Search results for: Chris Cheng
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 584

Search results for: Chris Cheng

464 High Performance Electrocardiogram Steganography Based on Fast Discrete Cosine Transform

Authors: Liang-Ta Cheng, Ching-Yu Yang

Abstract:

Based on fast discrete cosine transform (FDCT), the authors present a high capacity and high perceived quality method for electrocardiogram (ECG) signal. By using a simple adjusting policy to the 1-dimentional (1-D) DCT coefficients, a large volume of secret message can be effectively embedded in an ECG host signal and be successfully extracted at the intended receiver. Simulations confirmed that the resulting perceived quality is good, while the hiding capability of the proposed method significantly outperforms that of existing techniques. In addition, our proposed method has a certain degree of robustness. Since the computational complexity is low, it is feasible for our method being employed in real-time applications.

Keywords: data hiding, ECG steganography, fast discrete cosine transform, 1-D DCT bundle, real-time applications

Procedia PDF Downloads 166
463 The Antecedents of Facebook Check in Adoption Intention: The Perspective of Social Influence

Authors: Hsiu-Hua Cheng

Abstract:

Recently, the competition between websites becomes intense. How to make users “adopt” their websites is an issue of urgent importance for online communities companies. Social procedures (such as social influence) can possibly explain how and why users’ technologies usage behaviors affect other people to use the technologies. This study proposes two types of social influences on the initial usage of Facebook Check In-friends and group members. Besides, this study indicates that Facebook friends’ previous usage of Facebook Check In and Facebook group members’ previous usage of Facebook Check In will positively influence focal actors’ Facebook Check In adoption intention. The article concludes with contributions to academic research and practice.

Keywords: social influence, adoption intention, facebook check in, previous usage behavior

Procedia PDF Downloads 423
462 An Analytical Approach to Assess and Compare the Vulnerability Risk of Operating Systems

Authors: Pubudu K. Hitigala Kaluarachchilage, Champike Attanayake, Sasith Rajasooriya, Chris P. Tsokos

Abstract:

Operating system (OS) security is a key component of computer security. Assessing and improving OSs strength to resist against vulnerabilities and attacks is a mandatory requirement given the rate of new vulnerabilities discovered and attacks occurring. Frequency and the number of different kinds of vulnerabilities found in an OS can be considered an index of its information security level. In the present study five mostly used OSs, Microsoft Windows (windows 7, windows 8 and windows 10), Apple’s Mac and Linux are assessed for their discovered vulnerabilities and the risk associated with each. Each discovered and reported vulnerability has an exploitability score assigned in CVSS score of the national vulnerability database. In this study the risk from vulnerabilities in each of the five Operating Systems is compared. Risk Indexes used are developed based on the Markov model to evaluate the risk of each vulnerability. Statistical methodology and underlying mathematical approach is described. Initially, parametric procedures are conducted and measured. There were, however, violations of some statistical assumptions observed. Therefore the need for non-parametric approaches was recognized. 6838 vulnerabilities recorded were considered in the analysis. According to the risk associated with all the vulnerabilities considered, it was found that there is a statistically significant difference among average risk levels for some operating systems, indicating that according to our method some operating systems have been more risk vulnerable than others given the assumptions and limitations. Relevant test results revealing a statistically significant difference in the Risk levels of different OSs are presented.

Keywords: cybersecurity, Markov chain, non-parametric analysis, vulnerability, operating system

Procedia PDF Downloads 157
461 Design of a Sliding Controller for Optical Disk Drives

Authors: Yu-Sheng Lu, Chung-Hsin Cheng, Shuen-Shing Jan

Abstract:

This paper presents the design and implementation of a sliding-mod controller for tracking servo of optical disk drives. The tracking servo is majorly subject to two disturbance sources: radial run-out and shock. The lateral run-out disturbance is mostly repeatable, and a model of such disturbance is incorporated into the controller design to effectively compensate for it. Meanwhile, as a shock disturbance is usually non-repeatable and unpredictable, the sliding-mode controller is employed for its robustness to abrupt perturbations. As a result, a sliding-mode controller design based on the internal model principle is tailored for tracking servo of optical disk drives in order to deal with these two major disturbances. Experimental comparative studies are conducted to investigate the effectiveness of the specially designed controller.

