Search results for: blackhole attack access control
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 13804

Search results for: blackhole attack access control

13414 Basil Plants Attract and Benefit Generalist Lacewing Predator Ceraeochrysa cubana Hagen (Neuroptera: Chrysopidae) by Providing Nutritional Resources

Authors: Michela C. Batista Matos, Madelaine Venzon, Elem F. Martins, Erickson C. Freitas, Adenir V. Teodoro, Maira C. M. Fonseca, Angelo Pallini

Abstract:

Aromatic plant species are capable of producing and releasing volatile organic compounds spontaneously, which can repel or attract beneficial insects such as generalist predators of herbivores. Attractive plants could be used as crop companion plants to promote biological control of pests. In order to select such plants for future use in horticulture fields, we assessed the attractiveness of the aromatic plants Ocimum basilicum L. (basil), Mentha piperita L. (peppermint), Melissa officinalis L. (lemon balm) and Cordia verbenacea DC (black sage) to adults of the generalist lacewing predator Ceraeochrysa cubana Hagen (Neuroptera: Chrysopidae). This predator is commonly found in agroecosystems in Brazil and it feeds on aphids, mites, small caterpillars, insect eggs and scales. We further tested the effect of these plant species on the survival, development and oviposition of C. cubana. Finally, we evaluated the survival of larvae and adults of C. cubana when only flowers of basil were offered. Females of C. cubana were attracted to basil but not to the remaining aromatic plants. Larvae survival was higher when individuals had access only to basil leaf than when they had access to peppermint, lemon balm, black sage or water. Adult survival on leaf treatments and on water was no longer than three days. Flowers of basil enhanced predator larvae survival, yet they did not reach adulthood. Adults fed on basil flowers lived longer compared with water, but they did not reproduce. Basil is a promising aromatic plant species to be considered for conservation biological control programs. Besides being attractive to adults of the generalist predator, it benefits larvae and adults by providing nutritional resources when prey or other resources are absent. Financial support: CNPq, FAPEMIG and CAPES (Brazil).

Keywords: basil, chrysopidae, conservation biological control, companion plants

Procedia PDF Downloads 235
13413 Software-Defined Networking: A New Approach to Fifth Generation Networks: Security Issues and Challenges Ahead

Authors: Behrooz Daneshmand

Abstract:

Software Defined Networking (SDN) is designed to meet the future needs of 5G mobile networks. The SDN architecture offers a new solution that involves separating the control plane from the data plane, which is usually paired together. Network functions traditionally performed on specific hardware can now be abstracted and virtualized on any device, and a centralized software-based administration approach is based on a central controller, facilitating the development of modern applications and services. These plan standards clear the way for a more adaptable, speedier, and more energetic network beneath computer program control compared with a conventional network. We accept SDN gives modern inquire about openings to security, and it can significantly affect network security research in numerous diverse ways. Subsequently, the SDN architecture engages systems to effectively screen activity and analyze threats to facilitate security approach modification and security benefit insertion. The segregation of the data planes and control and, be that as it may, opens security challenges, such as man-in-the-middle attacks (MIMA), denial of service (DoS) attacks, and immersion attacks. In this paper, we analyze security threats to each layer of SDN - application layer - southbound interfaces/northbound interfaces - controller layer and data layer. From a security point of see, the components that make up the SDN architecture have a few vulnerabilities, which may be abused by aggressors to perform noxious activities and hence influence the network and its administrations. Software-defined network assaults are shockingly a reality these days. In a nutshell, this paper highlights architectural weaknesses and develops attack vectors at each layer, which leads to conclusions about further progress in identifying the consequences of attacks and proposing mitigation strategies.

Keywords: software-defined networking, security, SDN, 5G/IMT-2020

Procedia PDF Downloads 71
13412 Health Information Needs and Utilization of Information and Communication Technologies by Medical Professionals in a Northern City of India

Authors: Sonika Raj, Amarjeet Singh, Vijay Lakshmi Sharma

Abstract:

Introduction: In 21st century, due to revolution in Information and Communication Technologies (ICTs), there has been phenomenal development in quality and quantity of knowledge in the field of medical science. So, the access to relevant information to physicians is critical to the delivery of effective healthcare services to patients. The study was conducted to assess the information needs and attitudes of the medical professionals; to determine the sources and channels of information used by them; to ascertain the current usage of ICTs and the barriers faced by them in utilization of ICTs in health information access. Methodology: This descriptive cross-sectional study was carried in 2015 on hundred medical professionals working in public and private sectors of Chandigarh. The study used both quantitative and qualitative method for data collection. A semi structured questionnaire and interview schedule was used to collect data on information seeking needs, access to ICTs and barriers to healthcare information access. Five Data analysis was done using SPSS-16 and qualitative data was analyzed using thematic approach. Results: The most preferred sources to access healthcare information were internet (85%), trainings (61%) and communication with colleagues (57%). They wanted information on new drug therapy and latest developments in respective fields. All had access to computer with but almost half assessed their computer knowledge as average and only 3% had received training regarding usage. Educational status (p=0.004), place of work (p=0.004), number of years in job (p=0.004) and sector of job (p=0.04) of doctors were found to be significantly associated with their active search for information. The major themes that emerged from in-views were need; types and sources of healthcare information; exchange of information among different levels of healthcare providers; usage of ICTs to obtain and share information; barriers to access of healthcare information and quality of health information materials and involvement in their development process Conclusion and Recommendations: The medical professionals need information in their in their due course of work. However, information needs of medical professionals were not being adequately met. There should be training of professional regarding internet skills and the course on bioinformatics should be incorporated in the curricula of medical students. The policy framework must be formulated that will encourage and promote the use of ICTs as tools for health information access and dissemination.

