Search results for: Wenrui Huang
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 583

Search results for: Wenrui Huang

343 A Robust and Adaptive Unscented Kalman Filter for the Air Fine Alignment of the Strapdown Inertial Navigation System/GPS

Authors: Jian Shi, Baoguo Yu, Haonan Jia, Meng Liu, Ping Huang

Abstract:

Adapting to the flexibility of war, a large number of guided weapons launch from aircraft. Therefore, the inertial navigation system loaded in the weapon needs to undergo an alignment process in the air. This article proposes the following methods to the problem of inaccurate modeling of the system under large misalignment angles, the accuracy reduction of filtering caused by outliers, and the noise changes in GPS signals: first, considering the large misalignment errors of Strapdown Inertial Navigation System (SINS)/GPS, a more accurate model is made rather than to make a small-angle approximation, and the Unscented Kalman Filter (UKF) algorithms are used to estimate the state; then, taking into account the impact of GPS noise changes on the fine alignment algorithm, the innovation adaptive filtering algorithm is introduced to estimate the GPS’s noise in real-time; at the same time, in order to improve the anti-interference ability of the air fine alignment algorithm, a robust filtering algorithm based on outlier detection is combined with the air fine alignment algorithm to improve the robustness of the algorithm. The algorithm can improve the alignment accuracy and robustness under interference conditions, which is verified by simulation.

Keywords: air alignment, fine alignment, inertial navigation system, integrated navigation system, UKF

Procedia PDF Downloads 166
342 Study on Security and Privacy Issues of Mobile Operating Systems Based on Malware Attacks

Authors: Huang Dennis, Aurelio Aziel, Burra Venkata Durga Kumar

Abstract:

Nowadays, smartphones and mobile operating systems have been popularly widespread in our daily lives. As people use smartphones, they tend to store more private and essential data on their devices, because of this it is very important to develop more secure mobile operating systems and cloud storage to secure the data. However, several factors can cause security risks in mobile operating systems such as malware, malicious app, phishing attacks, ransomware, and more, all of which can cause a big problem for users as they can access the user's private data. Those problems can cause data loss, financial loss, identity theft, and other serious consequences. Other than that, during the pandemic, people will use their mobile devices more and do all sorts of transactions online, which may lead to more victims of online scams and inexperienced users being the target. With the increase in attacks, researchers have been actively working to develop several countermeasures to enhance the security of operating systems. This study aims to provide an overview of the security and privacy issues in mobile operating systems, identifying the potential risk of operating systems, and the possible solutions. By examining these issues, we want to provide an easy understanding to users and researchers to improve knowledge and develop more secure mobile operating systems.

Keywords: mobile operating system, security, privacy, Malware

Procedia PDF Downloads 88
341 Performance of On-site Earthquake Early Warning Systems for Different Sensor Locations

Authors: Ting-Yu Hsu, Shyu-Yu Wu, Shieh-Kung Huang, Hung-Wei Chiang, Kung-Chun Lu, Pei-Yang Lin, Kuo-Liang Wen

Abstract:

Regional earthquake early warning (EEW) systems are not suitable for Taiwan, as most destructive seismic hazards arise due to in-land earthquakes. These likely cause the lead-time provided by regional EEW systems before a destructive earthquake wave arrives to become null. On the other hand, an on-site EEW system can provide more lead-time at a region closer to an epicenter, since only seismic information of the target site is required. Instead of leveraging the information of several stations, the on-site system extracts some P-wave features from the first few seconds of vertical ground acceleration of a single station and performs a prediction of the oncoming earthquake intensity at the same station according to these features. Since seismometers could be triggered by non-earthquake events such as a passing of a truck or other human activities, to reduce the likelihood of false alarms, a seismometer was installed at three different locations on the same site and the performance of the EEW system for these three sensor locations were discussed. The results show that the location on the ground of the first floor of a school building maybe a good choice, since the false alarms could be reduced and the cost for installation and maintenance is the lowest.

Keywords: earthquake early warning, on-site, seismometer location, support vector machine

Procedia PDF Downloads 244
340 A Study on the Stabilization of the Swell Behavior of Basic Oxygen Furnace Slag by Using Geopolymer Technology

Authors: K. Y. Lin, W. H. Lee, T. W. Cheng, S. W. Huang

Abstract:

Basic Oxygen Furnace (BOF) Slag is a by-product of iron making. It has great engineering properties, such as, high hardness and density, high compressive strength, low abrasion ratio, and can replace natural aggregate for building materials. However, the main problem for BOF slag is expansion, due to it contains free lime or free magnesium. The purpose of this study was to stabilize the BOF slag by using geopolymeric technology, hoping can prevent BOF slag expansion. Geopolymer processes contain a large amount of free silicon. These free silicon can react with free-lime or free magnesium oxide in BOF slag, and thus to form stable compound, therefore inhibit the expansion of the BOF slag. In this study for the successful preparation of geopolymer mortar with BOF slag, and their main properties are analyzed with regard to their use as building materials. Autoclave is used to study the volume stability of these geopolymer mortar. Finally, the compressive strength of geopolymer mortar with BOF slag can be reached 33MPa in 28 days. After autoclave testing, the volume expansion does not exceed 0.2%. Even after the autoclave test, the compressive strength can increase to 35MPa. According to the research results can be proved that using geopolymer technology for stabilizing BOF slag is very effective.

