Search results for: direct cost
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 9009

Search results for: direct cost

5769 An Antibacterial Dental Restorative Containing 3,4-Dichlorocrotonolactone: Synthesis, Formulation and Evaluation

Authors: Dong Xie, Leah Howard, Yiming Weng

Abstract:

The objective of this study was to synthesize and characterize 5-acryloyloxy-3,4-dichlorocrotonolactone (a furanone derivative), use this derivative to modify a dental restorative, and study the effect of the derivative on the antibacterial activity and compressive strength of the formed restorative. In this study, a furanone derivative was synthesized, characterized, and used to formulate a dental restorative. Compressive strength (CS) and S. mutans viability were used to evaluate the mechanical strength and antibacterial activity of the formed restorative. The fabricated restorative specimens were photocured and conditioned in distilled water at 37oC for 24 h, followed by direct testing for CS or/and incubating with S. mutans for 48 h for antibacterial testing. The results show that the modified dental restorative showed a significant antibacterial activity without substantially decreasing the mechanical strengths. With addition of the antibacterial derivative up to 30%, the restorative kept its original CS nearly unchanged but showed a significant antibacterial activity with 68% reduction in the S. mutans viability. Furthermore, the antibacterial function of the modified restorative was not affected by human saliva. The aging study also indicates that the modified restorative may have a long-lasting antibacterial function. It is concluded that this experimental antibacterial restorative may potentially be developed into a clinically attractive dental filling restorative due to its high mechanical strength and antibacterial function.

Keywords: antibacterial, dental restorative, compressive strength, S. mutans viability

Procedia PDF Downloads 322
5768 Propagation of the Effects of Certain Types of Military Psychological Operations in a Networked Population

Authors: Colette Faucher

Abstract:

In modern asymmetric conflicts, the Armed Forces generally have to intervene in countries where the internal peace is in danger. They must make the local population an ally in order to be able to deploy the necessary military actions with its support. For this purpose, psychological operations (PSYOPs) are used to shape people’s behaviors and emotions by the modification of their attitudes in acting on their perceptions. PSYOPs aim at elaborating and spreading a message that must be read, listened to and/or looked at, then understood by the info-targets in order to get from them the desired behavior. A message can generate in the info-targets, reasoned thoughts, spontaneous emotions or reflex behaviors, this effect partly depending on the means of conveyance used to spread this message. In this paper, we focus on psychological operations that generate emotions. We present a method based on the Intergroup Emotion Theory, that determines, from the characteristics of the conveyed message and of the people from the population directly reached by the means of conveyance (direct info-targets), the emotion likely to be triggered in them and we simulate the propagation of the effects of such a message on indirect info-targets that are connected to them through the social networks that structure the population.

Keywords: military psychological operations, social identity, social network, emotion propagation

Procedia PDF Downloads 407
5767 Proposal of a Model Supporting Decision-Making on Information Security Risk Treatment

Authors: Ritsuko Kawasaki, Takeshi Hiromatsu

Abstract:

Management is required to understand all information security risks within an organization, and to make decisions on which information security risks should be treated in what level by allocating how much amount of cost. However, such decision-making is not usually easy, because various measures for risk treatment must be selected with the suitable application levels. In addition, some measures may have objectives conflicting with each other. It also makes the selection difficult. Therefore, this paper provides a model which supports the selection of measures by applying multi-objective analysis to find an optimal solution. Additionally, a list of measures is also provided to make the selection easier and more effective without any leakage of measures.

Keywords: information security risk treatment, selection of risk measures, risk acceptance, multi-objective optimization

Procedia PDF Downloads 371
5766 An Intelligent Watch-Over System Using an IoT Device, for Elderly People Living by Themselves

Authors: Hideo Suzuki, Yuya Kiyonobu, Kotaro Matsushita, Masaki Hanada, Rie Suzuki, Noriko Niijima, Noriko Uosaki, Tadao Nakamura

Abstract:

People often worry about their elderly family members who are living by themselves or staying alone somewhere. An intelligent watch-over system for such elderly people, using a Raspberry Pi IoT device, has been newly developed to monitor those who live or stay separately from their families and alert them if a problem occurs. The system consists of motion sensors and temperature-humidity combined sensors that are located at seven points within an elderly person's home. The intelligent algorithms of the system detect signs and the possibility of unhealthy situations arising for the elderly relative; e.g., an unusually long bathing time, or a visit to a restroom, too high a room temperature, etc., by using data cached by the sensors above, at seven points within their house. The system gives more consideration to the elderly person's privacy, by using the sensors above, instead of using cameras and microphones placed around the house. The system invented and described here, can send a Twitter direct message to designated family members when an elderly relative is possibly in an unhealthy condition. Thus the system helps decrease family members' anxieties regarding their elderly relatives and increases their sense of security.