Keywords: health information, ICTs, medical professionals, qualitative

Procedia PDF Downloads 328
13411 Ontology for Cross-Site-Scripting (XSS) Attack in Cybersecurity

Authors: Jean Rosemond Dora, Karol Nemoga

Abstract:

In this work, we tackle a frequent problem that frequently occurs in the cybersecurity field which is the exploitation of websites by XSS attacks, which are nowadays considered a complicated attack. These types of attacks aim to execute malicious scripts in a web browser of the client by including code in a legitimate web page. A serious matter is when a website accepts the “user-input” option. Attackers can exploit the web application (if vulnerable), and then steal sensitive data (session cookies, passwords, credit cards, etc.) from the server and/or from the client. However, the difficulty of the exploitation varies from website to website. Our focus is on the usage of ontology in cybersecurity against XSS attacks, on the importance of the ontology, and its core meaning for cybersecurity. We explain how a vulnerable website can be exploited, and how different JavaScript payloads can be used to detect vulnerabilities. We also enumerate some tools to use for an efficient analysis. We present detailed reasoning on what can be done to improve the security of a website in order to resist attacks, and we provide supportive examples. Then, we apply an ontology model against XSS attacks to strengthen the protection of a web application. However, we note that the existence of ontology does not improve the security itself, but it has to be properly used and should require a maximum of security layers to be taken into account.

Keywords: cybersecurity, web application vulnerabilities, cyber threats, ontology model

Procedia PDF Downloads 147
13410 A Corpus-Based Approach to Understanding Market Access in Fisheries and Aquaculture: A Systematic Literature Review

Authors: Cheryl Marie Cordeiro

Abstract:

Although fisheries and aquaculture studies might seem marginal to international business (IB) studies in general, fisheries and aquaculture IB (FAIB) management is currently facing increasing pressure to meet global demand and consumption for fish in the next coming decades. In part address to this challenge, the purpose of this systematic review of literature (SLR) study is to investigate the use of the term ‘market access’ in its context of use in the generic literature and business sector discourse, in comparison to the more specific literature and discourse in fisheries, aquaculture and seafood. This SLR aims to uncover the knowledge/interest gaps between the academic subject discourses and business sector practices. Corpus driven in methodology and using a triangulation method of three different text analysis software including AntConc, VOSviewer and Web of Science (WoS) analytics, the SLR results indicate a gap in conceptual knowledge and business practices in how ‘market access’ is conceived and used in the context of the pharmaceutical healthcare industry and FAIB research and practice. While it is acknowledged that the product orientation of different business sectors might differ, this SLR study works with the assumption that both business sectors are global in orientation. These business sectors are complex in their operations from product to market. This SLR suggests a conceptual model in understanding the challenges, the potential barriers as well as avenues for solutions to developing market access for FAIB.

Keywords: market access, fisheries and aquaculture, international business, systematic literature review

Procedia PDF Downloads 125
13409 Space Vector PWM and Model Predictive Control for Voltage Source Inverter Control

Authors: Irtaza M. Syed, Kaamran Raahemifar

Abstract:

In this paper, we present a comparative assessment of Space Vector Pulse Width Modulation (SVPWM) and Model Predictive Control (MPC) for two-level three phase (2L-3P) Voltage Source Inverter (VSI). VSI with associated system is subjected to both control techniques and the results are compared. Matlab/Simulink was used to model, simulate and validate the control schemes. Findings of this study show that MPC is superior to SVPWM in terms of total harmonic distortion (THD) and implementation.

Keywords: voltage source inverter, space vector pulse width modulation, model predictive control, comparison

Procedia PDF Downloads 488
13408 Random Access in IoT Using Naïve Bayes Classification

Authors: Alhusein Almahjoub, Dongyu Qiu

Abstract:

This paper deals with the random access procedure in next-generation networks and presents the solution to reduce total service time (TST) which is one of the most important performance metrics in current and future internet of things (IoT) based networks. The proposed solution focuses on the calculation of optimal transmission probability which maximizes the success probability and reduces TST. It uses the information of several idle preambles in every time slot, and based on it, it estimates the number of backlogged IoT devices using Naïve Bayes estimation which is a type of supervised learning in the machine learning domain. The estimation of backlogged devices is necessary since optimal transmission probability depends on it and the eNodeB does not have information about it. The simulations are carried out in MATLAB which verify that the proposed solution gives excellent performance.

