Search results for: dual-SLA indicators for computing force applications
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 10761

Search results for: dual-SLA indicators for computing force applications

10461 Determinants of Child Anthropometric Indicators: A Case Study of Mali in 2015

Authors: Davod Ahmadigheidari

Abstract:

The main objective of this study was to explore prevalence of anthropometric indicators as well the factors associated with the anthropometric indications in Mali. Data on 2015, downloaded from the website of Unicef, were analyzed. A total of 16,467 women (ages 15-49 years) and 16,467 children (ages 0-59 months) were selected for the sample. Different statistical analyses, such as descriptive, crosstabs and binary logistic regression form the basis of this study. Child anthropometric indicators (i.e., wasting, stunting, underweight and BMI for age) were used as the dependent variables. SPSS Syntax from WHO was used to create anthropometric indicators. Different factors, such as child’s sex, child’s age groups, child’s diseases symptoms (i.e., diarrhea, cough and fever), maternal education, household wealth index and area of residence were used as independent variables. Results showed more than forty percent of Malian households were in nutritional crises (stunting (42%) and underweight (34%). Findings from logistic regression analyses indicated that low score of wealth index, low maternal education and experience of diarrhea in last two weeks increase the probability of child malnutrition.

Keywords: Mali, wasting, stunting, underweight, BMI for age and wealth index

Procedia PDF Downloads 155
10460 An Improved Tie Force Method for Progressive Collapse Resistance Design of Precast Concrete Cross Wall Structures

Authors: M. Tohidi, J. Yang, C. Baniotopoulos

Abstract:

Progressive collapse of buildings typically occurs when abnormal loading conditions cause local damages, which leads to a chain reaction of failure and ultimately catastrophic collapse. The tie force (TF) method is one of the main design approaches for progressive collapse. As the TF method is a simplified method, further investigations on the reliability of the method is necessary. This study aims to develop an improved TF method to design the cross wall structures for progressive collapse. To this end, the pullout behavior of strands in grout was firstly analyzed; and then, by considering the tie force-slip relationship in the friction stage together with the catenary action mechanism, a comprehensive analytical method was developed. The reliability of this approach is verified by the experimental results of concrete block pullout tests and full scale floor-to-floor joints tests undertaken by Portland Cement Association (PCA). Discrepancies in the tie force between the analytical results and codified specifications have suggested the deficiency of TF method, hence an improved model based on the analytical results has been proposed to address this concern.

Keywords: cross wall, progressive collapse, ties force method, catenary, analytical

Procedia PDF Downloads 469
10459 Influence of Solenoid Configuration on Electromagnetic Acceleration of Plunger

Authors: Shreyansh Bharadwaj, Raghavendra Kollipara, Sijoy C. D., R. K. Mittal

Abstract:

Utilizing the Lorentz force to propel an electrically conductive plunger through a solenoid represents a fundamental application in electromagnetism. The parameters of the solenoid significantly influence the force exerted on the plunger, impacting its response. A parametric study has been done to understand the effect of these parameters on the force acting on the plunger. This study is done to determine the most optimal combination of parameters to obtain the fast response. Analysis has been carried out using an algorithm capable of simulating the scenario of a plunger undergoing acceleration within a solenoid. Authors have conducted an analysis focusing on several key configuration parameters of the solenoid. These parameters include the inter-layer gap (in the case of a multi-turn solenoid), different conductor diameters, varying numbers of turns, and diverse numbers of layers. Primary objective of this paper is to discern how alterations in these parameters affect the force applied to the plunger. Through extensive numerical simulations, a dataset has been generated and utilized to construct informative plots. These plots provide visual representations of the relationships between the solenoid configuration parameters and the resulting force exerted on the plunger, which can further be used to deduce scaling laws. This research endeavors to offer valuable insights into optimizing solenoid configurations for enhanced electromagnetic acceleration, thereby contributing to advancements in electromagnetic propulsion technology.

Keywords: Lorentz force, solenoid configuration, electromagnetic acceleration, parametric analysis, simulation

Procedia PDF Downloads 47
10458 Analysis of Rural Roads in Developing Countries Using Principal Component Analysis and Simple Average Technique in the Development of a Road Safety Performance Index

Authors: Muhammad Tufail, Jawad Hussain, Hammad Hussain, Imran Hafeez, Naveed Ahmad

Abstract:

Road safety performance index is a composite index which combines various indicators of road safety into single number. Development of a road safety performance index using appropriate safety performance indicators is essential to enhance road safety. However, a road safety performance index in developing countries has not been given as much priority as needed. The primary objective of this research is to develop a general Road Safety Performance Index (RSPI) for developing countries based on the facility as well as behavior of road user. The secondary objectives include finding the critical inputs in the RSPI and finding the better method of making the index. In this study, the RSPI is developed by selecting four main safety performance indicators i.e., protective system (seat belt, helmet etc.), road (road width, signalized intersections, number of lanes, speed limit), number of pedestrians, and number of vehicles. Data on these four safety performance indicators were collected using observation survey on a 20 km road section of the National Highway N-125 road Taxila, Pakistan. For the development of this composite index, two methods are used: a) Principal Component Analysis (PCA) and b) Equal Weighting (EW) method. PCA is used for extraction, weighting, and linear aggregation of indicators to obtain a single value. An individual index score was calculated for each road section by multiplication of weights and standardized values of each safety performance indicator. However, Simple Average technique was used for weighting and linear aggregation of indicators to develop a RSPI. The road sections are ranked according to RSPI scores using both methods. The two weighting methods are compared, and the PCA method is found to be much more reliable than the Simple Average Technique.

