Search results for: locating
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 119

Search results for: locating

59 Stability Assessment of Chamshir Dam Based on DEM, South West Zagros

Authors: Rezvan Khavari

Abstract:

The Zagros fold-thrust belt in SW Iran is a part of the Alpine-Himalayan system which consists of a variety of structures with different sizes or geometries. The study area is Chamshir Dam, which is located on the Zohreh River, 20 km southeast of Gachsaran City (southwest Iran). The satellite images are valuable means available to geologists for locating geological or geomorphological features expressing regional fault or fracture systems, therefore, the satellite images were used for structural analysis of the Chamshir dam area. As well, using the DEM and geological maps, 3D Models of the area have been constructed. Then, based on these models, all the acquired fracture traces data were integrated in Geographic Information System (GIS) environment by using Arc GIS software. Based on field investigation and DEM model, main structures in the area consist of Cham Shir syncline and two fault sets, the main thrust faults with NW-SE direction and small normal faults in NE-SW direction. There are three joint sets in the study area, both of them (J1 and J3) are the main large fractures around the Chamshir dam. These fractures indeed consist with the normal faults in NE-SW direction. The third joint set in NW-SE is normal to the others. In general, according to topography, geomorphology and structural geology evidences, Chamshir dam has a potential for sliding in some parts of Gachsaran formation.

Keywords: DEM, chamshir dam, zohreh river, satellite images

Procedia PDF Downloads 462
58 Longitudinal Assessment on the Economic Impacts of Hosting Major Sports Events

Authors: Huei-Fu Lu

Abstract:

Hosting international major sports events (MSEs) has become a globalized strategy for many countries. Most modern countries believe that MSEs can bring the hosting countries with substantial and considerable economic and non-economic benefits; so many cities also input a huge of resources to bid for hosting MSEs. Despite the growing importance of MSEs, limited longitudinal analysis has been carried out to understand and explain the long term economic effects of such events. This paper is to continue the focus of previous literature on the economic effects of hosting MSEs. The study periods are from 1950 to 2014 and the secondary macro-economic data are selected from the countries that have hosted the Asian Games and the Olympic Games (including summer and winter) to precede a longitudinal analysis. A comparison of the real economic growth rate, investment, employment and international trade of hosting countries and the duration of these economic effects are also explored and discussed. Based on the countries’ attributes and locating area, aiming to ascertain whether hosting MSEs is economically worthwhile and whether the economic effects from MSEs are realized as anticipated. The results indicate that hosting MSEs to create positive economic effects like GDP growth or long-term employment may be a myth even for developing countries. However, the empirical findings can provide the sport management or authority with longitudinal and comprehensive elaboration for biding or hosting MSEs in the future.

Keywords: Asian Games, economic effects, major sports events (MSEs), olympic games

Procedia PDF Downloads 301
57 Locating the Best Place for Earthquake Refugee Camps by OpenSource Software: A Case Study for Tehran, Iran

Authors: Reyhaneh Saeedi

Abstract:

Iran is one of the regions which are most prone for earthquakes annually having a large number of financial and mortality and financial losses. Every year around the world, a large number of people lose their home and life due to natural disasters such as earthquakes. It is necessary to provide and specify some suitable places for settling the homeless people before the occurrence of the earthquake, one of the most important factors in crisis planning and management. Some of the natural disasters can be Modeling and shown by Geospatial Information System (GIS). By using GIS, it would be possible to manage the spatial data and reach several goals by making use of the analyses existing in it. GIS has a determining role in disaster management because it can determine the best places for temporary resettling after such a disaster. In this research QuantumGIS software is used that It is an OpenSource software so that easy to access codes and It is also free. In this system, AHP method is used as decision model and to locate the best places for temporary resettling, is done based on the related organizations criteria with their weights and buffers. Also in this research are made the buffer layers of criteria and change them to the raster layers. Later on, the raster layers are multiplied on desired weights then, the results are added together. Eventually, there are suitable places for resettling of victims by desired criteria by different colors with their optimum rate in QuantumGIS platform.

Keywords: disaster management, temporary resettlement, earthquake, QuantumGIS

Procedia PDF Downloads 376
56 A Framework for Railway Passenger Station Site Selection Using Transit-Oriented Development and Urban Regeneration Approaches

Authors: M. Taghavi Zavareh, H. Saremi

Abstract:

Railway transportation is one of the types of transportation systems which, due to the advantages such as the ability to transport a large number of passengers, environmental protection, low energy consumption, and contribution to tourism, has importance. The existence of suitable and accessible stations is one of the requirements that leads to better performance and plays a significant role in the economic, social, political, and cultural development of urban areas. This paper aims to propose a framework for locating railway passenger stations. This research used descriptive-analytical methods and library tools to answer which definitions and theoretical approaches are suitable for the location of railway passenger stations. The results showed that theoretical approaches such as Transit-Oriented Development and Urban Regeneration are of the utmost importance theoretical bases in the field of research. Moreover, we studied three stations in Iran to find out about real trends and criteria in this research. This study also proposed four major criteria including accessibility, development, rail related and economics, and environmental harmony. Ultimately with an emphasis on the proposed criteria, the study concludes that the combination of Transit-Oriented Development and Urban Regeneration is the most suitable framework to locate railway passenger stations.

Keywords: railway passenger station, railway station, site selection, transit-oriented development, urban regeneration

Procedia PDF Downloads 234
55 Unstructured-Data Content Search Based on Optimized EEG Signal Processing and Multi-Objective Feature Extraction

Authors: Qais M. Yousef, Yasmeen A. Alshaer

Abstract:

Over the last few years, the amount of data available on the globe has been increased rapidly. This came up with the emergence of recent concepts, such as the big data and the Internet of Things, which have furnished a suitable solution for the availability of data all over the world. However, managing this massive amount of data remains a challenge due to their large verity of types and distribution. Therefore, locating the required file particularly from the first trial turned to be a not easy task, due to the large similarities of names for different files distributed on the web. Consequently, the accuracy and speed of search have been negatively affected. This work presents a method using Electroencephalography signals to locate the files based on their contents. Giving the concept of natural mind waves processing, this work analyses the mind wave signals of different people, analyzing them and extracting their most appropriate features using multi-objective metaheuristic algorithm, and then classifying them using artificial neural network to distinguish among files with similar names. The aim of this work is to provide the ability to find the files based on their contents using human thoughts only. Implementing this approach and testing it on real people proved its ability to find the desired files accurately within noticeably shorter time and retrieve them as a first choice for the user.

