Search results for: therapist-client boundaries
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 202

Search results for: therapist-client boundaries

172 ‘Memory Mate’ as Boundary Object in Cancer Treatment for Patients with Dementia

Authors: Rachel Hurdley, Jane Hopkinson

Abstract:

This article is based on observation of a cross-disciplinary, cross-institutional team that worked on an intervention called ‘Memory Mate’ for use in a UK Cancer Centre. This aimed to improve treatment outcomes for patients who had comorbid dementia or other memory impairment. Comorbid patients present ambiguous, spoiled identities, problematising the boundaries of health specialisms and frames of understanding. Memory Mate is theorised as a boundary object facilitating service transformation by changing relations between oncology and mental health care practice. It crosses the boundaries between oncology and mental health. Its introduction signifies an important step in reconfiguring relations between the specialisms. As a boundary object, it contains parallel, even contesting worlds, with potential to enable an eventual synthesis of the double stigma of cancer and dementia. Memory Mate comprises physical things, such as an animation, but its principal value is in the interaction it initiates across disciplines and services. It supports evolution of practices to address a newly emergent challenge for health service provision, namely the cancer patient with comorbid dementia/cognitive impairment. Getting clinicians from different disciplines working together on a practical solution generates a dialogue that can shift professional identity and change the culture of practice.

Keywords: Boundary object, cancer, dementia, interdisciplinary teams.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 495
171 3D Liver Segmentation from CT Images Using a Level Set Method Based on a Shape and Intensity Distribution Prior

Authors: Nuseiba M. Altarawneh, Suhuai Luo, Brian Regan, Guijin Tang

Abstract:

Liver segmentation from medical images poses more challenges than analogous segmentations of other organs. This contribution introduces a liver segmentation method from a series of computer tomography images. Overall, we present a novel method for segmenting liver by coupling density matching with shape priors. Density matching signifies a tracking method which operates via maximizing the Bhattacharyya similarity measure between the photometric distribution from an estimated image region and a model photometric distribution. Density matching controls the direction of the evolution process and slows down the evolving contour in regions with weak edges. The shape prior improves the robustness of density matching and discourages the evolving contour from exceeding liver’s boundaries at regions with weak boundaries. The model is implemented using a modified distance regularized level set (DRLS) model. The experimental results show that the method achieves a satisfactory result. By comparing with the original DRLS model, it is evident that the proposed model herein is more effective in addressing the over segmentation problem. Finally, we gauge our performance of our model against matrices comprising of accuracy, sensitivity, and specificity.

Keywords: Bhattacharyya distance, distance regularized level set (DRLS) model, liver segmentation, level set method.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2338
170 Video Matting based on Background Estimation

Authors: J.-H. Moon, D.-O Kim, R.-H. Park

Abstract:

This paper presents a video matting method, which extracts the foreground and alpha matte from a video sequence. The objective of video matting is finding the foreground and compositing it with the background that is different from the one in the original image. By finding the motion vectors (MVs) using a sliced block matching algorithm (SBMA), we can extract moving regions from the video sequence under the assumption that the foreground is moving and the background is stationary. In practice, foreground areas are not moving through all frames in an image sequence, thus we accumulate moving regions through the image sequence. The boundaries of moving regions are found by Canny edge detector and the foreground region is separated in each frame of the sequence. Remaining regions are defined as background regions. Extracted backgrounds in each frame are combined and reframed as an integrated single background. Based on the estimated background, we compute the frame difference (FD) of each frame. Regions with the FD larger than the threshold are defined as foreground regions, boundaries of foreground regions are defined as unknown regions and the rest of regions are defined as backgrounds. Segmentation information that classifies an image into foreground, background, and unknown regions is called a trimap. Matting process can extract an alpha matte in the unknown region using pixel information in foreground and background regions, and estimate the values of foreground and background pixels in unknown regions. The proposed video matting approach is adaptive and convenient to extract a foreground automatically and to composite a foreground with a background that is different from the original background.