Keywords: mechatronics, optical disk drive, sliding-mode control, servo systems

Procedia PDF Downloads 339
460 Examination of Media and Electoral Violence in Kogi State, Nigeria

Authors: Chris Ogwu Attah, Okpanachi Linus Odiji

Abstract:

An election is no doubt a universally accepted means of resolving societal problems, particularly those with political connotations. While the process has often been conducted in advanced democracies without attacks on opponents and the populace, that ambiance of political tranquillity has hardly been enjoyed in many African states. While the violent nature of polls on this part of the globe have for long been linked among other things to monetization and the zero-sum character of politics, emerging trends show how the increasing rate of electoral violence may not be unconnected to the broadcasts of violent acts in the media. Anchored on the age-long complaints about the possible deleterious effects of mass media and Plato’s concern about the effects of plays on the youth, this study aims to interrogate the relationship between media and electoral violence in Nigeria using Kogi State as a case study. While the Social Cognitive Theory is adopted to guide the study to fruition, data was elicited primarily from a multi-stage sampling arrangement in which respondents from three purposively selected locations (Anyigba, Lokoja, and Okene) were randomly selected. Using chi-square to test the assumption that media violence catalyzes electoral violence in Kogi State, it was discovered among other revelations that electoral violence increases numerically with the depiction of violence in the media. As a recommendation, therefore, this paper advocate that Civil Society Organisations, as well as relevant governmental agencies, should carry out mass political education which aims at instilling political morals on the populace, especially the youths.

Keywords: electoral violence, media, media violence, violence

Procedia PDF Downloads 120
459 The Investigation of Women Civil Engineers’ Identity Development through the Lens of Recognition Theory

Authors: Hasan Sungur, Evrim Baran, Benjamin Ahn, Aliye Karabulut Ilgu, Chris Rehmann, Cassandra Rutherford

Abstract:

Engineering identity contributes to the professional and educational persistence of women engineers. A crucial factor contributing to the development of the engineering identity is recognition. Those without adequate recognition often do not succeed in positively building their identities. This research draws on Honneth’s recognition theory to identify factors impacting women civil engineers’ feelings of recognition as civil engineers. A survey was composed and distributed to 330 female alumni who graduated from the Department of Civil, Construction, and Environmental Engineering at Iowa State University in the last ten years. The survey items include demographics, perceptions of the identity of civil engineering, and factors that influence the recognition of civil engineering identities, such as views of society and family. Descriptive analysis of the survey responses revealed that the perceptions of civil engineering varied widely. Participants’ definitions of civil engineering included the terms: construction, design, and infrastructure. Almost half of the participants reported that the major reason to study civil engineering was their interest in the subject matter, and most reported that they were proud to be civil engineers. Many study participants reported that their parents see them as civil engineers. Treatment of institutions and the workplace were also considered as having a significant impact on the recognition of women civil engineers. Almost half of the participants reported that they felt isolated or ignored at work because of their gender. This research emphasizes the importance of recognition for the development of the civil engineering identity of women

Keywords: civil engineering, gender, identity, recognition

Procedia PDF Downloads 218
458 Multiscale Structures and Their Evolution in a Screen Cylinder Wake

Authors: Azlin Mohd Azmi, Tongming Zhou, Akira Rinoshika, Liang Cheng

Abstract:

The turbulent structures in the wake (x/d =10 to 60) of a screen cylinder have been reduced to understand the roles of the various structures as evolving downstream by comparing with those obtained in a solid circular cylinder wake at Reynolds number, Re of 7000. Using a wavelet multi-resolution technique, the flow structures are decomposed into a number of wavelet components based on their central frequencies. It is observed that in the solid cylinder wake, large-scale structures (of frequency f0 and 1.2 f0) make the largest contribution to the Reynolds stresses although they start to lose their roles significantly at x/d > 20. In the screen cylinder wake, the intermediate-scale structures (2f0 and 4f0) contribute the most to the Reynolds stresses at x/d =10 before being taken over by the large-scale structures (f0) further downstream.

