Search results for: “User acceptance of computer technology:A comparison of two theoretical models ”
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 23363

Search results for: “User acceptance of computer technology:A comparison of two theoretical models ”

5903 GAILoc: Improving Fingerprinting-Based Localization System Using Generative Artificial Intelligence

Authors: Getaneh Berie Tarekegn

Abstract:

A precise localization system is crucial for many artificial intelligence Internet of Things (AI-IoT) applications in the era of smart cities. Their applications include traffic monitoring, emergency alarming, environmental monitoring, location-based advertising, intelligent transportation, and smart health care. The most common method for providing continuous positioning services in outdoor environments is by using a global navigation satellite system (GNSS). Due to nonline-of-sight, multipath, and weather conditions, GNSS systems do not perform well in dense urban, urban, and suburban areas.This paper proposes a generative AI-based positioning scheme for large-scale wireless settings using fingerprinting techniques. In this article, we presented a novel semi-supervised deep convolutional generative adversarial network (S-DCGAN)-based radio map construction method for real-time device localization. We also employed a reliable signal fingerprint feature extraction method with t-distributed stochastic neighbor embedding (t-SNE), which extracts dominant features while eliminating noise from hybrid WLAN and long-term evolution (LTE) fingerprints. The proposed scheme reduced the workload of site surveying required to build the fingerprint database by up to 78.5% and significantly improved positioning accuracy. The results show that the average positioning error of GAILoc is less than 39 cm, and more than 90% of the errors are less than 82 cm. That is, numerical results proved that, in comparison to traditional methods, the proposed SRCLoc method can significantly improve positioning performance and reduce radio map construction costs.

Keywords: location-aware services, feature extraction technique, generative adversarial network, long short-term memory, support vector machine

Procedia PDF Downloads 50
5902 The Exploration of Persuasive Skills and Participants Characteristics in Pyramid-Sale: A Qualitative Study

Authors: Xing Yan Fan, Xing Lin Xu, Man Yuan Chen, Pei Tzu Lee, Yu Ting Wang, Yi Xiao Cao, Rui Yao

Abstract:

Pyramid sales have been a widespread issue in China. Victims who are defrauded not only lose money but damage interpersonal relationship. A deeper understanding of pyramid-sale models can be beneficial to prevent potential victims from fraud and improve the property security. The goals of this study were to detect psychological characteristics of pyramid-sale sellers, and analyse persuasive skills in pyramid organizations. A qualitative study was conducted in this study. Participants (n=6) recruited by 'snowball' sampling from present pyramid-sale sellers (n=3) and imprisoned pyramid-sale sellers (n=3). All participants accepted semi-structured interview for collecting data. Content analysis was adopted for data coding and analysis. The results indicate that pyramid organizations are used to utilize their appearance packaging and celebrity effect to strengthen the positions in participants’ mind. The status gap between pyramid-sale sellers in same organization, as well as rewards to increase reputation, are used to motivate participants in pyramid. The most significant common characteristics among all participants are that they tend to possess a high sense of belongingness within the firm. Moreover, the expression of pyramid-sale sellers on gambling mentality is expected to growth as constantly losing money. Findings suggest that the psychological characteristics of pyramid-sale sellers in accordance with Maslow’s hierarchy of needs, persuasive skills of pyramid organization confront to 'attitude-behaviour change model'. These findings have implication on 'immune education' that providing guidance for victims out of stuck and protecting ordinary people from the jeopardizing of pyramid sales.

Keywords: pyramid sales, characteristics, persuasive skills, qualitative study

Procedia PDF Downloads 240
5901 Student Performance and Confidence Analysis on Education Virtual Environments through Different Assessment Strategies

Authors: Rubén Manrique, Delio Balcázar, José Parrado, Sebastián Rodríguez

Abstract:

Hand in hand with the evolution of technology, education systems have moved to virtual environments to provide increased coverage and facilitate the access to education. However, measuring student performance in virtual environments presents significant challenges to ensure students are acquiring the expected skills. In this study, the confidence and performance of engineering students in virtual environments is analyzed through different evaluation strategies. The effect of the assessment strategy in student confidence is identified using educational data mining techniques. Four assessment strategies were used. First, a conventional multiple choice test; second, a multiple choice test with feedback; third, a multiple choice test with a second chance; and fourth; a multiple choice test with feedback and second chance. Our results show that applying testing with online feedback strategies can influence positively student confidence.

Keywords: assessment strategies, educational data mining, student performance, student confidence

Procedia PDF Downloads 339
5900 Distangling Biological Noise in Cellular Images with a Focus on Explainability

Authors: Manik Sharma, Ganapathy Krishnamurthi

Abstract:

The cost of some drugs and medical treatments has risen in recent years, that many patients are having to go without. A classification project could make researchers more efficient. One of the more surprising reasons behind the cost is how long it takes to bring new treatments to market. Despite improvements in technology and science, research and development continues to lag. In fact, finding new treatment takes, on average, more than 10 years and costs hundreds of millions of dollars. If successful, we could dramatically improve the industry's ability to model cellular images according to their relevant biology. In turn, greatly decreasing the cost of treatments and ensure these treatments get to patients faster. This work aims at solving a part of this problem by creating a cellular image classification model which can decipher the genetic perturbations in cell (occurring naturally or artificially). Another interesting question addressed is what makes the deep-learning model decide in a particular fashion, which can further help in demystifying the mechanism of action of certain perturbations and paves a way towards the explainability of the deep-learning model.