Keywords: elderly person, IoT device, Raspberry Pi, watch-over system

Procedia PDF Downloads 218
5765 Steel Dust as a Coating Agent for Iron Ore Pellets at Ironmaking

Authors: M. Bahgat, H. Hanafy, H. Al-Tassan

Abstract:

Cluster formation is an essential phenomenon during direct reduction processes at shaft furnaces. Decreasing the reducing temperature to avoid this problem can cause a significant drop in throughput. In order to prevent sticking of pellets, a coating material basically inactive under the reducing conditions prevailing in the shaft furnace, should be applied to cover the outer layer of the pellets. In the present work, steel dust is used as coating material for iron ore pellets to explore dust coating effectiveness and determines the best coating conditions. Steel dust coating is applied for iron ore pellets in various concentrations. Dust slurry concentrations of 5.0-30% were used to have a coated steel dust amount of 1.0-5.0 kg per ton iron ore. Coated pellets with various concentrations were reduced isothermally in weight loss technique with simulated gas mixture to the composition of reducing gases at shaft furnaces. The influences of various coating conditions on the reduction behavior and the morphology were studied. The optimum reduced samples were comparatively applied for sticking index measurement. It was found that the optimized steel dust coating condition that achieve higher reducibility with lower sticking index was 30% steel dust slurry concentration with 3.0 kg steel dust/ton ore.

Keywords: reduction, ironmaking, steel dust, coating

Procedia PDF Downloads 299
5764 Negativization: A Focus Strategy in Basà Language

Authors: Imoh Philip

Abstract:

Basà language is classified as belonging to Kainji family, under the sub-phylum Western-Kainji known as Rubasa (Basa Benue) (Croizier & Blench, 1992:32). Basà is an under-described language spoken in the North-Central Nigeria. The language is characterized by subject-verb-object (henceforth SVO) as its canonical word order. Data for this work is sourced from the researcher’s native intuition of the language corroborated with a careful observation of native speakers. This paper investigates the syntactic derivational strategy of information-structure encoding in Basà language. It emphasizes on a negative operator, as a strategy for focusing a constituent or clause that follows it and negativizes a whole proposition. For items that are not nouns, they have to undergo an obligatory nominalization process, either by affixation, modification or conversion before they are moved to the pre verbal position for these operations. The study discovers and provides evidence of the fact showing that deferent constituents in the sentence such as the subject, direct, indirect object, genitive, verb phrase, prepositional phrase, clause and idiophone, etc. can be focused with the same negativizing operator. The process is characterized by focusing the pre verbal NP constituent alone, whereas the whole proposition is negated. The study can stimulate similar study or be replicated in other languages.

Keywords: negation, focus, Basà, nominalization

Procedia PDF Downloads 592
5763 Design and Implement a Remote Control Robot Controlled by Zigbee Wireless Network

Authors: Sinan Alsaadi, Mustafa Merdan

Abstract:

Communication and access systems can be made with many methods in today’s world. These systems are such standards as Wifi, Wimax, Bluetooth, GPS and GPRS. Devices which use these standards also use system resources excessively in direct proportion to their transmission speed. However, large-scale data communication is not always needed. In such cases, a technology which will use system resources as little as possible and support smart network topologies has been needed in order to enable the transmissions of such small packet data and provide the control for this kind of devices. IEEE issued 802.15.4 standard upon this necessity and enabled the production of Zigbee protocol which takes these standards as its basis and devices which support this protocol. In our project, this communication protocol was preferred. The aim of this study is to provide the immediate data transmission of our robot from the field within the scope of the project. In addition, making the communication with the robot through Zigbee Protocol has also been aimed. While sitting on the computer, obtaining the desired data from the region where the robot is located has been taken as the basis. Arduino Uno R3 microcontroller which provides the control mechanism, 1298 shield as the motor driver.

Keywords: ZigBee, wireless network, remote monitoring, smart home, agricultural industry

Procedia PDF Downloads 274
5762 An International Comparison of Forensic Identification Evidence Legislation: Balancing Community Interests and Individual Rights

Authors: Marcus Smith

Abstract:

DNA profiling has made a valuable contribution to criminal investigations over the past thirty years. Direct matching DNA profiles from a crime scene and suspect, or between a suspect and a database remain of great importance to crimes such as murder, assault, and property theft. As scientific and technological advancement continues, a wide range of new DNA profiling applications has been developed. The application of new techniques involves an interesting balancing act between admitting probative evidence in a criminal trial, evaluating its degree of relevance and validity, and limiting its prejudicial impact. The impact of new DNA profiling applications that have significant implications for law enforcement and the legal system can be evaluated through a review of relevant case law, legislation and the latest empirical evidence from jurisdictions around the world including the United States, United Kingdom, and Australia. There are benefits in further examining the implications of these new developments, including how the criminal law can best be adapted to ensure that new technology is used to enhance criminal investigation and prosecution while ensuring it is applied in a measured way that respects individual rights and maintains principles of fairness enshrined in the legal system.