Keywords: turbulent structure, screen cylinder, vortex, wavelet multi-resolution analysis

Procedia PDF Downloads 434
457 A Thermosensitive Polypeptide Hydrogel for Biomedical Application

Authors: Chih-Chi Cheng, Ji-Yu Lin, I-Ming Chu

Abstract:

In this study, we synthesized a thermosensitive polypeptide hydrogel by copolymerizing poloxamer (PLX) and poly(ʟ-alanine) with ʟ-lysine segments at the both ends to form PLX-b-poly(ʟ-alanine-lysine) (Lys-Ala-PLX-Ala-Lys) copolymers. Poly(ʟ-alanine) is the hydrophobic chain of Lys-Ala-PLX-Ala-Lys copolymers which was designed to capture the hydrophobic agents. The synthesis was examined by 1H NMR and showed that Lys-Ala-PLX-Ala-Lys copolymers were successfully synthesized. At the concentration range of 3-7 wt%, the aqueous copolymer solution underwent sol-gel transition near the physiological temperature and exhibited changes in its secondary structure content, as evidenced by FTIR. The excellent viability of cells cultured within the scaffold was observed after 72 hr of incubation. Also, negatively charged bovine serum albumin was incorporated into the hydrogel without diminishing material integrity and shows good release profile. In the animal study, the results also indicated that Lys-Ala-PLX-Ala-Lys hydrogel has high potential in wound dressing.

Keywords: polypeptide thermosensitive hydrogel, tacrolimus, vascularized composite allotransplantation, sustain release

Procedia PDF Downloads 268
456 Optimization of the Control Scheme for Human Extremity Exoskeleton

Authors: Yang Li, Xiaorong Guan, Cheng Xu

Abstract:

In order to design a suitable control scheme for human extremity exoskeleton, the interaction force control scheme with traditional PI controller was presented, and the simulation study of the electromechanical system of the human extremity exoskeleton was carried out by using a MATLAB/Simulink module. By analyzing the simulation calculation results, it was shown that the traditional PI controller is not very suitable for every movement speed of human body. So, at last the fuzzy self-adaptive PI controller was presented to solve this problem. Eventually, the superiority and feasibility of the fuzzy self-adaptive PI controller was proved by the simulation results and experimental results.

Keywords: human extremity exoskeleton, interaction force control scheme, simulation study, fuzzy self-adaptive pi controller, man-machine coordinated walking, bear payload

Procedia PDF Downloads 336
455 Preparation and Characterization of Photocatalyst for the Conversion of Carbon Dioxide to Methanol

Authors: D. M. Reddy Prasad, Nur Sabrina Binti Rahmat, Huei Ruey Ong, Chin Kui Cheng, Maksudur Rahman Khan, D. Sathiyamoorthy

Abstract:

Carbon dioxide (CO2) emission to the environment is inevitable which is responsible for global warming. Photocatalytic reduction of CO2 to fuel, such as methanol, methane etc. is a promising way to reduce greenhouse gas CO2 emission. In the present work, Bi2S3/CdS was synthesized as an effective visible light responsive photocatalyst for CO2 reduction into methanol. The Bi2S3/CdS photocatalyst was prepared by hydrothermal reaction. The catalyst was characterized by X-ray diffraction (XRD) instrument. The photocatalytic activity of the catalyst has been investigated for methanol production as a function of time. Gas chromatograph flame ionization detector (GC-FID) was employed to analyze the product. The yield of methanol was found to increase with higher CdS concentration in Bi2S3/CdS and the maximum yield was obtained for 45 wt% of Bi2S3/CdS under visible light irradiation was 20 μmole/g. The result establishes that Bi2S3/CdS is favorable catalyst to reduce CO2 to methanol.

Keywords: photocatalyst, CO2 reduction, methanol, visible light, XRD, GC-FID

Procedia PDF Downloads 473
454 Gimbal Structure for the Design of 3D Flywheel System

Authors: Cheng-En Tsai, Chung-Chun Hsiao, Fu-Yuan Chang, Liang-Lun Lan, Jia-Ying Tu

Abstract:

New design of three dimensional (3D) flywheel system based on gimbal and gyro mechanics is proposed. The 3D flywheel device utilizes the rotational motion of three spherical shells and the conservation of angular momentum to achieve planar locomotion. Actuators mounted to the ring-shape frames are installed within the system to drive the spherical shells to rotate, for the purpose of steering and stabilization. Similar to the design of 2D flywheel system, it is expected that the spherical shells may function like a “flyball” to store and supply mechanical energy; additionally, in comparison with typical single-wheel and spherical robots, the 3D flywheel can be used for developing omnidirectional robotic systems with better mobility. The Lagrangian method is applied to derive the equation of motion of the 3D flywheel system, and simulation studies are presented to verify the proposed design.

