Search results for: urban open space
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 9411

Search results for: urban open space

5091 Structural Investigation of the GAF Domain Protein BPSL2418 from Burkholderia pseudomallei

Authors: Mona G. Alharbi

Abstract:

A new family of methionine-sulfoxide reductase (Msr) was recently discovered and was named free methionine sulfoxide reductase (fRMsr). This family includes enzymes with a reductase activity toward the free R isomer of a methionine sulfoxide substrate. The fRMsrs have a GAF domain topology, a domain, which was previously identified as having in some cases a cyclic nucleotide phosphodiesterase activity. The classification of fRMsrs as GAF domains revealed a new function can be added to the GAF domain family. Interestingly the four members identified in the fRMsr family share the GAF domain structure and the presence of three conserved cysteines in the active site with free R methionine sulfoxide substrate specificity. This thesis presents the crystal structures of reduced, free Met-SO substrate-bound and MES-bound forms of a new fRMsr from Burkholderia pseudomallei (BPSL2418). BPSL2418 was cloned, overexpressed and purified to enable protein crystallization. The crystallization trials for reduced, Met-SO-bound and MES-bound forms of BPSL2418 were prepared and reasonable crystals of each form were produced. The crystal structures of BPSL2418MES, BPSL2418Met-SO and BPSL2418Reduced were solved at 1.18, 1.4 and 2.0Å, respectively by molecular replacement. The BPSL2418MES crystal belongs to space group P 21 21 21 while BPSL2418Met-SO and BPSL2418Reduced crystals belong to space group P 1 21 1. All three forms share the GAF domain structure of six antiparallel β-strands and four α-helices with connecting loops. The antiparallel β-strands (β1, β2, β5 and β6) are located in the center of the BPSL2418 structure flanked on one side by a three α-helices (α1, α2 and α4) and on the other side by a (loop1, β3, loop2, α3, β4 loop4) unit where loop4 forms a capping flap and covers the active site. The structural comparison of the three forms of BPSL2418 indicates that the catalytically important cysteine is CYS109, where the resolving cysteine is CYS75, which forms a disulfide bond with CYS109. They also suggest that the third conserved cysteine in the active site, CYS85, which is located in α3, is a non-essential cysteine for the catalytic function but it may play a role in the binding of the substrate. The structural comparison of the three forms reveals that conformational changes appear in the active site particularly involving loop4 and CYS109 during catalysis. The 3D structure of BPSL2418 shows strong structure similarity to fRMsrs enzymes, which further suggests that BPSL2418 acts as a free Met-R-SO reductase and shares the catalytic mechanism of fRMsr family.

Keywords: Burkholderia pseudomallei, GAF domain protein, methionine sulfoxide reductase, protein crystallization

Procedia PDF Downloads 379
5090 Three-Dimensional Jet Refraction Simulation Using a Gradient Term Suppression and Filtering Method

Authors: Lican Wang, Rongqian Chen, Yancheng You, Ruofan Qiu

Abstract:

In the applications of jet engine, open-jet wind tunnel and airframe, there wildly exists a shear layer formed by the velocity and temperature gradients between jet flow and surrounded medium. The presence of shear layer will refract and reflect the sound path that consequently influences the measurement results in far-field. To investigate and evaluate the shear layer effect, a gradient term suppression and filtering method is adopted to simulate sound propagation through a steady sheared flow in three dimensions. Two typical configurations are considered: one is an incompressible and cold jet flow in wind tunnel and the other is a compressible and hot jet flow in turbofan engine. A numerically linear microphone array is used to localize the position of given sound source. The localization error is presented and linearly fitted.

Keywords: aeroacoustic, linearized Euler equation, acoustic propagation, source localization

Procedia PDF Downloads 192
5089 Level Set and Morphological Operation Techniques in Application of Dental Image Segmentation

Authors: Abdolvahab Ehsani Rad, Mohd Shafry Mohd Rahim, Alireza Norouzi

Abstract:

Medical image analysis is one of the great effects of computer image processing. There are several processes to analysis the medical images which the segmentation process is one of the challenging and most important step. In this paper the segmentation method proposed in order to segment the dental radiograph images. Thresholding method has been applied to simplify the images and to morphologically open binary image technique performed to eliminate the unnecessary regions on images. Furthermore, horizontal and vertical integral projection techniques used to extract the each individual tooth from radiograph images. Segmentation process has been done by applying the level set method on each extracted images. Nevertheless, the experiments results by 90% accuracy demonstrate that proposed method achieves high accuracy and promising result.

Keywords: integral production, level set method, morphological operation, segmentation

Procedia PDF Downloads 312
5088 Classification of Crisp Petri Nets

Authors: Riddhi Jangid, Gajendra Pratap Singh

Abstract:

Petri nets, a formalized modeling language that was introduced back around 50-60 years, have been widely used for modeling discrete event dynamic systems and simulating their behavior. Reachability analysis of Petri nets gives many insights into a modeled system. This idea leads us to study the reachability technique and use it in the reachability problem in the state space of reachable markings. With the same concept, Crisp Boolean Petri nets were defined in which the marking vectors that are boolean are distinct in the reachability analysis of the nets. We generalize the concept and define ‘Crisp’ Petri nets that generate the marking vectors exactly once in their reachability-based analysis, not necessarily Boolean.

