Search results for: Information system development project (ISDP)
4148 Study of Adsorption Isotherm Models on Rare Earth Elements Biosorption for Separation Purposes
Authors: Nice Vasconcelos Coimbra, Fábio dos Santos Gonçalves, Marisa Nascimento, Ellen Cristine Giese
Abstract:
The development of chemical routes for the recovery and separation of rare earth elements (REE) is seen as a priority and strategic action by several countries demanding these elements. Among the possibilities of alternative routes, the biosorption process has been evaluated in our laboratory. In this theme, the present work attempts to assess and fit the solution equilibrium data in Langmuir, Freundlich and DKR isothermal models, based on the biosorption results of the lanthanum and samarium elements by Bacillus subtilis immobilized on calcium alginate gel. It was observed that the preference of adsorption of REE by the immobilized biomass followed the order Sm (III)> La (III). It can be concluded that among the studied isotherms models, the Langmuir model presented better mathematical results than the Freundlich and DKR models.Keywords: Rare earth elements, biosorption, Bacillus subtilis, adsorption isotherm models.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 7314147 Numerical Analysis for the Performance of a Thermoelectric Generator According to Engine Exhaust Gas Thermal Conditions
Authors: Jinkyu Park, Yungjin Kim, Byungdeok In, Sangki Park, Kihyung Lee
Abstract:
Internal combustion engines rejects 30-40% of the energy supplied by fuel to the environment through exhaust gas. thus, there is a possibility for further significant improvement of efficiency with the utilization of exhaust gas energy and its conversion to mechanical energy or electrical energy. The Thermo-Electric Generator (TEG) will be located in the exhaust system and will make use of an energy flow between the warmer exhaust gas and the external environment. Predict to th optimum position of temperature distribution and the performance of TEG through numerical analysis. The experimental results obtained show that the power output significantly increases with the temperature difference between cold and hot sides of a thermoelectric generator.Keywords: Thermoelectric generator, Numerical analysis, Seebeck coefficient, Figure of merit
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 22674146 Information content of Islamic Private Debt Announcement: Evidence from Malaysia
Authors: Sahar Modirzadehbami, Gholamreza Mansourfar
Abstract:
Different types of Islamic debts have been increasingly utilized as preferred means of debt funding by Malaysian private firms in recent years. This study examines the impact of Islamic debts announcement on private firms- stock returns. Our sample includes forty five listed companies on Bursa Malaysia involved in issuing of Islamic debts during 2005 to 2008. The abnormal returns and cumulative average abnormal returns are calculated and tested using standard event study methodology. The results show that a significant, negative abnormal return occurs one day before announcement date. This negative abnormal return is representing market participant-s adverse attitude toward Islamic private debt announcement during the research period.Keywords: Announcement effect, Event study, Islamic debts, Malaysia, Sukuk
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 20144145 Load Modeling for Power Flow and Transient Stability Computer Studies at BAKHTAR Network
Authors: M. Sedighizadeh, A. Rezazadeh
Abstract:
A method has been developed for preparing load models for power flow and stability. The load modeling (LOADMOD) computer software transforms data on load class mix, composition, and characteristics into the from required for commonly–used power flow and transient stability simulation programs. Typical default data have been developed for load composition and characteristics. This paper defines LOADMOD software and describes the dynamic and static load modeling techniques used in this software and results of initial testing for BAKHTAR power system.Keywords: Load Modelling, Static, Power Flow.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 20554144 Cognitive Radio Networks (CRN): Resource Allocation Techniques Based On DNA-inspired Computing
Authors: Santosh Kumar Singh, Krishna Chandra Roy, Vibhakar Pathak
Abstract:
Spectrum is a scarce commodity, and considering the spectrum scarcity faced by the wireless-based service providers led to high congestion levels. Technical inefficiencies from pooled, since all networks share a common pool of channels, exhausting the available channels will force networks to block the services. Researchers found that cognitive radio (CR) technology may resolve the spectrum scarcity. A CR is a self-configuring entity in a wireless networking that senses its environment, tracks changes, and frequently exchanges information with their networks. However, CRN facing challenges and condition become worst while tracks changes i.e. reallocation of another under-utilized channels while primary network user arrives. In this paper, channels or resource reallocation technique based on DNA-inspired computing algorithm for CRN has been proposed.
