Search results for: integrated security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5575

Search results for: integrated security

925 Analysis of Ozone Episodes in the Forest and Vegetation Areas with Using HYSPLIT Model: A Case Study of the North-West Side of Biga Peninsula, Turkey

Authors: Deniz Sari, Selahattin İncecik, Nesimi Ozkurt

Abstract:

Surface ozone, which named as one of the most critical pollutants in the 21th century, threats to human health, forest and vegetation. Specifically, in rural areas surface ozone cause significant influences on agricultural productions and trees. In this study, in order to understand to the surface ozone levels in rural areas we focus on the north-western side of Biga Peninsula which covers by the mountainous and forested area. Ozone concentrations were measured for the first time with passive sampling at 10 sites and two online monitoring stations in this rural area from 2013 and 2015. Using with the daytime hourly O3 measurements during light hours (08:00–20:00) exceeding the threshold of 40 ppb over the 3 months (May, June and July) for agricultural crops, and over the six months (April to September) for forest trees AOT40 (Accumulated hourly O3 concentrations Over a Threshold of 40 ppb) cumulative index was calculated. AOT40 is defined by EU Directive 2008/50/EC to evaluate whether ozone pollution is a risk for vegetation, and is calculated by using hourly ozone concentrations from monitoring systems. In the present study, we performed the trajectory analysis by The Hybrid Single-Particle Lagrangian Integrated Trajectory (HYSPLIT) model to follow the long-range transport sources contributing to the high ozone levels in the region. The ozone episodes observed between 2013 and 2015 were analysed using the HYSPLIT model developed by the NOAA-ARL. In addition, the cluster analysis is used to identify homogeneous groups of air mass transport patterns can be conducted through air trajectory clustering by grouping similar trajectories in terms of air mass movement. Backward trajectories produced for 3 years by HYSPLIT model were assigned to different clusters according to their moving speed and direction using a k-means clustering algorithm. According to cluster analysis results, northerly flows to study area cause to high ozone levels in the region. The results present that the ozone values in the study area are above the critical levels for forest and vegetation based on EU Directive 2008/50/EC.

Keywords: AOT40, Biga Peninsula, HYSPLIT, surface ozone

Procedia PDF Downloads 246
924 Laser-Dicing Modeling: Implementation of a High Accuracy Tool for Laser-Grooving and Cutting Application

Authors: Jeff Moussodji, Dominique Drouin

Abstract:

The highly complex technology requirements of today’s integrated circuits (ICs), lead to the increased use of several materials types such as metal structures, brittle and porous low-k materials which are used in both front end of line (FEOL) and back end of line (BEOL) process for wafer manufacturing. In order to singulate chip from wafer, a critical laser-grooving process, prior to blade dicing, is used to remove these layers of materials out of the dicing street. The combination of laser-grooving and blade dicing allows to reduce the potential risk of induced mechanical defects such micro-cracks, chipping, on the wafer top surface where circuitry is located. It seems, therefore, essential to have a fundamental understanding of the physics involving laser-dicing in order to maximize control of these critical process and reduce their undesirable effects on process efficiency, quality, and reliability. In this paper, the study was based on the convergence of two approaches, numerical and experimental studies which allowed us to investigate the interaction of a nanosecond pulsed laser and BEOL wafer materials. To evaluate this interaction, several laser grooved samples were compared with finite element modeling, in which three different aspects; phase change, thermo-mechanical and optic sensitive parameters were considered. The mathematical model makes it possible to highlight a groove profile (depth, width, etc.) of a single pulse or multi-pulses on BEOL wafer material. Moreover, the heat affected zone, and thermo-mechanical stress can be also predicted as a function of laser operating parameters (power, frequency, spot size, defocus, speed, etc.). After modeling validation and calibration, a satisfying correlation between experiment and modeling, results have been observed in terms of groove depth, width and heat affected zone. The study proposed in this work is a first step toward implementing a quick assessment tool for design and debug of multiple laser grooving conditions with limited experiments on hardware in industrial application. More correlations and validation tests are in progress and will be included in the full paper.

Keywords: laser-dicing, nano-second pulsed laser, wafer multi-stack, multiphysics modeling

Procedia PDF Downloads 199
923 BFDD-S: Big Data Framework to Detect and Mitigate DDoS Attack in SDN Network

Authors: Amirreza Fazely Hamedani, Muzzamil Aziz, Philipp Wieder, Ramin Yahyapour

Abstract:

Software-defined networking in recent years came into the sight of so many network designers as a successor to the traditional networking. Unlike traditional networks where control and data planes engage together within a single device in the network infrastructure such as switches and routers, the two planes are kept separated in software-defined networks (SDNs). All critical decisions about packet routing are made on the network controller, and the data level devices forward the packets based on these decisions. This type of network is vulnerable to DDoS attacks, degrading the overall functioning and performance of the network by continuously injecting the fake flows into it. This increases substantial burden on the controller side, and the result ultimately leads to the inaccessibility of the controller and the lack of network service to the legitimate users. Thus, the protection of this novel network architecture against denial of service attacks is essential. In the world of cybersecurity, attacks and new threats emerge every day. It is essential to have tools capable of managing and analyzing all this new information to detect possible attacks in real-time. These tools should provide a comprehensive solution to automatically detect, predict and prevent abnormalities in the network. Big data encompasses a wide range of studies, but it mainly refers to the massive amounts of structured and unstructured data that organizations deal with on a regular basis. On the other hand, it regards not only the volume of the data; but also that how data-driven information can be used to enhance decision-making processes, security, and the overall efficiency of a business. This paper presents an intelligent big data framework as a solution to handle illegitimate traffic burden on the SDN network created by the numerous DDoS attacks. The framework entails an efficient defence and monitoring mechanism against DDoS attacks by employing the state of the art machine learning techniques.