Keywords: Background estimation, Object segmentation, Blockmatching algorithm, Video matting.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1813
169 Overcoming Boundaries in Science – A Plea against Political Isolations

Authors: Tim Engartner

Abstract:

If science is supposed to gain greater social relevance and acceptance, researchers must not only relate to the broader public, but also promote intercourse within the ivory tower itself. The latter process has been under way successfully for a number of years in the form of transdisciplinary research initiatives. What is still lacking is a broad debate about the necessity to look around properly and face up to opposing views on one and the same topic within our own discipline.

Keywords: Schools of thought, pluralism, openness, value judgements, controversy

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1128
168 The Ethio-Eritrea Claims Commission on Use of Force: Issue of Self-Defense or Violation of Sovereignty

Authors: Isaias Teklia Berhe

Abstract:

A decision that deals with international disputes, be it arbitral or judicial, has to properly reflect objectivity and coherence with existing rules of international law. This paper shows the decision of the Ethio-Eritrea Claims Commission on the jus ad bellum case is bereft of objectivity and coherence, which contributed a disservice to international law on many aspects. The Commission’s decision that holds Eritrea in contravention to Art 2(4) of the UN Charter based on Ethiopia’s contention is flawed. It fails to consider: the illegitimacy of an actual authority established over contested territory through hostile acts, the proper determination of effectivites under international law, the sanctity of colonially determined boundaries, Ethiopia’s prior firm political recognition and undergirds to respect colonial boundary, and Ethio-Eritrea Border Commission’s decision. The paper will also argue that the Commission confused Eritrea’s right of self-defense with the rule against the non-use of force to settle territorial disputes; wherefore its decision sanitizes or sterilizes unlawful change of territory resulted through unlawful use of force to the effect of advantaging aggressions. The paper likewise argues that the decision is so sacrilegious that it disregards the ossified legal finality of colonial boundaries. Moreover, its approach toward armed attack does not reflect the peculiarity of the jus ad bellum case rather it brings about definitional uncertainties and sustains the perception that the law on self-defense is unsettled.

Keywords: Armed attack, self-defense, territorial integrity, use of force.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1756
167 Omani Community in Digital Age: A Study of Omani Women Using Back Channel Media to Empower Themselves for Frontline Entrepreneurship

Authors: Sangeeta Tripathi, Muna Al Shahri

Abstract:

This research article presents the changing role and status of women in Oman. Transformation of women’s status started with the regime of His Majesty Sultan Qaboos Bin Said in 1970. It is always desired by the Sultan to enable women in all the ways for the balance growth of the country. Forbidding full face veil for women in public offices is one of the best efforts for their empowerment. Women education is also increasing rapidly. They are getting friendly with new information communication technology and using different social media applications such as WhatsApp, Instagram and Facebook for interaction and economic growth. Though there are some traditional and tribal boundaries, women are infused with courage and enjoying fair treatment and equal opportunities in different career positions. The study will try to explore changing mindset of young Omani women towards these traditional tribal boundaries, cultural heritage, business and career: ‘How are young Omani women making balance between work and social prestige?’, ‘How are they preserving their cultural values, embracing new technologies and approaching social network to enhance their economic power.’ This paper will discover their hurdles while using internet for their new entrepreneur. It will also examine the prospects of online business in Oman. The mixed research methodology is applied to find out the result.

Keywords: Advertising, business, entrepreneurship, Social Media, tribal barrier, traditional barriers.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1738
166 Evaluation of State of the Art IDS Message Exchange Protocols

Authors: Robert Koch, Mario Golling, Gabi Dreo

Abstract:

During the last couple of years, the degree of dependence on IT systems has reached a dimension nobody imagined to be possible 10 years ago. The increased usage of mobile devices (e.g., smart phones), wireless sensor networks and embedded devices (Internet of Things) are only some examples of the dependency of modern societies on cyber space. At the same time, the complexity of IT applications, e.g., because of the increasing use of cloud computing, is rising continuously. Along with this, the threats to IT security have increased both quantitatively and qualitatively, as recent examples like STUXNET or the supposed cyber attack on Illinois water system are proofing impressively. Once isolated control systems are nowadays often publicly available - a fact that has never been intended by the developers. Threats to IT systems don’t care about areas of responsibility. Especially with regard to Cyber Warfare, IT threats are no longer limited to company or industry boundaries, administrative jurisdictions or state boundaries. One of the important countermeasures is increased cooperation among the participants especially in the field of Cyber Defence. Besides political and legal challenges, there are technical ones as well. A better, at least partially automated exchange of information is essential to (i) enable sophisticated situational awareness and to (ii) counter the attacker in a coordinated way. Therefore, this publication performs an evaluation of state of the art Intrusion Detection Message Exchange protocols in order to guarantee a secure information exchange between different entities.

