Search results for: type I error
5804 Qsar Studies of Certain Novel Heterocycles Derived From bis-1, 2, 4 Triazoles as Anti-Tumor Agents
Authors: Madhusudan Purohit, Stephen Philip, Bharathkumar Inturi
Abstract:
In this paper we report the quantitative structure activity relationship of novel bis-triazole derivatives for predicting the activity profile. The full model encompassed a dataset of 46 Bis- triazoles. Tripos Sybyl X 2.0 program was used to conduct CoMSIA QSAR modeling. The Partial Least-Squares (PLS) analysis method was used to conduct statistical analysis and to derive a QSAR model based on the field values of CoMSIA descriptor. The compounds were divided into test and training set. The compounds were evaluated by various CoMSIA parameters to predict the best QSAR model. An optimum numbers of components were first determined separately by cross-validation regression for CoMSIA model, which were then applied in the final analysis. A series of parameters were used for the study and the best fit model was obtained using donor, partition coefficient and steric parameters. The CoMSIA models demonstrated good statistical results with regression coefficient (r2) and the cross-validated coefficient (q2) of 0.575 and 0.830 respectively. The standard error for the predicted model was 0.16322. In the CoMSIA model, the steric descriptors make a marginally larger contribution than the electrostatic descriptors. The finding that the steric descriptor is the largest contributor for the CoMSIA QSAR models is consistent with the observation that more than half of the binding site area is occupied by steric regions.Keywords: 3D QSAR, CoMSIA, triazoles, novel heterocycles
Procedia PDF Downloads 4445803 B Spline Finite Element Method for Drifted Space Fractional Tempered Diffusion Equation
Authors: Ayan Chakraborty, BV. Rathish Kumar
Abstract:
Off-late many models in viscoelasticity, signal processing or anomalous diffusion equations are formulated in fractional calculus. Tempered fractional calculus is the generalization of fractional calculus and in the last few years several important partial differential equations occurring in the different field of science have been reconsidered in this term like diffusion wave equations, Schr$\ddot{o}$dinger equation and so on. In the present paper, a time-dependent tempered fractional diffusion equation of order $\gamma \in (0,1)$ with forcing function is considered. Existence, uniqueness, stability, and regularity of the solution has been proved. Crank-Nicolson discretization is used in the time direction. B spline finite element approximation is implemented. Generally, B-splines basis are useful for representing the geometry of a finite element model, interfacing a finite element analysis program. By utilizing this technique a priori space-time estimate in finite element analysis has been derived and we proved that the convergent order is $\mathcal{O}(h²+T²)$ where $h$ is the space step size and $T$ is the time. A couple of numerical examples have been presented to confirm the accuracy of theoretical results. Finally, we conclude that the studied method is useful for solving tempered fractional diffusion equations.Keywords: B-spline finite element, error estimates, Gronwall's lemma, stability, tempered fractional
Procedia PDF Downloads 1925802 A Study on Reinforced Concrete Beams Enlarged with Polymer Mortar and UHPFRC
Authors: Ga Ye Kim, Hee Sun Kim, Yeong Soo Shin
Abstract:
Many studies have been done on the repair and strengthening method of concrete structure, so far. The traditional retrofit method was to attach fiber sheet such as CFRP (Carbon Fiber Reinforced Polymer), GFRP (Glass Fiber Reinforced Polymer) and AFRP (Aramid Fiber Reinforced Polymer) on the concrete structure. However, this method had many downsides in that there are a risk of debonding and an increase in displacement by a shortage of structure section. Therefore, it is effective way to enlarge the structural member with polymer mortar or Ultra-High Performance Fiber Reinforced Concrete (UHPFRC) as a means of strengthening concrete structure. This paper intends to investigate structural performance of reinforced concrete (RC) beams enlarged with polymer mortar and compare the experimental results with analytical results. Nonlinear finite element analyses were conducted to compare the experimental results and predict structural behavior of retrofitted RC beams accurately without cost consuming experimental process. In addition, this study aims at comparing differences of retrofit material between commonly used material (polymer mortar) and recently used material (UHPFRC) by conducting nonlinear finite element analyses. In the first part of this paper, the RC beams having different cover type were fabricated for the experiment and the size of RC beams was 250 millimeters in depth, 150 millimeters in width and 2800 millimeters in length. To verify the experiment, nonlinear finite element models were generated using commercial software ABAQUS 6.10-3. From this study, both experimental and analytical results demonstrated good strengthening effect on RC beam and showed similar tendency. For the future, the proposed analytical method can be used to predict the effect of strengthened RC beam. In the second part of the study, the main parameters were type of retrofit materials. The same nonlinear finite element models were generated to compare the polymer mortar with UHPFRCC. Two types of retrofit material were evaluated and retrofit effect was verified by analytical results.Keywords: retrofit material, polymer mortar, UHPFRC, nonlinear finite element analysis
Procedia PDF Downloads 4185801 Magnetocaloric Effect in Ho₂O₃ Nanopowder at Cryogenic Temperature
Authors: K. P. Shinde, M. V. Tien, H. Lin, H.-R. Park, S.-C.Yu, K. C. Chung, D.-H. Kim
Abstract:
Magnetic refrigeration provides an attractive alternative cooling technology due to its potential advantages such as high cooling efficiency, environmental friendliness, low noise, and compactness over the conventional cooling techniques based on gas compression. Magnetocaloric effect (MCE) occurs by changes in entropy (ΔS) and temperature (ΔT) under external magnetic fields. We have been focused on identifying materials with large MCE in two temperature regimes, not only room temperature but also at cryogenic temperature for specific technological applications, such as space science and liquefaction of hydrogen in fuel industry. To date, the commonly used materials for cryogenic refrigeration are based on hydrated salts. In the present work, we report giant MCE in rare earth Ho2O3 nanopowder at cryogenic temperature. HoN nanoparticles with average size of 30 nm were prepared by using plasma arc discharge method with gas composition of N2/H2 (80%/20%). The prepared HoN was sintered in air atmosphere at 1200 oC for 24 hrs to convert it into oxide. Structural and morphological properties were studied by XRD and SEM. XRD confirms the pure phase and cubic crystal structure of Ho2O3 without any impurity within error range. It has been discovered that Holmium oxide exhibits giant MCE at low temperature without magnetic hysteresis loss with the second-order antiferromagnetic phase transition with Néels temperature around 2 K. The maximum entropy change was found to be 25.2 J/kgK at an applied field of 6 T.Keywords: magnetocaloric effect, Ho₂O₃, magnetic entropy change, nanopowder
Procedia PDF Downloads 1495800 Synthesis and Characterization of a Type Oxide Ca1-x Srx MnO3
Authors: A. Guemache, M. Omari
Abstract:
Oxides with formula Ca1-xSrx MnO3(0≤x≤0.2) were synthesized using co precipitation method. The identification of the obtained phase was carried out using infrared spectroscopy and x-ray diffraction. Thermogravimetric and differential analysis was permitted to characterize different transformations of precursors which take place during one heating cycle. The study of electrochemical behavior was carried out by cyclic voltammetry and impedance spectroscopy. The obtained results show that apparent catalytic activity improved when increasing the concentration of strontium. Anodic current densities varies from 1.3 to 5.9 mA/cm2 at the rate scan of 20 mV.s-1 and a potential 0.8 V for oxides with composition x=0 to 0.2.Keywords: oxide, co-precipitation, thermal analysis, electrochemical properties
Procedia PDF Downloads 3615799 An Improved Data Aided Channel Estimation Technique Using Genetic Algorithm for Massive Multi-Input Multiple-Output
Authors: M. Kislu Noman, Syed Mohammed Shamsul Islam, Shahriar Hassan, Raihana Pervin
Abstract:
With the increasing rate of wireless devices and high bandwidth operations, wireless networking and communications are becoming over crowded. To cope with such crowdy and messy situation, massive MIMO is designed to work with hundreds of low costs serving antennas at a time as well as improve the spectral efficiency at the same time. TDD has been used for gaining beamforming which is a major part of massive MIMO, to gain its best improvement to transmit and receive pilot sequences. All the benefits are only possible if the channel state information or channel estimation is gained properly. The common methods to estimate channel matrix used so far is LS, MMSE and a linear version of MMSE also proposed in many research works. We have optimized these methods using genetic algorithm to minimize the mean squared error and finding the best channel matrix from existing algorithms with less computational complexity. Our simulation result has shown that the use of GA worked beautifully on existing algorithms in a Rayleigh slow fading channel and existence of Additive White Gaussian Noise. We found that the GA optimized LS is better than existing algorithms as GA provides optimal result in some few iterations in terms of MSE with respect to SNR and computational complexity.Keywords: channel estimation, LMMSE, LS, MIMO, MMSE
Procedia PDF Downloads 1915798 The Relationship between Adolescent Self Well Being and Cyber Bully/Victim Being
Authors: Nesrin Demir, Betül Demirbağ
Abstract:
In recent years, the type and content of bullying in schools changes together with technological development. Many studies attribute bullying movement to virtual platform to the widespread use of social media and internet. The main goal of this research is to determine if there is a correlation between subjective well-being as a popular conception of Positive Psychology and being cyber bully/victim. For this purpose, 287 students from various public high schools in Malatya have reached. As assessment tool, Cyber Bully/Victim Scale and Self Well Being Scale for Adolescents were used. Results were discussed in the relevant literature.Keywords: cyber bully, cyber victim, school counseling, subjective well-being
Procedia PDF Downloads 4145797 The Impact of the COVID-19 on the Cybercrimes in Hungary and the Possible Solutions for Prevention
Authors: László Schmidt
Abstract:
Technological and digital innovation is constantly and dynamically evolving, which poses an enormous challenge to both lawmaking and law enforcement. To legislation because artificial intelligence permeates many areas of people’s daily lives that the legislator must regulate. it can see how challenging it is to regulate e.g. self-driving cars/taxis/camions etc. Not to mention cryptocurrencies and Chat GPT, the use of which also requires legislative intervention. Artificial intelligence also poses an extraordinary challenge to law enforcement. In criminal cases, police and prosecutors can make great use of AI in investigations, e.g. in forensics, DNA samples, reconstruction, identification, etc. But it can also be of great help in the detection of crimes committed in cyberspace. In the case of cybercrime, on the one hand, it can be viewed as a new type of crime that can only be committed with the help of information systems, and that has a specific protected legal object, such as an information system or data. On the other hand, it also includes traditional crimes that are much easier to commit with the help of new tools. According to Hungarian Criminal Code section 375 (1), any person who, for unlawful financial gain, introduces data into an information system, or alters or deletes data processed therein, or renders data inaccessible, or otherwise interferes with the functioning of the information system, and thereby causes damage, is guilty of a felony punishable by imprisonment not exceeding three years. The Covid-19 coronavirus epidemic has had a significant impact on our lives and our daily lives. It was no different in the world of crime. With people staying at home for months, schools, restaurants, theatres, cinemas closed, and no travel, criminals have had to change their ways. Criminals were committing crimes online in even greater numbers than before. These crimes were very diverse, ranging from false fundraising, the collection and misuse of personal data, extortion to fraud on various online marketplaces. The most vulnerable age groups (minors and elderly) could be made more aware and prevented from becoming victims of this type of crime through targeted programmes. The aim of the study is to show the Hungarian judicial practice in relation to cybercrime and possible preventive solutions.Keywords: cybercrime, COVID-19, Hungary, criminal law