Keywords: marking vector, n-vector, Petri nets, reachability

Procedia PDF Downloads 78
5087 Efficacy of Single-Dose Azithromycin Therapy for the Treatment of Chlamydia trachomatis in Patients Evaluated for Child Sexual Abuse in an Urban Health Center 2006-16

Authors: Trenton Hubbard, Kenneth Soyemi, Emily Siffermann

Abstract:

Introduction: According to the American Academy of Pediatrics (AAP) there are different weight-based recommendations for the treatment of Chlamydia trachomatis (CT) in patients who are being evaluated for sexual assault. Current AAP Red Book guidelines recommend that uncomplicated C. trachomatis anogenital infection in prepubertal patients weighing less than =<45 kg be treated with oral erythromycin 50 mg/kg/day QID for 14 days with no alternative therapies, and for patients whose weight => 45 kg are Azithromycin 1 gm PO once. Our study objective was to determine the efficacy of single-dose Azithromycin therapy for the treatment of Chlamydia trachomatis in patients weighing less than 50 kg who were evaluated for child sexual abuse in an urban setting. Methods: We conducted a retrospective chart review of historical medical records (paper and electronic) patients weighing less than 50 kg who were evaluated for child sexual abuse and subsequently treated for C. trachomatis infection with Azithromycin (20 mg/kg PO once up to a maximum 1 gm) and received a Test of Cure (TOC) from 2006-2016. Qualitative variables were expressed as percentages. Quantitative variables were expressed as mean values (+/- standard deviation [SD]) if they followed a normal distribution or as median values (interquartile range[IQR]) if they did not. Wilcoxson two-sample test was used to compare means of Azithromycin Dose, mg/kg, and TOC timing between treatment responders and non-responders. Results: We reviewed records of 34 patients, average age (SD) was 5.4 (2.0) years, 33 (97%) were treated for CT and 1(3%) for both GC and CT. 25 (74%) were females. Urine PCR was the most commonly used test at evaluation and as TOC with 13 (38%) patients completing both tests. The average (SD) dose of Azithromycin at treatment was 470 (136) mg and average (SD) mg/kg dose of 20 (1.9) mg/kg for all patients. Median (IQR) timing for TOC testing was 19 (14-26) days. Of the 33 with complete data 25 (74%) had a negative TOC. When compared with treatment non-responders (TOC failures), treatment responders received higher doses (average dose (SD) received 495 (139) vs 401(110), P 0.06)); similar average (SD) weight base dosing received (20.8(2.0) vs 19.7 (1.5), P 0.15)), and earlier average (SD)TOC test timing (18.8 (5.6) vs 32 (28.6) P 0.02)). Conclusion: Azithromycin dosing appears to be efficacious in the treatment of CT post sexual assault as majority of patients responded. Although treatment responders and non-responders received similar weight based doses, there is need for additional studies to understand variances and predictors of response.

Keywords: child sexual abuse, chlmaydia trachmotis infection, single-dose azithromycin, weight less than or equal to 45 kilograms

Procedia PDF Downloads 290
5086 Hull Detection from Handwritten Digit Image

Authors: Sriraman Kothuri, Komal Teja Mattupalli

Abstract:

In this paper we proposed a novel algorithm for recognizing hulls in a hand written digits. This is an extension to the work on “Digit Recognition Using Freeman Chain code”. In order to find out the hulls in a user given digit it is necessary to follow three steps. Those are pre-processing, Boundary Extraction and at last apply the Hull Detection system in a way to attain the better results. The detection of Hull Regions is mainly intended to increase the machine learning capability in detection of characters or digits. This can also extend this in order to get the hull regions and their intensities in Black Holes in Space Exploration.

Keywords: chain code, machine learning, hull regions, hull recognition system, SASK algorithm

Procedia PDF Downloads 398
5085 Modeling Spatio-Temporal Variation in Rainfall Using a Hierarchical Bayesian Regression Model

Authors: Sabyasachi Mukhopadhyay, Joseph Ogutu, Gundula Bartzke, Hans-Peter Piepho

Abstract:

Rainfall is a critical component of climate governing vegetation growth and production, forage availability and quality for herbivores. However, reliable rainfall measurements are not always available, making it necessary to predict rainfall values for particular locations through time. Predicting rainfall in space and time can be a complex and challenging task, especially where the rain gauge network is sparse and measurements are not recorded consistently for all rain gauges, leading to many missing values. Here, we develop a flexible Bayesian model for predicting rainfall in space and time and apply it to Narok County, situated in southwestern Kenya, using data collected at 23 rain gauges from 1965 to 2015. Narok County encompasses the Maasai Mara ecosystem, the northern-most section of the Mara-Serengeti ecosystem, famous for its diverse and abundant large mammal populations and spectacular migration of enormous herds of wildebeest, zebra and Thomson's gazelle. The model incorporates geographical and meteorological predictor variables, including elevation, distance to Lake Victoria and minimum temperature. We assess the efficiency of the model by comparing it empirically with the established Gaussian process, Kriging, simple linear and Bayesian linear models. We use the model to predict total monthly rainfall and its standard error for all 5 * 5 km grid cells in Narok County. Using the Monte Carlo integration method, we estimate seasonal and annual rainfall and their standard errors for 29 sub-regions in Narok. Finally, we use the predicted rainfall to predict large herbivore biomass in the Maasai Mara ecosystem on a 5 * 5 km grid for both the wet and dry seasons. We show that herbivore biomass increases with rainfall in both seasons. The model can handle data from a sparse network of observations with many missing values and performs at least as well as or better than four established and widely used models, on the Narok data set. The model produces rainfall predictions consistent with expectation and in good agreement with the blended station and satellite rainfall values. The predictions are precise enough for most practical purposes. The model is very general and applicable to other variables besides rainfall.