Keywords: criminal procedure, forensic evidence, DNA profiling, familial searching, phenotyping

Procedia PDF Downloads 130
5761 Biochemical and Antiviral Study of Peptides Isolated from Amaranthus hypochondriacus on Tomato Yellow Leaf Curl Virus Replication

Authors: José Silvestre Mendoza Figueroa, Anders Kvarnheden, Jesús Méndez Lozano, Edgar Antonio Rodríguez Negrete, Manuel Soriano García

Abstract:

Agroindustrial plants such as cereals and pseudo cereals offer a substantial source of biomacromolecules, as they contain large amounts per tissue-gram of proteins, polysaccharides and lipids in comparison with other plants. In particular, Amaranthus hypochondriacus seeds have high levels of proteins in comparison with other cereal and pseudo cereal species, which makes the plant a good source of bioactive molecules such as peptides. Geminiviruses are one principal class of pathogens that causes important economic losses in crops, affecting directly the development and production of the plant. One such virus is the Tomato yellow leaf curl virus (TYLCV), which affects mainly Solanacea family plants such as tomato species. The symptoms of the disease are curling of leaves, chlorosis, dwarfing and floral abortion. The aim of this work was to get peptides derived from enzymatic hydrolysis of globulins and albumins from amaranth seeds with specific recognition of the replication origin in the TYLCV genome, and to test the antiviral activity on host plants with the idea to generate a direct control of this viral infection. Globulins and albumins from amaranth were extracted, the fraction was enzymatically digested with papain, and the aromatic peptides fraction was selected for further purification. Six peptides were tested against the replication origin (OR) using affinity assays, surface resonance plasmon and fluorescent titration, and two of these peptides showed high affinity values to the replication origin of the virus, dissociation constant values were calculated and showed specific interaction between the peptide Ampep1 and the OR. An in vitro replication test of the total TYLCV DNA was performed, in which the peptide AmPep1 was added in different concentrations to the system reaction, which resulted in a decrease of viral DNA synthesis when the peptide concentration increased. Also, we showed that the peptide can decrease the complementary DNA chain of the virus in Nicotiana benthamiana leaves, confirming that the peptide binds to the OR and that its expected mechanism of action is to decrease the replication rate of the viral genome. In an infection assay, N. benthamiana plants were agroinfected with TYLCV-Israel and TYLCV-Guasave. After confirming systemic infection, the peptide was infiltrated in new infected leaves, and the plants treated with the peptide showed a decrease of virus symptoms and viral titer. In order to confirm the antiviral activity in a commercial crop, tomato plants were infected with TYLCV. After confirming systemic infection, plants were infiltrated with peptide solution as above, and the symptom development was monitored 21 days after treatment, showing that tomato plants treated with peptides had lower symptom rates and viral titer. The peptide was also tested against other begomovirus such as Pepper huasteco yellow vein virus (PHYVV-Guasave), showing a decrease of symptoms in N. benthamiana infected plants. The model of direct biochemical control of TYLCV infection shown in this work can be extrapolated to other begomovirus infections, and the methods reported here can be used for design of antiviral agrochemicals for other plant virus infections.

Keywords: agrochemical screening, antiviral, begomovirus, geminivirus, peptides, plasmon, TYLCV

Procedia PDF Downloads 269
5760 The Development of Traffic Devices Using Natural Rubber in Thailand

Authors: Weeradej Cheewapattananuwong, Keeree Srivichian, Godchamon Somchai, Wasin Phusanong, Nontawat Yoddamnern

Abstract:

Natural rubber used for traffic devices in Thailand has been developed and researched for several years. When compared with Dry Rubber Content (DRC), the quality of Rib Smoked Sheet (RSS) is better. However, the cost of admixtures, especially CaCO₃ and sulphur, is higher than the cost of RSS itself. In this research, Flexible Guideposts and Rubber Fender Barriers (RFB) are taken into consideration. In case of flexible guideposts, the materials used are both RSS and DRC60%, but for RFB, only RSS is used due to the controlled performance tests. The objective of flexible guideposts and RFB is to decrease a number of accidents, fatal rates, and serious injuries. Functions of both devices are to save road users and vehicles as well as to absorb impact forces from vehicles so as to decrease of serious road accidents. This leads to the mitigation methods to remedy the injury of motorists, form severity to moderate one. The solution is to find the best practice of traffic devices using natural rubber under the engineering concepts. In addition, the performances of materials, such as tensile strength and durability, are calculated for the modulus of elasticity and properties. In the laboratory, the simulation of crashes, finite element of materials, LRFD, and concrete technology methods are taken into account. After calculation, the trials' compositions of materials are mixed and tested in the laboratory. The tensile test, compressive test, and weathering or durability test are followed and based on ASTM. Furthermore, the Cycle-Repetition Test of Flexible Guideposts will be taken into consideration. The final decision is to fabricate all materials and have a real test section in the field. In RFB test, there will be 13 crash tests, 7 Pickup Truck tests, and 6 Motorcycle Tests. The test of vehicular crashes happens for the first time in Thailand, applying the trial and error methods; for example, the road crash test under the standard of NCHRP-TL3 (100 kph) is changed to the MASH 2016. This is owing to the fact that MASH 2016 is better than NCHRP in terms of speed, types, and weight of vehicles and the angle of crash. In the processes of MASH, Test Level 6 (TL-6), which is composed of 2,270 kg Pickup Truck, 100 kph, and 25 degree of crash-angle is selected. The final test for real crash will be done, and the whole system will be evaluated again in Korea. The researchers hope that the number of road accidents will decrease, and Thailand will be no more in the top tenth ranking of road accidents in the world.

