Search results for: Arnold Missiame
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 44

Search results for: Arnold Missiame

44 The Desire to Know: Arnold’s Contribution to a Psychological Conceptualization of Academic Motivation

Authors: F. Ruiz-Fuster

Abstract:

Arnold’s redefinition of human motives can sustain a psychology of education which emphasizes the beauty of knowledge and the exercise of intellectual functions. Thus, education instead of focusing on skills and learning by doing would be centered on ‘the widest reaches of the human spirit’. One way to attain it is by developing children’s inherent interest. Arnold takes into account the fact that the desire to know is the inherent interest which leads students to explore and learn. She also emphasizes the need of exercising human functions as thinking, judging and reasoning. According to Arnold, the influence of psychological theories of motivation in education has derived in considering that all learning and school tasks should derive from children’s needs and impulses. The desire to know and the curiosity have not been considered as basic and active as any instinctive drive or basic need, so there has been an attempt to justify and understand how biological drives guide student’s learning. However, understanding motives and motivation not as a drive, an instinct or an impulse guided by our basic needs, but as a want that leads to action can help to understand, from a psychological perspective, how teachers can motivate students to learn, strengthening their desire and interest to reason and discover the whole new world of knowledge.

Keywords: academic motivation, interests, desire to know, educational psychology, intellectual functions

Procedia PDF Downloads 152
43 Bitplanes Gray-Level Image Encryption Approach Using Arnold Transform

Authors: Ali Abdrhman M. Ukasha

Abstract:

Data security needed in data transmission, storage, and communication to ensure the security. The single step parallel contour extraction (SSPCE) method is used to create the edge map as a key image from the different Gray level/Binary image. Performing the X-OR operation between the key image and each bit plane of the original image for image pixel values change purpose. The Arnold transform used to changes the locations of image pixels as image scrambling process. Experiments have demonstrated that proposed algorithm can fully encrypt 2D Gary level image and completely reconstructed without any distortion. Also shown that the analyzed algorithm have extremely large security against some attacks like salt & pepper and JPEG compression. Its proof that the Gray level image can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.

Keywords: SSPCE method, image compression-salt- peppers attacks, bitplanes decomposition, Arnold transform, lossless image encryption

Procedia PDF Downloads 434
42 Bitplanes Image Encryption/Decryption Using Edge Map (SSPCE Method) and Arnold Transform

Authors: Ali A. Ukasha

Abstract:

Data security needed in data transmission, storage, and communication to ensure the security. The single step parallel contour extraction (SSPCE) method is used to create the edge map as a key image from the different Gray level/Binary image. Performing the X-OR operation between the key image and each bit plane of the original image for image pixel values change purpose. The Arnold transform used to changes the locations of image pixels as image scrambling process. Experiments have demonstrated that proposed algorithm can fully encrypt 2D Gary level image and completely reconstructed without any distortion. Also shown that the analyzed algorithm have extremely large security against some attacks like salt & pepper and JPEG compression. Its proof that the Gray level image can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.

Keywords: SSPCE method, image compression, salt and peppers attacks, bitplanes decomposition, Arnold transform, lossless image encryption

Procedia PDF Downloads 495
41 Voice Liveness Detection Using Kolmogorov Arnold Networks

Authors: Arth J. Shah, Madhu R. Kamble

Abstract:

Voice biometric liveness detection is customized to certify an authentication process of the voice data presented is genuine and not a recording or synthetic voice. With the rise of deepfakes and other equivalently sophisticated spoofing generation techniques, it’s becoming challenging to ensure that the person on the other end is a live speaker or not. Voice Liveness Detection (VLD) system is a group of security measures which detect and prevent voice spoofing attacks. Motivated by the recent development of the Kolmogorov-Arnold Network (KAN) based on the Kolmogorov-Arnold theorem, we proposed KAN for the VLD task. To date, multilayer perceptron (MLP) based classifiers have been used for the classification tasks. We aim to capture not only the compositional structure of the model but also to optimize the values of univariate functions. This study explains the mathematical as well as experimental analysis of KAN for VLD tasks, thereby opening a new perspective for scientists to work on speech and signal processing-based tasks. This study emerges as a combination of traditional signal processing tasks and new deep learning models, which further proved to be a better combination for VLD tasks. The experiments are performed on the POCO and ASVSpoof 2017 V2 database. We used Constant Q-transform, Mel, and short-time Fourier transform (STFT) based front-end features and used CNN, BiLSTM, and KAN as back-end classifiers. The best accuracy is 91.26 % on the POCO database using STFT features with the KAN classifier. In the ASVSpoof 2017 V2 database, the lowest EER we obtained was 26.42 %, using CQT features and KAN as a classifier.

