CINXE.COM

Search results for: avoid target-point

<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: avoid target-point</title> <meta name="description" content="Search results for: avoid target-point"> <meta name="keywords" content="avoid target-point"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="avoid target-point" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="avoid target-point"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 1441</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: avoid target-point</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1441</span> When and Why Unhappy People Avoid Enjoyable Experiences</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hao%20Shen">Hao Shen</a>, <a href="https://publications.waset.org/abstracts/search?q=Aparna%20Labroo"> Aparna Labroo</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Across four studies, we show people in a negative mood avoid anticipated enjoyable experiences because of the subjective difficulty in simulating those experiences, and they misattribute these feelings of difficulty to reduced pleasantness of the anticipated experience. We observe the avoidance of enjoyable experiences only for anticipated experiences that involve smile-like facial-muscular simulation. When the need for facial-muscular simulation is attenuated, or when the anticipated experience relies on facial-muscular simulation to a lesser extent, people in a negative mood no longer avoid enjoyable experiences, but rather seek such experiences because they fit better with their ongoing mood-repair goals. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=emotion%20regulation" title="emotion regulation">emotion regulation</a>, <a href="https://publications.waset.org/abstracts/search?q=mood%20repair" title=" mood repair"> mood repair</a>, <a href="https://publications.waset.org/abstracts/search?q=embodiment" title=" embodiment"> embodiment</a>, <a href="https://publications.waset.org/abstracts/search?q=anticipated%20experiences" title=" anticipated experiences"> anticipated experiences</a> </p> <a href="https://publications.waset.org/abstracts/3212/when-and-why-unhappy-people-avoid-enjoyable-experiences" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/3212.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">429</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1440</span> A Simulation for Behaviors of Preys to Avoid Pursuit of Predator</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jae%20Moon%20Lee">Jae Moon Lee</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Generally the predator will continuously aim to attack the prey, while the prey will maintain a safe distance from the predator in order to avoid it . If the predator has enough energy to chase a certain amount of distance, it will begin to attack the prey. The prey needs to approach the predator for various reasons such as getting food. However, it will also try to keep a safe distance because of the threat of predators. The safe distance is dependent on the amount of the energy of predator, and the behaviors of prey is changed according to the size of the safe distance. This paper is to simulate the behaviors of preys to avoid the pursuit of predator based on the safe distance. The simulations will be executed experimentally under single predator and multiple preys. The results of the simulations show that the amount of energy of predator gives a great influence on the behavior of the prey. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=predator" title="predator">predator</a>, <a href="https://publications.waset.org/abstracts/search?q=prey" title=" prey"> prey</a>, <a href="https://publications.waset.org/abstracts/search?q=energy" title=" energy"> energy</a>, <a href="https://publications.waset.org/abstracts/search?q=safe%20distance" title=" safe distance"> safe distance</a>, <a href="https://publications.waset.org/abstracts/search?q=simulation" title=" simulation"> simulation</a> </p> <a href="https://publications.waset.org/abstracts/27952/a-simulation-for-behaviors-of-preys-to-avoid-pursuit-of-predator" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/27952.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">265</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1439</span> Research on the Strategy of Orbital Avoidance for Optical Remote Sensing Satellite</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Zheng%20DianXun">Zheng DianXun</a>, <a href="https://publications.waset.org/abstracts/search?q=Cheng%20Bo"> Cheng Bo</a>, <a href="https://publications.waset.org/abstracts/search?q=Lin%20Hetong"> Lin Hetong</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper focuses on the orbit avoidance strategies of optical remote sensing satellite. The optical remote sensing satellite, moving along the Sun-synchronous orbit, is equipped with laser warning equipment to alert CCD camera from laser attacks. There are three ways to protect the CCD camera: closing the camera cover, satellite attitude maneuver and satellite orbit avoidance. In order to enhance the safety of optical remote sensing satellite in orbit, this paper explores the strategy of satellite avoidance. The avoidance strategy is expressed as the evasion of pre-determined target points in the orbital coordinates of virtual satellite. The so-called virtual satellite is a passive vehicle which superposes the satellite at the initial stage of avoidance. The target points share the consistent cycle time and the same semi-major axis with the virtual satellite, which ensures the properties of the satellite’s Sun-synchronous orbit remain unchanged. Moreover, to further strengthen the avoidance capability of satellite, it can perform multi-target-points avoid maneuvers. On occasions of fulfilling the satellite orbit tasks, the orbit can be restored back to virtual satellite through orbit maneuvers. Thereinto, the avoid maneuvers adopts pulse guidance. And the fuel consumption is also optimized. The avoidance strategy discussed in this article is applicable to optical remote sensing satellite when it is encountered with hostile attack of space-based laser anti-satellite. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=optical%20remote%20sensing%20satellite" title="optical remote sensing satellite">optical remote sensing satellite</a>, <a href="https://publications.waset.org/abstracts/search?q=satellite%20avoidance" title=" satellite avoidance"> satellite avoidance</a>, <a href="https://publications.waset.org/abstracts/search?q=virtual%20satellite" title=" virtual satellite"> virtual satellite</a>, <a href="https://publications.waset.org/abstracts/search?q=avoid%20target-point" title=" avoid target-point"> avoid target-point</a>, <a href="https://publications.waset.org/abstracts/search?q=avoid%20maneuver" title=" avoid maneuver"> avoid maneuver</a> </p> <a href="https://publications.waset.org/abstracts/34217/research-on-the-strategy-of-orbital-avoidance-for-optical-remote-sensing-satellite" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/34217.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">404</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1438</span> Fall Avoidance Control of Wheeled Inverted Pendulum Type Robotic Wheelchair While Climbing Stairs</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nan%20Ding">Nan Ding</a>, <a href="https://publications.waset.org/abstracts/search?q=Motoki%20Shino"> Motoki Shino</a>, <a href="https://publications.waset.org/abstracts/search?q=Nobuyasu%20Tomokuni"> Nobuyasu Tomokuni</a>, <a href="https://publications.waset.org/abstracts/search?q=Genki%20Murata"> Genki Murata</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The wheelchair is the major means of transport for physically disabled people. However, it cannot overcome architectural barriers such as curbs and stairs. In this paper, the authors proposed a method to avoid falling down of a wheeled inverted pendulum type robotic wheelchair for climbing stairs. The problem of this system is that the feedback gain of the wheels cannot be set high due to modeling errors and gear backlash, which results in the movement of wheels. Therefore, the wheels slide down the stairs or collide with the side of the stairs, and finally the wheelchair falls down. To avoid falling down, the authors proposed a slider control strategy based on skyhook model in order to decrease the movement of wheels, and a rotary link control strategy based on the staircase dimensions in order to avoid collision or slide down. The effectiveness of the proposed fall avoidance control strategy was validated by ODE simulations and the prototype wheelchair. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=EPW" title="EPW">EPW</a>, <a href="https://publications.waset.org/abstracts/search?q=fall%20avoidance%20control" title=" fall avoidance control"> fall avoidance control</a>, <a href="https://publications.waset.org/abstracts/search?q=skyhook" title=" skyhook"> skyhook</a>, <a href="https://publications.waset.org/abstracts/search?q=wheeled%20inverted%20pendulum" title=" wheeled inverted pendulum"> wheeled inverted pendulum</a> </p> <a href="https://publications.waset.org/abstracts/63772/fall-avoidance-control-of-wheeled-inverted-pendulum-type-robotic-wheelchair-while-climbing-stairs" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/63772.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">333</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1437</span> An Energy Holes Avoidance Routing Protocol for Underwater Wireless Sensor Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=A.%20Khan">A. Khan</a>, <a href="https://publications.waset.org/abstracts/search?q=H.