Search results for: user search behaviors
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5503

Search results for: user search behaviors

1963 Anti Staphylococcus aureus and Methicillin Resistant Staphylococcus aureus Action of Thermophilic Fungi Acrophialophora levis IBSD19 and Determination of Its Mode of Action Using Electron Microscopy

Authors: Shivankar Agrawal, Indira Sarangthem

Abstract:

Staphylococcus aureus and Methicillin-resistant Staphylococcus aureus (MRSA) remains one of the major causes of healthcare-associated and community-onset infections worldwide. Hence the search for non-toxic natural compounds having antibacterial activity has intensified for future drug development. The exploration of less studied niches of Earth can highly increase the possibility to discover novel bioactive compounds. Therefore, in this study, the cultivable fraction of fungi from the sediments of natural hot springs has been studied to mine potential fungal candidates with antibacterial activity against the human pathogen Staphylococcus aureus and Methicillin-resistant Staphylococcus aureus. We isolated diverse strains of thermophilic fungi from a collection of samples from sediment. Following a standard method, we isolated a promising thermophilic fungus strain IBSD19, identified as Acrophialophora levis, possessing the potential to produce an anti-Staphylococcus aureus agent. The growth conditions were optimized and scaled to fermentation, and its produced extract was subjected to chemical extraction. The ethyl acetate fraction was found to display significant activity against Staphylococcus aureus and MRSA with a minimum inhibitory concentration (MIC) of 0.5 mg/ml and 4 mg/ml, respectively. The cell membrane integrity assay and SEM suggested that the fungal metabolites cause bacteria clustering and further lysis of the cell.

Keywords: antibacterial activity, antioxidant, fungi, Staphylococcus aureus, MRSA, thermophiles

Procedia PDF Downloads 139
1962 Design and Evaluation of Oven Type Furnace Using Earth Materials for Roasting Foods

Authors: Jeffrey Cacho, Sherwin Reyes

Abstract:

The research targeted enhancing energy utilization and reducing waste in roasting processes, particularly in Camarines Norte, where Bounty Agro Ventures Incorporated dominates through brands such as Chooks-to-Go, Uling Roaster, and Reyal. Competitors like Andok’s and Baliwag Lechon Manok also share the market. A staggering 90% of these businesses use traditional glass-type roasting furnaces fueled by wood charcoal, leading to significant energy loss and inefficiency due to suboptimal heat conservation. Only a mere 10% employ electric ovens. Many available furnaces, typically constructed from industrial materials through welding and other metal joining techniques, are not energy-efficient. Cost-prohibitive commercial options compel some micro-enterprises to fabricate their furnaces. The study proposed developing an eco-friendly, cost-effective roasting furnace with excellent heat retention. The distinct design aimed to reduce cooks' heat exposure and overall fuel consumption. The furnace features an angle bar frame, a combustion chute for fuel burning, a heat-retaining clay-walled chamber, and a top cover, all contributing to improved energy savings and user safety.

Keywords: biomass roasting furnace, heat storage, combustion chute, start-up roasting business

Procedia PDF Downloads 58
1961 Predicting Destination Station Based on Public Transit Passenger Profiling

Authors: Xuyang Song, Jun Yin

Abstract:

The smart card has been an extremely universal tool in public transit. It collects a large amount of data on buses, urban railway transit, and ferries and provides possibilities for passenger profiling. This paper combines offline analysis of passenger profiling and real-time prediction to propose a method that can accurately predict the destination station in real-time when passengers tag on. Firstly, this article constructs a static database of user travel characteristics after identifying passenger travel patterns based on the Density-Based Spatial Clustering of Applications with Noise (DBSCAN). The dual travel passenger habits are identified: OD travel habits and D station travel habits. Then a rapid real-time prediction algorithm based on Transit Passenger Profiling is proposed, which can predict the destination of in-board passengers. This article combines offline learning with online prediction, providing a technical foundation for real-time passenger flow prediction, monitoring and simulation, and short-term passenger behavior and demand prediction. This technology facilitates the efficient and real-time acquisition of passengers' travel destinations and demand. The last, an actual case was simulated and demonstrated feasibility and efficiency.

Keywords: travel behavior, destination prediction, public transit, passenger profiling

Procedia PDF Downloads 24
1960 Factory Virtual Environment Development for Augmented and Virtual Reality

Authors: Michal Gregor, Jiri Polcar, Petr Horejsi, Michal Simon

Abstract:

Machine visualization is an area of interest with fast and progressive development. We present a method of machine visualization which will be applicable in real industrial conditions according to current needs and demands. Real factory data were obtained in a newly built research plant. Methods described in this paper were validated on a case study. Input data were processed and the virtual environment was created. The environment contains information about dimensions, structure, disposition, and function. Hardware was enhanced by modular machines, prototypes, and accessories. We added new functionalities and machines into the virtual environment. The user is able to interact with objects such as testing and cutting machines, he/she can operate and move them. Proposed design consists of an environment with two degrees of freedom of movement. Users are in touch with items in the virtual world which are embedded into the real surroundings. This paper describes the development of the virtual environment. We compared and tested various options of factory layout virtualization and visualization. We analyzed possibilities of using a 3D scanner in the layout obtaining process and we also analyzed various virtual reality hardware visualization methods such as Stereoscopic (CAVE) projection, Head Mounted Display (HMD), and augmented reality (AR) projection provided by see-through glasses.