Keywords: Kolmogorov Arnold networks, multilayer perceptron, pop noise, voice liveness detection

Procedia PDF Downloads 38
40 An Efficient Encryption Scheme Using DWT and Arnold Transforms

Authors: Ali Abdrhman M. Ukasha

Abstract:

Data security needed in data transmission, storage, and communication to ensure the security. The color image is decomposed into red, green, and blue channels. The blue and green channels are compressed using 3-levels discrete wavelet transform. The Arnold transform uses to changes the locations of red image channel pixels as image scrambling process. Then all these channels are encrypted separately using a key image that has same original size and is generating using private keys and modulo operations. Performing the X-OR and modulo operations between the encrypted channels images for image pixel values change purpose. The extracted contours of color image recovery can be obtained with accepted level of distortion using Canny edge detector. Experiments have demonstrated that proposed algorithm can fully encrypt 2D color image and completely reconstructed without any distortion. It has shown that the color image can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.

Keywords: color image, wavelet transform, edge detector, Arnold transform, lossy image encryption

Procedia PDF Downloads 482
39 Robust Data Image Watermarking for Data Security

Authors: Harsh Vikram Singh, Ankur Rai, Anand Mohan

Abstract:

In this paper, we propose secure and robust data hiding algorithm based on DCT by Arnold transform and chaotic sequence. The watermark image is scrambled by Arnold cat map to increases its security and then the chaotic map is used for watermark signal spread in middle band of DCT coefficients of the cover image The chaotic map can be used as pseudo-random generator for digital data hiding, to increase security and robustness .Performance evaluation for robustness and imperceptibility of proposed algorithm has been made using bit error rate (BER), normalized correlation (NC), and peak signal to noise ratio (PSNR) value for different watermark and cover images such as Lena, Girl, Tank images and gain factor .We use a binary logo image and text image as watermark. The experimental results demonstrate that the proposed algorithm achieves higher security and robustness against JPEG compression as well as other attacks such as addition of noise, low pass filtering and cropping attacks compared to other existing algorithm using DCT coefficients. Moreover, to recover watermarks in proposed algorithm, there is no need to original cover image.

Keywords: data hiding, watermarking, DCT, chaotic sequence, arnold transforms

Procedia PDF Downloads 514
38 Effect of Agricultural Extension Services on Technical Efficiency of Smallholder Cassava Farmers in Ghana: A Stochastic Meta-Frontier Analysis

Authors: Arnold Missiame

Abstract:

In Ghana, rural dwellers who depend primarily on agriculture for their livelihood constitute about 60% of the country’s population. This shows the critical role and potentials of the agricultural sector in helping to achieve Ghana’s vision 2030. With the current threat of climate change and advancements in technology, agricultural extension is not just about technology transfer and improvements in productivity, but it is also about improving the managerial and technical skills of farmers. In Ghana, the government of Ghana as well as other players in the sector like; non-governmental organizations, NGOs, local and international funding agencies, for decades now, have made capacity-building-investments in smallholder farmers by way of extension services delivery. This study sought to compare the technical efficiency of farmers who have access to agricultural extension and farmers who do not in Ghana. The study employed the stochastic meta-frontier model to analyze household survey data comprising 300 smallholder cassava farmers from the Fanteakwa district of Ghana. The farmers were selected through a two-stage sampling technique where 5 communities were purposively selected in the first stage and then 60 smallholder cassava farmers were randomly selected from each of the 5 communities. Semi-structured questionnaires were used to collect data on farmers’ socioeconomic and farm-level characteristics. The results showed that farmers who have access to agricultural extensions services have higher technical efficiencies (TE) and produce much closer to their meta-production frontiers (higher technology gap ratios (TGR) than farmers who do not have access to such extension services. Furthermore, experience in cassava cultivation and formal education significantly improves the technical efficiencies of farmers. The study recommends that the mode and scope of agricultural extension service delivery in the country should be enhanced to ensure that smallholder farmers have easy access to extension agents.

Keywords: agricultural extension, Ghana, smallholder farmers, stochastic meta-frontier model, technical efficiency

Procedia PDF Downloads 108
37 Multilevel Gray Scale Image Encryption through 2D Cellular Automata

Authors: Rupali Bhardwaj

Abstract:

Cryptography is the science of using mathematics to encrypt and decrypt data; the data are converted into some other gibberish form, and then the encrypted data are transmitted. The primary purpose of this paper is to provide two levels of security through a two-step process, rather than transmitted the message bits directly, first encrypted it using 2D cellular automata and then scrambled with Arnold Cat Map transformation; it provides an additional layer of protection and reduces the chance of the transmitted message being detected. A comparative analysis on effectiveness of scrambling technique is provided by scrambling degree measurement parameters i.e. Gray Difference Degree (GDD) and Correlation Coefficient.

Keywords: scrambling, cellular automata, Arnold cat map, game of life, gray difference degree, correlation coefficient

Procedia PDF Downloads 375
36 Fingerprint Image Encryption Using a 2D Chaotic Map and Elliptic Curve Cryptography

Authors: D. M. S. Bandara, Yunqi Lei, Ye Luo

Abstract:

Fingerprints are suitable as long-term markers of human identity since they provide detailed and unique individual features which are difficult to alter and durable over life time. In this paper, we propose an algorithm to encrypt and decrypt fingerprint images by using a specially designed Elliptic Curve Cryptography (ECC) procedure based on block ciphers. In addition, to increase the confusing effect of fingerprint encryption, we also utilize a chaotic-behaved method called Arnold Cat Map (ACM) for a 2D scrambling of pixel locations in our method. Experimental results are carried out with various types of efficiency and security analyses. As a result, we demonstrate that the proposed fingerprint encryption/decryption algorithm is advantageous in several different aspects including efficiency, security and flexibility. In particular, using this algorithm, we achieve a margin of about 0.1% in the test of Number of Pixel Changing Rate (NPCR) values comparing to the-state-of-the-art performances.

