Search results for: dynamic Bayesian networks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6551

Search results for: dynamic Bayesian networks

1961 Gas Network Noncooperative Game

Authors: Teresa Azevedo PerdicoúLis, Paulo Lopes Dos Santos

Abstract:

The conceptualisation of the problem of network optimisation as a noncooperative game sets up a holistic interactive approach that brings together different network features (e.g., com-pressor stations, sources, and pipelines, in the gas context) where the optimisation objectives are different, and a single optimisation procedure becomes possible without having to feed results from diverse software packages into each other. A mathematical model of this type, where independent entities take action, offers the ideal modularity and subsequent problem decomposition in view to design a decentralised algorithm to optimise the operation and management of the network. In a game framework, compressor stations and sources are under-stood as players which communicate through network connectivity constraints–the pipeline model. That is, in a scheme similar to tatonnementˆ, the players appoint their best settings and then interact to check for network feasibility. The devolved degree of network unfeasibility informs the players about the ’quality’ of their settings, and this two-phase iterative scheme is repeated until a global optimum is obtained. Due to network transients, its optimisation needs to be assessed at different points of the control interval. For this reason, the proposed approach to optimisation has two stages: (i) the first stage computes along the period of optimisation in order to fulfil the requirement just mentioned; (ii) the second stage is initialised with the solution found by the problem computed at the first stage, and computes in the end of the period of optimisation to rectify the solution found at the first stage. The liability of the proposed scheme is proven correct on an abstract prototype and three example networks.

Keywords: connectivity matrix, gas network optimisation, large-scale, noncooperative game, system decomposition

Procedia PDF Downloads 132
1960 The Role of Digital Text in School and Vernacular Literacies: Students Digital Practices at Cybercafés in Mexico

Authors: Guadalupe López-Bonilla

Abstract:

Students of all educational levels participate in literacy practices that may involve print or digital media. Scholars from the New Literacy Studies distinguish practices that fulfill institutional purposes such as those established at schools from literate practices aimed at doing other kinds of activities, such as reading instructions in order to play a video game; the first are known as institutional practices while the latter are considered vernacular literacies. When students perform these kinds of activities they engage with print and digital media according to the demands of the task. In this paper, it is aimed to discuss the results of a research project focusing on literacy practices of high school students at 10 urban cybercafés in Mexico. The main objective was to analyze the literacy practices of students performing both school tasks and vernacular literacies. The methodology included a focused ethnography with online and face to face observations of 10 high school students (5 male and 5 female) and interviews after performing each task. In the results, it is presented how students treat texts as open, dynamic and relational artifacts when engaging in vernacular literacies; while texts are conceived as closed, authoritarian and fixed documents when performing school activities. Samples of each type of activity are shown followed by a discussion of the pedagogical implications for improving school literacy.

Keywords: digital literacy, text, school literacy, vernacular practices

Procedia PDF Downloads 250
1959 Design and Realization of Computer Network Security Perception Control System

Authors: El Miloudi Djelloul

Abstract:

Based on analysis on applications by perception control technology in computer network security status and security protection measures, from the angles of network physical environment and network software system environmental security, this paper provides network security system perception control solution using Internet of Things (IOT), telecom and other perception technologies. Security Perception Control System is in the computer network environment, utilizing Radio Frequency Identification (RFID) of IOT and telecom integration technology to carry out integration design for systems. In the network physical security environment, RFID temperature, humidity, gas and perception technologies are used to do surveillance on environmental data, dynamic perception technology is used for network system security environment, user-defined security parameters, security log are used for quick data analysis, extends control on I/O interface, by development of API and AT command, Computer Network Security Perception Control based on Internet and GSM/GPRS is achieved, which enables users to carry out interactive perception and control for network security environment by WEB, E-MAIL as well as PDA, mobile phone short message and Internet. In the system testing, through middle ware server, security information data perception in real time with deviation of 3-5% was achieved; it proves the feasibility of Computer Network Security Perception Control System.

Keywords: computer network, perception control system security strategy, Radio Frequency Identification (RFID)

Procedia PDF Downloads 419
1958 Synthesis of Cellulose Nanocrystals from Oil Palm Empty Fruit Bunch by Using Phosphotungstic Acid

Authors: Yogi Wibisono Budhi, Ferry Iskandar, Veinardi Suendo, Muhammad Fakhrudin, Neng Tresna Umi Culsum

Abstract:

Oil palm empty fruit bunch (OPEFB), an abundant agro-waste in Indonesia, is being studied as raw material of Cellulose Nanocrystals (CNC) synthesis. Instead of conventional acid mineral, phosphotungstic acid (H₃PW₁₂O₄₀, HPW) was used to hydrolyze cellulose due to recycling ability and easy handling. Before hydrolysis process, dried EFB was treated by 4% NaOH solution at 90oC for 2 hours and then bleached using 2% NaClO₂ solution at 80oC for 3 hours to remove hemicellulose and lignin. Hydrolysis reaction parameters such as temperature, acid concentration, and reaction time were optimized with fixed solid-liquid ratio of 1:40. Response surface method was used for experimental design to determine the optimum condition of each parameter. HPW was extracted from the mixed solution and recycled with diethyl ether. CNC was separated from the solution by centrifuging and washing with distilled water and ethanol to remove degraded sugars and unreacted celluloses. In this study, pulp from dried EFB produced 44.8% yield of CNC. Dynamic Light Scattering (DLS) analysis showed that most of CNC equivalent diameter was 140 nm. Crystallinity index was observed at 73.3% using X-ray Diffraction (XRD) analysis. Thus, a green established process for the preparation of CNC was achieved.