%20Mahmood"> H. Mahmood</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In Underwater Wireless Sensor Networks (UWSNs), sensor nodes close to water surface (final destination) are often preferred for selection as forwarders. However, their frequent selection makes them depleted of their limited battery power. In consequence, these nodes die during early stage of network operation and create energy holes where forwarders are not available for packets forwarding. These holes severely affect network throughput. As a result, system performance significantly degrades. In this paper, a routing protocol is proposed to avoid energy holes during packets forwarding. The proposed protocol does not require the conventional position information (localization) of holes to avoid them. Localization is cumbersome; energy is inefficient and difficult to achieve in underwater environment where sensor nodes change their positions with water currents. Forwarders with the lowest water pressure level and the maximum number of neighbors are preferred to forward packets. These two parameters together minimize packet drop by following the paths where maximum forwarders are available. To avoid interference along the paths with the maximum forwarders, a packet holding time is defined for each forwarder. Simulation results reveal superior performance of the proposed scheme than the counterpart technique. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=energy%20holes" title="energy holes">energy holes</a>, <a href="https://publications.waset.org/abstracts/search?q=interference" title=" interference"> interference</a>, <a href="https://publications.waset.org/abstracts/search?q=routing" title=" routing"> routing</a>, <a href="https://publications.waset.org/abstracts/search?q=underwater" title=" underwater"> underwater</a> </p> <a href="https://publications.waset.org/abstracts/77618/an-energy-holes-avoidance-routing-protocol-for-underwater-wireless-sensor-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/77618.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">409</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1436</span> A Case of Postpartum Pulmonary Edema Induced by Oxytocin</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=May%20Zaw">May Zaw</a>, <a href="https://publications.waset.org/abstracts/search?q=Amber%20Latif"> Amber Latif</a>, <a href="https://publications.waset.org/abstracts/search?q=William%20Lim"> William Lim</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Postpartum dyspnea can be due to many causes, such as pulmonary embolism, amniotic fluid embolism, and peripartum cardiomyopathy, but less frequently due to acute pulmonary edema. The incidence of acute pulmonary edema during pregnancy and in the postpartum period has been estimated to be around 0.08%. About half of the cases are attributed to tocolytic therapy. Herein, we present a case of a young woman presenting with acute hypoxia after induction of labor with oxytocin and found to have acute pulmonary edema. This case aims to illustrate and add to a growing body of literature regarding oxytocin-induced acute pulmonary edema and highlights the importance of recognizing the rare complication of oxytocin and necessary interventions to avoid complications. Oxytocin-induced pulmonary edema is a relatively uncommon condition, but physicians should have a high index of suspicion to initiate timely intervention and avoid fetal complications. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=pulmonary" title="pulmonary">pulmonary</a>, <a href="https://publications.waset.org/abstracts/search?q=pregnancy" title=" pregnancy"> pregnancy</a>, <a href="https://publications.waset.org/abstracts/search?q=oxytocin" title=" oxytocin"> oxytocin</a>, <a href="https://publications.waset.org/abstracts/search?q=postpartum" title=" postpartum"> postpartum</a> </p> <a href="https://publications.waset.org/abstracts/153892/a-case-of-postpartum-pulmonary-edema-induced-by-oxytocin" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/153892.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">90</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1435</span> Emotion Motives Predict the Mood States of Depression and Happiness</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Paul%20E.%20Jose">Paul E. Jose</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A new self-report measure named the General Emotion Regulation Measure (GERM) assesses four key goals for experiencing broad valenced groups of emotions: 1) trying to experience positive emotions (e.g., joy, pride, liking a person); 2) trying to avoid experiencing positive emotions; 3) trying to experience negative emotions (e.g., anger, anxiety, contempt); and 4) trying to avoid experiencing negative emotions. Although individual differences in GERM motives have been identified, evidence of validity with common mood outcomes is lacking. In the present study, whether GERM motives predict self-reported subjective happiness and depressive symptoms (CES-D) was tested with a community sample of 833 young adults. It was predicted that the GERM motive of trying to experience positive emotions would positively predict subjective happiness, and analogously trying to experience negative emotions would predict depressive symptoms. An initial path model was constructed in which the four GERM motives predicted both subjective happiness and depressive symptoms. The fully saturated model included three non-significant paths, which were subsequently pruned, and a good fitting model was obtained (CFI = 1.00; RMR = .007). Two GERM motives significantly predicted subjective happiness: 1) trying to experience positive emotions ( = .38, p < .001) and 2) trying to avoid experiencing positive emotions ( = -.48, p <.001). Thus, individuals who reported high levels of trying to experience positive emotions reported high levels of happiness, and individuals who reported low levels of trying to avoid experiencing positive emotions also reported high levels of happiness. Three GERM motives significantly predicted depressive symptoms: 1) trying to avoid experiencing positive emotions ( = .20, p <.001); 2) trying to experience negative emotions ( = .15, p <.001); and 3) trying to experience positive emotions (= -.07, p <.001). In agreement with predictions, trying to experience positive emotions was positively associated with subjective happiness and trying to experience negative emotions was positively associated with depressive symptoms. In essence, these two valenced mood states seem to be sustained by trying to experience similarly valenced emotions. However, the three other significant paths in the model indicated that emotional motives play a complicated role in supporting both positive and negative mood states. For subjective happiness, the GERM motive of not trying to avoid positive emotions, i.e., not avoiding happiness, was also a strong predictor of happiness. Thus, people who report being the happiest are those individuals who not only strive to experience positive emotions but also are not ambivalent about them. The pattern for depressive symptoms was more nuanced. Individuals who reported higher depressive symptoms also reported higher levels of avoiding positive emotions and trying to experience negative emotions. The strongest predictor for depressed mood was avoiding positive emotions, which would suggest that happiness aversion or fear of happiness is an important motive for dysphoric people. Future work should determine whether these patterns of association are similar among clinically depressed people, and longitudinal data are needed to determine temporal relationships between motives and mood states. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=emotions%20motives" title="emotions motives">emotions motives</a>, <a href="https://publications.waset.org/abstracts/search?q=depression" title=" depression"> depression</a>, <a href="https://publications.waset.org/abstracts/search?q=subjective%20happiness" title=" subjective happiness"> subjective happiness</a>, <a href="https://publications.waset.org/abstracts/search?q=path%20model" title=" path model"> path model</a> </p> <a href="https://publications.waset.org/abstracts/140013/emotion-motives-predict-the-mood-states-of-depression-and-happiness" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/140013.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">202</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1434</span> Measuring Energy Efficiency Performance of Mena Countries</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Azam%20Mohammadbagheri">Azam Mohammadbagheri</a>, <a href="https://publications.waset.org/abstracts/search?q=Bahram%20Fathi"> Bahram Fathi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> DEA has become a very popular method of performance measure, but it still suffers from some shortcomings. One of these shortcomings is the issue of having multiple optimal solutions to weights for efficient DMUs. The cross efficiency evaluation as an extension of DEA is proposed to avoid this problem. Lam (2010) is also proposed a mixed-integer linear programming formulation based on linear discriminate analysis and super efficiency method (MILP model) to avoid having multiple optimal solutions to weights. In this study, we modified MILP model to determine more suitable weight sets and also evaluate the energy efficiency of MENA countries as an application of the proposed model. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=data%20envelopment%20analysis" title="data envelopment analysis">data envelopment analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=discriminate%20analysis" title=" discriminate analysis"> discriminate analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=cross%20efficiency" title=" cross efficiency"> cross efficiency</a>, <a href="https://publications.waset.org/abstracts/search?q=MILP%20model" title=" MILP model"> MILP model</a> </p> <a href="https://publications.waset.org/abstracts/26629/measuring-energy-efficiency-performance-of-mena-countries" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/26629.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">687</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1433</span> Contactless Attendance System along with Temperature Monitoring</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nalini%20C.%20Iyer">Nalini C. Iyer</a>, <a href="https://publications.waset.org/abstracts/search?q=Shraddha%20H."> Shraddha H.</a>, <a href="https://publications.waset.org/abstracts/search?q=Anagha%20B.%20Varahamurthy"> Anagha B. Varahamurthy</a>, <a href="https://publications.waset.org/abstracts/search?q=Dikshith%20C.%20S."> Dikshith C. S.</a>, <a href="https://publications.waset.org/abstracts/search?q=Ishwar%20G.%20Kubasad"> Ishwar G. Kubasad</a>, <a href="https://publications.waset.org/abstracts/search?q=Vinayak%20I.%20Karalatti"> Vinayak I. Karalatti</a>, <a href="https://publications.waset.org/abstracts/search?q=Pavan%20B.