Keywords: arnold cat map, biometric encryption, block cipher, elliptic curve cryptography, fingerprint encryption, Koblitz’s encoding

Procedia PDF Downloads 204
35 Yu Kwang-Chung vs. Yu Kwang-Chung: Untranslatability as the Touchstone of a Poet

Authors: Min-Hua Wu

Abstract:

The untranslatability of an established poet’s tour de force is thoroughly explored by Matthew Arnold (1822-1888). In his On Translating Homer (1861), Arnold lists the four most striking poetic qualities of Homer, namely his rapidity, plainness and directness of style and diction, plainness and directness of ideas, and nobleness. He concludes that such celebrated English translators as Cowper, Pope, Chapman, and Mr. Newman are all doomed, due to their respective failure in rendering the totality of the four Homeric poetic qualities. Why poetic translation always amounts to being proven such a mission impossible for the translator? According to Arnold, it is because there constantly exists a mist interposed between the translator’s own literary self-obsession and the objective artistic qualities that reside in the work of the original author. Foregrounding such a seemingly empowering yet actually detrimental poetic mist, he explains why the aforementioned translators fail in their attempts to bring the Homeric charm to the British reader. Drawing on Arnold’s analytical study on Homeric translation, the research attempts to bring Yu Kwang-chung the poet vis-à-vis Yu Kwang-chung the translator, with an aim not so much to find any similar mist as revealed by Arnold between his Chinese poetry and English translation as to probe into a latent and veiled literary and lingual mist interposed between Chinese and English, if not between Chinese and English literatures. The major work studied and analyzed for this study is Yu’s own Chinese poetry and his own English translation collected in The Night Watchman: Yu Kwang-chung 1958-2004. The research argues that the following critical elements that characterizes Yu’s poetics are to a certain extent 'transformed,' if not 'lost,' in his English translation: a. the Chinese pictographic and ideographic unit terms which so unfailingly characterize the poet’s incredible creativity, allowing him to habitually and conveniently coin concrete textual images or word-scapes almost at his own will; b. the subtle wordplay and punning which appear at a reasonable frequency; c. the parallel contrastive repetitive syntactic structure within a single poetic line; d. the ambiguous and highly associative diction in the adjective and noun categories; e. the literary allusion that harks back to the old times of Chinese literature; f. the alliteration that adds rhythm and smoothness to the lines; g. the rhyming patterns that bring about impressive sonority and lingering echo to the ears of the reader; h. the grandeur-imposing and sublimity-arousing word-scaping which hinges on the employment of verbs; i. the meandering cultural heritage that embraces such elements as Chinese medicine and kung fu; and j. other features of the like. Once we appeal to the Arnoldian tribunal and resort to the strict standards of such a Victorian cultural and literary critic who insists 'to see the object as in itself it really is,' we may serve as a potential judge for the tug of war between Yu Kwang-chung the poet and Yu Kwang-chung the translator, a tug of war that will not merely broaden our understating of Chinese poetics but deepen our apprehension of Chinese-English translatology.

Keywords: Yu Kwang-chung, The Night Watchman, poetry translation, Chinese-English translation, translation studies, Matthew Arnold

Procedia PDF Downloads 392
34 Color Image Compression/Encryption/Contour Extraction using 3L-DWT and SSPCE Method

Authors: Ali A. Ukasha, Majdi F. Elbireki, Mohammad F. Abdullah

Abstract:

Data security needed in data transmission, storage, and communication to ensure the security. This paper is divided into two parts. This work interests with the color image which is decomposed into red, green and blue channels. The blue and green channels are compressed using 3-levels discrete wavelet transform. The Arnold transform uses to changes the locations of red image channel pixels as image scrambling process. Then all these channels are encrypted separately using the key image that has same original size and are generating using private keys and modulo operations. Performing the X-OR and modulo operations between the encrypted channels images for image pixel values change purpose. The extracted contours from color images recovery can be obtained with accepted level of distortion using single step parallel contour extraction (SSPCE) method. Experiments have demonstrated that proposed algorithm can fully encrypt 2D Color images and completely reconstructed without any distortion. Also shown that the analyzed algorithm has extremely large security against some attacks like salt and pepper and Jpeg compression. Its proof that the color images can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.