Procedia PDF Downloads 605796 Types of Feedback and Their Effectiveness in an EFL Context in Iran
Authors: Adel Ebrahimpourtaher, Saeede Eisaie
Abstract:
This study was an attempt to investigate the types of feedback most frequently provided to the students and their effectiveness based on the students’ preferences established through the interview conducted after the treatment. For this purpose, some class sessions of the students of the institute who were studying general English (pre-intermediate level) were recorded by the teacher for the analysis of the feed backs. The results of the analysis and transcriptions indicated that recast is the most frequent feedback type used by the teacher. In addition, the interview indicated that most of the students prefer recast as well as elicitation and explicit correction to some extent.Keywords: EFL, elicitation, explicit, recast, feedback
Procedia PDF Downloads 3655795 A New Intelligent, Dynamic and Real Time Management System of Sewerage
Authors: R. Tlili Yaakoubi, H.Nakouri, O. Blanpain, S. Lallahem
Abstract:
The current tools for real time management of sewer systems are based on two software tools: the software of weather forecast and the software of hydraulic simulation. The use of the first ones is an important cause of imprecision and uncertainty, the use of the second requires temporal important steps of decision because of their need in times of calculation. This way of proceeding fact that the obtained results are generally different from those waited. The major idea of this project is to change the basic paradigm by approaching the problem by the "automatic" face rather than by that "hydrology". The objective is to make possible the realization of a large number of simulations at very short times (a few seconds) allowing to take place weather forecasts by using directly the real time meditative pluviometric data. The aim is to reach a system where the decision-making is realized from reliable data and where the correction of the error is permanent. A first model of control laws was realized and tested with different return-period rainfalls. The gains obtained in rejecting volume vary from 19 to 100 %. The development of a new algorithm was then used to optimize calculation time and thus to overcome the subsequent combinatorial problem in our first approach. Finally, this new algorithm was tested with 16- year-rainfall series. The obtained gains are 40 % of total volume rejected to the natural environment and of 65 % in the number of discharges.Keywords: automation, optimization, paradigm, RTC
Procedia PDF Downloads 2995794 A Tuning Method for Microwave Filter via Complex Neural Network and Improved Space Mapping
Authors: Shengbiao Wu, Weihua Cao, Min Wu, Can Liu
Abstract:
This paper presents an intelligent tuning method of microwave filter based on complex neural network and improved space mapping. The tuning process consists of two stages: the initial tuning and the fine tuning. At the beginning of the tuning, the return loss of the filter is transferred to the passband via the error of phase. During the fine tuning, the phase shift caused by the transmission line and the higher order mode is removed by the curve fitting. Then, an Cauchy method based on the admittance parameter (Y-parameter) is used to extract the coupling matrix. The influence of the resonant cavity loss is eliminated during the parameter extraction process. By using processed data pairs (the amount of screw variation and the variation of the coupling matrix), a tuning model is established by the complex neural network. In view of the improved space mapping algorithm, the mapping relationship between the actual model and the ideal model is established, and the amplitude and direction of the tuning is constantly updated. Finally, the tuning experiment of the eight order coaxial cavity filter shows that the proposed method has a good effect in tuning time and tuning precision.Keywords: microwave filter, scattering parameter, coupling matrix, intelligent tuning
Procedia PDF Downloads 3115793 Structure and Mechanics Patterns in the Assembly of Type V Intermediate-Filament Protein-Based Fibers
Authors: Mark Bezner, Shani Deri, Tom Trigano, Kfir Ben-Harush
Abstract:
Intermediate filament (IF) proteins-based fibers are among the toughest fibers in nature, as was shown by native hagfish slime threads and by synthetic fibers that are based on type V IF-proteins, the nuclear lamins. It is assumed that their mechanical performance stems from two major factors: (1) the transition from elastic -helices to stiff-sheets during tensile load; and (2) the specific organization of the coiled-coil proteins into a hierarchical network of nano-filaments. Here, we investigated the interrelationship between these two factors by using wet-spun fibers based on C. elegans (Ce) lamin. We found that Ce-lamin fibers, whether assembled in aqueous or alcoholic solutions, had the same nonlinear mechanical behavior, with the elastic region ending at ~5%. The pattern of the transition was, however, different: the ratio between -helices and -sheets/random coils was relatively constant until a 20% strain for fibers assembled in an aqueous solution, whereas for fibers assembled in 70% ethanol, the transition ended at a 6% strain. This structural phenomenon in alcoholic solution probably occurred through the transition between compacted and extended conformation of the random coil, and not between -helix and -sheets, as cycle analyses had suggested. The different transition pattern can also be explained by the different higher order organization of Ce-lamins in aqueous or alcoholic solutions, as demonstrated by introducing a point mutation in conserved residue in Ce-lamin gene that alter the structure of the Ce-lamins’ nano-fibrils. In addition, biomimicking the layered structure of silk and hair fibers by coating the Ce-lamin fiber with a hydrophobic layer enhanced fiber toughness and lead to a reversible transition between -helix and the extended conformation. This work suggests that different hierarchical structures, which are formed by specific assembly conditions, lead to diverse secondary structure transitions patterns, which in turn affect the fibers’ mechanical properties.Keywords: protein-based fibers, intermediate filaments (IF) assembly, toughness, structure-property relationships