Keywords: acid hydrolysis, cellulose nanocrystals, oil palm empty fruit bunch, phosphotungstic acid

Procedia PDF Downloads 197
1957 Implicit and Explicit Mechanisms of Emotional Contagion

Authors: Andres Pinilla Palacios, Ricardo Tamayo

Abstract:

Emotional contagion is characterized as an automatic tendency to synchronize behaviors that facilitate emotional convergence among humans. It might thus play a pivotal role to understand the dynamics of key social interactions. However, a few research has investigated its potential mechanisms. We suggest two complementary but independent processes that may underlie emotional contagion. The efficient contagion hypothesis, based on fast and implicit bottom-up processes, modulated by familiarity and spread of activation in the emotional associative networks of memory. Secondly, the emotional contrast hypothesis, based on slow and explicit top-down processes guided by deliberated appraisal and hypothesis-testing. In order to assess these two hypotheses, an experiment with 39 participants was conducted. In the first phase, participants were induced (between-groups) to an emotional state (positive, neutral or negative) using a standardized video taken from the FilmStim database. In the second phase, participants classified and rated (within-subject) the emotional state of 15 faces (5 for each emotional state) taken from the POFA database. In the third phase, all participants were returned to a baseline emotional state using the same neutral video used in the first phase. In a fourth phase, participants classified and rated a new set of 15 faces. The accuracy in the identification and rating of emotions was partially explained by the efficient contagion hypothesis, but the speed with which these judgments were made was partially explained by the emotional contrast hypothesis. However, results are ambiguous, so a follow-up experiment is proposed in which emotional expressions and activation of the sympathetic system will be measured using EMG and EDA respectively.

Keywords: electromyography, emotional contagion, emotional valence, identification of emotions, imitation

Procedia PDF Downloads 292
1956 Evaluation of Dynamic and Vibrational Analysis of the Double Chambered Cylinder along Thermal Interactions

Authors: Mohammadreza Akbari, Leila Abdollahpour, Sara Akbari, Pooya Soleimani

Abstract:

Transferring thermo at the field of solid materials for instance tube-shaped structures, causing dynamical vibration at them. Majority of thermal and fluid processes are done engineering science at solid materials, for example, thermo-transferred pipes, fluids, chemical and nuclear reactors, include thermal processes, so, they need to consider the moment solid-fundamental structural strength unto these thermal interactions. Fluid and thermo retentive materials in front of external force to it like thermodynamical force, hydrodynamical force and static force continuously according to a function of time vibrated, and this action causes relative displacement of the structural materials elements, as a result, the moment resistance analysis preservation materials in thermal processes, the most important parameters for design are discussed. Including structural substrate holder temperature and fluid of the administrative and industrial center, is a cylindrical tube that for vibration analysis of cylindrical cells with heat and fluid transfer requires the use of vibration differential equations governing the structure of a tubular and thermal differential equations as the vibrating motive force at double-glazed cylinders.

Keywords: heat transfer, elements in cylindrical coordinates, analytical solving the governing equations, structural vibration

Procedia PDF Downloads 326
1955 MIMIC: A Multi Input Micro-Influencers Classifier

Authors: Simone Leonardi, Luca Ardito

Abstract:

Micro-influencers are effective elements in the marketing strategies of companies and institutions because of their capability to create an hyper-engaged audience around a specific topic of interest. In recent years, many scientific approaches and commercial tools have handled the task of detecting this type of social media users. These strategies adopt solutions ranging from rule based machine learning models to deep neural networks and graph analysis on text, images, and account information. This work compares the existing solutions and proposes an ensemble method to generalize them with different input data and social media platforms. The deployed solution combines deep learning models on unstructured data with statistical machine learning models on structured data. We retrieve both social media accounts information and multimedia posts on Twitter and Instagram. These data are mapped into feature vectors for an eXtreme Gradient Boosting (XGBoost) classifier. Sixty different topics have been analyzed to build a rule based gold standard dataset and to compare the performances of our approach against baseline classifiers. We prove the effectiveness of our work by comparing the accuracy, precision, recall, and f1 score of our model with different configurations and architectures. We obtained an accuracy of 0.91 with our best performing model.

Keywords: deep learning, gradient boosting, image processing, micro-influencers, NLP, social media

Procedia PDF Downloads 155
1954 Conceptual Design of Panel Based Reinforced Concrete Floating Substructure for 10 MW Offshore Wind Turbine

Authors: M. Sohail Hasan, Wichuda Munbua, Chikako Fujiyama, Koichi Maekawa

Abstract:

During the past few years, offshore wind energy has become the key parameter to reduce carbon emissions. In most of the previous studies, floaters in floating offshore wind turbines (FOWT) are made up of steel. However, fatigue and corrosion are always major concerns of steel marine structures. Recently, researchers are working on concrete floating substructures. In this paper, the conceptual design of pre-cast panel-based economical and durable reinforced concrete floating substructure for a 10 MW offshore wind turbine is proposed. The new geometrical shape, i.e., hexagon with inside hollow boxes, is proposed under static conditions. To design the outer panel/side walls to resist hydrostatic forces, special consideration for durability is given to limit the crack width within permissible range under service limit state. A comprehensive system is proposed for transferring the ultimate moment and shear due to strong wind at the connection between steel tower and concrete floating substructure. Moreover, a stable connection is also designed considering the fatigue of concrete and steel due to the fluctuation of stress from the mooring line. This conceptual design will be verified by subsequent dynamic analysis soon.