Keywords: LRFD, load and resistance factor design, ASTM, american society for testing and materials, NCHRP, national cooperation highway research program, MASH, manual for assessing safety hardware

Procedia PDF Downloads 125
5759 Design and Implementation of a Fan Coil Unit Controller Based on the Duty Ratio Fuzzy Method

Authors: Liang Zhao, Jili Zhang, Kai Li

Abstract:

A microcontroller-based fan coil unit (FCU) fuzzy controller is designed and implemented in this paper. The controller employs the concept of duty ratio on the electric valve control, which could make full use of the cooling and dehumidifying capacity of the FCU when the valve is off. The traditional control method and its limitations are analyzed. The hardware and software design processes are introduced in detail. The experimental results show that the proposed method is more energy efficient compared to the traditional controlling strategy. Furthermore, a more comfortable room condition could be achieved by the proposed method. The proposed low-cost FCU fuzzy controller deserves to be widely used in engineering applications.

Keywords: fan coil unit, duty ratio, fuzzy controller, experiment

Procedia PDF Downloads 327
5758 Performance Study of ZigBee-Based Wireless Sensor Networks

Authors: Afif Saleh Abugharsa

Abstract:

The IEEE 802.15.4 standard is designed for low-rate wireless personal area networks (LR-WPAN) with focus on enabling wireless sensor networks. It aims to give a low data rate, low power consumption, and low cost wireless networking on the device-level communication. The objective of this study is to investigate the performance of IEEE 802.15.4 based networks using simulation tool. In this project the network simulator 2 NS2 was used to several performance measures of wireless sensor networks. Three scenarios were considered, multi hop network with a single coordinator, star topology, and an ad hoc on demand distance vector AODV. Results such as packet delivery ratio, hop delay, and number of collisions are obtained from these scenarios.

Keywords: ZigBee, wireless sensor networks, IEEE 802.15.4, low power, low data rate

Procedia PDF Downloads 428
5757 MCERTL: Mutation-Based Correction Engine for Register-Transfer Level Designs

Authors: Khaled Salah

Abstract:

In this paper, we present MCERTL (mutation-based correction engine for RTL designs) as an automatic error correction technique based on mutation analysis. A mutation-based correction methodology is proposed to automatically fix the erroneous RTL designs. The proposed strategy combines the processes of mutation and assertion-based localization. The erroneous statements are mutated to produce possible fixes for the failed RTL code. A concurrent mutation engine is proposed to mitigate the computational cost of running sequential mutants operators. The proposed methodology is evaluated against some benchmarks. The experimental results demonstrate that our proposed method enables us to automatically locate and correct multiple bugs at reasonable time.

Keywords: bug localization, error correction, mutation, mutants

Procedia PDF Downloads 274
5756 Detailed Feasibility and Design of a Grid-Tied PV and Building Integrated Photovoltaic System for a Commercial Healthcare Building

Authors: Muhammad Ali Tariq

Abstract:

Grid-connected PV systems have drawn tremendous attention of researchers in the past recent years. The report elucidates the development of efficient and stable solar PV energy conversion systems after thorough analysis at various facets like PV module characteristics, its arrangement, power electronics and MPPT topologies, the stability of the grid, and economic viability over its lifetime. This report and feasibility study will try to bring all optimizing approaches and design calculations which are required for generating energy from BIPV and roof-mounted solar PV in a convenient, sustainable, and user-friendly way.

Keywords: building integrated photovoltaic system, grid integration, solar resource assessment, return on investment, multi MPPT-inverter, levelised cost of electricity

Procedia PDF Downloads 129
5755 Predatory Pricing at Services Markets: Incentives, Mechanisms, Standards of Proving, and Remedies

Authors: Mykola G. Boichuk

Abstract:

The paper concerns predatory pricing incentives and mechanisms in the markets of services, as well as its anti-competitive effects. As cost estimation at services markets is more complex in comparison to markets of goods, predatory pricing is more difficult to detect in the provision of services. For instance, this is often the case for professional services, which is analyzed in the paper. The special attention is given to employment markets as de-facto main supply markets for professional services markets. Also, the paper concerns such instances as travel agents' services, where predatory pricing may have implications not only on competition but on a wider range of public interest as well. Thus, the paper develops on effective ways to apply competition law rules on predatory pricing to the provision of services.