Keywords: apache spark, apache kafka, big data, DDoS attack, machine learning, SDN network

Procedia PDF Downloads 162
922 Socio-Economic Impact of Covid-19 in Ethiopia

Authors: Kebron Abich Asnake

Abstract:

The outbreak of COVID-19 has had far-reaching socio-economic consequences globally, and Ethiopia is no exception. This abstract provides a summary of a research study on the socio-economic impact of COVID-19 in Ethiopia. The study analyzes the health impact, economic repercussions, social consequences, government response measures, and opportunities for post-crisis recovery. In terms of health impact, the research explores the spread and transmission of the virus, the capacity and response of the healthcare system, and the mortality rate, with a focus on vulnerable populations. The economic impact analysis entails investigating the contraction of the GDP, employment and income loss, disruption in key sectors such as agriculture, tourism, and manufacturing, and the specific implications for small and medium-sized enterprises (SMEs), foreign direct investment, and remittances. The social impact section looks at the disruptions in education and the digital divide, food security and nutrition challenges, increased poverty and inequality, gender-based violence, and mental health issues. The research also examines the measures taken by the Ethiopian government, including health and safety regulations, economic stimulus packages, social protection programs, and support for vulnerable populations. Furthermore, the study outlines long-term recovery prospects, social cohesion, and community resilience challenges. It highlights the need to strengthen the healthcare system and finds a balance between health and economic priorities. The research concludes by presenting recommendations for policy-makers and stakeholders, emphasizing opportunities for post-crisis recovery such as diversification of the economy, enhanced healthcare infrastructure, investment in digital infrastructure and technology, and support for domestic tourism and local industries. This research provides valuable insights into the socio-economic impact of COVID-19 in Ethiopia, offering a comprehensive analysis of the challenges faced and potential pathways towards recovery.

Keywords: impact, covid, ethiopia, health

Procedia PDF Downloads 73
921 Integrating Virtual Reality and Building Information Model-Based Quantity Takeoffs for Supporting Construction Management

Authors: Chin-Yu Lin, Kun-Chi Wang, Shih-Hsu Wang, Wei-Chih Wang

Abstract:

A construction superintendent needs to know not only the amount of quantities of cost items or materials completed to develop a daily report or calculate the daily progress (earned value) in each day, but also the amount of quantities of materials (e.g., reinforced steel and concrete) to be ordered (or moved into the jobsite) for performing the in-progress or ready-to-start construction activities (e.g., erection of reinforced steel and concrete pouring). These daily construction management tasks require great effort in extracting accurate quantities in a short time (usually must be completed right before getting off work every day). As a result, most superintendents can only provide these quantity data based on either what they see on the site (high inaccuracy) or the extraction of quantities from two-dimension (2D) construction drawings (high time consumption). Hence, the current practice of providing the amount of quantity data completed in each day needs improvement in terms of more accuracy and efficiency. Recently, a three-dimension (3D)-based building information model (BIM) technique has been widely applied to support construction quantity takeoffs (QTO) process. The capability of virtual reality (VR) allows to view a building from the first person's viewpoint. Thus, this study proposes an innovative system by integrating VR (using 'Unity') and BIM (using 'Revit') to extract quantities to support the above daily construction management tasks. The use of VR allows a system user to be present in a virtual building to more objectively assess the construction progress in the office. This VR- and BIM-based system is also facilitated by an integrated database (consisting of the information and data associated with the BIM model, QTO, and costs). In each day, a superintendent can work through a BIM-based virtual building to quickly identify (via a developed VR shooting function) the building components (or objects) that are in-progress or finished in the jobsite. And he then specifies a percentage (e.g., 20%, 50% or 100%) of completion of each identified building object based on his observation on the jobsite. Next, the system will generate the completed quantities that day by multiplying the specified percentage by the full quantities of the cost items (or materials) associated with the identified object. A building construction project located in northern Taiwan is used as a case study to test the benefits (i.e., accuracy and efficiency) of the proposed system in quantity extraction for supporting the development of daily reports and the orders of construction materials.

Keywords: building information model, construction management, quantity takeoffs, virtual reality

Procedia PDF Downloads 125
920 Financing Energy Efficiency: Innovative Options

Authors: Rahul Ravindranathan, R. P. Gokul

Abstract:

India, in its efforts towards economic and social development, is currently experiencing a heavy demand for energy. Due to the lack of sufficient domestic energy reserves, the country is highly dependent on energy imports which has increased rapidly at a rate of about 12 % per annum since 2005. Hence, India is currently focusing its efforts to manage this energy supply and demand gap and eventually achieve energy security. One of the most cost effective means to reduce this gap is by adopting Energy efficiency measures in the country. Initial assessments have shown that Energy efficiency measures have an energy conservation potential of about 23%. For an estimated investment potential of USD 8 Billion, the annual energy savings was estimated to be about 180 Billion Units per annum. In order to explore this huge energy conservation potential, many critical factors need to be considered to achieve practical energy savings. Financing options for these investments is one such major factor. Not only has India come out with various policy level as well as technology level drives to promote Energy efficiency but it has also developed various financing schemes to promote investment in Energy Efficiency projects. The Public sector has already come out with certain financing schemes such as the Partial Risk Guarantee Fund (PRGF), Venture Capital Fund (VCF), Partial Risk Sharing Fund (PRSF) etc., and various sectors are gradually utilizing these schemes to implement energy saving measures. However, additional financing options are required in order to explore the untouched energy conservation potential in the country. Hence, there is a need to develop some innovative financing options for India which would motivate the private sectors as well as financing institutions to invest in these energy saving measures. This paper shall review the existing financing schemes launched by the Government of India and highlight the key benefits as well as challenges with respect to these schemes. In addition to this, the paper would also review new and innovative financing schemes for India and how the same could be adopted in other parts of the globe especially in South and South East Asia. This review would provide an insight to the various Governments as well as Financial Institutions in coming out with new financing schemes for their country.

Keywords: energy, efficiency, financing, India

Procedia PDF Downloads 334
919 Investigation of the Historical Background of Monumental Mosques in Kocaeli, Turkey by IRT Techniques

Authors: Emre Kishalı, Neslihan TürkmenoğLu Bayraktar

Abstract:

Historical buildings may face various impacts throughout their life cycle. There have been environmental, structural, public works actions on old monuments influencing sustainability and maintenance issues. As a result, ancient monuments can have been undergone various changes in the context of restoration and repair. Currently, these buildings face integrated conditions including city planning macro solutions, old intervention methods, modifications in building envelope and artefacts in terms of conservation. Moreover, documentation of phases is an essential for assessing the historical building, yet it can result in highly complicated and interwoven issues. Herein, two monuments constructed in the 16th century are selected as case studies in Kocaeli, Turkey which are located in different micro climatic conditions and/or exposed to different interventions and which are important for the city as cultural property. Pertev Paşa Mosque (also known as Yenicuma Mosque) -constructed by Architect Sinan-; Gebze Çoban Mustafa Paşa Mosque -constructed in 1523 and known as the work of Architect Sinan but various names asserted as the architect of building according to resources. Active water infiltration and damages, recent material interventions, hidden niches, and foundation techniques of the mosque are investigated via Infrared Thermography under the project of 114K284, “Non-Destructive Test Applications, in the Context of Planned Conservation, through Historical Mosques of Kocaeli: Coban Mustafa Pasa Mosque, Fevziye Mosque and Pertev Pasa Mosque” funded by TUBITAK. It is aimed to reveal active deteriorations on building elements generated by unwanted effects of structural and climatic conditions, historical interventions, and modifications by monitoring the variation of surface temperature and humidity by IRT visualization method which is an important non- destructive process for investigation of monuments in the conservation field in the context of planned conservation. It is also concluded that in-situ monitoring process via IRT through different climatic conditions give substantial information on the behaviour of the envelope to the physical environmental conditions by observation of thermal performance, degradations. However, it is obvious that monitoring of historical buildings cannot be pursued by implementing a single non-destructive technique to have complete data of the structure.