Keywords: cracks width control, mooring line, reinforced concrete floater, steel tower

Procedia PDF Downloads 200
1953 Governance and Public Policy: The Perception of Efficiency and Equility in Brazil and South Africa

Authors: Paulino V. Tavares, Ana L. Romao

Abstract:

Public governance represents an articulated arrangement, dynamic and interactive, present in the exercise of authority aimed at strengthening the decision-making procedure in public administration with transparency, accountability, responsiveness and capable of to emerge control and social empowerment, to pursue and achieve the objectives efficiently and with the effectiveness desired by the collective, respecting laws and providing social, institutional and economic equility in society. With this, using a multidimensional approach with the application of three questionnaires to a universe of twenty Counselors of the Courts of Auditors (Brazil), twenty professionals of public administration (Brazil), twenty Government/Provincial Counselors (South Africa), and twenty South African professionals of public administration, the present work aims to capture what is the perception about the efficiency and equility of public policies in Brazil and South Africa. With this, up until now, 30 responses have been obtained, and the results indicate that, in Brazil, 65% affirm due to the inefficiency of public policies, 70% point out that they do not believe in the equility of these same policies. In South Africa, the results indicate that 45% believe in government efficiency, and, with regard to the equility of public policies, 65% do not believe. In Brazil, the research reveals at least three reasons for this result, that is, lack of planning, lack of clear objectives of public policies, and lack of information on the part of society, while in South Africa, so far, research has not identified a specific reason for this result.

Keywords: efficiency, equility, governance, public policy

Procedia PDF Downloads 100
1952 A Multi-Science Study of Modern Synergetic War and Its Information Security Component

Authors: Alexander G. Yushchenko

Abstract:

From a multi-science point of view, we analyze threats to security resulting from globalization of international information space and information and communication aggression of Russia. A definition of Ruschism is formulated as an ideology supporting aggressive actions of modern Russia against the Euro-Atlantic community. Stages of the hybrid war Russia is leading against Ukraine are described, including the elements of subversive activity of the special services, the activation of the military phase and the gradual shift of the focus of confrontation to the realm of information and communication technologies. We reveal an emergence of a threat for democratic states resulting from the destabilizing impact of a target state’s mass media and social networks being exploited by Russian secret services under freedom-of-speech disguise. Thus, we underline the vulnerability of cyber- and information security of the network society in regard of hybrid war. We propose to define the latter a synergetic war. Our analysis is supported with a long-term qualitative monitoring of representation of top state officials on popular TV channels and Facebook. From the memetics point of view, we have detected a destructive psycho-information technology used by the Kremlin, a kind of information catastrophe, the essence of which is explained in detail. In the conclusion, a comprehensive plan for information protection of the public consciousness and mentality of Euro-Atlantic citizens from the aggression of the enemy is proposed.

Keywords: cyber and information security, hybrid war, psycho-information technology, synergetic war, Ruschism

Procedia PDF Downloads 115
1951 Analytical Study: An M-Learning App Reflecting the Factors Affecting Student’s Adoption of M-Learning

Authors: Ahmad Khachan, Ahmet Ozmen

Abstract:

This study aims to introduce a mobile bite-sized learning concept, a mobile application with social networks motivation factors that will encourage students to practice critical thinking, improve analytical skills and learn knowledge sharing. We do not aim to propose another e-learning or distance learning based tool like Moodle and Edmodo; instead, we introduce a mobile learning tool called Interactive M-learning Application. The tool reconstructs and strengthens the bonds between educators and learners and provides a foundation for integrating mobile devices in education. The application allows learners to stay connected all the time, share ideas, ask questions and learn from each other. It is built on Android since the Android has the largest platform share in the world and is dominating the market with 74.45% share in 2018. We have chosen Google-Firebase server for hosting because of flexibility, ease of hosting and real time update capabilities. The proposed m-learning tool was offered to four groups of university students in different majors. An improvement in the relation between the students, the teachers and the academic institution was obvious. Student’s performance got much better added to better analytical and critical skills advancement and moreover a willingness to adopt mobile learning in class. We have also compared our app with another tool in the same class for clarity and reliability of the results. The student’s mobile devices were used in this experimental study for diversity of devices and platform versions.