Keywords: artificial intelligence, data contents search, human active memory, mind wave, multi-objective optimization

Procedia PDF Downloads 151
54 EFL Vocabulary Learning Strategies among Students in Greece, Their Preferences and Internet Technology

Authors: Theodorou Kyriaki, Ypsilantis George

Abstract:

Vocabulary learning has attracted a lot of attention in recent years, contrary to the neglected part of the past. Along with the interest in finding successful vocabulary teaching strategies, many scholars focused on locating learning strategies used by language learners. As a result, more and more studies in the area of language pedagogy have been investigating the use of strategies in vocabulary learning by different types of learners. A common instrument in this field is the questionnaire, a tool of work that was enriched by questions involving current technology, and it was further implemented to a sample of 300 Greek students whose age varied from 9 and 17 years. Strategies located were grouped into the three categories of memory, cognitive, and compensatory type and associations between these dependent variables were investigated. In addition, relations between dependent and independent variables (such as age, sex, type of school, cultural background, and grade in English) were pursued to investigate the impact on strategy selection. Finally, results were compared to findings of other studies in the same field to contribute to a hypothesis of ethnic differences in strategy selection. Results initially discuss preferred strategies of all participants and further indicate that: a) technology affects strategy selection while b) differences between ethnic groups are not statistically significant. A number of successful strategies are presented, resulting from correlations of strategy selection and final school grade in English.

Keywords: acquisition of English, internet technology, research among Greek students, vocabulary learning strategies

Procedia PDF Downloads 488
53 Bacteriological Culture Methods and its Uses in Clinical Pathology

Authors: Prachi Choudhary, Jai Gopal Sharma

Abstract:

Microbial cultures determine the type of organism, its abundance in the tested sample, or both. It is one of the primary diagnostic methods of microbiology. It is used to determine the cause of infectious disease by letting the agent multiply in a predetermined medium. Different bacteria produce colonies that may be very distinct from the bacterial species that produced them. To culture any pathogen or microorganism, we should first know about the types of media used in microbiology for culturing. Sometimes sub culturing is also done in various microorganisms if some mixed growth is seen in culture. Nearly 3 types of culture media based on consistency – solid, semi-solid, and liquid (broth) media; are further explained in the report. Then, The Five I's approach is a method for locating, growing, observing, and characterizing microorganisms, including inoculation and incubation. Isolation, inspection, and identification. For identification of bacteria, we have to culture the sample like urine, sputum, blood, etc., on suitable media; there are different methods of culturing the bacteria or microbe like pour plate method, streak plate method, swabbing by needle, pipetting, inoculation by loop, spreading by spreader, etc. After this, we see the bacterial growth after incubation of 24 hours, then according to the growth of bacteria antibiotics susceptibility test is conducted; this is done for sensitive antibiotics or resistance to that bacteria, and also for knowing the name of bacteria. Various methods like the dilution method, disk diffusion method, E test, etc., do antibiotics susceptibility tests. After that, various medicines are provided to the patients according to antibiotic sensitivity and resistance.

Keywords: inoculation, incubation, isolation, antibiotics suspectibility test, characterizing

Procedia PDF Downloads 50
52 Impact Position Method Based on Distributed Structure Multi-Agent Coordination with JADE

Authors: YU Kaijun, Liang Dong, Zhang Yarong, Jin Zhenzhou, Yang Zhaobao

Abstract:

For the impact monitoring of distributed structures, the traditional positioning methods are based on the time difference, which includes the four-point arc positioning method and the triangulation positioning method. But in the actual operation, these two methods have errors. In this paper, the Multi-Agent Blackboard Coordination Principle is used to combine the two methods. Fusion steps: (1) The four-point arc locating agent calculates the initial point and records it to the Blackboard Module.(2) The triangulation agent gets its initial parameters by accessing the initial point.(3) The triangulation agent constantly accesses the blackboard module to update its initial parameters, and it also logs its calculated point into the blackboard.(4) When the subsequent calculation point and the initial calculation point are within the allowable error, the whole coordination fusion process is finished. This paper presents a Multi-Agent collaboration method whose agent framework is JADE. The JADE platform consists of several agent containers, with the agent running in each container. Because of the perfect management and debugging tools of the JADE, it is very convenient to deal with complex data in a large structure. Finally, based on the data in Jade, the results show that the impact location method based on Multi-Agent coordination fusion can reduce the error of the two methods.

Keywords: impact monitoring, structural health monitoring(SHM), multi-agent system(MAS), black-board coordination, JADE

Procedia PDF Downloads 151
51 Factors Affecting eHealth Literacy among Nursing Students in Jordan

Authors: Laila Habiballah, Ahmad Tubaishat

Abstract:

Background: with the development of information and communication technology, using the internet as a source to obtain health information is increasing. Nursing students as future health care providers should have the skills of locating, evaluating and using online health information. This will enable them to help their patients and families to make informed decisions. Aim: this study has a two-fold aim. The first is to assess the eHealth literacy among nursing students in Jordan. The second aim is to explore the factors that have an effect on the eHealth literacy. Methods: this is a descriptive cross-sectional survey that conducted in two universities in Jordan; public and private one. A number of 541 students from both universities were completed the eHEALS scale, which is an instrument designed to measure the eHealth literacy. Some additional personal and demographical variable were collected to explore its effect on eHealth literacy. Results: Students have a high perceived level of e-Health literacy (M=3.62, SD=0.58). They are aware of the available online health resources, know how to search, locate, and use these resources. But, they do not have the skills to evaluate these resources and cannot differentiate between the high and low-quality resources. The results showed as well that type of university, type of students' admission, academic level, students' skills of using the internet, and the perception of usefulness and importance of internet have an effect on the eHealth literacy. While the age, gender, GPA, and the frequency of using the internet was no significant factors. Conclusion: This study represents a baseline reference for the eHealth literacy in Jordan. Students have some skills of eHealth literacy and other skills need to be improved. Nursing educators and administrators should integrate and incorporate the skills of eHealth literacy in the curriculum.