Keywords: indicators, aggregation, principle component analysis, weighting, index score

Procedia PDF Downloads 157
10457 Modeling Route Selection Using Real-Time Information and GPS Data

Authors: William Albeiro Alvarez, Gloria Patricia Jaramillo, Ivan Reinaldo Sarmiento

Abstract:

Understanding the behavior of individuals and the different human factors that influence the choice when faced with a complex system such as transportation is one of the most complicated aspects of measuring in the components that constitute the modeling of route choice due to that various behaviors and driving mode directly or indirectly affect the choice. During the last two decades, with the development of information and communications technologies, new data collection techniques have emerged such as GPS, geolocation with mobile phones, apps for choosing the route between origin and destination, individual service transport applications among others, where an interest has been generated to improve discrete choice models when considering the incorporation of these developments as well as psychological factors that affect decision making. This paper implements a discrete choice model that proposes and estimates a hybrid model that integrates route choice models and latent variables based on the observation on the route of a sample of public taxi drivers from the city of Medellín, Colombia in relation to its behavior, personality, socioeconomic characteristics, and driving mode. The set of choice options includes the routes generated by the individual service transport applications versus the driver's choice. The hybrid model consists of measurement equations that relate latent variables with measurement indicators and utilities with choice indicators along with structural equations that link the observable characteristics of drivers with latent variables and explanatory variables with utilities.

Keywords: behavior choice model, human factors, hybrid model, real time data

Procedia PDF Downloads 152
10456 Enabling Cloud Adoption Based Secured Mobile Banking through Backend as a Service

Authors: P. S. Jagadeesh Kumar, S. Meenakshi Sundaram

Abstract:

With the increase of prevailing non-traditional rivalry, mobile banking experiences an ever changing commercial backdrop. Substantial customer demands have established to be more intricate as customers request more expediency and superintend over their banking services. To enterprise advance and modernization in mobile banking applications, it is gradually obligatory to deeply leapfrog the scuffle using business model transformation. The dramaturgical vicissitudes taking place in mobile banking entail advanced traditions to exploit security. By reforming and transforming older back office into integrated mobile banking applications, banks can engender a supple and nimble banking environment that can rapidly respond to new business requirements over cloud computing. Cloud computing is transfiguring ecosystems in numerous industries, and mobile banking is no exemption providing services innovation, greater flexibility to respond to improved security and enhanced business intelligence with less cost. Cloud technology offer secure deployment possibilities that can provision banks in developing new customer experiences, empower operative relationship and advance speed to efficient banking transaction. Cloud adoption is escalating quickly since it can be made secured for commercial mobile banking transaction through backend as a service in scrutinizing the security strategies of the cloud service provider along with the antiquity of transaction details and their security related practices.

Keywords: cloud adoption, backend as a service, business intelligence, secured mobile banking

Procedia PDF Downloads 254
10455 Force Distribution and Muscles Activation for Ankle Instability Patients with Rigid and Kinesiotape while Standing

Authors: Norazlin Mohamad, Saiful Adli Bukry, Zarina Zahari, Haidzir Manaf, Hanafi Sawalludin

Abstract:

Background: Deficit in neuromuscular recruitment and decrease force distribution were the common problems among ankle instability patients due to altered joint kinematics that lead to recurrent ankle injuries. Rigid Tape and KT Tape had widely been used as therapeutic and performance enhancement tools in ankle stability. However the difference effect between this two tapes is still controversial. Objective: To investigate the different effect between Rigid Tape and KT Tape on force distribution and muscle activation among ankle instability patients while standing. Study design: Crossover trial. Participants: 27 patients, age between 18 to 30 years old participated in this study. All the subjects were applied with KT Tape & Rigid Tape on their affected ankle with 3 days of interval for each intervention. The subjects were tested with their barefoot (without tape) first to act as a baseline before proceeding with KT Tape, and then with Rigid Tape. Result: There were no significant difference on force distribution at forefoot and back-foot for both tapes while standing. However the mean data shows that Rigid Tape has the highest force distribution at back-foot rather than forefoot when compared with KT Tape that had more force distribution at forefoot while standing. Regarding muscle activation (Peroneus Longus), results showed significant difference between Rigid Tape and KT Tape (p= 0.048). However, there was no significant difference on Tibialis Anterior muscle activation between both tapes while standing. Conclusion: The results indicated that Peroneus longus muscle was more active when applied Rigid Tape rather than KT Tape in ankle instability patients while standing.