Keywords: Ad hoc networks, channels reallocation, cognitive radio, DNA local sequence alignment.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17824143 On Decomposition of Maximal Prefix Codes
Authors: Nikolai Krainiukov, Boris Melnikov
Abstract:
We study the properties of maximal prefix codes. The codes have many applications in computer science, theory of formal languages, data processing and data classification. Our approaches to study use finite state automata (so-called flower automata) for the representation of prefix codes. An important task is the decomposition of prefix codes into prime prefix codes (factors). We discuss properties of such prefix code decompositions. A linear time algorithm is designed to find the prime decomposition. We used the GAP computer algebra system, which allows us to perform algebraic operations for free semigroups, monoids and automata.
Keywords: Maximal prefix code, regular languages, flower automata, prefix code decomposing.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 524142 Bio-Electrochemical Process Coupled with MnO2 Nanowires for Wastewater Treatment
Authors: A. Giwa, S. M. Jung, W. Fang, J. Kong, S. W. Hasan
Abstract:
MnO2 nanowires were developed as filtration media for wastewater treatment that uniquely combines several advantages. The resulting material demonstrated strong capability to remove the pollution of heavy metal ions and organic contents in water. In addition, the manufacture process of such material is practical and economical. In this work, MnO2 nanowires were integrated with the state-of-art bio-electrochemical system for wastewater treatment, to overcome problems currently encountered with organic, inorganic, heavy metal, and microbe removal, and to minimize the unit footprint (land/space occupation) at low cost. Results showed that coupling the bio-electrochemical with MnO2 resulted in very encouraging results with higher removal efficiencies of such pollutants.
Keywords: Bio-electrochemical, nanowires, wastewater, treatment.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 12624141 An Enhanced Key Management Scheme Based on Key Infection in Wireless Sensor Networks
Authors: Han Park, JooSeok Song
Abstract:
We propose an enhanced key management scheme based on Key Infection, which is lightweight scheme for tiny sensors. The basic scheme, Key Infection, is perfectly secure against node capture and eavesdropping if initial communications after node deployment is secure. If, however, an attacker can eavesdrop on the initial communications, they can take the session key. We use common neighbors for each node to generate the session key. Each node has own secret key and shares it with its neighbor nodes. Then each node can establish the session key using common neighbors- secret keys and a random number. Our scheme needs only a few communications even if it uses neighbor nodes- information. Without losing the lightness of basic scheme, it improves the resistance against eavesdropping on the initial communications more than 30%.Keywords: Wireless Sensor Networks, Key Management
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15414140 Directing the Forensic Investigation of a Catastrophic Structure Collapse: The Jacksonville Parking Garage Collapse
Authors: W. C. Bracken
Abstract:
This paper discusses the forensic investigation of a fatality-involved catastrophic structure collapse and the special challenges faced when tasked with directing such an effort. While this paper discusses the investigation’s findings and the outcome of the event; this paper’s primary focus is on the challenges faced directing a forensic investigation that requires coordinating with governmental oversight while also having to accommodate multiple parties’ investigative teams. In particular the challenges discussed within this paper included maintaining on-site safety and operations while accommodating outside investigator’s interests. In addition this paper discusses unique challenges that one may face such as what to do about unethical conduct of interested party’s investigative teams, “off the record” sharing of information, and clandestinely transmitted evidence.Keywords: Catastrophic structure collapse, collapse investigation, Jacksonville parking garage collapse, forensic investigation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 20904139 Operation Assay of an Industrial Single-Source – Single-Detector Gamma CT Using MCNP4C Code Simulation and Experimental Test Comparisons
Authors: M. Ghanadi, M. Rezazadeh*, M. Ardeshiri, R. Gholipour Peyvandi, M. Jafarzadeh, M. Shahriari, M.Rezaei Rad, Z. Gholamzadeh
Abstract:
A 3D industrial computed tomography (CT) manufactured based on a first generation CT systems, single-source – single-detector, was evaluated. Operation accuracy assessment of the manufactured system was achieved using simulation in comparison with experimental tests. 137Cs and 60Co were used as a gamma source. Simulations were achieved using MCNP4C code. Experimental tests of 137Cs were in good agreement with the simulationsKeywords: Gamma source, Industrial CT, MCNP4C, Operation assessment
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16584138 Study of the Effect of Over-expansion Factor on the Flow Transition in Dual Bell Nozzles
Authors: Abhilash Narayan, S. Panneerselvam
Abstract:
Dual bell nozzle is a promising one among the altitude adaptation nozzle concepts, which offer increased nozzle performance in rocket engines. Its advantage is the simplicity it offers due to the absence of any additional mechanical device or movable parts. Hence it offers reliability along with improved nozzle performance as demanded by future launch vehicles. Among other issues, the flow transition to the extension nozzle of a dual bell nozzle is one of the major issues being studied in the development of dual bell nozzle. A parameter named over-expansion factor, which controls the value of the wall inflection angle, has been reported to have substantial influence in this transition process. This paper studies, through CFD and cold flow experiments, the effect of overexpansion factor on flow transition in dual bell nozzles.Keywords: Altitude adaptation, Dual bell nozzle, Nozzle pressure ratio, Over-expansion factor
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 18854137 Simulation of Immiscibility Regions in Sodium Borosilicate Glasses
Authors: D. Aboutaleb, B. Safi
Abstract:
In this paper, sodium borosilicates glasses were prepared by melting in air. These heat-resistant transparent glasses have subjected subsequently isothermal treatments at different times, which have transformed them at opaque glass (milky white color). Such changes indicate that these glasses showed clearly phase separation (immiscibility). The immiscibility region in a sodium borosilicate ternary system was investigated in this work, i.e. to determine the regions from which some compositions can show phase separation. For this we went through the conditions of thermodynamic equilibrium, which were translated later by mathematical equations to find an approximate solution. The latter has been translated in a simulation which was established thereafter to find the immiscibility regions in this type of special glasses.
Keywords: Sodium borosilicate, heat-resistant, isothermal treatments, immiscibility, thermodynamics four.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15204136 Tuning a Fractional Order PID Controller with Lead Compensator in Frequency Domain
Authors: Tahmine. V. Moghaddam, N. Bigdeli, K. Afshar
Abstract:
To achieve the desired specifications of gain and phase margins for plants with time-delay that stabilized with FO-PID controller a lead compensator is designed. At first the range of controlled system stability based on stability boundary criteria is determined. Using stability boundary locus method in frequency domain the fractional order controller parameters are tuned and then with drawing bode diagram in frequency domain accessing to desired gain and phase margin are shown. Numerical examples are given to illustrate the shapes of the stabilizing region and to show the design procedure.Keywords: Fractional controller, Lead compensator, Stabilityregions, Stability boundary locus
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 25804135 Engagement of Young People in Social Networks: Awareness and Security
Authors: Lynette Drevin, Günther R. Drevin
Abstract:
Numerous threats have been identified when using social networks. The question is whether young people are aware of these negative impacts of online and mobile technologies. Will they identify threats when needed? Will they know where to get help? Students and school children were part of a survey where their behavior and use of Facebook and an instant messaging application - MXit were studied. This paper presents some of the results. It can be concluded that awareness on security and privacy issues should be raised. The benefit of doing such a survey is that it may help to direct educational efforts from a young age. In this way children – with their parents – can strive towards more secure behavior. Educators can focus their lessons towards the areas that need attention resulting in safer cyber interaction and ultimately more responsible online use.