Keywords: BOF slag, autoclave test, geopolymer, swell behavior

Procedia PDF Downloads 136
339 The Influence of C Element on the Phase Transformation in Weldment of Complex Stainless Steels 2507/316/316L

Authors: Lin Dong-Yih, Yang S. M., Huang B. W., Lian J. A.

Abstract:

Super duplex stainless steel has excellent mechanical properties and corrosion resistance. It becomes important structural material as its application has been extended to the fields such as renewable energy and the chemical industry because of its excellent properties. As examples are offshore wind power, solar cell machinery, and pipes in the chemical industry. The mechanical properties and corrosion resistance of super duplex stainless steel can be eliminated by welding due to the precipitation of the hard and brittle σ phase, which is rich of chromium, and molybdenum elements. This paper studies the influence of carbon element on the phase transformation of -ferrite and σ phase in 2507 super duplex stainless steel. The 2507 will be under argon gas protection welded with 316 and 316L extra low carbon stainless steel separately. The microstructural phases of stainless steels before and after welding, in fusion, heat affected zones, and base material will be studied via X-ray, OM, SEM, EPMA i.e. their quantity, size, distribution, and morphology. The influences of diffusion by carbon element will be compared according to the microstructures, hardness, and corrosion tests.

Keywords: complex stainless steel, welding, phase formation, carbon element, sigma phase, delta ferrite

Procedia PDF Downloads 99
338 Application of a Generalized Additive Model to Reveal the Relations between the Density of Zooplankton with Other Variables in the West Daya Bay, China

Authors: Weiwen Li, Hao Huang, Chengmao You, Jianji Liao, Lei Wang, Lina An

Abstract:

Zooplankton are a central issue in the ecology which makes a great contribution to maintaining the balance of an ecosystem. It is critical in promoting the material cycle and energy flow within the ecosystems. A generalized additive model (GAM) was applied to analyze the relationships between the density (individuals per m³) of zooplankton and other variables in West Daya Bay. All data used in this analysis (the survey month, survey station (longitude and latitude), the depth of the water column, the superficial concentration of chlorophyll a, the benthonic concentration of chlorophyll a, the number of zooplankton species and the number of zooplankton species) were collected through monthly scientific surveys during January to December 2016. GLM model (generalized linear model) was used to choose the significant variables’ impact on the density of zooplankton, and the GAM was employed to analyze the relationship between the density of zooplankton and the significant variables. The results showed that the density of zooplankton increased with an increase of the benthonic concentration of chlorophyll a, but decreased with a decrease in the depth of the water column. Both high numbers of zooplankton species and the overall total number of zooplankton individuals led to a higher density of zooplankton.

Keywords: density, generalized linear model, generalized additive model, the West Daya Bay, zooplankton

Procedia PDF Downloads 151
337 Stack Overflow Detection and Prevention on Operating Systems Using Machine Learning and Control-Flow Enforcement Technology

Authors: Cao Jiayu, Lan Ximing, Huang Jingjia, Burra Venkata Durga Kumar

Abstract:

The first virus to attack personal computers was born in early 1986, called C-Brain, written by a pair of Pakistani brothers. In those days, people still used dos systems, manipulating computers with the most basic command lines. In the 21st century today, computer performance has grown geometrically. But computer viruses are also evolving and escalating. We never stop fighting against security problems. Stack overflow is one of the most common security vulnerabilities in operating systems. It may result in serious security issues for an operating system if a program in it has a vulnerability with administrator privileges. Certain viruses change the value of specific memory through a stack overflow, allowing computers to run harmful programs. This study developed a mechanism to detect and respond to time whenever a stack overflow occurs. We demonstrate the effectiveness of standard machine learning algorithms and control flow enforcement techniques in predicting computer OS security using generating suspicious vulnerability functions (SVFS) and associated suspect areas (SAS). The method can minimize the possibility of stack overflow attacks occurring.

Keywords: operating system, security, stack overflow, buffer overflow, machine learning, control-flow enforcement technology

Procedia PDF Downloads 115
336 A Building Structure Health Monitoring DeviceBased on Cost Effective 1-Axis Accelerometers

Authors: Chih Hsing Lin, Wen-Ching Chen, Ssu-Ying Chen, Chih-Chyau Yang, Chien-Ming Wu, Chun-Ming Huang

Abstract:

Critical structures such as buildings, bridges and dams require periodic inspections to ensure safe operation. The reliable inspection of structures can be achieved by combing temperature sensor and accelerometers. In this work, we propose a building structure health monitoring device (BSHMD) with using three 1-axis accelerometers, gateway, analog to digital converter (ADC), and data logger to monitoring the building structure. The proposed BSHMD achieves the features of low cost by using three 1-axis accelerometers with the data synchronization problem being solved, and easily installation and removal. Furthermore, we develop a packet acquisition program to receive the sensed data and then classify it based on time and date. Compared with 3-axis accelerometer, our proposed 1-axis accelerometers based device achieves 64.3% cost saving. Compared with previous structural monitoring device, the BSHMD achieves 89% area saving. Therefore, with using the proposed device, the realtime diagnosis system for building damage monitoring can be conducted effectively.