Keywords: employment markets, predatory pricing, services markets, unfair competition

Procedia PDF Downloads 319
5754 The Impact of Locations on the Perception of the Same Product: An Application to Motor Industry

Authors: Anna Claudia Pellicelli, Silvia Procacci

Abstract:

The study aims to demonstrate how different locations, where the same product is unveiled and tested, can provide a different result in terms of perception by the same kind of people. The experiment was done in occasion of the presentation of a new bike. A group of dealers has been invited in Lloret de Mar, two persons from the headquarter were present to run the presentation, together with an outsourced trainer. Half day dedicated to the theoretical presentation and half day to the test of the new bike on the road, including the test of its direct competitors. The same presentation, organized in the same way, has been delivered in Italy, in 4 locations often used to run business meetings with dealers. In the end of all days of the presentation, dealers had to fill a questionnaire regarding the evaluation of the different bikes tested. The result of the questionnaire showed how the group invited in Spain rated much higher the new bike compared with the dealers testing the bike in locations already known and close to their home. So, in terms of business strategy, it is important to take into account how the location and the way of presenting any product or service can have a favourable impact on the people we want to convince. The next step of the experiment will be to cross check the sales of that bike with the dealers and measure if there is a relation between the top sellers and the one that appreciated the bike the most, in Spain. It would mean that they were able to transfer to customers the same good feelings and impressions they had in Spain.

Keywords: product presentation, locations, emotional effect, business strategy

Procedia PDF Downloads 397
5753 Establishing Digital Forensics Capability and Capacity among Malaysia's Law Enforcement Agencies: Issues, Challenges and Recommendations

Authors: Sarah Taylor, Nor Zarina Zainal Abidin, Mohd Zabri Adil Talib

Abstract:

Although cybercrime is on the rise, yet many Law Enforcement Agencies in Malaysia faces difficulty in establishing own digital forensics capability and capacity. The main reasons are undoubtedly because of the high cost and difficulty in convincing their management. A survey has been conducted among Malaysia’s Law Enforcement Agencies owning a digital forensics laboratory to understand their history of building digital forensics capacity and capability, the challenges and the impact of having own laboratory to their case investigation. The result of the study shall be used by other Law Enforcement Agencies in justifying to their management to establish own digital forensics capability and capacity.

Keywords: digital forensics, digital forensics capacity and capability, laboratory, law enforcement agency

Procedia PDF Downloads 237
5752 Improving Equipment Life and Overall Equipment Effectiveness (O.E.E.) through Proper Maintenance Strategy Using Value Engineering

Authors: Malay Niraj, Praveen Kumar

Abstract:

The present study is a new approach for improving equipment life and Overall Equipment Efficiency (O.E.E.) through suitable maintenance practice with the help of value engineering. Value engineering is a one of the most powerful decision-making techniques which depend on many factors. The improvements are the result of recommendations made by multidisciplinary teams representing all parties involved. VE is a rigorous, systematic effort to improve the OEE and optimize the life cycle cost of a facility. The study describes problems in maintenance arising due to the absence of having clear criteria and strong decision constrain how to maintain failing equipment. Using factor comparisons, the study has been made between different maintenance practices and finally best maintenance practice based on value engineering technique has been selected.

Keywords: maintenance strategy, overall equipment efficiency, value engineering, decision-making

Procedia PDF Downloads 403
5751 Pedestrian Safe Bumper Design from Commingled Glass Fiber/Polypropylene Reinforced Sandwich Composites

Authors: L. Onal

Abstract:

The aim of this study is to optimize manufacturing process for thermoplastic sandwich composite structures for the pedestrian safety of automobiles subjected to collision condition. In particular, cost-effective manufacturing techniques for sandwich structures with commingled GF/PP skins and low-density foam cores are being investigated. The performance of these structures under bending load is being studied. Samples are manufactured using compression moulding technique. The relationship of this performance to processing parameters such as mould temperature, moulding time, moulding pressure and sequence of the layers during moulding is being investigated. The results of bending tests are discussed in the light of the moulding conditions and conclusions are given regarding optimum set of processing conditions using the compression moulding route

Keywords: twintex, flexural properties, automobile composites, sandwich structures

Procedia PDF Downloads 424
5750 An Empirical Assessment of the Effect of War Exposure on the Attitudes towards Violence

Authors: Anastasiia Kuptsevych, Robert J. Johnson, Olena Antonaccio, Ekaterina V. Botchkovar

Abstract:

Ukraine has recently experienced one of the bloodiest conflicts taking place on the European continent. Many active duty personnel and civilians have died, and millions of people have been displaced. This situation can lead to disorder in the country characterized by acceptance of violence and crime. There is a gap in the literature addressing the issues related to attitudes towards violence resulting from war, as well as focusing on the world’s more vulnerable civilian populations – those that live in lower and middle-income countries, such as Ukraine. Using a random sample of 1200 adults from two major Ukrainian cities, this study explores the relationship between different types of war exposure (direct and vicarious) and attitudes to violence. Multivariate models reveal that multiple types of war exposure (e.g., being injured, being a witness of death, watching war events on TV) are significantly associated with the attitudes to political and interpersonal violence. In addition, the KHB decomposition procedure showed that experiencing certain mental illnesses serve as important mediating mechanisms between war exposure and attitudes towards violence. Finally, in order to prevent society from disorder and high levels of violence, future studies need to pay more attention to exploring how vital and traumatic life events can lead a population to find violent acts acceptable.