Keywords: ankle instability, kinematic, muscle activation, force distribution, Rigid Tape, KT tape

Procedia PDF Downloads 417
10454 Constructing Evaluation Indicators for the Supply of Urban-Friendly Shelters from the Perspective of the Needs of the Elderly People in Taiwan

Authors: Chuan-Ming Tung, Tzu-Chiao Yuan

Abstract:

This research aims to construct the supply indicators and weights of shelter space from a perspective of the needs of the elderly by virtue of literature review, a systematical compilation of related regulations, and the use of the Analytical Hierarchy Process method, the questionnaires regarding the indicators filled out by 16 experts and scholars. The researcher then used 3 schools and 2 activity centers in Banqiao District, New Taipei City, as study cases to evaluate the ‘friendliness’ degree/level for the supply of shelters meeting the needs of elderly people. The supply evaluation indicators of friendly shelters meeting the needs of the elderly include "Administrative Operations and Service Needs" and "Residence-related and Living Needs"; under the "Administrative Operations and Service Needs" are "Management Operations and Information Provision", "Shelter Space Preparedness and Logistics Support", "Medical Care and Social Support", and "Shelters and Medical Environment", a total of 17 assessment items in four indicators, while under the "Residence-related and Living Needs" are "Dietary Needs", "Sleep Needs", "Hygiene and Sanitation Needs", "Accessibility and Convenience Needs ", etc., a total of 18 assessment items in four indicators. The results show that "Residence-related and Living Needs" is the most important item in the main levels of the supply indicators of the needs for friendly shelters to elderly people (weigh value 0.5504), followed by "Administrative Operations and Service Needs" (0.4496). The order of importance of the supply indicators of friendly shelters for the needs of elderly people is as follows: "Hygiene and Sanitation Needs" (0.1721), "Dietary Needs" (0.1340), "Medical Care and Social Support" (0.1300), "Sleep Needs" (0.1277), "Accessibility and Convenience Needs" (0.1166), "Basic Environment of Shelters" (0.1145), "Shelter Space Preparedness and Logistics Support" (0.1115) and "Management Operations and Information Provision" (0.0936). In addition, it can be noticed from the results of the case evaluation that the provision of refuges and shelters, mainly from schools and activity centers, is extremely inadequate for the needs of the elderly. In a set of comprehensive comparisons and contrasts, the evaluation indicators of refuges and shelters that need to be improved are "Medical Care and Social Support", "Hygiene and Sanitation Needs", "Sleep Needs", "Dietary Needs", and "Shelter Space Preparedness and Logistics Support".

Keywords: needs of the elderly people, urban shelters, evaluation indicators/indices., taiwan

Procedia PDF Downloads 80
10453 Definition of Quality Indicators for Damascus Rose Oil (Rosa damascena) Flora of Morocco

Authors: Serebryanaya Fatima, Essaih Hind

Abstract:

The Rosa damascena (Rosa damascena Mill.) is an interesting medicinal plant; it is famous in different countries and has medicinal use in many cultures. The main groups of pharmacological actions of rose oil are connected with anti-inflammatory, antifungal activity, also antioxidant and antibacterial, and antiparasitic properties. We have prepared the quality indicators analysis of the Damascus rose oil. An iodine number, acid number, and oil peroxide number were determined. The following indicators of the quality of rose oil have been studied. The determination was carried out according to the pharmacopoeic methods of analysis of essential oils, the definition of peroxide number (1,971%), iodine number (3,365%), and acid number (0,0526%).

Keywords: Rosa damascene, Rosa damascena Mill., iodine number, acid number, oil peroxide number

Procedia PDF Downloads 87
10452 Image Recognition Performance Benchmarking for Edge Computing Using Small Visual Processing Unit

Authors: Kasidis Chomrat, Nopasit Chakpitak, Anukul Tamprasirt, Annop Thananchana

Abstract:

Internet of Things devices or IoT and Edge Computing has become one of the biggest things happening in innovations and one of the most discussed of the potential to improve and disrupt traditional business and industry alike. With rises of new hang cliff challenges like COVID-19 pandemic that posed a danger to workforce and business process of the system. Along with drastically changing landscape in business that left ruined aftermath of global COVID-19 pandemic, looming with the threat of global energy crisis, global warming, more heating global politic that posed a threat to become new Cold War. How emerging technology like edge computing and usage of specialized design visual processing units will be great opportunities for business. The literature reviewed on how the internet of things and disruptive wave will affect business, which explains is how all these new events is an effect on the current business and how would the business need to be adapting to change in the market and world, and example test benchmarking for consumer marketed of newer devices like the internet of things devices equipped with new edge computing devices will be increase efficiency and reducing posing a risk from a current and looming crisis. Throughout the whole paper, we will explain the technologies that lead the present technologies and the current situation why these technologies will be innovations that change the traditional practice through brief introductions to the technologies such as cloud computing, edge computing, Internet of Things and how it will be leading into future.