Keywords: building structure health monitoring, cost effective, 1-axis accelerometers, real-time diagnosis

Procedia PDF Downloads 369
335 The Influence of Attachment Style on Sexual Health Beliefs and Risk of Hypoactive Sexual Desire Disorder (HSDD) In Chinese Women

Authors: Luo Lan, Huang Jingjing, Li Huafang

Abstract:

Hypoactive sexual desire disorder (HSDD) was common in China, and Chinese women's sexual health-seeking behaviors were found to be mainly impeded by their psychological barriers. However, underlying mechanisms for such unhealthy sexual health attitudes and symptoms of HSDD were unknown. Many studies suggested the correlation between women's psychological barriers, HSDD and attachment style but had limitations, so this study further explored their relationship. Chinese women of childbearing age were recruited from May 2020 to December 2022 in Shanghai, China. The Revised Adult Attachment Scale (RAAS), the Female Sexual Function Index (FSFI), the Female Sexual Distress Scale-Desire/Arousal/Orgasm (FSDS-DAO), a sexual health attitude questionnaire, and a psychiatric interview were administered. The analytic sample contained 279 women, of which 107 women were HSDD patients. Women with a fearful attachment style were found to be more likely to be unwilling to communicate sexual health (aOR 2.55, 95%CI 1.05-6.28) and feel ashamed of sexual health-related disorders (aOR 2.66, 95%CI 1.14-6.13). They are also linked with a higher risk of HSDD (aOR 3.25, 95%CI 1.35-8.12). Therefore, fearful attachment style should be given enough attention in the whole process of the diagnosis and treatment of HSDD and should be one of the focuses that guide sexual education.

Keywords: attachment style, hypoactive sexual desire disorder, attitude to health, sexual desire, sexual distress

Procedia PDF Downloads 162
334 Allostatic Load as a Predictor of Adolescents’ Executive Function: A Longitudinal Network Analysis

Authors: Sipu Guo, Silin Huang

Abstract:

Background: Most studies investigate the link between executive function and allostatic load (AL) among adults aged 18 years and older. Studies differed regarding the specific biological indicators studied and executive functions accounted for. Specific executive functions may be differentially related to allostatic load. We investigated the comorbidities of executive functions and allostatic load via network analysis. Methods: We included 603 adolescents (49.84% girls; Mean age = 12.38, SD age = 1.79) from junior high school in rural China. Eight biological markers at T1 and four executive function tasks at T2 were used to evaluate networks. Network analysis was used to determine the network structure, core symptoms, and bridge symptoms in the AL-executive function network among rural adolescents. Results: The executive functions were related to 6 AL biological markers, not to cortisol and epinephrine. The most influential symptoms were inhibition control, cognitive flexibility, processing speed, and systolic blood pressure (SBP). SBP, dehydroepiandrosterone, and processing speed were the bridges through which AL was related to executive functions. dehydroepiandrosterone strongly predicted processing speed. The SBP was the biggest influencer in the entire network. Conclusions: We found evidence for differential relations between markers and executive functions. SBP was a driver in the network; dehydroepiandrosterone showed strong relations with executive function.

Keywords: allostatic load, executive function, network analysis, rural adolescent

Procedia PDF Downloads 52
333 Multidisciplinary Training of Social Work and Applied Drama: From the Perspective of the Third Space

Authors: Yen Yi Huang

Abstract:

This paper aims to explore the application of strategies in applied drama to the social work education arena in order to enhance students' creativity, curiosity, and aesthetic sensitivity. Also, applied drama is used as a means to facilitate students' reflection-in-action and improve their understanding of issues on creative aging, gender equality, human rights, bullying, and prejudice. This paper mainly uses the perspective of Homi K. Bhabha's third space to explore the impact of applied drama and social work training on students. First, it focuses on how students create new understandings and insights in the third space of multidisciplinary training studies. Second, it analyzes how the hybridity and negotiation of ideas between applied drama and social work were created. Finally, it discusses the follow-up effects of the training and the factors that promote or hinder the hybridity and generation of the third space. This paper uses students' reflection papers for analysis. It is not focused on a discussion of the effectiveness of the teaching but attempts to bring new insights into the applications of applied drama to the social work education arena. The hybridity and generation of the third space require handling power strategically and looking after the emotional space of the students. Taking part in the training allows students in the third space of multidisciplinary training to reexamine the traditional framework of social work knowledge to create new ideas and possibilities.

Keywords: multidisciplinary, applied drama, social work education, third space

Procedia PDF Downloads 164
332 Optimization of Double-Layered Microchannel Heat Sinks

Authors: Tu-Chieh Hung, Wei-Mon Yan, Xiao-Dong Wang, Yu-Xian Huang

Abstract:

This work employs a combined optimization procedure including a simplified conjugate-gradient method and a three-dimensional fluid flow and heat transfer model to study the optimal geometric parameter design of double-layered microchannel heat sinks. The overall thermal resistance RT is the objective function to be minimized with number of channels, N, the channel width ratio, β, the bottom channel aspect ratio, αb, and upper channel aspect ratio, αu, as the search variables. It is shown that, for the given bottom area (10 mm×10 mm) and heat flux (100 W cm-2), the optimal (minimum) thermal resistance of double-layered microchannel heat sinks is about RT=0.12 ℃/m2W with the corresponding optimal geometric parameters N=73, β=0.50, αb=3.52, and, αu= 7.21 under a constant pumping power of 0.05 W. The optimization process produces a maximum reduction by 52.8% in the overall thermal resistance compared with an initial guess (N=112, β=0.37, αb=10.32 and, αu=10.93). The results also show that the optimal thermal resistance decreases rapidly with the pumping power and tends to be a saturated value afterward. The corresponding optimal values of parameters N, αb, and αu increase while that of β decrease as the pumping power increases. However, further increasing pumping power is not always cost-effective for the application of heat sink designs.

