Search results for: Clustering technique
4409 IACOP - Route Optimization in Wireless Networks Using Improved Ant Colony Optimization Protocol
Authors: S. Vasundra, D. Venkatesh
Abstract:
Wireless networks have gone through an extraordinary growth in the past few years, and will keep on playing a crucial role in future data communication. The present wireless networks aim to make communication possible anywhere and anytime. With the converging of mobile and wireless communications with Internet services, the boundary between mobile personal telecommunications and wireless computer networks is disappearing. Wireless networks of the next generation need the support of all the advances on new architectures, standards, and protocols. Since an ad hoc network may consist of a large number of mobile hosts, this imposes a significant challenge on the design of an effective and efficient routing protocol that can work well in an environment with frequent topological changes. This paper proposes improved ant colony optimization (IACO) technique. It also maintains load balancing in wireless networks. The simulation results show that the proposed IACO performs better than existing routing techniques.Keywords: wireless networks, ant colony optimization, load balancing, architecture
Procedia PDF Downloads 4254408 Classification Based on Deep Neural Cellular Automata Model
Authors: Yasser F. Hassan
Abstract:
Deep learning structure is a branch of machine learning science and greet achievement in research and applications. Cellular neural networks are regarded as array of nonlinear analog processors called cells connected in a way allowing parallel computations. The paper discusses how to use deep learning structure for representing neural cellular automata model. The proposed learning technique in cellular automata model will be examined from structure of deep learning. A deep automata neural cellular system modifies each neuron based on the behavior of the individual and its decision as a result of multi-level deep structure learning. The paper will present the architecture of the model and the results of simulation of approach are given. Results from the implementation enrich deep neural cellular automata system and shed a light on concept formulation of the model and the learning in it.Keywords: cellular automata, neural cellular automata, deep learning, classification
Procedia PDF Downloads 1994407 A Study on the Response of Vacuum Consolidation on Soft Clay in Combination with Prefabricated Vertical Drain (PVD), Embankment and Surcharge Preloading
Authors: Sharmeelee Subramaniam, Muhd Harris Ramli, Fauziah Ahmad
Abstract:
The application of vacuum pressure to accelerate ground consolidation has been growing significantly in recent years. This ground improvement technique has its advantages, especially in areas where suitable fill is scarce, as it minimizes the surcharge fill height required for the preloading. A study was carried out to examine the response of soft subsoil subjected to vacuum consolidation in combination with embankment loading, surcharge preloading and PVD with two-way drainage. This paper shall describe a procedure to determine the optimum surcharge height and penetration depth of prefabricated vertical drains (PVD) where vacuum consolidation is combined with the use of PVD in soft clay deposits with two-way drainage.Keywords: prefabricated vertical drain, soft soil, surcharge preload, vacuum consolidation
Procedia PDF Downloads 844406 Implementation of the Interlock Protocol to Enhance Security in Unmanned Aerial Vehicles
Authors: Vikram Prabhu, Mohammad Shikh Bahaei
Abstract:
This paper depicts the implementation of a new infallible technique to protect an Unmanned Aerial Vehicle from cyber-attacks. An Unmanned Aerial Vehicle (UAV) could be vulnerable to cyber-attacks because of jammers or eavesdroppers over the network which pose as a threat to the security of the UAV. In the field of network security, there are quite a few protocols which can be used to establish a secure connection between UAVs and their Operators. In this paper, we discuss how the Interlock Protocol could be implemented to foil the Man-in-the-Middle Attack. In this case, Wireshark has been used as the sniffer (man-in-the-middle). This paper also shows a comparison between the Interlock Protocol and the TCP Protocols using cryptcat and netcat and at the same time highlights why the Interlock Protocol is the most efficient security protocol to prevent eavesdropping over the communication channel.Keywords: interlock protocol, Diffie-Hellman algorithm, unmanned aerial vehicles, control station, man-in-the-middle attack, Wireshark
Procedia PDF Downloads 3044405 The Influence of Trait of Personality, Stress and Driver Behavior on Road Accident among Bas Driver in Indonesia
Authors: Fikri, Rozmi Ismail, Fatimah Wati Halim, Sarah Waheeda
Abstract:
The aim of this research is to investigate the influence of personality and driver behavior on road accident among bus driver who have the high risk behavior on road accident in Riau Province. The hypotheses proposed this research is there are has a significant influences of Treat of Personality and Driver Behavior among bus driver in Riau Province Indonesia. Subject participated in this research are 100 bus driver in Riau Province. This study using the purposive random sampling technique and quantitative design. The data is collected using the Big Five Personality questionnaires, Driver Behavior questionnaires and Road Accident Inventory. Research found that there are significant influence of personality and driver behavior on road accident among bus driver in Riau Province Indonesia.Keywords: personality, driver behavior, driver stress, road accident