%20Mulimani"> Pavan B. Mulimani</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The current scenario of the pandemic due to COVID-19 has led to the awareness among the people to avoid unneces-sary contact in public places. There is a need to avoid contact with physical objects to stop the spreading of infection. The contactless feature has to be included in the systems in public places wherever possible. For example, attendance monitoring systems with fingerprint biometric can be replaced with a contactless feature. One more important protocol followed in the current situation is temperature monitoring and screening. The paper describes an attendance system with a contactless feature and temperature screening for the university. The system displays a QR code to scan, which redirects to the student login web page only if the location is valid (the location where the student scans the QR code should be the location of the display of the QR code). Once the student logs in, the temperature of the student is scanned by the contactless temperature sensor (mlx90614) with an error of 0.5°C. If the temperature falls in the range of the desired value (range of normal body temperature), then the attendance of the student is marked as present, stored in the database, and the door opens automatically. The attendance is marked as absent in the other case, alerted with the display of temperature, and the door remains closed. The door is automated with the help of a servomotor. To avoid the proxy, IR sensors are used to count the number of students in the classroom. The hardware system consisting of a contactless temperature sensor and IR sensor is implemented on the microcontroller, NodeMCU. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=NodeMCU" title="NodeMCU">NodeMCU</a>, <a href="https://publications.waset.org/abstracts/search?q=IR%20sensor" title=" IR sensor"> IR sensor</a>, <a href="https://publications.waset.org/abstracts/search?q=attendance%20monitoring" title=" attendance monitoring"> attendance monitoring</a>, <a href="https://publications.waset.org/abstracts/search?q=contactless" title=" contactless"> contactless</a>, <a href="https://publications.waset.org/abstracts/search?q=temperature" title=" temperature"> temperature</a> </p> <a href="https://publications.waset.org/abstracts/139302/contactless-attendance-system-along-with-temperature-monitoring" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/139302.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">185</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1432</span> Concealing Breast Cancer Status: A Qualitative Study in India</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shradha%20Parsekar">Shradha Parsekar</a>, <a href="https://publications.waset.org/abstracts/search?q=Suma%20Nair"> Suma Nair</a>, <a href="https://publications.waset.org/abstracts/search?q=Ajay%20Bailey"> Ajay Bailey</a>, <a href="https://publications.waset.org/abstracts/search?q=Binu%20V.%20S."> Binu V. S. </a> </p> <p class="card-text"><strong>Abstract:</strong></p> Background: Concealing of cancer-related information is seen in many low-and-middle-income countries and may be associated with multiple factors. Comparatively, there is lack of information about, how breast cancers diagnosed women disclose cancer-related information to their social contacts and vice versa. To get more insights on the participant’s experience, opinions, expectations, and attitudes, a qualitative study is a suitable approach. Therefore, this study involving in-depth interviews was planned to lessen this gap. Methods: Interviews were conducted separately among breast cancer patients and their caregivers with semi-structured qualitative interview guide. Purposive and convenient sampling was being used to recruit patients and caregivers, respectively. Ethical clearance and permission from the tertiary hospital were obtained and participants were selected from the Udupi district, Karnataka, India. After obtaining a list of breast cancer diagnosed cases, participants were contacted in person and their willingness to take part in the study was taken. About 39 caregivers and 35 patients belonging to different breast cancer stages were recruited. Interviews were recorded with prior permission. Data was managed by Atlas.ti 8 software. The recordings were transcribed, translated and coded in two cycles. Most of the patients belonged to stage II and III cancer. Codes were grouped together into to whom breast cancer status was concealed to and underneath reason for the same. Main findings: followings are the codes and code families which emerged from the data. 1) Concealing the breast cancer status from social contacts other than close family members (such as extended family, neighbor and friends). Participants perceived the reasons as, a) to avoid questions which people probe (which doesn’t have answers), b) to avoid people paying courtesy visit (to inquire about the health as it is Indian culture to visit the sick person) making it inconvenient for patient and caregivers have to offer something and talk to them, c) to avoid people getting shocked (react as if cancer is different from other diseases) or getting emotional/sad, or getting fear of death d) to avoid getting negative suggestion or talking anything in front of patient as it may affect patient negatively, e) to avoid getting stigmatized, f) to avoid getting obstacle in child’s marriage. 2) Participant concealed the breast cancer status of young children as they perceived that it may a) affect studies, b) affect emotionally, c) children may get scared. 3) Concealing the breast cancer status from patients as the caregivers perceived that they have fear of a) worsening patient’s health, b) patient getting tensed, c) patient getting shocked, and d) patient getting scared. However, some participants stressed important in disclosing the cancer status to social contact/patient to make the people aware of the disease. Conclusion: The news of breast cancer spreads like electricity in the wire, therefore, patient or family avoid it for many reasons. Although, globally, due to physicians’ ethical obligations, there is an inclination towards more disclosure of cancer diagnosis and status of prognosis to the patient. However, it is an ongoing argument whether patient/social contacts should know the status especially in a country like India. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=breast%20cancer" title="breast cancer">breast cancer</a>, <a href="https://publications.waset.org/abstracts/search?q=concealing%20cancer%20status" title=" concealing cancer status"> concealing cancer status</a>, <a href="https://publications.waset.org/abstracts/search?q=India" title=" India"> India</a>, <a href="https://publications.waset.org/abstracts/search?q=qualitative%20study" title=" qualitative study"> qualitative study</a> </p> <a href="https://publications.waset.org/abstracts/95322/concealing-breast-cancer-status-a-qualitative-study-in-india" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/95322.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">135</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1431</span> A Methodology for Developing New Technology Ideas to Avoid Patent Infringement: F-Term Based Patent Analysis</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kisik%20Song">Kisik Song</a>, <a href="https://publications.waset.org/abstracts/search?q=Sungjoo%20Lee"> Sungjoo Lee</a> </p> <p class="card-text"><strong>Abstract:</strong></p> With the growing importance of intangible assets recently, the impact of patent infringement on the business of a company has become more evident. Accordingly, it is essential for firms to estimate the risk of patent infringement risk before developing a technology and create new technology ideas to avoid the risk. Recognizing the needs, several attempts have been made to help develop new technology opportunities and most of them have focused on identifying emerging vacant technologies from patent analysis. In these studies, the IPC (International Patent Classification) system or keywords from text-mining application to patent documents was generally used to define vacant technologies. Unlike those studies, this study adopted F-term, which classifies patent documents according to the technical features of the inventions described in them. Since the technical features are analyzed by various perspectives by F-term, F-term provides more detailed information about technologies compared to IPC while more systematic information compared to keywords. Therefore, if well utilized, it can be a useful guideline to create a new technology idea. Recognizing the potential of F-term, this paper aims to suggest a novel approach to developing new technology ideas to avoid patent infringement based on F-term. For this purpose, we firstly collected data about F-term and then applied text-mining to the descriptions about classification criteria and attributes. From the text-mining results, we could identify other technologies with similar technical features of the existing one, the patented technology. Finally, we compare the technologies and extract the technical features that are commonly used in other technologies but have not been used in the existing one. These features are presented in terms of “purpose”, “function”, “structure”, “material”, “method”, “processing and operation procedure” and “control means” and so are useful for creating new technology ideas that help avoid infringing patent rights of other companies. Theoretically, this is one of the earliest attempts to adopt F-term to patent analysis; the proposed methodology can show how to best take advantage of F-term with the wealth of technical information. In practice, the proposed methodology can be valuable in the ideation process for successful product and service innovation without infringing the patents of other companies. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=patent%20infringement" title="patent infringement">patent infringement</a>, <a href="https://publications.waset.org/abstracts/search?q=new%20technology%20ideas" title=" new technology ideas"> new technology ideas</a>, <a href="https://publications.waset.org/abstracts/search?q=patent%20analysis" title=" patent analysis"> patent analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=F-term" title=" F-term"> F-term</a> </p> <a href="https://publications.waset.org/abstracts/29041/a-methodology-for-developing-new-technology-ideas-to-avoid-patent-infringement-f-term-based-patent-analysis" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/29041.