Keywords: Cyber Defence, Cyber Warfare, Intrusion Detection Information Exchange, Early Warning Systems, Joint Intrusion Detection, Cyber Conflict

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2293
165 Thermo-Mechanical Treatments of Cu-Ti Alloys

Authors: M. M. Morgham, A. A. Hameda, N. A. Zriba, H. A. Jawan

Abstract:

This paper aims to study the effect of cold work condition on the microstructure of Cu-1.5wt%Ti, and Cu-3.5wt%Ti and hence mechanical properties. The samples under investigation were machined, and solution heat treated. X-ray diffraction technique is used to identify the different phases present after cold deformation by compression and also different heat treatment and also measuring the relative quantities of phases present. The metallographic examination is used to study the microstructure of the samples. The hardness measurements were used to indicate the change in mechanical properties. The results are compared with the mechanical properties obtained by previous workers. Experiments on cold compression followed by aging of Cu-Ti alloys have indicated that the most efficient hardening of the material results from continuous precipitation of very fine particles within the matrix. These particles were reported to be β`-type, Cu4Ti phase. The β`-β transformation and particles coarsening within the matrix as well as long grain boundaries were responsible for the overaging of Cu-1.5wt%Ti and Cu-3.5wt%Ti alloys. It is well known that plate-like particles are β – type, Cu3Ti phase. Discontinuous precipitation was found to start at the grain boundaries and expand into grain interior. At the higher aging temperature, a classic Widmanstätten morphology forms giving rise to a coarse microstructure comprised of α and the equilibrium phase β. Those results were confirmed by X-ray analysis, which found that a few percent of Cu3Ti, β precipitates are formed during aging at high temperature for long time for both Cu- Ti alloys (i.e. Cu-1.5wt%Ti and Cu-3.5wt%Ti).

Keywords: Metallographic, hardness, precipitation, aging.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1732
164 An Exploratory Case Study of the Interference of Erotic Transference in the Longevity of Psychoanalytic Treatment

Authors: M. Javid, R. Hassan, J. DeSilva

Abstract:

In this exploratory case study, a 37-year-old male patient who previously terminated treatment after four months of therapy with a different therapist begins anew with a 38-year-old female therapist and undergoes a similar cycle of premature termination, with added discourse caused by erotic transference. Process notes and records of the therapy treatment indicate that during the short course of treatment, the patient explored his difficulties navigating personal relationships, both current and past, and his difficulties coping with hypochondriasis. The therapist becomes tasked with not only navigating the patient’s inner conflict but also how she relates to the patient in the countertransference process while maintaining professional boundaries. This includes empathizing with the patient while also experiencing discomfort in the erotic transference from a professional standpoint. When the patient terminates once more, the therapist reflects on the possible reasons for termination. This includes the patient’s difficulties with tolerating interpretations, which cause him to blame himself for past events. These interpretations were also very frequent, contributing to the emotional burden the patient experienced. The therapist reflected on the use of interpretation versus exploration of the patient’s feelings and how exploring his feelings, including his feelings towards her, would have allowed for an opportunity to explore the emotions that troubled him more deeply. This includes exploring the patient’s anger and fear, which stem from unresolved conflicts from his childhood. Moreover, the erotic transference served as an enactment of previous experiences in which the patient feared losing what he loved, leading him to opt for premature termination instead of losing his ability to control the relationship and experience loss.

Keywords: Countertransference, erotic transference, premature termination, therapist-client boundaries, transference.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 81
163 Study of Real Gas Behavior in a Single-Stage Gas Gun

Authors: A. Moradi, S. Khodadadiyan

Abstract:

In this paper, one-dimensional analysis of flow in a single-stage gas gun is conducted. The compressible inviscid flow equations are numerically solved by the second-order Roe TVD method, by using moving boundaries. For investigation of real gas effect the Noble-Able equation is applied. The numerical results are compared with the experimental data to validate the numerical scheme. The results show that with using the Noble-Able equation, the muzzle velocity decreases.

