Search results for: security analysis
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 29100

Search results for: security analysis

24870 Making Heat Pumps More Compatible with Environmental and Climatic Conditions

Authors: Erol Sahin, Nesrin Adiguzel

Abstract:

In this study, the effects of air temperature and relative humidity on the operation of the heat pump were examined experimentally. The results were analyzed in an energy and exergetic way. Two heat pumps were used in the experimental system established for experimental analysis. With the first heat pump, the relative humidity and temperature of atmospheric air are reduced. The air at low humidity and temperature is given heat and water vapor to the desired extent on the channel that reaches the other heat pump. Effects of the air reaching the desired humidity and temperature in the 2nd heat pump; temperature, humidity, pressure, flow, and current are detected by meters. The measured values and the exergy yield and thermodynamic favor ratios of the system and its components were determined. In this way, the effects of temperature and relative humidity change in the heat pump and components were tried to be revealed. Relative humidity in the air caused a significant increase in the loss of exergy in the evaporator. This has shown that cooling machines experience greater exergy in areas with high relative humidity. The highest COPSM values were determined to be at 30% and 40%, which is the least relative humidity values. The results showed that heat pump exergy efficiency was affected by increased temperature and relative humidity.

Keywords: relative humidity, effects of relative humidity on heat pumps, exergy analysis, exergy analysis in heat pumps, exergy efficiency

Procedia PDF Downloads 110
24869 Cryptic Diversity: Identifying Two Morphologically Similar Species of Invasive Apple Snails in Peninsular Malaysia

Authors: Suganiya Rama Rao, Yoon-Yen Yow, Thor-Seng Liew, Shyamala Ratnayeke

Abstract:

Invasive snails in the genus Pomacea have spread across Southeast Asia including Peninsular Malaysia. Apart from significant economic costs to wetland crops, very little is known about the snails’ effects on native species, and wetland function through their alteration of macrophyte communities. This study was conducted to establish diagnostic characteristics of Pomacea species in the Malaysian environment using genetic and morphological criteria. Snails were collected from eight localities in northern and central regions of Peninsular Malaysia. The mitochondrial COI gene of 52 adult snails was amplified and sequenced. Maximum likelihood analysis was used to analyse species identity and assess phylogenetic relationships among snails from different geographic locations. Shells of the two species were compared using geometric morphometric analysis and covariance analyses. Shell height accounted for most of the observed variation between P. canaliculata and P. maculata, with the latter possessing a smaller mean ratio of shell height: aperture height (p < 0.0001) and shell height to shell width (give p < 0.0001). Genomic and phylogenetic analysis demonstrated the presence of two monophyletic taxa, P. canaliculata and P. maculata, in Peninsular Malaysia samples. P. maculata co-occurred with P. canaliculata in 5 localities, but samples from 3 localities contained only P. canaliculata. This study is the first to confirm the presence of two of the most invasive species of Pomacea in Peninsular Malaysia using a genomic approach. P. canaliculata appears to be the more widespread species. Despite statistical differences, both quantitative and qualitative morphological characteristics demonstrate much interspecific overlap and intraspecific variability; thus morphology alone cannot reliably verify species identity. Molecular techniques for distinguishing between these two highly invasive Pomacea species are needed to understand their specific ecological niches and develop effective protocols for their management.

Keywords: Pomacea canaliculata, Pomacea maculata, invasive species, phylog enetic analysis, geometric morphometric analysis

Procedia PDF Downloads 248
24868 Farmers Perception on the Level of Participation in Agricultural Project: The Case of a Community Garden Project in Imphendhle Municipality of Kwazulu-Natal Province, South Africa

Authors: Jorine T. Ndoro, Marietjie Van Der Merwe

Abstract:

Rural poverty remains a critical challenge in most developing countries and the participation of farmers in agricultural projects has taken a key role in development initiatives. Farmers’ participation in agricultural initiatives is crucial towards poverty alleviation and food security. Farmers’ involvement directly contributes towards sustainable agricultural development and livelihoods. This study focuses on investigating the perceptions of farmers’ participation in a community garden project. The study involved farmers belonging to community garden project in Imphendhle municipality in Mgungundlvu district of KwaZulu-Natal in South Africa. The study followed a qualitative research design using an interpretive research paradigm. The data was collected through conducting in-depth semi-structured interviews and a focus group was conducted with the eight farmers belonging to the community garden project. The findings show that the farmers are not involved in decision makings in the project. The farmers are passive participants. Participation of the farmers was mainly to carry out the activities from the extension officers. The study recommends that farmers be actively involved in projects and programmes introduced in their communities. Farmers’ active participation contributes to the sustainability of the projects through a sense of ownership.

Keywords: farmers, participation, agricultural extension, community garden

Procedia PDF Downloads 244
24867 Applications of Internet of Things (IoTs) for Information Resources and Services: Survey of Academic Librarians

Authors: Sultan Aldaihani, Eiman Al-Fadhli

Abstract:

Internet of Things (IoTs) expected to change the future of academic libraries operations. It enables academic libraries to be smart libraries through, for example, the connection of the physical objects with the Internet. The implementation of IoTs will improve library resources and services. Therefore, this research aims to investigate the applications of Internet of Things (IoTs) for information resources and services. Understanding perceptions of academic librarians toward IoTs before adopting of such applications will assist decision-makers in academic libraries in their strategic planning. An online questionnaire was administered to academic librarians at Kuwait University. The findings of this study showed that academic librarians have awareness for the IoTs. They have strongly believed that the IoTs contributes to the development of information resources, services, and understanding of the user's information behavior. Identifying new applications of the IoTs in libraries was the highest possible reason for future adoption. Academic librarians indicated that lack of privacy and data penetration were the greatest problem in their future adoption of IoTs. Academic libraries need to implement the IoTs for enhancing their information resources and services. One important step in the success of future adoption is to conduct awareness and training programs for academic librarians. They also need to maintain higher security and privacy measurements in their implementation for the IoTs. This study will assist academic libraries in accommodating this technology.