Keywords: IRT, non-destructive test, planned conservation, mosque

Procedia PDF Downloads 335
918 Feature Engineering Based Detection of Buffer Overflow Vulnerability in Source Code Using Deep Neural Networks

Authors: Mst Shapna Akter, Hossain Shahriar

Abstract:

One of the most important challenges in the field of software code audit is the presence of vulnerabilities in software source code. Every year, more and more software flaws are found, either internally in proprietary code or revealed publicly. These flaws are highly likely exploited and lead to system compromise, data leakage, or denial of service. C and C++ open-source code are now available in order to create a largescale, machine-learning system for function-level vulnerability identification. We assembled a sizable dataset of millions of opensource functions that point to potential exploits. We developed an efficient and scalable vulnerability detection method based on deep neural network models that learn features extracted from the source codes. The source code is first converted into a minimal intermediate representation to remove the pointless components and shorten the dependency. Moreover, we keep the semantic and syntactic information using state-of-the-art word embedding algorithms such as glove and fastText. The embedded vectors are subsequently fed into deep learning networks such as LSTM, BilSTM, LSTM-Autoencoder, word2vec, BERT, and GPT-2 to classify the possible vulnerabilities. Furthermore, we proposed a neural network model which can overcome issues associated with traditional neural networks. Evaluation metrics such as f1 score, precision, recall, accuracy, and total execution time have been used to measure the performance. We made a comparative analysis between results derived from features containing a minimal text representation and semantic and syntactic information. We found that all of the deep learning models provide comparatively higher accuracy when we use semantic and syntactic information as the features but require higher execution time as the word embedding the algorithm puts on a bit of complexity to the overall system.

Keywords: cyber security, vulnerability detection, neural networks, feature extraction

Procedia PDF Downloads 78
917 Computational Approach to Identify Novel Chemotherapeutic Agents against Multiple Sclerosis

Authors: Syed Asif Hassan, Tabrej Khan

Abstract:

Multiple sclerosis (MS) is a chronic demyelinating autoimmune disorder, of the central nervous system (CNS). In the present scenario, the current therapies either do not halt the progression of the disease or have side effects which limit the usage of current Disease Modifying Therapies (DMTs) for a longer period of time. Therefore, keeping the current treatment failure schema, we are focusing on screening novel analogues of the available DMTs that specifically bind and inhibit the Sphingosine1-phosphate receptor1 (S1PR1) thereby hindering the lymphocyte propagation toward CNS. The novel drug-like analogs molecule will decrease the frequency of relapses (recurrence of the symptoms associated with MS) with higher efficacy and lower toxicity to human system. In this study, an integrated approach involving ligand-based virtual screening protocol (Ultrafast Shape Recognition with CREDO Atom Types (USRCAT)) to identify the non-toxic drug like analogs of the approved DMTs were employed. The potency of the drug-like analog molecules to cross the Blood Brain Barrier (BBB) was estimated. Besides, molecular docking and simulation using Auto Dock Vina 1.1.2 and GOLD 3.01 were performed using the X-ray crystal structure of Mtb LprG protein to calculate the affinity and specificity of the analogs with the given LprG protein. The docking results were further confirmed by DSX (DrugScore eXtented), a robust program to evaluate the binding energy of ligands bound to the ligand binding domain of the Mtb LprG lipoprotein. The ligand, which has a higher hypothetical affinity, also has greater negative value. Further, the non-specific ligands were screened out using the structural filter proposed by Baell and Holloway. Based on the USRCAT, Lipinski’s values, toxicity and BBB analysis, the drug-like analogs of fingolimod and BG-12 showed that RTL and CHEMBL1771640, respectively are non-toxic and permeable to BBB. The successful docking and DSX analysis showed that RTL and CHEMBL1771640 could bind to the binding pocket of S1PR1 receptor protein of human with greater affinity than as compared to their parent compound (Fingolimod). In this study, we also found that all the drug-like analogs of the standard MS drugs passed the Bell and Holloway filter.

Keywords: antagonist, binding affinity, chemotherapeutics, drug-like, multiple sclerosis, S1PR1 receptor protein

Procedia PDF Downloads 246
916 Measurements for Risk Analysis and Detecting Hazards by Active Wearables

Authors: Werner Grommes

Abstract:

Intelligent wearables (illuminated vests or hand and foot-bands, smart watches with a laser diode, Bluetooth smart glasses) overflow the market today. They are integrated with complex electronics and are worn very close to the body. Optical measurements and limitation of the maximum light density are needed. Smart watches are equipped with a laser diode or control different body currents. Special glasses generate readable text information that is received via radio transmission. Small high-performance batteries (lithium-ion/polymer) supply the electronics. All these products have been tested and evaluated for risk. These products must, for example, meet the requirements for electromagnetic compatibility as well as the requirements for electromagnetic fields affecting humans or implant wearers. Extensive analyses and measurements were carried out for this purpose. Many users are not aware of these risks. The result of this study should serve as a suggestion to do it better in the future or simply to point out these risks. Commercial LED warning vests, LED hand and foot-bands, illuminated surfaces with inverter (high voltage), flashlights, smart watches, and Bluetooth smart glasses were checked for risks. The luminance, the electromagnetic emissions in the low-frequency as well as in the high-frequency range, audible noises, and nervous flashing frequencies were checked by measurements and analyzed. Rechargeable lithium-ion or lithium-polymer batteries can burn or explode under special conditions like overheating, overcharging, deep discharge or using out of the temperature specification. Some risk analysis becomes necessary. The result of this study is that many smart wearables are worn very close to the body, and an extensive risk analysis becomes necessary. Wearers of active implants like a pacemaker or implantable cardiac defibrillator must be considered. If the wearable electronics include switching regulators or inverter circuits, active medical implants in the near field can be disturbed. A risk analysis is necessary.

