment opportunities for the locale. Tourists who promote cultural tourism are sensitive to the cultural belief and norms that are gradually going into extinction and the rich cultural resources that abound in Nigeria. The paper focus on culture been a unique way of life of particular people that differentiates them from their neighbors. It examined the socioeconomic roles of cultural tourism to the development of Nigeria using Osun state as case study. The data collected were analyzed using simple percentage method, result shows that 35 respondents representing 87.5% agreed that cultural tourism has a significant role to play in the socioeconomic development of Nigeria. The study concluded that cultural tourism is an important aspect of the nation’s economic sector that should be given adequate consideration for economic sustainability. The researcher recommended that various investment opportunities abound in the nation’s cultural resources if well developed and maintained.Keywords: culture, development, industry, tourism
Procedia PDF Downloads 37518063 Impact of Interest and Foreign Exchange Rates Liberalization on Investment Decision in Nigeria
Authors: Kemi Olalekan Oduntan
Abstract:
This paper was carried out in order to empirical, and descriptively analysis how interest rate and foreign exchange rate liberalization influence investment decision in Nigeria. The study spanned through the period of 1985 – 2014, secondary data were restricted to relevant variables such as investment (Proxy by Gross Fixed Capital Formation) saving rate, interest rate and foreign exchange rate. Theories and empirical literature from various scholars were reviews in the paper. Ordinary Least Square regression method was used for the analysis of data collection. The result of the regression was critically interpreted and discussed. It was discovered for empirical finding that tax investment decision in Nigeria is highly at sensitive rate. Hence, all the alternative hypotheses were accepted while the respective null hypotheses were rejected as a result of interest rate and foreign exchange has significant effect on investment in Nigeria. Therefore, impact of interest rate and foreign exchange rate on the state of investment in the economy cannot be over emphasized.Keywords: interest rate, foreign exchange liberalization, investment decision, economic growth
Procedia PDF Downloads 36418062 Evaluation of Features Extraction Algorithms for a Real-Time Isolated Word Recognition System
Authors: Tomyslav Sledevič, Artūras Serackis, Gintautas Tamulevičius, Dalius Navakauskas
Abstract:
This paper presents a comparative evaluation of features extraction algorithm for a real-time isolated word recognition system based on FPGA. The Mel-frequency cepstral, linear frequency cepstral, linear predictive and their cepstral coefficients were implemented in hardware/software design. The proposed system was investigated in the speaker-dependent mode for 100 different Lithuanian words. The robustness of features extraction algorithms was tested recognizing the speech records at different signals to noise rates. The experiments on clean records show highest accuracy for Mel-frequency cepstral and linear frequency cepstral coefficients. For records with 15 dB signal to noise rate the linear predictive cepstral coefficients give best result. The hard and soft part of the system is clocked on 50 MHz and 100 MHz accordingly. For the classification purpose, the pipelined dynamic time warping core was implemented. The proposed word recognition system satisfies the real-time requirements and is suitable for applications in embedded systems.Keywords: isolated word recognition, features extraction, MFCC, LFCC, LPCC, LPC, FPGA, DTW
Procedia PDF Downloads 49618061 Analysis of Public Space Usage Characteristics Based on Computer Vision Technology - Taking Shaping Park as an Example
Authors: Guantao Bai
Abstract:
Public space is an indispensable and important component of the urban built environment. How to more accurately evaluate the usage characteristics of public space can help improve its spatial quality. Compared to traditional survey methods, computer vision technology based on deep learning has advantages such as dynamic observation and low cost. This study takes the public space of Shaping Park as an example and, based on deep learning computer vision technology, processes and analyzes the image data of the public space to obtain the spatial usage characteristics and spatiotemporal characteristics of the public space. Research has found that the spontaneous activity time in public spaces is relatively random with a relatively short average activity time, while social activities have a relatively stable activity time with a longer average activity time. Computer vision technology based on deep learning can effectively describe the spatial usage characteristics of the research area, making up for the shortcomings of traditional research methods and providing relevant support for creating a good public space.Keywords: computer vision, deep learning, public spaces, using features