Keywords: non-stationary covariance function, gaussian process, ungulate biomass, MCMC, maasai mara ecosystem

Procedia PDF Downloads 290
5084 Oil Reservoirs Bifurcation Analysis in the Democratic Republic of Congo: Fractal Characterization Approach of Makelekese MS-25 Field

Authors: Leonard Mike McNelly Longwa, Divine Kusosa Musiku, Dieudonne Nahum Kabeya

Abstract:

In this paper, the bifurcation analysis of oilfields in the Democratic Republic of Congo is presented in order to enhance petroleum production in an intense tectonic evolution characterized by distinct compressive and extensive phases and the digenetic transformation in the reservoirs during burial geological configuration. The use of porous media in the Makelekese MS-25 field has been established to simulate the boundaries within 3 sedimentary basins open to exploration including the coastal basin with an area of 5992 km², a central basin with an area of 800,000 km², the western branch of the East African Rift in which there are 50,000 km². The fractal characterization of complex hydro-dynamic fractures in oilfields is developed to facilitate the oil production process based on the reservoirs bifurcation model.

Keywords: reservoir bifurcation, fractal characterization, permeability, conductivity, skin effect

Procedia PDF Downloads 123
5083 Statistic Regression and Open Data Approach for Identifying Economic Indicators That Influence e-Commerce

Authors: Apollinaire Barme, Simon Tamayo, Arthur Gaudron

Abstract:

This paper presents a statistical approach to identify explanatory variables linearly related to e-commerce sales. The proposed methodology allows specifying a regression model in order to quantify the relevance between openly available data (economic and demographic) and national e-commerce sales. The proposed methodology consists in collecting data, preselecting input variables, performing regressions for choosing variables and models, testing and validating. The usefulness of the proposed approach is twofold: on the one hand, it allows identifying the variables that influence e- commerce sales with an accessible approach. And on the other hand, it can be used to model future sales from the input variables. Results show that e-commerce is linearly dependent on 11 economic and demographic indicators.

Keywords: e-commerce, statistical modeling, regression, empirical research

Procedia PDF Downloads 220
5082 Crater Detection Using PCA from Captured CMOS Camera Data

Authors: Tatsuya Takino, Izuru Nomura, Yuji Kageyama, Shin Nagata, Hiroyuki Kamata

Abstract:

We propose a method of detecting the craters from the image of the lunar surface. This proposal assumes that it is applied to SLIM (Smart Lander for Investigating Moon) working group aiming at the pinpoint landing on the lunar surface and investigating scientific research. It is difficult to equip and use high-performance computers for the small space probe. So, it is necessary to use a small computer with an exclusive hardware such as FPGA. We have studied the crater detection using principal component analysis (PCA), In this paper, We implement detection algorithm into the FPGA, and the detection is performed on the data that was captured from the CMOS camera.

Keywords: crater detection, PCA, FPGA, image processing

Procedia PDF Downloads 544
5081 Evaluation of Coupled CFD-FEA Simulation for Fire Determination

Authors: Daniel Martin Fellows, Sean P. Walton, Jennifer Thompson, Oubay Hassan, Ella Quigley, Kevin Tinkham

Abstract:

Fire performance is a crucial aspect to consider when designing cladding products, and testing this performance is extremely expensive. Appropriate use of numerical simulation of fire performance has the potential to reduce the total number of fire tests required when designing a product by eliminating poor-performing design ideas early in the design phase. Due to the complexity of fire and the large spectrum of failures it can cause, multi-disciplinary models are needed to capture the complex fire behavior and its structural effects on its surroundings. Working alongside Tata Steel U.K., the authors have focused on completing a coupled CFD-FEA simulation model suited to test Polyisocyanurate (PIR) based sandwich panel products to gain confidence before costly experimental standards testing. The sandwich panels are part of a thermally insulating façade system primarily for large non-domestic buildings. The work presented in this paper compares two coupling methodologies of a replicated physical experimental standards test LPS 1181-1, carried out by Tata Steel U.K. The two coupling methodologies that are considered within this research are; one-way and two-way. A one-way coupled analysis consists of importing thermal data from the CFD solver into the FEA solver. A two-way coupling analysis consists of continuously importing the updated changes in thermal data, due to the fire's behavior, to the FEA solver throughout the simulation. Likewise, the mechanical changes will also be updated back to the CFD solver to include geometric changes within the solution. For CFD calculations, a solver called Fire Dynamic Simulator (FDS) has been chosen due to its adapted numerical scheme to focus solely on fire problems. Validation of FDS applicability has been achieved in past benchmark cases. In addition, an FEA solver called ABAQUS has been chosen to model the structural response to the fire due to its crushable foam plasticity model, which can accurately model the compressibility of PIR foam. An open-source code called FDS-2-ABAQUS is used to couple the two solvers together, using several python modules to complete the process, including failure checks. The coupling methodologies and experimental data acquired from Tata Steel U.K are compared using several variables. The comparison data includes; gas temperatures, surface temperatures, and mechanical deformation of the panels. Conclusions are drawn, noting improvements to be made on the current coupling open-source code FDS-2-ABAQUS to make it more applicable to Tata Steel U.K sandwich panel products. Future directions for reducing the computational cost of the simulation are also considered.