Keywords: safety and hazards, electrical safety, EMC, EMF, active medical implants, optical radiation, illuminated warning vest, electric luminescent, hand and head lamps, LED, e-light, safety batteries, light density, optical glare effects

Procedia PDF Downloads 102
915 Analysis of Policy Issues on Computer-Based Testing in Nigeria

Authors: Samuel Oye Bandele

Abstract:

A policy is a system of principles to guide activities and strategic decisions of an organisation in order to achieve stated objectives and meeting expected outcomes. A Computer Based Test (CBT) policy is therefore a statement of intent to drive the CBT programmes, and should be implemented as a procedure or protocol. Policies are hence generally adopted by an organization or a nation. The concern here, in this paper, is the consideration and analysis of issues that are significant to evolving the acceptable policy that will drive the new CBT innovation in Nigeria. Public examinations and internal examinations in higher educational institutions in Nigeria are gradually making a radical shift from Paper Based or Paper-Pencil to Computer-Based Testing. The need to make an objective and empirical analysis of Policy issues relating to CBT became expedient. The following are some of the issues on CBT evolution in Nigeria that were identified as requiring policy backing. Prominent among them are requirements for establishing CBT centres, purpose of CBT, types and acquisition of CBT equipment, qualifications of staff: professional, technical and regular, security plans and curbing of cheating during examinations, among others. The descriptive research design was employed based on a population consisting of Principal Officers (Policymakers), Staff (Teaching and non-Teaching-Policy implementors), and CBT staff ( Technical and Professional- Policy supports) and candidates (internal and external). A fifty-item researcher-constructed questionnaire on policy issues was employed to collect data from 600 subjects drawn from higher institutions in South West Nigeria, using the purposive and stratified random sampling techniques. Data collected were analysed using descriptive (frequency counts, means and standard deviation) and inferential (t-test, ANOVA, regression and Factor analysis) techniques. Findings from this study showed, among others, that the factor loadings had significantly weights on the organizational and National policy issues on CBT innovation in Nigeria.

Keywords: computer-based testing, examination, innovation, paper-based testing, paper pencil based testing, policy issues

Procedia PDF Downloads 240
914 Structural Equation Modelling Based Approach to Integrate Customers and Suppliers with Internal Practices for Lean Manufacturing Implementation in the Indian Context

Authors: Protik Basu, Indranil Ghosh, Pranab K. Dan

Abstract:

Lean management is an integrated socio-technical system to bring about a competitive state in an organization. The purpose of this paper is to explore and integrate the role of customers and suppliers with the internal practices of the Indian manufacturing industries towards successful implementation of lean manufacturing (LM). An extensive literature survey is carried out. An attempt is made to build an exhaustive list of all the input manifests related to customers, suppliers and internal practices necessary for LM implementation, coupled with a similar exhaustive list of the benefits accrued from its successful implementation. A structural model is thus conceptualized, which is empirically validated based on the data from the Indian manufacturing sector. With the current impetus on developing the industrial sector, the Government of India recently introduced the Lean Manufacturing Competitiveness Scheme that aims to increase competitiveness with the help of lean concepts. There is a huge scope to enrich the Indian industries with the lean benefits, the implementation status being quite low. Hardly any survey-based empirical study in India has been found to integrate customers and suppliers with the internal processes towards successful LM implementation. This empirical research is thus carried out in the Indian manufacturing industries. The basic steps of the research methodology followed in this research are the identification of input and output manifest variables and latent constructs, model proposition and hypotheses development, development of survey instrument, sampling and data collection and model validation (exploratory factor analysis, confirmatory factor analysis, and structural equation modeling). The analysis reveals six key input constructs and three output constructs, indicating that these constructs should act in unison to maximize the benefits of implementing lean. The structural model presented in this paper may be treated as a guide to integrating customers and suppliers with internal practices to successfully implement lean. Integrating customers and suppliers with internal practices into a unified, coherent manufacturing system will lead to an optimum utilization of resources. This work is one of the very first researches to have a survey-based empirical analysis of the role of customers, suppliers and internal practices of the Indian manufacturing sector towards an effective lean implementation.

Keywords: customer management, internal manufacturing practices, lean benefits, lean implementation, lean manufacturing, structural model, supplier management

Procedia PDF Downloads 171
913 Team-Theatre as a Tool of Occupational Safety Awareness

Authors: Fiorenza Misale

Abstract:

The painful phenomenon of so-called white deaths and accidents at work, unfortunately, is always current. The key is to act on the culture of security through effective measures of attitudes and behaviors that go far beyond the knowledge and the know-how. It is necessary that there is an ‘introjection’ of safety culture through the conscious involvement of all workers. The legislation on work safety identifies the main tool to promote the culture of safety at work and prevention within the workplace. In law the term education is used to distinguish itself from the information with which they will simply theoretically transmit, and from the training with which they will provide the practical skills. The new decree fact fills several gaps in previous legislation and stresses the importance of training in the workplace, that is, the main activity through which it is possible to achieve the active participation of all workers in the company’s prevention system. This system is built only through the dissemination of risk information, the circulation of information, comparison and dialogue between all actors involved that are the necessary elements for a correct transmission of the culture of worker safety. Training activity should put the focus on work experience in order to bring out all the knowledge needed to identify and assess the risks in the work place, and especially the action to eliminate or control them, integrating, when necessary, the missing knowledge. In addition to traditional training and information systems can be utilized for the purpose of training that are able to affect both one emotionally and aesthetically, team-theatre is one of them. Among the methods of company theater that can be used in work safety we have: Lesson show, theater workshop, improvised theater, forum theater, theater playback. The theater can represent a complementary approach to traditional training and give information on safety measures, demonstrating that there are more engaging outreach tools. Team-theatre allows identification with the characters, a transmission of emotions and moods and it is through the staging of a story that the individual processes new information. It’ also s a means of experiential training that allows you to work with your mind, body, emotions.The aim of one work is the use of corporate theater on the personnel working in the health sector. Through a questionnaire we are able to analyze the knowledge of occupational safety and current risks; in particular in health care which is to be administered before and after the play.