Keywords: academic libraries, internet of things, information resources, information services

Procedia PDF Downloads 132
24866 Genome-Wide Analysis of BES1/BZR1 Gene Family in Five Plant Species

Authors: Jafar Ahmadi, Zhohreh Asiaban, Sedigheh Fabriki Ourang

Abstract:

Brassinosteroids (BRs) regulate cell elongation, vascular differentiation, senescence and stress responses. BRs signal through the BES1/BZR1 family of transcription factors, which regulate hundreds of target genes involved in this pathway. In this research a comprehensive genome-wide analysis was carried out in BES1/BZR1 gene family in Arabidopsis thaliana, Cucumis sativus, Vitis vinifera, Glycin max, and Brachypodium distachyon. Specifications of the desired sequences, dot plot and hydropathy plot were analyzed in the protein and genome sequences of five plant species. The maximum amino acid length was attributed to protein sequence Brdic3g with 374aa and the minimum amino acid length was attributed to protein sequence Gm7g with 163aa. The maximum Instability index was attributed to protein sequence AT1G19350 equal with 79.99 and the minimum Instability index was attributed to protein sequence Gm5g equal with 33.22. Aliphatic index of these protein sequences ranged from 47.82 to 78.79 in Arabidopsis thaliana, 49.91 to 57.50 in Vitis vinifera, 55.09 to 82.43 in Glycin max, 54.09 to 54.28 in Brachypodium distachyon 55.36 to 56.83 in Cucumis sativus. Overall, data obtained from our investigation contributes a better understanding of the complexity of the BES1/BZR1 gene family and provides the first step towards directing future experimental designs to perform systematic analysis of the functions of the BES1/BZR1 gene family.

Keywords: BES1/BZR1, brassinosteroids, phylogenetic analysis, transcription factor

Procedia PDF Downloads 326
24865 Multi-Criteria Decision Approach to Performance Measurement Techniques Data Envelopment Analysis: Case Study of Kerman City’s Parks

Authors: Ali A. Abdollahi

Abstract:

During the last several decades, scientists have consistently applied Multiple Criteria Decision-Making methods in making decisions about multi-faceted, complicated subjects. While making such decisions and in order to achieve more accurate evaluations, they have regularly used a variety of criteria instead of applying just one Optimum Evaluation Criterion. The method presented here utilizes both ‘quantity’ and ‘quality’ to assess the function of the Multiple-Criteria method. Applying Data envelopment analysis (DEA), weighted aggregated sum product assessment (WASPAS), Weighted Sum Approach (WSA), Analytic Network Process (ANP), and Charnes, Cooper, Rhodes (CCR) methods, we have analyzed thirteen parks in Kerman city. It further indicates that the functions of WASPAS and WSA are compatible with each other, but also that their deviation from DEA is extensive. Finally, the results for the CCR technique do not match the results of the DEA technique. Our study indicates that the ANP method, with the average rate of 1/51, ranks closest to the DEA method, which has an average rate of 1/49.

Keywords: multiple criteria decision making, Data envelopment analysis (DEA), Charnes Cooper Rhodes (CCR), Weighted Sum Approach (WSA)

Procedia PDF Downloads 198
24864 Simulation-Based Optimization Approach for an Electro-Plating Production Process Based on Theory of Constraints and Data Envelopment Analysis

Authors: Mayada Attia Ibrahim

Abstract:

Evaluating and developing the electroplating production process is a key challenge in this type of process. The process is influenced by several factors such as process parameters, process costs, and production environments. Analyzing and optimizing all these factors together requires extensive analytical techniques that are not available in real-case industrial entities. This paper presents a practice-based framework for the evaluation and optimization of some of the crucial factors that affect the costs and production times associated with this type of process, energy costs, material costs, and product flow times. The proposed approach uses Design of Experiments, Discrete-Event Simulation, and Theory of Constraints were respectively used to identify the most significant factors affecting the production process and simulate a real production line to recognize the effect of these factors and assign possible bottlenecks. Several scenarios are generated as corrective strategies for improving the production line. Following that, data envelopment analysis CCR input-oriented DEA model is used to evaluate and optimize the suggested scenarios.

Keywords: electroplating process, simulation, design of experiment, performance optimization, theory of constraints, data envelopment analysis

Procedia PDF Downloads 85
24863 Effects of Virtual Reality on Relieving Postoperative Pain in Surgical Patients: A Systematic Review and Meta-Analysis

Authors: Lingyu Ding, Hongxia Hua, Hanfei Zhu, Jinling Lu, Qin Xu

Abstract:

Background: Postoperative pain is a prevalent problem leading to many adverse outcomes in surgical patients. Virtual reality (VR) is an emerging non-pharmacological method of postoperative pain relief, but the effects of it are not clear. This review aimed to explore the effects of VR on relieving postoperative pain. Methods: We searched PubMed, Embase, Web of Science, and other databases from inception to November 2019 to get the eligible studies. Meta-analyses were conducted to compare VR and usual care for relieving postoperative pain. Subgroup analyses and sensitivity analyses were performed to explain the heterogeneity. Results: Overall, 8 randomized control trials (RCTs) enrolling 723 participants were included. Our results demonstrated that the patients receiving the VR intervention had lower postoperative pain scores than those receiving the usual care. One subgroup analysis revealed that VR could relieve postoperative pain both in minor surgery and major surgery. Another subgroup analysis demonstrated a significant reduction in postoperative pain among patients receiving VR during the intraoperative and the postoperative periods. However, there was no significant postoperative pain relief when receiving VR during the preoperative period. Additionally, significant improvements in postoperative satisfaction were reported in two studies. However, another two studies included found that VR could not affect physiological parameters related to pain. Conclusion: Applying VR can relieve postoperative pain effectively. The type of surgery and timing of using VR are the main sources of heterogeneity. More rigorous studies about the relationship between VR and postoperative pain relief will be needed.