Keywords: augmented reality, spatial scanner, virtual environment, virtual reality

Procedia PDF Downloads 411
1959 Applications of Internet of Things (IoTs) for Information Resources and Services: Survey of Academic Librarians

Authors: Sultan Aldaihani, Eiman Al-Fadhli

Abstract:

Internet of Things (IoTs) expected to change the future of academic libraries operations. It enables academic libraries to be smart libraries through, for example, the connection of the physical objects with the Internet. The implementation of IoTs will improve library resources and services. Therefore, this research aims to investigate the applications of Internet of Things (IoTs) for information resources and services. Understanding perceptions of academic librarians toward IoTs before adopting of such applications will assist decision-makers in academic libraries in their strategic planning. An online questionnaire was administered to academic librarians at Kuwait University. The findings of this study showed that academic librarians have awareness for the IoTs. They have strongly believed that the IoTs contributes to the development of information resources, services, and understanding of the user's information behavior. Identifying new applications of the IoTs in libraries was the highest possible reason for future adoption. Academic librarians indicated that lack of privacy and data penetration were the greatest problem in their future adoption of IoTs. Academic libraries need to implement the IoTs for enhancing their information resources and services. One important step in the success of future adoption is to conduct awareness and training programs for academic librarians. They also need to maintain higher security and privacy measurements in their implementation for the IoTs. This study will assist academic libraries in accommodating this technology.

Keywords: academic libraries, internet of things, information resources, information services

Procedia PDF Downloads 158
1958 Comparative Study on Manet Using Soft Computing Techniques

Authors: Amarjit Singh, Tripatdeep Singh Dua, Vikas Attri

Abstract:

Mobile Ad-hoc Network is a combination of several nodes that create dynamically a specific network without using any base infrastructure. In this study all the mobile nodes can depended upon each other to send any data. Mobile host can pick up data and forwarding to their destination path. Basically MANET depend upon their Quality of Service which is highly constraints to the user. To give better services we need to improve the QOS. In these days MANET QOS requirement to use soft computing techniques. These techniques depend upon their specific requirement and which exists using MANET concepts. Using a soft computing techniques various protocol and algorithms may be considered. In this paper, we provide comparative study review of existing work done in MANET using various kind of soft computing techniques. Our review research is based on their specific protocol or algorithm which provide concern solution of QOS need. We discuss about various protocol through which routing in MANET. In Second section we clear the concepts of Soft Computing and their types. In third section we review the MANET using different kind of soft computing techniques work done before. In forth section we need to understand the concept of QoS requirement which exists in MANET and we done comparative study on different protocol used before and last we conclude the purpose of using MANET with soft computing techniques metrics.

Keywords: mobile ad-hoc network, fuzzy improved genetic approach, neural network, routing protocol, wireless mesh network

Procedia PDF Downloads 355
1957 In vitro Comparison Study of Biologically Synthesized Cupper-Disulfiram Nanoparticles with Its Free Corresponding Complex as Therapeutic Approach for Breast and Liver Cancer

Authors: Marwa M. Abu-Serie, Marwa M. Eltarahony

Abstract:

The search for reliable, effective, and safe nanoparticles (NPs) as a treatment for cancer is a pressing priority. In this study, Cu-NPs were fabricated by Streptomyces cyaneofuscatus through simultaneous bioreduction strategy of copper nitrate salt. The as-prepared Cu-NPs subjected to structural analysis; energy-dispersive X-ray spectroscopy, elemental mapping, X-ray diffraction, transmission electron microscopy, and ζ-potential. These biological synthesized Cu-NPs were mixed with disulfiram (DS), forming a nanocomplex of Cu-DS with a size of ~135 nm. The prepared nanocomplex (nanoCu-DS) exhibited higher anticancer activity than that of free complex of DS-Cu, Cu-NPs, and DS alone. This was illustrated by the lowest IC50 of nanoCu-DS (< 4 µM) against human breast and liver cancer cell lines comparing with DS-Cu, Cu-NPs, and DS (~8, 22.98-33.51 and 11.95-14.86, respectively). Moreover, flow cytometric analysis confirmed that higher apoptosis percentage range of nanoCu-DS-treated in MDA-MB 231, MCF-7, Huh-7, and HepG-2 cells (51.24-65.28%) than free complex of Cu-DS ( < 4.5%). Regarding inhibition potency of liver and breast cancer cell migration, no significant difference was recorded between free and nanocomplex. Furthermore, nanoCu-DS suppressed gene expression of β-catenine, Akt, and NF-κB and upregulated p53 expression (> 3, >15, > 5 and ≥ 3 folds, respectively) more efficiently than free complex (all ~ 1 fold) in MDA-MB 231 and Huh-7 cells. Our finding proved this prepared nano complex has a powerful anticancer activity relative to free complex, thereby offering a promising cancer treatment.

Keywords: biologically prepared Cu-NPs, breast cancer cell lines, liver cancer cell lines, nanoCu- disulfiram

Procedia PDF Downloads 191
1956 Quantitative Method of Measurement for the Rights and Obligations of Contracting Parties in Standard Forms of Contract in Malaysia: A Case Study

Authors: Sim Nee Ting, Lan Eng Ng

Abstract:

Standard forms of contract in Malaysia are pre-written, printed contractual documents drafted by recognised authoritative bodies in order to describe the rights and obligations of the contracting parties in all construction projects in Malaysia. Studies and form revisions are usually conducted in a relatively random and qualitative manner, but the search of contractual documents idealization remains. It is not clear how these qualitative findings could be helpful for contractual documents improvements and re-drafting. This study aims to quantitatively and systematically analyse and evaluate the rights and obligations of the contracting parties as stated in the standard forms of contract. The Institution of Engineers Malaysia (IEM) published a new standard form of contract in 2012 with a total of 63 classes but the improvements and changes in the newly revised form that are yet to be analysed. IEM form will be used as the case study for this study. Every clause in this said form were interpreted and analysed according to the involved parties including contractor, engineer and employer. Modified from Matrix Method and Likert Scale, the result analysis were conducted based on a scale from 0 to 1 with five ratings namely “Very Unbalance”, “Unbalance”, “Balance”, “Good Balance” and “Very Good Balance”. It is hoped that quantitative method of form study can be used for future form revisions and any new forms drafting so to reduce on any subjectivity in standard forms of contract studies.