Procedia PDF Downloads 1105792 Exploration of the Protection Theory of Chinese Scenic Heritage Based on Local Chronicles
Authors: Mao Huasong, Tang Siqi, Cheng Yu
Abstract:
The cognition and practice of Chinese landscapes have distinct uniqueness. The intergenerational inheritance of urban and rural landscapes is a common objective fact which has created a unique type of heritage in China - scenic heritage. The current generalization of the concept of scenic heritage has affected the lack of innovation in corresponding protection practices. Therefore, clarifying the concepts and connotations of scenery and scenic heritage, clarifying the protection objects of scenic heritage and the methods and approaches in intergenerational inheritance can provide theoretical support for the practice of Chinese scenic heritage and contribute Chinese wisdom to the transformation of world heritage sites. Taking ancient Shaoxing, which has a long time span and rich descriptions of scenic types and quantities, as the research object and using local chronicles as the basic research material, based on text analysis, word frequency analysis, case statistics, and historical, geographical spatial annotation methods, this study traces back to ancient scenic practices and conducts in-depth descriptions in both text and space. it have constructed a scenic heritage identification method based on the basic connotation characteristics and morphological representation characteristics of natural and cultural correlations, combined with the intergenerational and representative characteristics of scenic heritage; Summarized the bidirectional integration of "scenic spots" and "form scenic spots", "outstanding people" and "local spirits" in the formation process of scenic heritage; In inheritance, guided by Confucian values of education; In communication, the cultural interpretation constructed by scenery and the way of landscape life are used to strengthen the intergenerational inheritance of natural, artificial material elements, and intangible spirits. As a unique type of heritage in China, scenic heritage should improve its standards, values, and connotations in current protection practices and actively absorb historical experience.Keywords: scenic heritage, heritage protection, cultural landscape, shaoxing, chinese landscape
Procedia PDF Downloads 685791 The Needs of People with a Diagnosis of Dementia and Their Carers and Families
Authors: James Boag
Abstract:
The needs of people with a diagnosis of dementia and their carers and families are physical, psychosocial, and psychological and begin at the time of diagnosis. There is frequently a lack of emotional support and counselling. Care- giving support is required from the presentation of the first symptoms of dementia until death. Alzheimer's disease begins decades before the clinical symptoms begin to appear, and in many cases, it remains undiagnosed, or diagnosed too late for any possible interventions to have any effect. However, if an incorrect diagnosis is given, it may result in a person being treated, without effect, for a type of dementia they do not have and delaying the interventions they should have received. Being diagnosed with dementia can cause emotional distress to the person, and physical and emotional support is needed, which will become more important as the disease progresses. The severity of the patient's dementia and their symptoms has a bearing of the impact on the carer and the support needed. A lack of insight and /or a denial of the diagnosis, grief, reacting to anticipated future losses, and coping methods to maximise the disease outcome, are things that should be addressed. Because of the stigma, it is important for carers not to lose contact with family and others because social isolation leads to depression and burnout. The impact on a carer's well- being and quality of life can be influenced by the severity of the illness, its type of dementia, its symptoms, healthcare support, financial and social status, career, age, health, residential setting, and relationship to the patient. Carer burnout due to lack of support leads to people diagnosed with dementia being put into residential care prematurely. Often dementia is not recognised as a terminal illness, limiting the ability of the person diagnosed with dementia and their carers to work on advance care planning and getting access to palliative and other support. Many carers have been satisfied with the physical support they were given in their everyday life, however, it was agreed that there was an immense unmet need for psychosocial support, especially after diagnosis and approaching end of life. Providing continuity and coordination of care is important. Training is necessary for providers to understand that every case is different, and they should understand the complexities. Grief, the emotional response to loss, is suffered during the progression of the disease and long afterwards, and carers should continue to be supported after the death of the person they were caring for.Keywords: dementia, caring, challenges, needs
Procedia PDF Downloads 975790 PLC Based Automatic Railway Crossing System for India
Authors: Tapan Upadhyay, Aqib Siddiqui, Sameer Khan
Abstract:
Railway crossing system in India is a manually operated level crossing system, either manned or unmanned. The main aim is to protect pedestrians and vehicles from colliding with trains, which pass at regular intervals, as India has the largest and busiest railway network. But because of human error and negligence, every year thousands of lives are lost due to accidents at railway crossings. To avoid this, we suggest a solution, by using Programmable Logical Controller (PLC) based automatic system, which will automatically control the barrier as well as roadblocks to stop people from crossing while security warning is given. Often people avoid security warning, and pass two-wheelers from beneath the barrier, while the train is at a distance away. This paper aims at reducing the fatality and accident rate by controlling barrier and roadblocks using sensors which sense the incoming train and vehicles and sends a signal to PLC. The PLC in return sends a signal to barrier and roadblocks. Once the train passes, the barrier and roadblocks retrieve back, and the passage is clear for vehicles and pedestrians to cross. PLC’s are used because they are very flexible, cost effective, space efficient, reduces complexity and minimises errors. Supervisory Control And Data Acquisition (SCADA) is used to monitor the functioning.Keywords: level crossing, PLC, sensors, SCADA