Keywords: Facebook, Instant messaging, MXit, Privacy, Social networks Information Security awareness education, Trust.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 27064134 The Anti-Noise System for Rail Brakes on Hump Yards
Authors: Brigita Altenbaher
Abstract:
The friction between two metal surfaces results in a high frequency noise (squealing) which also occurs during the braking of wagons with rail brakes in the process of shunting at a marshalling yard with a hump. At that point the noise level may exceed 130dB, which is extremely unpleasant for workers and inhabitants. In our research we developed a new composite material which does not change braking properties, is capable of taking extremely high pressure loads, reduces noise and is environmentally friendly. The noise reduction results had been very good and had shown a decrease of the high frequency noise almost completely (by 99%) at its source. With our technology we had also reduced general noise by more than 30dBA.Keywords: Composite heavily fluid compound, hump yard, noise reduction, rail brakes.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 22504133 Causal Relation Identification Using Convolutional Neural Networks and Knowledge Based Features
Authors: Tharini N. de Silva, Xiao Zhibo, Zhao Rui, Mao Kezhi
Abstract:
Causal relation identification is a crucial task in information extraction and knowledge discovery. In this work, we present two approaches to causal relation identification. The first is a classification model trained on a set of knowledge-based features. The second is a deep learning based approach training a model using convolutional neural networks to classify causal relations. We experiment with several different convolutional neural networks (CNN) models based on previous work on relation extraction as well as our own research. Our models are able to identify both explicit and implicit causal relations as well as the direction of the causal relation. The results of our experiments show a higher accuracy than previously achieved for causal relation identification tasks.
Keywords: Causal relation identification, convolutional neural networks, natural Language Processing, Machine Learning.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 22494132 Analytics Model in a Telehealth Center Based on Cloud Computing and Local Storage
Authors: L. Ramirez, E. Guillén, J. Sánchez
Abstract:
Some of the main goals about telecare such as monitoring, treatment, telediagnostic are deployed with the integration of applications with specific appliances. In order to achieve a coherent model to integrate software, hardware, and healthcare systems, different telehealth models with Internet of Things (IoT), cloud computing, artificial intelligence, etc. have been implemented, and their advantages are still under analysis. In this paper, we propose an integrated model based on IoT architecture and cloud computing telehealth center. Analytics module is presented as a solution to control an ideal diagnostic about some diseases. Specific features are then compared with the recently deployed conventional models in telemedicine. The main advantage of this model is the availability of controlling the security and privacy about patient information and the optimization on processing and acquiring clinical parameters according to technical characteristics.Keywords: Analytics, telemedicine, internet of things, cloud computing.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15594131 Magnesium Waste Evaluation in Moderate Temperature (70oC) Magnesium Borate Synthesis
Authors: E. Moroydor Derun, A. S. Kipcak, A. Kaplan, S. Piskin
Abstract:
Waste problem is becoming a future problem all over the world. Magnesium wastes which can be used in recycling processes are produced by many industrial activities. Magnesium borates which have useful properties such as; high heat resistance, corrosion resistance, supermechanical strength, superinsulation, light weight, high coefficient of elasticity and so on. Addition, magnesium borates have great potential in the development of ceramic and detergents industry, whisker-reinforced composites, antiwear, and reducing friction additives.
In this study, using the starting materials of waste magnesium and H3BO3 the hydrothermal method was applied at a moderate temperature of 70oC with different reaction times. Several reaction times of waste magnesium to H3BO3 were selected as; 30, 60, 120, 240 minutes. After the synthesis, X-Ray Diffraction (XRD) and Fourier Transform Infrared Spectroscopy (FT-IR) techniques were applied to products. As a result, the forms of Admontite [MgO(B2O3)3.7(H2O)] and Mcallisterite [Mg2(B6O7(OH)6)2.9(H2O)] were synthesized.