Keywords: contracting parties, Malaysia, obligations, quantitative measurement, rights, standard form of contract

Procedia PDF Downloads 268
1955 Intrusion Detection in Computer Networks Using a Hybrid Model of Firefly and Differential Evolution Algorithms

Authors: Mohammad Besharatloo

Abstract:

Intrusion detection is an important research topic in network security because of increasing growth in the use of computer network services. Intrusion detection is done with the aim of detecting the unauthorized use or abuse in the networks and systems by the intruders. Therefore, the intrusion detection system is an efficient tool to control the user's access through some predefined regulations. Since, the data used in intrusion detection system has high dimension, a proper representation is required to show the basis structure of this data. Therefore, it is necessary to eliminate the redundant features to create the best representation subset. In the proposed method, a hybrid model of differential evolution and firefly algorithms was employed to choose the best subset of properties. In addition, decision tree and support vector machine (SVM) are adopted to determine the quality of the selected properties. In the first, the sorted population is divided into two sub-populations. These optimization algorithms were implemented on these sub-populations, respectively. Then, these sub-populations are merged to create next repetition population. The performance evaluation of the proposed method is done based on KDD Cup99. The simulation results show that the proposed method has better performance than the other methods in this context.

Keywords: intrusion detection system, differential evolution, firefly algorithm, support vector machine, decision tree

Procedia PDF Downloads 97
1954 Mental Health in Young People Living Poverty in Southeastern Mexico

Authors: Teresita Castillo, Concepción Campo, Carlos Carrillo

Abstract:

Attention, comprehension and solution of poverty can be worked considering a socioeconomic approach; but it also can be attended from a multidimensional perspective that allows considering other dimensions including psychological variables manifested in behaviors, thoughts and feelings concerning this phenomenon. Considering the importance of research regarding psychology and poverty, this paper presents results about psychosocial impacts of poverty on young people related to mental health issues and its relation to fatalism. These results are part of a bigger transcultural study done in collaboration with the Federal University of Ceará, in Brazil. Participants were 101 young men and women, between 12 and 29 years old, living in two emarginated suburbs in Mérida, Mexico, located in the southeastern zone of the country. Participants responded the Self Report Questionnaire (SRQ- 20), with 20 items dichotomous presence/absence that assess anxious and depressive issues and the Fatalism Scale, with 30 items Likert five-point spread over five factors. Results show that one third of participants mentioned to get easily frightened, feeling nervous, tense or worried as well as unhappy, difficulty on making decisions, and troubles in thinking clearly. About 20% mentioned to have headaches, to sleep badly, to cry more than usual and to feel tired all the time. Regarding Fatalism, results show there is a greater internal allocation and lower external attribution in young participants, but they have some symptoms regarding poor mental health. Discussion is in terms of possible explanations about the results and emphasizes the importance of holistic approaches for a better understanding of the psychosocial impacts of poverty on young people and strengthening the resilience to increase positive mental health in emarginated contexts, where Community Psychology could have an important duty in community health promotion.

Keywords: fatalism, mental health, poverty, youth

Procedia PDF Downloads 347
1953 Intelligent Building as a Pragmatic Approach towards Achieving a Sustainable Environment

Authors: Zahra Hamedani

Abstract:

Many wonderful technological developments in recent years has opened up the possibility of using intelligent buildings for a number of important applications, ranging from minimizing resource usage as well as increasing building efficiency to maximizing comfort, adaption to inhabitants and responsiveness to environmental changes. The concept of an intelligent building refers to the highly embedded, interactive environment within which by exploiting the use of artificial intelligence provides the ability to know its configuration, anticipate the optimum dynamic response to prevailing environmental stimuli, and actuate the appropriate physical reaction to provide comfort and efficiency. This paper contains a general identification of the intelligence paradigm and its impacts on the architecture arena, that with examining the performance of artificial intelligence, a mechanism to analyze and finally for decision-making to control the environment will be described. This mechanism would be a hierarchy of the rational agents which includes decision-making, information, communication and physical layers. This multi-agent system relies upon machine learning techniques for automated discovery, prediction and decision-making. Then, the application of this mechanism regarding adaptation and responsiveness of intelligent building will be provided in two scales of environmental and user. Finally, we review the identifications of sustainability and evaluate the potentials of intelligent building systems in the creation of sustainable architecture and environment.