Keywords: random access, LTE/LTE-A, 5G, machine learning, Naïve Bayes estimation

Procedia PDF Downloads 126
13407 Arms and Light Weapons Flow in Nigerian/Chad Border: A Reflection on the How Insurgents Had Access to Their Target

Authors: Lawan Ja’afar Tahir

Abstract:

This research work centered on the problem of free Arms flow around the Nigeria and Chad Border. The whole of the northeastern Nigerian region has been devastated by the crisis of insecurity facilitated by more than a decade of insurgency. One of the major issues of concern to security experts and personnel in the country is how the insurgents are getting access to weapons, which gave them more strength to fight the war for this long period, which has become so difficult to overcome. Among the possible avenues that continue to strengthen the enemies is the easy access to the arms flow from the neighboring countries, especially the Republic of Chad, which borders Nigeria to the east, where Boko Haram gained firm roots. This paper, therefore, looked at the nature of the waterway of the Nigeria/Chad Border, which has become a source of strength to the insurgents as the flow of weapons is one of the cheapest things on the Border. The availability of such arms flow has also led to the People abandoning their lands and economic and commercial activities, especially those settlements between the Border of these two countries. For more than eight years now, they have suspended their livelihood activities, roads were blocked and chances of survival in the rural areas were minimal due to the frequent attacks carried out by the insurgents. However, this research looks at the causes of the arms flow along the Border of these neighboring countries, the extent of damage done as a result of the availability of the weapons, and how far the Nigerian government has gone in curtailing the menace of the flow of dangerous weapons into the country. The research looked at the ways arm dealers are conniving with settlers along the border as well as the various ways they followed to reach their target. The work provided suggestion as to how the fragile Border should be managed with the view to reduce the influx of arms without control, which, according to this research, is the central factor that continues to unleash and give terror groups the opportunity to destroy people for more than a decade.

Keywords: border, insecurity, weapons, management

Procedia PDF Downloads 36
13406 Power Control of a Doubly-Fed Induction Generator Used in Wind Turbine by RST Controller

Authors: A. Boualouch, A. Frigui, T. Nasser, A. Essadki, A.Boukhriss

Abstract:

This work deals with the vector control of the active and reactive powers of a Double-Fed Induction generator DFIG used as a wind generator by the polynomial RST controller. The control of the statoric power transfer between the machine and the grid is achieved by acting on the rotor parameters and control is provided by the polynomial controller RST. The performance and robustness of the controller are compared with PI controller and evaluated by simulation results in MATLAB/simulink.

Keywords: DFIG, RST, vector control, wind turbine

Procedia PDF Downloads 633
13405 The Development of Open Access in Latin America and Caribbean: Mapping National and International Policies and Scientific Publications of the Region

Authors: Simone Belli, Sergio Minniti, Valeria Santoro

Abstract:

ICTs and technology transfer can benefit and move a country forward in economic and social development. However, ICT and access to the Internet have been inequitably distributed in most developing countries. In terms of science production and dissemination, this divide articulates itself also through the inequitable distribution of access to scientific knowledge and networks, which results in the exclusion of developing countries from the center of science. Developing countries are on the fringe of Science and Technology (S&T) production due not only to low investment in research but also to the difficulties to access international scholarly literature. In this respect, Open access (OA) initiatives and knowledge infrastructure represent key elements for both producing significant changes in scholarly communication and reducing the problems of developing countries. The spreading of the OA movement in the region, exemplified by the growth of regional and national initiatives, such as the creation of OA institutional repositories (e.g. SciELO and Redalyc) and the establishing of supportive governmental policies, provides evidence of the significant role that OA is playing in reducing the scientific gap between Latin American countries and improving their participation in the so-called ‘global knowledge commons’. In this paper, we map OA publications in Latin America and observe how Latin American countries are moving forward and becoming a leading force in widening access to knowledge. Our analysis, developed as part of the H2020 EULAC Focus research project, is based on mixed methods and consists mainly of a bibliometric analysis of OA publications indexed in the most important scientific databases (Web of Science and Scopus) and OA regional repositories, as well as the qualitative analysis of documents related to the main OA initiatives in Latin America. Through our analysis, we aim at reflecting critically on what policies, international standards, and best practices might be adapted to incorporate OA worldwide and improve the infrastructure of the global knowledge commons.

Keywords: open access, LAC countries, scientific publications, bibliometric analysis

Procedia PDF Downloads 188
13404 A Foodborne Cholera Outbreak in a School Caused by Eating Contaminated Fried Fish: Hoima Municipality, Uganda, February 2018

Authors: Dativa Maria Aliddeki, Fred Monje, Godfrey Nsereko, Benon Kwesiga, Daniel Kadobera, Alex Riolexus Ario

Abstract:

Background: Cholera is a severe gastrointestinal disease caused by Vibrio cholera. It has caused several pandemics. On 26 February 2018, a suspected cholera outbreak, with one death, occurred in School X in Hoima Municipality, western Uganda. We investigated to identify the scope and mode of transmission of the outbreak, and recommend evidence-based control measures. Methods: We defined a suspected case as onset of diarrhea, vomiting, or abdominal pain in a student or staff of School X or their family members during 14 February–10 March. A confirmed case was a suspected case with V. cholerae cultured from stool. We reviewed medical records at Hoima Hospital and searched for cases at School X. We conducted descriptive epidemiologic analysis and hypothesis-generating interviews of 15 case-patients. In a retrospective cohort study, we compared attack rates between exposed and unexposed persons. Results: We identified 15 cases among 75 students and staff of School X and their family members (attack rate=20%), with onset from 25-28 February. One patient died (case-fatality rate=6.6%). The epidemic curve indicated a point-source exposure. On 24 February, a student brought fried fish from her home in a fishing village, where a cholera outbreak was ongoing. Of the 21 persons who ate the fish, 57% developed cholera, compared with 5.6% of 54 persons who did not eat (RR=10; 95% CI=3.2-33). None of 4 persons who recooked the fish before eating, compared with 71% of 17 who did not recook it, developed cholera (RR=0.0, 95%CIFisher exact=0.0-0.95). Of 12 stool specimens cultured, 6 yielded V. cholerae. Conclusion: This cholera outbreak was caused by eating fried fish, which might have been contaminated with V. cholerae in a village with an ongoing outbreak. Lack of thorough cooking of the fish might have facilitated the outbreak. We recommended thoroughly cooking fish before consumption.

Keywords: cholera, disease outbreak, foodborne, global health security, Uganda

Procedia PDF Downloads 171
13403 Choice Analysis of Ground Access to São Paulo/Guarulhos International Airport Using Adaptive Choice-Based Conjoint Analysis (ACBC)

Authors: Carolina Silva Ansélmo

Abstract:

Airports are demand-generating poles that affect the flow of traffic around them. The airport access system must be fast, convenient, and adequately planned, considering its potential users. An airport with good ground access conditions can provide the user with a more satisfactory access experience. When several transport options are available, service providers must understand users' preferences and the expected quality of service. The present study focuses on airport access in a comparative scenario between bus, private vehicle, subway, taxi and urban mobility transport applications to São Paulo/Guarulhos International Airport. The objectives are (i) to identify the factors that influence the choice, (ii) to measure Willingness to Pay (WTP), and (iii) to estimate the market share for each modal. The applied method was Adaptive Choice-based Conjoint Analysis (ACBC) technique using Sawtooth Software. Conjoint analysis, rooted in Utility Theory, is a survey technique that quantifies the customer's perceived utility when choosing alternatives. Assessing user preferences provides insights into their priorities for product or service attributes. An additional advantage of conjoint analysis is its requirement for a smaller sample size compared to other methods. Furthermore, ACBC provides valuable insights into consumers' preferences, willingness to pay, and market dynamics, aiding strategic decision-making to provide a better customer experience, pricing, and market segmentation. In the present research, the ACBC questionnaire had the following variables: (i) access time to the boarding point, (ii) comfort in the vehicle, (iii) number of travelers together, (iv) price, (v) supply power, and (vi) type of vehicle. The case study questionnaire reached 213 valid responses considering the scenario of access from the São Paulo city center to São Paulo/Guarulhos International Airport. As a result, the price and the number of travelers are the most relevant attributes for the sample when choosing airport access. The market share of the selection is mainly urban mobility transport applications, followed by buses, private vehicles, taxis and subways.

Keywords: adaptive choice-based conjoint analysis, ground access to airport, market share, willingness to pay

Procedia PDF Downloads 53
13402 Computational Simulations on Stability of Model Predictive Control for Linear Discrete-Time Stochastic Systems

Authors: Tomoaki Hashimoto

Abstract:

Model predictive control is a kind of optimal feedback control in which control performance over a finite future is optimized with a performance index that has a moving initial time and a moving terminal time. This paper examines the stability of model predictive control for linear discrete-time systems with additive stochastic disturbances. A sufficient condition for the stability of the closed-loop system with model predictive control is derived by means of a linear matrix inequality. The objective of this paper is to show the results of computational simulations in order to verify the validity of the obtained stability condition.

Keywords: computational simulations, optimal control, predictive control, stochastic systems, discrete-time systems

Procedia PDF Downloads 406
13401 A Comparative Study of Series-Connected Two-Motor Drive Fed by a Single Inverter

Authors: A. Djahbar, E. Bounadja, A. Zegaoui, H. Allouache

Abstract:

In this paper, vector control of a series-connected two-machine drive system fed by a single inverter (CSI/VSI) is presented. The two stator windings of both machines are connected in series while the rotors may be connected to different loads, are called series-connected two-machine drive. Appropriate phase transposition is introduced while connecting the series stator winding to obtain decoupled control the two-machines. The dynamic decoupling of each machine from the group is obtained using the vector control algorithm. The independent control is demonstrated by analyzing the characteristics of torque and speed of each machine obtained via simulation under vector control scheme. The viability of the control techniques is proved using analytically and simulation approach.

Keywords: drives, inverter, multi-phase induction machine, vector control

Procedia PDF Downloads 457
13400 Synchronization of a Perturbed Satellite Attitude Motion

Authors: Sadaoui Djaouida

Abstract:

In this paper, the predictive control method is proposed to control the synchronization of two perturbed satellites attitude motion. Based on delayed feedback control of continuous-time systems combines with the prediction-based method of discrete-time systems, this approach only needs a single controller to realize synchronization, which has considerable significance in reducing the cost and complexity for controller implementation.