Keywords: cellular images, genetic perturbations, deep-learning, explainability

Procedia PDF Downloads 96
5899 New Types of Fitness Equipment for Seniors-Based on Beginning Movement Load Training

Authors: Chia-Chi Chen, Tai-Sheng Huang

Abstract:

Ageing society has been spread around the world. The global population is not only ageing but also declining. The structure of population has changed, which has a significant impact on both the economies and industries. Thus, how to be a healthy senior citizen to relieve the burden to the family and society will be a popular issue. Although fitness equipment manufacturing industry has been mature, the ageing population is still increasing. Therefore, this study aims to design an innovative style of fitness equipment for senior citizens, based on BMLT presented by Dr. Koyama Hirofumi. The analysis of current fitness equipment on the market and the future trend will be applied in the study. With the coming of information age, senior citizens in the future are the users of information product for sure, and the new style of fitness equipment will be combined with information technology as well. Through this study, it is believed to design an innovative style of fitness equipment for seniors and help them live heartier and happier lives.

Keywords: aging society, BMLT (Beginning Movement Load Training), seniors, new style of fitness equipment

Procedia PDF Downloads 199
5898 Assessment of Menus in a Selected Social Welfare Home with Regard to Nutritional Recommendations

Authors: E. Grochowska-Niedworok, K. Brukalo, B. Całyniuk, J. Piekorz, M. Kardas

Abstract:

The aim of the study was to assess diets of residents of nursing homes. Provided by social welfare home, 10 day menus were introduced into the computer program Diet 5 and analyzed in respect of protein, fats, carbohydrates, energy, vitamin D and calcium. The resulting mean values of 10-day menus were compared with the existing Nutrition Standards for Polish population. The analysis menus showed that the average amount of energy supplied from food is not sufficient. Carbohydrates in food supply are too high and represent 257% of normal. The average value of fats and proteins supplied with food is adequate 85.2 g/day and 75.2 g/day. The calcium content of the diet is 513.9 mg/day. The amount of vitamin D supplied in the age group 51-65 years is 2.3 µg/day. Dietary errors that have been shown are due to the lack of detailed nutritional guidelines for nursing homes, as well as state-owned care facilities in general.

Keywords: assessment of diet, essential nutrients, social welfare home, nutrition

Procedia PDF Downloads 142
5897 Surfactant-Modified Chitosan Beads: An Efficient and Cost Effective Material for Adsorptive Removal of Lead from Aqueous Solutions

Authors: Preeti Pal, Anjali Pal

Abstract:

Chitosan is an effective sorbent for removal of contaminants from wastewater. However, the ability of pure chitosan is specific because of its cationic charge. It causes repulsion in the removal process of various cationic charged molecules. The present study has been carried out for the successful removal of Pb²⁺ ions from aqueous solution by modified chitosan beads. Surface modification of chitosan (CS) beads was performed by using the anionic surfactant (AS), sodium dodecyl sulfate (SDS). Micelle aggregation property of SDS has been utilized for the formation of bilayer over the CS beads to produce surfactant modified chitosan (SMCS) beads. Prepared adsorbents were characterized by Fourier transform infrared spectroscopy (FTIR) and scanning electron microscopy (SEM) in order to find out their composition and surface morphology. SMCS beads, when compared to the pure CS beads, showed three times higher adsorption. This higher adsorption is believed to be due to the adsolubilization of Pb²⁺ ions on SDS bilayer. This bilayer provides more adsorption sites for quick and effective removal of Pb²⁺ ions from the aqueous phase. Moreover, the kinetic and adsorption isotherm models were employed to the obtained data for the description of the lead adsorption processes. It was found that the removal kinetics follows pseudo-second order model. Adsorption isotherm data fits well to the Langmuir model. The maximum adsorption capacity obtained is 100 mg/g at the dosage of 0.675 g/L for 50 mg/L of Pb²⁺. The adsorption capacity is subject to increase with increasing the Pb²⁺ ions concentration in the solution. The results indicated that the prepared hydrogel beads are efficient adsorbent for removal of Pb²⁺ ions from the aqueous medium.

Keywords: adsolubilisation, anionic surfactant, bilayer, chitosan, Pb²⁺

Procedia PDF Downloads 219
5896 Real-Time Hybrid Simulation for a Tuned Liquid Column Damper Implementation

Authors: Carlos Riascos, Peter Thomson

Abstract:

Real-time hybrid simulation (RTHS) is a modern cyber-physical technique used for the experimental evaluation of complex systems, that treats the system components with predictable behavior as a numerical substructure and the components that are difficult to model as an experimental substructure. Therefore it is an attractive method for evaluation of the response of civil structures under earthquake, wind and anthropic loads. Another practical application of RTHS is the evaluation of control systems, as these devices are often nonlinear and their characterization is an important step in the design of controllers with the desired performance. In this paper, the response of three-story shear frame controlled by a tuned liquid column damper (TLCD) and subject to base excitation is considered. Both passive and semi-active control strategies were implemented and are compared. While the passive TLCD achieved a reduction of 50% in the acceleration response of the main structure in comparison with the structure without control, the semi-active TLCD achieved a reduction of 70%, and was robust to variations in the dynamic properties of the main structure. In addition, a RTHS was implemented with the main structure modeled as a linear, time-invariant (LTI) system through a state space representation and the TLCD, with both control strategies, was evaluated on a shake table that reproduced the displacement of the virtual structure. Current assessment measures for RTHS were used to quantify the performance with parameters such as generalized amplitude, equivalent time delay between the target and measured displacement of the shake table, and energy error using the measured force, and prove that the RTHS described in this paper is an accurate method for the experimental evaluation of structural control systems.