Keywords: artificial intelligence, intelligent building, responsiveness, adaption, sustainability

Procedia PDF Downloads 414
1952 Detecting Venomous Files in IDS Using an Approach Based on Data Mining Algorithm

Authors: Sukhleen Kaur

Abstract:

In security groundwork, Intrusion Detection System (IDS) has become an important component. The IDS has received increasing attention in recent years. IDS is one of the effective way to detect different kinds of attacks and malicious codes in a network and help us to secure the network. Data mining techniques can be implemented to IDS, which analyses the large amount of data and gives better results. Data mining can contribute to improving intrusion detection by adding a level of focus to anomaly detection. So far the study has been carried out on finding the attacks but this paper detects the malicious files. Some intruders do not attack directly, but they hide some harmful code inside the files or may corrupt those file and attack the system. These files are detected according to some defined parameters which will form two lists of files as normal files and harmful files. After that data mining will be performed. In this paper a hybrid classifier has been used via Naive Bayes and Ripper classification methods. The results show how the uploaded file in the database will be tested against the parameters and then it is characterised as either normal or harmful file and after that the mining is performed. Moreover, when a user tries to mine on harmful file it will generate an exception that mining cannot be made on corrupted or harmful files.

Keywords: data mining, association, classification, clustering, decision tree, intrusion detection system, misuse detection, anomaly detection, naive Bayes, ripper

Procedia PDF Downloads 416
1951 Scrum Challenges and Mitigation Practices in Global Software Development of an Integrated Learning Environment: Case Study of Science, Technology, Innovation, Mathematics, Engineering for the Young

Authors: Evgeniia Surkova, Manal Assaad, Hleb Makeyeu, Juho Makio

Abstract:

The main objective of STIMEY (Science, Technology, Innovation, Mathematics, Engineering for the Young) project is the delivery of a hybrid learning environment that combines multi-level components such as social media concepts, robotic artefacts, and radio, among others. It is based on a well-researched pedagogical framework to attract European youths to STEM (science, technology, engineering, and mathematics) education and careers. To develop and integrate these various components, STIMEY is executed in iterative research cycles leading to progressive improvements. Scrum was the development methodology of choice in the project, as studies indicated its benefits as an agile methodology in global software development, especially of e-learning and integrated learning projects. This paper describes the project partners’ experience with the Scrum framework, discussing the challenges faced in its implementation and the mitigation practices employed. The authors conclude with exploring user experience tools and principles for future research, as a novel direction in supporting the Scrum development team.

Keywords: e-learning, global software development, scrum, STEM education

Procedia PDF Downloads 181
1950 Navigating Shadows: Examining a Moderation Mediation model of Punitive supervision, Innovative Work Behavior and Employee’s Knowledge Hiding

Authors: Sadia Anwara, Weng Qingxionga, Jahan Zeb Aslamb

Abstract:

Drawing on the Conservation of Resources Theory and Theory of Displaced Aggression, current research study aims to explore the impact of an emerging destructive leadership style i.e., Punitive Supervision on the Employees’ Innovative Work Behavior (IWB) and Employee’s Knowledge Hiding (EKH) within the hospitality sector of Pakistan. This paper further elaborates the underlying mechanism by introducing job security as the mediator and Perceived Organisational Support (POS) as the coping mechanism to manage the deteriorating effects of Punitive supervision on the IWS and EKH. Two wave data (N=267) was obtained from the frontline employees of the hospitality sector of Pakistan in order to test the hypothesized moderation mediation model. Study findings unveiled that, punitive supervision negatively affects employees' innovative work behavior (IWB) and increases employee’s knowledge hiding (EKH), with job insecurity serving as a significant mediator in these relationships. Specifically, punitive supervision increases employees' perceptions of job insecurity, decreasing their innovative work behaviors and increasing their tendencies to engage in knowledge hiding. From a managerial perspective, this research study suggests that managers must evaluate their behavior and leadership style to prevent the drastic effect of dark leadership on the employee’s IWB and EKH. In addition, organizations must strive to foster an organizational culture of trust and open communication to reduce job insecurity. Employees should receive sufficient training and development opportunities to reduce job insecurity, while clear performance expectations and constructive feedback should be encouraged to help them excel.

Keywords: punitive supervision, job insecurity, perceived organisational support, innovative work behavior, knowledge hiding

Procedia PDF Downloads 29
1949 Characteristics of Meiofaunal Communities in Intertidal Habitats Along Albanian Adriatic Sea Coast

Authors: Fundime Miri, Emanuela Sulaj

Abstract:

Benthic ecosystems constitute important ecological habitats, providing fundamental services for spawning, foraging, and sheltering aquatic organisms. Benthic faunal communities are characterized by a large biological diversity, supported by a great physical variety of benthic habitats. Until late, the study of meiobenthic communities in Albania has been neglectedthus excluding an important component of benthos. The present study aims to bring characteristics of distribution pattern of meiofaunal communities with further focus on nematode genus-based diversity from different intertidal habitats along Albanian Adriatic Sea Coast. The investigation area is extended from Shkodra to Vlora District, including six sandy sampling sites in beaches and areas near river estuaries. Sediment samples were collected manually in low intertidal zone by using a cylindrical corer, with an internal diameter of 5 cm. The richness onmeiofaunalmajor taxon level did not show any significant change between different sampling sites compare to significant changes in nematode diversity at genus level, with distinct nematode assemblages per sampling sites and presence of exclusive genera. All meiofaunal communities under study were dominated by nematodes. Further assessment of functional diversity on nematode assemblages exhibited changes as well on trophic groups and life strategies due to diverse feeding behaviors and c-p values of nematode genera. This study emphasize the need for lower level taxonomic identification of meiofaunal organisms and extending of ecological assessments on trophic diversity and life strategies to understanding functional consequences.