Keywords: attitudes, Ukraine, violence, war

Procedia PDF Downloads 257
5749 Chemical Composition and Antimicrobial Activity of the Essential Oil of Thymus lanceolatus Desf. an Endemic Thyme from Algeria

Authors: Ahmed Nouasri, Tahar Dob, Toumi Mohamed, Dahmane Dahmane, Soumioa Krimat, Lynda Lamari, Chabane Chelghom

Abstract:

The aim of this study is to investigate the chemical composition for the first time, and antimicrobial activities of essential oil (EO) of Thymus lanceolatus Desf., an endemic thyme from Tiaret province of Algeria. The chemical composition of hydrodistilled essential oil from flowering aerial parts has been analyzed by GC and GC/MS techniques, the antimicrobial activity was realised by agar disc diffusion method and MIC was determined in solid medium by direct contact. Essential oil of T. lanceolataus has been yielded of 2.336 (w/w) based on dry weight, the analyses cited above, led to the identification of 29 components, which accounted for 97.34% of the total oil. Oxygenated monoterpenes was the main fraction (88.31%) dominated by thymol (80.2%) as major component of this oil, followed by carvacrol (6.25%). The oil was found effective against all tested strains especially fungus, except Pseudomonas aeruginosa were low activity observed, in addition Gram (+) bacteria found to be more sensitive to the EO than Gram (-) bacteria. This activity was ranging from12±2.65mm to 60.00±0.00mm Ø, with the lowest MIC value of under 0.06mg/ml to 12.53mg/ml. This results provided the evidence that the studied plant might indeed be potential sources of natural antimicrobial agents

Keywords: Thymus lanceolatus Desf., essential oil, chemical composition, antimicrobial activities

Procedia PDF Downloads 469
5748 Parametric Analysis of Syn-gas Fueled SOFC with Internal Reforming

Authors: Sanjay Tushar Choudhary

Abstract:

This paper focuses on the thermodynamic analysis of Solid Oxide Fuel Cell (SOFC). In the present work the SOFC has been modeled to work with internal reforming of fuel which takes place at high temperature and direct energy conversion from chemical energy to electrical energy takes place. The fuel-cell effluent is a high-temperature steam which can be used for co-generation purposes. Syn-gas has been used here as fuel which is essentially produced by steam reforming of methane in the internal reformer of the SOFC. A thermodynamic model of SOFC has been developed for planar cell configuration to evaluate various losses in the energy conversion process within the fuel cell. Cycle parameters like fuel utilization ratio and the air-recirculation ratio have been varied to evaluate the thermodynamic performance of the fuel cell. Output performance parameters like terminal voltage, cell-efficiency and power output have been evaluated for various values of current densities. It has been observed that a combination of a lower value of air-circulation ratio and higher values of fuel utilization efficiency gives a better overall thermodynamic performance.

Keywords: current density, SOFC, suel utilization factor, recirculation ratio

Procedia PDF Downloads 501
5747 Requirement Analysis for Emergency Management Software

Authors: Tomáš Ludík, Jiří Barta, Sabina Chytilová, Josef Navrátil

Abstract:

Emergency management is a discipline of dealing with and avoiding risks. Appropriate emergency management software allows better management of these risks and has a direct influence on reducing potential negative impacts. Although there are several emergency management software products in the Czech Republic, they cover user requirements from the emergency management field only partially. Therefore, the paper focuses on the issues of requirement analysis within development of emergency management software. Analysis of the current state describes the basic features and properties of user requirements for software development as well as basic methods and approaches for gathering these requirements. Then, the paper presents more specific mechanisms for requirement analysis based on chosen software development approach: structured, object-oriented or agile. Based on these experiences it is designed new methodology for requirement analysis. Methodology describes how to map user requirements comprehensively in the field of emergency management and thus reduce misunderstanding between software analyst and emergency manager. Proposed methodology was consulted with department of fire brigade and also has been applied in the requirements analysis for their current emergency management software. The proposed methodology has general character and can be used also in other specific areas during requirement analysis.