Keywords: eHealth, literacy, nursing, students, Jordan

Procedia PDF Downloads 356
50 Memory and Matrilineage: Is the Siri Mass Possession Tradition of Tulunadu a Death Ritual?

Authors: Yogitha Shetty

Abstract:

Tulunadu, a Tulu-speaking ethno-linguistic minority region in the west coast of India is abundant with oral narratives and associated rituals very unique to this region. One such major worship tradition prevalent here is the mass possession cult of women called Siri Jatre. Deriving its referential script from the Siri epic or pāḍdana, Siri rituals are performed annually in many places of Tulunadu. During these rituals thousands of afflicted women gather at the temple premises and get possessed by the pantheon of seven Siri spirits. While mapping the existing corpus of literature on Siri Jatre – analyzing it as a mode of spirit possession, its psycho-therapeutic significance, its emancipatory potential, etc – this paper offers a paradigm shift by perceiving the entire Siri ritual as a death rite offered to Siri’s grandfather Berma Alva. It draws its arguments from the fieldworks conducted recently in some Siri shrines, interviews conducted among adept Siri women and by analyzing the death rites performed among Bunt caste of the region, and locating it within the historically matrilineal fabric. Thereby, it problematizes the existing analytical frames and raises the question of – if annual Siri ceremonies are a means to bemoan the end of a matrilineal family of Siri? It would delve on the gender configuration as manifested in the Siri cult, having its base in the Tuluva society’s matrilineage, and thereby add to the prevalent ethnographic investigative approaches.

Keywords: death rite, matrilineage, possession, women

Procedia PDF Downloads 276
49 Cadaver Free Fatty Acid Distribution Associated with Burial in Mangrove and Oil Palm Plantation Soils under Tropical Climate

Authors: Siti Sofo Ismail, Siti Noraina Wahida Mohd Alwi, Mohamad Hafiz Ameran, Masrudin M. Yusoff

Abstract:

Locating clandestine cadaver is crucially important in forensic investigations. However, it requires a lot of man power, costly and time consuming. Therefore, the development of a new method to locate the clandestine graves is urgently needed as the cases involve burial of cadaver in different types of soils under tropical climates are still not well explored. This study focused on the burial in mangrove and oil palm plantation soils, comparing the fatty acid distributions in different soil acidities. A stimulated burial experiment was conducted using domestic pig (Sus scrofa) to substitute human tissues. Approximately 20g of pig fatty flesh was allowed to decompose in mangrove and oil palm plantation soils, mimicking burial in a shallow grave. The associated soils were collected at different designated sampling points, corresponding different decomposition stages. Modified Bligh-Dyer Extraction method was applied to extract the soil free fatty acids. Then, the obtained free fatty acids were analyzed with gas chromatography-flame ionization (GC-FID). A similar fatty acid distribution was observed for both mangrove and oil palm plantations soils. Palmitic acid (C₁₆) was the most abundance of free fatty acid, followed by stearic acid (C₁₈). However, the concentration of palmitic acid (C₁₆) higher in oil palm plantation compare to mangrove soils. Conclusion, the decomposition rate of cadaver can be affected by different type of soils.

Keywords: clandestine grave, burial, soils, free fatty acid

Procedia PDF Downloads 367
48 Thermography Evaluation on Facial Temperature Recovery after Elastic Gum

Authors: A. Dionísio, L. Roseiro, J. Fonseca, P. Nicolau

Abstract:

Thermography is a non-radiating and contact-free technology which can be used to monitor skin temperature. The efficiency and safety of thermography technology make it a useful tool for detecting and locating thermal changes in skin surface, characterized by increases or decreases in temperature. This work intends to be a contribution for the use of thermography as a methodology for evaluation of skin temperature in the context of orofacial biomechanics. The study aims to identify the oscillations of skin temperature in the left and right hemiface regions of the masseter muscle, during and after thermal stimulus, and estimate the time required to restore the initial temperature after the application of the stimulus. Using a FLIR T430sc camera, a data acquisition protocol was followed with a group of eight volunteers, aged between 22 and 27 years. The tests were performed in a controlled environment with the volunteers in a comfortably static position. The thermal stimulus involves the use of an ice volume with controlled size and contact surface. The skin surface temperature was recorded in two distinct situations, namely without further stimulus and with the additions of a stimulus obtained by a chewing gum. The data obtained were treated using FLIR Research IR Max software. The time required to recover the initial temperature ranged from 20 to 52 minutes when no stimulus was added and varied between 8 and 26 minutes with the chewing gum stimulus. These results show that recovery is faster with the addition of the stimulus and may guide clinicians regarding the pre and post-operative times with ice therapy, in the presence or absence of mechanical stimulus that increases muscle functions (e.g. phonetics or mastication).

Keywords: thermography, orofacial biomechanics, skin temperature, ice therapy

Procedia PDF Downloads 221
47 A Grey-Box Text Attack Framework Using Explainable AI

Authors: Esther Chiramal, Kelvin Soh Boon Kai

Abstract:

Explainable AI is a strong strategy implemented to understand complex black-box model predictions in a human-interpretable language. It provides the evidence required to execute the use of trustworthy and reliable AI systems. On the other hand, however, it also opens the door to locating possible vulnerabilities in an AI model. Traditional adversarial text attack uses word substitution, data augmentation techniques, and gradient-based attacks on powerful pre-trained Bidirectional Encoder Representations from Transformers (BERT) variants to generate adversarial sentences. These attacks are generally white-box in nature and not practical as they can be easily detected by humans e.g., Changing the word from “Poor” to “Rich”. We proposed a simple yet effective Grey-box cum Black-box approach that does not require the knowledge of the model while using a set of surrogate Transformer/BERT models to perform the attack using Explainable AI techniques. As Transformers are the current state-of-the-art models for almost all Natural Language Processing (NLP) tasks, an attack generated from BERT1 is transferable to BERT2. This transferability is made possible due to the attention mechanism in the transformer that allows the model to capture long-range dependencies in a sequence. Using the power of BERT generalisation via attention, we attempt to exploit how transformers learn by attacking a few surrogate transformer variants which are all based on a different architecture. We demonstrate that this approach is highly effective to generate semantically good sentences by changing as little as one word that is not detectable by humans while still fooling other BERT models.