Keywords: structural control, hybrid simulation, tuned liquid column damper, semi-active sontrol strategy

Procedia PDF Downloads 285
5895 Competitive Intelligence within the Maritime Security Intelligence

Authors: Dicky R. Munaf, Ayu Bulan Tisna

Abstract:

Competitive intelligence (business intelligence) is the process of observing the external environment which often conducted by many organizations to get the relevant information which will be used to create the organization policy, whereas, security intelligence is related to the function of the officers who have the duties to protect the country and its people from every criminal actions that might harm the national and individual security. Therefore, the intelligence dimension of maritime security is associated with all the intelligence activities including the subject and the object that connected to the maritime issues. The concept of intelligence business regarding the maritime security perspective is the efforts to protect the maritime security using the analysis of economic movements as the basic strategic plan. Clearly, a weak maritime security will cause high operational cost to all the economic activities which uses the sea as its media. Thus, it affects the competitiveness of a country compared to the other countries that are able to maintain the maritime law enforcement and secure their marine territory. So, the intelligence business within the security intelligence is important to conduct as the beginning process of the identification against the opponent strategy that might happen in the present or in the future. Thereby, the scenario of the potential impact of all the illegal maritime activities, as well as the strategy in preventing the opponent maneuver can be made.

Keywords: competitive intelligence, maritime security intelligence, intelligent systems, information technology

Procedia PDF Downloads 487
5894 Numerical Investigation of Oxy-Fuel Combustion in Gasoline Engine for Carbon Capture and Storage

Authors: Zhijun Peng, Xiang Li, Dayou Li, Raouf Mobasheri, Abdel Aitouche

Abstract:

To implement carbon capture and storage (CCS) for eliminating carbon dioxide (CO₂) emissions, this paper describes a study on oxy-fuel combustion (OFC) with an ethanol-gasoline dual-fuel spark ignition (DFSI) engine under economical oxygen consumption at low and mid-high loads which was performed by 1D simulation. It is demonstrated that under OFC mode without other optimisation, brake mean effective pressure (BMEP) can meet the requirement at mid-high load, but it has a considerable decline at low load compared to conventional air combustion (CAC) mode. Moreover, there is a considerable deterioration in brake specific fuel consumption (BSFC) compared to that of CAC mode. A practical method is proposed to optimise the DFSI engine performance under OFC mode by changing intake charge components and utilising appropriate water injection (WI) strategies.

Keywords: oxy-fuel combustion, dual-fuel spark ignition engine, ethanol, gasoline, computer simulation

Procedia PDF Downloads 76
5893 The Duty of Application and Connection Providers Regarding the Supply of Internet Protocol by Court Order in Brazil to Determine Authorship of Acts Practiced on the Internet

Authors: João Pedro Albino, Ana Cláudia Pires Ferreira de Lima

Abstract:

Humanity has undergone a transformation from the physical to the virtual world, generating an enormous amount of data on the world wide web, known as big data. Many facts that occur in the physical world or in the digital world are proven through records made on the internet, such as digital photographs, posts on social media, contract acceptances by digital platforms, email, banking, and messaging applications, among others. These data recorded on the internet have been used as evidence in judicial proceedings. The identification of internet users is essential for the security of legal relationships. This research was carried out on scientific articles and materials from courses and lectures, with an analysis of Brazilian legislation and some judicial decisions on the request of static data from logs and Internet Protocols (IPs) from application and connection providers. In this article, we will address the determination of authorship of data processing on the internet by obtaining the IP address and the appropriate judicial procedure for this purpose under Brazilian law.

Keywords: IP address, digital forensics, big data, data analytics, information and communication technology

Procedia PDF Downloads 108
5892 Code Embedding for Software Vulnerability Discovery Based on Semantic Information

Authors: Joseph Gear, Yue Xu, Ernest Foo, Praveen Gauravaran, Zahra Jadidi, Leonie Simpson

Abstract:

Deep learning methods have been seeing an increasing application to the long-standing security research goal of automatic vulnerability detection for source code. Attention, however, must still be paid to the task of producing vector representations for source code (code embeddings) as input for these deep learning models. Graphical representations of code, most predominantly Abstract Syntax Trees and Code Property Graphs, have received some use in this task of late; however, for very large graphs representing very large code snip- pets, learning becomes prohibitively computationally expensive. This expense may be reduced by intelligently pruning this input to only vulnerability-relevant information; however, little research in this area has been performed. Additionally, most existing work comprehends code based solely on the structure of the graph at the expense of the information contained by the node in the graph. This paper proposes Semantic-enhanced Code Embedding for Vulnerability Discovery (SCEVD), a deep learning model which uses semantic-based feature selection for its vulnerability classification model. It uses information from the nodes as well as the structure of the code graph in order to select features which are most indicative of the presence or absence of vulnerabilities. This model is implemented and experimentally tested using the SARD Juliet vulnerability test suite to determine its efficacy. It is able to improve on existing code graph feature selection methods, as demonstrated by its improved ability to discover vulnerabilities.

Keywords: code representation, deep learning, source code semantics, vulnerability discovery

Procedia PDF Downloads 140
5891 Increasing the System Availability of Data Centers by Using Virtualization Technologies

Authors: Chris Ewe, Naoum Jamous, Holger Schrödl

Abstract:

Like most entrepreneurs, data center operators pursue goals such as profit-maximization, improvement of the company’s reputation or basically to exist on the market. Part of those aims is to guarantee a given quality of service. Quality characteristics are specified in a contract called the service level agreement. Central part of this agreement is non-functional properties of an IT service. The system availability is one of the most important properties as it will be shown in this paper. To comply with availability requirements, data center operators can use virtualization technologies. A clear model to assess the effect of virtualization functions on the parts of a data center in relation to the system availability is still missing. This paper aims to introduce a basic model that shows these connections, and consider if the identified effects are positive or negative. Thus, this work also points out possible disadvantages of the technology. In consequence, the paper shows opportunities as well as risks of data center virtualization in relation to system availability.