Keywords: Hydrothermal synthesis, magnesium borates, waste magnesium.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 20274130 Decision Support System for Suppliers
Authors: Babak Tashakori Bafghi, Laleh Tashakori, Reza Allahyari Soeini, Mohammad Mokhtari
Abstract:
Supplier selection is a multi criteria decision-making process that comprises tangible and intangible factors. The majority of previous supplier selection techniques do not consider strategic perspective. Besides, uncertainty is one of the most important obstacles in supplier selection. For the first, time in this paper, the idea of the algorithm " Knapsack " is used to select suppliers Moreover, an attempt has to be made to take the advantage of a simple numerical method for solving model .This is an innovation to resolve any ambiguity in choosing suppliers. This model has been tried in the suppliers selected in a competitive environment and according to all desired standards of quality and quantity to show the efficiency of the model, an industry sample has been uses.
Keywords: Knapsack, linear programming, supplier select, supply chain management.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16014129 Structural Design Strategy of Double-Eccentric Butterfly Valve using Topology Optimization Techniques
Authors: Jun-Oh Kim, Seol-Min Yang, Seok-Heum Baek, Sangmo Kang
Abstract:
In this paper, the shape design process is briefly discussed emphasizing the use of topology optimization in the conceptual design stage. The basic idea is to view feasible domains for sensitivity region concepts. In this method, the main process consists of two steps: as the design moves further inside the feasible domain using Taguchi method, and thus becoming more successful topology optimization, the sensitivity region becomes larger. In designing a double-eccentric butterfly valve, related to hydrodynamic performance and disc structure, are discussed where the use of topology optimization has proven to dramatically improve an existing design and significantly decrease the development time of a shape design. Computational Fluid Dynamics (CFD) analysis results demonstrate the validity of this approach.
Keywords: Double-eccentric butterfly valve, CFD, Topology optimization
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 35384128 MiRNAs as Regulators of Tumour Suppressor Expression
Authors: Olga A. Berillo, Gaukhar K. Baidildinova, Аnatoliy Т. Ivashchenko
Abstract:
Tumour suppressors are key participants in the prevention of cancer. Regulation of their expression through miRNAs is important for comprehensive translation inhibition of tumour suppressors and elucidation of carcinogenesis mechanisms. We studies the possibility of 1521 miRNAs to bind with 873 mRNAs of human tumour suppressors using RNAHybrid 2.1 and ERNAhybrid programmes. Only 978 miRNAs were found to be translational regulators of 812 mRNAs, and 61 mRNAs did not have any miRNA binding sites. Additionally, 45.9% of all miRNA binding sites were located in coding sequences (CDSs), 33.8% were located in 3' untranslated region (UTR), and 20.3% were located in the 5'UTR. MiRNAs binding with more than 50 target mRNAs and mRNAs binding with several miRNAs were selected. Hsa-miR-5096 had 15 perfectly complementary binding sites with mRNAs of 14 tumour suppressors. These newly indentified miRNA binding sites can be used in the development of medicines (anti-sense therapies) for cancer treatment.Keywords: Exonic miRNA, intergenic miRNA, intronic miRNA, tumor suppressor.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 18304127 Control Strategy of SRM Converters for Power Quality Improvement
Authors: Yogesh Pahariya, Rakesh Saxena, Biswaroop Sarkar
Abstract:
The selection of control strategy depends on the converters of the drive including power, speed, performance and the possible system costs. A number of attempts were therefore made in recent times to develop novel power electronic converter structures for SRM drives, based on the utilization. Many of the converters with variable speed drives have no input power factor correction circuits. This results in harmonic pollution of the utility supply, which should be avoided. The effect of power factor variation in terms of harmonic content is also analyzed in this study. The proposed topologies were simulated using MATLAB / Simulink software package and the results are obtained.