Keywords: education, engineering, interactive software, undergraduate education

Procedia PDF Downloads 130
1950 Emerging Cyber Threats and Cognitive Vulnerabilities: Cyberterrorism

Authors: Oludare Isaac Abiodun, Esther Omolara Abiodun

Abstract:

The purpose of this paper is to demonstrate that cyberterrorism is existing and poses a threat to computer security and national security. Nowadays, people have become excitedly dependent upon computers, phones, the Internet, and the Internet of things systems to share information, communicate, conduct a search, etc. However, these network systems are at risk from a different source that is known and unknown. These network systems risk being caused by some malicious individuals, groups, organizations, or governments, they take advantage of vulnerabilities in the computer system to hawk sensitive information from people, organizations, or governments. In doing so, they are engaging themselves in computer threats, crime, and terrorism, thereby making the use of computers insecure for others. The threat of cyberterrorism is of various forms and ranges from one country to another country. These threats include disrupting communications and information, stealing data, destroying data, leaking, and breaching data, interfering with messages and networks, and in some cases, demanding financial rewards for stolen data. Hence, this study identifies many ways that cyberterrorists utilize the Internet as a tool to advance their malicious mission, which negatively affects computer security and safety. One could identify causes for disparate anomaly behaviors and the theoretical, ideological, and current forms of the likelihood of cyberterrorism. Therefore, for a countermeasure, this paper proposes the use of previous and current computer security models as found in the literature to help in countering cyberterrorism

Keywords: cyberterrorism, computer security, information, internet, terrorism, threat, digital forensic solution

Procedia PDF Downloads 76
1949 Seroprevalence of Hepatitis a Virus Infection among General Population in Central-West Tunisia

Authors: Jihene Bettaieb, Kaouther Ayouni, Ghassen Kharroubi, Rym Mallekh, Walid Hammemi, Afif Ben Salah, Henda Triki

Abstract:

In Tunisia, the hepatitis A virus (HAV) represents a public health concern. Due to the progress in sanitation and socio-economic conditions, the epidemiology of HAV has shown dynamic changes over the past years. This study aimed to investigate the current seroprevalence of HAV antibodies (anti-HAV) among the residents of Thala, a rural setting in central-west Tunisia, to determine the age-specific seroprevalence for HAV infection and co-infection with hepatitis C and B virus. A total of 1379 subjects (mean age: 25.0 ± 17.3 years, 555 males/ 824 females) were recruited between January and June 2014. The study population included 95 individuals previously known as hepatitis C positive. Serum samples were collected and screened for the detection of IgG anti-HAV, HBsAg, and HBcAb by the Elisa Test. The overall anti- HAV seroprevalence was about 84.7%. There was no statistically significant difference between males and females. On the 1379 tested individual, 219 were positive for HBcAb, and 67 were positive for HBsAg. IgG anti- HAV were positive in 80.6% of HBsAg-positive patients (54 out of 67), 81.3% of HBcAb-positive patients (178 out of 219), and in 95.8% of HCV-positive patients (91 out of 95). HBV infection and HCV infection were statistically associated with a greater risk of positive anti-HAV antibody (p < 0.001). Our study revealed that Thala represents an intermediate endemicity level and that the introduction of vaccination against HAV in this region is recommended, especially for the hepatitis B or C infected person seronegative for HAV.

Keywords: coinfection, hepatitis A, seroprevalence, Tunisia

Procedia PDF Downloads 134
1948 A Geometric Interpolation Scheme in Overset Meshes for the Piecewise Linear Interface Calculation Volume of Fluid Method in Multiphase Flows

Authors: Yanni Chang, Dezhi Dai, Albert Y. Tong

Abstract:

Piecewise linear interface calculation (PLIC) schemes are widely used in the volume-of-fluid (VOF) method to capture interfaces in numerical simulations of multiphase flows. Dynamic overset meshes can be especially useful in applications involving component motions and complex geometric shapes. In the present study, the VOF value of an acceptor cell is evaluated in a geometric way that transfers the fraction field between the meshes precisely with reconstructed interfaces from the corresponding donor elements. The acceptor cell value is evaluated by using a weighted average of its donors for most of the overset interpolation schemes for continuous flow variables. The weighting factors are obtained by different algebraic methods. Unlike the continuous flow variables, the VOF equation is a step function near the interfaces, which ranges from zero to unity rapidly. A geometric interpolation scheme of the VOF field in overset meshes for the PLIC-VOF method has been proposed in the paper. It has been tested successfully in quadrilateral/hexahedral overset meshes by employing several VOF advection tests with imposed solenoidal velocity fields. The proposed algorithm has been shown to yield higher accuracy in mass conservation and interface reconstruction compared with three other algebraic ones.

Keywords: interpolation scheme, multiphase flows, overset meshes, PLIC-VOF method

Procedia PDF Downloads 153
1947 Optimization Based Extreme Learning Machine for Watermarking of an Image in DWT Domain

Authors: RAM PAL SINGH, VIKASH CHAUDHARY, MONIKA VERMA

Abstract:

In this paper, we proposed the implementation of optimization based Extreme Learning Machine (ELM) for watermarking of B-channel of color image in discrete wavelet transform (DWT) domain. ELM, a regularization algorithm, works based on generalized single-hidden-layer feed-forward neural networks (SLFNs). However, hidden layer parameters, generally called feature mapping in context of ELM need not to be tuned every time. This paper shows the embedding and extraction processes of watermark with the help of ELM and results are compared with already used machine learning models for watermarking.Here, a cover image is divide into suitable numbers of non-overlapping blocks of required size and DWT is applied to each block to be transformed in low frequency sub-band domain. Basically, ELM gives a unified leaning platform with a feature mapping, that is, mapping between hidden layer and output layer of SLFNs, is tried for watermark embedding and extraction purpose in a cover image. Although ELM has widespread application right from binary classification, multiclass classification to regression and function estimation etc. Unlike SVM based algorithm which achieve suboptimal solution with high computational complexity, ELM can provide better generalization performance results with very small complexity. Efficacy of optimization method based ELM algorithm is measured by using quantitative and qualitative parameters on a watermarked image even though image is subjected to different types of geometrical and conventional attacks.