Keywords: availability, cloud computing IT service, quality of service, service level agreement, virtualization

Procedia PDF Downloads 521
5890 Centrality and Patent Impact: Coupled Network Analysis of Artificial Intelligence Patents Based on Co-Cited Scientific Papers

Authors: Xingyu Gao, Qiang Wu, Yuanyuan Liu, Yue Yang

Abstract:

In the era of the knowledge economy, the relationship between scientific knowledge and patents has garnered significant attention. Understanding the intricate interplay between the foundations of science and technological innovation has emerged as a pivotal challenge for both researchers and policymakers. This study establishes a coupled network of artificial intelligence patents based on co-cited scientific papers. Leveraging centrality metrics from network analysis offers a fresh perspective on understanding the influence of information flow and knowledge sharing within the network on patent impact. The study initially obtained patent numbers for 446,890 granted US AI patents from the United States Patent and Trademark Office’s artificial intelligence patent database for the years 2002-2020. Subsequently, specific information regarding these patents was acquired using the Lens patent retrieval platform. Additionally, a search and deduplication process was performed on scientific non-patent references (SNPRs) using the Web of Science database, resulting in the selection of 184,603 patents that cited 37,467 unique SNPRs. Finally, this study constructs a coupled network comprising 59,379 artificial intelligence patents by utilizing scientific papers co-cited in patent backward citations. In this network, nodes represent patents, and if patents reference the same scientific papers, connections are established between them, serving as edges within the network. Nodes and edges collectively constitute the patent coupling network. Structural characteristics such as node degree centrality, betweenness centrality, and closeness centrality are employed to assess the scientific connections between patents, while citation count is utilized as a quantitative metric for patent influence. Finally, a negative binomial model is employed to test the nonlinear relationship between these network structural features and patent influence. The research findings indicate that network structural features such as node degree centrality, betweenness centrality, and closeness centrality exhibit inverted U-shaped relationships with patent influence. Specifically, as these centrality metrics increase, patent influence initially shows an upward trend, but once these features reach a certain threshold, patent influence starts to decline. This discovery suggests that moderate network centrality is beneficial for enhancing patent influence, while excessively high centrality may have a detrimental effect on patent influence. This finding offers crucial insights for policymakers, emphasizing the importance of encouraging moderate knowledge flow and sharing to promote innovation when formulating technology policies. It suggests that in certain situations, data sharing and integration can contribute to innovation. Consequently, policymakers can take measures to promote data-sharing policies, such as open data initiatives, to facilitate the flow of knowledge and the generation of innovation. Additionally, governments and relevant agencies can achieve broader knowledge dissemination by supporting collaborative research projects, adjusting intellectual property policies to enhance flexibility, or nurturing technology entrepreneurship ecosystems.

Keywords: centrality, patent coupling network, patent influence, social network analysis

Procedia PDF Downloads 40
5889 Role of Human Epididymis Protein 4 as a Biomarker in the Diagnosis of Ovarian Cancer

Authors: Amar Ranjan, Julieana Durai, Pranay Tanwar

Abstract:

Background &Introduction: Ovarian cancer is one of the most common malignant tumor in the female. 70% of the cases of ovarian cancer are diagnosed at an advanced stage. The five-year survival rate associated with ovarian cancer is less than 30%. The early diagnosis of ovarian cancer becomes a key factor in improving the survival rate of patients. Presently, CAl25 (carbohydrate antigen125) is used for the diagnosis and therapeutic monitoring of ovarian cancer, but its sensitivity and specificity is not ideal. The introduction of HE4, human epididymis protein 4 has attracted much attention. HE4 has a sensitivity and specificity of 72.9% and 95% for differentiating between benign and malignant adnexal masses, which is better than CA125 detection.  Methods: Serum HE4 and CA -125 were estimated using the chemiluminescence method. Our cases were 40 epithelial ovarian cancer, 9 benign ovarian tumor, 29 benign gynaecological diseases and 13 healthy individuals. This group include healthy woman those who have undergoing family planning and menopause-related medical consultations and they are negative for ovarian mass. Optimal cut off values for HE4 and CA125 were 55.89pmol/L and 40.25U/L respectively (determined by statistical analysis). Results: The level of HE4 was raised in all ovarian cancer patients (n=40) whereas CA125 levels were normal in 6/40 ovarian cancer patients, which were the cases of OC confirmed by histopathology. There is a significant decrease in the level of HE4 with comparison to CA125 in benign ovarian tumor cases. Both the levels of HE4 and CA125 were raised in the nonovarian cancer group, which includes cancer of endometrium and cervix. In the healthy group, HE4 was normal in all patients except in one case of the rudimentary horn, and the reason for this raised HE4 level is due to the incomplete development of uterus whereas CA125 was raised in 3 cases. Conclusions: Findings showed that the serum level of HE4 is an important indicator in the diagnosis of ovarian cancer, and it also distinguishes between benign and malignant pelvic masses. However, a combination of HE4 and CA125 panel will be extremely valuable in improving the diagnostic efficiency of ovarian cancer. These findings of our study need to be validated in the larger cohort of patients.

Keywords: human epididymis protein 4, ovarian cancer, diagnosis, benign lesions

Procedia PDF Downloads 116
5888 Reduction of Biofilm Formation in Closed Circuit Cooling Towers

Authors: Irfan Turetgen

Abstract:

Closed-circuit cooling towers are cooling units that operate according to the indirect cooling principle. Unlike the open-loop cooling tower, the filler material includes a closed-loop water-operated heat exchanger. The main purpose of this heat exchanger is to prevent the cooled process water from contacting with the external environment. In order to ensure that the hot water is cooled, the water is cooled by the air flow and the circulation water of the tower as it passes through the pipe. They are now more commonly used than open loop cooling towers that provide cooling with plastic filling material. As with all surfaces in contact with water, there is a biofilm formation on the outer surface of the pipe. Although biofilm has been studied very well on plastic surfaces in open loop cooling towers, studies on biofilm layer formed on the heat exchangers of the closed circuit tower have not been found. In the recent study, natural biofilm formation was observed on the heat exchangers of the closed loop tower for 6 months. At the same time, nano-silica coating, which is known to reduce the formation of the biofilm layer, a comparison was made between the two different surfaces in terms of biofilm formation potential. Test surfaces were placed into biofilm reactor along with the untreated control coupons up to 6-months period for biofilm maturation. Natural bacterial communities were monitored to analyze the impact to mimic the real-life conditions. Surfaces were monthly analyzed in situ for their microbial load using epifluorescence microscopy. Wettability is known to play a key role in biofilm formation on surfaces, because characteristics of surface properties affect the bacterial adhesion. Results showed that surface-conditioning with nano-silica significantly reduce (up to 90%) biofilm formation. Easy coating process is a facile and low-cost method to prepare hydrophobic surface without any kinds of expensive compounds or methods.