Keywords: meta-analysis, postoperative pain, systematic review, virtual reality

Procedia PDF Downloads 125
24862 Resale Housing Development Board Price Prediction Considering Covid-19 through Sentiment Analysis

Authors: Srinaath Anbu Durai, Wang Zhaoxia

Abstract:

Twitter sentiment has been used as a predictor to predict price values or trends in both the stock market and housing market. The pioneering works in this stream of research drew upon works in behavioural economics to show that sentiment or emotions impact economic decisions. Latest works in this stream focus on the algorithm used as opposed to the data used. A literature review of works in this stream through the lens of data used shows that there is a paucity of work that considers the impact of sentiments caused due to an external factor on either the stock or the housing market. This is despite an abundance of works in behavioural economics that show that sentiment or emotions caused due to an external factor impact economic decisions. To address this gap, this research studies the impact of Twitter sentiment pertaining to the Covid-19 pandemic on resale Housing Development Board (HDB) apartment prices in Singapore. It leverages SNSCRAPE to collect tweets pertaining to Covid-19 for sentiment analysis, lexicon based tools VADER and TextBlob are used for sentiment analysis, Granger Causality is used to examine the relationship between Covid-19 cases and the sentiment score, and neural networks are leveraged as prediction models. Twitter sentiment pertaining to Covid-19 as a predictor of HDB price in Singapore is studied in comparison with the traditional predictors of housing prices i.e., the structural and neighbourhood characteristics. The results indicate that using Twitter sentiment pertaining to Covid19 leads to better prediction than using only the traditional predictors and performs better as a predictor compared to two of the traditional predictors. Hence, Twitter sentiment pertaining to an external factor should be considered as important as traditional predictors. This paper demonstrates the real world economic applications of sentiment analysis of Twitter data.

Keywords: sentiment analysis, Covid-19, housing price prediction, tweets, social media, Singapore HDB, behavioral economics, neural networks

Procedia PDF Downloads 97
24861 Kinetic Analysis for Assessing Gait Disorders in Muscular Dystrophy Disease

Authors: Mehdi Razeghi

Abstract:

Background: The purpose of this case series was to quantify gait to study muscular dystrophy disease. In this research, the quantitative differences between normal and waddling gaits were assessed by force plate analysis. Methods: Nineteen myopathy patients and twenty normal subjects serving as the control group participated in this research. In this study, quantitative analyses of gait have been used to investigate the differences between the mobility of normal subjects and myopathy patients. This study was carried out at the Iranian Muscular Dystrophy Association in Boali Hospital, Tehran, Iran, from October 2015 to July 2020. Patient data were collected from Iranian Muscular Dystrophy Association members. individuals signed an informed consent form approved by the ethics committee of the Azad University. All of the gait tests were performed using a Kistler force platform. Participants walked at a self-selected speed, barefoot, independently, and without assistive devices. Results: Our findings indicate that there were no significant differences between the patients and the control group in the anterior-posterior components of the ground reaction forces; however, there were considerable differences in the force components between the groups in the medial-lateral and vertical directions of the ground reaction force. In addition, there were significant differences in the time parameters between the groups in the vertical and medial-lateral directions.

Keywords: biomechanics, force plate analysis, gait disorder, ground reaction force, kinetic analysis, myopathy disease, rehabilitation engineering

Procedia PDF Downloads 71
24860 The Relevance of Intellectual Capital: An Analysis of Spanish Universities

Authors: Yolanda Ramirez, Angel Tejada, Agustin Baidez

Abstract:

In recent years, the intellectual capital reporting in higher education institutions has been acquiring progressive importance worldwide. Intellectual capital approaches becomes critical at universities, mainly due to the fact that knowledge is the main output as well as input in these institutions. Universities produce knowledge, either through scientific and technical research (the results of investigation, publications, etc.) or through teaching (students trained and productive relationships with their stakeholders). The purpose of the present paper is to identify the intangible elements about which university stakeholders demand most information. The results of a study done at Spanish universities are used to see which groups of universities have stakeholders who are more proactive to the disclosure of intellectual capital.

Keywords: intellectual capital, universities, Spain, cluster analysis

Procedia PDF Downloads 496
24859 Dynamics of Investor's Behaviour: An Analytical Survey Study in Indian Securities Market

Authors: Saurabh Agarwal

Abstract:

This paper attempts to formalise the effect of demographic variables like marital status, gender, occupation and age on the source of investment advice which, in turn, affect the herd behaviour of investors and probability of investment in near future. Further, postulations have been made for most preferred investment option and purpose of saving and source of investment. Impact of theoretical analysis on choice among investment alternatives has also been investigated. The analysis contributes to understanding the different investment choices made by households in India. The insights offered in the paper indirectly contribute in uncovering the various unexplained asset pricing puzzles.