Keywords: BER, DWT, extreme leaning machine (ELM), PSNR

Procedia PDF Downloads 290
1946 Application of Computational Flow Dynamics (CFD) Analysis for Surge Inception and Propagation for Low Head Hydropower Projects

Authors: M. Mohsin Munir, Taimoor Ahmad, Javed Munir, Usman Rashid

Abstract:

Determination of maximum elevation of a flowing fluid due to sudden rejection of load in a hydropower facility is of great interest to hydraulic engineers to ensure safety of the hydraulic structures. Several mathematical models exist that employ one-dimensional modeling for the determination of surge but none of these perfectly simulate real-time circumstances. The paper envisages investigation of surge inception and propagation for a Low Head Hydropower project using Computational Fluid Dynamics (CFD) analysis on FLOW-3D software package. The fluid dynamic model utilizes its analysis for surge by employing Reynolds’ Averaged Navier-Stokes Equations (RANSE). The CFD model is designed for a case study at Taunsa hydropower Project in Pakistan. Various scenarios have run through the model keeping in view upstream boundary conditions. The prototype results were then compared with the results of physical model testing for the same scenarios. The results of the numerical model proved quite accurate coherence with the physical model testing and offers insight into phenomenon which are not apparent in physical model and shall be adopted in future for the similar low head projects limiting delays and cost incurred in the physical model testing.

Keywords: surge, FLOW-3D, numerical model, Taunsa, RANSE

Procedia PDF Downloads 342
1945 The Potential of Hybrid Microgrids for Mitigating Power Outage in Lebanon

Authors: R. Chedid, R. Ghajar

Abstract:

Lebanon electricity crisis continues to escalate. Rationing hours still apply across the country but with different rates. The capital Beirut is subjected to 3 hours cut while other cities, town and villages may endure 9 to 14 hours of power shortage. To mitigate this situation, private diesel generators distributed illegally all over the country are being used to bridge the gap in power supply. Almost each building in large cities has its own generator and individual villages may have more than one generator supplying their loads. These generators together with their private networks form incomplete and ill-designed and managed microgrids (MG) but can be further developed to become renewable energy-based MG operating in island- or grid-connected modes. This paper will analyze the potential of introducing MG to help resolve the energy crisis in Lebanon. It will investigate the usefulness of developing MG under the prevailing situation of existing private power supply service providers and in light of the developed national energy policy that supports renewable energy development. A case study on a distribution feeder in a rural area will be analyzed using HOMER software to demonstrate the usefulness of introducing photovoltaic (PV) arrays along the existing diesel generators for all the stakeholders; namely, the developers, the customers, the utility and the community at large. Policy recommendations regarding MG development in Lebanon will be presented on the basis of the accumulated experience in private generation and the privatization and public-private partnership laws.

Keywords: decentralized systems, distributed generation, microgrids, renewable energy

Procedia PDF Downloads 117
1944 Biosorption of Metal Ions from Sarcheshmeh Acid Mine Drainage by Immobilized Bacillus thuringiensis in a Fixed-Bed Column

Authors: V. Khosravi, F. D. Ardejani, A. Aryafar, M. Sedighi

Abstract:

Heavy metals have a damaging impact for the environment, animals and humans due to their extreme toxicity and removing them from wastewaters is a very important and interesting task in the field of water pollution control. Biosorption is a relatively new method for treatment of wastewaters and recovery of heavy metals. In this study, a continuous fixed bed study was carried out by using Bacillus thuringiensis as a biosorbent for the removal of Cu and Mn ions from Sarcheshmeh Acid Mine Drainage (AMD). The effect of operating parameters such as flow rate and bed height on the sorption characteristics of B. thuringiensis was investigated at pH 6.0 for each metal ion. The experimental results showed that the breakthrough time decreased with increasing flow rate and decreasing bed height. The data also indicated that the equilibrium uptake of both metals increased with decreasing flow rate and increasing bed height. BDST, Thomas, and Yoon–Nelson models were applied to experimental data to predict the breakthrough curves. All models were found suitable for describing the whole dynamic behavior of the column with respect to flow rate and bed height. In order to regenerate the adsorbent, an elution step was carried out with 1 M HCl and five adsorption-desorption cycles were carried out in continuous manner.

Keywords: acid mine drainage, bacillus thuringiensis, biosorption, cu and mn ions, fixed bed

Procedia PDF Downloads 388
1943 Computational Prediction of the Effect of S477N Mutation on the RBD Binding Affinity and Structural Characteristic, A Molecular Dynamics Study

Authors: Mohammad Hossein Modarressi, Mozhgan Mondeali, Khabat Barkhordari, Ali Etemadi

Abstract:

The COVID-19 pandemic, caused by SARS-CoV-2, has led to significant concerns worldwide due to its catastrophic effects on public health. The SARS-CoV-2 infection is initiated with the binding of the receptor-binding domain (RBD) in its spike protein to the ACE2 receptor in the host cell membrane. Due to the error-prone entity of the viral RNA-dependent polymerase complex, the virus genome, including the coding region for the RBD, acquires new mutations, leading to the appearance of multiple variants. These variants can potentially impact transmission, virulence, antigenicity and evasive immune properties. S477N mutation located in the RBD has been observed in the SARS-CoV-2 omicron (B.1.1. 529) variant. In this study, we investigated the consequences of S477N mutation at the molecular level using computational approaches such as molecular dynamics simulation, protein-protein interaction analysis, immunoinformatics and free energy computation. We showed that displacement of Ser with Asn increases the stability of the spike protein and its affinity to ACE2 and thus increases the transmission potential of the virus. This mutation changes the folding and secondary structure of the spike protein. Also, it reduces antibody neutralization, raising concern about re-infection, vaccine breakthrough and therapeutic values.