Keywords: theater, training, occupational health, safety

Procedia PDF Downloads 261
912 Utilization Of Medical Plants Tetrastigma glabratum (Blume) Planch from Mount Prau in the Blumah, Central Java

Authors: A. Lianah, B. Peter Sopade, C. Krisantini

Abstract:

Walikadep/Tetrastigma glabratum (Blume) Planch is a traditional herb that has been used by people of Blumah village; it is believed to have a stimulant effect and ailments for many illnesses. Our survey demonstrated that the people of Blumah village has exploited walikadep from Protected Forest of Mount Prau. More than 10% of 448 households at Blumah village have used walikadep as traditional herb or jamu. Part of the walikadep plants used is the liquid extract of the stem. The population of walikadep is getting scarce and it is rarely found now. The objectives of this study are to examine the stimulant effect of walikadep, to measure growth and exploitation rate of walikadep, and to find ways to effectively propagate the plants, as well as identifying the impact on the environment through field experiments and explorative survey. Stimulant effect was tested using open-field and hole-board test. Data were collected through field observation and experiment, and data were analysed using lab test and Anova. Rate of exploitation and plant growth was measured using Regression analysis; comparison of plant growth in-situ and ex-situ used descriptive analysis. The environmental impact was measured by population structure vegetation analysis method by Shannon Weinner. The study revealed that the walikadep exudates did not have a stimulant effect. Exploitation of walikadep and the long time required to reach harvestable size resulted in the scarcity of the plant in the natural habitat. Plant growth was faster in-situ than ex-situ; and fast growth was obtained from middle part cuttings treated with vermicompost. Biodiversity index after exploitation was higher than before exploitation, possibly due to the toxic and allellopathic effect (phenolics) of the plant. Based on these findings, further research is needed to examine the toxic effects of the leave and stem extract of walikadep and their allelopathic effects. We recommend that people of Blumah village to stop using walikadep as the stimulant. The local people, village government in the regional and central levels, and perhutani should do an integrated efforts to conserve walikadep through Pengamanan Terpadu Konservasi Walikadep Lestari (PTKWL) program, so this population of this plant in the natural habitat can be maintained.

Keywords: utilization, medical plants, traditional, Tetastigma glabratum

Procedia PDF Downloads 268
911 Integrated Information Approach to Inbound Logistics in Indian Steel Sector

Authors: N. Jena, Nitin Seth

Abstract:

Globalization and free trade has forced the organizations to continuously rethink and rework on the increasing cost of logistics. World wide, it is visualized that on one side the steel sector is witnessing rapid growth and on the other side it is facing huge challenges in terms of availability of raw materials for uninterrupted production. Inbound logistics also gains significant importance for ensuring the timely availability of raw materials. It is seen that in Indian steel sector logistic cost is still very large and challenging. Effectively managing the inbound logistics in steel decides the profitability and serviceability of the organization. Effective management of inbound logistics also has a major role on the inventory of the organization. Since, the logistics for the steel industry in India is evolving rapidly and it is the interplay of infrastructure, technology and new types of service providers that will define whether the industry is able to help its customers to reduce their logistics costs. Integration of Logistics has been treated as one of the most potential area for the companies to provide a base for cost reduction. In spite of the proven area for benefits for the industry, it is very surprising that none of the researchers have explored this area. Although, many researchers explored the subject of logistics in steel industry, but their perspective varied from exploring and understanding the associated cost and finding out the relations between them. Visualizing a potential gap, the present research is under taken to explore the integration opportunities in inbound logistics for steel sector. Typically in Indian steel sector where in most of the manufacturers depend on imported materials for processing the logistics is very challenging and accounts for transactions at supplier – who is situated in different country, shipper- who is transporting the material to the host country, regulators in both countries-that include customs and various clearing agents, local logistics service providers and local transporters/handlers. It is seen that In bound logistics cost in the steel sector is very high and accounts for about 15-16% of the turn over, integration of information across different channels provides and opportunity for improvements and growth of the organization. In the present paper, a case of leading steel manufacturer has been taken and the potentials for integration of information across various partners have been identified. The paper provides the identification of grey area in steel sector for major improvements in cycle time and lowering the inventories by integration of information. Finally, based on integration of information, the paper presents a business information framework for steel sector.

Keywords: integration, steel sectors, suppliers, shippers, customs and cargo agents, transporters

Procedia PDF Downloads 332
910 Optimization of the Energy Consumption of the Pottery Kilns by the Use of Heat Exchanger as Recovery System and Modeling of Heat Transfer by Conduction Through the Walls of the Furnace

Authors: Maha Bakakri, Rachid Tadili, Fatiha Lemmini

Abstract:

Morocco is one of the few countries that have kept their traditional crafts, despite the competition of modern industry and its impact on manual labor. Therefore the optimization of energy consumption becomes an obligation and this is the purpose of this document. In this work we present some characteristics of the furnace studied, its operating principle and the experimental measurements of the evolutions of the temperatures inside and outside the walls of the furnace, values which will be used later in the calculation of its thermal losses. In order to determine the major source of the thermal losses of the furnace we have established the heat balance of the furnace. The energy consumed, the useful energy and the thermal losses through the walls and the chimney of the furnace are calculated thanks to the experimental measurements which we realized for several firings. The results show that the energy consumption of this type of furnace is very high and that the main source of energy loss is mainly due to the heat losses of the combustion gases that escape from the furnace by the chimney while the losses through the walls are relatively small. it have opted for energy recovery as a solution where we can recover some of the heat lost through the use of a heat exchanger system using a double tube introduced into the flue gas exhaust stack compartment. The study on the heat recovery system is presented and the heat balance inside the exchanger is established. In this paper we also present the numerical modeling of heat transfer by conduction through the walls of the furnace. A numerical model has been established based on the finite volume method and the double scan method. It makes it possible to determine the temperature profile of the furnace and thus to calculate the thermal losses of its walls and to deduce the thermal losses due to the combustion gases. Validation of the model is done using the experimental measurements carried out on the furnace. The results obtained in this work, relating to the energy consumed during the operation of the furnace are important and are part of the energy efficiency framework that has become a key element in global energy policies. It is the fastest and cheapest way to solve energy, environmental and economic security problems.