Keywords: Gas gun, Roe, projectile, muzzle velocity

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2309
162 Tsunami Inundation Modeling in a Boundary Fitted Curvilinear Grid Model Using the Method of Lines Technique

Authors: M. Ashaque Meah, M. Shah Noor, M Asif Arefin, Md. Fazlul Karim

Abstract:

A numerical technique in a boundary-fitted curvilinear grid model is developed to simulate the extent of inland inundation along the coastal belts of Peninsular Malaysia and Southern Thailand due to 2004 Indian ocean tsunami. Tsunami propagation and run-up are also studied in this paper. The vertically integrated shallow water equations are solved by using the method of lines (MOL). For this purpose the boundary-fitted grids are generated along the coastal and island boundaries and the other open boundaries of the model domain. A transformation is used to the governing equations so that the transformed physical domain is converted into a rectangular one. The MOL technique is applied to the transformed shallow water equations and the boundary conditions so that the equations are converted into ordinary differential equations initial value problem. Finally the 4th order Runge-Kutta method is used to solve these ordinary differential equations. The moving boundary technique is applied instead of fixed sea side wall or fixed coastal boundary to ensure the movement of the coastal boundary. The extent of intrusion of water and associated tsunami propagation are simulated for the 2004 Indian Ocean tsunami along the west coast of Peninsular Malaysia and southern Thailand. The simulated results are compared with the results obtained from a finite difference model and the data available in the USGS website. All simulations show better approximation than earlier research and also show excellent agreement with the observed data.

Keywords: Open boundary condition, moving boundary condition, boundary-fitted curvilinear grids, far field tsunami, Shallow Water Equations, tsunami source, Indonesian tsunami of 2004.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 865
161 Development of the Maturity Sensor Prototype and Method of Its Placement in the Structure

Authors: Ye. B. Utepov, A. S. Tulebekova, A. B. Kazkeyev

Abstract:

Maturity sensors are used to determine concrete strength by the non-destructive method. The method of placement of the maturity sensors determines their number required for a certain frame of a monolithic building. This paper proposes a cheap prototype of an embedded wireless sensor for monitoring concrete structures, as well as an alternative strategy for placing sensors based on the transitional boundaries of the temperature distribution of concrete curing, which were determined by building a heat map of the temperature distribution, where unknown values are calculated by the method of inverse distance weighing. The developed prototype can simultaneously measure temperature and relative humidity over a smartphone-controlled time interval. It implements a maturity method to assess the in-situ strength of concrete, which is considered an alternative to the traditional shock impulse and compression testing method used in Kazakhstan. The prototype was tested in laboratory and field conditions. The tests were aimed at studying the effect of internal and external temperature and relative humidity on concrete's strength gain. Based on an experimentally poured concrete slab with randomly integrated maturity sensors, it the transition boundaries form elliptical forms were determined. Temperature distribution over the largest diameter of the ellipses was plotted, resulting in correct and inverted parabolas. As a result, the distance between the closest opposite crossing points of the parabolas is accepted as the maximum permissible step for setting the maturity sensors. The proposed placement strategy can be applied to sensors that measure various continuous phenomena such as relative humidity. Prototype testing has also revealed Bluetooth inconvenience due to weak signal and inability to access multiple prototypes simultaneously. For this reason, further prototype upgrades are planned in the future work.

Keywords: Heat map, placement strategy, temperature and relative humidity, wireless embedded sensor.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 365
160 Social Media and Counseling: Opportunities, Risks and Ethical Considerations

Authors: Kyriaki G. Giota, George Kleftaras

Abstract:

The purpose of this article is to briefly review the opportunities that social media present to counselors and psychologists. Particular attention was given to understanding some of the more important common risks inherent in social media and the potential ethical dilemmas which may arise for counselors and psychologists who embrace them in their practice. Key considerations of issues pertinent to an online presence such as multiple relationships, visibility and privacy, maintaining ethical principles and professional boundaries are being discussed.

Keywords: Social Media, Counseling, Risks, Ethics.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 7971
159 e-Commerce versus m-Commerce: Where is the Dividing Line?