Keywords: S477N, COVID-19, molecular dynamic, SARS-COV2 mutations

Procedia PDF Downloads 152
1942 Terrorism and Sustainable Tourism Development

Authors: P. Okoro Ugo Chigozie, P. A. Igbojekwe, E. N. Ukabuilu

Abstract:

Tourism and terrorism experiences are best viewed as dynamic, complex systems with extreme diverse consequences on any nation’s economy. Tourism is one of the biggest industries in the world and one of the economical sectors which grows rapidly; tourism has positive impact on the nation’s economy. Terrorism is the method or the theory behind the method whereby an organized group or party seeks to achieve its avowed aims chiefly through the systematic use of violence; the consequences of terrorism on tourist destinations are inescapable and can be profound. Especially, it threatens the attractiveness of a tourist destination and strips the competitiveness of that destination. Destination’s vulnerability to politically motivated violence not only retracts tourists, but threatens sustainable tourism development. This paper examines the activities of the Jamaata Ahlis Sunna Liddaawati -an Islamic sect popularly known as Boko Haram – and its impact on sustainable tourism development in the Nigeria state. Possible triggers of this insurgency and potentially evolving measure against its influence on sustainable tourism including, strong image management of the tourism industry, feasible tourist safety policy, viable anti-terrorism measures, proactive respond to the challenge of terrorism, reinforcement of the legitimate frameworks and irrevocable penalty against menace of corruption; are discussed in this paper, as limiting the effects of insurgency on the attractiveness of Nigeria as safe tourists destination.

Keywords: Nigeria, terrorism, sustainable tourism development, corruption and competitiveness

Procedia PDF Downloads 598
1941 A Heuristic Based Decomposition Approach for a Hierarchical Production Planning Problem

Authors: Nusrat T. Chowdhury, M. F. Baki, A. Azab

Abstract:

The production planning problem is concerned with specifying the optimal quantities to produce in order to meet the demand for a prespecified planning horizon with the least possible expenditure. Making the right decisions in production planning will affect directly the performance and productivity of a manufacturing firm, which is important for its ability to compete in the market. Therefore, developing and improving solution procedures for production planning problems is very significant. In this paper, we develop a Dantzig-Wolfe decomposition of a multi-item hierarchical production planning problem with capacity constraint and present a column generation approach to solve the problem. The original Mixed Integer Linear Programming model of the problem is decomposed item by item into a master problem and a number of subproblems. The capacity constraint is considered as the linking constraint between the master problem and the subproblems. The subproblems are solved using the dynamic programming approach. We also propose a multi-step iterative capacity allocation heuristic procedure to handle any kind of infeasibility that arises while solving the problem. We compare the computational performance of the developed solution approach against the state-of-the-art heuristic procedure available in the literature. The results show that the proposed heuristic-based decomposition approach improves the solution quality by 20% as compared to the literature.

Keywords: inventory, multi-level capacitated lot-sizing, emission control, setup carryover

Procedia PDF Downloads 122
1940 Ground Effect on Marine Midge Water Surface Locomotion

Authors: Chih-Hua Wu, Bang-Fuh Chen, Keryea Soong

Abstract:

Midges can move on the surface of the water at speeds of approximately 340 body-lengths/s and can move continuously for >90 min. Their wings periodically scull the sea surface to push water backward and thus generate thrust; their other body parts, including their three pairs of legs, touch the water only occasionally. The aim of this study was to investigate the locomotion mechanism of marine midges with a size of 2 mm and living in shallow reefs in Wanliton, southern Taiwan. We assumed that midges generate lift through two mechanisms: by sculling the surface of seawater to leverage the generated tension for thrust and by retracting their wings to generate aerodynamic lift at a suitable angle of attack. We performed computational fluid dynamic simulations to determine the mechanism of midge locomotion above the surface of the water. The simulations indicated that ground effects are essential and that both the midge trunk and wing tips must be very close to the water surface to produce sufficient lift to keep the midge airborne. Furthermore, a high wing-beat frequency is crucial for the midge to produce sufficient lift during wing retraction. Accordingly, ground effects, forward speed, and high wing-beat frequency are major factors influencing the ability of midges to generate sufficient lift and remain airborne above the water surface.