Keywords: fire engineering, numerical coupling, sandwich panels, thermo fluids

Procedia PDF Downloads 82
5080 Micro-Oculi Facades as a Sustainable Urban Facade

Authors: Ok-Kyun Im, Kyoung Hee Kim

Abstract:

We live in an era that faces global challenges of climate changes and resource depletion. With the rapid urbanization and growing energy consumption in the built environment, building facades become ever more important in architectural practice and environmental stewardship. Furthermore, building facade undergoes complex dynamics of social, cultural, environmental and technological changes. Kinetic facades have drawn attention of architects, designers, and engineers in the field of adaptable, responsive and interactive architecture since 1980’s. Materials and building technologies have gradually evolved to address the technical implications of kinetic facades. The kinetic façade is becoming an independent system of the building, transforming the design methodology to sustainable building solutions. Accordingly, there is a need for a new design methodology to guide the design of a kinetic façade and evaluate its sustainable performance. The research objectives are two-fold: First, to establish a new design methodology for kinetic facades and second, to develop a micro-oculi façade system and assess its performance using the established design method. The design approach to the micro-oculi facade is comprised of 1) façade geometry optimization and 2) dynamic building energy simulation. The façade geometry optimization utilizes multi-objective optimization process, aiming to balance the quantitative and qualitative performances to address the sustainability of the built environment. The dynamic building energy simulation was carried out using EnergyPlus and Radiance simulation engines with scripted interfaces. The micro-oculi office was compared with an office tower with a glass façade in accordance with ASHRAE 90.1 2013 to understand its energy efficiency. The micro-oculi facade is constructed with an array of circular frames attached to a pair of micro-shades called a micro-oculus. The micro-oculi are encapsulated between two glass panes to protect kinetic mechanisms with longevity. The micro-oculus incorporates rotating gears that transmit the power to adjacent micro-oculi to minimize the number of mechanical parts. The micro-oculus rotates around its center axis with a step size of 15deg depending on the sun’s position while maximizing daylighting potentials and view-outs. A 2 ft by 2ft prototyping was undertaken to identify operational challenges and material implications of the micro-oculi facade. In this research, a systematic design methodology was proposed, that integrates multi-objectives of kinetic façade design criteria and whole building energy performance simulation within a holistic design process. This design methodology is expected to encourage multidisciplinary collaborations between designers and engineers to collaborate issues of the energy efficiency, daylighting performance and user experience during design phases. The preliminary energy simulation indicated that compared to a glass façade, the micro-oculi façade showed energy savings due to its improved thermal properties, daylighting attributes, and dynamic solar performance across the day and seasons. It is expected that the micro oculi façade provides a cost-effective, environmentally-friendly, sustainable, and aesthetically pleasing alternative to glass facades. Recommendations for future studies include lab testing to validate the simulated data of energy and optical properties of the micro-oculi façade. A 1:1 performance mock-up of the micro-oculi façade can suggest in-depth understanding of long-term operability and new development opportunities applicable for urban façade applications.

Keywords: energy efficiency, kinetic facades, sustainable architecture, urban facades

Procedia PDF Downloads 253
5079 CNC Milling-Drilling Machine Cutting Tool Holder

Authors: Hasan Al Dabbas

Abstract:

In this paper, it is addressed that the mechanical machinery captures a major share of innovation in drilling and milling chucks technology. Users demand higher speeds in milling because they are cutting more aluminum and are relying on higher speeds to eliminate secondary finishing operations. To meet that demand, milling-machine builders have enhanced their machine’s rigidity. Moreover, faster cutting has caught up with boring mills. Cooling these machine’s internal components is a challenge at high speeds. Another trend predicted that it is more use of controlled axes to let the machines do many more operations on 5 sides without having to move or re-fix the work. Advances of technology in mechanical engineering have helped to make high-speed machining equipment. To accompany these changes in milling and drilling machines chucks, the demand of easiest software is increased. An open architecture controller is being sought that would allow flexibility and information exchange.

Keywords: drilling, milling, chucks, cutting edges, tools, machines

Procedia PDF Downloads 569
5078 On the Analysis of Pseudorandom Partial Quotient Sequences Generated from Continued Fractions

Authors: T. Padma, Jayashree S. Pillai

Abstract:

Random entities are an essential component in any cryptographic application. The suitability of a number theory based novel pseudorandom sequence called Pseudorandom Partial Quotient Sequence (PPQS) generated from the continued fraction expansion of irrational numbers, in cryptographic applications, is analyzed in this paper. An approach to build the algorithm around a hard mathematical problem has been considered. The PQ sequence is tested for randomness and its suitability as a cryptographic key by performing randomness analysis, key sensitivity and key space analysis, precision analysis and evaluating the correlation properties is established.