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">269</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1430</span> An Efficient Data Mining Technique for Online Stores</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mohammed%20Al-Shalabi">Mohammed Al-Shalabi</a>, <a href="https://publications.waset.org/abstracts/search?q=Alaa%20Obeidat"> Alaa Obeidat</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In any food stores, some items will be expired or destroyed because the demand on these items is infrequent, so we need a system that can help the decision maker to make an offer on such items to improve the demand on the items by putting them with some other frequent item and decrease the price to avoid losses. The system generates hundreds or thousands of patterns (offers) for each low demand item, then it uses the association rules (support, confidence) to find the interesting patterns (the best offer to achieve the lowest losses). In this paper, we propose a data mining method for determining the best offer by merging the data mining techniques with the e-commerce strategy. The task is to build a model to predict the best offer. The goal is to maximize the profits of a store and avoid the loss of products. The idea in this paper is the using of the association rules in marketing with a combination with e-commerce. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=data%20mining" title="data mining">data mining</a>, <a href="https://publications.waset.org/abstracts/search?q=association%20rules" title=" association rules"> association rules</a>, <a href="https://publications.waset.org/abstracts/search?q=confidence" title=" confidence"> confidence</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20stores" title=" online stores"> online stores</a> </p> <a href="https://publications.waset.org/abstracts/3171/an-efficient-data-mining-technique-for-online-stores" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/3171.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">410</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1429</span> Human Error Analysis in the USA Marine Accidents Reports</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=J.%20S%C3%A1nchez-Beaskoetxea">J. Sánchez-Beaskoetxea</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The analysis of accidents, such as marine accidents, is one of the most useful instruments to avoid future accidents. In the case of marine accidents, from a simple collision of a small boat in a port to the wreck of a gigantic tanker ship, the study of the causes of the accidents is the basis of a great part of the marine international legislation. Some countries have official institutions who investigate all the accidents in which a ship with their flag is involved. In the case of the USA, the National Transportation Safety Board (NTSB) is responsible for these researches. The NTSB, after a deep investigation into each accident, publishes a Marine Accident Report with the possible cause of the accident. This paper analyses all the Marine Accident Reports published by the NTBS and focuses its attention especially in the Human Errors that led to reported accidents. In this research, the different Human Errors made by crew members are cataloged in 10 different groups. After a complete analysis of all the reports, the statistical analysis on the Human Errors typology in marine accidents is presented in order to use it as a tool to avoid the same errors in the future. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=human%20error" title="human error">human error</a>, <a href="https://publications.waset.org/abstracts/search?q=marine%20accidents" title=" marine accidents"> marine accidents</a>, <a href="https://publications.waset.org/abstracts/search?q=ship%20crew" title=" ship crew"> ship crew</a>, <a href="https://publications.waset.org/abstracts/search?q=USA" title=" USA"> USA</a> </p> <a href="https://publications.waset.org/abstracts/63273/human-error-analysis-in-the-usa-marine-accidents-reports" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/63273.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">419</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1428</span> Techniques of Construction Management in Civil Engineering </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mamoon%20M.%20Atout">Mamoon M. Atout</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The Middle East Gulf region has witnessed rapid growth and development in many areas over the last two decades. The development of the real-estate sector, construction industry and infrastructure projects are a major share of the development that has participated in the civilization of the countries of the Gulf. Construction industry projects were planned and managed by different types of experts, who came from all over the world having different types of experiences in construction management and industry. Some of these projects were completed on time, while many were not, due to many accumulating factors. Many accumulated factors are considered as the principle reason for the problem experienced at the project construction stage, which reflected negatively on the project success. Specific causes of delay have been identified by construction managers to avoid any unexpected delays through proper analysis and considerations to some implications such as risk assessment and analysis for many potential problems to ensure that projects will be delivered on time. Construction management implications were adopted and considered by project managers who have experience and knowledge in applying the techniques of the system of engineering construction management. The aim of this research is to determine the benefits of the implications of construction management by the construction team and level of considerations of the techniques and processes during the project development and construction phases to avoid any delay in the projects. It also aims to determine the factors that participate to project completion delays in case project managers are not well committed to their roles and responsibilities. The results of the analysis will determine the necessity of the applications required by the project team to avoid the causes of delays that help them deliver projects on time, e.g. verifying tender documents, quantities and preparing the construction method of the project. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=construction%20management" title="construction management">construction management</a>, <a href="https://publications.waset.org/abstracts/search?q=control%20process" title=" control process"> control process</a>, <a href="https://publications.waset.org/abstracts/search?q=cost%20control" title=" cost control"> cost control</a>, <a href="https://publications.waset.org/abstracts/search?q=planning%20and%20scheduling" title=" planning and scheduling"> planning and scheduling</a> </p> <a href="https://publications.waset.org/abstracts/57350/techniques-of-construction-management-in-civil-engineering" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/57350.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">247</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1427</span> Learning Disability or Learning Differences: Understanding Differences Between Cultural and Linguistic Diversity, Learning Differences, and Learning Disabilities</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jolanta%20Jonak">Jolanta Jonak</a>, <a href="https://publications.waset.org/abstracts/search?q=Sylvia%20Tolczyk"> Sylvia Tolczyk</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Students demonstrate various learning preferences and learning styles that range from visual, auditory to kinesthetic preferences. These learning preferences are further impacted by individual cognitive make up that characterizes itself in linguistic strengths, logical- special, inter-or intra- personal, just to name a few. Students from culturally and linguistically diverse backgrounds (CLD) have an increased risk of being misunderstood by many school systems and even medical personnel. CLD students are influenced by many factors (like acculturation and experience) that may impact their achievements and functioning levels. CLD students who develop initial or basic interpersonal communication proficiency skills in the target language are even at a higher risk for being suspected of learning disability when they are underachieving academically. Research indicates that large numbers of students arenot provided the type of education and types of supports they need in order to be successful in an academicenvironment. Multiple research findings indicate that significant numbers of school staff self-reports that they do not feel adequately prepared to work with CLD students. It is extremely important for the school staff, especially school psychologists, who often are the first experts that are consulted, to be educated about overlapping symptoms and settle differences between learning difference and disability. It is equally important for medical personnel, mainly pediatricians, psychologists, and psychiatrists, to understand the subtle differences to avoid inaccurate opinions. Having the knowledge, school staff can avoid unnecessary referrals for special education evaluations and avoid inaccurate decisions about the presence of a disability. This presentation will illustrate distinctions based on research between learning differences and disabilities, how to recognize them, and how to assess for them. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=special%20education" title="special education">special education</a>, <a href="https://publications.waset.org/abstracts/search?q=learning%20disability" title=" learning disability"> learning disability</a>, <a href="https://publications.waset.org/abstracts/search?q=differentiation" title=" differentiation"> differentiation</a>, <a href="https://publications.waset.org/abstracts/search?q=differences" title=" differences"> differences</a> </p> <a href="https://publications.waset.org/abstracts/142991/learning-disability-or-learning-differences-understanding-differences-between-cultural-and-linguistic-diversity-learning-differences-and-learning-disabilities" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/142991.