Keywords: emergency software, methodology, requirement analysis, stakeholders, use case diagram, user stories

Procedia PDF Downloads 537
5746 Smart BIM Documents - the Development of the Ontology-Based Tool for Employer Information Requirements (OntEIR), and its Transformation into SmartEIR

Authors: Shadan Dwairi

Abstract:

Defining proper requirements is one of the key factors for a successful construction projects. Although there have been many attempts put forward in assist in identifying requirements, but still this area is under developed. In Buildings Information Modelling (BIM) projects. The Employer Information Requirements (EIR) is the fundamental requirements document and a necessary ingredient in achieving a successful BIM project. The provision on full and clear EIR is essential to achieving BIM Level-2. As Defined by PAS 1192-2, EIR is a “pre-tender document that sets out the information to be delivered and the standards and processes to be adopted by the supplier as part of the project delivery process”. It also notes that “EIR should be incorporated into tender documentation to enable suppliers to produce an initial BIM Execution Plan (BEP)”. The importance of effective definition of EIR lies in its contribution to a better productivity during the construction process in terms of cost and time, in addition to improving the quality of the built asset. Proper and clear information is a key aspect of the EIR, in terms of the information it contains and more importantly the information the client receives at the end of the project that will enable the effective management and operation of the asset, where typically about 60%-80% of the cost is spent. This paper reports on the research done in developing the Ontology-based tool for Employer Information Requirements (OntEIR). OntEIR has proven the ability to produce a full and complete set of EIRs, which ensures that the clients’ information needs for the final model delivered by BIM is clearly defined from the beginning of the process. It also reports on the work being done into transforming OntEIR into a smart tool for Defining Employer Information Requirements (smartEIR). smartEIR transforms the OntEIR tool into enabling it to develop custom EIR- tailored for the: Project Type, Project Requirements, and the Client Capabilities. The initial idea behind smartEIR is moving away from the notion “One EIR fits All”. smartEIR utilizes the links made in OntEIR and creating a 3D matrix that transforms it into a smart tool. The OntEIR tool is based on the OntEIR framework that utilizes both Ontology and the Decomposition of Goals to elicit and extract the complete set of requirements needed for a full and comprehensive EIR. A new ctaegorisation system for requirements is also introduced in the framework and tool, which facilitates the understanding and enhances the clarification of the requirements especially for novice clients. Findings of the evaluation of the tool that was done with experts in the industry, showed that the OntEIR tool contributes towards effective and efficient development of EIRs that provide a better understanding of the information requirements as requested by BIM, and support the production of a complete BIM Execution Plan (BEP) and a Master Information Delivery Plan (MIDP).

Keywords: building information modelling, employer information requirements, ontology, web-based, tool

Procedia PDF Downloads 122
5745 CFD simulation of Near Wall Turbulence and Heat Transfer of Molten Salts

Authors: C. S. Sona, Makrand A. Khanwale, Channamallikarjun S. Mathpati

Abstract:

New generation nuclear power plants are currently being developed to be highly economical, to be passive safe, to produce hydrogen. An important feature of these reactors will be the use of coolants at temperature higher than that being used in current nuclear reactors. The molten fluoride salt with a eutectic composition of 46.5% LiF - 11.5% NaF - 42% KF (mol %) commonly known as FLiNaK is a leading candidate for heat transfer coolant for these nuclear reactors. CFD simulations were carried out using large eddy simulations to investigate the flow characteristics of molten FLiNaK at 850°C at a Reynolds number of 10,500 in a cylindrical pipe. Simulation results have been validated with the help of mean velocity profile using direct numerical simulation data. Transient velocity information was used to identify and characterise turbulent structures which are important for transfer of heat across solid-fluid interface. A wavelet transform based methodology called wavelet transform modulus maxima was used to identify and characterise the singularities. This analysis was also used for flow visualisation, and also to calculate the heat transfer coefficient using small eddy model. The predicted Nusselt number showed good agreement with the available experimental data.

Keywords: FLiNaK, heat transfer, molten salt, turbulent structures

Procedia PDF Downloads 445
5744 Efficient Storage and Intelligent Retrieval of Multimedia Streams Using H. 265

Authors: S. Sarumathi, C. Deepadharani, Garimella Archana, S. Dakshayani, D. Logeshwaran, D. Jayakumar, Vijayarangan Natarajan

Abstract:

The need of the hour for the customers who use a dial-up or a low broadband connection for their internet services is to access HD video data. This can be achieved by developing a new video format using H. 265. This is the latest video codec standard developed by ISO/IEC Moving Picture Experts Group (MPEG) and ITU-T Video Coding Experts Group (VCEG) on April 2013. This new standard for video compression has the potential to deliver higher performance than the earlier standards such as H. 264/AVC. In comparison with H. 264, HEVC offers a clearer, higher quality image at half the original bitrate. At this lower bitrate, it is possible to transmit high definition videos using low bandwidth. It doubles the data compression ratio supporting 8K Ultra HD and resolutions up to 8192×4320. In the proposed model, we design a new video format which supports this H. 265 standard. The major areas of applications in the coming future would lead to enhancements in the performance level of digital television like Tata Sky and Sun Direct, BluRay Discs, Mobile Video, Video Conferencing and Internet and Live Video streaming.