Procedia PDF Downloads 4275789 The Sembar Cretaceous Shale Gas Bearing Formation at Hajipur
Authors: Zakiullah Kalwar, Shabeer Ahmed Abbasi
Abstract:
This research encompasses the study of Cretaceous Sembar Formation Shale Gas potential at Hajipur area. This study has been done with the approach of geophysical data integration. The structure is NE – SW trending anticline with two map able compartments at Cretaceous Sembar level. The study area is located within proven petroleum system. Cretaceous Sembar/Goru formation is in a Wet gas window and Tertiary source is possibly in the oil window. Potential seals are present in Upper Ranikot shale beds and Intra-Lower Ranikot shales. The effectiveness and presence of source and reservoir rocks are favorable in the area of interest. Cretaceous Sembar Shale and Goru Shale beds with good organic content (TOC upto 4%, Type II/III) are currently in gas generation window in the area. Source rock intervals are also reported in Eocene Kirthar Group (TOC upto 8%, Type –II). Good reservoir quality Paleocene Lower Ranikot and Cretaceous Sembar shale beds exist in the area. The collision between Indian and Eurasian Plates during Tertiary initiated folding and thrusting. The first phase of thrusting involved ophiolite emplacement along the western margins of the Indian Plate (west of the area under review). The main phase of thrusting in the Sulaiman region was from Late Miocene to the present. The study area contains Permian to Recent clastics and carbonates. The succession generally is younger in the southeast than in northwest. Intraformational sedimentation breaks are pronounced in Permian and Jurassic. Sulaiman Range is bounded by the Western Sulaiman Transform Fault Zone (of which the Kingri Fault is the major fault) to the west and by the Domanda Fault to the east. The Domanda Fault also constitutes the western boundary of the Sulaiman Foredeep, lies in sulaiman foredeep where subsurface having prominent independent closure. Several reservoir horizons of Jurassic to Eocene are established hydrocarbon producers in the Hajipur area.Keywords: enough size, good potential, shale gas, structure closure
Procedia PDF Downloads 2785788 Information Disclosure And Financial Sentiment Index Using a Machine Learning Approach
Authors: Alev Atak
Abstract:
In this paper, we aim to create a financial sentiment index by investigating the company’s voluntary information disclosures. We retrieve structured content from BIST 100 companies’ financial reports for the period 1998-2018 and extract relevant financial information for sentiment analysis through Natural Language Processing. We measure strategy-related disclosures and their cross-sectional variation and classify report content into generic sections using synonym lists divided into four main categories according to their liquidity risk profile, risk positions, intra-annual information, and exposure to risk. We use Word Error Rate and Cosin Similarity for comparing and measuring text similarity and derivation in sets of texts. In addition to performing text extraction, we will provide a range of text analysis options, such as the readability metrics, word counts using pre-determined lists (e.g., forward-looking, uncertainty, tone, etc.), and comparison with reference corpus (word, parts of speech and semantic level). Therefore, we create an adequate analytical tool and a financial dictionary to depict the importance of granular financial disclosure for investors to identify correctly the risk-taking behavior and hence make the aggregated effects traceable.Keywords: financial sentiment, machine learning, information disclosure, risk
Procedia PDF Downloads 945787 The Intention to Use Telecare in People of Fall Experience: Application of Fuzzy Neural Network
Authors: Jui-Chen Huang, Shou-Hsiung Cheng
Abstract:
This study examined their willingness to use telecare for people who have had experience falling in the last three months in Taiwan. This study adopted convenience sampling and a structural questionnaire to collect data. It was based on the definition and the constructs related to the Health Belief Model (HBM). HBM is comprised of seven constructs: perceived benefits (PBs), perceived disease threat (PDT), perceived barriers of taking action (PBTA), external cues to action (ECUE), internal cues to action (ICUE), attitude toward using (ATT), and behavioral intention to use (BI). This study adopted Fuzzy Neural Network (FNN) to put forward an effective method. It shows the dependence of ATT on PB, PDT, PBTA, ECUE, and ICUE. The training and testing data RMSE (root mean square error) are 0.028 and 0.166 in the FNN, respectively. The training and testing data RMSE are 0.828 and 0.578 in the regression model, respectively. On the other hand, as to the dependence of ATT on BI, as presented in the FNN, the training and testing data RMSE are 0.050 and 0.109, respectively. The training and testing data RMSE are 0.529 and 0.571 in the regression model, respectively. The results show that the FNN method is better than the regression analysis. It is an effective and viable good way.Keywords: fall, fuzzy neural network, health belief model, telecare, willingness
Procedia PDF Downloads 2015786 Seismic Isolation of Existing Masonry Buildings: Recent Case Studies in Italy
Authors: Stefano Barone
Abstract:
Seismic retrofit of buildings through base isolation represents a consolidated protection strategy against earthquakes. It consists in decoupling the ground motion from that of the structure and introducing anti-seismic devices at the base of the building, characterized by high horizontal flexibility and medium/high dissipative capacity. This allows to protect structural elements and to limit damages to non-structural ones. For these reasons, full functionality is guaranteed after an earthquake event. Base isolation is applied extensively to both new and existing buildings. For the latter, it usually does not require any interruption of the structure use and occupants evacuation, a special advantage for strategic buildings such as schools, hospitals, and military buildings. This paper describes the application of seismic isolation to three existing masonry buildings in Italy: Villa “La Maddalena” in Macerata (Marche region), “Giacomo Matteotti” and “Plinio Il Giovane” school buildings in Perugia (Umbria region). The seismic hazard of the sites is characterized by a Peak Ground Acceleration (PGA) of 0.213g-0.287g for the Life Safety Limit State and between 0.271g-0.359g for the Collapse Limit State. All the buildings are isolated with a combination of free sliders type TETRON® CD with confined elastomeric disk and anti-seismic rubber isolators type ISOSISM® HDRB to reduce the eccentricity between the center of mass and stiffness, thus limiting torsional effects during a seismic event. The isolation systems are designed to lengthen the original period of vibration (i.e., without isolators) by at least three times and to guarantee medium/high levels of energy dissipation capacity (equivalent viscous damping between 12.5% and 16%). This allows the structures to resist 100% of the seismic design action. This article shows the performances of the supplied anti-seismic devices with particular attention to the experimental dynamic response. Finally, a special focus is given to the main site activities required to isolate a masonry building.Keywords: retrofit, masonry buildings, seismic isolation, energy dissipation, anti-seismic devices
Procedia PDF Downloads 715785 Applying of an Adaptive Neuro-Fuzzy Inference System (ANFIS) for Estimation of Flood Hydrographs
Authors: Amir Ahmad Dehghani, Morteza Nabizadeh
Abstract:
This paper presents the application of an Adaptive Neuro-Fuzzy Inference System (ANFIS) to flood hydrograph modeling of Shahid Rajaee reservoir dam located in Iran. This was carried out using 11 flood hydrographs recorded in Tajan river gauging station. From this dataset, 9 flood hydrographs were chosen to train the model and 2 flood hydrographs to test the model. The different architectures of neuro-fuzzy model according to the membership function and learning algorithm were designed and trained with different epochs. The results were evaluated in comparison with the observed hydrographs and the best structure of model was chosen according the least RMSE in each performance. To evaluate the efficiency of neuro-fuzzy model, various statistical indices such as Nash-Sutcliff and flood peak discharge error criteria were calculated. In this simulation, the coordinates of a flood hydrograph including peak discharge were estimated using the discharge values occurred in the earlier time steps as input values to the neuro-fuzzy model. These results indicate the satisfactory efficiency of neuro-fuzzy model for flood simulating. This performance of the model demonstrates the suitability of the implemented approach to flood management projects.Keywords: adaptive neuro-fuzzy inference system, flood hydrograph, hybrid learning algorithm, Shahid Rajaee reservoir dam
Procedia PDF Downloads 4785784 Alteration of Placental Development and Vascular Dysfunction in Gestational Diabetes Mellitus Has Impact on Maternal and Infant Health
Authors: Sadia Munir
Abstract:
The aim of this study is to investigate changes in placental development and vascular dysfunction which subsequently affect feto-maternal health in pregnancies complicated by gestational diabetes mellitus (GDM). Fetal and postnatal adverse health outcomes of GDM are shown to be associated with disturbances in placental structure and function. Children of women with GDM are more likely to be obese and diabetic in childhood and adulthood. GDM also increases the risk of adverse pregnancy outcomes, including preeclampsia, birth injuries, macrosomia and neonatal hypoglycemia, respiratory distress syndrome, neonatal cardiac dysfunction and stillbirth. Incidences of type 2 diabetes in the MENA region are growing at an alarming rate which is estimated to become more than double by 2030. Five of the top 10 countries for diabetes prevalence in 2010 were in the Gulf region. GDM also increases the risk of development of type 2 diabetes. Interestingly, more than half of the women with GDM develop diabetes later in their life. The human placenta is a temporary organ located at the interface between mother and fetal blood circulation. Placenta has a central role as both a producer as well as a target of several molecules that are involved in placental development and function. We have investigated performed a Pubmed search with key words placenta, GDM, placental villi, vascularization, cytokines, growth factors, inflammation, hypoxia, oxidative stress and pathophysiology. We have investigated differences in the development and vascularization of placenta, their underlying causes and impact on feto-maternal health through literature review. We have also identified gaps in the literature and research questions that need to be answered to completely understand the central role of placenta in the GDM. This study is important in understanding the pathophysiology of placenta due to changes in the vascularization of villi, surface area and diameter of villous capillaries in pregnancies complicated by GDM. It is necessary to understand these mechanisms in order to develop treatments to reverse their effects on placental malfunctioning, which in turn, will result in improved mother and child health.Keywords: gestational diabetes mellitus, placenta, vasculature, villi
Procedia PDF Downloads 3185783 A Survey of Domain Name System Tunneling Attacks: Detection and Prevention
Authors: Lawrence Williams
Abstract:
As the mechanism which converts domains to internet protocol (IP) addresses, Domain Name System (DNS) is an essential part of internet usage. It was not designed securely and can be subject to attacks. DNS attacks have become more frequent and sophisticated and the need for detecting and preventing them becomes more important for the modern network. DNS tunnelling attacks are one type of attack that are primarily used for distributed denial-of-service (DDoS) attacks and data exfiltration. Discussion of different techniques to detect and prevent DNS tunneling attacks is done. The methods, models, experiments, and data for each technique are discussed. A proposal about feasibility is made. Future research on these topics is proposed.Keywords: DNS, tunneling, exfiltration, botnet