Keywords: SSPCE method, image compression and salt and peppers attacks, bitplanes decomposition, Arnold transform, color image, wavelet transform, lossless image encryption

Procedia PDF Downloads 517
33 Music of a Film City: Interwar Europe in Los Angeles, 1930s

Authors: Alexander Rosenblatt

Abstract:

The musical culture of the city of Los Angeles, as it is seen today, developed not without the influence of outstanding musicians who came from Europe during the period between the world wars. The combination of European modernist ideas with American musical culture, which differed in many ways from European musical culture, led to unique results. During the 1920s and even more so in the 1930s, members of the Austrian-German artistic intelligentsia, particularly those of Jewish origin who felt insecure in their homeland, began to look for a safer place. The United States has become such a place for many, and many of them chose the second largest metropolis—Los Angeles. The most notable figure in this group was the modernist composer Arnold Schoenberg. Other famous musicians were conductors Otto Klemperer and Bruno Walter. The study focused on how these people acclimated to a city whose culture and business revolved around film production; what place the conductors Klemperer and Walter occupied in the city, state, and country; how Schoenberg, whose musical style was little understood by the American public, was able to realize himself; what path he took when he was accepted to two universities as a professor of counterpoint and composition; and whether he revised his own views on the development of Western music. Another aspect was the study of how the composer’s memory was preserved in the universities where he taught. The study is based primarily on materials found in four libraries of two universities located in Los Angeles, UCLA and USC, during my tenure as a visiting scholar at USC Thornton School of Music (August 2023), to be completed during my upcoming visit there in August-September 2024, as well as on interviews with people active in efforts to keep Schoenberg’s memory alive on the USC Campus.

Keywords: los angeles, filmmaking, immigrant musicians, arnold schoenberg, otto klemperer, bruno walter

Procedia PDF Downloads 26
32 On the Mathematical Modelling of Aggregative Stability of Disperse Systems

Authors: Arnold M. Brener, Lesbek Tashimov, Ablakim S. Muratov

Abstract:

The paper deals with the special model for coagulation kernels which represents new control parameters in the Smoluchowski equation for binary aggregation. On the base of the model the new approach to evaluating aggregative stability of disperse systems has been submitted. With the help of this approach the simple estimates for aggregative stability of various types of hydrophilic nano-suspensions have been obtained.

Keywords: aggregative stability, coagulation kernels, disperse systems, mathematical model

Procedia PDF Downloads 308
31 Efficient Design of Distribution Logistics by Using a Model-Based Decision Support System

Authors: J. Becker, R. Arnold

Abstract:

The design of distribution logistics has a decisive impact on a company's logistics costs and performance. Hence, such solutions make an essential contribution to corporate success. This article describes a decision support system for analyzing the potential of distribution logistics in terms of logistics costs and performance. In contrast to previous procedures of business process re-engineering (BPR), this method maps distribution logistics holistically under variable distribution structures. Combined with qualitative measures the decision support system will contribute to a more efficient design of distribution logistics.

Keywords: decision support system, distribution logistics, potential analyses, supply chain management

Procedia PDF Downloads 405
30 Response Solutions of 2-Dimensional Elliptic Degenerate Quasi-Periodic Systems With Small Parameters

Authors: Song Ni, Junxiang Xu

Abstract:

This paper concerns quasi-periodic perturbations with parameters of 2-dimensional degenerate systems. If the equilibrium point of the unperturbed system is elliptic-type degenerate. Assume that the perturbation is real analytic quasi-periodic with diophantine frequency. Without imposing any assumption on the perturbation, we can use a path of equilibrium points to tackle with the Melnikov non-resonance condition, then by the Leray-Schauder Continuation Theorem and the Kolmogorov-Arnold-Moser technique, it is proved that the equation has a small response solution for many sufficiently small parameters.

Keywords: quasi-periodic systems, KAM-iteration, degenerate equilibrium point, response solution

Procedia PDF Downloads 86
29 Truthful or Untruthful Social Media Posts: Applying Statement Analysis to Decode online Deception

Authors: Christa L. Arnold, Margaret C. Stewart

Abstract:

This research shares the results of an exploratory study examining Statement Analysis (SA) to detect deception in online truthful and untruthful social media posts. Applying a Law Enforcement methodology SA, used in criminal interview statements, this research analyzes what is stated to assist in evaluating written deceptive information. Preliminary findings reveal qualitative and quantitative nuances for SA in online deception detection and uncover insights regarding digital deceptive behavior. Thus far, findings reveal truthful statements tend to differ from untruthful statements in both content and quality.

Keywords: deception detection, online deception, social media content, statement analysis

Procedia PDF Downloads 64
28 Development of Ferrous-Aluminum Alloys from Recyclable Material by High Energy Milling

Authors: Arnold S. Freitas Neto, Rodrigo E. Coelho, Erick S. Mendonça

Abstract:

This study aimed to obtain an alloy of Iron and Aluminum in the proportion of 50% of atomicity for each constituent. Alloys were obtained by processing recycled aluminum and chips of 1200 series carbon steel in a high-energy mill. For the experiment, raw materials were processed thorough high energy milling before mixing the substances. Subsequently, the mixture of 1200 series carbon steel and Aluminum powder was carried out a milling process. Thereafter, hot compression was performed in a closed die in order to obtain the samples. The pieces underwent heat treatments, sintering and aging. Lastly, the composition and the mechanical properties of their hardness were analyzed. In this paper, results are compared with previous studies, which used iron powder of high purity instead of Carbon steel in the composition.