Keywords: benthos, meiofauna, nematode genus-based diversity, functional diversity, intertidal, albanian adriatic coast

Procedia PDF Downloads 151
1948 A PRISMA Systematic Review: Parent Sensitivity in Autism Spectrum Disorder and Its Relationship With Child and Parent Characteristics

Authors: Gabrielle Veloso, Melanie Porter, Kelsie Boulton, Adam Guastella

Abstract:

The aim of the current systematic review was to examine child and parent factors and their associations with parent sensitivity towards children with Autism Spectrum Disorder (ASD). Eight bibliographic databases were used to identify peer-reviewed journal articles examining these associations via quantitative analyses, with parent sensitivity measured via validated and reliable observation coding systems. Thirty-one studies were finalized as having met full criteria for inclusion. The review found agreement across studies that parent sensitivity was positively associated with the child’s initiations and responsiveness toward their parent, with more frequent parent-directed behaviors providing greater opportunity for parents to act and react in sensitive manner. There was also substantial evidence that parent sensitivity predicted later growth in child language ability and child social skills. Other factors such as child attachment, parent insightfulness toward their child, and parent resolution of the diagnosis were also identified across a number of studies as being positively associated with parent sensitivity, however, interpretations of these findings were limited by the absence of covariates identified in the literature as explaining much of the variance in parent sensitivity. With respect to non-significant associations, the literature reliably found that parents showed sensitivity toward their child with ASD, regardless of child age, ASD symptomology, concurrent child social skills, and concurrent child cognitive abilities. The robust associations found in this review and their potential explanations can serve as a jump off point in identifying an understanding protective and risk factors for families of children with ASD. With regard to future directions in research, assessment of the studies’ methodological quality identified points for improvement with respect to the measurement of parent sensitivity, as well as the consideration of several important methodological confounds that may be controlled for in statistical analyses.

Keywords: ASD, autism, parenting, parent sensitivity

Procedia PDF Downloads 153
1947 Belief-Based Games: An Appropriate Tool for Uncertain Strategic Situation

Authors: Saied Farham-Nia, Alireza Ghaffari-Hadigheh

Abstract:

Game theory is a mathematical tool to study the behaviors of a rational and strategic decision-makers, that analyze existing equilibrium in interest conflict situation and provides an appropriate mechanisms for cooperation between two or more player. Game theory is applicable for any strategic and interest conflict situation in politics, management and economics, sociology and etc. Real worlds’ decisions are usually made in the state of indeterminacy and the players often are lack of the information about the other players’ payoffs or even his own, which leads to the games in uncertain environments. When historical data for decision parameters distribution estimation is unavailable, we may have no choice but to use expertise belief degree, which represents the strength with that we believe the event will happen. To deal with belief degrees, we have use uncertainty theory which is introduced and developed by Liu based on normality, duality, subadditivity and product axioms to modeling personal belief degree. As we know, the personal belief degree heavily depends on the personal knowledge concerning the event and when personal knowledge changes, cause changes in the belief degree too. Uncertainty theory not only theoretically is self-consistent but also is the best among other theories for modeling belief degree on practical problem. In this attempt, we primarily reintroduced Expected Utility Function in uncertainty environment according to uncertainty theory axioms to extract payoffs. Then, we employed Nash Equilibrium to investigate the solutions. For more practical issues, Stackelberg leader-follower Game and Bertrand Game, as a benchmark models are discussed. Compared to existing articles in the similar topics, the game models and solution concepts introduced in this article can be a framework for problems in an uncertain competitive situation based on experienced expert’s belief degree.

Keywords: game theory, uncertainty theory, belief degree, uncertain expected value, Nash equilibrium

Procedia PDF Downloads 420
1946 Comparative Study of Various Wall Finishes in Buildings in Ondo State, Nigeria

Authors: Ayodele Oluwole Alejo

Abstract:

Wall finishes are the term to describe an application over a wall surface to provide a suitable surface. Wall finishes are smelt, touched and seen by building occupiers even colour and design affects the user psychology and the atmosphere of our building. Building users/owners seem not to recognize the function of various wall finishes in building and factors to be considered in selecting them suitable for the type and purpose of proposed buildings. Therefore, defects such as deterioration, dampness, and stain may occur when comparisons of wall finishes are not made before the selection of appropriate materials at the design stage with knowledge of the various factors that may hinder the performance or maintenance culture of proposed building of a particular location. This research work investigates and compares various wall finishes in building. Buildings in Ondo state, Nigeria were used as the target area to conduct the research works. The factors bearing on various wall finishes were analyzed to find out their individual and collective impact using suitable analytical tools. The findings revealed that paint with high percentage score was the most preferred wall finishes, whereas wall paper was ranked the least by the respondent findings, Factors considered most in the selection of wall finishes was durability with the highest ranking percentage and least was the cost. The study recommends that skilled worker should carry out operations, quality product should be used and all of wall finishes and materials should be considered before selection.

Keywords: building, construction, design, finishes, wall

Procedia PDF Downloads 145
1945 Online Handwritten Character Recognition for South Indian Scripts Using Support Vector Machines

Authors: Steffy Maria Joseph, Abdu Rahiman V, Abdul Hameed K. M.

Abstract:

Online handwritten character recognition is a challenging field in Artificial Intelligence. The classification success rate of current techniques decreases when the dataset involves similarity and complexity in stroke styles, number of strokes and stroke characteristics variations. Malayalam is a complex south indian language spoken by about 35 million people especially in Kerala and Lakshadweep islands. In this paper, we consider the significant feature extraction for the similar stroke styles of Malayalam. This extracted feature set are suitable for the recognition of other handwritten south indian languages like Tamil, Telugu and Kannada. A classification scheme based on support vector machines (SVM) is proposed to improve the accuracy in classification and recognition of online malayalam handwritten characters. SVM Classifiers are the best for real world applications. The contribution of various features towards the accuracy in recognition is analysed. Performance for different kernels of SVM are also studied. A graphical user interface has developed for reading and displaying the character. Different writing styles are taken for each of the 44 alphabets. Various features are extracted and used for classification after the preprocessing of input data samples. Highest recognition accuracy of 97% is obtained experimentally at the best feature combination with polynomial kernel in SVM.