Keywords: BERT, explainable AI, Grey-box text attack, transformer

Procedia PDF Downloads 114
46 Study of Age-Dependent Changes of Peripheral Blood Leukocytes Apoptotic Properties

Authors: Anahit Hakobjanyan, Zdenka Navratilova, Gabriela Strakova, Martin Petrek

Abstract:

Aging has a suppressive influence on human immune cells. Apoptosis may play important role in age-dependent immunosuppression and lymphopenia. Prevention of apoptosis may be promoted by BCL2-dependent and BCL2-independent manner. BCL2 is an antiapoptotic factor that has an antioxidative role by locating the glutathione at mitochondria and repressing oxidative stress. STAT3 may suppress apoptosis in BCL2-independent manner and promote cell survival blocking cytochrome-c release and reducing ROS production. The aim of our study was to estimate the influence of aging on BCL2-dependent and BCL2-independent prevention of apoptosis via measurement of BCL2 and STAT3 mRNAs expressions. The study was done on Armenian population (2 groups: 37 healthy young (mean age±SE; min/max age, male/female: 37.6±1.1; 20/54, 15/22), 28 healthy aged (66.7±1.5; 57/85, 12/16)). mRNA expression in peripheral blood leukocytes (PBL) was determined by RT-PCR using PSMB2 as the reference gene. Statistical analysis was done with Graph-Pad Prism 5; P < 0.05 considered as significant. The expression of BCL2 mRNA was lower in aged group (0.199) compared with young ones (0.643)(p < 0.01). Decrease expression was also recorded for female and male subgroups (p < 0.01). The expression level of STAT3 mRNA was increased (young, 0.228; aged, 0.428) (p < 0.05) during aging (in the whole age group and male/female subgroups). Decreased level of BCL2 mRNA may indicate about the suppression of BCL2-dependent prevention of apoptosis during aging in peripheral blood leukocytes. At the same time increased the level of STAT3 may suggest about activation of BCL2-independent prevention of apoptosis during aging.

Keywords: BCL2, STAT3, aging, apoptosis

Procedia PDF Downloads 298
45 Combining ASTER Thermal Data and Spatial-Based Insolation Model for Identification of Geothermal Active Areas

Authors: Khalid Hussein, Waleed Abdalati, Pakorn Petchprayoon, Khaula Alkaabi

Abstract:

In this study, we integrated ASTER thermal data with an area-based spatial insolation model to identify and delineate geothermally active areas in Yellowstone National Park (YNP). Two pairs of L1B ASTER day- and nighttime scenes were used to calculate land surface temperature. We employed the Emissivity Normalization Algorithm which separates temperature from emissivity to calculate surface temperature. We calculated the incoming solar radiation for the area covered by each of the four ASTER scenes using an insolation model and used this information to compute temperature due to solar radiation. We then identified the statistical thermal anomalies using land surface temperature and the residuals calculated from modeled temperatures and ASTER-derived surface temperatures. Areas that had temperatures or temperature residuals greater than 2σ and between 1σ and 2σ were considered ASTER-modeled thermal anomalies. The areas identified as thermal anomalies were in strong agreement with the thermal areas obtained from the YNP GIS database. Also the YNP hot springs and geysers were located within areas identified as anomalous thermal areas. The consistency between our results and known geothermally active areas indicate that thermal remote sensing data, integrated with a spatial-based insolation model, provides an effective means for identifying and locating areas of geothermal activities over large areas and rough terrain.

Keywords: thermal remote sensing, insolation model, land surface temperature, geothermal anomalies

Procedia PDF Downloads 342
44 Radio-Frequency Technologies for Sensing and Imaging

Authors: Cam Nguyen

Abstract:

Rapid, accurate, and safe sensing and imaging of physical quantities or structures finds many applications and is of significant interest to society. Sensing and imaging using radio-frequency (RF) techniques, particularly, has gone through significant development and subsequently established itself as a unique territory in the sensing world. RF sensing and imaging has played a critical role in providing us many sensing and imaging abilities beyond our human capabilities, benefiting both civilian and military applications - for example, from sensing abnormal conditions underneath some structures’ surfaces to detection and classification of concealed items, hidden activities, and buried objects. We present the developments of several sensing and imaging systems implementing RF technologies like ultra-wide band (UWB), synthetic-pulse, and interferometry. These systems are fabricated completely using RF integrated circuits. The UWB impulse system operates over multiple pulse durations from 450 to 1170 ps with 5.5-GHz RF bandwidth. It performs well through tests of various samples, demonstrating its usefulness for subsurface sensing. The synthetic-pulse system operating from 0.6 to 5.6 GHz can assess accurately subsurface structures. The synthetic-pulse system operating from 29.72-37.7 GHz demonstrates abilities for various surface and near-surface sensing such as profile mapping, liquid-level monitoring, and anti-personnel mine locating. The interferometric system operating at 35.6 GHz demonstrates its multi-functional capability for measurement of displacements and slow velocities. These RF sensors are attractive and useful for various surface and subsurface sensing applications. This paper was made possible by NPRP grant # 6-241-2-102 from the Qatar National Research Fund (a member of Qatar Foundation). The statements made herein are solely the responsibility of the authors.

Keywords: RF sensors, radars, surface sensing, subsurface sensing

Procedia PDF Downloads 291
43 Automatic Detection of Traffic Stop Locations Using GPS Data

Authors: Areej Salaymeh, Loren Schwiebert, Stephen Remias, Jonathan Waddell

Abstract:

Extracting information from new data sources has emerged as a crucial task in many traffic planning processes, such as identifying traffic patterns, route planning, traffic forecasting, and locating infrastructure improvements. Given the advanced technologies used to collect Global Positioning System (GPS) data from dedicated GPS devices, GPS equipped phones, and navigation tools, intelligent data analysis methodologies are necessary to mine this raw data. In this research, an automatic detection framework is proposed to help identify and classify the locations of stopped GPS waypoints into two main categories: signalized intersections or highway congestion. The Delaunay triangulation is used to perform this assessment in the clustering phase. While most of the existing clustering algorithms need assumptions about the data distribution, the effectiveness of the Delaunay triangulation relies on triangulating geographical data points without such assumptions. Our proposed method starts by cleaning noise from the data and normalizing it. Next, the framework will identify stoppage points by calculating the traveled distance. The last step is to use clustering to form groups of waypoints for signalized traffic and highway congestion. Next, a binary classifier was applied to find distinguish highway congestion from signalized stop points. The binary classifier uses the length of the cluster to find congestion. The proposed framework shows high accuracy for identifying the stop positions and congestion points in around 99.2% of trials. We show that it is possible, using limited GPS data, to distinguish with high accuracy.