Keywords: internet of things, edge computing, machine learning, pattern recognition, image classification

Procedia PDF Downloads 155
10451 Networking the Biggest Challenge in Hybrid Cloud Deployment

Authors: Aishwarya Shekhar, Devesh Kumar Srivastava

Abstract:

Cloud computing has emerged as a promising direction for cost efficient and reliable service delivery across data communication networks. The dynamic location of service facilities and the virtualization of hardware and software elements are stressing the communication networks and protocols, especially when data centres are interconnected through the internet. Although the computing aspects of cloud technologies have been largely investigated, lower attention has been devoted to the networking services without involving IT operating overhead. Cloud computing has enabled elastic and transparent access to infrastructure services without involving IT operating overhead. Virtualization has been a key enabler for cloud computing. While resource virtualization and service abstraction have been widely investigated, networking in cloud remains a difficult puzzle. Even though network has significant role in facilitating hybrid cloud scenarios, it hasn't received much attention in research community until recently. We propose Network as a Service (NaaS), which forms the basis of unifying public and private clouds. In this paper, we identify various challenges in adoption of hybrid cloud. We discuss the design and implementation of a cloud platform.

Keywords: cloud computing, networking, infrastructure, hybrid cloud, open stack, naas

Procedia PDF Downloads 427
10450 A Novel Approach to Design and Implement Context Aware Mobile Phone

Authors: G. S. Thyagaraju, U. P. Kulkarni

Abstract:

Context-aware computing refers to a general class of computing systems that can sense their physical environment, and adapt their behaviour accordingly. Context aware computing makes systems aware of situations of interest, enhances services to users, automates systems and personalizes applications. Context-aware services have been introduced into mobile devices, such as PDA and mobile phones. In this paper we are presenting a novel approaches used to realize the context aware mobile. The context aware mobile phone (CAMP) proposed in this paper senses the users situation automatically and provides user context required services. The proposed system is developed by using artificial intelligence techniques like Bayesian Network, fuzzy logic and rough sets theory based decision table. Bayesian Network to classify the incoming call (high priority call, low priority call and unknown calls), fuzzy linguistic variables and membership degrees to define the context situations, the decision table based rules for service recommendation. To exemplify and demonstrate the effectiveness of the proposed methods, the context aware mobile phone is tested for college campus scenario including different locations like library, class room, meeting room, administrative building and college canteen.

Keywords: context aware mobile, fuzzy logic, decision table, Bayesian probability

Procedia PDF Downloads 365
10449 Distributed Cost-Based Scheduling in Cloud Computing Environment

Authors: Rupali, Anil Kumar Jaiswal

Abstract:

Cloud computing can be defined as one of the prominent technologies that lets a user change, configure and access the services online. it can be said that this is a prototype of computing that helps in saving cost and time of a user practically the use of cloud computing can be found in various fields like education, health, banking etc.  Cloud computing is an internet dependent technology thus it is the major responsibility of Cloud Service Providers(CSPs) to care of data stored by user at data centers. Scheduling in cloud computing environment plays a vital role as to achieve maximum utilization and user satisfaction cloud providers need to schedule resources effectively.  Job scheduling for cloud computing is analyzed in the following work. To complete, recreate the task calculation, and conveyed scheduling methods CloudSim3.0.3 is utilized. This research work discusses the job scheduling for circulated processing condition also by exploring on this issue we find it works with minimum time and less cost. In this work two load balancing techniques have been employed: ‘Throttled stack adjustment policy’ and ‘Active VM load balancing policy’ with two brokerage services ‘Advanced Response Time’ and ‘Reconfigure Dynamically’ to evaluate the VM_Cost, DC_Cost, Response Time, and Data Processing Time. The proposed techniques are compared with Round Robin scheduling policy.

Keywords: physical machines, virtual machines, support for repetition, self-healing, highly scalable programming model

Procedia PDF Downloads 168
10448 Driven Force of Integrated Reporting in Thailand

Authors: Nuttha Kirdsinsap, Watchaneeporn Setthasakko

Abstract:

This paper aims to gain opinions and perspectives of Certified Public Accountants (CPA) in Thailand regarding the driven force of Integrated Reporting. It employs in-depth interviews with CPA from different big 4 audits firms in Thailand, including PWC, Ernst and Young, Deloitte, and KPMG. It is found that the driven force of Integrated Reporting made CPA in Thailand awaken to the big change that is coming in the future, and it is said to be another big learning and integrating period between certified public accountants and other professionals (for example, engineers, environmentalists and lawyers), which, certified public accountants in Thailand will have to push themselves so hard to catch up.

Keywords: integrated reporting, learning, knowledge, certified public accountants, Thailand

Procedia PDF Downloads 270
10447 AI/ML Atmospheric Parameters Retrieval Using the “Atmospheric Retrievals conditional Generative Adversarial Network (ARcGAN)”

Authors: Thomas Monahan, Nicolas Gorius, Thanh Nguyen

Abstract:

Exoplanet atmospheric parameters retrieval is a complex, computationally intensive, inverse modeling problem in which an exoplanet’s atmospheric composition is extracted from an observed spectrum. Traditional Bayesian sampling methods require extensive time and computation, involving algorithms that compare large numbers of known atmospheric models to the input spectral data. Runtimes are directly proportional to the number of parameters under consideration. These increased power and runtime requirements are difficult to accommodate in space missions where model size, speed, and power consumption are of particular importance. The use of traditional Bayesian sampling methods, therefore, compromise model complexity or sampling accuracy. The Atmospheric Retrievals conditional Generative Adversarial Network (ARcGAN) is a deep convolutional generative adversarial network that improves on the previous model’s speed and accuracy. We demonstrate the efficacy of artificial intelligence to quickly and reliably predict atmospheric parameters and present it as a viable alternative to slow and computationally heavy Bayesian methods. In addition to its broad applicability across instruments and planetary types, ARcGAN has been designed to function on low power application-specific integrated circuits. The application of edge computing to atmospheric retrievals allows for real or near-real-time quantification of atmospheric constituents at the instrument level. Additionally, edge computing provides both high-performance and power-efficient computing for AI applications, both of which are critical for space missions. With the edge computing chip implementation, ArcGAN serves as a strong basis for the development of a similar machine-learning algorithm to reduce the downlinked data volume from the Compact Ultraviolet to Visible Imaging Spectrometer (CUVIS) onboard the DAVINCI mission to Venus.

Keywords: deep learning, generative adversarial network, edge computing, atmospheric parameters retrieval

Procedia PDF Downloads 170
10446 Review of Cyber Security in Oil and Gas Industry with Cloud Computing Perspective: Taxonomy, Issues and Future Direction

Authors: Irfan Mohiuddin, Ahmad Al Mogren

Abstract:

In recent years, cloud computing has earned substantial attention in the Oil and Gas Industry and provides services in all the phases of the industry lifecycle. Oil and gas supply infrastructure, in particular, is more vulnerable to accidental, natural and intentional threats because of its widespread distribution. Numerous surveys have been conducted on cloud security and privacy. However, to the best of our knowledge, hardly any survey is carried out that reviews cyber security in all phases with a cloud computing perspective. Moreover, a distinctive classification is performed for all the cloud-based cyber security measures based on the cloud component in use. The classification approach will enable researchers to identify the required technique used to enhance the security in specific cloud components. Also, the limitation of each component will allow the researchers to design optimal algorithms. Lastly, future directions are given to point out the imminent challenges that can pave the way for researchers to further enhance the resilience to cyber security threats in the oil and gas industry.

Keywords: cyber security, cloud computing, safety and security, oil and gas industry, security threats, oil and gas pipelines

Procedia PDF Downloads 143
10445 Model and Algorithm for Dynamic Wireless Electric Vehicle Charging Network Design

Authors: Trung Hieu Tran, Jesse O'Hanley, Russell Fowler

Abstract:

When in-wheel wireless charging technology for electric vehicles becomes mature, a need for such integrated charging stations network development is essential. In this paper, we thus investigate the optimisation problem of in-wheel wireless electric vehicle charging network design. A mixed-integer linear programming model is formulated to solve into optimality the problem. In addition, a meta-heuristic algorithm is proposed for efficiently solving large-sized instances within a reasonable computation time. A parallel computing strategy is integrated into the algorithm to speed up its computation time. Experimental results carried out on the benchmark instances show that our model and algorithm can find the optimal solutions and their potential for practical applications.

Keywords: electric vehicle, wireless charging station, mathematical programming, meta-heuristic algorithm, parallel computing

Procedia PDF Downloads 79
10444 The Response of Optical Properties to Temperature in Three-Layer Micro Device Under Influence of Casimir Force

Authors: Motahare Aali, Fatemeh Tajik

Abstract:

Here, we investigate the sensitivity the Casimir force and consequently dynamical actuation of a three-layer microswitch to some ambient conditions. In fact, we have considered the effect of optical properties on the stable operation of the microswitch for both good (e.g. metals) and poor conductors via a three layer Casimir oscillator. Indeed, gold (Au) has been chosen as a good conductor which is widely used for Casimir force measurements, and highly doped conductive silicon carbide (SiC) has been considered as a poor conductor which is a promising material for device operating under harsh environments. Also, the intervening stratum is considered ethanol or water. It is also supposed that the microswitches are frictionless and autonomous. Using reduction factor diagrams and bifurcation curves, it has been shown how performance of the microswitches is sensitive to temperature and intervening stratum, moreover it is investigated how the conductivity of the components can affect this sensitivity.

Keywords: Casimir force, optical properties, Lifshitz theory, dielectric function

Procedia PDF Downloads 95
10443 A Problem on Homogeneous Isotropic Microstretch Thermoelastic Half Space with Mass Diffusion Medium under Different Theories

Authors: Devinder Singh, Rajneesh Kumar, Arvind Kumar

Abstract:

The present investigation deals with generalized model of the equations for a homogeneous isotropic microstretch thermoelastic half space with mass diffusion medium. Theories of generalized thermoelasticity Lord-Shulman (LS) Green-Lindsay (GL) and Coupled Theory (CT) theories are applied to investigate the problem. The stresses in the considered medium have been studied due to normal force and tangential force. The normal mode analysis technique is used to calculate the normal stress, shear stress, couple stresses and microstress. A numerical computation has been performed on the resulting quantity. The computed numerical results are shown graphically.