Keywords: SVM, matlab, malayalam, South Indian scripts, onlinehandwritten character recognition

Procedia PDF Downloads 578
1944 Varietal Behavior of Some Chickpea Genotypes to Wilt Disease Induced by Fusarium oxysporum f.sp. ciceris

Authors: Rouag N., Khalifa M. W., Bencheikh A., Abed H.

Abstract:

The behavior study of forty-two varieties and genotypes of chickpeas regarding root wilt disease induced by Fusarium oxysporum under the natural conditions of infection was conducted at the ITGC experimental station in Sétif. The infected plants of the different chickpea genotypes have shown multiple symptoms in the field caused by the local strain of Fusarium oxysporum f.sp.cecris belonging to race II of the pathogen. These symptoms ranged from lateral or partial wilting of some ramifications to total desiccation of the plant, sometimes combined with the very slow growth of symptomatic plants. The results of the search for sources of resistance to Fusarium wilt of chickpeas in the 42 genotypes tested revealed that in terms of infection rate, the presence of 7 groups and no genotype showed absolute resistance. While in terms of severity, the results revealed the presence of three homogeneous groups. The first group formed by the most resistant genotypes, in this case, Flip10-368C; Flip11-77C; Flip11-186C; Flip11-124C; Flip11-142C, Flip11-152C; Flip11-69C; Ghab 05; Flip11-159C; Flip11-90C; Flip10-357C and Flip11-37C while the second group is the FLIP genotype 10-382C which was found to be the most sensitive for the natural infection test. Thus, the genotypes of Cicer arietinum L., which have shown significant levels of resistance to Fusarium wilt, can be integrated into breeding and improvement programs.

Keywords: chickpea, Cicer arietinum, Fusarium oxysporum, genotype resistance

Procedia PDF Downloads 90
1943 Information Technology Pattern for Traceability to Increase the Exporting Efficiency of Thailand’s Orchid

Authors: Pimploi Tirastittam, Phutthiwat Waiyawuththanapoom, Manop Tirastittam

Abstract:

Traceability system is one of the tools which can ensure the product’s confident of the consumer as it can trace the product back to its origin and can reduce the operation cost of recall. Nowadays, there are so many technologies which can be applied to the traceability system and also able to increase the efficiency of the system such as QR Code, barcode, GS1 and GTIN. As the result, this research is aimed to study and design the information technology pattern that suits for the traceability of Thailand’s orchid because Thailand’s orchid is the popular export product for Japan, USA, China, Netherlands and Italy. This study will enhance the value of Thailand’s orchid and able to prevent the unexpected event of the defects or damaged product. The traceability pattern was received IOC test from 12 experts from 4 fields of study which are traceability field, information technology field, information communication technology field and orchid export field. The result of the in-depth interview and questionnaire showed that the technology which most compatibility with the traceability system is the QR code. The mean of the score was 4.25 and the standard deviation was 0.5 as the QR code is the new technology and user-friendly. The traceability system should start from the farm to the consumer in the consuming country as the traceability system will enhance the quality level of the product and increase the value of its as well. The other outcome from this research is the supply chain model of Thailand’s Orchid along with the system architecture and working system diagram.

Keywords: exporting, information technology pattern, orchid, traceability

Procedia PDF Downloads 225
1942 New Active Dioxin Response Element Sites in Regulatory Region of Human and Viral Genes

Authors: Ilya B. Tsyrlov, Dmitry Y. Oshchepkov

Abstract:

A computational search for dioxin response elements (DREs) in genes of proteins comprising the Ah receptor (AhR) cytosolic core complex was performed by highly efficient tool SITECON. Eventually, the following number of new DREs in 5’flanking region was detected by SITECON: one in AHR gene, five in XAP2, eight in HSP90AA1, and three in HSP90AB1 genes. Numerous DREs found in genes of AhR and AhR cytosolic complex members would shed a light on potential mechanisms of expression, the stoichiometry of unliganded AhR core complex, and its degradation vs biosynthesis dynamics resulted from treatment of target cells with the AhR most potent ligand, 2,3,7,8-TCDD. With human viruses, reduced susceptibility to TCDD of geneencoding HIV-1 P247 was justified by the only potential DRE determined in gag gene encoding HIV-1 P24 protein, whereas the regulatory region of CMV genes encoding IE gp/UL37 has five potent DRE, 1.65 kb/UL36 – six DRE, pp65 and pp71 – each has seven DRE, and pp150 – ten DRE. Also, from six to eight DRE were determined with SITECON in the regulatory region of HSV-1 IE genes encoding tegument proteins, UL36 and UL37, and of UL19 gene encoding bindingglycoprotein C (gC). So, TCDD in the low picomolar range may activate in human cells AhR: Arnt transcription pathway that triggers CMV and HSV-1 reactivation by binding to numerous promoter DRE within immediate-early (IE) genes UL37 and UL36, thus committing virus to the lytic cycle.