Keywords: Delaunay triangulation, clustering, intelligent transportation systems, GPS data

Procedia PDF Downloads 250
42 Efficiency of Robust Heuristic Gradient Based Enumerative and Tunneling Algorithms for Constrained Integer Programming Problems

Authors: Vijaya K. Srivastava, Davide Spinello

Abstract:

This paper presents performance of two robust gradient-based heuristic optimization procedures based on 3n enumeration and tunneling approach to seek global optimum of constrained integer problems. Both these procedures consist of two distinct phases for locating the global optimum of integer problems with a linear or non-linear objective function subject to linear or non-linear constraints. In both procedures, in the first phase, a local minimum of the function is found using the gradient approach coupled with hemstitching moves when a constraint is violated in order to return the search to the feasible region. In the second phase, in one optimization procedure, the second sub-procedure examines 3n integer combinations on the boundary and within hypercube volume encompassing the result neighboring the result from the first phase and in the second optimization procedure a tunneling function is constructed at the local minimum of the first phase so as to find another point on the other side of the barrier where the function value is approximately the same. In the next cycle, the search for the global optimum commences in both optimization procedures again using this new-found point as the starting vector. The search continues and repeated for various step sizes along the function gradient as well as that along the vector normal to the violated constraints until no improvement in optimum value is found. The results from both these proposed optimization methods are presented and compared with one provided by popular MS Excel solver that is provided within MS Office suite and other published results.

Keywords: constrained integer problems, enumerative search algorithm, Heuristic algorithm, Tunneling algorithm

Procedia PDF Downloads 305
41 Teachers of English for Accounting Purpose: Self-Identity and Self-Reflectivity

Authors: Nanis Setyorini

Abstract:

This is an interpretive study that aims to explore English teachers’ self-identity and self-reflection on teaching of English for accounting purpose in Indonesian accounting schools. Pierre Bourdieu’s concepts of capitals, habitus, and field are applied to capture and analyze the outright feelings, dilemma, and efforts of how English teachers see their educational background and adjust their understanding of English teaching for specific purpose, how they deliver unrecognized materials about accountancy, how they build confidence in teaching accountancy experts, and how to develop their professional commitment as English teachers for accounting purpose. Therefore, semi-structured interviews and focus group discussions are conducted to 16 English teachers in accounting schools within five state and private universities in East Java, Indonesia. The appropriateness of English teachers for accounting students remains a debatable topic. Previous literatures assume that the best English teachers for accounting students should be those who can demonstrate good quality use of English as well as those who have sound accounting knowledge and experience; however, such teachers are rare to find. Most English teachers in Indonesian accounting schools generally graduate from English education or English literature that provide a very limited pedagogic theories and practices of English for specific purpose (ESP). As a result, ESP teachers often had misconception and loss of face when they deliver subject contents to their accounting students who sometimes have been employed as professional accountants. The teachers also face a dilemma in locating themselves as the insiders in English knowledge, but the outsiders in accounting field. These situations are generally problems in their early-stage of teaching due to the lack of ESP knowledge, the shortage of teaching preparation, the absence of ESP in-house trainings on English for accountancy, and the unconducive relations with accounting educators as well as other ESP teachers. Then, self-learning with various resources and strategies is said as their effort to develop their teaching competence so they are able to teach English for accounting students more effectively.

Keywords: ESP teacher, English for accounting, self-identity, self-reflectivity

Procedia PDF Downloads 377
40 Information Literacy Skills of Legal Practitioners in Khyber Pakhtunkhwa-Pakistan: An Empirical Study

Authors: Saeed Ullah Jan, Shaukat Ullah

Abstract:

Purpose of the study: The main theme of this study is to explore the information literacy skills of the law practitioners in Khyber Pakhtunkhwa-Pakistan under the heading "Information Literacy Skills of Legal Practitioners in Khyber Pakhtunkhwa-Pakistan: An Empirical Study." Research Method and Procedure: To conduct this quantitative study, the simple random sample approach is used. An adapted questionnaire is distributed among 254 lawyers of Dera Ismail Khan through personal visits and electronic means. The data collected is analyzed through SPSS (Statistical Package for Social Sciences) software. Delimitations of the study: The study is delimited to the southern district of Khyber Pakhtunkhwa: Dera Ismael Khan. Key Findings: Most of the lawyers of District Dera Ismail Khan of Khyber Pakhtunkhwa can recognize and understand the needed information. A large number of lawyers are capable of presenting information in both written and electronic forms. They are not comfortable with different legal databases and using various searching and keyword techniques. They have less knowledge of Boolean operators for locating online information. Conclusion and Recommendations: Efforts should be made to arrange refresher courses and training workshops on the utilization of different legal databases and different search techniques for retrieval of information sources. This practice will enhance the information literacy skills of lawyers, which will ultimately result in a better legal system in Pakistan. Practical implication(s): The findings of the study will motivate the policymakers and authorities of legal forums to restructure the information literacy programs to fulfill the lawyers' information needs. Contribution to the knowledge: No significant work has been done on the lawyers' information literacy skills in Khyber Pakhtunkhwa-Pakistan. It will bring a clear picture of the information literacy skills of law practitioners and address the problems faced by them during the seeking process.