Keywords: pseudorandom sequences, key sensitivity, correlation, security analysis, randomness analysis, sensitivity analysis

Procedia PDF Downloads 585
5077 A Framework for Protecting Teenagers from Cyber Crimes and Cyberbullying

Authors: Sultan Alanazi, Adwan Alanazi

Abstract:

Social applications consist of powerful tools that allow people to connect and interact with each other. However, its negative use cannot be ignored. Cyberbullying is a new and serious Internet problem. Cyberbullying is one of the most common risks for teenagers to go online. More than half of young people report that they do not tell their parents when this will occur, which can have significant physiological consequences. Cyberbullying involves the deliberate use of digital media on the Internet to convey false or embarrassing information about others. Therefore, this article provides a way to detect cyber-bullying in social media applications for parents. The purpose of our work is to develop an architectural model for identifying and measuring the state of Cyberbullying faced by children on social media applications. For parents, this will be a good tool for monitoring their children without invading their privacy. Finally, some interesting open-ended questions were raised, suggesting promising ideas for starting new research in this new field.

Keywords: cyberbullying, cyber bullying, internet crimes, social media security, E-crimes

Procedia PDF Downloads 132
5076 Realization of Sustainable Urban Society by Personal Electric Transporter and Natural Energy

Authors: Yuichi Miyamoto

Abstract:

In regards to the energy sector in the modern period, two points were raised. First is a vast and growing energy demand, and second is an environmental impact associated with it. The enormous consumption of fossil fuel to the mobile unit is leading to its rapid depletion. Nuclear power is not the only problem. A modal shift that utilizes personal transporters and independent power, in order to realize a sustainable society, is very effective. The paper proposes that the world will continue to work on this. Energy of the future society, innovation in battery technology and the use of natural energy is a big key. And it is also necessary in order to save on energy consumption.

Keywords: natural energy, modal shift, personal transportation, battery

Procedia PDF Downloads 400
5075 Women as Catalysts for the Rehabilitation of the Traditional System of Governance in Nigeria

Authors: Inalegwu Stephany Akipu

Abstract:

Before the advent of Colonialists on the shores of Nigeria between the 16th and 17th Centuries, there existed the traditional systems of governance which was successful with Women as active participants. However, the current state of politics in Nigeria reveals an obvious absence of women in the Country’s governance. Being that the economy rests on the quality of leaders and their constructive contribution to the plight of the masses, it becomes pertinent to exhaust all the avenues that may be open to good governance-women inclusive. It is against this backdrop that this paper attempts to compare the machinery that were in place in pre-colonial Nigerian governance that aided the womenfolk to successfully reign or assist in leadership with the seeming lack of interest by women in present times. Factors that militate against the women will also be highlighted. Furthermore, suggestions are made on how to revive these successful traditional systems of governance. The paper concludes by emphasising the role of women as the needed catalysts for this aforementioned rehabilitation of traditional systems and the impact of media in achieving this feat.

Keywords: catalysts, governance, media, rehabilitation

Procedia PDF Downloads 411
5074 EEG Diagnosis Based on Phase Space with Wavelet Transforms for Epilepsy Detection

Authors: Mohmmad A. Obeidat, Amjed Al Fahoum, Ayman M. Mansour

Abstract:

The recognition of an abnormal activity of the brain functionality is a vital issue. To determine the type of the abnormal activity either a brain image or brain signal are usually considered. Imaging localizes the defect within the brain area and relates this area with somebody functionalities. However, some functions may be disturbed without affecting the brain as in epilepsy. In this case, imaging may not provide the symptoms of the problem. A cheaper yet efficient approach that can be utilized to detect abnormal activity is the measurement and analysis of the electroencephalogram (EEG) signals. The main goal of this work is to come up with a new method to facilitate the classification of the abnormal and disorder activities within the brain directly using EEG signal processing, which makes it possible to be applied in an on-line monitoring system.

Keywords: EEG, wavelet, epilepsy, detection

Procedia PDF Downloads 534
5073 Secure Image Encryption via Enhanced Fractional Order Chaotic Map

Authors: Ismail Haddad, Djamel Herbadji, Aissa Belmeguenai, Selma Boumerdassi

Abstract:

in this paper, we provide a novel approach for image encryption that employs the Fibonacci matrix and an enhanced fractional order chaotic map. The enhanced map overcomes the drawbacks of the classical map, especially the limited chaotic range and non-uniform distribution of chaotic sequences, resulting in a larger encryption key space. As a result, this strategy improves the encryption system's security. Our experimental results demonstrate that our proposed algorithm effectively encrypts grayscale images with exceptional efficiency. Furthermore, our technique is resistant to a wide range of potential attacks, including statistical and entropy attacks.

Keywords: image encryption, logistic map, fibonacci matrix, grayscale images

Procedia PDF Downloads 310
5072 The Willingness to Pay of People in Taiwan for Flood Protection Standard of Regions

Authors: Takahiro Katayama, Hsueh-Sheng Chang

Abstract:

Due to the global climate change, it has increased the extreme rainfall that led to serious floods around the world. In recent years, urbanization and population growth also tend to increase the number of impervious surfaces, resulting in significant loss of life and property during floods especially for the urban areas of Taiwan. In the past, the primary governmental response to floods was structural flood control and the only flood protection standards in use were the design standards. However, these design standards of flood control facilities are generally calculated based on current hydrological conditions. In the face of future extreme events, there is a high possibility to surpass existing design standards and cause damages directly and indirectly to the public. To cope with the frequent occurrence of floods in recent years, it has been pointed out that there is a need for a different standard called FPSR (Flood Protection Standard of Regions) in Taiwan. FPSR is mainly used for disaster reduction and used to ensure that hydraulic facilities draining regional flood immediately under specific return period. FPSR could convey a level of flood risk which is useful for land use planning and reflect the disaster situations that a region can bear. However, little has been reported on FPSR and its impacts to the public in Taiwan. Hence, this study proposes a quantity procedure to evaluate the FPSR. This study aimed to examine FPSR of the region and public perceptions of and knowledge about FPSR, as well as the public’s WTP (willingness to pay) for FPSR. The research is conducted via literature review and questionnaire method. Firstly, this study will review the domestic and international research on the FPSR, and provide the theoretical framework of FPSR. Secondly, CVM (Contingent Value Method) has been employed to conduct this survey and using double-bounded dichotomous choice, close-ended format elicits households WTP for raising the protection level to understand the social costs. The samplings of this study are citizens living in Taichung city, Taiwan and 700 samplings were chosen in this study. In the end, this research will continue working on surveys, finding out which factors determining WTP, and provide some recommendations for adaption policies for floods in the future.