Keywords: optimization, double-layered microchannel heat sink, simplified conjugate-gradient method, thermal resistance

Procedia PDF Downloads 490
331 The Intention to Use Telecare in People of Fall Experience: Application of Fuzzy Neural Network

Authors: Jui-Chen Huang, Shou-Hsiung Cheng

Abstract:

This study examined their willingness to use telecare for people who have had experience falling in the last three months in Taiwan. This study adopted convenience sampling and a structural questionnaire to collect data. It was based on the definition and the constructs related to the Health Belief Model (HBM). HBM is comprised of seven constructs: perceived benefits (PBs), perceived disease threat (PDT), perceived barriers of taking action (PBTA), external cues to action (ECUE), internal cues to action (ICUE), attitude toward using (ATT), and behavioral intention to use (BI). This study adopted Fuzzy Neural Network (FNN) to put forward an effective method. It shows the dependence of ATT on PB, PDT, PBTA, ECUE, and ICUE. The training and testing data RMSE (root mean square error) are 0.028 and 0.166 in the FNN, respectively. The training and testing data RMSE are 0.828 and 0.578 in the regression model, respectively. On the other hand, as to the dependence of ATT on BI, as presented in the FNN, the training and testing data RMSE are 0.050 and 0.109, respectively. The training and testing data RMSE are 0.529 and 0.571 in the regression model, respectively. The results show that the FNN method is better than the regression analysis. It is an effective and viable good way.

Keywords: fall, fuzzy neural network, health belief model, telecare, willingness

Procedia PDF Downloads 201
330 Male Versatile Sexual Offenders in Taiwan

Authors: Huang Yueh Chen, Sheng Ang Shen

Abstract:

Purpose: Sexual assault has always been a highly anticipated crime in Taiwan. People assume that the career of sexual offenders tends to be highly specialized. This study hopes to analyze the crime career and risk factors of offenders by means of another classification. Methods: A total of 145 sexual offenders were sentenced on the parole or expiration date from 2009 to 2011, through analysis of official existing documents such as ‘Re-infringement risk assessment report’ and ‘case assessment report’. Results: The section ‘Various Types of Crimes ‘ of criminal career is analyzed. The highest number of ‘ versatile sexual offender’ followed by ‘adult sexual offender’ is about 2.5, representing more than 1.5 kinds of non-sex crimes besides sexual crimes. Different specialized sexual offenders have had extensive experience in the ‘Sexual Assault Experiences in Children and School’, ‘Static 99 Levels’, ‘Pre-Commuted Substance Use’, ‘Excited Deviant Sexual Behavior’, ‘Various Types of Crimes,’ and ‘Sexual Crime in Forerunner’ , ‘Type of Index Crime’ and other projects to achieve significant differences. Conclusions: Resources continue to be devoted to specialized offenders, the character of first-time sexual offender depends on further research and makes the public aware of the different assumptions of diversified offenders from traditional professional offenses that reduce unnecessary panic in society.

Keywords: versatile sexual offender, specialized sexual offender, criminal career, risk factor

Procedia PDF Downloads 166
329 The Modulation of Self-interest Instruction on the Fair-Proposing Behavior in Ultimatum Game

Authors: N. S. Yen, T. H. Yang, W. H. Huang, Y. F. Fang, H. W. Cho

Abstract:

Ultimatum game is an experimental paradigm to study human decision making. There are two players, a proposer and a responder, to split a fixed amount of money. According to the traditional economic theory on ultimatum game, proposer should propose the selfish offers to responder as much as possible to maximize proposer’s own outcomes. However, most evidences had showed that people chose more fair offers, hence two hypotheses – fairness favoring and strategic concern were proposed. In current study, we induced the motivation in participants to be either selfish or altruistic, and manipulated the task variables, the stake sizes (NT$100, 1000, 10000) and the share sizes (the 40%, 30%, 20%, 10% of the sum as selfish offers, and the 60%, 70%, 80%, 90% of the sum as altruistic offers), to examine the two hypotheses. The results showed that most proposers chose more fair offers with longer reaction times (RTs) no matter in choosing between the fair and selfish offers, or between the fair and altruistic offers. However, the proposers received explicit self-interest instruction chose more selfish offers accompanied with longer RTs in choosing between the fair and selfish offers. Therefore, the results supported the strategic concern hypothesis that previous proposers choosing the fair offers might be resulted from the fear of rejection by responders. Proposers would become more self-interest if the fear of being rejected is eliminated.