Keywords: Fe-Al alloys, high energy milling, metallography characterization, powder metallurgy

Procedia PDF Downloads 308
27 Characterization of Coastal Solid Waste: Basis for the Development of Waste Collector

Authors: Arnold I. Malag

Abstract:

The study wants to establish the data on the characteristics of coastal solid waste in main Island of Masbate as a model for technology interventions. The research utilized the Google Maps to measure the coastal length and Fishbowl Method for area identification. The solid wastes gathered were classified as residual, non-biodegradable, recyclable wastes, and special wastes, based on the waste analysis and characterization manual of Philippine Environmental Governance Project. The wastes were evaluated by weight in kg., dimension in cm., and characteristics as floating or non-floating. Based on the dimension of coastal solid waste, the biodegradable, recyclable, residual and special waste have the average of 40.95 cm., 16.25 cm., 31.37 cm., and 0.725cm. respectively. The waste in the coastal areas is dominated by biodegradable, followed by residual, then recyclable and special wastes with the data of 0.566 kg/m, 0.533 kg/m, 0.114 kg/m and .0007 kg/m respectively. The 97.15% of solid wastes collected is characterized as “floating”, where in the sources are the nearest rivers and waterways and/or the nearest populated areas adjacent to the island. This accumulation of solid wastes can be minimized and controlled by utilizing a floating equipment.

Keywords: solid waste, coastal waste, waste characterization, waste collector

Procedia PDF Downloads 82
26 A Futuristic Look at American Indian Nationhood: Zits in Sherman Alexie’s Flight

Authors: Shaimaa Alobaidi

Abstract:

The presentation examines how urbanization opens possibilities for American Indian characters like Zits in Alexie’s Flightto explore new definitionsoftheirtribal self-identification. Zits travels in time and views the world from different bodies, ages, and races; his journeys end with different perspectives on the idea of nationhood as an American Indian. He is an example of Vine Deloria’s statementthat “urban Indians have become the cutting edge of the new Indian nationalism” (248). Flight is chosen because the momentZits leaves the real world for time-traveling adventures is very critical; it is a moment of rage that ends in the mass murder of many Anglo-Americans. The paper focus on the turning point when he returns into his body with new opportunities towards his existence among the majority of anglo-Americans who cannot help but see him American Indian minority in need of help and assistance. Characters, such as Zits, attempt to outlive alienation, and Alexie gives new definitionsof their ethnic nationhood. Futuristicdoes not mean the very far unpredictable future; it is rather a nearpotential future for teenagers of American Indians, like Zits, Arnold, andCoyoteSprings- the band in ReservationBlues; all revolutionary personalitiesin Alexie’s works. They will be analyzed as Gerald Vizenor’s “postindianwarriors” who have the ability to identify Indigenous nationalism in a post-colonial context.

Keywords: alienation, self-identification, nationhood, urbanization, postindian

Procedia PDF Downloads 165
25 Robust Quantum Image Encryption Algorithm Leveraging 3D-BNM Chaotic Maps and Controlled Qubit-Level Operations

Authors: Vivek Verma, Sanjeev Kumar

Abstract:

This study presents a novel quantum image encryption algorithm, using a 3D chaotic map and controlled qubit-level scrambling operations. The newly proposed 3D-BNM chaotic map effectively reduces the degradation of chaotic dynamics resulting from the finite word length effect. It facilitates the generation of highly unpredictable random sequences and enhances chaotic performance. The system’s efficacy is additionally enhanced by the inclusion of a SHA-256 hash function. Initially, classical plain images are converted into their quantum equivalents using the Novel Enhanced Quantum Representation (NEQR) model. The Generalized Quantum Arnold Transformation (GQAT) is then applied to disrupt the coordinate information of the quantum image. Subsequently, to diffuse the pixel values of the scrambled image, XOR operations are performed using pseudorandom sequences generated by the 3D-BNM chaotic map. Furthermore, to enhance the randomness and reduce the correlation among the pixels in the resulting cipher image, a controlled qubit-level scrambling operation is employed. The encryption process utilizes fundamental quantum gates such as C-NOT and CCNOT. Both theoretical and numerical simulations validate the effectiveness of the proposed algorithm against various statistical and differential attacks. Moreover, the proposed encryption algorithm operates with low computational complexity.