Keywords: predictive control, synchronization, satellite attitude, control engineering

Procedia PDF Downloads 535
13399 Effects of Garlic (Allium sativum) Juice on Semen Oxidation in Male Rats

Authors: Jamshid Ghiasi Ghalehkandi, Naser Maheri Sis, Yahya Ebrahimnezhad, Shahin Hassanpour

Abstract:

The objective of present study was to examine the effects of fresh garlic juice on semen malondialdehyde (MDA), superoxide dismutase (SOD), glutathione peroxidase (GPx) and total antioxidant status (TAS) in male rats. Fifty-four male rats (230-250 g) were allocated into 3 treatment groups (each include 3 groups and 6 replicate). Group 1 served as water control. In group 2, rats were gavaged with 60 mg/kg garlic juice. In group 3, rats were offered 120 mg/kg garlic juice. Animals received treatments orally and ad libitum access to chow pellets and fresh water. After 4 weeks, animals were killed, testes were taken out and semen samples were used to determine MDA, SOD, GPx and TAS activity. According to the results, garlic juice (120 mg/kg) significantly declined semen MDA activity compared to control group (P<0.05). These results suggest that presumably garlic juice protects semen oxidation in rat testes.

Keywords: garlic juice, chromium chloride, semen, rat

Procedia PDF Downloads 741
13398 Artificial Intelligence as a Policy Response to Teaching and Learning Issues in Education in Ghana

Authors: Joshua Osondu

Abstract:

This research explores how Artificial Intelligence (AI) can be utilized as a policy response to address teaching and learning (TL) issues in education in Ghana. The dual (AI and human) instructor model is used as a theoretical framework to examine how AI can be employed to improve teaching and learning processes and to equip learners with the necessary skills in the emerging AI society. A qualitative research design was employed to assess the impact of AI on various TL issues, such as teacher workloads, a lack of qualified educators, low academic performance, unequal access to education and educational resources, a lack of participation in learning, and poor access and participation based on gender, place of origin, and disability. The study concludes that AI can be an effective policy response to TL issues in Ghana, as it has the potential to increase students’ participation in learning, increase access to quality education, reduce teacher workloads, and provide more personalized instruction. The findings of this study are significant for filling in the gaps in AI research in Ghana and other developing countries and for motivating the government and educational institutions to implement AI in TL, as this would ensure quality, access, and participation in education and help Ghana industrialize.

Keywords: artificial intelligence, teacher, learner, students, policy response

Procedia PDF Downloads 66
13397 Impacts of Public Insurance on Health Access and Outcomes: Evidence from India

Authors: Titir Bhattacharya, Tanika Chakraborty, Prabal K. De

Abstract:

Maternal and child health continue to be a significant policy focus in developing countries, including India. An emerging model in health care is the creation of public and private partnerships. Since the construction of physical infrastructure is costly, governments at various levels have tried to implement social health insurance schemes where a trust calculates insurance premiums and medical payments. Typically, qualifying families get full subsidization of the premium and get access to private hospitals, in addition to low cost public hospitals, for their tertiary care needs. We analyze one such pioneering social insurance scheme in the Indian state of Andhra Pradesh (AP). The Rajiv Aarogyasri program (RA) was introduced by the Government of AP on a pilot basis in 2007 and implemented in 2008. In this paper, we first examine the extent to which access to reproductive health care changed. For example, the RA scheme reimburses hospital deliveries leading us to expect an increase in institutional deliveries, particularly in private hospitals. Second, we expect an increase in institutional deliveries to also improve child health outcomes. Hence, we estimate if the program improved infant and child mortality. We use District Level Health Survey data to create annual birth cohorts from 2000-2015. Since AP was the only state in which such a state insurance program was implemented, the neighboring states constituted a plausible control group. Combined with the policy timing, and the year of birth, we employ a difference-indifference strategy to identify the effects of RA on the residents of AP. We perform several checks against threats to identification, including testing for pre-treatment trends between the treatment and control states. We find that the policy significantly lowered infant and child mortality in AP. We also find that deliveries in private hospitals increased, and government hospitals decreased, showing a substitution effect of the relative price change. Finally, as expected, out-of-pocket costs declined for the treatment group. However, we do not find any significant effects for usual preventive care such as vaccination, showing that benefits of insurance schemes targeted at the tertiary level may not trickle down to the primary care level.

Keywords: public health insurance, maternal and child health, public-private choice

Procedia PDF Downloads 54
13396 Experimental Investigation of Boundary Layer Transition on Rotating Cones in Axial Flow in 0 and 35 Degrees Angle of Attack

Authors: Ali Kargar, Kamyar Mansour

Abstract:

In this paper, experimental results of using hot wire anemometer and smoke visualization are presented. The results obtained on the hot wire anemometer for critical Reynolds number and transitional Reynolds number are compared by previous results. Excellent agreement is found for the transitional Reynolds number. The results for the transitional Reynolds number are also compared by previous linear stability results. The results of the smoke visualization clearly show the cross flow vortices which arise in the transition process from a laminar to a turbulent flow. A non-zero angle of attack is also considered. We compare our results by linear stability theory which was done by Garret et. Al (2007). We just emphasis, Also the visualization and hot wire anemometer results have been compared graphically. The goal in this paper is to check reliability of using hot wire anemometer and smoke visualization in transition problems and check reliability of linear stability theory for this case and compare our results with some trusty experimental works.