Keywords: information literacy-Pakistan, infromation literacy-lawyers, information literacy-lawyers-KP, law practitioners-Pakistan

Procedia PDF Downloads 122
39 Track and Evaluate Cortical Responses Evoked by Electrical Stimulation

Authors: Kyosuke Kamada, Christoph Kapeller, Michael Jordan, Mostafa Mohammadpour, Christy Li, Christoph Guger

Abstract:

Cortico-cortical evoked potentials (CCEP) refer to responses generated by cortical electrical stimulation at distant brain sites. These responses provide insights into the functional networks associated with language or motor functions, and in the context of epilepsy, they can reveal pathological networks. Locating the origin and spread of seizures within the cortex is crucial for pre-surgical planning. This process can be enhanced by employing cortical stimulation at the seizure onset zone (SOZ), leading to the generation of CCEPs in remote brain regions that may be targeted for disconnection. In the case of a 24-year-old male patient suffering from intractable epilepsy, corpus callosotomy was performed as part of the treatment. DTI-MRI imaging, conducted using a 3T MRI scanner for fiber tracking, along with CCEP, is used as part of an assessment for surgical planning. Stimulation of the SOZ, with alternating monophasic pulses of 300µs duration and 15mA current intensity, resulted in CCEPs on the contralateral frontal cortex, reaching a peak amplitude of 206µV with a latency of 31ms, specifically in the left pars triangularis. The related fiber tracts were identified with a two-tensor unscented Kalman filter (UKF) technique, showing transversal fibers through the corpus callosum. The CCEPs were monitored through the progress of the surgery. Notably, the SOZ-associated CCEPs exhibited a reduction following the resection of the anterior portion of the corpus callosum, reaching the identified connecting fibers. This intervention demonstrated a potential strategy for mitigating the impact of intractable epilepsy through targeted disconnection of identified cortical regions.

Keywords: CCEP, SOZ, Corpus callosotomy, DTI

Procedia PDF Downloads 34
38 A Machine Learning Approach for Detecting and Locating Hardware Trojans

Authors: Kaiwen Zheng, Wanting Zhou, Nan Tang, Lei Li, Yuanhang He

Abstract:

The integrated circuit industry has become a cornerstone of the information society, finding widespread application in areas such as industry, communication, medicine, and aerospace. However, with the increasing complexity of integrated circuits, Hardware Trojans (HTs) implanted by attackers have become a significant threat to their security. In this paper, we proposed a hardware trojan detection method for large-scale circuits. As HTs introduce physical characteristic changes such as structure, area, and power consumption as additional redundant circuits, we proposed a machine-learning-based hardware trojan detection method based on the physical characteristics of gate-level netlists. This method transforms the hardware trojan detection problem into a machine-learning binary classification problem based on physical characteristics, greatly improving detection speed. To address the problem of imbalanced data, where the number of pure circuit samples is far less than that of HTs circuit samples, we used the SMOTETomek algorithm to expand the dataset and further improve the performance of the classifier. We used three machine learning algorithms, K-Nearest Neighbors, Random Forest, and Support Vector Machine, to train and validate benchmark circuits on Trust-Hub, and all achieved good results. In our case studies based on AES encryption circuits provided by trust-hub, the test results showed the effectiveness of the proposed method. To further validate the method’s effectiveness for detecting variant HTs, we designed variant HTs using open-source HTs. The proposed method can guarantee robust detection accuracy in the millisecond level detection time for IC, and FPGA design flows and has good detection performance for library variant HTs.

Keywords: hardware trojans, physical properties, machine learning, hardware security

Procedia PDF Downloads 112
37 Analytical Model of Multiphase Machines Under Electrical Faults: Application on Dual Stator Asynchronous Machine

Authors: Nacera Yassa, Abdelmalek Saidoune, Ghania Ouadfel, Hamza Houassine

Abstract:

The rapid advancement in electrical technologies has underscored the increasing importance of multiphase machines across various industrial sectors. These machines offer significant advantages in terms of efficiency, compactness, and reliability compared to their single-phase counterparts. However, early detection and diagnosis of electrical faults remain critical challenges to ensure the durability and safety of these complex systems. This paper presents an advanced analytical model for multiphase machines, with a particular focus on dual stator asynchronous machines. The primary objective is to develop a robust diagnostic tool capable of effectively detecting and locating electrical faults in these machines, including short circuits, winding faults, and voltage imbalances. The proposed methodology relies on an analytical approach combining electrical machine theory, modeling of magnetic and electrical circuits, and advanced signal analysis techniques. By employing detailed analytical equations, the developed model accurately simulates the behavior of multiphase machines in the presence of electrical faults. The effectiveness of the proposed model is demonstrated through a series of case studies and numerical simulations. In particular, special attention is given to analyzing the dynamic behavior of machines under different types of faults, as well as optimizing diagnostic and recovery strategies. The obtained results pave the way for new advancements in the field of multiphase machine diagnostics, with potential applications in various sectors such as automotive, aerospace, and renewable energies. By providing precise and reliable tools for early fault detection, this research contributes to improving the reliability and durability of complex electrical systems while reducing maintenance and operation costs.

Keywords: faults, diagnosis, modelling, multiphase machine

Procedia PDF Downloads 20
36 The Effects of Placement and Cross-Section Shape of Shear Walls in Multi-Story RC Buildings with Plan Irregularity on Their Seismic Behavior by Using Nonlinear Time History Analyses

Authors: Mohammad Aminnia, Mahmood Hosseini

Abstract:

Environmental and functional conditions sometimes necessitate the architectural plan of the building to be asymmetric, and this result in an asymmetric structure. In such cases, finding an optimal pattern for locating the components of the lateral load bearing system, including shear walls, in the building’s plan is desired. In case of shear walls, in addition to the location, the shape of the wall cross-section is also an effective factor. Various types of shear wall and their proper layout might come effective in better stiffness distribution and more appropriate seismic response of the building. Several studies have been conducted in the context of analysis and design of shear walls; however, few studies have been performed on making decisions for the location and form of shear walls in multi-story buildings, especially those with irregular plan. In this study, an attempt has been made to obtain the most reliable seismic behavior of multi-story reinforced concrete vertically chamfered buildings by using more appropriate shear walls form and arrangement in 7-, 10-, 12-, and 15-story buildings. The considered forms and arrangements include common rectangular walls and L-, T-, U- and Z-shaped plan, located as the core or in the outer frames of the building structure. Comparison of seismic behaviors of the buildings, including maximum roof displacement, and particularly the formation of plastic hinges and their distribution in the buildings’ structures, have been done based on the results of a series of nonlinear time history analyses by using a set of selected earthquake records. Results show that shear walls with U-shaped cross-section, placed as the building central core, and also walls with Z-shaped cross-section, placed at the corners give the building more reliable seismic behavior.