Keywords: portfolio choice, investment decisions, investor’s behaviour, Indian securities market

Procedia PDF Downloads 356
24858 Analysis of the IEEE 802.15.4 MAC Parameters to Achive Lower Packet Loss Rates

Authors: Imen Bouazzi

Abstract:

The IEEE-802.15.4 standard utilizes the CSMA-CA mechanism to control nodes access to the shared wireless communication medium. It is becoming the popular choice for various applications of surveillance and control used in wireless sensor network (WSN). The benefit of this standard is evaluated regarding of the packet loss probability who depends on the configuration of IEEE 802.15.4 MAC parameters and the traffic load. Our exigency is to evaluate the effects of various configurable MAC parameters on the performance of beaconless IEEE 802.15.4 networks under different traffic loads, static values of IEEE 802.15.4 MAC parameters (macMinBE, macMaxCSMABackoffs, and macMaxFrame Retries) will be evaluated. To performance analysis, we use ns-2[2] network simulator.

Keywords: WSN, packet loss, CSMA/CA, IEEE-802.15.4

Procedia PDF Downloads 324
24857 A Meta Analysis of the Recent Work-Related Research of BEC-Teachers in the Graduate Programs of the Selected HEIs in Region I and CAR

Authors: Sherelle Lou Sumera Icutan, Sheila P. Cayabyab, Mary Jane Laruan, Paulo V. Cenas, Agustina R. Tactay

Abstract:

This study critically analyzed the recent theses and dissertations of the Basic Education Curriculum (BEC) teachers who finished their graduate programs in selected higher educational institutions in Region I and CAR to be able to come up with a unified result from the varied results of the analyzed research works. All theses and dissertations completed by the educators/teachers/school personnel in the secondary and elementary public and private schools in Region 1 and CAR from AY 2003–2004 to AY 2007–2008 were classified first–as to work or non-work related; second–as to the different aspects of the curriculum: implementation, content, instructional materials, assessment instruments, learning, teaching, and others; third–as to being eligible for meta-analysis or not. Only studies found eligible for meta-analysis were subjected to the procedure. Aside from documentary analysis, the statistical treatments used in meta-analysis include the standardized effect size, Pearson’s correlation (r), the chi-square test of homogeneity and the inverse of the Fisher transformation. This study found out that the BEC-teachers usually probe on work-related researchers with topics that are focused on the learning performances of the students and on factors related to teaching. The development of instructional materials and assessment of implemented programs are also equally explored. However, there are only few researches on content and assessment instrument. Research findings on the areas of learning and teaching are the only aspects that are meta-analyzable. The research findings across studies in Region I and CAR of BEC teachers that focused on similar variables correlated to teaching do not vary significantly. On the contrary, research findings across studies in Region I and CAR that focused on variables correlated to learning performance significantly vary. Within each region, variations on the findings of research works related to learning performance that considered similar variables still exist. The combined finding on the effect size or relationship of the variables that are correlated to learning performance are low which means that effect is small but definite while the combined findings on the relationship of the variables correlated to teaching are slight or almost negligible.

Keywords: meta-analysis, BEC teachers, work-related research,

Procedia PDF Downloads 411
24856 Multichannel Analysis of the Surface Waves of Earth Materials in Some Parts of Lagos State, Nigeria

Authors: R. B. Adegbola, K. F. Oyedele, L. Adeoti

Abstract:

We present a method that utilizes Multi-channel Analysis of Surface Waves, which was used to measure shear wave velocities with a view to establishing the probable causes of road failure, subsidence and weakening of structures in some Local Government Area, Lagos, Nigeria. Multi channel Analysis of Surface waves (MASW) data were acquired using 24-channel seismograph. The acquired data were processed and transformed into two-dimensional (2-D) structure reflective of depth and surface wave velocity distribution within a depth of 0–15m beneath the surface using SURFSEIS software. The shear wave velocity data were compared with other geophysical/borehole data that were acquired along the same profile. The comparison and correlation illustrates the accuracy and consistency of MASW derived-shear wave velocity profiles. Rigidity modulus and N-value were also generated. The study showed that the low velocity/very low velocity are reflective of organic clay/peat materials and thus likely responsible for the failed, subsidence/weakening of structures within the study areas.

Keywords: seismograph, road failure, rigidity modulus, N-value, subsidence

Procedia PDF Downloads 349
24855 Progressive Collapse of Cooling Towers

Authors: Esmaeil Asadzadeh, Mehtab Alam

Abstract:

Well documented records of the past failures of the structures reveals that the progressive collapse of structures is one of the major reasons for dramatic human loss and economical consequences. Progressive collapse is the failure mechanism in which the structure fails gradually due to the sudden removal of the structural elements. The sudden removal of some structural elements results in the excessive redistributed loads on the others. This sudden removal may be caused by any sudden loading resulted from local explosion, impact loading and terrorist attacks. Hyperbolic thin walled concrete shell structures being an important part of nuclear and thermal power plants are always prone to such terrorist attacks. In concrete structures, the gradual failure would take place by generation of initial cracks and its propagation in the supporting columns along with the tower shell leading to the collapse of the entire structure. In this study the mechanism of progressive collapse for such high raised towers would be simulated employing the finite element method. The aim of this study would be providing clear conceptual step-by-step descriptions of various procedures for progressive collapse analysis using commercially available finite element structural analysis software’s, with the aim that the explanations would be clear enough that they will be readily understandable and will be used by practicing engineers. The study would be carried out in the following procedures: 1. Provide explanations of modeling, simulation and analysis procedures including input screen snapshots; 2. Interpretation of the results and discussions; 3. Conclusions and recommendations.