Keywords: Gimbal, spherical robot, gyroscope, Lagrangian formulation, flyball

Procedia PDF Downloads 600
453 Finding the Reaction Constant between Humic Acid and Aluminum Ion by Fluorescence Quenching Effect

Authors: Wen Po Cheng, Chen Zhao Feng, Ruey Fang Yu, Lin Jia Jun, Lin Ji Ye, Chen Yuan Wei

Abstract:

Humic acid was used as the removal target for evaluating the coagulation efficiency in this study. When the coagulant ions mix with a humic acid solution, a Fluorescence quenching effect may be observed conditionally. This effect can be described by Stern-Volmer linear equation which can be used for quantifying the quenching value (Kq) of the Fluorescence quenching effect. In addition, a Complex-Formation Titration (CFT) theory was conducted and the result was used to explain the electron-neutralization capability of the coagulant (AlCl₃) at different pH. The results indicated that when pH of the ACl₃ solution was between 6 and 8, fluorescence quenching effect obviously occurred. The maximum Kq value was found to be 102,524 at pH 6. It means that the higher the Kq value is, the better complex reaction between a humic acid and aluminum salts will be. Through the Kq value study, the optimum pH can be quantified when the humic acid solution is coagulated with aluminum ions.

Keywords: humic acid, fluorescence quenching effect, complex reaction, titration

Procedia PDF Downloads 542
452 Analyze Long-Term Shoreline Change at Yi-Lan Coast, Taiwan Using Multiple Sources

Authors: Geng-Gui Wang, Chia-Hao Chang, Jee-Cheng Wu

Abstract:

A shoreline is a line where a body of water and the shore meet. It provides economic and social security to coastal habitations. However, shorelines face multiple threats due to both natural processes and man-made effects because of disasters, rapid urbanization, industrialization, and sand deposition and erosion, etc. In this study, we analyzed multi-temporal satellite images of the Yilan coast, Taiwan from 1978 to 2016, using the United States Geological Survey (USGS) Digital Shoreline Analysis System (DSAS), weather information (as rainfall records and typhoon routes), and man-made construction project data to explore the causes of shoreline changes. The results showed that the shoreline at Yilan coast is greatly influenced by typhoons and anthropogenic interventions.

Keywords: shoreline change, multi-temporal satellite, digital shoreline analysis system, DSAS, Yi-Lan coast

Procedia PDF Downloads 134
451 Color Image Enhancement Using Multiscale Retinex and Image Fusion Techniques

Authors: Chang-Hsing Lee, Cheng-Chang Lien, Chin-Chuan Han

Abstract:

In this paper, an edge-strength guided multiscale retinex (EGMSR) approach will be proposed for color image contrast enhancement. In EGMSR, the pixel-dependent weight associated with each pixel in the single scale retinex output image is computed according to the edge strength around this pixel in order to prevent from over-enhancing the noises contained in the smooth dark/bright regions. Further, by fusing together the enhanced results of EGMSR and adaptive multiscale retinex (AMSR), we can get a natural fused image having high contrast and proper tonal rendition. Experimental results on several low-contrast images have shown that our proposed approach can produce natural and appealing enhanced images.

Keywords: image enhancement, multiscale retinex, image fusion, EGMSR

Procedia PDF Downloads 430
450 Soil and the Gut Microbiome: Supporting the 'Hygiene Hypothesis'

Authors: Chris George, Adam Hamlin, Lily Pereg, Richard Charlesworth, Gal Winter

Abstract:

Background: According to the ‘hygiene hypothesis’ the current rise in allergies and autoimmune diseases stems mainly from reduced microbial exposure due, amongst other factors, to urbanisation and distance from soil. However, this hypothesis is based on epidemiological and not biological data. Useful insights into the underlying mechanisms of this hypothesis can be gained by studying our interaction with soil. Soil microbiota may be directly ingested or inhaled by humans, enter the body through skin-soil contact or using plants as vectors. This study aims to examine the ability of soil microbiota to colonise the gut, study the interaction of soil microbes with the immune system and their potential protective activity. Method: The nutrition of the rats was supplemented daily with fresh or autoclaved soil for 21 days followed by 14 days of no supplementations. Faecal samples were collected throughout and analysed using 16S sequencing. At the end of the experiment rats were sacrificed and tissues and digesta were collected. Results/Conclusion: Results showed significantly higher richness and diversity following soil supplementation even after recovery. Specific soil microbial groups identified as able to colonise the gut. Of particular interest was the mucosal layer which emerged as a receptive host for soil microorganisms. Histological examination revealed innate and adaptive immune activation. Findings of this study reinforce the ‘hygiene hypothesis’ by demonstrating the ability of soil microbes to colonise the gut and activate the immune system. This paves the way for further studies aimed to examine the interaction of soil microorganisms with the immune system.