Keywords: ultimatum game, proposer, self-interest, fear of rejection

Procedia PDF Downloads 375
328 Reliability and Validity of Determining Ventilatory Threshold and Respiratory Compensation Point by Near-Infrared Spectroscopy

Authors: Tso-Yen Mao, De-Yen Liu, Chun-Feng Huang

Abstract:

Purpose: This research intends to investigate the reliability and validity of ventilatory threshold (VT) and respiratory compensation point (RCP) determined by skeletal muscle hemodynamic status. Methods: One hundred healthy male (age: 22±3 yrs; height: 173.1±6.0 cm; weight: 67.1±10.5 kg) performed graded cycling exercise test which ventilatory and skeletal muscle hemodynamic data were collected simultaneously. VT and RCP were determined by combined V-slope (VE vs. VCO2) and ventilatory efficiency (VE/VO2 vs. VE/VCO2) methods. Pearson correlation, paired t-test, and Bland-Altman plots were used to analyze reliability, validity, and similarities. Statistical significance was set at α =. 05. Results: There are high test-retest correlations of VT and RCP in ventilatory or near-infrared spectroscopy (NIRS) methods (VT vs. VTNIRS: 0.95 vs. 0.94; RCP vs. RCPNIRS: 0.93 vs. 0.93, p<. 05). There are high coefficient of determination at the first timing point of O2Hb decreased (R2 = 0.88, p<. 05) with VT, and high coefficient of determination at the second timing point of O2Hb declined (R2 = 0.89, p< .05) with RCP. VO2 of VT and RCP are not significantly different between ventilatory and NIRS methods (p>. 05). Conclusion: Using NIRS method to determine VT and RCP is reliable and valid in male individuals during graded exercise. Non-invasive skeletal muscle hemodynamics monitor also can be used for controlling training intensity in the future.

Keywords: anaerobic threshold, exercise intensity, hemodynamic, NIRS

Procedia PDF Downloads 313
327 The Fishery and Electricity Symbiosis Environment and Social Inspection in Taiwan: The Kaohsiung City Example

Authors: Bing-Shun Huang, Hung-Ju Chiu, Wen-Kai Hsieh, Hsiu-Chuan Lin, Ming-Lung Hung

Abstract:

Taiwan's solar photovoltaic target in 2025 is 20 GW, of which the fish-electricity symbiosis target is 4 GW. In the future, many solar photovoltaic installations may cause local environmental or social impacts. Therefore, the Taiwan government inspects the fish-electricity symbiosis to reduce the impact of solar photovoltaics on the local environment or society. This stuy takes the symbiosis of fishery and electricity in Kaohsiung City as an example to explore Taiwan's environmental and social inspection practices. It mainly analyzes the two aspects of environmental ecology and social economy. The results show that the environmental inspection is mainly through site surveys, ecological information mapping, on-site interviews, and public consultation meetings. Social inspection mainly includes document analysis, on-site interviews, site surveys, expert discussions, and public consultations to identify possible local problems. Although the government had recognized the local issues, the future status may also change. It is recommended that future photoelectric companies should reconfirm the current situation of development sites when applying for the installation and propose countermeasures to solve the problem.

Keywords: taiwan, fish-electricity symbiosis, environment, society, inspection

Procedia PDF Downloads 206
326 Field-Programmable Gate Arrays Based High-Efficiency Oriented Fast and Rotated Binary Robust Independent Elementary Feature Extraction Method Using Feature Zone Strategy

Authors: Huang Bai-Cheng

Abstract:

When deploying the Oriented Fast and Rotated Binary Robust Independent Elementary Feature (BRIEF) (ORB) extraction algorithm on field-programmable gate arrays (FPGA), the access of global storage for 31×31 pixel patches of the features has become the bottleneck of the system efficiency. Therefore, a feature zone strategy has been proposed. Zones are searched as features are detected. Pixels around the feature zones are extracted from global memory and distributed into patches corresponding to feature coordinates. The proposed FPGA structure is targeted on a Xilinx FPGA development board of Zynq UltraScale+ series, and multiple datasets are tested. Compared with the streaming pixel patch extraction method, the proposed architecture obtains at least two times acceleration consuming extra 3.82% Flip-Flops (FFs) and 7.78% Look-Up Tables (LUTs). Compared with the non-streaming one, the proposed architecture saves 22.3% LUT and 1.82% FF, causing a latency of only 0.2ms and a drop in frame rate for 1. Compared with the related works, the proposed strategy and hardware architecture have the superiority of keeping a balance between FPGA resources and performance.

Keywords: feature extraction, real-time, ORB, FPGA implementation

Procedia PDF Downloads 122
325 Design and Optimization for a Compliant Gripper with Force Regulation Mechanism

Authors: Nhat Linh Ho, Thanh-Phong Dao, Shyh-Chour Huang, Hieu Giang Le

Abstract:

This paper presents a design and optimization for a compliant gripper. The gripper is constructed based on the concept of compliant mechanism with flexure hinge. A passive force regulation mechanism is presented to control the grasping force a micro-sized object instead of using a sensor force. The force regulation mechanism is designed using the planar springs. The gripper is expected to obtain a large range of displacement to handle various sized objects. First of all, the statics and dynamics of the gripper are investigated by using the finite element analysis in ANSYS software. And then, the design parameters of the gripper are optimized via Taguchi method. An orthogonal array L9 is used to establish an experimental matrix. Subsequently, the signal to noise ratio is analyzed to find the optimal solution. Finally, the response surface methodology is employed to model the relationship between the design parameters and the output displacement of the gripper. The design of experiment method is then used to analyze the sensitivity so as to determine the effect of each parameter on the displacement. The results showed that the compliant gripper can move with a large displacement of 213.51 mm and the force regulation mechanism is expected to be used for high precision positioning systems.