Keywords: biofilms, cooling towers, fill material, nano silica

Procedia PDF Downloads 118
5887 Experimental Study of an Isobaric Expansion Heat Engine with Hydraulic Power Output for Conversion of Low-Grade-Heat to Electricity

Authors: Maxim Glushenkov, Alexander Kronberg

Abstract:

Isobaric expansion (IE) process is an alternative to conventional gas/vapor expansion accompanied by a pressure decrease typical of all state-of-the-art heat engines. The elimination of the expansion stage accompanied by useful work means that the most critical and expensive parts of ORC systems (turbine, screw expander, etc.) are also eliminated. In many cases, IE heat engines can be more efficient than conventional expansion machines. In addition, IE machines have a very simple, reliable, and inexpensive design. They can also perform all the known operations of existing heat engines and provide usable energy in a very convenient hydraulic or pneumatic form. This paper reports measurement made with the engine operating as a heat-to-shaft-power or electricity converter and a comparison of the experimental results to a thermodynamic model. Experiments were carried out at heat source temperature in the range 30–85 °C and heat sink temperature around 20 °C; refrigerant R134a was used as the engine working fluid. The pressure difference generated by the engine varied from 2.5 bar at the heat source temperature 40 °C to 23 bar at the heat source temperature 85 °C. Using a differential piston, the generated pressure was quadrupled to pump hydraulic oil through a hydraulic motor that generates shaft power and is connected to an alternator. At the frequency of about 0.5 Hz, the engine operates with useful powers up to 1 kW and an oil pumping flowrate of 7 L/min. Depending on the temperature of the heat source, the obtained efficiency was 3.5 – 6 %. This efficiency looks very high, considering such a low temperature difference (10 – 65 °C) and low power (< 1 kW). The engine’s observed performance is in good agreement with the predictions of the model. The results are very promising, showing that the engine is a simple and low-cost alternative to ORC plants and other known energy conversion systems, especially at low temperatures (< 100 °C) and low power range (< 500 kW) where other known technologies are not economic. Thus low-grade solar, geothermal energy, biomass combustion, and waste heat with a temperature above 30 °C can be involved into various energy conversion processes.

Keywords: isobaric expansion, low-grade heat, heat engine, renewable energy, waste heat recovery

Procedia PDF Downloads 199
5886 Contention Window Adjustment in IEEE 802.11-based Industrial Wireless Networks

Authors: Mohsen Maadani, Seyed Ahmad Motamedi

Abstract:

The use of wireless technology in industrial networks has gained vast attraction in recent years. In this paper, we have thoroughly analyzed the effect of contention window (CW) size on the performance of IEEE 802.11-based industrial wireless networks (IWN), from delay and reliability perspective. Results show that the default values of CWmin, CWmax, and retry limit (RL) are far from the optimum performance due to the industrial application characteristics, including short packet and noisy environment. An adaptive CW algorithm (payload-dependent) has been proposed to minimize the average delay. Finally a simple, but effective CW and RL setting has been proposed for industrial applications which outperforms the minimum-average-delay solution from maximum delay and jitter perspective, at the cost of a little higher average delay. Simulation results show an improvement of up to 20%, 25%, and 30% in average delay, maximum delay and jitter respectively.

Keywords: average delay, contention window, distributed coordination function (DCF), jitter, industrial wireless network (IWN), maximum delay, reliability, retry limit

Procedia PDF Downloads 401
5885 Holistic Development of Children through Performing Classical Art Forms: A Study in Tamil Nadu, India

Authors: Meera Rajeev Kumar

Abstract:

An overall social, emotional, and cultural development in a child is what a parent expects. There is no point in comparing the generations of 70’s or 80’s with that of the children of today as the trends are changing drastically. Technology has enabled them to become smart as well as over smart in one way or the other. Children today are quite ignorant of today’s values or ethics and are imbibing different cultures around them and ultimately confused on what to follow. The researcher has gained experience in transmitting or imparting the traditional culture through performing arts. It is understood that the children undergo a transformation from what they knew to what the truth is, through learning and experience. Through performing arts, the child develops an emotional, quick learning, abundant creativity, and ultimately self-realisation on what is right and wrong. The child also gains good organising skills, good decision making skills, therefore summing up to a holistic development. The sample study is 50, and a random sampling technique is adopted to differentiate between a normal child and a child learning an art. The study is conducted in Tamil Nadu, in India.

Keywords: creativity, cultural, emotional, empower

Procedia PDF Downloads 185
5884 A Study of Sexual Violence on Women and Children in Hong Kong

Authors: Wing Hang Shelley Leung

Abstract:

With the rise of the recent social movement, namely #MeToo, it shows that a lot of women and children in fact suffered from sexual abuse and some even suffered from child abuse, including in Hong Kong. In view of the ongoing social movements, this paper argues that we have to look beyond their impacts and understand the roots of the problem: what if the underlying cause of the recent social movements was the inherited values that were rooted in us since we were young, or the public’s lack of confidence in the legal system when it comes to this type of personal matters? What if the movements reveal the problematic issue of the lack of protection plans, either in the private or public sphere? If the legal system is presumed to not be able to preemptively protect everyone or effectively punish all perpetrators, can other pillars provide supports to fill in the loopholes of the legal system? This paper takes a theoretical approach to look into current sexuality education, the legal system in Hong Kong and the adoption of Asian values in society to argue that difficulties that are being placed onto victims in disclosing sexual violence they had experienced. Reviews of the current system and recent sexual assaults court cases for case studies allow the research to address the issues of victims’ experience including (a) their reactions to incidents; (b) issues they have in trials; (c) psychological impacts of the incidents; and (d) their understandings of gender equality before and after incidents. The study is significant because it criticises the current legal system in Hong Kong and provides insights to the public by explaining the dynamics between the problem, the legal system and the society. Also, it contributes to the ongoing research about the psychological impacts to victims in Hong Kong, especially how they are placed in a disadvantaged position in the legal system and society and even for their recovery. It contributes to the findings of how family structures, parental responsibilities and gender studies influence a child’s perception of gender equality in Hong Kong and hence their immediate reactions to incidents. To fully address the needs of victims, especially our younger generation, as well as to prevent future harm and to raise awareness, an inclusive framework which recognizes the needs of protecting and safeguarding women and children in the private sphere and a proper education for gender equality are needed.

Keywords: child abuse, children's rights, domestic violence, gender equality, Hong Kong, Me too, sexual violence, women's rights

Procedia PDF Downloads 149
5883 Modeling of Virtual Power Plant

Authors: Muhammad Fanseem E. M., Rama Satya Satish Kumar, Indrajeet Bhausaheb Bhavar, Deepak M.

Abstract:

Keeping the right balance of electricity between the supply and demand sides of the grid is one of the most important objectives of electrical grid operation. Power generation and demand forecasting are the core of power management and generation scheduling. Large, centralized producing units were used in the construction of conventional power systems in the past. A certain level of balance was possible since the generation kept up with the power demand. However, integrating renewable energy sources into power networks has proven to be a difficult challenge due to its intermittent nature. The power imbalance caused by rising demands and peak loads is negatively affecting power quality and dependability. Demand side management and demand response were one of the solutions, keeping generation the same but altering or rescheduling or shedding completely the load or demand. However, shedding the load or rescheduling is not an efficient way. There comes the significance of virtual power plants. The virtual power plant integrates distributed generation, dispatchable load, and distributed energy storage organically by using complementing control approaches and communication technologies. This would eventually increase the utilization rate and financial advantages of distributed energy resources. Most of the writing on virtual power plant models ignored technical limitations, and modeling was done in favor of a financial or commercial viewpoint. Therefore, this paper aims to address the modeling intricacies of VPPs and their technical limitations, shedding light on a holistic understanding of this innovative power management approach.

Keywords: cost optimization, distributed energy resources, dynamic modeling, model quality tests, power system modeling

Procedia PDF Downloads 45
5882 Exploring the Effects of Transcendental Mindfulness Meditation on Anxiety Symptoms in Young Females

Authors: Claudia Cedeno Nadal, Mei-Ling Villafana, Griela Rodriguez, Jessica Martin, Jennifer Martin, Megan Patel

Abstract:

This study systematically examines the impact of Transcendental Mindfulness Meditation on anxiety symptoms in young females aged 18-25. Through a comprehensive literature review, we found consistent evidence supporting the positive influence of Transcendental Mindfulness Meditation on reducing anxiety, enhancing overall well-being, and decreasing perceived stress levels within this demographic. The mechanisms underlying these effects include heightened self-awareness, improved emotional regulation, and the development of effective stress-coping strategies. These findings have significant implications for mental health interventions targeting young females. However, the reviewed studies had some limitations, such as small sample sizes and reliance on self-report measures. To advance this field, future research should focus on larger sample sizes and utilize a broader range of measurement methods, including neuroscience assessments. Additionally, investigating the temporal relationships between Transcendental Mindfulness Meditation, proposed mediators, and anxiety symptoms will help establish causal specificity and a deeper understanding of the precise mechanisms of action. The development of integrative models based on these mechanisms can further enhance the effectiveness of Transcendental Mindfulness Meditation as an intervention for anxiety in this demographic. This study contributes to the current knowledge on the potential benefits of Transcendental Mindfulness Meditation for reducing anxiety in young females, paving the way for more targeted and effective mental health interventions in this population.

Keywords: mindfulness, meditation, anxiety, transcendental mindfulness

Procedia PDF Downloads 52
5881 Laser Additive Manufacturing of Carbon Nanotube-Reinforced Polyamide 12 Composites

Authors: Kun Zhou

Abstract:

Additive manufacturing has emerged as a disruptive technology that is capable of manufacturing products with complex geometries through an accumulation of material feedstock in a layer-by-layer fashion. Laser additive manufacturing such as selective laser sintering has excellent printing resolution, high printing speed and robust part strength, and has led to a widespread adoption in the aerospace, automotive and biomedical industries. This talk highlights and discusses the recent work we have undertaken in the development of carbon nanotube-reinforced polyamide 12 (CNT/PA12) composites printed using laser additive manufacturing. Numerical modelling studies have been conducted to simulate various processes within laser additive manufacturing of CNT/PA12 composites, and extensive experimental work has been carried out to investigate the mechanical and functional properties of the printed parts. The results from these studies grant a deeper understanding of the intricate mechanisms occurring within each process and enables an accurate optimization of process parameters for the CNT/PA12 and other polymer composites.