Keywords: climate change, CVM (Contingent Value Method), FPSR (Flood Protection Standard of Regions), urban flooding

Procedia PDF Downloads 247
5071 Kinetic Study of 1-Butene Isomerization over Hydrotalcite Catalyst

Authors: Sirada Sripinun

Abstract:

This work studied the isomerization of 1-butene over hydrotalcite catalyst. The experiments were conducted at various gas hourly space velocity (GHSV), reaction temperature, and feed concentration. No catalyst deactivation was observed over the reaction time of 16 hours. Two major reaction products were trans-2-butene and cis-2-butene. The reaction temperature played an important role on the reaction selectivity. At high operating temperatures, the selectivity of trans-2-butene was higher than the selectivity of cis-2-butene while it was opposite at a lower reaction temperature. In the range of operating conditions, the maximum conversion of 1-butene was found at 74% when T = 673 K and GHSV = 4 m3/h/kg-cat with trans- and cis-2-butene selectivities of 54% and 46% respectively. Finally, the kinetic parameters of the reaction were determined.

Keywords: hydrotalcite, isomerization, kinetic, 1-butene

Procedia PDF Downloads 390
5070 Subjectivity in Miracle Aesthetic Clinic Ambient Media Advertisement

Authors: Wegig Muwonugroho

Abstract:

Subjectivity in advertisement is a ‘power’ possessed by advertisements to construct trend, concept, truth, and ideology through subconscious mind. Advertisements, in performing their functions as message conveyors, use such visual representation to inspire what’s ideal to the people. Ambient media is advertising medium making the best use of the environment where the advertisement is located. Miracle Aesthetic Clinic (Miracle) popularizes the visual representation of its ambient media advertisement through the omission of face-image of both female mannequins that function as its ambient media models. Usually, the face of a model in advertisement is an image commodity having selling values; however, the faces of ambient media models in Miracle advertisement campaign are suppressed over the table and wall. This face concealing aspect creates not only a paradox of subjectivity but also plurality of meaning. This research applies critical discourse analysis method to analyze subjectivity in obtaining the insight of ambient media’s meaning. First, in the stage of textual analysis, the embedding attributes upon female mannequins imply that the models are denoted as the representation of modern women, which are identical with the identities of their social milieus. The communication signs aimed to be constructed are the women who lose their subjectivities and ‘feel embarrassed’ to flaunt their faces to the public because of pimples on their faces. Second, in the stage of analysis of discourse practice, it points out that ambient media as communication media has been comprehensively responded by the targeted audiences. Ambient media has a role as an actor because of its eyes-catching setting, and taking space over the area where the public are wandering around. Indeed, when the public realize that the ambient media models are motionless -unlike human- stronger relation then appears, marked by several responses from targeted audiences. Third, in the stage of analysis of social practice, soap operas and celebrity gossip shows on the television become a dominant discourse influencing advertisement meaning. The subjectivity of Miracle Advertisement corners women by the absence of women participation in public space, the representation of women in isolation, and the portrayal of women as an anxious person in the social rank when their faces suffered from pimples. The Ambient media as the advertisement campaign of Miracle is quite success in constructing a new trend discourse of face beauty that is not limited on benchmarks of common beauty virtues, but the idea of beauty can be presented by ‘when woman doesn’t look good’ visualization.

Keywords: ambient media, advertisement, subjectivity, power

Procedia PDF Downloads 315
5069 Solar Power Satellites: Reconsideration Based on Novel Approaches

Authors: Alex Ellery

Abstract:

Solar power satellites (SPS), despite their promise as a clean energy source, have been relegated out of consideration due to their enormous cost and technological challenge. It has been suggested that for solar power satellites to become economically feasible, launch costs must decrease from their current $20,000/kg to < $200/kg. Even with the advent of single-stage-to-orbit launchers which propose launch costs dropping to $2,000/kg, this will not be realized. Yet, the advantages of solar power satellites are many. Here, I present a novel approach to reduce the specific cost of solar power satellites to ~$1/kg by leveraging two enabling technologies – in-situ resource utilization and 3D printing. The power of such technologies will open up enormous possibilities for providing additional options for combating climate change whilst meeting demands for global energy. From the constraints imposed by in-situ resource utilization, a novel approach to solar energy conversion in SPS may be realized.