Keywords: energy cunsumption, energy recovery, modeling, energy eficiency

Procedia PDF Downloads 59
909 Management of Blood Exposure Risk: Knowledge and Attitudes of Caregivers in Pediatric Dapartments

Authors: Hela Ghali, Oumayma Ben Amor, Salwa Khefacha, Mohamed Ben Rejeb, Sirine Frigui, Meriam Tourki Dhidah, Lamine Dhidah, Houyem Said Laatiri

Abstract:

Background: Blood exposure accidents are the most common problem in hospitals that threaten healthcare professionals with a high risk of infectious complications which weighs heavily on health systems worldwide. Paramedics are the highest risk group due to the nature of their daily activities. We aimed to determine knowledge and attitudes about the management of blood-exposure accidents among nurses and technicians in two pediatric departments. Materials/Methods: This is a cross-sectional descriptive study conducted on March 2017, carried out with the care staff of the pediatric ward of the Farhat Hached Teaching Hospital of Sousse and pediatric surgery of the Fattouma Bourguiba University Hospital in Monastir, using a pre- tested and self-administered questionnaire. Data entry and analysis were performed using Excel software. Results: The response rate was 85.1%. A female predominance (82.5%) was reported among respondents with a sex ratio of 0.21. 80% of the participants were under 35 years old. Seniority of less than 10 years was found in 77.5% of respondents. Only 22.5% knew the definition of a blood- exposure accident. 100% and 95% of participants reported the relative risk, respectively, to hepatitis and AIDS viruses. However, only 15% recognized the severity factors of a blood-exposure accident. Hygiene compliance was the most important dimension for almost the entire population for the prevention. On the other hand, only 12.5% knew the meaning of 'standard precautions' and ¼ considered them necessary for at-risk patients only. 40% reported being exposed at least once, among them, 87.5% used betadine, and 77.5% said that anti-infectious chemoprophylaxis is necessary regardless of the patient's serological status. However, 52.5% did not know the official reporting circuit of management of blood-exposure accident in their institutions. Conclusion: For better management of risks in hospitals and an improvement of the safety of the care, a reinforcement of the sensibilization of the caregivers with regard to the risks of blood exposure accident is necessary, while developing their knowledge to act in security.

Keywords: attitudes, blood-exposure accident, knowledge, pediatric department

Procedia PDF Downloads 189
908 An Assessment of Rice Yield Improvement Among Smallholder Rice Farmers in Asunafo North Municipality of Ghana

Authors: Isaac Diaka, Matsui Kenichi

Abstract:

Ghana’s rice production has increased mainly because of increased cultivated areas. On this point, scholars who promoted crop production increase for food security have overlooked the fact that its per-acre yield has not increased. Also, Ghana’s domestic rice production has not contributed much to domestic rice consumption especially in major cities where consumers tend to rely on imported rice from Asia. Considering these points, the paper seeks to understand why smallholder rice farmers have not been able to increase per acre rice yield. It also examines smallholder rice farmers’ rice yield improvement needs, and the relationship that exist between rice farmers’ socioeconomic factors and their yield levels by rice varieties. The study adopted a simple random sampling technique to select 154 rice farmers for a questionnaire survey between October and November 2020. The data was analyzed by performing a correlation analysis, an independent t-test, and Kendall’s coefficient of concordance. The results showed that 58.4% of the respondents cultivated popular high-yield varieties like AGRA and Jasmine. The rest used local varieties. Regarding respondents’ yield differentials, AGRA and Jasmine had an average yield of 2.6 mt/ha, which is higher than that of local varieties (1.6mt/ha). The study found untimely availability of improved seed varieties and high cost of inputs some of the major reasons affecting yield in the area. For respondents’ yield improvement needs, Kendall’s coefficient of concordance showed that access to improved varieties, irrigation infrastructure, and row planting were respondents’ major technological needs. As to their non-technological needs, the respondents needed timely information about rice production, access to credit support options, and extension services. The correlation analysis revealed that farm size and off-farm income exhibited a positive and negative association towards respondents’ yield level, respectively. This paper then discusses recommendations for providing with improved rice production technologies to farmers.

Keywords: Ghana, rice, smallholder farmers, yield improvement.

Procedia PDF Downloads 84
907 Bioefficacy of Ocimum sanctum on Survival, Development and Reproduction of Dengue Vector Aedes aegypti L. (Diptera: Culicidae)

Authors: Mohd Shazad, K. K. Gupta

Abstract:

Vector borne diseases are a serious global concern. Aedes aegypti, the primary vector for viruses that cause dengue fever, dengue haemorrhagic fever, chikungunya and yellow fever is widespread over large areas of the tropics and subtropics. In last decade, diseases transmitted by Aedes aegypti are of serious concern. In past decade, number of cases of dengue fever, dengue hemorrhagic fever, and chikungunya has increased multifold. Present research work focused on impact of ethanol extract of Ocimum sanctum on dengue vector Aedes aegypti. 0-24 hr. old fourth instar larvae of lab-bred population of Aedes aegypti were exposed to ethanol leaf extract of Ocimum with concentrations ranging from 50 ppm to 400 ppm. Survival and development and the treated larvae and reproductive behaviour of the adults emerged from the treated larvae was evaluated. Our results indicated larvicidal potential of the leaf ethanol extract. The influence of the extract was dose dependent. 77.2% mortality was observed in the larvae exposed to 400 ppm for 24 hr. Treatment at lower concentrations revealed delayed toxicity. The larvae survived after treatment showed severe developmental anomalies. Consequently, there was the significant increase in duration of fourth instar larva. The L4 treated with 400-ppm extract moulted after 4.6 days; this was in sharp contrast to control where the larval period of the fourth instar lasts three days. The treated fourth instar larvae in many cases transformed into larva-pupa intermediates with the combination of larva, pupa characters. The larva-pupa intermediates had reduced life span and failed to moult successfully. The adults emerged from the larvae treated with lower doses had reduced reproductive potential. The females exhibited longer preoviposition period, reduced oviposition rate, abnormal oviposition behaviour and decreased fertility. Our studies indicated the possibility of the presence of JH mimic or JH analogue in the leaf ethanol extract of Ocimum. The present research work explored the potentials of Ocimum sanctum, also known as the queen of herbs, in integrated vector management programme of Aedes aegypti, which is a serious threat to human health.