Keywords: ground effect, water locomotion, CFD, aerodynamic lift

Procedia PDF Downloads 63
1939 Comparing Machine Learning Estimation of Fuel Consumption of Heavy-Duty Vehicles

Authors: Victor Bodell, Lukas Ekstrom, Somayeh Aghanavesi

Abstract:

Fuel consumption (FC) is one of the key factors in determining expenses of operating a heavy-duty vehicle. A customer may therefore request an estimate of the FC of a desired vehicle. The modular design of heavy-duty vehicles allows their construction by specifying the building blocks, such as gear box, engine and chassis type. If the combination of building blocks is unprecedented, it is unfeasible to measure the FC, since this would first r equire the construction of the vehicle. This paper proposes a machine learning approach to predict FC. This study uses around 40,000 vehicles specific and o perational e nvironmental c onditions i nformation, such as road slopes and driver profiles. A ll v ehicles h ave d iesel engines and a mileage of more than 20,000 km. The data is used to investigate the accuracy of machine learning algorithms Linear regression (LR), K-nearest neighbor (KNN) and Artificial n eural n etworks (ANN) in predicting fuel consumption for heavy-duty vehicles. Performance of the algorithms is evaluated by reporting the prediction error on both simulated data and operational measurements. The performance of the algorithms is compared using nested cross-validation and statistical hypothesis testing. The statistical evaluation procedure finds that ANNs have the lowest prediction error compared to LR and KNN in estimating fuel consumption on both simulated and operational data. The models have a mean relative prediction error of 0.3% on simulated data, and 4.2% on operational data.

Keywords: artificial neural networks, fuel consumption, friedman test, machine learning, statistical hypothesis testing

Procedia PDF Downloads 157
1938 Women Students’ Management of Alcohol- Related Sexual Risk at a South African University

Authors: Shakila Singh

Abstract:

This research was conducted at a selected South African university campus with women students who drink alcohol. The purpose of the study was to examine their perspectives on the role of alcohol in their lives, their understandings about women’s vulnerability to alcohol-related sexual risk and their strategies against these. The study draws on feminist principles and practices to challenge gendered inequalities that legitimate and facilitate violence against women. Recognising the danger of focusing on risk management in ways that place the burden of responsibility entirely on young women to prevent their violation, this article focuses on women students’ agency in managing risk while taking up opportunities for self-discovery. Participation was voluntary, and a student-researcher administered an open-ended questionnaire to 55 participants. The findings suggest that young women position alcohol- use as a common activity at university, and that it gives them much pleasure. They recognise that it is riskier for women and articulate valuable strategies to manage the risk to their sexual safety when drinking. These include drinking within supportive networks, avoiding financial dependence, and managing their alcohol intake. This article argues that alcohol at university is an integral part of expressions of gender and sexuality and that risk-taking is a normal part of university students’ lives. Consequently, arguments about equality need to consider risk-taking as part of young people’s lives and promote ways of managing alcohol-related risks, rather than imagining that alcohol can be avoided entirely.

Keywords: alcohol-related sexual risk, drinking at university, managing risk, women students

Procedia PDF Downloads 72
1937 Grading Fourteen Zones of Isfahan in Terms of the Impact of Globalization on the Urban Fabric of the City, Using the TOPSIS Model

Authors: A. Zahedi Yeganeh, A. Khademolhosseini, R. Mokhtari Malekabadi

Abstract:

Undoubtedly one of the most far-reaching and controversial topics considered in the past few decades, has been globalization. Globalization lies in the essence of the modern culture. It is a complex and rapidly expanding network of links and mutual interdependence that is an aspect of modern life; though some argue that this link existed since the beginning of human history. If we consider globalization as a dynamic social process in which the geographical constraints governing the political, economic, social and cultural relationships have been undermined, it might not be possible to simply describe its impact on the urban fabric. But since in this phenomenon the increase in communications of societies (while preserving the main cultural - regional characteristics) with one another and the increase in the possibility of influencing other societies are discussed, the need for more studies will be felt. The main objective of this study is to grade based on some globalization factors on urban fabric applying the TOPSIS model. The research method is descriptive - analytical and survey. For data analysis, the TOPSIS model and SPSS software were used and the results of GIS software with fourteen cities are shown on the map. The results show that the process of being influenced by the globalization of the urban fabric of fourteen zones of Isfahan was not similar and there have been large differences in this respect between city zones; the most affected areas are zones 5, 6 and 9 of the municipality and the least impact has been on the zones 4 and 3 and 2.

Keywords: grading, globalization, urban fabric, 14 zones of Isfahan, TOPSIS model

Procedia PDF Downloads 296
1936 Optimization of Friction Stir Welding Parameters for Joining Aluminium Alloys using Response Surface Methodology and Artificial Neural Network

Authors: A. M. Khourshid, A. M. El-Kassas, I. Sabry

Abstract:

The objective of this work was to investigate the mechanical properties in order to demonstrate the feasibility of friction stir welding for joining Al 6061 aluminium alloys. Welding was performed on pipe with different thickness (2, 3 and 4 mm), five rotational speeds (485, 710, 910, 1120 and 1400 rpm) and a traverse speed of 4mm/min. This work focuses on two methods which are artificial neural networks using software and Response Surface Methodology (RSM) to predict the tensile strength, the percentage of elongation and hardness of friction stir welded 6061 aluminium alloy. An Artificial Neural Network (ANN) model was developed for the analysis of the friction stir welding parameters of 6061 pipe. Tensile strength, the percentage of elongation and hardness of weld joints were predicted by taking the parameters tool rotation speed, material thickness and axial force as a function. A comparison was made between measured and predicted data. Response Surface Methodology (RSM) was also developed and the values obtained for the response tensile strength, the percentage of elongation and hardness are compared with measured values. The effect of FSW process parameters on mechanical properties of 6061 aluminium alloy has been analysed in detail.