Keywords: CNT/PA12 composites, laser additive manufacturing, process parameter optimization, numerical modeling

Procedia PDF Downloads 139
5880 [Keynote] Implementation of Quality Control Procedures in Radiotherapy CT Simulator

Authors: B. Petrović, L. Rutonjski, M. Baucal, M. Teodorović, O. Čudić, B. Basarić

Abstract:

Purpose/Objective: Radiotherapy treatment planning requires use of CT simulator, in order to acquire CT images. The overall performance of CT simulator determines the quality of radiotherapy treatment plan, and at the end, the outcome of treatment for every single patient. Therefore, it is strongly advised by international recommendations, to set up a quality control procedures for every machine involved in radiotherapy treatment planning process, including the CT scanner/ simulator. The overall process requires number of tests, which are used on daily, weekly, monthly or yearly basis, depending on the feature tested. Materials/Methods: Two phantoms were used: a dedicated phantom CIRS 062QA, and a QA phantom obtained with the CT simulator. The examined CT simulator was Siemens Somatom Definition as Open, dedicated for radiation therapy treatment planning. The CT simulator has a built in software, which enables fast and simple evaluation of CT QA parameters, using the phantom provided with the CT simulator. On the other hand, recommendations contain additional test, which were done with the CIRS phantom. Also, legislation on ionizing radiation protection requires CT testing in defined periods of time. Taking into account the requirements of law, built in tests of a CT simulator, and international recommendations, the intitutional QC programme for CT imulator is defined, and implemented. Results: The CT simulator parameters evaluated through the study were following: CT number accuracy, field uniformity, complete CT to ED conversion curve, spatial and contrast resolution, image noise, slice thickness, and patient table stability.The following limits are established and implemented: CT number accuracy limits are +/- 5 HU of the value at the comissioning. Field uniformity: +/- 10 HU in selected ROIs. Complete CT to ED curve for each tube voltage must comply with the curve obtained at comissioning, with deviations of not more than 5%. Spatial and contrast resultion tests must comply with the tests obtained at comissioning, otherwise machine requires service. Result of image noise test must fall within the limit of 20% difference of the base value. Slice thickness must meet manufacturer specifications, and patient stability with longitudinal transfer of loaded table must not differ of more than 2mm vertical deviation. Conclusion: The implemented QA tests gave overall basic understanding of CT simulator functionality and its clinical effectiveness in radiation treatment planning. The legal requirement to the clinic is to set up it’s own QA programme, with minimum testing, but it remains user’s decision whether additional testing, as recommended by international organizations, will be implemented, so to improve the overall quality of radiation treatment planning procedure, as the CT image quality used for radiation treatment planning, influences the delineation of a tumor and calculation accuracy of treatment planning system, and finally delivery of radiation treatment to a patient.

Keywords: CT simulator, radiotherapy, quality control, QA programme

Procedia PDF Downloads 515
5879 Dual-Rail Logic Unit in Double Pass Transistor Logic

Authors: Hamdi Belgacem, Fradi Aymen

Abstract:

In this paper we present a low power, low cost differential logic unit (LU). The proposed LU receives dual-rail inputs and generates dual-rail outputs. The proposed circuit can be used in Arithmetic and Logic Units (ALU) of processor. It can be also dedicated for self-checking applications based on dual duplication code. Four logic functions as well as their inverses are implemented within a single Logic Unit. The hardware overhead for the implementation of the proposed LU is lower than the hardware overhead required for standard LU implemented with standard CMOS logic style. This new implementation is attractive as fewer transistors are required to implement important logic functions. The proposed differential logic unit can perform 8 Boolean logical operations by using only 16 transistors. Spice simulations using a 32 nm technology was utilized to evaluate the performance of the proposed circuit and to prove its acceptable electrical behaviour.

Keywords: differential logic unit, double pass transistor logic, low power CMOS design, low cost CMOS design

Procedia PDF Downloads 436
5878 The Evaluation of Electricity Generation and Consumption from Solar Generator: A Case Study at Rajabhat Suan Sunandha’s Learning Center in Samutsongkram

Authors: Chonmapat Torasa

Abstract:

This paper presents the performance of electricity generation and consumption from solar generator installed at Rajabhat Suan Sunandha’s learning center in Samutsongkram. The result from the experiment showed that solar cell began to work and distribute the current into the system when the solar energy intensity was 340 w/m2, starting from 8:00 am to 4:00 pm (duration of 8 hours). The highest intensity read during the experiment was 1,051.64w/m2. The solar power was 38.74kWh/day. The electromotive force from solar cell averagely was 93.6V. However, when connecting solar cell with the battery charge controller system, the voltage was dropped to 69.07V. After evaluating the power distribution ability and electricity load of tested solar cell, the result showed that it could generate power to 11 units of 36-wattfluorescent lamp bulbs, which was altogether 396W. In the meantime, the AC to DC power converter generated 3.55A to the load, and gave 781VA.

Keywords: solar cell, solar-cell power generating system, computer, systems engineering

Procedia PDF Downloads 305
5877 Personalized Intervention through Causal Inference in mHealth

Authors: Anna Guitart Atienza, Ana Fernández del Río, Madhav Nekkar, Jelena Ljubicic, África Periáñez, Eura Shin, Lauren Bellhouse

Abstract:

The use of digital devices in healthcare or mobile health (mHealth) has increased in recent years due to the advances in digital technology, making it possible to nudge healthy behaviors through individual interventions. In addition, mHealth is becoming essential in poor-resource settings due to the widespread use of smartphones in areas where access to professional healthcare is limited. In this work, we evaluate mHealth interventions in low-income countries with a focus on causal inference. Counterfactuals estimation and other causal computations are key to determining intervention success and assisting in empirical decision-making. Our main purpose is to personalize treatment recommendations and triage patients at the individual level in order to maximize the entire intervention's impact on the desired outcome. For this study, collected data includes mHealth individual logs from front-line healthcare workers, electronic health records (EHR), and external variables data such as environmental, demographic, and geolocation information.