Procedia PDF Downloads 4854404 Analysis of EEG Signals Using Wavelet Entropy and Approximate Entropy: A Case Study on Depression Patients
Authors: Subha D. Puthankattil, Paul K. Joseph
Abstract:
Analyzing brain signals of the patients suffering from the state of depression may lead to interesting observations in the signal parameters that is quite different from a normal control. The present study adopts two different methods: Time frequency domain and nonlinear method for the analysis of EEG signals acquired from depression patients and age and sex matched normal controls. The time frequency domain analysis is realized using wavelet entropy and approximate entropy is employed for the nonlinear method of analysis. The ability of the signal processing technique and the nonlinear method in differentiating the physiological aspects of the brain state are revealed using Wavelet entropy and Approximate entropy.Keywords: EEG, depression, wavelet entropy, approximate entropy, relative wavelet energy, multiresolution decomposition
Procedia PDF Downloads 3334403 A Fermatean Fuzzy MAIRCA Approach for Maintenance Strategy Selection of Process Plant Gearbox Using Sustainability Criteria
Authors: Soumava Boral, Sanjay K. Chaturvedi, Ian Howard, Kristoffer McKee, V. N. A. Naikan
Abstract:
Due to strict regulations from government to enhance the possibilities of sustainability practices in industries, and noting the advances in sustainable manufacturing practices, it is necessary that the associated processes are also sustainable. Maintenance of large scale and complex machines is a pivotal task to maintain the uninterrupted flow of manufacturing processes. Appropriate maintenance practices can prolong the lifetime of machines, and prevent associated breakdowns, which subsequently reduces different cost heads. Selection of the best maintenance strategies for such machines are considered as a burdensome task, as they require the consideration of multiple technical criteria, complex mathematical calculations, previous fault data, maintenance records, etc. In the era of the fourth industrial revolution, organizations are rapidly changing their way of business, and they are giving their utmost importance to sensor technologies, artificial intelligence, data analytics, automations, etc. In this work, the effectiveness of several maintenance strategies (e.g., preventive, failure-based, reliability centered, condition based, total productive maintenance, etc.) related to a large scale and complex gearbox, operating in a steel processing plant is evaluated in terms of economic, social, environmental and technical criteria. As it is not possible to obtain/describe some criteria by exact numerical values, these criteria are evaluated linguistically by cross-functional experts. Fuzzy sets are potential soft-computing technique, which has been useful to deal with linguistic data and to provide inferences in many complex situations. To prioritize different maintenance practices based on the identified sustainable criteria, multi-criteria decision making (MCDM) approaches can be considered as potential tools. Multi-Attributive Ideal Real Comparative Analysis (MAIRCA) is a recent addition in the MCDM family and has proven its superiority over some well-known MCDM approaches, like TOPSIS (Technique for Order Preference by Similarity to Ideal Solution) and ELECTRE (ELimination Et Choix Traduisant la REalité). It has a simple but robust mathematical approach, which is easy to comprehend. On the other side, due to some inherent drawbacks of Intuitionistic Fuzzy Sets (IFS) and Pythagorean Fuzzy Sets (PFS), recently, the use of Fermatean Fuzzy Sets (FFSs) has been proposed. In this work, we propose the novel concept of FF-MAIRCA. We obtain the weights of the criteria by experts’ evaluation and use them to prioritize the different maintenance practices according to their suitability by FF-MAIRCA approach. Finally, a sensitivity analysis is carried out to highlight the robustness of the approach.Keywords: Fermatean fuzzy sets, Fermatean fuzzy MAIRCA, maintenance strategy selection, sustainable manufacturing, MCDM
Procedia PDF Downloads 1404402 Application of Matrix Converter for the Power Control of a DFIG-Based Wind Turbine
Authors: E. Bounadja, M. O. Mahmoudi, A. Djahbar, Z. Boudjema
Abstract:
This paper presents a control approach of the doubly fed induction generator (DFIG) in conjunction with a direct AC-AC matrix converter used in generating mode. This device is intended to be implemented in a variable speed wind energy conversion system connected to the grid. Firstly, we developed a model of matrix converter, controlled by the Venturini modulation technique. In order to control the power exchanged between the stator of the DFIG and the grid, a control law is synthesized using a high order sliding mode controller. The use of this method provides very satisfactory performance for the DFIG control. The overall strategy has been validated on a 2-MW wind turbine driven a DFIG using the Matlab/Simulink.Keywords: doubly fed induction generator (DFIG), matrix converter, high-order sliding mode controller, wind energy