Keywords: friction stir welding, aluminium alloy, response surface methodology, artificial neural network

Procedia PDF Downloads 272
1935 Factors Affecting Reproductive Behaviour of Married Women in Sudan: Acase of Shendi Town

Authors: Mohamed Hamed

Abstract:

Population studies, essentially deals with the size, growth, and distribution of the population in a given area. Size, growth, and distribution are determined by three major factors, which are reproduction, mortality, and migration. Of these factors, reproduction is a potent socio-demographic force in vital process of population growth. It is a major component of population growth, and has crucial role in population dynamic, because it measures the rate at which a population increased. In fact the most striking feature of human reproduction is its variation. Its levels are vary widely among nations, countries, geographic regions, ethnic. The variations of reproductive behaviour among married women have been empirically documented in a large numbers of countries. For instance, many researchers in developing and developed countries investigated the differential of reproductive behaviour among married women. Most of these studies found that reproductive behaviour is strongly influenced by the socioeconomic and biological factors.Such as education, income, employment of women, marriage pattern, age at marriage, contraceptive use, education, and employment. However, the above socioeconomic and biological factors are determined by cultural factors surrounded by married women. So, this study is going to find out the effect of culture on reproductive behaviour among married women in Sudan, a case of Shendi town.

Keywords: fertilty pattern, sudan, shendi town, factors affecting reproductive behaviour, married women

Procedia PDF Downloads 276
1934 The Involvement of Visual and Verbal Representations Within a Quantitative and Qualitative Visual Change Detection Paradigm

Authors: Laura Jenkins, Tim Eschle, Joanne Ciafone, Colin Hamilton

Abstract:

An original working memory model suggested the separation of visual and verbal systems in working memory architecture, in which only visual working memory components were used during visual working memory tasks. It was later suggested that the visuo spatial sketch pad was the only memory component at use during visual working memory tasks, and components such as the phonological loop were not considered. In more recent years, a contrasting approach has been developed with the use of an executive resource to incorporate both visual and verbal representations in visual working memory paradigms. This was supported using research demonstrating the use of verbal representations and an executive resource in a visual matrix patterns task. The aim of the current research is to investigate the working memory architecture during both a quantitative and a qualitative visual working memory task. A dual task method will be used. Three secondary tasks will be used which are designed to hit specific components within the working memory architecture – Dynamic Visual Noise (visual components), Visual Attention (spatial components) and Verbal Attention (verbal components). A comparison of the visual working memory tasks will be made to discover if verbal representations are at use, as the previous literature suggested. This direct comparison has not been made so far in the literature. Considerations will be made as to whether a domain specific approach should be employed when discussing visual working memory tasks, or whether a more domain general approach could be used instead.

Keywords: semantic organisation, visual memory, change detection

Procedia PDF Downloads 572
1933 The Effect of Merger Transference on the Maintenance of a Narcissistic Patient with a History of Treatment Interruption with Previous Therapists

Authors: Mehravar Javid

Abstract:

This case study delves into the psychological complexities of a 33-year-old woman, the second of three children, whose upbringing under a critical mother and a high-expectation father has significantly shaped her psychological landscape. Exhibiting a blend of worthlessness and a grandiose self, her life is a constant struggle between idealizing her father and devaluing her mother and sisters, coupled with a fear of intimacy and a desire for merger. This internal conflict manifests in symptoms of depression, anxiety, and a pattern of forming and quitting multiple relationships, all driven by a deep-seated need for validation and approval. The therapeutic journey reveals her resistance to treatment, particularly when her defense mechanisms are challenged, reflecting a complex transference dynamic where she yearns for merger yet fears it. The treatment focuses on empathetically addressing her idealization and mirroring needs, allowing for autonomy while repairing communication gaps. This approach not only confronts her emotional deficits rooted in her family dynamics but also aids in her quest for self-identity, navigating through her feelings of emptiness, inferiority, and powerlessness. The study highlights the nuanced interplay of family influence on the development and maintenance of narcissistic traits, offering insights into the therapeutic strategies that can facilitate growth and self-awareness in similar cases.

Keywords: narcissistic personality disorder, merger transference, treatment interruption, case study, family dynamics

Procedia PDF Downloads 50
1932 Weighted Data Replication Strategy for Data Grid Considering Economic Approach

Authors: N. Mansouri, A. Asadi

Abstract:

Data Grid is a geographically distributed environment that deals with data intensive application in scientific and enterprise computing. Data replication is a common method used to achieve efficient and fault-tolerant data access in Grids. In this paper, a dynamic data replication strategy, called Enhanced Latest Access Largest Weight (ELALW) is proposed. This strategy is an enhanced version of Latest Access Largest Weight strategy. However, replication should be used wisely because the storage capacity of each Grid site is limited. Thus, it is important to design an effective strategy for the replication replacement task. ELALW replaces replicas based on the number of requests in future, the size of the replica, and the number of copies of the file. It also improves access latency by selecting the best replica when various sites hold replicas. The proposed replica selection selects the best replica location from among the many replicas based on response time that can be determined by considering the data transfer time, the storage access latency, the replica requests that waiting in the storage queue and the distance between nodes. Simulation results utilizing the OptorSim show our replication strategy achieve better performance overall than other strategies in terms of job execution time, effective network usage and storage resource usage.

Keywords: data grid, data replication, simulation, replica selection, replica placement

Procedia PDF Downloads 243