Keywords: causal inference, mHealth, intervention, personalization

Procedia PDF Downloads 115
5876 Evidence-Based Practices in Education: A General Review of the Literature on Elementary Classroom Setting

Authors: Carolina S. Correia, Thalita V. Thomé, Andersen Boniolo, Dhayana I. Veiga

Abstract:

Evidence-based practices (EBP) in education is a set of principles and practices used to raise educational policy, it involves the integration of professional expertise in education with the best empirical evidence in making decisions about how to deliver instruction. The purpose of this presentation is to describe and characterize studies about EBP in education in elementary classroom setting. Data here presented is part of an ongoing systematic review research. Articles were searched and selected from four academic databases: ProQuest, Scielo, Science Direct and Capes. The search terms were evidence-based practices or program effectiveness, and education or teaching or teaching practices or teaching methods. Articles were included according to the following criteria: The studies were explicitly described as evidence-based or discussed the most effective practices in education, they discussed teaching practices in classroom context in elementary school level. Document excerpts were extracted and recorded in Excel, organized by reference, descriptors, abstract, purpose, setting, participants, type of teaching practice, study design and main results. The total amount of articles selected were 1.185, 569 articles from Proquest Research Library; 216 from CAPES; 251 from ScienceDirect and 149 from Scielo Library. The potentially relevant references were 178, from which duplicates were removed. The final number of articles analyzed was 140. From 140 articles, are 47 theoretical studies and 93 empirical articles. The following research design methods were identified: longitudinal intervention study, cluster-randomized trial, meta-analysis and pretest-posttest studies. From 140 articles, 103 studies were about regular school teaching and 37 were on special education teaching practices. In several studies, used as teaching method: active learning, content acquisition podcast (CAP), precision teaching (PT), mediated reading practice, speech therapist programs and peer-assisted learning strategies (PALS). The countries of origin of the studies were United States of America, United Kingdom, Panama, Sweden, Scotland, South Korea, Argentina, Chile, New Zealand and Brunei. The present study in is an ongoing project, so some representative findings will be discussed, providing further acknowledgment on the best teaching practices in elementary classroom setting.

Keywords: best practices, children, evidence-based education, elementary school, teaching methods

Procedia PDF Downloads 320
5875 The Impact of Unconditional and Conditional Conservatism on Cost of Equity Capital: A Quantile Regression Approach for MENA Countries

Authors: Khalifa Maha, Ben Othman Hakim, Khaled Hussainey

Abstract:

Prior empirical studies have investigated the economic consequences of accounting conservatism by examining its impact on the cost of equity capital (COEC). However, findings are not conclusive. We assume that inconsistent results of such association may be attributed to the regression models used in data analysis. To address this issue, we re-examine the effect of different dimension of accounting conservatism: unconditional conservatism (U_CONS) and conditional conservatism (C_CONS) on the COEC for a sample of listed firms from Middle Eastern and North Africa (MENA) countries, applying quantile regression (QR) approach developed by Koenker and Basset (1978). While classical ordinary least square (OLS) method is widely used in empirical accounting research, however it may produce inefficient and bias estimates in the case of departures from normality or long tail error distribution. QR method is more powerful than OLS to handle this kind of problem. It allows the coefficient on the independent variables to shift across the distribution of the dependent variable whereas OLS method only estimates the conditional mean effects of a response variable. We find as predicted that U_CONS has a significant positive effect on the COEC however, C_CONS has a negative impact. Findings suggest also that the effect of the two dimensions of accounting conservatism differs considerably across COEC quantiles. Comparing results from QR method with those of OLS, this study throws more lights on the association between accounting conservatism and COEC.

Keywords: unconditional conservatism, conditional conservatism, cost of equity capital, OLS, quantile regression, emerging markets, MENA countries

Procedia PDF Downloads 349
5874 On the Semantics and Pragmatics of 'Be Able To': Modality and Actualisation

Authors: Benoît Leclercq, Ilse Depraetere

Abstract:

The goal of this presentation is to shed new light on the semantics and pragmatics of be able to. It presents the results of a corpus analysis based on data from the BNC (British National Corpus), and discusses these results in light of a specific stance on the semantics-pragmatics interface taking into account recent developments. Be able to is often discussed in relation to can and could, all of which can be used to express ability. Such an onomasiological approach often results in the identification of usage constraints for each expression. In the case of be able to, it is the formal properties of the modal expression (unlike can and could, be able to has non-finite forms) that are in the foreground, and the modal expression is described as the verb that conveys future ability. Be able to is also argued to expressed actualised ability in the past (I was able/could to open the door). This presentation aims to provide a more accurate pragmatic-semantic profile of be able to, based on extensive data analysis and one that is embedded in a very explicit view on the semantics-pragmatics interface. A random sample of 3000 examples (1000 for each modal verb) extracted from the BNC was analysed to account for the following issues. First, the challenge is to identify the exact semantic range of be able to. The results show that, contrary to general assumption, be able to does not only express ability but it shares most of the root meanings usually associated with the possibility modals can and could. The data reveal that what is called opportunity is, in fact, the most frequent meaning of be able to. Second, attention will be given to the notion of actualisation. It is commonly argued that be able to is the preferred form when the residue actualises: (1) The only reason he was able to do that was because of the restriction (BNC, spoken) (2) It is only through my imaginative shuffling of the aces that we are able to stay ahead of the pack. (BNC, written) Although this notion has been studied in detail within formal semantic approaches, empirical data is crucially lacking and it is unclear whether actualisation constitutes a conventional (and distinguishing) property of be able to. The empirical analysis provides solid evidence that actualisation is indeed a conventional feature of the modal. Furthermore, the dataset reveals that be able to expresses actualised 'opportunities' and not actualised 'abilities'. In the final part of this paper, attention will be given to the theoretical implications of the empirical findings, and in particular to the following paradox: how can the same expression encode both modal meaning (non-factual) and actualisation (factual)? It will be argued that this largely depends on one's conception of the semantics-pragmatics interface, and that this need not be an issue when actualisation (unlike modality) is analysed as a generalised conversational implicature and thus is considered part of the conventional pragmatic layer of be able to.

Keywords: Actualisation, Modality, Pragmatics, Semantics

Procedia PDF Downloads 111