Keywords: microstretch, thermoelastic, normal mode analysis, normal and tangential force, microstress force

Procedia PDF Downloads 535
10442 The Response of Adaptive Mechanism of Fluorescent Proteins from Coral Species and Target Cell Properties on Signalling Capacity as Biosensor

Authors: Elif Tugce Aksun Tumerkan

Abstract:

Fluorescent proteins (FPs) have become very popular since green fluorescent protein discovered from crystal jellyfish. It is known that Anthozoa species have a wide range of chromophore organisms, and the initial crystal structure for non-fluorescent chromophores obtained from the reef-building coral has been determined. There are also differently coloured pigments in non-bioluminescent Anthozoa zooxanthellate and azooxanthellate which are frequently members of the GFP-like protein family. The development of fluorescent proteins (FPs) and their applications is an outstanding example of basic science leading to practical biotechnological and medical applications. Fluorescent proteins have several applications in science and are used as important indicators in molecular biology and cell-based research. With rising interest in cell biology, FPs have used as biosensor indicators and probes in pharmacology and cell biology. Using fluorescent proteins in genetically encoded metabolite sensors has many advantages than chemical probes for metabolites such as easily introduced into any cell or organism in any sub-cellular localization and giving chance to fixing to fluoresce of different colours or characteristics. There are different factors effects to signalling mechanism when they used as a biosensor. While there are wide ranges of research have been done on the significance and applications of fluorescent proteins, the cell signalling response of FPs and target cell are less well understood. In this study, it was aimed to clarify the response of adaptive mechanisms of coral species such as pH, temperature and symbiotic relationship and target cells properties on the signalling capacity. Corals are a rich natural source of fluorescent proteins that change with environmental conditions such as light, heat stress and injury. Adaptation mechanism of coral species to these types of environmental variations is important factor due to FPs properties have affected by this mechanism. Since fluorescent proteins obtained from nature, their own ecological property like the symbiotic relationship is observed very commonly in coral species and living conditions have the impact on FPs efficiency. Target cell properties also have an effect on signalling and visualization. The dynamicity of detector that used for reading fluorescence and the level of background fluorescence are key parameters for the quality of the fluorescent signal. Among the factors, it can be concluded that coral species adaptive characteristics have the strongest effect on FPs signalling capacity.

Keywords: biosensor, cell biology, environmental conditions, fluorescent protein, sea anemone

Procedia PDF Downloads 169
10441 Towards a Secure Storage in Cloud Computing

Authors: Mohamed Elkholy, Ahmed Elfatatry

Abstract:

Cloud computing has emerged as a flexible computing paradigm that reshaped the Information Technology map. However, cloud computing brought about a number of security challenges as a result of the physical distribution of computational resources and the limited control that users have over the physical storage. This situation raises many security challenges for data integrity and confidentiality as well as authentication and access control. This work proposes a security mechanism for data integrity that allows a data owner to be aware of any modification that takes place to his data. The data integrity mechanism is integrated with an extended Kerberos authentication that ensures authorized access control. The proposed mechanism protects data confidentiality even if data are stored on an untrusted storage. The proposed mechanism has been evaluated against different types of attacks and proved its efficiency to protect cloud data storage from different malicious attacks.

Keywords: access control, data integrity, data confidentiality, Kerberos authentication, cloud security

Procedia PDF Downloads 335
10440 Communication of Sensors in Clustering for Wireless Sensor Networks

Authors: Kashish Sareen, Jatinder Singh Bal

Abstract:

The use of wireless sensor networks (WSNs) has grown vastly in the last era, pointing out the crucial need for scalable and energy-efficient routing and data gathering and aggregation protocols in corresponding large-scale environments. Wireless Sensor Networks have now recently emerged as a most important computing platform and continue to grow in diverse areas to provide new opportunities for networking and services. However, the energy constrained and limited computing resources of the sensor nodes present major challenges in gathering data. The sensors collect data about their surrounding and forward it to a command centre through a base station. The past few years have witnessed increased interest in the potential use of wireless sensor networks (WSNs) as they are very useful in target detecting and other applications. However, hierarchical clustering protocols have maximum been used in to overall system lifetime, scalability and energy efficiency. In this paper, the state of the art in corresponding hierarchical clustering approaches for large-scale WSN environments is shown.

Keywords: clustering, DLCC, MLCC, wireless sensor networks

Procedia PDF Downloads 481
10439 Evaluation the Influence of Trunk Bracing in Joint Contact Forces in Subjects with Scoliosis

Authors: Azadeh Jafari, Mohammad Taghi Karimi, Azadeh Nadi

Abstract:

Background: Scoliosis is the lateral curvature of the spine which may influence the abilities of the subjects during standing and walking. Most of the scoliotic subjects use orthosis to reduce the curve and to decrease the risk of curve progression. There was lack of information regarding the effects of orthosis on kinematic and joint contact force. Therefore, this research was done to highlight the effects of orthosis on the aforementioned parameters. Method: 5 scoliotic subjects were recruited in this study, with single curve less than 40 (females with age 13.2 ± 1.7). They were asked to walk with and without orthosis. The kinematic of the joints, force applied on the legs, moments transmitted through the joints and joint contact forces were evaluated in this study. Moreover, the lengths of muscles were determined by use of computer muscle control approach in OpenSim. Results: There was a significant difference between the second peak of vertical ground reaction force while walking with and without orthosis (p-value < 0.05). There was no difference between spatiotemporal gait parameters while walking with and without orthosis (P-value > 0.05). The mean values of joint contact forces (vertical component) increased by the use of orthosis, but the difference was not significant (p-value > 0.05). Conclusion: Although the kinematic of most of the body joints was not influenced by the use of orthosis, the joint contact force may be increased by orthosis. The increase in joint contact force may be due to the performance of orthosis which restricts the motions of pelvic and increases compensatory mechanism used by the subjects to decrease the side effects of the orthosis.