Keywords: transitional reynolds number, wind tunnel, rotating cone, smoke visualization

Procedia PDF Downloads 279
13395 Catastrophic Spending on Health: A Determinant of Access to Health Care by Migrant Slum Population

Authors: Saira Mehnaz, Ali Jafar Abedi, Shazia Farooq Fazli, Sakeena Mushfiq, Zulfia Khan, M. Athar Ansari

Abstract:

Introduction: Public health spending is a necessity in an underdeveloped country like India. The people are already suffering from poverty and that clubbed with out of pocket expenditure leads them to a very catastrophic situation, reducing the overall access to healthcare. Objectives: This study was designed to determine the usual source of medical care opted, the illness pattern, the expenditure incurred on illness and its source of procurement by the study population. It also intended to assess this expenditure as a determinant of access to health care. Methodology: Cities like Aligarh, which are classified as B grade cities in India are thought to be ripe sites for getting livelihood and hence are almost half filled with migrants living in urban slums. A cross sectional study was done to study the newer slum pockets. 3409 households with a population of 16,978 were studied with the help of pretested questionnaire; SPSS 20 was used for statistical analysis. Results and Conclusions: In our study, we found that almost all the households suffered from catastrophic health expenditure. The study population, which was already vulnerable owing to their low socio-economic and migrant status was further being forced with into poverty and indebtedness on account of expenditure on illness. This lead to a significant decrease in access to health. National health financing systems should be designed to protect households from financial catastrophe, by reducing out-of-pocket spending.

Keywords: access to healthcare, catastrophic health expenditure, new urban slums, out of pocket expenditure

Procedia PDF Downloads 182
13394 A Sectional Control Method to Decrease the Accumulated Survey Error of Tunnel Installation Control Network

Authors: Yinggang Guo, Zongchun Li

Abstract:

In order to decrease the accumulated survey error of tunnel installation control network of particle accelerator, a sectional control method is proposed. Firstly, the accumulation rule of positional error with the length of the control network is obtained by simulation calculation according to the shape of the tunnel installation-control-network. Then, the RMS of horizontal positional precision of tunnel backbone control network is taken as the threshold. When the accumulated error is bigger than the threshold, the tunnel installation control network should be divided into subsections reasonably. On each segment, the middle survey station is taken as the datum for independent adjustment calculation. Finally, by taking the backbone control points as faint datums, the weighted partial parameters adjustment is performed with the adjustment results of each segment and the coordinates of backbone control points. The subsections are jointed and unified into the global coordinate system in the adjustment process. An installation control network of the linac with a length of 1.6 km is simulated. The RMS of positional deviation of the proposed method is 2.583 mm, and the RMS of the difference of positional deviation between adjacent points reaches 0.035 mm. Experimental results show that the proposed sectional control method can not only effectively decrease the accumulated survey error but also guarantee the relative positional precision of the installation control network. So it can be applied in the data processing of tunnel installation control networks, especially for large particle accelerators.

Keywords: alignment, tunnel installation control network, accumulated survey error, sectional control method, datum

Procedia PDF Downloads 167
13393 Optimal Design for SARMA(P,Q)L Process of EWMA Control Chart

Authors: Yupaporn Areepong

Abstract:

The main goal of this paper is to study Statistical Process Control (SPC) with Exponentially Weighted Moving Average (EWMA) control chart when observations are serially-correlated. The characteristic of control chart is Average Run Length (ARL) which is the average number of samples taken before an action signal is given. Ideally, an acceptable ARL of in-control process should be enough large, so-called (ARL0). Otherwise it should be small when the process is out-of-control, so-called Average of Delay Time (ARL1) or a mean of true alarm. We find explicit formulas of ARL for EWMA control chart for Seasonal Autoregressive and Moving Average processes (SARMA) with Exponential white noise. The results of ARL obtained from explicit formula and Integral equation are in good agreement. In particular, this formulas for evaluating (ARL0) and (ARL1) be able to get a set of optimal parameters which depend on smoothing parameter (λ) and width of control limit (H) for designing EWMA chart with minimum of (ARL1).

Keywords: average run length, optimal parameters, exponentially weighted moving average (EWMA), control chart

Procedia PDF Downloads 533
13392 Numerical Solving Method for Specific Dynamic Performance of Unstable Flight Dynamics with PD Attitude Control

Authors: M. W. Sun, Y. Zhang, L. M. Zhang, Z. H. Wang, Z. Q. Chen

Abstract:

In the realm of flight control, the Proportional- Derivative (PD) control is still widely used for the attitude control in practice, particularly for the pitch control, and the attitude dynamics using PD controller should be investigated deeply. According to the empirical knowledge about the unstable flight dynamics, the control parameter combination conditions to generate sole or finite number of closed-loop oscillations, which is a quite smooth response and is more preferred by practitioners, are presented in analytical or numerical manners. To analyze the effects of the combination conditions of the control parameters, the roots of several polynomials are sought to obtain feasible solutions. These conditions can also be plotted in a 2-D plane which makes the conditions be more explicit by using multiple interval operations. Finally, numerical examples are used to validate the proposed methods and some comparisons are also performed.