Keywords: gut microbiota, hygiene hypothesis, microbiome, soil

Procedia PDF Downloads 223
449 Mathematical Model of a Compound Gear Pump

Authors: Hsueh-Cheng Yang

Abstract:

The generation and design of compound involute spur gearings can be used in gear pump. A compound rack cutter with asymmetric involute teeth is presented for determining the mathematical model of compound gear pumps. This paper covers the following topics: (a) generation and geometry of compound rack cutter is presented and used to generate a compound gear and a compound pinion. (b) Based on the developed compound gears, stress analysis was performed for the symmetric gears and the asymmetric gears. Comparing the results of the stress analysis for the asymmetric involute teeth is superior to the symmetric involute teeth. A numerical example that illustrates the developed compound rack cutter is represented.

Keywords: compound, involute teeth, gear pump, rack cutter

Procedia PDF Downloads 346
448 Nonlinear Modeling of the PEMFC Based on NNARX Approach

Authors: Shan-Jen Cheng, Te-Jen Chang, Kuang-Hsiung Tan, Shou-Ling Kuo

Abstract:

Polymer Electrolyte Membrane Fuel Cell (PEMFC) is such a time-vary nonlinear dynamic system. The traditional linear modeling approach is hard to estimate structure correctly of PEMFC system. From this reason, this paper presents a nonlinear modeling of the PEMFC using Neural Network Auto-regressive model with eXogenous inputs (NNARX) approach. The multilayer perception (MLP) network is applied to evaluate the structure of the NNARX model of PEMFC. The validity and accuracy of NNARX model are tested by one step ahead relating output voltage to input current from measured experimental of PEMFC. The results show that the obtained nonlinear NNARX model can efficiently approximate the dynamic mode of the PEMFC and model output and system measured output consistently.

Keywords: PEMFC, neural network, nonlinear modeling, NNARX

Procedia PDF Downloads 352
447 Mass Media and Electoral Conflict Management in Kogi State, Nigeria

Authors: Okpanachi Linus Odiji, Chris Ogwu Attah

Abstract:

Election is no doubt widely assumed as one of the most suitable means of resolving political quagmires even though it has never been bereft of conflict which can manifest before, during, or after polls. What, however, advances democracy and promotes electoral integrity is the existence and effectiveness of institutional frameworks for electoral conflict management. Electoral conflicts are no doubt unique in the sense that they represent the struggles of people over the control of public resources. In most cases, the stakes involved are high and emotional that they do not only undermine inter-group relationship but also threaten national security. The need, therefore, for an effectively functional conflict management apparatus becomes imperative. While at the State level, there exist numerous governmental initiatives at various electoral stages aimed at managing conflicts, this paper examines the activities of the mass media, which is another prominent stakeholder in the electoral process. Even though media influence has increased tremendously in the last decade, researchers are yet to agree on its utility in the management of conflicts. Guided by the social responsibility theory of media reporting and drawing data from observed trends in Kogi state, the paper, which context analyses the 2019 gubernatorial election coverage in the state, observes both conflict escalation and de-escalation roles in the media. To mitigate conflict reporting misrepresentation, therefore, a common approach to conflict reporting should be designed and ordered by the National Broadcasting Commission as well as the Nigerian Press Council. This should be garnished with the training of journalists on conflict reporting and development of a standard conflict reporting procedure.

Keywords: conflict management, electoral conflict, mass media, media reporting

Procedia PDF Downloads 116
446 Trace Network: A Probabilistic Relevant Pattern Recognition Approach to Attribution Trace Analysis

Authors: Jian Xu, Xiaochun Yun, Yongzheng Zhang, Yafei Sang, Zhenyu Cheng

Abstract:

Network attack prevention is a critical research area of information security. Network attack would be oppressed if attribution techniques are capable to trace back to the attackers after the hacking event. Therefore attributing these attacks to a particular identification becomes one of the important tasks when analysts attempt to differentiate and profile the attacker behind a piece of attack trace. To assist analysts in expose attackers behind the scenes, this paper researches on the connections between attribution traces and proposes probabilistic relevance based attribution patterns. This method facilitates the evaluation of the plausibility relevance between different traceable identifications. Furthermore, through analyzing the connections among traces, it could confirm the existence probability of a certain organization as well as discover its affinitive partners by the means of drawing relevance matrix from attribution traces.