Authors: Priscilla Omonedo, Paul Bocij

Abstract:

Since the emergence of e-Commerce, the world of business has witnessed a radical shift in the way business activities are conducted. However, the emergence of m-Commerce has further pushed the boundaries of virtual commerce revolution. As a result, there seems to be a growing blur in the distinction between e- Commerce and m-Commerce. In addition, existing definitions for both forms of commerce highlight characteristics (e.g. type of device and activity conducted) that may be applicable to both concepts. The aim of this paper is to identify the characteristics that help define and delineate between e- and m- Commerce. The paper concludes that characteristics of mobility, ubiquity and immediacy provide a clearer and simpler template to distinguish between e-Commerce and m- Commerce.

Keywords: e-Commerce, m-Commerce, mobility, ubiquity.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 5360
158 Enhancement of Shape Description and Representation by Slope

Authors: Ali Salem Bin Samma, Rosalina Abdul Salam

Abstract:

Representation and description of object shapes by the slopes of their contours or borders are proposed. The idea is to capture the essence of the features that make it easier for a shape to be stored, transmitted, compared and recognized. These features must be independent of translation, rotation and scaling of the shape. A approach is proposed to obtain high performance, efficiency and to merge the boundaries into sequence of straight line segments with the fewest possible segments. Evaluation on the performance of the proposed method is based on its comparison with established method of object shape description.

Keywords: Shape description, Shape representation and Slope.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1455
157 A Numerical Model for Studying Convectional Lifting Processes in the Tropics

Authors: Chantawan Noisri, Robert Harold Buchanan Exell

Abstract:

A simple model for studying convectional lifting processes in the tropics is described in this paper with some tests of the model in dry air. The model consists of the density equation, the wind equation, the vertical velocity equation, and the temperature equation. The model domain is two-dimensional with length 100 km and height 17.5 km. Plan for experiments to investigate the effects of the heating surface, the deep convection approximation and the treatment of velocities at the boundaries are discussed. Equations for the simplified treatment of moisture in the atmosphere in future numerical experiments are also given.

Keywords: Numerical weather prediction, Finite differences, Convection lifting.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1292
156 Accuracy of Divergence Measures for Detection of Abrupt Changes

Authors: P. Bergl

Abstract:

Numerous divergence measures (spectral distance, cepstral distance, difference of the cepstral coefficients, Kullback-Leibler divergence, distance given by the General Likelihood Ratio, distance defined by the Recursive Bayesian Changepoint Detector and the Mahalanobis measure) are compared in this study. The measures are used for detection of abrupt spectral changes in synthetic AR signals via the sliding window algorithm. Two experiments are performed; the first is focused on detection of single boundary while the second concentrates on detection of a couple of boundaries. Accuracy of detection is judged for each method; the measures are compared according to results of both experiments.

Keywords: Abrupt changes detection, autoregressive model, divergence measure.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1448
155 Edge Detection in Low Contrast Images

Authors: Koushlendra Kumar Singh, Manish Kumar Bajpai, Rajesh K. Pandey

Abstract:

The edges of low contrast images are not clearly distinguishable to human eye. It is difficult to find the edges and boundaries in it. The present work encompasses a new approach for low contrast images. The Chebyshev polynomial based fractional order filter has been used for filtering operation on an image. The preprocessing has been performed by this filter on the input image. Laplacian of Gaussian method has been applied on preprocessed image for edge detection. The algorithm has been tested on two test images.

Keywords: Chebyshev polynomials, Fractional order differentiator, Laplacian of Gaussian (LoG) method, Low contrast image.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3274
154 AGV Guidance System: An Application of Simple Active Contour for Visual Tracking

Authors: M.Asif, M.R.Arshad, P.A.Wilson

Abstract:

In this paper, a simple active contour based visual tracking algorithm is presented for outdoor AGV application which is currently under development at the USM robotic research group (URRG) lab. The presented algorithm is computationally low cost and able to track road boundaries in an image sequence and can easily be implemented on available low cost hardware. The proposed algorithm used an active shape modeling using the B-spline deformable template and recursive curve fitting method to track the current orientation of the road.