Procedia PDF Downloads 5244401 Crime and Class: A Study on Violent Crime in Dhaka City
Authors: A. B. M. Najmus Sakib
Abstract:
Being one of the most densely populated cities in the world, Dhaka is facing diversified types of crimes every day. Limitations of resources insert serious strains among the inhabitants of this city. This paper aims to analyze the correlation between crime and class, more especially the violent crime in connection with social class. Following the stratified random sampling technique, one of the police divisions among eight of the Dhaka Metropolitan Police (DMP) will be selected. The data will be collected by evaluating the case files found in the police report. First, this paper discusses the nature and pattern of violent crimes in Dhaka city. Then, it assesses the socio-economic status of the accused persons considering their professions. Furthermore, by testing hypothesis, it will identify how the social classes are connected with violent crimes. Finally, the paper will ascertain the particular class that has an impact on violent crime in Dhaka City and will be ended by suggesting possible measures should take by the law enforcement agencies of Bangladesh.Keywords: social class, violent crime, crime prevention, nature of crime
Procedia PDF Downloads 1474400 Feature Extraction Technique for Prediction the Antigenic Variants of the Influenza Virus
Authors: Majid Forghani, Michael Khachay
Abstract:
In genetics, the impact of neighboring amino acids on a target site is referred as the nearest-neighbor effect or simply neighbor effect. In this paper, a new method called wavelet particle decomposition representing the one-dimensional neighbor effect using wavelet packet decomposition is proposed. The main idea lies in known dependence of wavelet packet sub-bands on location and order of neighboring samples. The method decomposes the value of a signal sample into small values called particles that represent a part of the neighbor effect information. The results have shown that the information obtained from the particle decomposition can be used to create better model variables or features. As an example, the approach has been applied to improve the correlation of test and reference sequence distance with titer in the hemagglutination inhibition assay.Keywords: antigenic variants, neighbor effect, wavelet packet, wavelet particle decomposition
Procedia PDF Downloads 1594399 A Novel Image Steganography Scheme Based on Mandelbrot Fractal
Authors: Adnan H. M. Al-Helali, Hamza A. Ali
Abstract:
Growth of censorship and pervasive monitoring on the Internet, Steganography arises as a new means of achieving secret communication. Steganography is the art and science of embedding information within electronic media used by common applications and systems. Generally, hiding information of multimedia within images will change some of their properties that may introduce few degradation or unusual characteristics. This paper presents a new image steganography approach for hiding information of multimedia (images, text, and audio) using generated Mandelbrot Fractal image as a cover. The proposed technique has been extensively tested with different images. The results show that the method is a very secure means of hiding and retrieving steganographic information. Experimental results demonstrate that an effective improvement in the values of the Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE), Normalized Cross Correlation (NCC) and Image Fidelity (IF) over the previous techniques.Keywords: fractal image, information hiding, Mandelbrot et fractal, steganography
Procedia PDF Downloads 5414398 Investigation of Microstructure, Mechanical Properties and Anti-Corrosive Behavior of Al2O3/Cr2O3 Nanocomposite on Zn Rich Bath
Authors: N. Malatji, A. P. I. Popoola
Abstract:
Zn-Al2O3 and Cr2O3 nanocomposite coatings were successfully produced by electrodeposition technique from chloride acidic bath. Particle loading of Al2O3 (50nm) particles were varied from 5-10 g/L and for Cr2O3(100nm) was 10-20 g/L. Scanning electron microscope (SEM) affixed with energy dispersive spectrometry was used to study the surface morphology and content of the nanoparticles incorporated into the coatings. Microhardness, thermal stability, wear and corrosion behavior of the coatings were also evaluated to study the effect of these nanoparticles on these properties. Zn-Al2O3 nanocomposite was found to exhibit good surface properties especially corrosion resistance. On the other side, Cr2O3 incorporation resulted in the improvement of only mechanical properties. Therefore, Zn-Al2O3 proved to be a better coating for most industrial applications where both chemical and mechanical properties are required.Keywords: electrodeposition, nanocomposite coatings, corrosion, thermal stability, tribology
Procedia PDF Downloads 3934397 An Optimization Model for Maximum Clique Problem Based on Semidefinite Programming
Authors: Derkaoui Orkia, Lehireche Ahmed
Abstract:
The topic of this article is to exploring the potentialities of a powerful optimization technique, namely Semidefinite Programming, for solving NP-hard problems. This approach provides tight relaxations of combinatorial and quadratic problems. In this work, we solve the maximum clique problem using this relaxation. The clique problem is the computational problem of finding cliques in a graph. It is widely acknowledged for its many applications in real-world problems. The numerical results show that it is possible to find a maximum clique in polynomial time, using an algorithm based on semidefinite programming. We implement a primal-dual interior points algorithm to solve this problem based on semidefinite programming. The semidefinite relaxation of this problem can be solved in polynomial time.Keywords: semidefinite programming, maximum clique problem, primal-dual interior point method, relaxation
Procedia PDF Downloads 2234396 The Factors that Affect to the Overall Attitude toward SMS Advertising of Thai Mobile Phone Users
Authors: Panprae Bunyapukkna
Abstract:
The aim of this study is to: (1) measure the overall attitudes of Thai mobile phone users toward SMS advertisements, and (2) identify demographic factors that affect the overall attitudes toward SMS advertisements of Thai mobile phone users. The sample in this study consists of 100 individuals who possess at least one mobile phone and who either live, work or study in Bangkok. Thirty-three respondents are male, while the other 67 respondents are female. The respondents are aged between 21 years and 45 years old. Convenient sampling technique was used in this study. The results of this study indicate that Thai mobile phone users in general hold negative attitudes toward SMS advertisements, and that negative attitudes prevailed in nearly all different demographic groups. The results also suggest that Thai mobile phone users find SMS advertisements irritating, but are indifferent as to whether SMS ads are informative, credible and entertaining as well.Keywords: consumer attitudes, credibility, SMS advertising, Thai mobile phone users
Procedia PDF Downloads 2664395 Construction Sustainability Improvement through Using Recycled Aggregates in Concrete Production
Authors: Zhiqiang Zhu, Khalegh Barati, Xuesong Shen
Abstract:
Due to the energy consumption caused by the construction industry, the public is paying more and more attention to the sustainability of the buildings. With the advancement of research on recycled aggregates, it has become possible to replace natural aggregates with recycled aggregates and to achieve a reduction in energy consumption of materials during construction. The purpose of this paper is to quantitatively compare the emergy consumption of natural aggregate concrete (NAC) and recycled aggregate concrete (RAC). To do so, the emergy analysis method is adopted. Using this technique, it can effectively analyze different forms of energy and substance. The main analysis object is the direct and indirect emergy consumption of the stages in concrete production. Therefore, for indirect energy, consumption of production machinery and transportation vehicle also need to be considered. Finally, the emergy values required to produce the two concrete types are compared to analyze whether the RAC can reduce emergy consumption.Keywords: sustainable construction, NAC, RAC, emergy, concrete
Procedia PDF Downloads 1524394 The Nation in Turmoil: A Post - Colonial Critique of Mqapheli Mngdi's Cartoons
Authors: Sizwe Dlamini
Abstract:
There seems to be little that has been done to investigate cartoons from a literary criticism point of view. Cartoons have been given attention mostly in semiotics as compared to other scholarly perspectives. The aim of this article is to attempt to bridge this gap by observing cartoons through the post-colonial approach as a literary theory. Even though the post-colonial approach has been previously adopted to critique the prose genre and other genres in the African indigenous languages of South Africa, there seems to be no study that has used this approach to analyse the cartoon genre. This study is thus believed to be valuable to scientific knowledge in this sense. The study adopts textual analysis as a qualitative research technique since cartoons are the primary sources of data collection. Through the application of the post-colonial theory, the findings of the study demonstrate that there are depicted socio-cultural, socio-economic, and political issues in Mngadi’s editorial cartoons. These include.Keywords: editorial cartoons, post-colonial theory, literary criticism, turmoil
Procedia PDF Downloads 214393 Collect Meaningful Information about Stock Markets from the Web
Authors: Saleem Abuleil, Khalid S. Alsamara
Abstract:
Events represent a significant source of information on the web; they deliver information about events that occurred around the world in all kind of subjects and areas. These events can be collected and organized to provide valuable and useful information for decision makers, researchers, as well as any person seeking knowledge. In this paper, we discuss an ongoing research to target stock markets domain to observe and record changes (events) when they happen, collect them, understand the meaning of each one of them, and organize the information along with meaning in a well-structured format. By using Semantic Role Labeling (SRL) technique, we identified four factors for each event in this paper: verb of action and three roles associated with it, entity name, attribute, and attribute value. We have generated a set of rules and techniques to support our approach to analyze and understand the meaning of the events taking place in stock markets.Keywords: natuaral language processing, Arabic language, event extraction and understanding, sematic role labeling, stock market