Keywords: 3D Chaotic map, SHA-256, quantum image encryption, Qubit level scrambling, NEQR

Procedia PDF Downloads 10
24 Predictive Maintenance of Industrial Shredders: Efficient Operation through Real-Time Monitoring Using Statistical Machine Learning

Authors: Federico Pittino, Thomas Arnold

Abstract:

The shredding of waste materials is a key step in the recycling process towards the circular economy. Industrial shredders for waste processing operate in very harsh operating conditions, leading to the need for frequent maintenance of critical components. Maintenance optimization is particularly important also to increase the machine’s efficiency, thereby reducing the operational costs. In this work, a monitoring system has been developed and deployed on an industrial shredder located at a waste recycling plant in Austria. The machine has been monitored for one year, and methods for predictive maintenance have been developed for two key components: the cutting knives and the drive belt. The large amount of collected data is leveraged by statistical machine learning techniques, thereby not requiring very detailed knowledge of the machine or its live operating conditions. The results show that, despite the wide range of operating conditions, a reliable estimate of the optimal time for maintenance can be derived. Moreover, the trade-off between the cost of maintenance and the increase in power consumption due to the wear state of the monitored components of the machine is investigated. This work proves the benefits of real-time monitoring system for the efficient operation of industrial shredders.

Keywords: predictive maintenance, circular economy, industrial shredder, cost optimization, statistical machine learning

Procedia PDF Downloads 121
23 Contribution to the Development of a New Design of Dentist's Gowns: A Case Study of Using Infra-Red Technology and Pressure Sensors

Authors: Tran Thi Anh Dao, M. Arnold, L. Schacher, D. C. Adolphe, G. Reys

Abstract:

During tooth extraction or implant surgery, dentists are in contact with numerous infectious germs from patients' saliva and blood. For that reason, dentist's clothes have to play their role of protection from contamination. In addition, dentist's apparels should be not only protective but also comfortable and breathable because dentists have to perform many operations and treatments on patients throughout the day with high concentration and intensity. However, this type of protective garments has not been studied scientifically, whereas dentists are facing new risks and eager for looking for a comfortable personal protective equipment. For that reason, we have proposed some new designs of dentist's gown. They were expected to diminish heat accumulation that are considered as an important factor in reducing the level of comfort experienced by users. Experiments using infra-red technology were carried out in order to compare the breathable properties between a traditional gown and a new design with open zones. Another experiment using pressure sensors was also carried out to study ergonomic aspects trough the flexibility of movements of sleeves. The sleeves-design which is considered comfortable and flexible will be chosen for the further step. The results from the two experiments provide valuable information for the development of a new design of dentists' gowns in order to achieve maximum levels of cooling and comfort for the human body.

Keywords: garment, dentists, comfort, design, protection, thermal

Procedia PDF Downloads 219
22 A Convergent Interacting Particle Method for Computing Kpp Front Speeds in Random Flows

Authors: Tan Zhang, Zhongjian Wang, Jack Xin, Zhiwen Zhang

Abstract:

We aim to efficiently compute the spreading speeds of reaction-diffusion-advection (RDA) fronts in divergence-free random flows under the Kolmogorov-Petrovsky-Piskunov (KPP) nonlinearity. We study a stochastic interacting particle method (IPM) for the reduced principal eigenvalue (Lyapunov exponent) problem of an associated linear advection-diffusion operator with spatially random coefficients. The Fourier representation of the random advection field and the Feynman-Kac (FK) formula of the principal eigenvalue (Lyapunov exponent) form the foundation of our method implemented as a genetic evolution algorithm. The particles undergo advection-diffusion and mutation/selection through a fitness function originated in the FK semigroup. We analyze the convergence of the algorithm based on operator splitting and present numerical results on representative flows such as 2D cellular flow and 3D Arnold-Beltrami-Childress (ABC) flow under random perturbations. The 2D examples serve as a consistency check with semi-Lagrangian computation. The 3D results demonstrate that IPM, being mesh-free and self-adaptive, is simple to implement and efficient for computing front spreading speeds in the advection-dominated regime for high-dimensional random flows on unbounded domains where no truncation is needed.

Keywords: KPP front speeds, random flows, Feynman-Kac semigroups, interacting particle method, convergence analysis

Procedia PDF Downloads 46
21 Executive Function in Youth With ADHD and ASD: A Systematic Review and Meta-analysis

Authors: Parker Townes, Prabdeep Panesar, Chunlin Liu, Soo Youn Lee, Dan Devoe, Paul D. Arnold, Jennifer Crosbie, Russell Schachar

Abstract:

Attention-deficit hyperactivity disorder (ADHD) and autism spectrum disorder (ASD) are impairing childhood neurodevelopmental disorders with problems in executive functions. Executive functions are higher-level mental processes essential for daily functioning and goal attainment. There is genetic and neural overlap between ADHD and ASD. The aim of this meta-analysis was to evaluate if pediatric ASD and ADHD have distinct executive function profiles. This review was completed following Cochrane guidelines. Fifty-eight articles were identified through database searching, followed by a blinded screening in duplicate. A meta-analysis was performed for all task performance metrics evaluated by at least two articles. Forty-five metrics from 24 individual tasks underwent analysis. No differences were found between youth with ASD and ADHD in any domain under direct comparison. However, individuals with ASD and ADHD exhibited deficient attention, flexibility, visuospatial abilities, working memory, processing speed, and response inhibition compared to controls. No deficits in planning were noted in either disorder. Only 11 studies included a group with comorbid ASD+ADHD, making it difficult to determine whether common executive function deficits are a function of comorbidity. Further research is needed to determine if comorbidity accounts for the apparent commonality in executive function between ASD and ADHD.