Keywords: Harmonic Pollution, Power Electronic Converter, Power Quality, Simulation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 25484126 Multidimensional Data Mining by Means of Randomly Travelling Hyper-Ellipsoids
Authors: Pavel Y. Tabakov, Kevin Duffy
Abstract:
The present study presents a new approach to automatic data clustering and classification problems in large and complex databases and, at the same time, derives specific types of explicit rules describing each cluster. The method works well in both sparse and dense multidimensional data spaces. The members of the data space can be of the same nature or represent different classes. A number of N-dimensional ellipsoids are used for enclosing the data clouds. Due to the geometry of an ellipsoid and its free rotation in space the detection of clusters becomes very efficient. The method is based on genetic algorithms that are used for the optimization of location, orientation and geometric characteristics of the hyper-ellipsoids. The proposed approach can serve as a basis for the development of general knowledge systems for discovering hidden knowledge and unexpected patterns and rules in various large databases.Keywords: Classification, clustering, data minig, genetic algorithms.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17664125 X-ray Crystallographic Analysis of MinC N-Terminal Domain from Escherichia coli
Authors: Jun Yop An, Kyoung Ryoung Park, Jung-Gyu Lee, Hyung-Seop Youn, Jung-Yeon Kang, Gil Bu Kang, Soo Hyun Eom
Abstract:
MinC plays an important role in bacterial cell division system by inhibiting FtsZ assembly. However, the molecular mechanism of the action is poorly understood. E. coli MinC Nterminus domain was purified and crystallized using 1.4 M sodium citrate pH 6.5 as a precipitant. X-ray diffraction data was collected and processed to 2.3 Å from a native crystal. The crystal belonged to space group P212121, with the unit cell parameters a = 52.7, b = 54.0, c = 64.7 Å. Assuming the presence of two molecules in the asymmetric unit, the Matthews coefficient value is 1.94 Å3 Da-1, which corresponds to a solvent content of 36.5%. The overall structure of MinCN is observed as a dimer form through anti-parallel ß-strand interaction.Keywords: MinC, Cell division, Crystallization.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14114124 Stability of a Special Class of Switched Positive Systems
Authors: Xiuyong Ding, Lan Shu, Xiu Liu
Abstract:
This paper is concerned with the existence of a linear copositive Lyapunov function(LCLF) for a special class of switched positive linear systems(SPLSs) composed of continuousand discrete-time subsystems. Firstly, by using system matrices, we construct a special kind of matrices in appropriate manner. Secondly, our results reveal that the Hurwitz stability of these matrices is equivalent to the existence of a common LCLF for arbitrary finite sets composed of continuous- and discrete-time positive linear timeinvariant( LTI) systems. Finally, a simple example is provided to illustrate the implication of our results.
Keywords: Linear co-positive Lyapunov functions, positive systems, switched systems.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15154123 Diagnosis of Hate Schemas in Prisoners with Antisocial Personality Disorder (ASPD)
Authors: Barbara Gawda
Abstract:
The aim of this study is to show innovative techniques that describe the effectiveness of individuals diagnosed with antisocial personality disorders (ASPD). The author presents information about hate schemas regarding persons with ASPD and their understanding of the role of hate. The data of 60 prisoners with ASPD, 40 prisoners without ASPD, and 60 men without antisocial tendencies, has been analyzed. The participants were asked to describe their hate inspired by a photograph. The narrative discourse was analyzed, the three groups were compared. The results show the differences between the inmates with ASPD, those without ASPD, and the controls. The antisocial individuals describe hate as an ambivalent feeling with low emotional intensity, i.e., actors (in stories) are presented more as positives than as partners. They use different mechanisms to keep them from understanding the meaning of the emotional situation. The schema's characteristics were expressed in narratives attributed to high Psychopathy.