Keywords: attribution trace, probabilistic relevance, network attack, attacker identification

Procedia PDF Downloads 331
445 Predicting the Next Offensive Play Types will be Implemented to Maximize the Defense’s Chances of Success in the National Football League

Authors: Chris Schoborg, Morgan C. Wang

Abstract:

In the realm of the National Football League (NFL), substantial dedication of time and effort is invested by both players and coaches in meticulously analyzing the game footage of their opponents. The primary aim is to anticipate the actions of the opposing team. Defensive players and coaches are especially focused on deciphering their adversaries' intentions to effectively counter their strategies. Acquiring insights into the specific play type and its intended direction on the field would confer a significant competitive advantage. This study establishes pre-snap information as the cornerstone for predicting both the play type (e.g., deep pass, short pass, or run) and its spatial trajectory (right, left, or center). The dataset for this research spans the regular NFL season data for all 32 teams from 2013 to 2022. This dataset is acquired using the nflreadr package, which conveniently extracts play-by-play data from NFL games and imports it into the R environment as structured datasets. In this study, we employ a recently developed machine learning algorithm, XGBoost. The final predictive model achieves an impressive lift of 2.61. This signifies that the presented model is 2.61 times more effective than random guessing—a significant improvement. Such a model has the potential to markedly enhance defensive coaches' ability to formulate game plans and adequately prepare their players, thus mitigating the opposing offense's yardage and point gains.

Keywords: lift, NFL, sports analytics, XGBoost

Procedia PDF Downloads 36
444 Electronic Government Services Adoption from Multi-Nationalities Perspectives

Authors: Isaac Kofi Mensah, Jianing Mi, Cheng Feng

Abstract:

Electronic government is the application of Information and Communication Technologies (ICTs) by the government to improve public service delivery to citizens and businesses. The purpose of this study is to investigate factors influencing the adoption and use of e-government services from different nationalities perspectives. The Technology Acceptance Model (TAM) will be used as the theoretical framework for the study. A questionnaire would be developed and administered to 500 potential respondents who are students from different nationalities in China. Predictors such as perceived usefulness, perceived ease of use, computer self-efficacy, trust in both the internet and government, social influence and perceived service quality would be examined with regard to their impact on the intention to use e-government services. This research is currently at the design and implementation stage. The completion of this study will provide useful insights into understanding factors impacting the decision to use e-government services from a cross and multi nationalities perspectives.

Keywords: different nationalities, e-government, e-government services, technology acceptance model (TAM)

Procedia PDF Downloads 401
443 Consensus Problem of High-Order Multi-Agent Systems under Predictor-Based Algorithm

Authors: Cheng-Lin Liu, Fei Liu

Abstract:

For the multi-agent systems with agent's dynamics described by high-order integrator, and usual consensus algorithm composed of the state coordination control parts is proposed. Under communication delay, consensus algorithm in asynchronously-coupled form just can make the agents achieve a stationary consensus, and sufficient consensus condition is obtained based on frequency-domain analysis. To recover the original consensus state of the high-order agents without communication delay, besides, a predictor-based consensus algorithm is constructed via multiplying the delayed neighboring agents' states by a delay-related compensation part, and sufficient consensus condition is also obtained. Simulation illustrates the correctness of the results.

Keywords: high-order dynamic agents, communication delay, consensus, predictor-based algorithm

Procedia PDF Downloads 542
442 Attenuation of Homocysteine-Induced Cyclooxygenase-2 Expression in Human Monocytes by Fulvic Acid

Authors: Shao-Ju Chien, Yi-Chien Wu, Ting-Ying Huang, Li-Tsen Li, You-Jin Chen, Cheng-Nan Chen

Abstract:

Homocysteine and pro-inflammatory mediators such as cyclooxygenase-2 (COX-2) have been linked to vascular dysfunction and risks of cardiovascular diseases. Fulvic acid (FA) is class of compounds of humic substances and possesses various pharmacological properties. However, the effect of FA on inflammatory responses of the monocytes remains unclear. We investigated the regulatory effect of FA on homocysteine-induced COX-2 expression in human monocytes. Peripheral blood monocytes and U937 cells were kept as controls or pre-treated with FA, and then stimulated with homocysteine. The results show that pretreating monocytes with FA inhibited the homocysteine-induced COX-2 expression in a dose-dependent manner. The inhibitor for nuclear factor-kB (NF-kB) attenuated homocysteine-induced COX-2 expression. Our findings provide a molecular mechanism by which FA inhibit homocysteine-induced COX-2 expression in monocytes, and a basis for using FA in pharmaceutical therapy against inflammation.