Keywords: progressive collapse, cooling towers, finite element analysis, crack generation, reinforced concrete

Procedia PDF Downloads 473
24854 Coping Strategies among Caregivers of Children with Autism Spectrum Disorders: A Cluster Analysis

Authors: Noor Ismael, Lisa Mische Lawson, Lauren Little, Murad Moqbel

Abstract:

Background/Significance: Caregivers of children with Autism Spectrum Disorders (ASD) develop coping mechanisms to overcome daily challenges to successfully parent their child. There is variability in coping strategies used among caregivers of children with ASD. Capturing homogeneity among such variable groups may help elucidate targeted intervention approaches for caregivers of children with ASD. Study Purpose: This study aimed to identify groups of caregivers of children with ASD based on coping mechanisms, and to examine whether there are differences among these groups in terms of strain level. Methods: This study utilized a secondary data analysis, and included survey responses of 273 caregivers of children with ASD. Measures consisted of the COPE Inventory and the Caregiver Strain Questionnaire. Data analyses consisted of cluster analysis to group caregiver coping strategies, and analysis of variance to compare the caregiver coping groups on strain level. Results: Cluster analysis results showed four distinct groups with different combinations of coping strategies: Social-Supported/Planning (group one), Spontaneous/Reactive (group two), Self-Supporting/Reappraisal (group three), and Religious/Expressive (group four). Caregivers in group one (Social-Supported/Planning) demonstrated significantly higher levels than the remaining three groups in the use of the following coping strategies: planning, use of instrumental social support, and use of emotional social support, relative to the other three groups. Caregivers in group two (Spontaneous/Reactive) used less restraint relative to the other three groups, and less suppression of competing activities relative to the other three groups as coping strategies. Also, group two showed significantly lower levels of religious coping as compared to the other three groups. In contrast to group one, caregivers in group three (Self-Supporting/Reappraisal) demonstrated significantly lower levels of the use of instrumental social support and the use of emotional social support relative to the other three groups. Additionally, caregivers in group three showed more acceptance, positive reinterpretation and growth coping strategies. Caregivers in group four (Religious/Expressive) demonstrated significantly higher levels of religious coping relative to the other three groups and utilized more venting of emotions strategies. Analysis of Variance results showed no significant differences between the four groups on the strain scores. Conclusions: There are four distinct groups with different combinations of coping strategies: Social-Supported/Planning, Spontaneous/Reactive, Self-Supporting/Reappraisal, and Religious/Expressive. Each caregiver group engaged in a combination of coping strategies to overcome the strain of caregiving.

Keywords: autism, caregivers, cluster analysis, coping strategies

Procedia PDF Downloads 271
24853 Magnetic Treatment of Irrigation Water and Its Effect on Water Salinity

Authors: Muhammad Waqar Ashraf

Abstract:

The influence of magnetic field on the structure of water and aqueous solutions are similar and can alter the physical and chemical properties of water-dispersed systems. With the application of magnetic field, hydration of salt ions and other impurities slides down and improve the possible technological characteristics of the water. Magnetic field can enhance the characteristic of water i.e. better salt solubility, kinetic changes in salt crystallization, accelerated coagulation, etc. Gulf countries are facing critical problem due to depletion of water resources and increasing food demands to cover the human needs; therefore water shortage is being increasingly accepted as a major limitation for increased agricultural production and food security. In arid and semi-arid regions sustainable agricultural development is influenced to a great extent by water quality that might be used economically and effectively in developing agriculture programs. In the present study, the possibility of using magnetized water to desalinate the soil is accounted for the enhanced dissolving capacity of the magnetized water. Magnetic field has been applied to treat brackish water. The study showed that the impact of magnetic field on saline water is sustained up to three hours (with and without shaking). These results suggest that even low magnetic field can decrease the electrical conductivity and total dissolved solids which are good for the removal of salinity from the irrigated land by using magnetized water.

Keywords: magnetic treatment, saline water, hardness of water, removal of salinity

Procedia PDF Downloads 479
24852 Spectrophotometric Evaluation of Custom Microalgae-Based Bioink Formulations for Optimized Green Bioprinting

Authors: Olubusuyi Ayowole, Bashir Khoda

Abstract:

Green bioprinting, from the context of merging 3D bioprinting with microalgae cell organization, holds promise for industrial-scale optimization. This study employs spectrophotometric analysis to explore post-bioprinting cell growth density variation within hybrid hydrogel biomaterial scaffolds. Three hydrogel biomaterials—Alginic acid sodium salt (ALGINATE), Nanofibrillated Cellulose (NFC) – TEMPO, and CarboxyMethyl Cellulose (CMC)—are chosen for their scaffolding capabilities. Bioink development and analysis of their impact on cell proliferation and morphology are conducted. Chlorella microalgae cell growth within hydrogel compositions is probed using absorbance measurements, with additional assessment of shear thinning properties. Notably, NFC exhibits reduced shear thinning compared to CMC. Results reveal that while mono-hydrogel substrates with pronounced adhesion inhibit Chlorella cell proliferation, Alginate fosters increased cell concentration alongside a slight viscosity rise.

Keywords: green bioprinting, 3d bioprinting, microalgae cell, hybrid hydrogel scaffolds, spectrophotometric analysis, bioink development, shear thinning properties

Procedia PDF Downloads 10
24851 Effect of Springback Analysis on Influences of the Steel Demoulding Using FEM

Authors: Byeong-Sam Kim, Jongmin Park

Abstract:

The present work is motivated by the industrial challenge to produce complex composite shapes cost-effectively. The model used an anisotropical thermoviscoelastic is analyzed by an implemented finite element solver. The stress relaxation can be constructed by Prony series for the nonlinear thermoviscoelastic model. The calculation of process induced internal stresses relaxation during the cooling stage of the manufacturing cycle was carried out by the spring back phenomena observed from the part containing a cylindrical segment. The finite element results obtained from the present formulation are compared with experimental data, and the results show good correlations.