Keywords: Antisocial personality disorder, Emotional narratives, Hate schemas, Psychopathy
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 12734122 A Novel Compression Algorithm for Electrocardiogram Signals based on Wavelet Transform and SPIHT
Authors: Sana Ktata, Kaïs Ouni, Noureddine Ellouze
Abstract:
Electrocardiogram (ECG) data compression algorithm is needed that will reduce the amount of data to be transmitted, stored and analyzed, but without losing the clinical information content. A wavelet ECG data codec based on the Set Partitioning In Hierarchical Trees (SPIHT) compression algorithm is proposed in this paper. The SPIHT algorithm has achieved notable success in still image coding. We modified the algorithm for the one-dimensional (1-D) case and applied it to compression of ECG data. By this compression method, small percent root mean square difference (PRD) and high compression ratio with low implementation complexity are achieved. Experiments on selected records from the MIT-BIH arrhythmia database revealed that the proposed codec is significantly more efficient in compression and in computation than previously proposed ECG compression schemes. Compression ratios of up to 48:1 for ECG signals lead to acceptable results for visual inspection.Keywords: Discrete Wavelet Transform, ECG compression, SPIHT.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 21264121 The Effect of Multipass Cutting in Grinding Operation
Authors: M. A. Kamely, A. Y. Bani Hashim, S. H. Yahaya, H. Sihombing, H. Hazman
Abstract:
Grinding requires high specific energy and the consequent development of high temperature at tool-workpiece contact zone impairs workpiece quality by inducing thermal damage to the surface. Finishing grinding process requires component to be cut more than one pass. This paper deals with an investigation on the effect of multipass cutting on grinding performance in term of surface roughness and surface defect. An experimental set-up has been developed for this and a detailed comparison has been done with a single pass and various numbers of cutting pass. Results showed that surface roughness increase with the increase in a number of cutting pass. Good surface finish of 0.26μm was obtained for single pass cutting and 0.73μm for twenty pass cutting. It was also observed that the thickness of the white layer increased with the increased in a number of cutting pass.
Keywords: Cylindrical grinding, Multipass cutting, Surface roughness, Surface defect.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 25734120 Simulation of Population Dynamics of Aedes aegypti using Climate Dependent Model
Authors: Nuraini Yusoff, Harun Budin, Salemah Ismail
Abstract:
A climate dependent model is proposed to simulate the population of Aedes aegypti mosquito. In developing the model, average temperature of Shah Alam, Malaysia was used to determine the development rate of each stage of the life cycle of mosquito. Rainfall dependent function was proposed to simulate the hatching rate of the eggs under several assumptions. The proposed transition matrix was obtained and used to simulate the population of eggs, larvae, pupae and adults mosquito. It was found that the peak of mosquito abundance comes during a relatively dry period following a heavy rainfall. In addition, lag time between the peaks of mosquito abundance and dengue fever cases in Shah Alam was estimated.Keywords: simulation, Aedes aegypti, Lefkovitch matrix, rainfall dependent model, Shah Alam
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 24814119 Audio Watermarking Using Spectral Modifications
Authors: Jyotsna Singh, Parul Garg, Alok Nath De
Abstract:
In this paper, we present a non-blind technique of adding the watermark to the Fourier spectral components of audio signal in a way such that the modified amplitude does not exceed the maximum amplitude spread (MAS). This MAS is due to individual Discrete fourier transform (DFT) coefficients in that particular frame, which is derived from the Energy Spreading function given by Schroeder. Using this technique one can store double the information within a given frame length i.e. overriding the watermark on the host of equal length with least perceptual distortion. The watermark is uniformly floating on the DFT components of original signal. This helps in detecting any intentional manipulations done on the watermarked audio. Also, the scheme is found robust to various signal processing attacks like presence of multiple watermarks, Additive white gaussian noise (AWGN) and mp3 compression.Keywords: Discrete Fourier Transform, Spreading Function, Watermark, Pseudo Noise Sequence, Spectral Masking Effect
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1697