Procedia PDF Downloads 755782 Fire Safety Assessment of At-Risk Groups
Authors: Naser Kazemi Eilaki, Carolyn Ahmer, Ilona Heldal, Bjarne Christian Hagen
Abstract:
Older people and people with disabilities are recognized as at-risk groups when it comes to egress and travel from hazard zone to safe places. One's disability can negatively influence her or his escape time, and this becomes even more important when people from this target group live alone. This research deals with the fire safety of mentioned people's buildings by means of probabilistic methods. For this purpose, fire safety is addressed by modeling the egress of our target group from a hazardous zone to a safe zone. A common type of detached house with a prevalent plan has been chosen for safety analysis, and a limit state function has been developed according to the time-line evacuation model, which is based on a two-zone and smoke development model. An analytical computer model (B-Risk) is used to consider smoke development. Since most of the involved parameters in the fire development model pose uncertainty, an appropriate probability distribution function has been considered for each one of the variables with indeterministic nature. To achieve safety and reliability for the at-risk groups, the fire safety index method has been chosen to define the probability of failure (causalities) and safety index (beta index). An improved harmony search meta-heuristic optimization algorithm has been used to define the beta index. Sensitivity analysis has been done to define the most important and effective parameters for the fire safety of the at-risk group. Results showed an area of openings and intervals to egress exits are more important in buildings, and the safety of people would improve with increasing dimensions of occupant space (building). Fire growth is more critical compared to other parameters in the home without a detector and fire distinguishing system, but in a home equipped with these facilities, it is less important. Type of disabilities has a great effect on the safety level of people who live in the same home layout, and people with visual impairment encounter more risk of capturing compared to visual and movement disabilities.Keywords: fire safety, at-risk groups, zone model, egress time, uncertainty
Procedia PDF Downloads 1035781 Effect of Jet Diameter on Surface Quenching at Different Spatial Locations
Authors: C. Agrawal, R. Kumar, A. Gupta, B. Chatterjee
Abstract:
An experimental investigation has been carried out to study the cooling of a hot horizontal Stainless Steel surface of 3 mm thickness, which has 800±10 °C initial temperature. A round water jet of 22 ± 1 °C temperature was injected over the hot surface through straight tube type nozzles of 2.5-4.8 mm diameter and 250 mm length. The experiments were performed for the jet exit to target surface spacing of 4 times of jet diameter and jet Reynolds number of 5000-24000. The effect of change in jet Reynolds number on the surface quenching has been investigated form the stagnation point to 16 mm spatial location.Keywords: hot-surface, jet impingement, quenching, stagnation point
Procedia PDF Downloads 6105780 Static Properties of Ge and Sr Isotopes in the Cluster Model
Authors: Mohammad Reza Shojaei, Mahdeih Mirzaeinia
Abstract:
We have studied the cluster structure of even-even stable isotopes of Ge and Sr. The Schrodinger equation has been solved using the generalized parametric Nikiforov-Uvarov method with a phenomenological potential. This potential is the sum of the attractive Yukawa-like potential, a Manning-Rosen-type potential, and the repulsive Yukawa potential for interaction between the cluster and the core. We have shown that the available experimental data of the first rotational band energies can be well described by assuming a binary system of the α cluster and the core and using an analytical solution. Our results were consistent with experimental values. Hence, this model can be applied to study the other even-even isotopesKeywords: cluser model, NU method, ge and Sr, potential central
Procedia PDF Downloads 765779 Analysis of Interpolation Factor in Pulse Shaping Filter on MRC for CDMA 2000 Systems
Authors: Pankaj Verma, Gagandeep Singh Walia, Padma Devi, H. P. Singh
Abstract:
Code Division Multiple Access 2000 operates on various RF channel bandwidths 1.2288 or 3.6864 Mcps. CDMA offers high bandwidth and wireless broadband services but the efficiency gets decreased because of many interfering factors like fading, interference, scattering, diffraction, refraction, reflection etc. To reduce the spectral bandwidth is one of the major concerns in modern day technology and this is achieved by pulse shaping filter. This paper investigates the effect of diversity (MRC), interpolation factor in Root Raised Cosine (RRC) filter for the QPSK and BPSK modulation schemes. It is made possible to send information with minimum inter symbol interference and within limited bandwidth with proper pulse shaping technique. Bit error rate (BER) performance is analyzed by applying diversity technique by varying the interpolation factor for Binary Phase Shift Keying (BPSK) and Quadrature Phase Shift Keying (QPSK). Interpolation factor increases the original sampling rate of a sequence to a higher rate and reduces the interference and diversity reduces the fading.Keywords: CDMA2000, root raised cosine, roll off factor, ISI, diversity, interference, fading
Procedia PDF Downloads 4755778 Double Layer Security Authentication Model for Automatic Dependent Surveillance-Broadcast
Authors: Buse T. Aydin, Enver Ozdemir
Abstract:
An automatic dependent surveillance-broadcast (ADS-B) system has serious security problems. In this study, a double layer authentication scheme between the aircraft and ground station, aircraft to aircraft, ground station to ATC tower is designed to prevent any unauthorized aircrafts from introducing themselves as friends. This method can be used as a solution to the problem of authentication. The method is a combination of classical cryptographic methods and new generation physical layers. The first layer has employed the embedded key of the aircraft. The embedded key is assumed to installed during the construction of the utility. The other layer is a physical attribute (flight path, distance, etc.) between the aircraft and the ATC tower. We create a mathematical model so that two layers’ information is employed and an aircraft is authenticated as a friend or unknown according to the accuracy of the results of the model. The results of the aircraft are compared with the results of the ATC tower and if the values found by the aircraft and ATC tower match within a certain error margin, we mark the aircraft as friend. As a result, the ADS-B messages coming from this authenticated friendly aircraft will be processed. In this method, even if the embedded key is captured by the unknown aircraft, without the information of the second layer, the unknown aircraft can easily be determined. Overall, in this work, we present a reliable system by adding physical layer in the authentication process.Keywords: ADS-B, authentication, communication with physical layer security, cryptography, identification friend or foe
Procedia PDF Downloads 1795777 Applications and Development of a Plug Load Management System That Automatically Identifies the Type and Location of Connected Devices
Authors: Amy Lebar, Kim L. Trenbath, Bennett Doherty, William Livingood
Abstract:
Plug and process loads (PPLs) account for 47% of U.S. commercial building energy use. There is a huge potential to reduce whole building consumption by targeting PPLs for energy savings measures or implementing some form of plug load management (PLM). Despite this potential, there has yet to be a widely adopted commercial PLM technology. This paper describes the Automatic Type and Location Identification System (ATLIS), a PLM system framework with automatic and dynamic load detection (ADLD). ADLD gives PLM systems the ability to automatically identify devices as they are plugged into the outlets of a building. The ATLIS framework takes advantage of smart, connected devices to identify device locations in a building, meter and control their power, and communicate this information to a central database. ATLIS includes five primary capabilities: location identification, communication, control, energy metering and data storage. A laboratory proof of concept (PoC) demonstrated all but the data storage capabilities and these capabilities were validated using an office building scenario. The PoC can identify when a device is plugged into an outlet and the location of the device in the building. When a device is moved, the PoC’s dashboard and database are automatically updated with the new location. The PoC implements controls to devices from the system dashboard so that devices maintain correct schedules regardless of where they are plugged in within a building. ATLIS’s primary technology application is improved PLM, but other applications include asset management, energy audits, and interoperability for grid-interactive efficient buildings. A system like ATLIS could also be used to direct power to critical devices, such as ventilators, during a brownout or blackout. Such a framework is an opportunity to make PLM more widespread and reduce the amount of energy consumed by PPLs in current and future commercial buildings.Keywords: commercial buildings, grid-interactive efficient buildings (GEB), miscellaneous electric loads (MELs), plug loads, plug load management (PLM)
Procedia PDF Downloads 1325776 Impact of Macroeconomic Variables on Indian Mutual Funds: A Time Series Analysis
Authors: Sonali Agarwal
Abstract:
The investor perception about investment avenues is affected to a great degree by the current happenings, within the country, and on the global stage. The influencing events can range from government policies, bilateral trade agreements, election agendas, to changing exchange rates, appreciation and depreciation of currency, recessions, meltdowns, bankruptcies etc. The current research attempts to discover and unravel the effect of various macroeconomic variables (crude oil price, gold price, silver price and USD exchange rate) on the Indian mutual fund industry in general and the chosen funds (Axis Gold Fund, BSL Gold Fund, Kotak Gold Fund & SBI gold fund) in particular. Cointegration tests and Vector error correction equations prove that the chosen variables have strong effect on the NAVs (net asset values) of the mutual funds. However, the greatest influence is felt from the fund’s own past and current information and it is found that when an innovation of fund’s own lagged NAVs is given, variance caused is high that changes the current NAVs markedly. The study helps to highlight the interplay of macroeconomic variables and their repercussion on mutual fund industry.Keywords: cointegration, Granger causality, impulse response, macroeconomic variables, mutual funds, stationarity, unit root test, variance decomposition, VECM
Procedia PDF Downloads 2445775 On-Chip Sensor Ellipse Distribution Method and Equivalent Mapping Technique for Real-Time Hardware Trojan Detection and Location
Authors: Longfei Wang, Selçuk Köse
Abstract:
Hardware Trojan becomes great concern as integrated circuit (IC) technology advances and not all manufacturing steps of an IC are accomplished within one company. Real-time hardware Trojan detection is proven to be a feasible way to detect randomly activated Trojans that cannot be detected at testing stage. On-chip sensors serve as a great candidate to implement real-time hardware Trojan detection, however, the optimization of on-chip sensors has not been thoroughly investigated and the location of Trojan has not been carefully explored. On-chip sensor ellipse distribution method and equivalent mapping technique are proposed based on the characteristics of on-chip power delivery network in this paper to address the optimization and distribution of on-chip sensors for real-time hardware Trojan detection as well as to estimate the location and current consumption of hardware Trojan. Simulation results verify that hardware Trojan activation can be effectively detected and the location of a hardware Trojan can be efficiently estimated with less than 5% error for a realistic power grid using our proposed methods. The proposed techniques therefore lay a solid foundation for isolation and even deactivation of hardware Trojans through accurate location of Trojans.Keywords: hardware trojan, on-chip sensor, power distribution network, power/ground noise
Procedia PDF Downloads 391