Keywords: thermoviscoelastic, springback phenomena, FEM analysis, thermoplastic composite structures

Procedia PDF Downloads 349
24850 Intrusion Detection in Computer Networks Using a Hybrid Model of Firefly and Differential Evolution Algorithms

Authors: Mohammad Besharatloo

Abstract:

Intrusion detection is an important research topic in network security because of increasing growth in the use of computer network services. Intrusion detection is done with the aim of detecting the unauthorized use or abuse in the networks and systems by the intruders. Therefore, the intrusion detection system is an efficient tool to control the user's access through some predefined regulations. Since, the data used in intrusion detection system has high dimension, a proper representation is required to show the basis structure of this data. Therefore, it is necessary to eliminate the redundant features to create the best representation subset. In the proposed method, a hybrid model of differential evolution and firefly algorithms was employed to choose the best subset of properties. In addition, decision tree and support vector machine (SVM) are adopted to determine the quality of the selected properties. In the first, the sorted population is divided into two sub-populations. These optimization algorithms were implemented on these sub-populations, respectively. Then, these sub-populations are merged to create next repetition population. The performance evaluation of the proposed method is done based on KDD Cup99. The simulation results show that the proposed method has better performance than the other methods in this context.

Keywords: intrusion detection system, differential evolution, firefly algorithm, support vector machine, decision tree

Procedia PDF Downloads 74
24849 Effective Factors on Self-Care in Women with Osteoporosis: A Study with Content Analysis Approach

Authors: Arezoo Fallahi, Siamak Derakhshan, Parvaneh Taymoori, Babak Nematshahrbabaki

Abstract:

Background: Osteoporosis, the most common metabolic bone disease, is an important health care issue. Not only the cost of disease is high but also is one of the causes of disability and mortality and effect on quality of life. Although self-care is effective on disease, s control and treatment but still effective factors on self-care of patient, s viewpoint have not been survey. The aim of this study was to explore effective factors on self-care in women with osteoporosis. Materials and methods: This study was done by conventional content analysis approach in year 2014. Through purposeful sampling 15 women referred to bone mass densitometry centers participated in this study. Inclusion criteria were: Women older than 50 years old with osteoporosis, final diagnosis of osteoporosis for over six –month period, T-score index below -2.5 (lower back or hip), drug use by patients with a physician’s prescription, ability in speaking and attending to participate in the study. Data was collected by face to face and group semi-structure deep interviews and analyzed via content analysis method. To support of rigor of data, criteria credibility, confirmability and transferability were used. Results: during data analysis five categories developed: “hope and disability in the face of illness”, “mutual roles of physician”, “role of family” and “administrative centers and organizations”. To perform self-care behaviors, the participations of this study emphasized on pay attention to their own healthy, regarding patients' rights by physician, pay attention to women's health by men, and the role of media especially radio and television. Conclusion: the finding of the study showed that women’s responsibility with osteoporosis for their health is not a factor but it is multifactorial. Increasing life expectancy in patients, attention to patients needs by physician, increasing health promotion programs in the media and enhancing role of family may provide conditions and infrastructure to empowerment women in doing self-care behavior.

Keywords: women, osteoporosis, self-care, content analysis

Procedia PDF Downloads 448
24848 High-Performance Thin-layer Chromatography (HPTLC) Analysis of Multi-Ingredient Traditional Chinese Medicine Supplement

Authors: Martin Cai, Khadijah B. Hashim, Leng Leo, Edmund F. Tian

Abstract:

Analysis of traditional Chinese medicinal (TCM) supplements has always been a laborious task, particularly in the case of multi‐ingredient formulations. Traditionally, herbal extracts are analysed using one or few markers compounds. In the recent years, however, pharmaceutical companies are introducing health supplements of TCM active ingredients to cater to the needs of consumers in the fast-paced society in this age. As such, new problems arise in the aspects of composition identification as well as quality analysis. In most cases of products or supplements formulated with multiple TCM herbs, the chemical composition, and nature of each raw material differs greatly from the others in the formulation. This results in a requirement for individual analytical processes in order to identify the marker compounds in the various botanicals. Thin-layer Chromatography (TLC) is a simple, cost effective, yet well-regarded method for the analysis of natural products, both as a Pharmacopeia-approved method for identification and authentication of herbs, and a great analytical tool for the discovery of chemical compositions in herbal extracts. Recent technical advances introduced High-Performance TLC (HPTLC) where, with the help of automated equipment and improvements on the chromatographic materials, both the quality and reproducibility are greatly improved, allowing for highly standardised analysis with greater details. Here we report an industrial consultancy project with ONI Global Pte Ltd for the analysis of LAC Liver Protector, a TCM formulation aimed at improving liver health. The aim of this study was to identify 4 key components of the supplement using HPTLC, following protocols derived from Chinese Pharmacopeia standards. By comparing the TLC profiles of the supplement to the extracts of the herbs reported in the label, this project proposes a simple and cost-effective analysis of the presence of the 4 marker compounds in the multi‐ingredient formulation by using 4 different HPTLC methods. With the increasing trend of small and medium-sized enterprises (SMEs) bringing natural products and health supplements into the market, it is crucial that the qualities of both raw materials and end products be well-assured for the protection of consumers. With the technology of HPTLC, science can be incorporated to help SMEs with their quality control, thereby ensuring product quality.

Keywords: traditional Chinese medicine supplement, high performance thin layer chromatography, active ingredients, product quality

Procedia PDF Downloads 265
24847 Detecting Venomous Files in IDS Using an Approach Based on Data Mining Algorithm

Authors: Sukhleen Kaur

Abstract:

In security groundwork, Intrusion Detection System (IDS) has become an important component. The IDS has received increasing attention in recent years. IDS is one of the effective way to detect different kinds of attacks and malicious codes in a network and help us to secure the network. Data mining techniques can be implemented to IDS, which analyses the large amount of data and gives better results. Data mining can contribute to improving intrusion detection by adding a level of focus to anomaly detection. So far the study has been carried out on finding the attacks but this paper detects the malicious files. Some intruders do not attack directly, but they hide some harmful code inside the files or may corrupt those file and attack the system. These files are detected according to some defined parameters which will form two lists of files as normal files and harmful files. After that data mining will be performed. In this paper a hybrid classifier has been used via Naive Bayes and Ripper classification methods. The results show how the uploaded file in the database will be tested against the parameters and then it is characterised as either normal or harmful file and after that the mining is performed. Moreover, when a user tries to mine on harmful file it will generate an exception that mining cannot be made on corrupted or harmful files.