Keywords: autism spectrum disorder, ADHD, neurocognition, executive function, youth

Procedia PDF Downloads 74
20 Diffusion Mechanism of Aroma Compound (2-Acetyl-1-Pyrroline) in Rice During Storage

Authors: Mary Ann U. Baradi, Arnold R. Elepaño, Manuel Jose C. Regalado

Abstract:

Aromatic rice has become popular and continues to command higher price than ordinary rice because of its distinctive scent that makes it special. Freshly harvested aromatic rice exhibits strong aromatic scent but decreases with time and conditions during storage. Of the many volatile compounds in aromatic rice, 2-acetyl-1-pyrroline (2AP) is a major compound that gives rice its popcorn-like aroma. The diffusion mechanism of 2AP in rice was investigated. Semi-empirical models explaining 2AP diffusion as affected by temperature and duration were developed. Storage time and temperature affected 2AP loss via diffusion. The amount of 2AP in rice decreased with time. Free 2AP, being volatile, is lost due to diffusion. Storage experiment indicated rapid 2AP loss during the first five weeks and subsequently leveled off afterwards; attaining level of starch bound 2AP. Decline of 2AP during storage followed exponential equation and exhibited four stages; i.e. the initial, second, third and final stage. Free 2AP is easily lost while bound 2AP is left, only to be released upon exposure to high temperature such as cooking. Both free and bound 2AP is found in endosperm while free 2AP is in the bran. Around 63–67% of total 2AP was lost in brown and milled rice of MS 6 paddy kept at ambient. Samples stored at higher temperature (27°C) recorded higher 2AP loss than those kept at lower temperature (15°C). The study should be able to guide processors in understanding and controlling parameters in storage to produce high quality rice.

Keywords: 2-acetyl-1-pyrroline, aromatic rice, diffusion mechanism, storage

Procedia PDF Downloads 337
19 Agency Cost, Firm Performance, Corporate Governance: Evidence from Indonesia

Authors: Arnold Sanda Layuk

Abstract:

Fraud in the disclosure of financial statements by management shows that agency conflict is an important issue in the company. The conflict has consequences for the agency costs that must be borne and has an impact on the firm's performance. The effect of agency costs on firm performance is investigated in this study, as well as whether several variables such as corporate governance mechanisms can positively moderate the agency cost and firm performance relationship. The agency cost is measured by the asset utilization ratio and discretionary expenditure ratio. The firm's performance is represented by the return on equity. Data was collected from the manufacturing companies listed on the Indonesia Stock Exchange from 2015 to 2019, then regressed on the panel data using the panel corrected standard error model (PCSE). According to the findings, agency costs are negatively related to firm performance, which supports previous empirical research findings. It also found that the agency cost and firm performance relationship is significantly moderated by board size and ownership concentration as the representatives of corporate governance mechanisms. It suggests that corporate governance can become tools to reduce agency costs and increase firm performance as well. The empirical evidence adds to previous research on agency conflict, particularly in emerging markets. These findings are expected to supplement previous research and provide additional information to shareholders in order to control opportunistic management decisions that affect their investments and discretionary operational expenses.

Keywords: agency cost, corporate governance, asset utilization ratio, firm performance

Procedia PDF Downloads 193
18 ISMARA: Completely Automated Inference of Gene Regulatory Networks from High-Throughput Data

Authors: Piotr J. Balwierz, Mikhail Pachkov, Phil Arnold, Andreas J. Gruber, Mihaela Zavolan, Erik van Nimwegen

Abstract:

Understanding the key players and interactions in the regulatory networks that control gene expression and chromatin state across different cell types and tissues in metazoans remains one of the central challenges in systems biology. Our laboratory has pioneered a number of methods for automatically inferring core gene regulatory networks directly from high-throughput data by modeling gene expression (RNA-seq) and chromatin state (ChIP-seq) measurements in terms of genome-wide computational predictions of regulatory sites for hundreds of transcription factors and micro-RNAs. These methods have now been completely automated in an integrated webserver called ISMARA that allows researchers to analyze their own data by simply uploading RNA-seq or ChIP-seq data sets and provides results in an integrated web interface as well as in downloadable flat form. For any data set, ISMARA infers the key regulators in the system, their activities across the input samples, the genes and pathways they target, and the core interactions between the regulators. We believe that by empowering experimental researchers to apply cutting-edge computational systems biology tools to their data in a completely automated manner, ISMARA can play an important role in developing our understanding of regulatory networks across metazoans.