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">156</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1426</span> Using A Blockchain-Based, End-to-End Encrypted Communication System Between Mobile Terminals to Improve Organizational Privacy</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Andrei%20Bogdan%20Stanescu">Andrei Bogdan Stanescu</a>, <a href="https://publications.waset.org/abstracts/search?q=Robert%20Stana"> Robert Stana</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Creating private and secure communication channels between employees has become a critical aspect in order to ensure organizational integrity and avoid leaks of sensitive information. With the widespread use of modern methods of disrupting communication between users, real use-cases of advanced encryption mechanisms have emerged to avoid cyber-attackers that are willing to intercept private conversations between critical employees in an organization. This paper aims to present a custom implementation of a messaging application named “Whisper” that uses end-to-end encryption (E2EE) mechanisms and blockchain-related components to protect sensitive conversations and mitigate the risks of information breaches inside organizations. The results of this research paper aim to expand the areas of applicability of E2EE algorithms and integrations with private blockchains in chat applications as a viable method of enhancing intra-organizational communication privacy. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=end-to-end%20encryption" title="end-to-end encryption">end-to-end encryption</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20communication" title=" mobile communication"> mobile communication</a>, <a href="https://publications.waset.org/abstracts/search?q=cryptography" title=" cryptography"> cryptography</a>, <a href="https://publications.waset.org/abstracts/search?q=communication%20security" title=" communication security"> communication security</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20privacy" title=" data privacy"> data privacy</a> </p> <a href="https://publications.waset.org/abstracts/168928/using-a-blockchain-based-end-to-end-encrypted-communication-system-between-mobile-terminals-to-improve-organizational-privacy" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/168928.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">89</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1425</span> An Approaching Index to Evaluate a forward Collision Probability</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yuan-Lin%20Chen">Yuan-Lin Chen</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper presents an approaching forward collision probability index (AFCPI) for alerting and assisting driver in keeping safety distance to avoid the forward collision accident in highway driving. The time to collision (TTC) and time headway (TH) are used to evaluate the TTC forward collision probability index (TFCPI) and the TH forward collision probability index (HFCPI), respectively. The Mamdani fuzzy inference algorithm is presented combining TFCPI and HFCPI to calculate the approaching collision probability index of the vehicle. The AFCPI is easier to understand for the driver who did not even have any professional knowledge in vehicle professional field. At the same time, the driver&rsquo;s behavior is taken into account for suiting each driver. For the approaching index, the value 0 is indicating the 0% probability of forward collision, and the values 0.5 and 1 are indicating the 50% and 100% probabilities of forward collision, respectively. The AFCPI is useful and easy-to-understand for alerting driver to avoid the forward collision accidents when driving in highway. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=approaching%20index" title="approaching index">approaching index</a>, <a href="https://publications.waset.org/abstracts/search?q=forward%20collision%20probability" title=" forward collision probability"> forward collision probability</a>, <a href="https://publications.waset.org/abstracts/search?q=time%20to%20collision" title=" time to collision"> time to collision</a>, <a href="https://publications.waset.org/abstracts/search?q=time%20headway" title=" time headway"> time headway</a> </p> <a href="https://publications.waset.org/abstracts/74855/an-approaching-index-to-evaluate-a-forward-collision-probability" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/74855.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">293</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1424</span> Dynamic Ad-hoc Topologies for Mobile Robot Navigation Based on Non-Uniform Grid Maps</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Peter%20Sauer">Peter Sauer</a>, <a href="https://publications.waset.org/abstracts/search?q=Thomas%20Hinze"> Thomas Hinze</a>, <a href="https://publications.waset.org/abstracts/search?q=Petra%20Hofstedt"> Petra Hofstedt</a> </p> <p class="card-text"><strong>Abstract:</strong></p> To avoid obstacles in the surrounding environment and to navigate to a given target belong to the most important tasks for mobile robots. According to these tasks different data structures are suitable. To avoid near obstacles, occupancy grid maps are an ideal representation of the surroundings. For less fine grained tasks, such as navigating from one room to another in an apartment, pure grid maps are inappropriate. Grid maps are very detailed, calculating paths to navigate between rooms based on grid maps would take too long. Instead, graph-based data structures, so-called topologies, turn out to be a proper choice for such tasks. In this paper we present two methods to dynamically create topologies from grid maps. Both methods are based on non-uniform grid maps. The topologies are generated on-the-fly and can easily be modified to represent changes in the environment. This allows a hybrid approach to control mobile robots, where, depending on the situation and the current task, either the grid map or the generated topology may be used. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=robot%20navigation" title="robot navigation">robot navigation</a>, <a href="https://publications.waset.org/abstracts/search?q=occupancy%20grids" title=" occupancy grids"> occupancy grids</a>, <a href="https://publications.waset.org/abstracts/search?q=topological%20maps" title=" topological maps"> topological maps</a>, <a href="https://publications.waset.org/abstracts/search?q=dynamic%20map%20creation" title=" dynamic map creation"> dynamic map creation</a> </p> <a href="https://publications.waset.org/abstracts/22654/dynamic-ad-hoc-topologies-for-mobile-robot-navigation-based-on-non-uniform-grid-maps" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/22654.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">563</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1423</span> Attitude of Nigerian Women Towards the Prevention of Sexually Transmission of HIV</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Akanle%20Florence%20Foluso">Akanle Florence Foluso</a>, <a href="https://publications.waset.org/abstracts/search?q=Ola%20Tolulope%20Monisola"> Ola Tolulope Monisola</a>, <a href="https://publications.waset.org/abstracts/search?q=Oludare%20Abosede%20Abiola"> Oludare Abosede Abiola</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The study investigated the attitude of married women toward the prevention of HIV in heterosexual relationships. A population-based survey was conducted using a total number of 1,400 women aged 24-45 years. The women were randomly selected from the general population. Mohamed Talabi and William's attitudinal scale was used to measure the attitude of women towards HIV and its prevention. The questionnaire had a reliability coefficient of 0.85. Frequency contents percentage woe used to describe the data while Pearson Product Moment Correlation, Chi-Square and test were used to test all the hypotheses raised. All hypotheses were tested at a 0.05 level of significance. The study revealed that the majority of women unknowingly practice risky behaviors, which could promote this transmission. They neither insist on a condom to have sex even when their husband has many other sexual partners apart from them. Others felt they could not be assertive in telling their husband to seek medical HIV testing or get their sex partner to seek medical treatment. Many have never seen a female condom or avoid sex to prevent HIV. Many believe it would be embarrassing to get an HIV antibody test. Many women will not avoid sex if there is a slight chance that their partner might have this and would not be able to insist that a condom be used if they were to have sex. It was recommended that there is a need to understand the HIV risk from a woman’s perspective. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=women" title="women">women</a>, <a href="https://publications.waset.org/abstracts/search?q=HIV" title=" HIV"> HIV</a>, <a href="https://publications.waset.org/abstracts/search?q=men" title=" men"> men</a>, <a href="https://publications.waset.org/abstracts/search?q=attitude%20of%20women" title=" attitude of women"> attitude of women</a>, <a href="https://publications.waset.org/abstracts/search?q=sexual%20partner" title=" sexual partner"> sexual partner</a> </p> <a href="https://publications.waset.org/abstracts/192424/attitude-of-nigerian-women-towards-the-prevention-of-sexually-transmission-of-hiv" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/192424.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">21</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1422</span> An Assessment of Drainage Network System in Nigeria Urban Areas using Geographical Information Systems: A Case Study of Bida, Niger State</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yusuf%20Hussaini%20Atulukwu">Yusuf Hussaini Atulukwu</a>, <a href="https://publications.waset.org/abstracts/search?q=Daramola%20Japheth"> Daramola Japheth</a>, <a href="https://publications.waset.org/abstracts/search?q=Tabitit%20S.