Keywords: clean energy sources, in-situ resource utilisation, solar power satellites, thermionic emission

Procedia PDF Downloads 420
5068 Optimized Road Lane Detection Through a Combined Canny Edge Detection, Hough Transform, and Scaleable Region Masking Toward Autonomous Driving

Authors: Samane Sharifi Monfared, Lavdie Rada

Abstract:

Nowadays, autonomous vehicles are developing rapidly toward facilitating human car driving. One of the main issues is road lane detection for a suitable guidance direction and car accident prevention. This paper aims to improve and optimize road line detection based on a combination of camera calibration, the Hough transform, and Canny edge detection. The video processing is implemented using the Open CV library with the novelty of having a scale able region masking. The aim of the study is to introduce automatic road lane detection techniques with the user’s minimum manual intervention.

Keywords: hough transform, canny edge detection, optimisation, scaleable masking, camera calibration, improving the quality of image, image processing, video processing

Procedia PDF Downloads 86
5067 Enhancing Students' Utilization of Written Corrective Feedback through Teacher-Student Writing Conferences: A Case Study in English Writing Instruction

Authors: Tsao Jui-Jung

Abstract:

Previous research findings have shown that most students do not fully utilize the written corrective feedback provided by teachers (Stone, 2014). This common phenomenon results in the ineffective utilization of teachers' written corrective feedback. As Ellis (2010) points out, the effectiveness of written corrective feedback depends on the level of student engagement with it. Therefore, it is crucial to understand how students utilize the written corrective feedback from their teachers. Previous studies have confirmed the positive impact of teacher-student writing conferences on students' engagement in the writing process and their writing abilities (Hum, 2021; Nosratinia & Nikpanjeh, 2019; Wong, 1996; Yeh, 2016, 2019). However, due to practical constraints such as time limitations, this instructional activity is not fully utilized in writing classrooms (Alfalagg, 2020). Therefore, to address this research gap, the purpose of this study was to explore several aspects of teacher-student writing conferences, including the frequency of meaning negotiation (i.e., comprehension checks, confirmation checks, and clarification checks) and teacher scaffolding techniques (i.e., feedback, prompts, guidance, explanations, and demonstrations) in teacher-student writing conferences, examining students’ self-assessment of their writing strengths and weaknesses in post-conference journals and their experiences with teacher-student writing conferences (i.e., interaction styles, communication levels, how teachers addressed errors, and overall perspectives on the conferences), and gathering insights from their responses to open-ended questions in the final stage of the study (i.e., their preferences and reasons for different written corrective feedback techniques used by teachers and their perspectives and suggestions on teacher-student writing conferences). Data collection methods included transcripts of audio recordings of teacher-student writing conferences, students’ post-conference journals, and open-ended questionnaires. The participants of this study were sophomore students enrolled in an English writing course for a duration of one school year. Key research findings are as follows: Firstly, in terms of meaning negotiation, students attempted to clearly understand the corrective feedback provided by the teacher-researcher twice as often as the teacher-researcher attempted to clearly understand the students' writing content. Secondly, the most commonly used scaffolding technique in the conferences was prompting (indirect feedback). Thirdly, the majority of participants believed that teacher-student writing conferences had a positive impact on their writing abilities. Fourthly, most students preferred direct feedback from the teacher-research as it directly pointed out their errors and saved them time in revision. However, some students still preferred indirect feedback, as they believed it encouraged them to think and self-correct. Based on the research findings, this study proposes effective teaching recommendations for English writing instruction aimed at optimizing teaching strategies and enhancing students' writing abilities.

Keywords: written corrective feedback, student engagement, teacher-student writing conferences, action research

Procedia PDF Downloads 68
5066 Imaging of Underground Targets with an Improved Back-Projection Algorithm

Authors: Alireza Akbari, Gelareh Babaee Khou

Abstract:

Ground Penetrating Radar (GPR) is an important nondestructive remote sensing tool that has been used in both military and civilian fields. Recently, GPR imaging has attracted lots of attention in detection of subsurface shallow small targets such as landmines and unexploded ordnance and also imaging behind the wall for security applications. For the monostatic arrangement in the space-time GPR image, a single point target appears as a hyperbolic curve because of the different trip times of the EM wave when the radar moves along a synthetic aperture and collects reflectivity of the subsurface targets. With this hyperbolic curve, the resolution along the synthetic aperture direction shows undesired low resolution features owing to the tails of hyperbola. However, highly accurate information about the size, electromagnetic (EM) reflectivity, and depth of the buried objects is essential in most GPR applications. Therefore hyperbolic curve behavior in the space-time GPR image is often willing to be transformed to a focused pattern showing the object's true location and size together with its EM scattering. The common goal in a typical GPR image is to display the information of the spatial location and the reflectivity of an underground object. Therefore, the main challenge of GPR imaging technique is to devise an image reconstruction algorithm that provides high resolution and good suppression of strong artifacts and noise. In this paper, at first, the standard back-projection (BP) algorithm that was adapted to GPR imaging applications used for the image reconstruction. The standard BP algorithm was limited with against strong noise and a lot of artifacts, which have adverse effects on the following work like detection targets. Thus, an improved BP is based on cross-correlation between the receiving signals proposed for decreasing noises and suppression artifacts. To improve the quality of the results of proposed BP imaging algorithm, a weight factor was designed for each point in region imaging. Compared to a standard BP algorithm scheme, the improved algorithm produces images of higher quality and resolution. This proposed improved BP algorithm was applied on the simulation and the real GPR data and the results showed that the proposed improved BP imaging algorithm has a superior suppression artifacts and produces images with high quality and resolution. In order to quantitatively describe the imaging results on the effect of artifact suppression, focusing parameter was evaluated.