Keywords: scoliosis, joint contact force, kinetic, kinematic

Procedia PDF Downloads 210
10438 Prediction of Pounding between Two SDOF Systems by Using Link Element Based On Mathematic Relations and Suggestion of New Equation for Impact Damping Ratio

Authors: Seyed M. Khatami, H. Naderpour, R. Vahdani, R. C. Barros

Abstract:

Many previous studies have been carried out to calculate the impact force and the dissipated energy between two neighboring buildings during seismic excitation, when they collide with each other. Numerical studies are an important part of impact, which several researchers have tried to simulate the impact by using different formulas. Estimation of the impact force and the dissipated energy depends significantly on some parameters of impact. Mass of bodies, stiffness of spring, coefficient of restitution, damping ratio of dashpot and impact velocity are some known and unknown parameters to simulate the impact and measure dissipated energy during collision. Collision is usually shown by force-displacement hysteresis curve. The enclosed area of the hysteresis loop explains the dissipated energy during impact. In this paper, the effect of using different types of impact models is investigated in order to calculate the impact force. To increase the accuracy of impact model and to optimize the results of simulations, a new damping equation is assumed and is validated to get the best results of impact force and dissipated energy, which can show the accuracy of suggested equation of motion in comparison with other formulas. This relation is called "n-m". Based on mathematical relation, an initial value is selected for the mentioned coefficients and kinetic energy loss is calculated. After each simulation, kinetic energy loss and energy dissipation are compared with each other. If they are equal, selected parameters are true and, if not, the constant of parameters are modified and a new analysis is performed. Finally, two unknown parameters are suggested to estimate the impact force and calculate the dissipated energy.

Keywords: impact force, dissipated energy, kinetic energy loss, damping relation

Procedia PDF Downloads 552
10437 Force Measurement for E-Cadherin-Mediated Intercellular Adhesion Probed by Protein Micropattern and Traction Force Microscopy

Authors: Chieh-Chung Tsou, Chun-Min Lo, Yeh-Shiu Chu

Abstract:

Cell’s mechanical forces provide important physical cues in regulation of proper cellular functions, such as cell differentiation, proliferation and migration. It is believed that adhesive forces generated by cell-cell interaction are able to transmit to the interior of cell through filamentous cortical cytoskeleton. Prominent among other membrane receptors, Cadherins are prototypical adhesive molecules able to generate remarkable forces to regulate intercellular adhesion. However, the mechanistic steps of mechano-transduction in Cadherin-mediated adhesion remain very controversial. We are interested in understanding how Cadherin protein complexes enable force generation and transmission at cell-cell contact in the initial stage of intercellular adhesion. For providing a better control of time, space, and substrate stiffness, in this study, a combination of protein micropattern, micropipette manipulation, and traction force microscopy is used. Pair micropattern with different forms confines cell spreading area and the gaps in pairs varied from 2 to 8 microns are applied for monitoring the forces that cell pairs generated, measured by traction force microscopy. Moreover, cell clones obtained from epithelial cells undergone genome editing are used to score the importance for known components of Cadherin complexes in force generation. We believe that our results from this combinatory mechanobiological method will provide deep insights on understanding the biophysical principle governing mechano- transduction of Cadherin-mediated intercellular adhesion.

Keywords: cadherin, intercellular adhesion, protein micropattern, traction force microscopy

Procedia PDF Downloads 251
10436 Design and Simulation on Technology Capabilities in Developing countries, Design and Engineering Approach

Authors: S. Abedi, M. R. Soroush, M. Mousakhani

Abstract:

According to studies in the field of technology capabilities we identify the most important indicators to evaluate the level of "Design and Engineering" capabilities. Since the technology development correlates with the level of technology capabilities trying to promote its key importance. In this research by using FDM, the right combination of D&E capabilities indicators according to the auto industry is presented. Finally, with modeling evaluation of D&E capabilities by using FIS and check its reliability, five levels were determined to evaluate the D&E capabilities. We have analyzed 80 companies in auto industry and determined D&E capabilities of each level. Field of company activity indicators has been divided into four categories, Suspension group, Electrical group, Engine groups and trims group. The results show that half of the surveyed companies had D&E capabilities in Level 1 and 2 or in other words very low and low level of D&E.