Keywords: Active contour, B-spline, recursive curve fitting.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2118
153 Bernstein-Galerkin Approach for Perturbed Constant-Coefficient Differential Equations, One-Dimensional Analysis

Authors: Diego Garijo

Abstract:

A numerical approach for solving constant-coefficient differential equations whose solutions exhibit boundary layer structure is built by inserting Bernstein Partition of Unity into Galerkin variational weak form. Due to the reproduction capability of Bernstein basis, such implementation shows excellent accuracy at boundaries and is able to capture sharp gradients of the field variable by p-refinement using regular distributions of equi-spaced evaluation points. The approximation is subjected to convergence experimentation and a procedure to assemble the discrete equations without a background integration mesh is proposed.

Keywords: Bernstein polynomials, Galerkin, differential equation, boundary layer.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1842
152 Image Segmentation and Contour Recognition Based on Mathematical Morphology

Authors: Pinaki Pratim Acharjya, Esha Dutta

Abstract:

In image segmentation contour detection is one of the important pre-processing steps in recent days. Contours characterize boundaries and contour detection is one of the most difficult tasks in image processing. Hence it is a problem of fundamental importance in image processing. Contour detection of an image decreases the volume of data considerably and useless information is removed, but the structural properties of the image remain same. In this research, a robust and effective contour detection technique has been proposed using mathematical morphology. Three different contour detection results are obtained by using morphological dilation and erosion. The comparative analyses of three different results also have been done.

Keywords: Image segmentation, contour detection, mathematical morphology.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1427
151 Adaptive Nonparametric Approach for Guaranteed Real-Time Detection of Targeted Signals in Multichannel Monitoring Systems

Authors: Andrey V. Timofeev

Abstract:

An adaptive nonparametric method is proposed for stable real-time detection of seismoacoustic sources in multichannel C-OTDR systems with a significant number of channels. This method guarantees given upper boundaries for probabilities of Type I and Type II errors. Properties of the proposed method are rigorously proved. The results of practical applications of the proposed method in a real C-OTDR-system are presented in this report.

Keywords: Adaptive detection, change point, interval estimation, guaranteed detection, multichannel monitoring systems.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1884
150 Protocol Modifications for Improved Co-Channel Wireless LAN Goodput in Partitioned Spaces

Authors: Raymond J. Jayabal, Chiew Tong Lau

Abstract:

Partitions can play a significant role in minimising cochannel interference of Wireless LANs by attenuating signals across room boundaries. This could pave the way towards higher density deployments in home and office environments through spatial channel reuse. Yet, due to protocol limitations, the latest incantation of IEEE 802.11 standard is still unable to take advantage of this fact: Despite having clearly adequate Signal to Interference Ratio (SIR) over co-channel neighbouring networks in other rooms, its goodput falls significantly lower than its maximum in the absence of cochannel interferers. In this paper, we describe how this situation can be remedied via modest modifications to the standard.

Keywords: IEEE 802.11 Wireless LAN, spatial channel re-use, physical layer capture.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1379
149 Nonlinear Stability of Convection in a Thermally Modulated Anisotropic Porous Medium

Authors: M. Meenasaranya, S. Saravanan

Abstract:

Conditions corresponding to the unconditional stability of convection in a mechanically anisotropic fluid saturated porous medium of infinite horizontal extent are determined. The medium is heated from below and its bounding surfaces are subjected to temperature modulation which consists of a steady part and a time periodic oscillating part. The Brinkman model is employed in the momentum equation with the Bousinessq approximation. The stability region is found for arbitrary values of modulational frequency and amplitude using the energy method. Higher order numerical computations are carried out to find critical boundaries and subcritical instability regions more accurately.

Keywords: Convection, porous medium, anisotropy, temperature modulation, nonlinear stability.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 873
148 Formation of Nanosize Phases under Thermomechanical Strengthening of Low Carbon Steel

Authors: Victor E. Gromov, Yurii F. Ivanov, Vadim B. Kosterev, Sergey V. Konovalov, Veronica I. Myasnikova, Guoyi Tang

Abstract:

A study of the H-beam's nanosize structure phase states after thermomechanical strengthening was carried out by TEM. The following processes were analyzed. 1. The dispersing of the cementite plates by cutting them by moving dislocations. 2. The dissolution of cementite plates and repeated precipitation of the cementite particles on the dislocations, the boundaries, subgrains and grains. 3. The decay of solid solution of carbon in the α-iron after "self-tempering" of martensite. 4. The final transformation of the retained austenite in beinite with α-iron particles and cementite formation. 5. The implementation of the diffusion mechanism of γ ⇒ α transformation.