%20Tabiti"> Tabitit S. Tabiti</a>, <a href="https://publications.waset.org/abstracts/search?q=Daramola%20Elizabeth%20Lara"> Daramola Elizabeth Lara</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In view of the recent limitations faced by the township concerning poorly constructed and in some cases non - existence of drainage facilities that resulted into incessant flooding in some parts of the community poses threat to life,property and the environment. The research seeks to address this issue by showing the spatial distribution of drainage network in Bida Urban using Geographic information System techniques. Relevant features were extracted from existing Bida based Map using un-screen digitization and x, y, z, data of existing drainages were acquired using handheld Global Positioning System (GPS). These data were uploaded into ArcGIS 9.2, software, and stored in the relational database structure that was used to produce the spatial data drainage network of the township. The result revealed that about 40 % of the drainages are blocked with sand and refuse, 35 % water-logged as a result of building across erosion channels and dilapidated bridges as a result of lack of drainage along major roads. The study thus concluded that drainage network systems in Bida community are not in good working condition and urgent measures must be initiated in order to avoid future disasters especially with the raining season setting in. Based on the above findings, the study therefore recommends that people within the locality should avoid dumping municipal waste within the drainage path while sand blocked or weed blocked drains should be clear by the authority concerned. In the same vein the authority should ensured that contract of drainage construction be awarded to professionals and all the natural drainages caused by erosion should be addressed to avoid future disasters. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=drainage%20network" title="drainage network">drainage network</a>, <a href="https://publications.waset.org/abstracts/search?q=spatial" title=" spatial"> spatial</a>, <a href="https://publications.waset.org/abstracts/search?q=digitization" title=" digitization"> digitization</a>, <a href="https://publications.waset.org/abstracts/search?q=relational%20database" title=" relational database"> relational database</a>, <a href="https://publications.waset.org/abstracts/search?q=waste" title=" waste"> waste</a> </p> <a href="https://publications.waset.org/abstracts/32733/an-assessment-of-drainage-network-system-in-nigeria-urban-areas-using-geographical-information-systems-a-case-study-of-bida-niger-state" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/32733.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">334</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1421</span> Optimization of Bio-Based Lightweight Mortars Containing Wood Waste</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Valeria%20Corinaldesi">Valeria Corinaldesi</a>, <a href="https://publications.waset.org/abstracts/search?q=Nicola%20Generosi"> Nicola Generosi</a>, <a href="https://publications.waset.org/abstracts/search?q=Daniele%20Berdini"> Daniele Berdini</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this study, wood waste from processing by-products was used by replacing natural sand for producing bio-based lightweight mortars. Manufacturers of wood products and furniture usually generate sawdust and pieces of side-cuts. These are produced by cutting, drilling, and milling operations as well. Three different percentages of substitution of quartz sand were tried: 2.5%, 5%, and 10% by volume. Wood by-products were pre-soaked in calcium hydroxide aqueous solution in order to obtain wood mineralization to avoid undesirable effects on the bio-based building materials. Bio-based mortars were characterized by means of compression and bending tests, free drying shrinkage tests, resistance to water vapour permeability, water capillary absorption, and, finally, thermal conductivity measurements. Results obtained showed that a maximum dosage of 5% wood by-products should be used in order to avoid an excessive loss of bio-based mortar mechanical strength. On the other hand, by adding the proper dosage of water-reducing admixture, adequate mechanical performance can be achieved even with 10% wood waste addition. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=bio-based%20mortar" title="bio-based mortar">bio-based mortar</a>, <a href="https://publications.waset.org/abstracts/search?q=energy%20efficiency" title=" energy efficiency"> energy efficiency</a>, <a href="https://publications.waset.org/abstracts/search?q=lightweight%20mortar" title=" lightweight mortar"> lightweight mortar</a>, <a href="https://publications.waset.org/abstracts/search?q=thermal%20insulation" title=" thermal insulation"> thermal insulation</a>, <a href="https://publications.waset.org/abstracts/search?q=wood%20waste" title=" wood waste"> wood waste</a> </p> <a href="https://publications.waset.org/abstracts/194886/optimization-of-bio-based-lightweight-mortars-containing-wood-waste" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/194886.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">5</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1420</span> Identification of Novel Differentially Expressed and Co-Expressed Genes between Tumor and Adjacent Tissue in Prostate Cancer</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Luis%20Enrique%20Bautista-Hinojosa">Luis Enrique Bautista-Hinojosa</a>, <a href="https://publications.waset.org/abstracts/search?q=Luis%20A.%20Herrera"> Luis A. Herrera</a>, <a href="https://publications.waset.org/abstracts/search?q=Cristian%20Arriaga-Canon"> Cristian Arriaga-Canon</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Text should be written in the third person. Please avoid using "I" “my” or the pronoun "one". It is best to say "It is believed..." rather than "I believe..." or "One believes...". <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=transcriptomics" title="transcriptomics">transcriptomics</a>, <a href="https://publications.waset.org/abstracts/search?q=co-expression" title=" co-expression"> co-expression</a>, <a href="https://publications.waset.org/abstracts/search?q=cancer" title=" cancer"> cancer</a>, <a href="https://publications.waset.org/abstracts/search?q=biomarkers" title=" biomarkers"> biomarkers</a> </p> <a href="https://publications.waset.org/abstracts/179230/identification-of-novel-differentially-expressed-and-co-expressed-genes-between-tumor-and-adjacent-tissue-in-prostate-cancer" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/179230.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">75</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1419</span> Multilingualism without a Dominant Language in the Preschool Age: A Case of Natural Italian-Russian-German-English Multilingualism</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Legkikh%20Victoria">Legkikh Victoria</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The purpose of keeping bi/multilingualism is usually a way to let the child speak two/three languages at the same level. The main problem which normally appears is a mixed language or a domination of one language. The same level of two or more languages would be ideal but practically not easily reachable. So it was made an experiment with a girl with a natural multilingualism as an attempt to avoid a dominant language in the preschool age. The girl lives in Germany and the main languages for her are Italian, Russian and German but she also hears every day English. ‘One parent – one language’ strategy was used since the beginning so Italian and Russian were spoken to her since her birth, English was spoken between the parents and when she was 1,5 it was added German as a language of a nursery. In order to avoid a dominant language, she was always put in international groups with activity in different languages. Even if it was not possible to avoid an interference of languages in this case we can talk not only about natural multilingualism but also about balanced bilingualism in preschool time. The languages have been developing in parallel with different accents in a different period. Now at the age of 6 we can see natural horizontal multilingualism Russian/Italian/German/English. At the moment, her Russian/Italian bilingualism is balanced. German vocabulary is less but the language is active and English is receptive. We can also see a reciprocal interference of all the three languages (English is receptive so the simple phrases are normally said correctly but they are not enough to judge the level of language interference and it is not noticed any ‘English’ mistakes in other languages). After analysis of the state of every language, we can see as a positive and negative result of the experiment. As a positive result we can see that in the age of 6 the girl does not refuse any language, three languages are active, she differentiate languages and even if she says a word from another language she notifies that it is not a correct word, and the most important are the fact, that she does not have a preferred language. As a prove of the last statement it is to be noticed not only her self-identification as ‘half Russian and half Italian’ but also an answer to the question about her ‘mother tongue’: ‘I do not know, probably, when I have my own children I will speak one day Russian and one day Italian and sometimes German’. As a negative result, we can notice that not only a development of all the three languages are a little bit slower than it is supposed for her age but since she does not have a dominating language she also does not have a ‘perfect’ language and the interference is reciprocal. In any case, the experiment shows that it is possible to keep at least two languages without a preference in a pre-school multilingual space. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=balanced%20bilingualism" title="balanced bilingualism">balanced bilingualism</a>, <a href="https://publications.waset.org/abstracts/search?q=language%20interference" title=" language interference"> language interference</a>, <a href="https://publications.waset.org/abstracts/search?q=natural%20multilingualism" title=" natural multilingualism"> natural multilingualism</a>, <a href="https://publications.waset.org/abstracts/search?q=preschool%20multilingual%20education" title=" preschool multilingual education"> preschool multilingual education</a> </p> <a href="https://publications.waset.org/abstracts/56962/multilingualism-without-a-dominant-language-in-the-preschool-age-a-case-of-natural-italian-russian-german-english-multilingualism" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/56962.