Keywords: vertically chamfered buildings, non-linear time history analyses, l-, t-, u- and z-shaped plan walls

Procedia PDF Downloads 234
35 A Web Service-Based Framework for Mining E-Learning Data

Authors: Felermino D. M. A. Ali, S. C. Ng

Abstract:

E-learning is an evolutionary form of distance learning and has become better over time as new technologies emerged. Today, efforts are still being made to embrace E-learning systems with emerging technologies in order to make them better. Among these advancements, Educational Data Mining (EDM) is one that is gaining a huge and increasing popularity due to its wide application for improving the teaching-learning process in online practices. However, even though EDM promises to bring many benefits to educational industry in general and E-learning environments in particular, its principal drawback is the lack of easy to use tools. The current EDM tools usually require users to have some additional technical expertise to effectively perform EDM tasks. Thus, in response to these limitations, this study intends to design and implement an EDM application framework which aims at automating and simplify the development of EDM in E-learning environment. The application framework introduces a Service-Oriented Architecture (SOA) that hides the complexity of technical details and enables users to perform EDM in an automated fashion. The framework was designed based on abstraction, extensibility, and interoperability principles. The framework implementation was made up of three major modules. The first module provides an abstraction for data gathering, which was done by extending Moodle LMS (Learning Management System) source code. The second module provides data mining methods and techniques as services; it was done by converting Weka API into a set of Web services. The third module acts as an intermediary between the first two modules, it contains a user-friendly interface that allows dynamically locating data provider services, and running knowledge discovery tasks on data mining services. An experiment was conducted to evaluate the overhead of the proposed framework through a combination of simulation and implementation. The experiments have shown that the overhead introduced by the SOA mechanism is relatively small, therefore, it has been concluded that a service-oriented architecture can be effectively used to facilitate educational data mining in E-learning environments.

Keywords: educational data mining, e-learning, distributed data mining, moodle, service-oriented architecture, Weka

Procedia PDF Downloads 219
34 Seismic Hazard Assessment of Tehran

Authors: Dorna Kargar, Mehrasa Masih

Abstract:

Due to its special geological and geographical conditions, Iran has always been exposed to various natural hazards. Earthquake is one of the natural hazards with random nature that can cause significant financial damages and casualties. This is a serious threat, especially in areas with active faults. Therefore, considering the population density in some parts of the country, locating and zoning high-risk areas are necessary and significant. In the present study, seismic hazard assessment via probabilistic and deterministic method for Tehran, the capital of Iran, which is located in Alborz-Azerbaijan province, has been done. The seismicity study covers a range of 200 km from the north of Tehran (X=35.74° and Y= 51.37° in LAT-LONG coordinate system) to identify the seismic sources and seismicity parameters of the study region. In order to identify the seismic sources, geological maps at the scale of 1: 250,000 are used. In this study, we used Kijko-Sellevoll's method (1992) to estimate seismicity parameters. The maximum likelihood estimation of earthquake hazard parameters (maximum regional magnitude Mmax, activity rate λ, and the Gutenberg-Richter parameter b) from incomplete data files is extended to the case of uncertain magnitude values. By the combination of seismicity and seismotectonic studies of the site, the acceleration with antiseptic probability may happen during the useful life of the structure is calculated with probabilistic and deterministic methods. Applying the results of performed seismicity and seismotectonic studies in the project and applying proper weights in used attenuation relationship, maximum horizontal and vertical acceleration for return periods of 50, 475, 950 and 2475 years are calculated. Horizontal peak ground acceleration on the seismic bedrock for 50, 475, 950 and 2475 return periods are 0.12g, 0.30g, 0.37g and 0.50, and Vertical peak ground acceleration on the seismic bedrock for 50, 475, 950 and 2475 return periods are 0.08g, 0.21g, 0.27g and 0.36g.

Keywords: peak ground acceleration, probabilistic and deterministic, seismic hazard assessment, seismicity parameters

Procedia PDF Downloads 47
33 A Team-Based Learning Game Guided by a Social Robot

Authors: Gila Kurtz, Dan Kohen Vacs

Abstract:

Social robots (SR) is an emerging field striving to deploy computers capable of resembling human shapes and mimicking human movements, gestures, and behaviors. The evolving capability of SR to interact with human offers groundbreaking ways for learning and training opportunities. Studies show that SR can offer instructional experiences for fostering creativity, entertainment, enjoyment, and curiosity. These added values are essential for empowering instructional opportunities as gamified learning experiences. We present our project focused on deploying an activity to be experienced in an escape room aimed at team-based learning scaffolded by an SR, NAO. An escape room is a well-known approach for gamified activities focused on a simulated scenario experienced by team-based participants. Usually, the simulation takes place in a physical environment where participants must complete a series of challenges in a limited amount of time. During this experience, players learn something about the assigned topic of the room. In the current learning simulation, students must "save the nation" by locating sensitive information stolen and stored in a vault of four locks. Team members have to look for hints and solve riddles mediated by NAO. Each solution provides a unique code for opening one of the four locks. NAO is also used to provide ongoing feedback on the team's performance. We captured the proceeding of our activity and used it to conduct an evaluation study among ten experts in related areas. The experts were interviewed on their overall assessment of the learning activity and their perception of the added value related to the robot. The results were very encouraging on the feasibility that NAO can serve as a motivational tutor in adults' collaborative game-based learning. We believe that this study marks the first step toward a template for developing innovative team-based training using escape rooms supported by a humanoid robot.