Keywords: flexure hinge, compliant mechanism, compliant gripper, force regulation mechanism, Taguchi method, response surface methodology, design of experiment

Procedia PDF Downloads 331
324 Heroin and Opiates Metabolites Tracing by Gas-Chromatography Isotope Ratio Mass Spectrometry

Authors: Yao-Te Yen, Chao-Hsin Cheng, Meng-Shun Huang, Shan-Zong Cyue

Abstract:

'Poppy-seed defense' has been a serious problem all over the world, that is because the opiates metabolites in urine are difficult to distinguish where they come from precisely. In this research, a powerful analytic method has been developed to trace the opiates metabolites in urine by Gas-Chromatography Isotope Ratio Mass Spectrometry (GC-IRMS). In order to eliminate the interference of synthesis to heroin or metabolism through human body, opiates metabolites in urine and sized heroin were hydrolyzed to morphine. Morphine is the key compound for tracing between opiates metabolites and seized heroin in this research. By matching δ13C and δ15N values through morphine, it is successful to distinguish the opiates metabolites coming from heroin or medicine. We tested seven heroin abuser’s metabolites and seized heroin in crime sites, the result showed that opiates metabolites coming from seized heroin, the variation of δ13C and δ15N for morphine are within 0.2 and 2.5‰, respectively. The variation of δ13C and δ15N for morphine are reasonable with the result of matrix match experiments. Above all, the uncertainty of 'Poppy-seed defense' can be solved easily by this analytic method, it provides the direct evidence for judge to make accurate conviction without hesitation.

Keywords: poppy-seed defense, heroin, opiates metabolites, isotope ratio mass spectrometry

Procedia PDF Downloads 239
323 Acute Effects of Active Dynamic, Static Stretching and Passive Static Stretching Exercise on Hamstrings Flexibility and Muscle Strength

Authors: Yi Tse Wang, Che Hsiu Chen, Zih Jian Huang, Hon Wen Cheng

Abstract:

Stretching treatments enhanced flexibility. On the other hand, decreases in hamstrings strength have been reported after stretching, especially with static stretching or passive stretching. Stretching has been shown to be more effective than static stretching to improve muscle performance, but a clear consensus for the effect of dynamic stretching on muscle performance has not been achieved. The purpose of this study was to compare the acute effect of a dynamic stretching, static stretching and eccentric exercise protocol on hamstrings stiffness, flexibility and muscle strength. Forty-five healthy active men (height 179.9 cm; weight 71.5 kg; age 22.5 years) were participated in 3 randomly ordered testing sessions: dynamic stretching (DS), active static stretching (ASS), and passive static stretching (PSS). All the stretch were performed 30 seconds and repeated 6 times. There was a 30-second interval between repetitions. The outcome measures were isokinetic concentric contraction (60°/s), eccentric contraction (30°/s) peak torque, muscle flexibility after stretching. The results showed that the muscle flexibility (3.6%, 3.9% and 1.59%, respectively) increased significantly after DS, PSS and ASS. Hamstring isokinetic concentric peak torque (-6.4%, -8.0% and -5.8%, respectively) and eccentric peak torque (-5.8%, -4.5% and -5.4%, respectively) decreased significantly after DS, PSS and ASS. Hence, although the stretching protocols improve hamstrings flexibility immediately, reduced hamstring muscle eccentric and concentric peak torque.

Keywords: hamstrings injury, warm-up, muscle performance, muscle stretching

Procedia PDF Downloads 383
322 Statistical Comparison of Machine and Manual Translation: A Corpus-Based Study of Gone with the Wind

Authors: Yanmeng Liu

Abstract:

This article analyzes and compares the linguistic differences between machine translation and manual translation, through a case study of the book Gone with the Wind. As an important carrier of human feeling and thinking, the literature translation poses a huge difficulty for machine translation, and it is supposed to expose distinct translation features apart from manual translation. In order to display linguistic features objectively, tentative uses of computerized and statistical evidence to the systematic investigation of large scale translation corpora by using quantitative methods have been deployed. This study compiles bilingual corpus with four versions of Chinese translations of the book Gone with the Wind, namely, Piao by Chunhai Fan, Piao by Huairen Huang, translations by Google Translation and Baidu Translation. After processing the corpus with the software of Stanford Segmenter, Stanford Postagger, and AntConc, etc., the study analyzes linguistic data and answers the following questions: 1. How does the machine translation differ from manual translation linguistically? 2. Why do these deviances happen? This paper combines translation study with the knowledge of corpus linguistics, and concretes divergent linguistic dimensions in translated text analysis, in order to present linguistic deviances in manual and machine translation. Consequently, this study provides a more accurate and more fine-grained understanding of machine translation products, and it also proposes several suggestions for machine translation development in the future.