Keywords: Aedes aegypti, development, mortality, Ocimum sanctum reproduction

Procedia PDF Downloads 233
906 Pathway Linking Early Use of Electronic Device and Psychosocial Wellbeing in Early Childhood

Authors: Rosa S. Wong, Keith T.S. Tung, Winnie W. Y. Tso, King-Wa Fu, Nirmala Rao, Patrick Ip

Abstract:

Electronic devices have become an essential part of our lives. Various reports have highlighted the alarming usage of electronic devices at early ages and its long-term developmental consequences. More sedentary screen time was associated with increased adiposity, worse cognitive and motor development, and psychosocial health. Apart from the problems caused by children’s own screen time, parents today are often paying less attention to their children due to hand-held device. Some anecdotes suggest that distracted parenting has negative impact on parent-child relationship. This study examined whether distracted parenting detrimentally affected parent-child activities which may, in turn, impair children’s psychosocial health. In 2018/19, we recruited a cohort of preschoolers from 32 local kindergartens in Tin Shui Wai and Sham Shui Po for a 5-year programme aiming to build stronger foundations for children from disadvantaged backgrounds through an integrated support model involving medical, education and social service sectors. A comprehensive set of questionnaires were used to survey parents on their frequency of being distracted while parenting and their frequency of learning and recreational activities with children. Furthermore, they were asked to report children’s screen time amount and their psychosocial problems. Mediation analyses were performed to test the direct and indirect effects of electronic device-distracted parenting on children’s psychosocial problems. This study recruited 873 children (448 females and 425 males, average age: 3.42±0.35). Longer screen time was associated with more psychosocial difficulties (Adjusted B=0.37, 95%CI: 0.12 to 0.62, p=0.004). Children’s screen time positively correlated with electronic device-distracted parenting (r=0.369, p < 01). We also found that electronic device-distracted parenting was associated with more hyperactive/inattentive problems (Adjusted B=0.66, p < 0.01), fewer prosocial behavior (Adjusted B=-0.74, p < 0.01), and more emotional symptoms (Adjusted B=0.61, p < 0.001) in children. Further analyses showed that electronic device-distracted parenting exerted influences both directly and indirectly through parent-child interactions but to different extent depending upon the outcome under investigation (38.8% for hyperactivity/inattention, 31.3% for prosocial behavior, and 15.6% for emotional symptoms). We found that parents’ use of devices and children’s own screen time both have negative effects on children’s psychosocial health. It is important for parents to set “device-free times” each day so as to ensure enough relaxed downtime for connecting with children and responding to their needs.

Keywords: early childhood, electronic device, psychosocial wellbeing, parenting

Procedia PDF Downloads 154
905 Threat Modeling Methodology for Supporting Industrial Control Systems Device Manufacturers and System Integrators

Authors: Raluca Ana Maria Viziteu, Anna Prudnikova

Abstract:

Industrial control systems (ICS) have received much attention in recent years due to the convergence of information technology (IT) and operational technology (OT) that has increased the interdependence of safety and security issues to be considered. These issues require ICS-tailored solutions. That led to the need to creation of a methodology for supporting ICS device manufacturers and system integrators in carrying out threat modeling of embedded ICS devices in a way that guarantees the quality of the identified threats and minimizes subjectivity in the threat identification process. To research, the possibility of creating such a methodology, a set of existing standards, regulations, papers, and publications related to threat modeling in the ICS sector and other sectors was reviewed to identify various existing methodologies and methods used in threat modeling. Furthermore, the most popular ones were tested in an exploratory phase on a specific PLC device. The outcome of this exploratory phase has been used as a basis for defining specific characteristics of ICS embedded devices and their deployment scenarios, identifying the factors that introduce subjectivity in the threat modeling process of such devices, and defining metrics for evaluating the minimum quality requirements of identified threats associated to the deployment of the devices in existing infrastructures. Furthermore, the threat modeling methodology was created based on the previous steps' results. The usability of the methodology was evaluated through a set of standardized threat modeling requirements and a standardized comparison method for threat modeling methodologies. The outcomes of these verification methods confirm that the methodology is effective. The full paper includes the outcome of research on different threat modeling methodologies that can be used in OT, their comparison, and the results of implementing each of them in practice on a PLC device. This research is further used to build a threat modeling methodology tailored to OT environments; a detailed description is included. Moreover, the paper includes results of the evaluation of created methodology based on a set of parameters specifically created to rate threat modeling methodologies.

Keywords: device manufacturers, embedded devices, industrial control systems, threat modeling

Procedia PDF Downloads 72
904 The Use of Artificial Intelligence in Digital Forensics and Incident Response in a Constrained Environment

Authors: Dipo Dunsin, Mohamed C. Ghanem, Karim Ouazzane

Abstract:

Digital investigators often have a hard time spotting evidence in digital information. It has become hard to determine which source of proof relates to a specific investigation. A growing concern is that the various processes, technology, and specific procedures used in the digital investigation are not keeping up with criminal developments. Therefore, criminals are taking advantage of these weaknesses to commit further crimes. In digital forensics investigations, artificial intelligence is invaluable in identifying crime. It has been observed that an algorithm based on artificial intelligence (AI) is highly effective in detecting risks, preventing criminal activity, and forecasting illegal activity. Providing objective data and conducting an assessment is the goal of digital forensics and digital investigation, which will assist in developing a plausible theory that can be presented as evidence in court. Researchers and other authorities have used the available data as evidence in court to convict a person. This research paper aims at developing a multiagent framework for digital investigations using specific intelligent software agents (ISA). The agents communicate to address particular tasks jointly and keep the same objectives in mind during each task. The rules and knowledge contained within each agent are dependent on the investigation type. A criminal investigation is classified quickly and efficiently using the case-based reasoning (CBR) technique. The MADIK is implemented using the Java Agent Development Framework and implemented using Eclipse, Postgres repository, and a rule engine for agent reasoning. The proposed framework was tested using the Lone Wolf image files and datasets. Experiments were conducted using various sets of ISA and VMs. There was a significant reduction in the time taken for the Hash Set Agent to execute. As a result of loading the agents, 5 percent of the time was lost, as the File Path Agent prescribed deleting 1,510, while the Timeline Agent found multiple executable files. In comparison, the integrity check carried out on the Lone Wolf image file using a digital forensic tool kit took approximately 48 minutes (2,880 ms), whereas the MADIK framework accomplished this in 16 minutes (960 ms). The framework is integrated with Python, allowing for further integration of other digital forensic tools, such as AccessData Forensic Toolkit (FTK), Wireshark, Volatility, and Scapy.