Keywords: access HD video, H. 265 video standard, high performance, high quality image, low bandwidth, new video format, video streaming applications

Procedia PDF Downloads 351
5743 A Lightweight Authentication and Key Exchange Protocol Design for Smart Homes

Authors: Zhifu Li, Lei Li, Wanting Zhou, Yuanhang He

Abstract:

This paper proposed a lightweight certificate-less authentication and key exchange protocol (Light-CL-PKC) based on elliptic curve cryptography and the Chinese Remainder Theorem for smart home scenarios. Light-CL-PKC can efficiently reduce the computational cost of both sides of authentication by forgoing time-consuming bilinear pair operations and making full use of point-addition and point-multiplication operations on elliptic curves. The authentication and key exchange processes in this system are also completed in a a single round of communication between the two parties. The analysis result demonstrates that it can significantly minimize the communication overhead of more than 32.14% compared with the referenced protocols, while the runtime for both authentication and key exchange have also been significantly reduced.

Keywords: authentication, key exchange, certificateless public key cryptography, elliptic curve cryptography

Procedia PDF Downloads 91
5742 Assessing the Pre-Service and In-Service Teachers’ Continuation of Use of Technology After Participation in Professional Development

Authors: Ayoub Kafyulilo, Petra Fisser, Joke Voogt

Abstract:

This study was conducted to assess the continuation of the use of technology in science and mathematics teaching of the pre-service and in-service teachers who attended the professional development programme. It also assessed professional development, personal, institutional, and technological factors contributing to the continuous use of technology in teaching. The study involved 42 teachers, thirteen pre-service teachers, and twenty-nine in-service teachers. A mixed-method research approach was used to collect data for this study. Findings showed that the continuous use of technology in teaching after the termination of the professional development arrangement was high among the pre-service teachers, and differed for the in-service teachers. The regression model showed that knowledge and skills, access to technology and ease of use were strong predictors (R2 = 55.3%) of the teachers’ continuous use of technology after the professional development arrangement. The professional development factor did not have a direct effect on the continuous use of technology, rather had an influence on personal factors (knowledge and skills). In turn, the personal factors had influence on the institutional factors (access to technology) and technological factors (ease of use), which together had an effect on the teachers’ continuous use of technology in teaching.

Keywords: technology, professional development, teachers, science and mathematics

Procedia PDF Downloads 154
5741 Comparision of Bioleaching of Metals from Spent Petroleum Catalyst Using Acidithiobacillus Ferrooxidans and Acidthiobacillus Thiooxidans

Authors: Haragobinda Srichandan, Ashish Pathak, Dong Jin Kim, Seoung-Won Lee

Abstract:

The present investigation deals with bioleaching of spent petroleum catalyst using At. ferrooxidans and At. thiooxidans. The spent catalyst used in the present study was pretreated with acetone to remove the oily hydrocarbons. FESEM and XPS analysis indicated the presence of metals in sulfide and oxide forms in spent catalyst. Both At. ferrooxidans and At. thiooxidans were found to be highly effective in producing the acid. Bioleaching with At. ferrooxidans and At. thiooxidans led to higher recovery of metals compare to control. During bioleaching similar recoveries of metals were obtained using At. ferrooxidans and At. thiooxidans. This might be due to the presence of metals as soluble oxides and sulphides in the spent catalyst. At the end of bioleaching, about 87-90% Ni, 34% Al, 65-73% Mo and 92-97% V were leached using above bacteria. It is elucidated that bioleaching with At. thiooxidans is comparatively more advantageous due to lower cost of sulphur.

Keywords: At. ferrooxidans, bioleaching, metal recovery, spent catalyst

Procedia PDF Downloads 283
5740 Audit on the Use of T-MACS Decision Aid for Patients Presenting to ED with Chest Pain

Authors: Saurav Dhawan, Sanchit Bansal

Abstract:

Background T-MACS is a computer-based decision aid that ‘rules in’ and ‘rules out’ ACS using a combination of the presence or absence of six clinical features with only one biomarker measured on arrival: hs-cTnT. T-MACS had 99.3% negative predictive value and 98.7% sensitivity for ACS, ‘ruling out’ ACS in 40% of patients while ‘ruling in’ 5% at the highest risk. We aim at benchmarking the use of T-MACS which could help to conserve healthcare resources, facilitate early discharges, and ensure safe practice. Methodology Randomized retrospective data collection (n=300) was done from ED electronic records across 3 hospital sites within MFT over a period of 2 months. Data was analysed and compared by percentage for the usage of T-MACS, number of admissions/discharges, and in days for length of stay in hospital. Results MRI A&E had the maximum compliance with the use of T-MACS in the trust at 66%, with minimum admissions (44%) and an average length of stay of 1.825 days. NMG A&E had an extremely low compliance rate (8 %), with 75% admission and 3.387 days as the average length of stay. WYT A&E had no TMACS recorded, with a maximum of 79% admissions and the longest average length of stay at 5.07 days. Conclusion All three hospital sites had a RAG rating of ‘RED’ as per the compliance levels. The assurance level was calculated as ‘Very Limited’ across all sites. There was a positive correlation observed between compliance with TMACS and direct discharges from ED, thereby reducing the average length of stay for patients in the hospital.

Keywords: ACS, discharges, ED, T-MACS

Procedia PDF Downloads 55