Procedia PDF Downloads 7018060 Modular Probe for Basic Monitoring of Water and Air Quality
Authors: Andrés Calvillo Téllez, Marianne Martínez Zanzarric, José Cruz Núñez Pérez
Abstract:
A modular system that performs basic monitoring of both water and air quality is presented. Monitoring is essential for environmental, aquaculture, and agricultural disciplines, where this type of instrumentation is necessary for data collection. The system uses low-cost components, which allows readings close to those with high-cost probes. The probe collects readings such as the coordinates of the geographical position, as well as the time it records the target parameters of the monitored. The modules or subsystems that make up the probe are the global positioning (GPS), which shows the altitude, latitude, and longitude data of the point where the reading will be recorded, a real-time clock stage, the date marking the time, the module SD memory continuously stores data, data acquisition system, central processing unit, and energy. The system acquires parameters to measure water quality, conductivity, pressure, and temperature, and for air, three types of ammonia, dioxide, and carbon monoxide gases were censored. The information obtained allowed us to identify the schedule of modification of the parameters and the identification of the ideal conditions for the growth of microorganisms in the water.Keywords: calibration, conductivity, datalogger, monitoring, real time clock, water quality
Procedia PDF Downloads 10318059 Exploring Cybercrimes and Major Security Breaches: Assessing the Broader Fiscal Impact on Nigeria
Authors: Washima Tuleun
Abstract:
Cybercrime is a global concern, and Nigeria is not immune to its effects. This paper investigates the cybercrimes and significant cyber-attacks that have targeted businesses and institutions in Nigeria, examining their various forms and the financial and economic impacts they have on individuals, businesses, and the nation as a whole. As technological advancements rapidly evolve and online services gain widespread adoption, there has been a corresponding rise in cyber-related attacks. These attacks often target personal data, exploit system vulnerabilities, and result in the theft of sensitive information, leading to financial losses, reputational damage, and broader impacts on organizations. The study conducts a thorough review of existing literature, case studies, and statistical data to provide a comprehensive understanding of Nigeria’s cybercrime landscape. Additionally, it assesses the efforts by both the government and the private sector to address these challenges and offers recommendations for more effective strategies to mitigate and reduce their impact.Keywords: cybersecurity, telecommunications engineering, information technology, threat intelligence, vulnerability management, computing
Procedia PDF Downloads 3018058 Entropy-Based Multichannel Stationary Measure for Characterization of Non-Stationary Patterns
Authors: J. D. Martínez-Vargas, C. Castro-Hoyos, G. Castellanos-Dominguez
Abstract:
In this work, we propose a novel approach for measuring the stationarity level of a multichannel time-series. This measure is based on a stationarity definition over time-varying spectrum, and it is aimed to quantify the relation between local stationarity (single-channel) and global dynamic behavior (multichannel dynamics). To assess the proposed approach validity, we use a well known EEG-BCI database, that was constructed for separate between motor/imagery tasks. Thus, based on the statement that imagination of movements implies an increase on the EEG dynamics, we use as discriminant features the proposed measure computed over an estimation of the non-stationary components of input time-series. As measure of separability we use a t-student test, and the obtained results evidence that such measure is able to accurately detect the brain areas projected on the scalp where motor tasks are realized.Keywords: stationary measure, entropy, sub-space projection, multichannel dynamics
Procedia PDF Downloads 41218057 An Improved Method to Compute Sparse Graphs for Traveling Salesman Problem
Authors: Y. Wang
Abstract:
The Traveling salesman problem (TSP) is NP-hard in combinatorial optimization. The research shows the algorithms for TSP on the sparse graphs have the shorter computation time than those for TSP according to the complete graphs. We present an improved iterative algorithm to compute the sparse graphs for TSP by frequency graphs computed with frequency quadrilaterals. The iterative algorithm is enhanced by adjusting two parameters of the algorithm. The computation time of the algorithm is O(CNmaxn2) where C is the iterations, Nmax is the maximum number of frequency quadrilaterals containing each edge and n is the scale of TSP. The experimental results showed the computed sparse graphs generally have less than 5n edges for most of these Euclidean instances. Moreover, the maximum degree and minimum degree of the vertices in the sparse graphs do not have much difference. Thus, the computation time of the methods to resolve the TSP on these sparse graphs will be greatly reduced.Keywords: frequency quadrilateral, iterative algorithm, sparse graph, traveling salesman problem
Procedia PDF Downloads 23318056 The Association between Health-Related Quality of Life and Physical Activity in Different Domains with Other Factors in Croatian Male Police Officers
Authors: Goran Sporiš, Dinko Vuleta, Stefan Lovro
Abstract:
The purpose of the present study was to determine the associations between health-related quality of life (HRQOL) and physical activity (PA) in different domains. In this cross-sectional study, participants were 169 Croatian police officers (mean age 35.14±8.95 yrs, mean height 180.93±7.53 cm, mean weight 88.39±14.05 kg, mean body-mass index 26.90±3.39 kg/m2). The dependent variables were two general domains extracted from the HRQOL questionnaire: (1) physical component scale (PCS) and (2) mental component scale (MCS). The independent variables were job-related, transport, domestic and leisure-time PA, along with other factors: age, body-mass index, smoking status, psychological distress, socioeconomic status and time spent in sedentary behaviour. The associations between dependent and independent variables were analyzed by using multiple regression analysis. Significance was set up at p < 0.05. PCS was positively associated with leisure-time PA (β 0.28, p < 0.001) and socioeconomic status (SES) (β 0.16, p=0.005), but inversely associated with job-related PA (β -0.15, p=0.012), domestic-time PA (β -0.14, p=0.014), age (β -0.12, p=0.050), psychological distress (β -0.43, p<0.001) and sedentary behaviour (β -0.15, p=0.009). MCS was positively associated with leisure-time PA (β 0.19, p=0.013) and SES (β 0.20, p=0.002), while inversely associated with age (β -0.23, p=0.001), psychological distress (β -0.27, p<0.001) and sedentary behaviour (β -0.22, p=0.001). Our results added new information about the associations between domain-specific PA and both physical and mental component scale in police officers. Future studies should deal with the same associations in other stressful occupations.Keywords: health, fitness, police force, relations
Procedia PDF Downloads 29918055 Time and Cost Prediction Models for Language Classification Over a Large Corpus on Spark
Authors: Jairson Barbosa Rodrigues, Paulo Romero Martins Maciel, Germano Crispim Vasconcelos
Abstract:
This paper presents an investigation of the performance impacts regarding the variation of five factors (input data size, node number, cores, memory, and disks) when applying a distributed implementation of Naïve Bayes for text classification of a large Corpus on the Spark big data processing framework. Problem: The algorithm's performance depends on multiple factors, and knowing before-hand the effects of each factor becomes especially critical as hardware is priced by time slice in cloud environments. Objectives: To explain the functional relationship between factors and performance and to develop linear predictor models for time and cost. Methods: the solid statistical principles of Design of Experiments (DoE), particularly the randomized two-level fractional factorial design with replications. This research involved 48 real clusters with different hardware arrangements. The metrics were analyzed using linear models for screening, ranking, and measurement of each factor's impact. Results: Our findings include prediction models and show some non-intuitive results about the small influence of cores and the neutrality of memory and disks on total execution time, and the non-significant impact of data input scale on costs, although notably impacts the execution time.Keywords: big data, design of experiments, distributed machine learning, natural language processing, spark