Keywords: attitude control, dynamic performance, numerical solving method, interval, unstable flight dynamics

Procedia PDF Downloads 546
13391 Optimum Parameter of a Viscous Damper for Seismic and Wind Vibration

Authors: Soltani Amir, Hu Jiaxin

Abstract:

Determination of optimal parameters of a passive control system device is the primary objective of this study. Expanding upon the use of control devices in wind and earthquake hazard reduction has led to development of various control systems. The advantage of non-linearity characteristics in a passive control device and the optimal control method using LQR algorithm are explained in this study. Finally, this paper introduces a simple approach to determine optimum parameters of a nonlinear viscous damper for vibration control of structures. A MATLAB program is used to produce the dynamic motion of the structure considering the stiffness matrix of the SDOF frame and the non-linear damping effect. This study concluded that the proposed system (variable damping system) has better performance in system response control than a linear damping system. Also, according to the energy dissipation graph, the total energy loss is greater in non-linear damping system than other systems.

Keywords: passive control system, damping devices, viscous dampers, control algorithm

Procedia PDF Downloads 445
13390 Effect of Probiotic (RE3) Supplement on Growth Performance, Diarrhea Incidence and Blood Parameters of N'dama Calves

Authors: Y. Abdul Aziz, E. L. K. Osafo, S. O. Apori, A. Osman

Abstract:

A sixteen week trial was conducted at the Research Farm (Technology Village) of the Department of Animal Science, School of Agriculture, University of Cape Coast, Cape Coast, Ghana. This study sought to investigate the effects of Probiotic (RE3) on growth performance, diarrhea incidence and blood parameters of N’dama calves. Sixteen N’dama calves aged 3 months of an average initial weight of 44.2 kg were randomly assigned to one of four dietary treatments according to their body weight, age, and sex. Treatment 1 (T1) serve as a control animal (No RE3 supplementation). Treatment 2 (T2) receives 0.03 ml RE3 per kg body weight. Treatment 3 (T3) receives 0.06 ml RE3 per kg body weight, and Treatment 4 (T4) also receives 0.09 ml RE3 per kg body weight in a Completely Randomize Design (CRD). There were 4 replicates per treatment. The calves were allowed access to feed and water ad libitum. The body weight of the calves was recorded at the start of the experiment and thereafter regularly at two weeks interval. Weighing was done early morning before the calves are allowed to access feed and water and were also observed in their pens for occurrence of diarrhea and faecal scores recorded. Blood samples were obtained from each calf at the end of the study through jugular vein puncture. Supplementation of RE3 to calves had showed a beneficial effect by reducing the incidence of diarrhea. The highest faecal score was recorded in T1 and the least faecal score was recorded in T3. There was significant difference (P < 0.05) in the faecal score between the treatment group and the control after two weeks of the experiment. There was no significant difference (P > 0.05) in the average daily gain of the animals. Hematological and biochemical indices of calves were all within the normal range except in treatments (1, 3 and 4) which recorded high White Blood Cell (WBC) count with no significant difference (P > 0.05).

Keywords: probiotics (RE3), diarrhea incidence, blood parameters, N’dama calves

Procedia PDF Downloads 152
13389 Minimum Vertices Dominating Set Algorithm for Secret Sharing Scheme

Authors: N. M. G. Al-Saidi, K. A. Kadhim, N. A. Rajab

Abstract:

Over the past decades, computer networks and data communication system has been developing fast, so, the necessity to protect a transmitted data is a challenging issue, and data security becomes a serious problem nowadays. A secret sharing scheme is a method which allows a master key to be distributed among a finite set of participants, in such a way that only certain authorized subsets of participants to reconstruct the original master key. To create a secret sharing scheme, many mathematical structures have been used; the most widely used structure is the one that is based on graph theory (graph access structure). Subsequently, many researchers tried to find efficient schemes based on graph access structures. In this paper, we propose a novel efficient construction of a perfect secret sharing scheme for uniform access structure. The dominating set of vertices in a regular graph is used for this construction in the following way; each vertex represents a participant and each minimum independent dominating subset represents a minimal qualified subset. Some relations between dominating set, graph order and regularity are achieved, and can be used to demonstrate the possibility of using dominating set to construct a secret sharing scheme. The information rate that is used as a measure for the efficiency of such systems is calculated to show that the proposed method has some improved values.