Keywords: gene expression analysis, high-throughput sequencing analysis, transcription factor activity, transcription regulation

Procedia PDF Downloads 65
17 Evaluation of Rhus lancea and Celtis africana as Browse for Mixed-Feeders in Captivity

Authors: France Phiri, Arnold Kanengoni, Dawood Hattas, Khanyisile Mbatha

Abstract:

A study was carried out to determine seasonal changes in fiber composition and condensed tannin (CT) concentrations in Rhus lancea and Celtis africana and their effects on feed intake and blood metabolites in mixed-feeders. Rhus lancea and C. africana were analysed for dry matter (DM), acid detergent lignin (ADL), acid detergent fiber (ADF), neutral detergent fiber (NDF) and CT concentrations over four seasons; early wet (EWS), late wet (LWS), early dry (EDS) and late dry (LDS). Twelve indigenous male goats were kept in metabolic crates for periods of 21 days per season and fed one of two diet combinations; the test diet comprised R. lancea and C. africana (denoted as BROWSE) and the lucerne diet comprised lucerne (Medicago sativa and concentrates (CON). Feed intake, body weight and blood metabolites were determined in all goats over each study period. Goats fed BROWSE in the EDS, LDS and LWS lost weight while goats fed CON gained weight (P < 0.05). Goats fed CON had higher urea, alkaline phosphatase and gamma-glutamyl transferase concentrations than those fed BROWSE (P < 0.05). Creatinine and cholesterol concentrations in all goats across LWS, EDS and LDS were lower than the normal range, while total protein and globulin concentrations were higher. The goats fed BROWSE had higher creatinine concentrations (P < 0.05) than those fed CON. Cholesterol concentrations were higher (P < 0.05) in goats fed BROWSE than in those on CON fed. It was concluded that goats fed BROWSE lost weight, indicating insufficient nutrients for maintenance requirements.

Keywords: fiber, maintenance, condense tannins, blood metabolites

Procedia PDF Downloads 192
16 Steel Industry Waste as Recyclable Raw Material for the Development of Ferrous-Aluminum Alloys

Authors: Arnold S. Freitas Neto, Rodrigo E. Coelho, Erick S. Mendonça

Abstract:

The study aims to assess if high-purity iron powder in iron-aluminum alloys can be replaced by SAE 1020 steel chips with an atomicity proportion of 50% for each element. Chips of SAE 1020 are rejected in industrial processes. Thus, the use of SAE 1020 as a replaceable composite for iron increase the sustainability of ferrous alloys by recycling industrial waste. The alloys were processed by high energy milling, of which the main advantage is the minimal loss of raw material. The raw material for three of the six samples were high purity iron powder and recyclable aluminum cans. For the other three samples, the high purity iron powder has been replaced with chips of SAE 1020 steel. The process started with the separate milling of chips of aluminum and SAE 1020 steel to obtain the powder. Subsequently, the raw material was mixed in the pre-defined proportions, milled together for five hours and then underwent a closed-die hot compaction at the temperature of 500 °C. Thereafter, the compacted samples underwent heat treatments known as sintering and solubilization. All samples were sintered one hour, and 4 samples were solubilized for either 4 or 10 hours under well-controlled atmosphere conditions. Lastly, the composition and the mechanical properties of their hardness were analyzed. The samples were analyzed by optical microscopy, scanning electron microscopy and hardness testing. The results of the analysis showed a similar chemical composition and interesting hardness levels with low standard deviations. This verified that the use of SAE 1020 steel chips can be a low-cost alternative for high-purity iron powder and could possibly replace high-purity Iron in industrial applications.

Keywords: Fe-Al alloys, high energy milling, iron-aluminum alloys, metallography characterization, powder metallurgy, recycling ferrous alloy, SAE 1020 steel recycling

Procedia PDF Downloads 358
15 The Executive Functioning Profile of Children and Adolescents with a Diagnosis of OCD: A Systematic Review and Meta-Analysis

Authors: Parker Townes, Aisouda Savadlou, Shoshana Weiss, Marina Jarenova, Suzzane Ferris, Dan Devoe, Russel Schachar, Scott Patten, Tomas Lange, Marlena Colasanto, Holly McGinn, Paul Arnold

Abstract:

Some research suggests obsessive-compulsive disorder (OCD) is associated with impaired executive functioning: higher-level mental processes involved in carrying out tasks and solving problems. Relevant literature was identified systematically through online databases. Meta-analyses were conducted for task performance metrics reported by at least two articles. Results were synthesized by the executive functioning domain measured through each performance metric. Heterogeneous literature was identified, typically involving few studies using consistent measures. From 29 included studies, analyses were conducted on 33 performance metrics from 12 tasks. Results suggest moderate associations of working memory (two out of five tasks presented significant findings), planning (one out of two tasks presented significant findings), and visuospatial abilities (one out of two tasks presented significant findings) with OCD in youth. There was inadequate literature or contradictory findings for other executive functioning domains. These findings suggest working memory, planning, and visuospatial abilities are impaired in pediatric OCD, with mixed results. More work is needed to identify the effect of age and sex on these results. Acknowledgment: This work was supported by the Alberta Innovates Translational Health Chair in Child and Youth Mental Health. The funders had no role in the design, conducting, writing, or decision to submit this article for publication.

Keywords: obsessive-compulsive disorder, neurocognition, executive functioning, adolescents, children

Procedia PDF Downloads 99