Keywords: corpus-based analysis, linguistic deviances, machine translation, statistical evidence

Procedia PDF Downloads 144
321 Antibiotic and Fungicide Exposure Reveal the Evolution of Soil-Lettuce System Resistome

Authors: Chenyu Huang, Minrong Cui, Hua Fang, Luqing Zhang, Yunlong Yu

Abstract:

The emergence and spread of antibiotic resistance genes (ARGs) have become a pressing issue in global agricultural production. However, understanding how these ARGs spread across different spatial scales, especially when exposed to both pesticides and antibiotics, has remained a challenge. Here, metagenomic assembly and binning methodologies were used to determine the mechanism of ARG propagation within soil-lettuce systems exposed to both fungicides and antibiotics. The results of our study showed that the presence of fungicide and antibiotic stresses had a significant impact on certain bacterial communities. Notably, we observed that ARGs were primarily transferred from the soil to the plant through plasmids. The selective pressure exerted by fungicides and antibiotics contributed to an increase in unique ARGs present on lettuce leaves. Moreover, ARGs located on chromosomes and plasmids followed different transmission patterns. The presence of diverse selective pressures, a result of compound treatments involving antibiotics and fungicides, amplifies this phenomenon. Consequently, there is a higher probability of bacteria developing multi-antibiotic resistance under the combined pressure of fungicides and antibiotics. In summary, our findings highlight that combined fungicide and antibiotic treatments are more likely to drive the acquisition of ARGs within the soil-plant system and may increase the risk of human ingestion.

Keywords: soil-lettuce system, fungicide, antibiotic, ARG, transmission

Procedia PDF Downloads 108
320 Research on Placement Method of the Magnetic Flux Leakage Sensor Based on Online Detection of the Transformer Winding Deformation

Authors: Wei Zheng, Mao Ji, Zhe Hou, Meng Huang, Bo Qi

Abstract:

The transformer is the key equipment of the power system. Winding deformation is one of the main transformer defects, and timely and effective detection of the transformer winding deformation can ensure the safe and stable operation of the transformer to the maximum extent. When winding deformation occurs, the size, shape and spatial position of the winding will change, which directly leads to the change of magnetic flux leakage distribution. Therefore, it is promising to study the online detection method of the transformer winding deformation based on magnetic flux leakage characteristics, in which the key step is to study the optimal placement method of magnetic flux leakage sensors inside the transformer. In this paper, a simulation model of the transformer winding deformation is established to obtain the internal magnetic flux leakage distribution of the transformer under normal operation and different winding deformation conditions, and the law of change of magnetic flux leakage distribution due to winding deformation is analyzed. The results show that different winding deformation leads to different characteristics of the magnetic flux leakage distribution. On this basis, an optimized placement of magnetic flux leakage sensors inside the transformer is proposed to provide a basis for the online detection method of transformer winding deformation based on the magnetic flux leakage characteristics.

Keywords: magnetic flux leakage, sensor placement method, transformer, winding deformation

Procedia PDF Downloads 196
319 Analytical Solutions for Tunnel Collapse Mechanisms in Circular Cross-Section Tunnels under Seepage and Seismic Forces

Authors: Zhenyu Yang, Qiunan Chen, Xiaocheng Huang

Abstract:

Reliable prediction of tunnel collapse remains a prominent challenge in the field of civil engineering. In this study, leveraging the nonlinear Hoek-Brown failure criterion and the upper-bound theorem, an analytical solution for the collapse surface of shallowly buried circular tunnels was derived, taking into account the coupled effects of surface loads and pore water pressures. Initially, surface loads and pore water pressures were introduced as external force factors, equating the energy dissipation rate to the external force, yielding our objective function. Subsequently, the variational method was employed for optimization, and the outcomes were juxtaposed with previous research findings. Furthermore, we utilized the deduced equation set to systematically analyze the influence of various rock mass parameters on collapse shape and extent. To validate our analytical solutions, a comparison with prior studies was executed. The corroboration underscored the efficacy of our proposed methodology, offering invaluable insights for collapse risk assessment in practical engineering applications.

Keywords: tunnel roof stability, analytical solution, hoek–brown failure criterion, limit analysis

Procedia PDF Downloads 84
318 Survey and Analysis of the Operational Dilemma of the Existing Used Clothes Recycling Model in the Community

Authors: Qiaohui Zhong, Yiqi Kuang, Wanxun Cai, Libin Huang

Abstract:

As a community public facility, the popularity and perfection of old clothes recycling products directly affect people's impression of the whole city, which is related to the happiness index of residents' lives and is of great significance to the construction of eco-civilized cities and the realization of sustainable urban development. At present, China's waste clothing is characterized by large production and a high utilization rate, but the current rate of old clothes recycling is low, and the ‘one-size-fits-all’ recycling model makes people's motivation for old clothes recycling low, and old clothes recycling is in a dilemma. Based on the two online and offline recycling modes of old clothes recycling in Chinese communities, this paper conducts an in-depth survey on the public, operators, and regulators from the aspects of activity scene analysis, crowd attributes analysis, and community space analysis summarizes the difficulties of old clothes recycling for the public - nowhere to recycle, inconvenient to recycle and unwilling to recycle, and analyzes the factors that lead to these difficulties, and gives a solution with foreign experience to solve these problems. It also analyzes the factors that lead to these difficulties and gives targeted suggestions in combination with foreign experience, exploring and proposing a set of appropriate modern old-clothes recycling modes.