Keywords: dioxin response elements, Ah receptor, AhR: Arnt transcription pathway, human and viral genes

Procedia PDF Downloads 108
1941 Parents' View of Children's Preschool Education in Slovakia

Authors: Sona Lorencova

Abstract:

The practice of kindergartens shows that the communication and cooperation of teachers and directors of kindergartens with parents, who come with different expectations and ideas about preschool education, is becoming an increasing problem, which leads to many misunderstandings in their mutual functioning. In practice, little attention is paid to communication and cooperation between kindergartens and families, whether in the professional development of educators, in professional articles and publications, or in the field of research. The approach of teachers to parents whose children attend kindergarten requires more and more skills on the part of educators, which is also related to the introduction of the institute of compulsory preschool education. Thus, the discrepancy in mutual expectations and requirements for children's preschool education on the part of the kindergarten and the family is increasing. The aim of the research was to look into the world of parents and learn about their subjective experience with preschool education of children in kindergarten. The findings could be useful in the search for appropriate strategies for mutual communication and cooperation between kindergartens and families in order to achieve more effective progress for children in education. The data were collected through the method of a constellation with figures, semi-structured interviews, and the use of a research diary. Through an interpretive phenomenological analysis, it was found that the parents' view of preschool education in kindergarten is connected to 6 basic topics - parenting with a preschooler, adaptation to kindergarten, professionalism of teachers, cooperation with kindergarten, and parents' satisfaction with preschool education. The conducted research also revealed that the determinants at the level of microsystem, mesosystem, exosystem, macrosystem, and chronosystem influenced parents' view of children's preschool education in kindergarten.

Keywords: preschool education, parents, kindergarten, interpretive phenomenological analysis, subjective experience

Procedia PDF Downloads 106
1940 Finite Element Method for Modal Analysis of FGM

Authors: S. J. Shahidzadeh Tabatabaei, A. M. Fattahi

Abstract:

Modal analysis of a FGM plate containing the ceramic phase of Al2O3 and metal phase of stainless steel 304 was performed using ABAQUS, with the assumptions that the material has an elastic mechanical behavior and its Young modulus and density are varying in thickness direction. For this purpose, a subroutine was written in FOTRAN and linked with ABAQUS. First, a simulation was performed in accordance to other researcher’s model, and then after comparing the obtained results, the accuracy of the present study was verified. The obtained results for natural frequency and mode shapes indicate good performance of user-written subroutine as well as FEM model used in present study. After verification of obtained results, the effect of clamping condition and the material type (i.e. the parameter n) was investigated. In this respect, finite element analysis was carried out in fully clamped condition for different values of n. The results indicate that the natural frequency decreases with increase of n, since with increase of n, the amount of ceramic phase in FGM plate decreases, while the amount of metal phase increases, leading to decrease of the plate stiffness and hence, natural frequency, as the Young modulus of Al2O3 is equal to 380 GPa and the Young modulus of stainless steel 304 is equal to 207 GPa.

Keywords: FGM plates, modal analysis, natural frequency, finite element method

Procedia PDF Downloads 318
1939 Application of the Mobile Phone for Occupational Self-Inspection Program in Small-Scale Industries

Authors: Jia-Sin Li, Ying-Fang Wang, Cheing-Tong Yan

Abstract:

In this study, an integrated approach of Google Spreadsheet and QR code which is free internet resources was used to improve the inspection procedure. The mobile phone Application(App)was also designed to combine with a web page to create an automatic checklist in order to provide a new integrated information of inspection management system. By means of client-server model, the client App is developed for Android mobile OS and the back end is a web server. It can set up App accounts including authorized data and store some checklist documents in the website. The checklist document URL could generate QR code first and then print and paste on the machine. The user can scan the QR code by the app and filled the checklist in the factory. In the meanwhile, the checklist data will send to the server, it not only save the filled data but also executes the related functions and charts. On the other hand, it also enables auditors and supervisors to facilitate the prevention and response to hazards, as well as immediate report data checks. Finally, statistics and professional analysis are performed using inspection records and other relevant data to not only improve the reliability, integrity of inspection operations and equipment loss control, but also increase plant safety and personnel performance. Therefore, it suggested that the traditional paper-based inspection method could be replaced by the APP which promotes the promotion of industrial security and reduces human error.

Keywords: checklist, Google spreadsheet, APP, self-inspection

Procedia PDF Downloads 123
1938 A Method for Identifying Unusual Transactions in E-commerce Through Extended Data Flow Conformance Checking

Authors: Handie Pramana Putra, Ani Dijah Rahajoe

Abstract:

The proliferation of smart devices and advancements in mobile communication technologies have permeated various facets of life with the widespread influence of e-commerce. Detecting abnormal transactions holds paramount significance in this realm due to the potential for substantial financial losses. Moreover, the fusion of data flow and control flow assumes a critical role in the exploration of process modeling and data analysis, contributing significantly to the accuracy and security of business processes. This paper introduces an alternative approach to identify abnormal transactions through a model that integrates both data and control flows. Referred to as the Extended Data Petri net (DPNE), our model encapsulates the entire process, encompassing user login to the e-commerce platform and concluding with the payment stage, including the mobile transaction process. We scrutinize the model's structure, formulate an algorithm for detecting anomalies in pertinent data, and elucidate the rationale and efficacy of the comprehensive system model. A case study validates the responsive performance of each system component, demonstrating the system's adeptness in evaluating every activity within mobile transactions. Ultimately, the results of anomaly detection are derived through a thorough and comprehensive analysis.