Keywords: data mining, association, classification, clustering, decision tree, intrusion detection system, misuse detection, anomaly detection, naive Bayes, ripper

Procedia PDF Downloads 405
24846 Proteomic Analysis of Excretory Secretory Antigen (ESA) from Entamoeba histolytica HM1: IMSS

Authors: N. Othman, J. Ujang, M. N. Ismail, R. Noordin, B. H. Lim

Abstract:

Amoebiasis is caused by the Entamoeba histolytica and still endemic in many parts of the tropical region, worldwide. Currently, there is no available vaccine against amoebiasis. Hence, there is an urgent need to develop a vaccine. The excretory secretory antigen (ESA) of E. histolytica is a suitable biomarker for the vaccine candidate since it can modulate the host immune response. Hence, the objective of this study is to identify the proteome of the ESA towards finding suitable biomarker for the vaccine candidate. The non-gel based and gel-based proteomics analyses were performed to identify proteins. Two kinds of mass spectrometry with different ionization systems were utilized i.e. LC-MS/MS (ESI) and MALDI-TOF/TOF. Then, the functional proteins classification analysis was performed using PANTHER software. Combination of the LC -MS/MS for the non-gel based and MALDI-TOF/TOF for the gel-based approaches identified a total of 273 proteins from the ESA. Both systems identified 29 similar proteins whereby 239 and 5 more proteins were identified by LC-MS/MS and MALDI-TOF/TOF, respectively. Functional classification analysis showed the majority of proteins involved in the metabolic process (24%), primary metabolic process (19%) and protein metabolic process (10%). Thus, this study has revealed the proteome the E. histolytica ESA and the identified proteins merit further investigations as a vaccine candidate.

Keywords: E. histolytica, ESA, proteomics, biomarker

Procedia PDF Downloads 328
24845 Reliability and Maintainability Optimization for Aircraft’s Repairable Components Based on Cost Modeling Approach

Authors: Adel A. Ghobbar

Abstract:

The airline industry is continuously challenging how to safely increase the service life of the aircraft with limited maintenance budgets. Operators are looking for the most qualified maintenance providers of aircraft components, offering the finest customer service. Component owner and maintenance provider is offering an Abacus agreement (Aircraft Component Leasing) to increase the efficiency and productivity of the customer service. To increase the customer service, the current focus on No Fault Found (NFF) units must change into the focus on Early Failure (EF) units. Since the effect of EF units has a significant impact on customer satisfaction, this needs to increase the reliability of EF units at minimal cost, which leads to the goal of this paper. By identifying the reliability of early failure (EF) units with regards to No Fault Found (NFF) units, in particular, the root cause analysis with an integrated cost analysis of EF units with the use of a failure mode analysis tool and a cost model, there will be a set of EF maintenance improvements. The data used for the investigation of the EF units will be obtained from the Pentagon system, an Enterprise Resource Planning (ERP) system used by Fokker Services. The Pentagon system monitors components, which needs to be repaired from Fokker aircraft owners, Abacus exchange pool, and commercial customers. The data will be selected on several criteria’s: time span, failure rate, and cost driver. When the selected data has been acquired, the failure mode and root cause analysis of EF units are initiated. The failure analysis approach tool was implemented, resulting in the proposed failure solution of EF. This will lead to specific EF maintenance improvements, which can be set-up to decrease the EF units and, as a result of this, increasing the reliability. The investigated EFs, between the time period over ten years, showed to have a significant reliability impact of 32% on the total of 23339 unscheduled failures. Since the EFs encloses almost one-third of the entire population.

Keywords: supportability, no fault found, FMEA, early failure, availability, operational reliability, predictive model

Procedia PDF Downloads 110
24844 Drought Risk Analysis Using Neural Networks for Agri-Businesses and Projects in Lejweleputswa District Municipality, South Africa

Authors: Bernard Moeketsi Hlalele

Abstract:

Drought is a complicated natural phenomenon that creates significant economic, social, and environmental problems. An analysis of paleoclimatic data indicates that severe and extended droughts are inevitable part of natural climatic circle. This study characterised drought in Lejweleputswa using both Standardised Precipitation Index (SPI) and neural networks (NN) to quantify and predict respectively. Monthly 37-year long time series precipitation data were obtained from online NASA database. Prior to the final analysis, this dataset was checked for outliers using SPSS. Outliers were removed and replaced by Expectation Maximum algorithm from SPSS. This was followed by both homogeneity and stationarity tests to ensure non-spurious results. A non-parametric Mann Kendall's test was used to detect monotonic trends present in the dataset. Two temporal scales SPI-3 and SPI-12 corresponding to agricultural and hydrological drought events showed statistically decreasing trends with p-value = 0.0006 and 4.9 x 10⁻⁷, respectively. The study area has been plagued with severe drought events on SPI-3, while on SPI-12, it showed approximately a 20-year circle. The concluded the analyses with a seasonal analysis that showed no significant trend patterns, and as such NN was used to predict possible SPI-3 for the last season of 2018/2019 and four seasons for 2020. The predicted drought intensities ranged from mild to extreme drought events to come. It is therefore recommended that farmers, agri-business owners, and other relevant stakeholders' resort to drought resistant crops as means of adaption.