Keywords: nanosize, phase, steel, strengthening

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1683
147 Quality-Controlled Compression Method using Wavelet Transform for Electrocardiogram Signals

Authors: Redha Benzid, Farid Marir, Nour-Eddine Bouguechal

Abstract:

This paper presents a new Quality-Controlled, wavelet based, compression method for electrocardiogram (ECG) signals. Initially, an ECG signal is decomposed using the wavelet transform. Then, the resulting coefficients are iteratively thresholded to guarantee that a predefined goal percent root mean square difference (GPRD) is matched within tolerable boundaries. The quantization strategy of extracted non-zero wavelet coefficients (NZWC), according to the combination of RLE, HUFFMAN and arithmetic encoding of the NZWC and a resulting look up table, allow the accomplishment of high compression ratios with good quality reconstructed signals.

Keywords: ECG compression, Non-uniform Max-Lloydquantizer, PRD, Quality-Controlled, Wavelet transform

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1746
146 Unsupervised Texture Segmentation via Applying Geodesic Active Regions to Gaborian Feature Space

Authors: Yuan He, Yupin Luo, Dongcheng Hu

Abstract:

In this paper, we propose a novel variational method for unsupervised texture segmentation. We use a Gabor filter bank to extract texture features. Some of the filtered channels form a multidimensional Gaborian feature space. To avoid deforming contours directly in a vector-valued space we use a Gaussian mixture model to describe the statistical distribution of this space and get the boundary and region probabilities. Then a framework of geodesic active regions is applied based on them. In the end, experimental results are presented, and show that this method can obtain satisfied boundaries between different texture regions.

Keywords: Texture segmentation, Gabor filter, snakes, Geodesicactive regions

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1771
145 Non-reflection Boundary Conditions for Numerical Simulation of Supersonic Flow

Authors: A. Abdalla, A. Kaltayev

Abstract:

This article presents the boundary conditions for the problem of turbulent supersonic gas flow in a plane channel with a perpendicular injection jets. The non-reflection boundary conditions for direct modeling of compressible viscous gases are studied. A formulation using the NSCBC (Navier- Stocks characteristic boundary conditions) through boundaries is derived for the subsonic inflow and subsonic non-reflection outflow situations. Verification of the constructed algorithm of boundary conditions is carried out by solving a test problem of perpendicular sound of jets injection into a supersonic gas flow in a plane channel.

Keywords: WENO scheme, non-reflection boundary conditions, NSCBC, supersonic flow.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2195
144 Current Situation and Possible Solutions of Acid Rain in South Korea

Authors: Dhongkyu Yoon

Abstract:

Environmental statistics reveals that the pollution of acid rain in South Korea is a serious issue. Yet the awareness of people is low. Even after a gradual decrease of pollutant emission in Korea, the acidity has not been reduced. There no boundaries in the atmosphere are set and the influence of the neighboring countries such as China is apparent. Governmental efforts among China, Japan and Korea have been made on this issue. However, not much progress has been observed. Along with the governmental activities, therefore, an active monitoring of the pollution among the countries and the promotion of environmental awareness at the civil level including especially the middle and high schools are highly recommended. It will be this young generation who will face damaged country as inheritance not the current generation.

Keywords: acid rain, international collaboration, pollution, South Korea

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 6450
143 Mechanical Equation of State in an Al-Li Alloy

Authors: Jung-Ho Moon, Tae Kwon Ha

Abstract:

Existence of plastic equation of state has been investigated by performing a series of load relaxation tests at various temperatures using an Al-Li alloy. A plastic equation of state is first developed from a simple kinetics consideration for a mechanical activation process of a leading dislocation piled up against grain boundaries. A series of load relaxation test has been conducted at temperatures ranging from 200 to 530oC to obtain the stress-strain rate curves. A plastic equation of state has been derived from a simple consideration of dislocation kinetics and confirmed by experimental results.

Keywords: Plastic equation of state, Dislocation kinetics, Load relaxation test, Al-Li alloy, Microstructure.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1793