Keywords: community, old clothes recycling, recycling mode, sustainable urban development

Procedia PDF Downloads 46
317 Heterologous Expression of Heat-Shock Protein Improves Butanol Yield in a High-Speedy Growing Clostridium acetobutylicum Mutant

Authors: Min-Shiuan Liou, Yi Shan Yang, Yang-Zhan Huang, Chia-Wen Hsieh

Abstract:

A high speed growing and butanol-tolerant Clostridium acetobutylicum HOL1 mutant was screened throughout continuous adaption culture with C. acetobutylicum ATCC 824. The HOL1 strain can grow well in 10 g/L butanol contained CGM medium and can produce about 12.8 g /L butanol during 24 hrs. The C. acetobutylicum HOL1 strain was able to produce 166 mM butanol with 21 mM acetone at pH 4.8, resulting in a butanol selectivity (a molar ratio of butanol to total solvents) of 0.79, which is much higher than that (0.6) of the wild-type strain C. acetobutylicum ATCC 824. The acetate and butyrate accumulation were not observed during fermentation of the HOL1 strain. A hyper-butanol producing C. acetobutylicum HOL1 (pBPHS-3), which was created to overexpress the Bacillus psychrosaccharolyticus originated specific heat-shock protein gene, hspX, from a clostridial phosphotransbutyrylase promoter, was studied for its potential to produce a high titer of butanol. Overexpression of hspX resulted in increased final butanol yield 47% and 30% higher than those of the the ATCC824 and the HOL1 strains, respectively. The remarkable high-speed growth and butanol tolerance of strain HOL1 (pBPHS-3) demonstrates that overexpression of heterogeneous stress protein-encoding gene, hspX, could help C. acetobutylicum to effectively produce a high concentration of butanol.

Keywords: Clostridium acetobutylicum, butanol, heat-shock protein, resistance

Procedia PDF Downloads 429
316 Using Geopolymer Technology on Stabilization and Reutilization the Expansion Behavior Slag

Authors: W. H. Lee, T. W. Cheng, K. Y. Lin, S. W. Huang, Y. C. Ding

Abstract:

Basic Oxygen Furnace (BOF) Slag and electric arc furnace (EAF) slag is the by-product of iron making and steel making. Each of slag with produced over 100 million tons annually in Taiwan. The type of slag has great engineering properties, such as, high hardness and density, high compressive strength, low abrasion ratio, and can replace natural aggregate for building materials. However, no matter BOF or EAF slag, both have the expansion problem, due to it contains free lime. The purpose of this study was to stabilize the BOF and EAF slag by using geopolymer technology, hoping can prevent and solve the expansion problem. The experimental results showed that using geopolymer technology can successfully solve and prevent the expansion problem. Their main properties are analyzed with regard to their use as building materials. Autoclave is used to study the volume stability of these specimens. Finally, the compressive strength of geopolymer mortar with BOF/FAF slag can be reached over 21MPa after curing for 28 days. After autoclave testing, the volume expansion does not exceed 0.2%. Even after the autoclave test, the compressive strength can be grown to over 35MPa. In this study have success using these results on ready-mixed concrete plant, and have the same experimental results as laboratory scale. These results gave encouragement that the stabilized and reutilized BOF/EAF slag could be replaced as a feasible natural fine aggregate by using geopolymer technology.

Keywords: BOF slag, EAF slag, autoclave test, geopolymer

Procedia PDF Downloads 133
315 Integrating Time-Series and High-Spatial Remote Sensing Data Based on Multilevel Decision Fusion

Authors: Xudong Guan, Ainong Li, Gaohuan Liu, Chong Huang, Wei Zhao

Abstract:

Due to the low spatial resolution of MODIS data, the accuracy of small-area plaque extraction with a high degree of landscape fragmentation is greatly limited. To this end, the study combines Landsat data with higher spatial resolution and MODIS data with higher temporal resolution for decision-level fusion. Considering the importance of the land heterogeneity factor in the fusion process, it is superimposed with the weighting factor, which is to linearly weight the Landsat classification result and the MOIDS classification result. Three levels were used to complete the process of data fusion, that is the pixel of MODIS data, the pixel of Landsat data, and objects level that connect between these two levels. The multilevel decision fusion scheme was tested in two sites of the lower Mekong basin. We put forth a comparison test, and it was proved that the classification accuracy was improved compared with the single data source classification results in terms of the overall accuracy. The method was also compared with the two-level combination results and a weighted sum decision rule-based approach. The decision fusion scheme is extensible to other multi-resolution data decision fusion applications.

Keywords: image classification, decision fusion, multi-temporal, remote sensing

Procedia PDF Downloads 124
314 Malware Beaconing Detection by Mining Large-scale DNS Logs for Targeted Attack Identification

Authors: Andrii Shalaginov, Katrin Franke, Xiongwei Huang

Abstract:

One of the leading problems in Cyber Security today is the emergence of targeted attacks conducted by adversaries with access to sophisticated tools. These attacks usually steal senior level employee system privileges, in order to gain unauthorized access to confidential knowledge and valuable intellectual property. Malware used for initial compromise of the systems are sophisticated and may target zero-day vulnerabilities. In this work we utilize common behaviour of malware called ”beacon”, which implies that infected hosts communicate to Command and Control servers at regular intervals that have relatively small time variations. By analysing such beacon activity through passive network monitoring, it is possible to detect potential malware infections. So, we focus on time gaps as indicators of possible C2 activity in targeted enterprise networks. We represent DNS log files as a graph, whose vertices are destination domains and edges are timestamps. Then by using four periodicity detection algorithms for each pair of internal-external communications, we check timestamp sequences to identify the beacon activities. Finally, based on the graph structure, we infer the existence of other infected hosts and malicious domains enrolled in the attack activities.

Keywords: malware detection, network security, targeted attack, computational intelligence

Procedia PDF Downloads 263