Keywords: developing countries, D&E capabilities, technology capabilities, auto industry

Procedia PDF Downloads 535
10435 Optimization of Topology-Aware Job Allocation on a High-Performance Computing Cluster by Neural Simulated Annealing

Authors: Zekang Lan, Yan Xu, Yingkun Huang, Dian Huang, Shengzhong Feng

Abstract:

Jobs on high-performance computing (HPC) clusters can suffer significant performance degradation due to inter-job network interference. Topology-aware job allocation problem (TJAP) is such a problem that decides how to dedicate nodes to specific applications to mitigate inter-job network interference. In this paper, we study the window-based TJAP on a fat-tree network aiming at minimizing the cost of communication hop, a defined inter-job interference metric. The window-based approach for scheduling repeats periodically, taking the jobs in the queue and solving an assignment problem that maps jobs to the available nodes. Two special allocation strategies are considered, i.e., static continuity assignment strategy (SCAS) and dynamic continuity assignment strategy (DCAS). For the SCAS, a 0-1 integer programming is developed. For the DCAS, an approach called neural simulated algorithm (NSA), which is an extension to simulated algorithm (SA) that learns a repair operator and employs them in a guided heuristic search, is proposed. The efficacy of NSA is demonstrated with a computational study against SA and SCIP. The results of numerical experiments indicate that both the model and algorithm proposed in this paper are effective.

Keywords: high-performance computing, job allocation, neural simulated annealing, topology-aware

Procedia PDF Downloads 116
10434 Interoperable Platform for Internet of Things at Home Applications

Authors: Fabiano Amorim Vaz, Camila Gonzaga de Araujo

Abstract:

With the growing number of personal devices such as smartphones, tablets, smart watches, among others, in addition to recent devices designed for IoT, it is observed that residential environment has potential to generate important information about our daily lives. Therefore, this work is focused on showing and evaluating a system that integrates all these technologies considering the context of a smart house. To achieve this, we define an architecture capable of supporting the amount of data generated and consumed at a residence and, mainly, the variety of this data presents. We organize it in a particular cloud containing information about robots, recreational vehicles, weather, in addition to data from the house, such as lighting, energy, security, among others. The proposed architecture can be extrapolated to various scenarios and applications. Through the core of this work, we can define new functionality for residences integrating them with more resources.

Keywords: cloud computing, IoT, robotics, smart house

Procedia PDF Downloads 381
10433 Enabling UDP Multicast in Cloud IaaS: An Enterprise Use Case

Authors: Patrick J. Kerpan, Ryan C. Koop, Margaret M. Walker, Chris P. Swan

Abstract:

The User Datagram Protocol (UDP) multicast is a vital part of data center networking that is being left out of major cloud computing providers' network infrastructure. Enterprise users rely on multicast, and particularly UDP multicast to create and connect vital business operations. For example, UPD makes a variety of business functions possible from simultaneous content media updates, High-Performance Computing (HPC) grids, and video call routing for massive open online courses (MOOCs). Essentially, UDP multicast's technological slight is causing a huge effect on whether companies choose to use (or not to use) public cloud infrastructure as a service (IaaS). Allowing the ‘chatty’ UDP multicast protocol inside a cloud network could have a serious impact on the performance of the cloud as a whole. Cloud IaaS providers solve the issue by disallowing all UDP multicast. But what about enterprise use cases for multicast applications in organizations that want to move to the cloud? To re-allow multicast traffic, enterprises can build a layer 3 - 7 network over the top of a data center, private cloud, or public cloud. An overlay network simply creates a private, sealed network on top of the existing network. Overlays give complete control of the network back to enterprise cloud users the freedom to manage their network beyond the control of the cloud provider’s firewall conditions. The same logic applies if for users who wish to use IPsec or BGP network protocols inside or connected into an overlay network in cloud IaaS.

Keywords: cloud computing, protocols, UDP multicast, virtualization

Procedia PDF Downloads 590
10432 Corporate Foundation Giving and Female Labour Force Participation in Ghana

Authors: Shaibu Salifu, Ofori Boachie

Abstract:

Philanthropy is part and parcel of African identity; it is intrinsically embedded in the life of Africans where at any point in time people contribute to philanthropy through giving or receiving. Even though, research on corporate philanthropy has gained attention in the academic space of Ghana, little have been done on the effects of corporate foundation giving on female labour force participation in Ghana. We investigate the effects of corporate foundations giving on female labour force participation in Ghana. We applied convenient and purposive sampling techniques to collect qualitative data from thirty (30) women in Ghana through interviews and open-ended questionnaires. We used Nvivo to carryout analysis on the data and our results indicate that corporate foundation giving has significant effect on female labour force participation in Ghana. In addition, contrary to the feminization U-Shape Hypothesis, evidence suggest that, to a larger extent marriage and fertility (birth) of women positively contribute to the female labour force participation in Ghana. Nevertheless, the study was limited by the number of women who were interviewed, time constraints of women for elaborate discussions on the issues (constructs) of the study and fear of victimization by authorities on most of their responses to the interviews. The findings have implications for all stakeholders of philanthropy: academia, governments, civil society organizations, corporate foundations, women of Ghana and other relevant bodies.

Keywords: corporate philanthropy, corporate foundations, corporate foundation giving, female labour force participation, women, Ghana

Procedia PDF Downloads 82