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">273</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1418</span> Training Burnout and Leisure Participation of Athletes in College</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=An-Hsu%20Chen">An-Hsu Chen</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The study intends to explore how the athletic trainings (12 hours per day, four days per week) have impacts on athlete burnout and their leisure participations. The connection between athlete burnout and leisure participation of collegiate athletes is also discussed. Athlete burnout and leisure participation questionnaire were administrated and 186 valid responses were collected. The data were analyzed with descriptive statistics, t-test, one-way ANOVA, Pearson product-moment correlation coefficient. Results suggest that athlete burnout among collegiate athletes with different specialties are significant distinct. Participants who train more days per week are more likely to participate in entertainment activities while those who have higher training hours per day tend to avoid knowledge-based activities. The research also finds there is a significant positive correlation between athlete burnout and leisure participation of collegiate athletes while sport devaluation is negatively correlated with sport activities in leisure participation. Hence, adjust and well-arrange training quality and quantity may help to avoid over-trainings. Away trainings, uploading training volumes, and group leisure activities are suggested to be arranged properly to allow athletes cope with the burnout and stress caused by long-term trainings and periodical competitions. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=emotional%20and%20physical%20exhaustion" title="emotional and physical exhaustion">emotional and physical exhaustion</a>, <a href="https://publications.waset.org/abstracts/search?q=leisure%20activities" title=" leisure activities"> leisure activities</a>, <a href="https://publications.waset.org/abstracts/search?q=sport%20devaluation" title=" sport devaluation"> sport devaluation</a>, <a href="https://publications.waset.org/abstracts/search?q=training%20hours" title=" training hours"> training hours</a> </p> <a href="https://publications.waset.org/abstracts/50968/training-burnout-and-leisure-participation-of-athletes-in-college" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/50968.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">333</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1417</span> The Robotic Factor in Left Atrial Myxoma</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Abraham%20J.%20Rizkalla">Abraham J. Rizkalla</a>, <a href="https://publications.waset.org/abstracts/search?q=Tristan%20D.%20Yan"> Tristan D. Yan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Atrial myxoma is the most common primary cardiac tumor, and can result in cardiac failure secondary to obstruction, or systemic embolism due to fragmentation. Traditionally, excision of atrial an myxoma has been performed through median sternotomy, however the robotic approach offers several advantages including less pain, improved cosmesis, and faster recovery. Here, we highlight the less well recognized advantages and technical aspects to robotic myxoma resection. This video-presentation demonstrates the resection of a papillary subtype left atrial myxoma using the DaVinci© Xi surgical robot. The 10x magnification and 3D vision allows for the interface between the tumor and the interatrial septum to be accurately dissected, without the need to patch the interatrial septum. Several techniques to avoid tumor fragmentation and embolization are demonstrated throughout the procedure. The tumor was completely excised with clear margins. There was no atrial septal defect or mitral valve injury on post operative transesophageal echocardiography. The patient was discharged home on the fourth post-operative day. This video-presentation highlights the advantages of the robotic approach in atrial myxoma resection compared with sternotomy, as well as emphasizing several technical considerations to avoid potential complications. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cardiac%20surgery" title="cardiac surgery">cardiac surgery</a>, <a href="https://publications.waset.org/abstracts/search?q=left%20atrial%20myxoma" title=" left atrial myxoma"> left atrial myxoma</a>, <a href="https://publications.waset.org/abstracts/search?q=cardiac%20tumour" title=" cardiac tumour"> cardiac tumour</a>, <a href="https://publications.waset.org/abstracts/search?q=robotic%20resection" title=" robotic resection"> robotic resection</a> </p> <a href="https://publications.waset.org/abstracts/161018/the-robotic-factor-in-left-atrial-myxoma" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/161018.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">72</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1416</span> An Interoperability Concept for Detect and Avoid and Collision Avoidance Systems: Results from a Human-In-The-Loop Simulation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Robert%20Rorie">Robert Rorie</a>, <a href="https://publications.waset.org/abstracts/search?q=Lisa%20Fern"> Lisa Fern</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The integration of Unmanned Aircraft Systems (UAS) into the National Airspace System (NAS) poses a variety of technical challenges to UAS developers and aviation regulators. In response to growing demand for access to civil airspace in the United States, the Federal Aviation Administration (FAA) has produced a roadmap identifying key areas requiring further research and development. One such technical challenge is the development of a ‘detect and avoid’ system (DAA; previously referred to as ‘sense and avoid’) to replace the ‘see and avoid’ requirement in manned aviation. The purpose of the DAA system is to support the pilot, situated at a ground control station (GCS) rather than in the cockpit of the aircraft, in maintaining ‘well clear’ of nearby aircraft through the use of GCS displays and alerts. In addition to its primary function of aiding the pilot in maintaining well clear, the DAA system must also safely interoperate with existing NAS systems and operations, such as the airspace management procedures of air traffic controllers (ATC) and collision avoidance (CA) systems currently in use by manned aircraft, namely the Traffic alert and Collision Avoidance System (TCAS) II. It is anticipated that many UAS architectures will integrate both a DAA system and a TCAS II. It is therefore necessary to explicitly study the integration of DAA and TCAS II alerting structures and maneuver guidance formats to ensure that pilots understand the appropriate type and urgency of their response to the various alerts. This paper presents a concept of interoperability for the two systems. The concept was developed with the goal of avoiding any negative impact on the performance level of TCAS II (understanding that TCAS II must largely be left as-is) while retaining a DAA system that still effectively enables pilots to maintain well clear, and, as a result, successfully reduces the frequency of collision hazards. The interoperability concept described in the paper focuses primarily on facilitating the transition from a late-stage DAA encounter (where a loss of well clear is imminent) to a TCAS II corrective Resolution Advisory (RA), which requires pilot compliance with the directive RA guidance (e.g., climb, descend) within five seconds of its issuance. The interoperability concept was presented to 10 participants (6 active UAS pilots and 4 active commercial pilots) in a medium-fidelity, human-in-the-loop simulation designed to stress different aspects of the DAA and TCAS II systems. Pilot response times, compliance rates and subjective assessments were recorded. Results indicated that pilots exhibited comprehension of, and appropriate prioritization within, the DAA-TCAS II combined alert structure. Pilots demonstrated a high rate of compliance with TCAS II RAs and were also seen to respond to corrective RAs within the five second requirement established for manned aircraft. The DAA system presented under test was also shown to be effective in supporting pilots’ ability to maintain well clear in the overwhelming majority of cases in which pilots had sufficient time to respond. The paper ends with a discussion of next steps for research on integrating UAS into civil airspace. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=detect%20and%20avoid" title="detect and avoid">detect and avoid</a>, <a href="https://publications.waset.org/abstracts/search?q=interoperability" title=" interoperability"> interoperability</a>, <a href="https://publications.waset.org/abstracts/search?q=traffic%20alert%20and%20collision%20avoidance%20system%20%28TCAS%20II%29" title=" traffic alert and collision avoidance system (TCAS II)"> traffic alert and collision avoidance system (TCAS II)</a>, <a href="https://publications.waset.org/abstracts/search?q=unmanned%20aircraft%20systems" title=" unmanned aircraft systems"> unmanned aircraft systems</a> </p> <a href="https://publications.waset.org/abstracts/58071/an-interoperability-concept-for-detect-and-avoid-and-collision-avoidance-systems-results-from-a-human-in-the-loop-simulation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/58071.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">272</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1415</span> Churn Prediction for Savings Bank Customers: A Machine Learning Approach</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Prashant%20Verma">Prashant Verma</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Commercial banks are facing immense pressure, including financial disintermediation, interest rate volatility and digital ways of finance. Retaining an existing customer is 5 to 25 less expensive than acquiring a new one. This paper explores customer churn prediction, based on various statistical & machine learning models and uses under-sampling, to improve the predictive power of these models. The results show that out of the various machine learning models, Random Forest which predicts the churn with 78% accuracy, has been found to be the most powerful model for the scenario. Customer vintage, customer’s age, average balance, occupation code, population code, average withdrawal amount, and an average number of transactions were found to be the variables with high predictive power for the churn prediction model. The model can be deployed by the commercial banks in order to avoid the customer churn so that they may retain the funds, which are kept by savings bank (SB) customers. The article suggests a customized campaign to be initiated by commercial banks to avoid SB customer churn. Hence, by giving better customer satisfaction and experience, the commercial banks can limit the customer churn and maintain their deposits. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=savings%20bank" title="savings bank">savings bank</a>, <a href="https://publications.waset.org/abstracts/search?q=customer%20churn" title=" customer churn"> customer churn</a>, <a href="https://publications.waset.org/abstracts/search?q=customer%20retention" title=" customer retention"> customer retention</a>, <a href="https://publications.waset.org/abstracts/search?q=random%20forests" title=" random forests"> random forests</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning" title=" machine learning"> machine learning</a>, <a href="https://publications.waset.org/abstracts/search?q=under-sampling" title=" under-sampling"> under-sampling</a> </p> <a href="https://publications.waset.org/abstracts/107845/churn-prediction-for-savings-bank-customers-a-machine-learning-approach" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/107845.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">143</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1414</span> The Strategy of Orbit Avoidance for Optical Remote Sensing Satellite</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Dianxun%20Zheng">Dianxun Zheng</a>, <a href="https://publications.waset.org/abstracts/search?q=Wuxing%20Jing"> Wuxing Jing</a>, <a href="https://publications.waset.org/abstracts/search?q=Lin%20Hetong"> Lin Hetong</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Optical remote sensing satellite, always running on the Sun-synchronous orbit, equipped laser warning equipment to alert CCD camera from laser attack. There have three ways to protect the CCD camera, closing the camera cover satellite attitude maneuver and satellite orbit avoidance. In order to enhance the safety of optical remote sensing satellite in orbit, this paper explores the strategy of satellite avoidance. The avoidance strategy is expressed as the evasion of pre-determined target points in the orbital coordinates of virtual satellite. The so-called virtual satellite is a passive vehicle which superposes a satellite at the initial stage of avoidance. The target points share the consistent cycle time and the same semi-major axis with the virtual satellite, which ensures the properties of the Sun-synchronous orbit remain unchanged. Moreover, to further strengthen the avoidance capability of satellite, it can perform multi-object avoid maneuvers. On occasions of fulfilling the orbit tasks of the satellite, the orbit can be restored back to virtual satellite through orbit maneuvers. There into, the avoid maneuvers adopts pulse guidance. and the fuel consumption is also optimized. The avoidance strategy discussed in this article is applicable to avoidance for optical remote sensing satellite when encounter the laser hostile attacks. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=optical%20remote%20sensing%20satellite" title="optical remote sensing satellite">optical remote sensing satellite</a>, <a href="https://publications.waset.org/abstracts/search?q=always%20running%20on%20the%20sun-synchronous" title=" always running on the sun-synchronous"> always running on the sun-synchronous</a> </p> <a href="https://publications.waset.org/abstracts/31188/the-strategy-of-orbit-avoidance-for-optical-remote-sensing-satellite" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/31188.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">400</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1413</span> PLC Based Automatic Railway Crossing System for India </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Tapan%20Upadhyay">Tapan Upadhyay</a>, <a href="https://publications.waset.org/abstracts/search?q=Aqib%20Siddiqui"> Aqib Siddiqui</a>, <a href="https://publications.waset.org/abstracts/search?q=Sameer%20Khan"> Sameer Khan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Railway crossing system in India is a manually operated level crossing system, either manned or unmanned. The main aim is to protect pedestrians and vehicles from colliding with trains, which pass at regular intervals, as India has the largest and busiest railway network. But because of human error and negligence, every year thousands of lives are lost due to accidents at railway crossings. To avoid this, we suggest a solution, by using Programmable Logical Controller (PLC) based automatic system, which will automatically control the barrier as well as roadblocks to stop people from crossing while security warning is given. Often people avoid security warning, and pass two-wheelers from beneath the barrier, while the train is at a distance away. This paper aims at reducing the fatality and accident rate by controlling barrier and roadblocks using sensors which sense the incoming train and vehicles and sends a signal to PLC. The PLC in return sends a signal to barrier and roadblocks. Once the train passes, the barrier and roadblocks retrieve back, and the passage is clear for vehicles and pedestrians to cross. PLC’s are used because they are very flexible, cost effective, space efficient, reduces complexity and minimises errors. Supervisory Control And Data Acquisition (SCADA) is used to monitor the functioning. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=level%20crossing" title="level crossing">level crossing</a>, <a href="https://publications.waset.org/abstracts/search?q=PLC" title=" PLC"> PLC</a>, <a href="https://publications.waset.org/abstracts/search?q=sensors" title=" sensors"> sensors</a>, <a href="https://publications.waset.org/abstracts/search?q=SCADA" title=" SCADA"> SCADA</a> </p> <a href="https://publications.waset.org/abstracts/20135/plc-based-automatic-railway-crossing-system-for-india" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/20135.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">427</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">1412</span> Exploring Data Leakage in EEG Based Brain-Computer Interfaces: Overfitting Challenges</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Khalida%20Douibi">Khalida Douibi</a>, <a href="https://publications.waset.org/abstracts/search?q=Rodrigo%20Balp"> Rodrigo Balp</a>, <a href="https://publications.waset.org/abstracts/search?q=Sol%C3%A8ne%20Le%20Bars"> Solène Le Bars</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In the medical field, applications related to human experiments are frequently linked to reduced samples size, which makes the training of machine learning models quite sensitive and therefore not very robust nor generalizable. This is notably the case in Brain-Computer Interface (BCI) studies, where the sample size rarely exceeds 20 subjects or a few number of trials. To address this problem, several resampling approaches are often used during the data preparation phase, which is an overly critical step in a data science analysis process. One of the naive approaches that is usually applied by data scientists consists in the transformation of the entire database before the resampling phase. However, this can cause model’ s performance to be incorrectly estimated when making predictions on unseen data. In this paper, we explored the effect of data leakage observed during our BCI experiments for device control through the real-time classification of SSVEPs (Steady State Visually Evoked Potentials). We also studied potential ways to ensure optimal validation of the classifiers during the calibration phase to avoid overfitting. The results show that the scaling step is crucial for some algorithms, and it should be applied after the resampling phase to avoid data leackage and improve results. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=data%20leackage" title="data leackage">data leackage</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20science" title=" data science"> data science</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning" title=" machine learning"> machine learning</a>, <a href="https://publications.waset.org/abstracts/search?q=SSVEP" title=" SSVEP"> SSVEP</a>, <a href="https://publications.waset.org/abstracts/search?q=BCI" title=" BCI"> BCI</a>, <a href="https://publications.waset.org/abstracts/search?q=overfitting" title=" overfitting"> overfitting</a> </p> <a href="https://publications.waset.org/abstracts/147393/exploring-data-leakage-in-eeg-based-brain-computer-interfaces-overfitting-challenges" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/147393.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">153</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">&lsaquo;</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=avoid%20target-point&amp;page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=avoid%20target-point&amp;page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=avoid%20target-point&amp;page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=avoid%20target-point&amp;page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=avoid%20target-point&amp;page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=avoid%20target-point&amp;page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=avoid%20target-point&amp;page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=avoid%20target-point&amp;page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=avoid%20target-point&amp;page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=avoid%20target-point&amp;page=48">48</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=avoid%20target-point&amp;page=49">49</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=avoid%20target-point&amp;page=2" rel="next">&rsaquo;</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">&copy; 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">&times;</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10