Keywords: homocysteine, monocytes, cyclooxygenase-2, fulvic acid, anti-inflammation

Procedia PDF Downloads 555
441 Multivariate Genome-Wide Association Studies for Identifying Additional Loci for Myopia

Authors: Qiao Fan, Xiaobo Guo, Junxian Zhu, Xiaohu Ding, Ching-Yu Cheng, Tien-Yin Wong, Mingguang He, Heping Zhang, Xueqin Wang

Abstract:

A systematic, simultaneous analysis of multiple phenotypes in genome-wide association studies (GWASs) draws a great attention to integrate the signals from single phenotypes with increased power. However, lacking an interpretable and efficient multivariate GWAS analysis impede the application of such approach. In this study, we propose to decompose the multivariate model into a series of simple univariate models. This transformation illuminates what exactly the individual trait contributes to the significant signals from the multivariate analyses. By employing our approach in the analysis of three myopia-related endophenotypes from the Singapore Malay Eye Study (SIMES), we identify novel candidate loci which were successfully validated in an independent Guangzhou Twin Eye Study (GTES).

Keywords: GWAS multivariate, multiple traits, myopia, association

Procedia PDF Downloads 198
440 Using the Cluster Computing to Improve the Computational Speed of the Modular Exponentiation in RSA Cryptography System

Authors: Te-Jen Chang, Ping-Sheng Huang, Shan-Ten Cheng, Chih-Lin Lin, I-Hui Pan, Tsung- Hsien Lin

Abstract:

RSA system is a great contribution for the encryption and the decryption. It is based on the modular exponentiation. We call this system as “a large of numbers for calculation”. The operation of a large of numbers is a very heavy burden for CPU. For increasing the computational speed, in addition to improve these algorithms, such as the binary method, the sliding window method, the addition chain method, and so on, the cluster computer can be used to advance computational speed. The cluster system is composed of the computers which are installed the MPICH2 in laboratory. The parallel procedures of the modular exponentiation can be processed by combining the sliding window method with the addition chain method. It will significantly reduce the computational time of the modular exponentiation whose digits are more than 512 bits and even more than 1024 bits.

Keywords: cluster system, modular exponentiation, sliding window, addition chain

Procedia PDF Downloads 497
439 NANCY: Combining Adversarial Networks with Cycle-Consistency for Robust Multi-Modal Image Registration

Authors: Mirjana Ruppel, Rajendra Persad, Amit Bahl, Sanja Dogramadzi, Chris Melhuish, Lyndon Smith

Abstract:

Multimodal image registration is a profoundly complex task which is why deep learning has been used widely to address it in recent years. However, two main challenges remain: Firstly, the lack of ground truth data calls for an unsupervised learning approach, which leads to the second challenge of defining a feasible loss function that can compare two images of different modalities to judge their level of alignment. To avoid this issue altogether we implement a generative adversarial network consisting of two registration networks GAB, GBA and two discrimination networks DA, DB connected by spatial transformation layers. GAB learns to generate a deformation field which registers an image of the modality B to an image of the modality A. To do that, it uses the feedback of the discriminator DB which is learning to judge the quality of alignment of the registered image B. GBA and DA learn a mapping from modality A to modality B. Additionally, a cycle-consistency loss is implemented. For this, both registration networks are employed twice, therefore resulting in images ˆA, ˆB which were registered to ˜B, ˜A which were registered to the initial image pair A, B. Thus the resulting and initial images of the same modality can be easily compared. A dataset of liver CT and MRI was used to evaluate the quality of our approach and to compare it against learning and non-learning based registration algorithms. Our approach leads to dice scores of up to 0.80 ± 0.01 and is therefore comparable to and slightly more successful than algorithms like SimpleElastix and VoxelMorph.