Procedia PDF Downloads 3944392 Rule Insertion Technique for Dynamic Cell Structure Neural Network
Authors: Osama Elsarrar, Marjorie Darrah, Richard Devin
Abstract:
This paper discusses the idea of capturing an expert’s knowledge in the form of human understandable rules and then inserting these rules into a dynamic cell structure (DCS) neural network. The DCS is a form of self-organizing map that can be used for many purposes, including classification and prediction. This particular neural network is considered to be a topology preserving network that starts with no pre-structure, but assumes a structure once trained. The DCS has been used in mission and safety-critical applications, including adaptive flight control and health-monitoring in aerial vehicles. The approach is to insert expert knowledge into the DCS before training. Rules are translated into a pre-structure and then training data are presented. This idea has been demonstrated using the well-known Iris data set and it has been shown that inserting the pre-structure results in better accuracy with the same training.Keywords: neural network, self-organizing map, rule extraction, rule insertion
Procedia PDF Downloads 1744391 Plate-Laminated Slotted-Waveguide Fed 2×3 Planar Inverted F Antenna Array
Authors: Badar Muneer, Waseem Shabir, Faisal Karim Shaikh
Abstract:
Substrate Integrated waveguide based 6-element array of Planar Inverted F antenna (PIFA) has been presented and analyzed parametrically in this paper. The antenna is fed with coupled transverse slots on a plate laminated waveguide cavity to ensure wide bandwidth and simplicity of feeding network. The two-layer structure has one layer dedicated for feeding network and the top layer dedicated for radiating elements. It has been demonstrated that the presented feeding technique for feeding such class of array antennas can be far simple in structure and miniaturized in size when it comes to designing large phased array antenna systems. A good return loss and standing wave ratio of 2:1 has been achieved while maintaining properties of typical PIFA.Keywords: feeding network, laminated waveguide, PIFA, transverse slots
Procedia PDF Downloads 3124390 Fabrication of Chitosan/Polyacrylonitrile Blend and SEMI-IPN Hydrogel with Epichlorohydrin
Authors: Muhammad Omer Aijaz, Sajjad Haider, Fahad S. Al Mubddal, Yousef Al-Zeghayer, Waheed A. Al Masry
Abstract:
The present study is focused on the preparation of chitosan-based blend and Semi-Interpenetrating Polymer Network (SEMI-IPN) with polyacrylonitrile (PAN). Blend Chitosan/Polyacrylonitrile (PAN) hydrogel films were prepared by solution blending and casting technique. Chitosan in the blend was cross-linked with epichlorohydrin (ECH) to prepare SEMI-IPN. The developed Chitosan/PAN blend and SEMI-IPN hydrogels were characterized with SEM, FTIR, TGA, and DSC. The result showed good miscibility between chitosan and PAN, crosslinking of chitosan in the blend, and improved thermal properties for SEMI-IPN. The swelling of the different blended and SEMI-IPN hydrogels samples were examined at room temperature. Blend (C80/P20) sample showed highest swelling (2400%) and fair degree of stability (28%) whereas SEMI-IPN hydrogel exhibited relatively low degree of swelling (244%) and high degree of aqueous stability (85.5%).Keywords: polymer hydrogels, chitosan, SEMI-IPN, polyacrylonitrile, epichlorohydrin
Procedia PDF Downloads 3764389 Characterization of Thermal Images Due to Aging of H.V Glass Insulators Using Thermographic Scanning
Authors: Nasir A. Al-Geelani, Zulkurnain Abdul-Malek, M. Afendi M. Piah
Abstract:
This research paper investigation is carried out in the laboratory on single units of transmission line glass insulator characterized by different thermal images, which aimed to find out the age of the insulators. The tests were carried out on virgin and aged insulators using the thermography scan. Various samples having different periods of aging 20, 15, and 5 years from a 132 kV transmission line which have exhibited a different degree of corrosion. The second group of insulator samples was relatively mild aged insulators, while the third group was lightly aged; finally, the fourth group was the brand new insulators. The results revealed a strong correlation between the aging and the thermal images captured by the infrared camera. This technique can be used to monitor the aging of high voltage insulators as a precaution to avoid disaster.Keywords: glass insulator, infrared camera, corona diacharge, transmission lines, thermograpy, surface discharge
Procedia PDF Downloads 1614388 Socio-Cultural Factors Influencing Adherence to Anti-Retroviral Therapy among HIV Patients in a University Teaching Hospital in South-Western Nigeria
Authors: Okunola Oluseye Ademola
Abstract:
The study investigated various socio-cultural factors influencing adherence to antiretroviral drugs among people living with HIV in a University Teaching Hospital in South-western Nigeria. The objectives are to examine the perception of people living with HIV/AIDS (PLWHA) of antiretroviral therapy (ART) in Obafemi Awolowo University Teaching Hospitals Complex, Ile-Ife, investigate the influence of socio-cultural factors on adherence of PLWHA to treatment regimen in the study area and assess the prevalence of adherence to ART among PLWHA in the study area. It was a cross-sectional where both qualitative and quantitative research methods were adopted. The participants were HIV diagnosed patients attending clinic at the Obafemi Awolowo University Teaching Hospitals Complex in Ile-Ife between the ages of 18 and 60 years. Also three healthcare delivery personnel working in the clinic were interviewed. Out of the 3007 patients receiving treatment, using Fischer’s formula of sampling technique, 336 patients living with HIV/AIDS were selected for the study. These participants had been on antiretroviral drugs for more than six months prior to the study and were selected using simple random sampling technique. Two focus group discussion sessions comprising of 10 male and 10 female living with HIV and currently on ART were conducted. These groups were purposively selected based on their being on ART for more than one year. Also in-depth interviews were conducted among three purposively selected healthcare givers (an experienced nurse, a doctor and a pharmacist) who are working in this clinic. All the participants were interviewed at the clinic on the various clinic days. Data were collected using a structured questionnaire, an interview guide and tape-recorder. The quantitative data were analysed using descriptive and inferential statistics. Content analysis was employed to analyse responses from IDI and FGD sessions. The findings from the study revealed a very positive perception to ART among PLWHA which was about 86.3% while the level of adherence to ART was 89.0% among the respondents. There was a very strong relationship between social and family supports and the degree of adherence to ART in the PLWHA. Nutrition, polygamy, difficulty in financing transportation fare to the clinic, unemployment, drug hawkers, religion, excuse duty from work and waking up very early were highlighted as socio-cultural barriers to adherence to ART. Fear of death, strong family support, religion belief, not seeking alternative treatment, absence of rituals and perceived improved health status were identified as very strong facilitators to adherence. The study concluded that to achieve a very optimal outcome in the management of HIV among PLWHA, various social and cultural contexts should be taken into consideration as this study was able to ascertain the influence of various socio-cultural factors militating and facilitating adherence to ART.Keywords: ART, HIV, PLWHA, socio-cultural
Procedia PDF Downloads 2794387 A Goal-Driven Crime Scripting Framework
Authors: Hashem Dehghanniri
Abstract:
Crime scripting is a simple and effective crime modeling technique that aims to improve understanding of security analysts about security and crime incidents. Low-quality scripts provide a wrong, incomplete, or sophisticated understanding of the crime commission process, which oppose the purpose of their application, e.g., identifying effective and cost-efficient situational crime prevention (SCP) measures. One important and overlooked factor in generating quality scripts is the crime scripting method. This study investigates the problems within the existing crime scripting practices and proposes a crime scripting approach that contributes to generating quality crime scripts. It was validated by experienced crime scripters. This framework helps analysts develop better crime scripts and contributes to their effective application, e.g., SCP measures identification or policy-making.Keywords: attack modelling, crime commission process, crime script, situational crime prevention
Procedia PDF Downloads 1284386 Experiencing Negative Thoughts? Write It, Crumple It and Throw It
Authors: Yasmin Othman Mydin
Abstract:
When one experiences problems, this may lead to negative thoughts. These thoughts may occur repetitively. The present study investigates the effectiveness of cognitive and behavioural techniques to reduce negative thoughts. 20 undergraduate university students participated as the sample in these experimental therapy sessions. Ten students received the intervention while the other ten students were in control group. 15 items Perseverative Thinking Questionnaire was administered before and after the intervention to test the effectiveness of the techniques. The behavioural techniques applied were such as, write down the negative thoughts, crumple it and throw it away. While the cognitive technique was to imagine that the thoughts are being taken out of the mind while throwing it away. Paired samples t-test analysis revealed that there were significant reductions (t=4.245,df=9, p .003) in the negative thoughts in the group that received the intervention compared to the control group. This indicates that these techniques are effective to reduce the repetitive negative thoughts.Keywords: behaviour and cognitive intervention, negative thoughts, writing, psychology
Procedia PDF Downloads 3774385 Enhancement Performance of Desalination System Using Humidification and Dehumidification Processes
Authors: Zeinab Syed Abdel Rehim
Abstract:
Water shortage is considered as one of the huge problems the world encounter now. Water desalination is considered as one of the more suitable methods governments can use to substitute the increased need for potable water. The humidification-dehumidification process for water desalination is viewed as a promising technique for small capacity production plants. The process has several attraction features which include the use of sustainable energy sources, low technology, and low-temperature dehumidification. A pilot experimental set-up plant was constructed with the conventional HVAC components such as air blower that supplies air to an air duct inside which air preheater, steam injector and cooling coil of a small refrigeration unit are placed. The present work evaluates the characteristics of humidification-dehumidification process for water desalination as a function of air flow rate, total power input and air inlet temperature in order to study the optimum conditions required to produce distilled water.Keywords: condensation, dehumidification, evaporation, humidification, water desalination
Procedia PDF Downloads 2454384 Study on Fabrication of Surface Functional Micro and Nanostructures by Femtosecond Laser
Authors: Shengzhu Cao, Hui Zhou, Gan Wu, Lanxi Wanhg, Kaifeng Zhang, Rui Wang, Hu Wang
Abstract:
The functional micro and nanostructures, which can endow material surface with unique properties such as super-absorptance, hydrophobic and drag reduction. Recently, femtosecond laser ablation has been demonstrated to be a promising technology for surface functional micro and nanostructures fabrication. In this paper, using femtosecond laser ablation processing technique, we fabricated functional micro and nanostructures on Ti and Al alloy surfaces, test results showed that processed surfaces have 82%~96% absorptance over a broad wavelength range from ultraviolet to infrared. The surface function properties, which determined by micro and nanostructures, could be modulated by variation laser parameters. These functional surfaces may find applications in such areas as photonics, plasmonics, spaceborne devices, thermal radiation sources, solar energy absorbers and biomedicine.Keywords: surface functional, micro and nanostructures, femtosecond laser, ablation
Procedia PDF Downloads 3714383 Functional Analysis of Variants Implicated in Hearing Loss in a Cohort from Argentina: From Molecular Diagnosis to Pre-Clinical Research
Authors: Paula I. Buonfiglio, Carlos David Bruque, Lucia Salatino, Vanesa Lotersztein, Sebastián Menazzi, Paola Plazas, Ana Belén Elgoyhen, Viviana Dalamón
Abstract:
Hearing loss (HL) is the most prevalent sensorineural disorder affecting about 10% of the global population, with more than half due to genetic causes. About 1 in 500-1000 newborns present congenital HL. Most of the patients are non-syndromic with an autosomal recessive mode of inheritance. To date, more than 100 genes are related to HL. Therefore, the Whole-exome sequencing (WES) technique has become a cost-effective alternative approach for molecular diagnosis. Nevertheless, new challenges arise from the detection of novel variants, in particular missense changes, which can lead to a spectrum of genotype-to-phenotype correlations, which is not always straightforward. In this work, we aimed to identify the genetic causes of HL in isolated and familial cases by designing a multistep approach to analyze target genes related to hearing impairment. Moreover, we performed in silico and in vivo analyses in order to further study the effect of some of the novel variants identified in the hair cell function using the zebrafish model. A total of 650 patients were studied by Sanger Sequencing and Gap-PCR in GJB2 and GJB6 genes, respectively, diagnosing 15.5% of sporadic cases and 36% of familial ones. Overall, 50 different sequence variants were detected. Fifty of the undiagnosed patients with moderate HL were tested for deletions in STRC gene by Multiplex ligation-dependent probe amplification technique (MLPA), leading to 6% of diagnosis. After this initial screening, 50 families were selected to be analyzed by WES, achieving diagnosis in 44% of them. Half of the identified variants were novel. A missense variant in MYO6 gene detected in a family with postlingual HL was selected to be further analyzed. A protein modeling with AlphaFold2 software was performed, proving its pathogenic effect. In order to functionally validate this novel variant, a knockdown phenotype rescue assay in zebrafish was carried out. Injection of wild-type MYO6 mRNA in embryos rescued the phenotype, whereas using the mutant MYO6 mRNA (carrying c.2782C>A variant) had no effect. These results strongly suggest the deleterious effect of this variant on the mobility of stereocilia in zebrafish neuromasts, and hence on the auditory system. In the present work, we demonstrated that our algorithm is suitable for the sequential multigenic approach to HL in our cohort. These results highlight the importance of a combined strategy in order to identify candidate variants as well as the in silico and in vivo studies to analyze and prove their pathogenicity and accomplish a better understanding of the mechanisms underlying the physiopathology of the hearing impairment.Keywords: diagnosis, genetics, hearing loss, in silico analysis, in vivo analysis, WES, zebrafish
Procedia PDF Downloads 964382 Corporate Social Responsibility and Corporate Reputation: A Bibliometric Analysis
Authors: Songdi Li, Louise Spry, Tony Woodall
Abstract:
Nowadays, Corporate Social responsibility (CSR) is becoming a buzz word, and more and more academics are putting efforts on CSR studies. It is believed that CSR could influence Corporate Reputation (CR), and they hold a favourable view that CSR leads to a positive CR. To be specific, the CSR related activities in the reputational context have been regarded as ways that associate to excellent financial performance, value creation, etc. Also, it is argued that CSR and CR are two sides of one coin; hence, to some extent, doing CSR is equal to establishing a good reputation. Still, there is no consensus of the CSR-CR relationship in the literature; thus, a systematic literature review is highly in need. This research conducts a systematic literature review with both bibliometric and content analysis. Data are selected from English language sources, and academic journal articles only, then, keyword combinations are applied to identify relevant sources. Data from Scopus and WoS are gathered for bibliometric analysis. Scopus search results were saved in RIS and CSV formats, and Web of Science (WoS) data were saved in TXT format and CSV formats in order to process data in the Bibexcel software for further analysis which later will be visualised by the software VOSviewer. Also, content analysis was applied to analyse the data clusters and the key articles. In terms of the topic of CSR-CR, this literature review with bibliometric analysis has made four achievements. First, this paper has developed a systematic study which quantitatively depicts the knowledge structure of CSR and CR by identifying terms closely related to CSR-CR (such as ‘corporate governance’) and clustering subtopics emerged in co-citation analysis. Second, content analysis is performed to acquire insight on the findings of bibliometric analysis in the discussion section. And it highlights some insightful implications for the future research agenda, for example, a psychological link between CSR-CR is identified from the result; also, emerging economies and qualitative research methods are new elements emerged in the CSR-CR big picture. Third, a multidisciplinary perspective presents through the whole bibliometric analysis mapping and co-word and co-citation analysis; hence, this work builds a structure of interdisciplinary perspective which potentially leads to an integrated conceptual framework in the future. Finally, Scopus and WoS are compared and contrasted in this paper; as a result, Scopus which has more depth and comprehensive data is suggested as a tool for future bibliometric analysis studies. Overall, this paper has fulfilled its initial purposes and contributed to the literature. To the author’s best knowledge, this paper conducted the first literature review of CSR-CR researches that applied both bibliometric analysis and content analysis; therefore, this paper achieves its methodological originality. And this dual approach brings advantages of carrying out a comprehensive and semantic exploration in the area of CSR-CR in a scientific and realistic method. Admittedly, its work might exist subjective bias in terms of search terms selection and paper selection; hence triangulation could reduce the subjective bias to some degree.Keywords: corporate social responsibility, corporate reputation, bibliometric analysis, software program
Procedia PDF Downloads 1294381 Application Quality Function Deployment (QFD) Tool in Design of Aero Pumps Based on System Engineering
Authors: Z. Soleymani, M. Amirzadeh
Abstract:
Quality Function Deployment (QFD) was developed in 1960 in Japan and introduced in 1983 in America and Europe. The paper presents a real application of this technique in a way that the method of applying QFD in design and production aero fuel pumps has been considered. While designing a product and in order to apply system engineering process, the first step is identification customer needs then its transition to engineering parameters. Since each change in deign after production process leads to extra human costs and also increase in products quality risk, QFD can make benefits in sale by meeting customer expectations. Since the needs identified as well, the use of QFD tool can lead to increase in communications and less deviation in design and production phases, finally it leads to produce the products with defined technical attributes.Keywords: customer voice, engineering parameters, gear pump, QFD
Procedia PDF Downloads 2504380 NFC Communications with Mutual Authentication Based on Limited-Use Session Keys
Authors: Chalee Thammarat
Abstract:
Mobile phones are equipped with increased short-range communication functionality called Near Field Communication (or NFC for short). NFC needs no pairing between devices but suitable for little amounts of data in a very restricted area. A number of researchers presented authentication techniques for NFC communications, however, they still lack necessary authentication, particularly mutual authentication and security qualifications. This paper suggests a new authentication protocol for NFC communication that gives mutual authentication between devices. The mutual authentication is a one of property, of security that protects replay and man-in-the-middle (MitM) attack. The proposed protocols deploy a limited-use offline session key generation and use of distribution technique to increase security and make our protocol lightweight. There are four sub-protocols: NFCAuthv1 is suitable for identification and access control and NFCAuthv2 is suitable for the NFC-enhanced phone by a POS terminal for digital and physical goods and services.Keywords: cryptographic protocols, NFC, near field communications, security protocols, mutual authentication, network security
Procedia PDF Downloads 432