Keywords: social robot, NAO, learning, team based activity, escape room

Procedia PDF Downloads 54
32 Cedrela Toona Roxb.: An Exploratory Study Describing Its Antidiabetic Property

Authors: Kinjal H. Shah, Piyush M. Patel

Abstract:

Diabetes mellitus is considered to be a serious endocrine syndrome. Synthetic hypoglycemic agents can produce serious side effects including hematological effects, coma, and disturbances of the liver and kidney. In addition, they are not suitable for use during pregnancy. In recent years, there have been relatively few reports of short-term side effects or toxicity due to sulphonylureas. Published figures and frequency of side effects in large series of patient range from about 1 to 5%, with symptoms severe enough to lead to the withdrawal of the drug in less than 1 to 2%. Adverse effects, in general, have been of the following type: allergic skin reactions, gastrointestinal disturbances, blood dyscrasias, hepatic dysfunction, and hypoglycemia. The associated disadvantages with insulin and oral hypoglycemic agents have led to stimulation in the research for locating natural resources showing antidiabetic activity and to explore the possibilities of using traditional medicines with proper chemical and pharmacological profiles. Literature survey reveals that the inhabitants of Abbottabad district of Pakistan use the dried leaf powder along with table salt and water orally for treating diabetes, skin allergy, wounds and as a blood purifier, where they pronounced the plant locally as ‘Nem.' The detailed phytochemical investigation of the Cedrela toona Roxb. leaves for antidiabetic activity has not been documented. Hence, there is a need for phytochemical investigation of the leaves for antidiabetic activity. The collection of fresh leaves and authentification followed by successive extraction, phytochemical screening, and testing of antidiabetic activity. The blood glucose level was reduced maximum in ethanol extract at 5th and 7th h after treatment. Blood glucose was depressed by 8.2% and 10.06% in alloxan – induced diabetic rats after treatment which was comparable to the standard drug, Glibenclamide. This may be due to the activation of the existing pancreatic cells in diabetic rats by the ethanolic extract.

Keywords: antidiabetic, Cedrela toona Roxb., phytochemical screening, blood glucose

Procedia PDF Downloads 232
31 The Role of Immunologic Diamonds in Dealing with Mycobacterium Tuberculosis; Responses of Immune Cells in Affliction to the Respiratory Tuberculosis

Authors: Seyyed Mohammad Amin Mousavi Sagharchi, Elham Javanroudi

Abstract:

Introduction: Tuberculosis (TB) is a known disease with hidden features caused by Mycobacterium tuberculosis (MTB). This disease, which is one of the 10 deadliest in the world, has caused millions of deaths in recent decades. Furthermore, TB is responsible for infecting about 30% population of world. Like any infection, TB can activate the immune system by locating and colonization in the human body, especially in the alveoli. TB is granulomatosis, so MTB can absorb the host’s immune cells and other cells to form granuloma. Method: Different databases (e.g., PubMed) were recruited to prepare this paper and fulfill our goals to search and find effective papers and investigations. Results: Immune response to MTB is related to T cell killers and contains CD1, CD4, and CD8 T lymphocytes. CD1 lymphocytes can recognize glycolipids, which highly exist in the Mycobacterial fatty cell wall. CD4 lymphocytes and macrophages form granuloma, and it is the main line of immune response to Mycobacteria. On the other hand, CD8 cells have cytolytic function for directly killing MTB by secretion of granulysin. Other functions and secretion to the deal are interleukin-12 (IL-12) by induction of expression interferon-γ (INF-γ) for macrophages activation and creating a granuloma, and tumor necrosis factor (TNF) by promoting macrophage phagolysosomal fusion. Conclusion: Immune cells in battle with MTB are macrophages, dendritic cells (DCs), neutrophils, and natural killer (NK) cells. These immune cells can recognize the Mycobacterium by various receptors, including Toll-like receptors (TLRs), Nod-like receptors (NLRs), and C-type lectin receptors (CLRs) located in the cell surface. In human alveoli exist about 50 dendritic macrophages, which have close communication with other immune cells in the circulating system and epithelial cells to deal with Mycobacteria. Against immune cells, MTB handles some factors (e.g., cordfactor, O-Ag, lipoarabinomannan, sulfatides, and adenylate cyclase) and practical functions (e.g., inhibition of macrophages).

Keywords: mycobacterium tuberculosis, immune responses, immunological mechanisms, respiratory tuberculosis

Procedia PDF Downloads 66
30 A Method for Precise Vertical Position of the Implant When Using Computerized Surgical Guides and Bone Reduction

Authors: Abraham Finkelman

Abstract:

Computerized Surgical Guides have been proven to be a predictable way to perform dental implants, with a relatively high accuracy in comparison to a treatment plan. When using the CSG Bone supported, it allows us to make the necessary changes of the hard tissue prior to the implant placement and after the implant placement. The CSG gives us an accurate position for the drilling, and during the implant placement it allows us to alter the vertical position of the implant altering the final position of the abutment and avoiding any risk of any damage to the adjacent anatomical structures. Any Changes required to the bone level can be done prior to the fixation of the CSG using a reduction guide, which incur extra surgical fees and the need of a second surgical guide. Any changes of the bone level after the implant placement are at the risk of damaging the implant neck surface. The technique consists of a universal system that allows us to remove the excess bone around the implant sockets prior to the implant placement which then enables us to place the implant in the vertical position with accuracy as planned with the CSG. The systems consist of a hollow pin of different sizes and diameters. Depending on the implant system that we are using. Length sizes are from 6mm-16mm and a diameter of 2.6mm-4.8mm. Upon the completion of the drilling, the pin is then inserted into the implant socket-using the insertion tool. Once the insertion tool has unscrewed the pin, we can continue with the bone reduction. The bone reduction can be done using conventional methods upon the removal of all the excess bone around the pin. The insertion tool is then screwed into the pin and the pin is then removed. We now, have the new bone level at the crest of the implant socket which is our mark for the vertical position of the implant. In some cases, when we are locating the implant very close to anatomical structures, any form of deviation to the vertical position of the implant during the surgery, can cause damage to such anatomical structures, creating irreversible damages such as paresthesia or dysesthesia of the mandibular nerve. If we are planning for immediate loading and we have done our temporary restauration in base of our computerized plan, deviation in the vertical position of the implant will affect the position of the abutment, affecting the accuracy of the temporary prosthesis, extending the working time till we adapt the prosthesis to the new position.

Keywords: bone reduction, computer aided navigation, dental implant placement, surgical guides

Procedia PDF Downloads 310