Keywords: drought, risk, neural networks, agri-businesses, project, Lejweleputswa

Procedia PDF Downloads 114
24843 Urban Land Use Type Analysis Based on Land Subsidence Areas Using X-Band Satellite Image of Jakarta Metropolitan City, Indonesia

Authors: Ratih Fitria Putri, Josaphat Tetuko Sri Sumantyo, Hiroaki Kuze

Abstract:

Jakarta Metropolitan City is located on the northwest coast of West Java province with geographical location between 106º33’ 00”-107º00’00”E longitude and 5º48’30”-6º24’00”S latitude. Jakarta urban area has been suffered from land subsidence in several land use type as trading, industry and settlement area. Land subsidence hazard is one of the consequences of urban development in Jakarta. This hazard is caused by intensive human activities in groundwater extraction and land use mismanagement. Geologically, the Jakarta urban area is mostly dominated by alluvium fan sediment. The objectives of this research are to make an analysis of Jakarta urban land use type on land subsidence zone areas. The process of producing safer land use and settlements of the land subsidence areas are very important. Spatial distributions of land subsidence detection are necessary tool for land use management planning. For this purpose, Differential Synthetic Aperture Radar Interferometry (DInSAR) method is used. The DInSAR is complementary to ground-based methods such as leveling and global positioning system (GPS) measurements, yielding information in a wide coverage area even when the area is inaccessible. The data were fine tuned by using X-Band image satellite data from 2010 to 2013 and land use mapping data. Our analysis of land use type that land subsidence movement occurred on the northern part Jakarta Metropolitan City varying from 7.5 to 17.5 cm/year as industry and settlement land use type areas.

Keywords: land use analysis, land subsidence mapping, urban area, X-band satellite image

Procedia PDF Downloads 262
24842 Feasibility of Battery Electric Vehicles in Saudi Arabia: Cost and Sensitivity Analysis

Authors: Tawfiq Albishri, Abdulmajeed Alqahtani

Abstract:

Battery electric vehicles (BEVs) are increasingly seen as a sustainable alternative to internal combustion engine (ICE) vehicles, primarily due to their environmental and economic benefits. Saudi Arabia's interest in investing in renewable energy and reducing greenhouse gas emissions presents significant potential for the widespread adoption of BEVs in the country. However, several factors have hindered the adoption of BEVs in Saudi Arabia, with high ownership costs being the most prominent barrier. This cost discrepancy is primarily due to the lack of localized production of BEVs and their components, leading to increased import costs, as well as the high initial cost of BEVs compared to ICE vehicles. This paper aims to evaluate the feasibility of BEVs compared to ICE vehicles in Saudi Arabia by conducting a cost of ownership analysis. Furthermore, a sensitivity analysis will be conducted to determine the most significant contributor to the ownership costs of BEVs that, if changed, could expedite their adoption in Saudi Arabia.

Keywords: battery electric vehicles, internal combustion engine, renewable energy, greenhouse gas emissions, total cost of ownership

Procedia PDF Downloads 71
24841 Risks beyond Cyber in IoT Infrastructure and Services

Authors: Mattias Bergstrom

Abstract:

Significance of the Study: This research will provide new insights into the risks with digital embedded infrastructure. Through this research, we will analyze each risk and its potential negation strategies, especially for AI and autonomous automation. Moreover, the analysis that is presented in this paper will convey valuable information for future research that can create more stable, secure, and efficient autonomous systems. To learn and understand the risks, a large IoT system was envisioned, and risks with hardware, tampering, and cyberattacks were collected, researched, and evaluated to create a comprehensive understanding of the potential risks. Potential solutions have then been evaluated on an open source IoT hardware setup. This list shows the identified passive and active risks evaluated in the research. Passive Risks: (1) Hardware failures- Critical Systems relying on high rate data and data quality are growing; SCADA systems for infrastructure are good examples of such systems. (2) Hardware delivers erroneous data- Sensors break, and when they do so, they don’t always go silent; they can keep going, just that the data they deliver is garbage, and if that data is not filtered out, it becomes disruptive noise in the system. (3) Bad Hardware injection- Erroneous generated sensor data can be pumped into a system by malicious actors with the intent to create disruptive noise in critical systems. (4) Data gravity- The weight of the data collected will affect Data-Mobility. (5) Cost inhibitors- Running services that need huge centralized computing is cost inhibiting. Large complex AI can be extremely expensive to run. Active Risks: Denial of Service- It is one of the most simple attacks, where an attacker just overloads the system with bogus requests so that valid requests disappear in the noise. Malware- Malware can be anything from simple viruses to complex botnets created with specific goals, where the creator is stealing computer power and bandwidth from you to attack someone else. Ransomware- It is a kind of malware, but it is so different in its implementation that it is worth its own mention. The goal with these pieces of software is to encrypt your system so that it can only be unlocked with a key that is held for ransom. DNS spoofing- By spoofing DNS calls, valid requests and data dumps can be sent to bad destinations, where the data can be extracted for extortion or to corrupt and re-inject into a running system creating a data echo noise loop. After testing multiple potential solutions. We found that the most prominent solution to these risks was to use a Peer 2 Peer consensus algorithm over a blockchain to validate the data and behavior of the devices (sensors, storage, and computing) in the system. By the devices autonomously policing themselves for deviant behavior, all risks listed above can be negated. In conclusion, an Internet middleware that provides these features would be an easy and secure solution to any future autonomous IoT deployments. As it provides separation from the open Internet, at the same time, it is accessible over the blockchain keys.

Keywords: IoT, security, infrastructure, SCADA, blockchain, AI

Procedia PDF Downloads 93