Keywords: algorithm, back-projection, GPR, remote sensing

Procedia PDF Downloads 448
5065 Uses and Gratification with the Website Secret-thai.com

Authors: Siriporn Meenanan

Abstract:

The objective of this study is to study about the uses and gratification of the sample who use the website that named secret-thai.com which provides moral contents, inspires, and builds up the spirit. The study found that the samples mainly use this website to follow up on the dharma activities. They also use the space as the web board to discuss about dharma issues. Moreover, the contents help readers to relax and also provides the guidelines to deal with stress and uncomfortable situations properly. The samples found to be most satisfied. In other words, the samples found the contents of the website are complete, and can cover their needs. Moreover, they found that contents useful in their ways of living. In addition, they are satisfied with the beautiful and interesting design of the website and well classification of the contents that readers can easily find the information that they want.

Keywords: uses and gratification, website, Secret-Thai.com, moral contents

Procedia PDF Downloads 228
5064 Radio Frequency Identification Encryption via Modified Two Dimensional Logistic Map

Authors: Hongmin Deng, Qionghua Wang

Abstract:

A modified two dimensional (2D) logistic map based on cross feedback control is proposed. This 2D map exhibits more random chaotic dynamical properties than the classic one dimensional (1D) logistic map in the statistical characteristics analysis. So it is utilized as the pseudo-random (PN) sequence generator, where the obtained real-valued PN sequence is quantized at first, then applied to radio frequency identification (RFID) communication system in this paper. This system is experimentally validated on a cortex-M0 development board, which shows the effectiveness in key generation, the size of key space and security. At last, further cryptanalysis is studied through the test suite in the National Institute of Standards and Technology (NIST).

Keywords: chaos encryption, logistic map, pseudo-random sequence, RFID

Procedia PDF Downloads 396
5063 E-Learning in Life-Long Learning: Best Practices from the University of the Aegean

Authors: Chryssi Vitsilaki, Apostolos Kostas, Ilias Efthymiou

Abstract:

This paper presents selected best practices on online learning and teaching derived from a novel and innovating Lifelong Learning program through e-Learning, which has during the last five years been set up at the University of the Aegean in Greece. The university, capitalizing on an award-winning, decade-long experience in e-learning and blended learning in undergraduate and postgraduate studies, recently expanded into continuous education and vocational training programs in various cutting-edge fields. So, in this article we present: (a) the academic structure/infrastructure which has been developed for the administrative, organizational and educational support of the e-Learning process, including training the trainers, (b) the mode of design and implementation based on a sound pedagogical framework of open and distance education, and (c) the key results of the assessment of the e-learning process by the participants, as they are used to feedback on continuous organizational and teaching improvement and quality control.

Keywords: distance education, e-learning, life-long programs, synchronous/asynchronous learning

Procedia PDF Downloads 327
5062 Risks beyond Cyber in IoT Infrastructure and Services

Authors: Mattias Bergstrom

Abstract:

Significance of the Study: This research will provide new insights into the risks with digital embedded infrastructure. Through this research, we will analyze each risk and its potential negation strategies, especially for AI and autonomous automation. Moreover, the analysis that is presented in this paper will convey valuable information for future research that can create more stable, secure, and efficient autonomous systems. To learn and understand the risks, a large IoT system was envisioned, and risks with hardware, tampering, and cyberattacks were collected, researched, and evaluated to create a comprehensive understanding of the potential risks. Potential solutions have then been evaluated on an open source IoT hardware setup. This list shows the identified passive and active risks evaluated in the research. Passive Risks: (1) Hardware failures- Critical Systems relying on high rate data and data quality are growing; SCADA systems for infrastructure are good examples of such systems. (2) Hardware delivers erroneous data- Sensors break, and when they do so, they don’t always go silent; they can keep going, just that the data they deliver is garbage, and if that data is not filtered out, it becomes disruptive noise in the system. (3) Bad Hardware injection- Erroneous generated sensor data can be pumped into a system by malicious actors with the intent to create disruptive noise in critical systems. (4) Data gravity- The weight of the data collected will affect Data-Mobility. (5) Cost inhibitors- Running services that need huge centralized computing is cost inhibiting. Large complex AI can be extremely expensive to run. Active Risks: Denial of Service- It is one of the most simple attacks, where an attacker just overloads the system with bogus requests so that valid requests disappear in the noise. Malware- Malware can be anything from simple viruses to complex botnets created with specific goals, where the creator is stealing computer power and bandwidth from you to attack someone else. Ransomware- It is a kind of malware, but it is so different in its implementation that it is worth its own mention. The goal with these pieces of software is to encrypt your system so that it can only be unlocked with a key that is held for ransom. DNS spoofing- By spoofing DNS calls, valid requests and data dumps can be sent to bad destinations, where the data can be extracted for extortion or to corrupt and re-inject into a running system creating a data echo noise loop. After testing multiple potential solutions. We found that the most prominent solution to these risks was to use a Peer 2 Peer consensus algorithm over a blockchain to validate the data and behavior of the devices (sensors, storage, and computing) in the system. By the devices autonomously policing themselves for deviant behavior, all risks listed above can be negated. In conclusion, an Internet middleware that provides these features would be an easy and secure solution to any future autonomous IoT deployments. As it provides separation from the open Internet, at the same time, it is accessible over the blockchain keys.

Keywords: IoT, security, infrastructure, SCADA, blockchain, AI

Procedia PDF Downloads 102