Keywords: cycle consistency, deformable multimodal image registration, deep learning, GAN

Procedia PDF Downloads 100
438 Application of Double Side Approach Method on Super Elliptical Winkler Plate

Authors: Hsiang-Wen Tang, Cheng-Ying Lo

Abstract:

In this study, the static behavior of super elliptical Winkler plate is analyzed by applying the double side approach method. The lack of information about super elliptical Winkler plates is the motivation of this study and we use the double side approach method to solve this problem because of its superior ability on efficiently treating problems with complex boundary shape. The double side approach method has the advantages of high accuracy, easy calculation procedure and less calculation load required. Most important of all, it can give the error bound of the approximate solution. The numerical results not only show that the double side approach method works well on this problem but also provide us the knowledge of static behavior of super elliptical Winkler plate in practical use.

Keywords: super elliptical winkler plate, double side approach method, error bound, mechanic

Procedia PDF Downloads 326
437 A Study on Marble Based Geopolymer Mortar / Concrete

Authors: Wei-Hao Lee, Ta-Wui Cheng, Yung-Chin Ding, Tai-Tien Wang

Abstract:

The purpose of this study is trying to use marble wastes as the raw material to fabricate geopolymer green mortar / concrete. Experiment results show that using marble to make geopolymer mortar and concrete, the compressive strength after 28 days curing can reach 35 MPa and 25 MPa, respectively. The characteristics of marble-based geopolymer green mortar and concrete will keep testing for a long term in order to understand the effect parameters. The study is based on resource recovery and recycling. Its basic characteristics are low consumption, low carbon dioxide emission and high efficiency that meet the international tendency 'Circular Economy.' By comparing with Portland cement mortar and concrete, production 1 ton of marble-based geopolymer mortar and concrete, they can be saved around 50.3% and 49.6% carbon dioxide emission, respectively. Production 1 m3 of marble-based geopolymer concrete costs about 62 USD that cheaper than that of traditional Portland concrete. It is proved that the marble-based geopolymer concrete has great potential for further engineering development.

Keywords: marble, geopolymer, geopolymer concrete, CO₂ emission

Procedia PDF Downloads 411
436 A Discrete Event Simulation Model to Manage Bed Usage for Non-Elective Admissions in a Geriatric Medicine Speciality

Authors: Muhammed Ordu, Eren Demir, Chris Tofallis

Abstract:

Over the past decade, the non-elective admissions in the UK have increased significantly. Taking into account limited resources (i.e. beds), the related service managers are obliged to manage their resources effectively due to the non-elective admissions which are mostly admitted to inpatient specialities via A&E departments. Geriatric medicine is one of specialities that have long length of stay for the non-elective admissions. This study aims to develop a discrete event simulation model to understand how possible increases on non-elective demand over the next 12 months affect the bed occupancy rate and to determine required number of beds in a geriatric medicine speciality in a UK hospital. In our validated simulation model, we take into account observed frequency distributions which are derived from a big data covering the period April, 2009 to January, 2013, for the non-elective admission and the length of stay. An experimental analysis, which consists of 16 experiments, is carried out to better understand possible effects of case studies and scenarios related to increase on demand and number of bed. As a result, the speciality does not achieve the target level in the base model although the bed occupancy rate decreases from 125.94% to 96.41% by increasing the number of beds by 30%. In addition, the number of required beds is more than the number of beds considered in the scenario analysis in order to meet the bed requirement. This paper sheds light on bed management for service managers in geriatric medicine specialities.

Keywords: bed management, bed occupancy rate, discrete event simulation, geriatric medicine, non-elective admission

Procedia PDF Downloads 201
435 Evaluation of Turbulence Modelling of Gas-Liquid Two-Phase Flow in a Venturi

Authors: Mengke Zhan, Cheng-Gang Xie, Jian-Jun Shu

Abstract:

A venturi flowmeter is a common device used in multiphase flow rate measurement in the upstream oil and gas industry. Having a robust computational model for multiphase flow in a venturi is desirable for understanding the gas-liquid and fluid-pipe interactions and predicting pressure and phase distributions under various flow conditions. A steady Eulerian-Eulerian framework is used to simulate upward gas-liquid flow in a vertical venturi. The simulation results are compared with experimental measurements of venturi differential pressure and chord-averaged gas holdup in the venturi throat section. The choice of turbulence model is nontrivial in the multiphase flow modelling in a venturi. The performance cross-comparison of the k-ϵ model, Reynolds stress model (RSM) and shear-stress transport (SST) k-ω turbulence model is made in the study. In terms of accuracy and computational cost, the SST k-ω turbulence model is observed to be the most efficient.

Keywords: computational fluid dynamics (CFD), gas-liquid flow, turbulence modelling, venturi

Procedia PDF Downloads 145