Keywords: secret sharing scheme, dominating set, information rate, access structure, rank

Procedia PDF Downloads 368
13388 Tibial Plateau Fractures During Covid-19 In A Trauma Unit. Impact of Lockdown and The Pressures on the Healthcare Provider

Authors: R. Gwynn, P. Panwalkar, K. Veravalli , M. Tofighi, R. Clement, A. Mofidi

Abstract:

The aim of this study was to access the impact of Covid-19 and lockdown on the incidence, injury pattern, and treatment of tibial plateau fractures in a combined rural and urban population in wales. Methods: Retrospective study was performed to identify tibial plateau fractures in 15-month period of Covid-19 lockdown 15-month period immediately before lockdown. Patient demographics, injury mechanism, injury severity (based on Schatzker classification), and associated injuries, treatment methods, and outcome of fractures in the Covid-19 period was studied. Results: The incidence oftibial plateau fracture was 9 per 100000 during Covid-19, and 8.5 per 100000, and both were similar to previous studies. The average age was 52, and female to male ratio was 1:1 in both control and study group. High energy injury was seen in only 20% of the patients and 35% in the control groups (2=12, p<0025). 14% of the covid-19 population sustained other injuries as opposed 16% in the control group(2=0.09, p>0.95). Lower severity isolated lateral condyle fracturesinjury (Schatzker 1-3) were seen in 40% of fractures this was 60% in the control populations. Higher bicondylar and shaft fractures (Schatzker 5-6) were seen in 60% of the Covid-19 group and 35% in the control groups(2=7.8, p<0.02). Treatment mode was not impacted by Covid-19. The complication rate was low in spite of higher number of complex fractures and the impact of covid-19 pandemic. Conclusion: The associated injuries were similar in spite of a significantly lower mechanism of injury. There were unexpectedly worst tibial plateau fracture based Schatzker classification in the Covid-19 period as compared to the control groups. This was especially relevant for medial condyle and shaft fractures. This was postulated to be caused by reduction in bone density caused by lack of vitamin D and reduction in activity. The treatment mode and outcome was not impacted by the impact of Covid-19 on care for tibial plateau fractures.

Keywords: Covid-19, knee, tibial plateau fracture, trauma

Procedia PDF Downloads 100
13387 Speed Power Control of Double Field Induction Generator

Authors: Ali Mausmi, Ahmed Abbou, Rachid El Akhrif

Abstract:

This research paper aims to reduce the chattering phenomenon due to control by sliding mode control applied on a wind energy conversion system based on the doubly fed induction generator (DFIG). Our goal is to offset the effect of parametric uncertainties and come as close as possible to the dynamic response solicited by the control law in the ideal case and therefore force the active and reactive power generated by the DFIG to accurately follow the reference values which are provided to it. The simulation results using Matlab / Simulink demonstrate the efficiency and performance of the proposed technique while maintaining the simplicity of control by first order sliding mode.

Keywords: control of speed, correction of the equivalent command, induction generator, sliding mode

Procedia PDF Downloads 352
13386 A Framework for the Design of Green Giga Passive Optical Fiber Access Network in Kuwait

Authors: Ali A. Hammadi

Abstract:

In this work, a practical study on a commissioned Giga Passive Optical Network (GPON) fiber to the home access network in Kuwait is presented. The work covers the framework of the conceptual design of the deployed Passive Optical Networks (PONs), access network, optical fiber cable network distribution, technologies, and standards. The work also describes methodologies applied by system engineers for design of Optical Network Terminals (ONTs) and Optical Line Terminals (OLTs) transceivers with respect to the distance, operating wavelengths, splitting ratios. The results have demonstrated and justified the limitation of transmission distance of a PON link in Fiber to The Premises (FTTP) to not exceed 20 km. Optical Time Domain Reflector (OTDR) test has been carried for this project to confirm compliance with International Telecommunication Union (ITU) specifications regarding the total length of the deployed optical cable, total loss in dB, and loss per km in dB/km with respect to the operating wavelengths. OTDR test results with traces for segments of implemented fiber network will be provided and discussed.

Keywords: passive optical networks (PONs), fiber to the premises (FTTx), access network, OTDR

Procedia PDF Downloads 259
13385 Performance Evaluation of Dynamic Signal Control System for Mixed Traffic Conditions

Authors: Aneesh Babu, S. P. Anusha

Abstract:

A dynamic signal control system combines traditional traffic lights with an array of sensors to intelligently control vehicle and pedestrian traffic. The present study focus on evaluating the performance of dynamic signal control systems for mixed traffic conditions. Data collected from four different approaches to a typical four-legged signalized intersection at Trivandrum city in the Kerala state of India is used for the study. Performance of three other dynamic signal control methods, namely (i) Non-sequential method (ii) Webster design for consecutive signal cycle using flow as input, and (iii) dynamic signal control using RFID delay as input, were evaluated. The evaluation of the dynamic signal control systems was carried out using a calibrated VISSIM microsimulation model. Python programming was used to integrate the dynamic signal control algorithm through the COM interface in VISSIM. The intersection delay obtained from different dynamic signal control methods was compared with the delay obtained from fixed signal control. Based on the study results, it was observed that the intersection delay was reduced significantly by using dynamic signal control methods. The dynamic signal control method using delay from RFID sensors resulted in a higher percentage reduction in delay and hence is a suitable choice for implementation under mixed traffic conditions. The developed dynamic signal control strategies can be implemented in ITS applications under mixed traffic conditions.

Keywords: dynamic signal control, intersection delay, mixed traffic conditions, RFID sensors

Procedia PDF Downloads 81