Procedia PDF Downloads 12018054 Dynamics of a Susceptible-Infected-Recovered Model along with Time Delay, Modulated Incidence, and Nonlinear Treatment
Authors: Abhishek Kumar, Nilam
Abstract:
As we know that, time delay exists almost in every biological phenomenon. Therefore, in the present study, we propose a susceptible–infected–recovered (SIR) epidemic model along with time delay, modulated incidence rate of infection, and Holling Type II nonlinear treatment rate. The present model aims to provide a strategy to control the spread of epidemics. In the mathematical study of the model, it has been shown that the model has two equilibriums which are named as disease-free equilibrium (DFE) and endemic equilibrium (EE). Further, stability analysis of the model is discussed. To prove the stability of the model at DFE, we derived basic reproduction number, denoted by (R₀). With the help of basic reproduction number (R₀), we showed that the model is locally asymptotically stable at DFE when the basic reproduction number (R₀) less than unity and unstable when the basic reproduction number (R₀) is greater than unity. Furthermore, stability analysis of the model at endemic equilibrium has also been discussed. Finally, numerical simulations have been done using MATLAB 2012b to exemplify the theoretical results.Keywords: time delayed SIR epidemic model, modulated incidence rate, Holling type II nonlinear treatment rate, stability
Procedia PDF Downloads 15718053 Identification of High Stress Regions in Proximal Femur During Single-Leg Stance and Sideways Fall Using QCT-Based Finite Element Model
Authors: Hossein Kheirollahi, Yunhua Luo
Abstract:
Studying stress and strain trends in the femur and recognizing femur failure mechanism is very important for preventing hip fracture in the elderly. The aim of this study was to identify high stress and strain regions in the femur during normal walking and falling to find the mechanical behavior and failure mechanism of the femur. We developed a finite element model of the femur from the subject’s quantitative computed tomography (QCT) image and used it to identify potentially high stress and strain regions during the single-leg stance and the sideways fall. It was found that fracture may initiate from the superior region of femoral neck and propagate to the inferior region during a high impact force such as sideways fall. The results of this study showed that the femur bone is more sensitive to strain than stress which indicates the effect of strain, in addition to effect of stress, should be considered for failure analysis.Keywords: finite element analysis, hip fracture, strain, stress
Procedia PDF Downloads 50418052 Optimisation of Extraction of Phenolic Compounds in Algerian Lavandula multifida, Algeria, NW
Authors: Mustapha Mahmoud Dif, Fouzia Benali-Toumi, Mohamed Benyahia, Sofiane Bouazza, Abbes Dellal, Slimane Baha
Abstract:
L. multifida is applied to treat rheumatism and cold and has hypoglycemic and anti-inflammatory properties. The present study is to optimize the extraction of phenolic compounds in Algerian Lavandula multifida. The influences of parameters including temperature (decoction and maceration) and extraction time (15min to 45 min) on the flavonoids concentration are studied. The optimal conditions are determined and the quadratic response surfaces draw from the mathematical models. Total phenols were evaluated using Folin sicaltieu methods, total flavonoids were estimated using the Tri chloral aluminum method. The maximum concentration extracted, for total flavonoids, equal to 0.043 mg/g was achieved with decoction and extraction time of 41.55 min. However, for total phenol compounds highest concentration of 0.218 mg/g, is obtained with 45 min at 49.99°C.Keywords: L multifidi, phenolic content, optimization, time, temperature
Procedia PDF Downloads 42018051 sing Eye Tracking to Measure the Impact of Persuasion Principles in Phishing Emails
Authors: Laura Bishop, Isabel Jones, Linn Halvorsen, Angela Smith
Abstract:
Phishing emails are a form of social engineering where attackers deceive email users into revealing sensitive information or installing malware such as ransomware. Scammers often use persuasion techniques to influence email users to interact with malicious content. This study will use eye-tracking equipment to analyze how participants respond to and process Cialdini’s persuasion principles when utilized within phishing emails. Eye tracking provides insights into what is happening on the subconscious level of the brain that the participant may not be aware of. An experiment is conducted to track participant eye movements, whilst interacting with and then filing a series of persuasive emails delivered at random. Eye tracking metrics will be analyzed in relation to whether a malicious email has been identified as phishing (filed as ‘suspicious’) or not phishing (filed in any other folder). This will help determine the most influential persuasion techniques and those 'areas of interest' within an email that require intervention. The results will aid further research on how to reduce the effects of persuasion on human decision-making when interacting with phishing emails.Keywords: cybersecurity, human-centric, phishing, psychology
Procedia PDF Downloads 8318050 Antimicrobial Agents Produced by Yeasts
Authors: T. Büyüksırıt, H. Kuleaşan
Abstract:
Natural antimicrobials are used to preserve foods that can be found in plants, animals, and microorganisms. Antimicrobial substances are natural or artificial agents that produced by microorganisms or obtained semi/total chemical synthesis are used at low concentrations to inhibit the growth of other microorganisms. Food borne pathogens and spoilage microorganisms are inactivated by the use of antagonistic microorganisms and their metabolites. Yeasts can produce toxic proteins or glycoproteins (toxins) that cause inhibition of sensitive bacteria and yeast species. Antimicrobial substance producing phenotypes belonging different yeast genus were isolated from different sources. Toxins secreted by many yeast strains inhibiting the growth of other yeast strains. These strains show antimicrobial activity, inhibiting the growth of mold and bacteria. The effect of antimicrobial agents produced by yeasts can be extremely fast, and therefore may be used in various treatment procedures. Rapid inhibition of microorganisms is possibly caused by microbial cell membrane lipopolysaccharide binding and in activation (neutralization) effect. Antimicrobial agents inhibit the target cells via different mechanisms of action.Keywords: antimicrobial agents, yeast, toxic protein, glycoprotein
Procedia PDF Downloads 36318049 Mechanical Prosthesis Controlled by Brain-Computer Interface
Authors: Tianyu Cao, KIRA (Ruizhi Zhao)
Abstract:
The purpose of our research is to study the possibility of people with physical disabilities manipulating mechanical prostheses through brain-computer interface (BCI) technology. The brain-machine interface (BCI) of the neural prosthesis records signals from neurons and uses mathematical modeling to decode them, converting desired movements into body movements. In order to improve the patient's neural control, the prosthesis is given a natural feeling. It records data from sensitive areas from the body to the prosthetic limb and encodes signals in the form of electrical stimulation to the brain. In our research, the brain-computer interface (BCI) is a bridge connecting patients’ cognition and the real world, allowing information to interact with each other. The efficient work between the two is achieved through external devices. The flow of information is controlled by BCI’s ability to record neuronal signals and decode signals, which are converted into device control. In this way, we could encode information and then send it to the brain through electrical stimulation, which has significant medical application.Keywords: biomedical engineering, brain-computer interface, prosthesis, neural control
Procedia PDF Downloads 18118048 Teaching How to Speak ‘Correct’ English in No Time: An Assessment of the ‘Success’ of Professor Higgins’ Motivation in George Bernard Shaw’s Pygmalion
Authors: Armel Mbon
Abstract:
This paper examines the ‘success’ of George Bernard Shaw's main character Professor Higgins' motivation in teaching Eliza Doolittle, a young Cockney flower girl, how to speak 'correct' English in no time in Pygmalion. Notice should be given that Shaw in whose writings, language issues feature prominently, does not believe there is such a thing as perfectly correct English, but believes in the varieties of spoken English as a source of its richness. Indeed, along with his fellow phonetician Colonel Pickering, Henry Higgins succeeds in teaching Eliza that he first judges unfairly, the dialect of the upper classes and Received Pronunciation, to facilitate her social advancement. So, after six months of rigorous learning, Eliza's speech and manners are transformed, and she is able to pass herself off as a lady. Such is the success of Professor Higgins’ motivation in linguistically transforming his learner in record time. On the other side, his motivation is unsuccessful since, by the end of the play, he cannot have Eliza he believes he has shaped to his so-called good image, for wife. So, this paper aims to show, in support of the psychological approach, that in motivation, feelings, pride and prejudice cannot be combined, and that one has not to pre-judge someone’s attitude based purely on how well they speak English.Keywords: teaching, speak, in no time, success