Keywords: database, data analysis, DPNE, extended data flow, e-commerce

Procedia PDF Downloads 60
1937 Conservative Treatment Versus Percutaneous Wire Fixation in treatment of Distal Radial Fracture in Elderly

Authors: Abdelfatah Elsenosy, Mahmoud Ebrahim

Abstract:

Background: Distal radius fractures are commonly encountered in orthopedic practice, especially in elderly patients. A number of clinical papers have supported the idea that anatomic restoration of the distal end of the radius is essential to gain superior results. Aim and objectives: The aim of the study is to systematically review the literature for the management of distal end radius in elderly persons (conservative treatment versus percutaneous wire fixation) as regards radiological and functional outcomes. Subjects and methods: Studies were identified from the Medline, Cochrane, EMBASE, and Google Scholar databases were searched until 2019 using combinations of the following search terms: distal radius fracture, conservative treatment, non-operative treatment, and nonsurgical treatment, surgical treatment, operative, elderly, and older. Reference lists of relevant studies were manually searched. Results: There was no statistical significance difference between CI and PKF groups’ frequency of complication in all of the selected studies. Based on the results, we recommend more analysis regarding every parameter of the radiographic and functional results and specific complications related to each fixation need to be accomplished, which requires more Randomized controlled trials (RCTs) with high quality. Conclusion: Surgical treatment seems to be more effective distal radius fracture compared with conservative treatment when the radiographic outcomes were analyzed, and no significant differences were detected in the functional outcomes and complication rate.

Keywords: radius, fracture, surgical, RCTs, conservative, radiographic, outcomes, orthopedic

Procedia PDF Downloads 150
1936 Study the Impact of Welding Poles Type on the Tensile Strength Steel of Low Alloys and High Resistance

Authors: Abdulmagid A. Khattabi, Abdul Fatah M. Emhamed

Abstract:

The steel alloy Introduced after becoming carbon-steel does not meet the requirements of engineering industry; and it cannot be obtained tensile strength from carbon-steel higher than (700MPa), the low alloy steel enters in a lot of heavy engineering equipment parts, molds, agricultural equipment and other industry. In addition, that may be exposed to in-service failure, which may require returned to work, to do the repairs or maintenance by one of the welding methods available. The ability of steel weld determined through palpation of the cracks, which can reduce by many ways. These ways are often expensive and difficult to implement, perhaps the control to choose the type of electrode welding user is one of the easiest and least expensive applications. It has been welding the steel low alloys high resistance by manual metal arc (MMA), and by using a set of welding electrodes which varying in chemical composition and in their prices as well and test their effect on tensile strength. Results showed that using the poles of welding, which have a high proportion of iron powder and low hydrogen. The Tensile resistance is (484MPa) and the weld joint efficiency was (56.9%), but when (OK 47.04) electrode was used the tensile strength increased to (720MPa) and the weld joint efficiency to (84.7%). Using the cheapest electrode (OK 45.00) the weld joint efficiency did not exceed (24.2%), but when using the most expensive electrode (OK 91.28) the weld joint efficiency is (38.1%).

Keywords: steel low alloys high resistance, electrodes welding, tensile test

Procedia PDF Downloads 322
1935 Integrating Knowledge into Health Care Systems: A Case Study Investigation on UAE Health Care

Authors: Alya Al Ghufli, Kelaithim Al Tunaiji, Sara Al Ali, Khalid Samara

Abstract:

It is well known that health care systems encompass a variety of key knowledge sources that need to be integrated and shared amongst all types of users to attain higher-levels of motivation and productivity. The development of Health Integrated Systems (HIS) is often seen as a crucial step in strengthening the integration of knowledge to help serve the information needs of health care users. As an emergent economy, the United Arab Emirates (UAE) is regarded as a new arrival in the area of health information systems. As a new nation, there may be several challenges in terms of organisational climate and the sufficient skills and knowledge activities for effective use of HIS. In this regard, the lack of coordination, attitudes and practice of health-related systems can eventually result in unnecessary data and generally poor use of the system. This paper includes results from a qualitative preliminary study carried out from a case study investigation in a single large primary health care organisation in the United Arab Emirates (UAE) comprising various health care users. The study explored health care user’s perceptions about health integration and the impact it has on their practice. The main sources of information were semi-structured interviews and non-obtrusive observations. The authors conclude by presenting various recommendations for the development of HIS and knowledge activities and areas for further study.

Keywords: health integrated systems, knowledge sharing, knowledge activities, health information systems

Procedia PDF Downloads 441
1934 Improving Decision-Making in Multi-Project Environments within Organizational Information Systems Using Blockchain Technology

Authors: Seyed Hossein Iranmanesh, Hassan Nouri, Seyed Reza Iranmanesh

Abstract:

In the dynamic and complex landscape of today’s business, organizations often face challenges in impactful decision-making across multi-project settings. To efficiently allocate resources, coordinate tasks, and optimize project outcomes, establishing robust decision-making processes is essential. Furthermore, the increasing importance of information systems and their integration within organizational workflows introduces an additional layer of complexity. This research proposes the use of blockchain technology as a suitable solution to enhance decision-making in multi-project environments, particularly within the realm of information systems. The conceptual framework in this study comprises four independent variables and one dependent variable. The identified independent variables for the targeted research include: Blockchain Layer in Integrated Systems, Quality of Generated Information ,User Satisfaction with Integrated Systems and Utilization of Integrated Systems. The project’s performance, considered as the dependent variable and moderated by organizational policies and procedures, reflects the impact of blockchain technology adoption on organizational effectiveness1. The results highlight the significant influence of blockchain implementation on organizational performance.

Keywords: multi-project environments, decision support systems, information systems, blockchain technology, decentralized systems.

Procedia PDF Downloads 64