Procedia PDF Downloads 6918047 Axial, Bending Interaction Diagrams of Reinforced Concrete Columns Exposed to Chloride Attack
Authors: Rita Greco, Giuseppe Carlo Marano
Abstract:
Chloride induced reinforcement corrosion is widely accepted to be the most frequent mechanism causing premature degradation of reinforced concrete members, whose economic and social consequences are growing up continuously. Prevention of these phenomena has a great importance in structural design, and modern Codes and Standard impose prescriptions concerning design details and concrete mix proportion for structures exposed to different external aggressive conditions, grouped in environmental classes. This paper focuses on reinforced concrete columns load carrying capacity degradation over time due to chloride induced steel pitting corrosion. The structural element is considered to be exposed to marine environment and the effects of corrosion are described by the time degradation of the axial-bending interaction diagram. Because chlorides ingress and consequent pitting corrosion propagation are both time-dependent mechanisms, the study adopts a time-variant predictive approach to evaluate the residual strength of corroded reinforced concrete columns at different lifetimes. Corrosion initiation and propagation process is modelled by taking into account all the parameters, such as external environmental conditions, concrete mix proportion, concrete cover and so on, which influence the time evolution of the corrosion phenomenon and its effects on the residual strength of RC columns.Keywords: pitting corrosion, strength deterioration, diffusion coefficient, surface chloride concentration, concrete structures, marine environment
Procedia PDF Downloads 32118046 Development of Zinc Oxide Coated Carbon Nanoparticles from Pineapples Leaves Using SOL Gel Method for Optimal Adsorption of Copper ion and Reuse in Latent Fingerprint
Authors: Bienvenu Gael Fouda Mbanga, Zikhona Tywabi-Ngeva, Kriveshini Pillay
Abstract:
This work highlighted a new method for preparing Nitrogen carbon nanoparticles fused on zinc oxide nanoparticle nanocomposite (N-CNPs/ZnONPsNC) to remove copper ions (Cu²+) from wastewater by sol-gel method and applying the metal-loaded adsorbent in latent fingerprint application. The N-CNPs/ZnONPsNC showed to be an effective sorbent for optimum Cu²+ sorption at pH 8 and 0.05 g dose. The Langmuir isotherm was found to best fit the process, with a maximum adsorption capacity of 285.71 mg/g, which was higher than most values found in other research for Cu²+ removal. Adsorption was spontaneous and endothermic at 25oC. In addition, the Cu²+-N-CNPs/ZnONPsNC was found to be sensitive and selective for latent fingerprint (LFP) recognition on a range of porous surfaces. As a result, in forensic research, it is an effective distinguishing chemical for latent fingerprint detection.Keywords: latent fingerprint, nanocomposite, adsorption, copper ions, metal loaded adsorption, adsorbent
Procedia PDF Downloads 8418045 Characterization of a LiFeOP₄ Battery Cell with Mechanical Responses
Authors: Ki-Yong Oh, Eunji Kwak, Due Su Son, Siheon Jung
Abstract:
A pouch type of 10 Ah LiFePO₄ battery cell is characterized with two mechanical responses: swelling and bulk force. Both responses vary upon the state of charge significantly, whereas voltage shows flat responses, suggesting that mechanical responses can become a sensitive gauge to characterize microstructure transformation of a battery cell. The derivative of swelling s with respect to capacity Q, (ds/dQ) and the derivative of force F with respect to capacity Q, (dF/dQ) more clearly identify phase transitions of cathode and anode electrodes in the overall charge process than the derivative of voltage V with respect to capacity Q, (dV/dQ). Especially, the force versus swelling curves over the state of charge clearly elucidates three different stiffness over the state of charge oriented from phase transitions: the α-phase, the β-phase, and the metastable solid-solution phase. The observation from mechanical responses suggests that macro-scale mechanical responses of a battery cell are directly correlated to microscopic transformation of a battery cell.Keywords: force response, LiFePO₄ battery, strain response, stress response, swelling response
Procedia PDF Downloads 170