Keywords: artificial intelligence, computer science, criminal investigation, digital forensics

Procedia PDF Downloads 199
903 Women's Challenges in Access to Urban Spaces and Infrastructures: A Comparative Study of the Urban Infrastructures Conforming to Women's Needs in Tehran and Istanbul

Authors: Parastoo Kazemiyan

Abstract:

Over the past 80 years, in compliance with the advent of modernity in Iran and Turkey, the presence of women in economic and social arenas has creates serious challenges in the capacity of urban spaces to respond to their presence and transport because urban spaces up until then were based on masculine criteria and therefore, women could use such spaces in the company of their fathers or husbands. However, as modernity expanded by Reza Shah and Ataturk, women found the opportunity to work and be present in urban spaces alongside men and their presence in economic and social domains resulted in their presence in these spaces in the early and late hours of the day. Therefore, the city had to be transformed in structural, social, and environmental terms to accommodate women's activities and presence in various urban arenas, which was a huge step in transition from a masculine man-based culture to an all-inclusive human-based culture in these two countries. However, the optimization of urban space was subject to political changes in the two countries, leading to significant differences in designing urban spaces in Tehran and Istanbul. What shows the importance and novelty of the present study lie in the differences in urban planning and optimization in the two capital cities, which gave rise to different outcomes in desirability and quality of living in these two capital cities. Due to the importance of the topic, one of the most significant factors in desirability and acceptability of urban space for women was examined using a descriptive-analytic method based on qualitative methodology in Tehran and Istanbul. The results showed that the infrastructural factors in Istanbul, including safety of access, variety, and number of public transport modes, transparency, and supervision over public spaces have provided women with a safer and more constant presence compared to Tehran. It seems that challenges involved in providing access to urban spaces in Tehran in terms of infrastructure and function have made Tehran unable to respond to the most basic needs of its female citizens.

Keywords: gender differences, urban space security, access to transportation systems, women's challenges

Procedia PDF Downloads 116
902 Insights on the Social-Economic Implications of the Blue Economy Concept on Coastal Tourism in Tonga

Authors: Amelia Faotusia

Abstract:

The blue economy concept was coined by Pacific nations in recognition of the importance of sustainably managing their extensive marine territories. This is especially important for major ocean-based economic sectors of Pacific economies, such as coastal tourism. There is an absence of research, however, on the key ways in which the blue economy concept has emerged in discourse and public policy in Pacific countries, as well as how it articulates with coastal tourism. This research helps to fill such a gap with a specific focus on Tonga through the application of a post-positivist research approach to conduct a desktop study of relevant national documents and qualitative interviews with relevant government staff, civil society organizations, and tourism operators. The findings of the research reflect the importance of institutional integration and partnerships for a successful blue economy transition and are presented in the form of two case studies corresponding to two sub-sectors of Tonga’s coastal tourism sector: (i) the whale-watching and swimming industry, and (ii) beach resorts and restaurants. A thematic analysis applied to the interview data of both cases then enabled the identification of key areas and issues for socio-economic policy intervention and recommendations in support of blue economy transitions in Tonga’s coastal tourism sector. Examples of the relevant areas and issues that emerged included the importance of foreign direct investment, local market access, community-based special management areas, as well as the need to address the anthropogenic impacts of tropical cyclones, whale tourism, plastic litter on coastal assets, and ecosystems. Policy and practical interventions in support of addressing such issues include a proposed restructuring of the whale-watching and swimming licensing system; integration of climate resilience, adaptation, and capacity building as priorities of local blue economy interventions; as well as strengthening of the economic sustainability dimension of blue economy policies. Finally, this research also revealed the need for further specificity and research on the influence and value of local Tongan culture and traditional knowledge, particularly within existing customary marine tenure systems, on Tonga’s national and sectoral blue economy policies and transitions.

Keywords: blue economy, coastal tourism, integrated ocean management, ecosystem resilience

Procedia PDF Downloads 81
901 Dao Din Student Activists: From Hope to Victims under the Thai Society of Darkness

Authors: Siwach Sripokangkul, Autthapon Muangming

Abstract:

The Dao Din group is a gathering of students from the Faculty of Law, Khon Kaen University, a leading university in the northeast of Thailand. The Dao Din group has been one of the most prominent student movements in the past four decades since the bloody massacre of the 6th of October 1976. The group of student is a movement who gather to oppose and protest against different capitalist-run projects that have impacted upon the environment since 2009. The students have become heroes in Thai society and receive support from various groups, especially the middle class who regard the students as role models for the youth. Subsequently, the Dao Din group has received numerous awards between 2011-2013. However, the Dao Din group opposed the military coup d’état of 2014 and the subsequent military junta. Under the military dictatorship regime (2014-present), security officials have hunted, insulted, arrested, and jailed members of the group many times amidst silence from most of the from the middle class. Therefore, this article posits the question of why the Dao Din group which was once the hero and hope of Thai society, has become a political victim in only a few years. The study methods used are the analysis of documentaries, news articles, and interviews with representatives of the Dao Din group. The author argues that Thailand’s middle class previously demonstrated a positive perception of the Dao Din group precisely because that group had earlier opposed policies of the elected Yingluck Shinawatra government, which most of the middle class already despised. However, once the Dao Din group began to protest against the anti-Yingluck military government, then the middle class turned to harshly criticize the Dao Din group. So it can be concluded that the Thai middle class tends to put its partisan interests ahead of a civil society group which has been critical of elected as well as military administrations. This has led the middle class to support the demolishing of Thai democracy. Such a Thai middle-class characteristic not only poses a strong bulwark for the perpetuation of military rule but also destroys a civil society group (composed of young people) who should be the future hope of the nation rather than under the Thai society of darkness.

Keywords: Dao Din student activists, the military coup d’état of 2014, Thai politics, human rights violations

Procedia PDF Downloads 213
900 Effect of Nanoparticles on Wheat Seed Germination and Seedling Growth

Authors: Pankaj Singh Rawat, Rajeew Kumar, Pradeep Ram, Priyanka Pandey

Abstract:

Wheat is an important cereal crop for food security. Boosting the wheat production and productivity is the major challenge across the nation. Good quality of seed is required for maintaining optimum plant stand which ultimately increases grain yield. Ensuring a good germination is one of the key steps to ensure proper plant stand and moisture assurance during seed germination may help to speed up the germination. The tiny size of nanoparticles may help in entry of water into seed without disturbing their internal structure. Considering above, a laboratory experiment was conducted during 2012-13 at G.B. Pant University of Agriculture and Technology, Pantnagar, India. The completely randomized design was used for statistical analysis. The experiment was conducted in two phases. In the first phase, the appropriate concentration of nanoparticles for seed treatment was screened. In second phase seed soaking hours of nanoparticles for better seed germination were standardized. Wheat variety UP2526 was taken as test crop. Four nanoparticles (TiO2, ZnO, nickel and chitosan) were taken for study. The crop germination studies were done in petri dishes and standard package and practices were used to raise the seedlings. The germination studies were done by following standard procedure. In first phase of the experiment, seeds were treated with 50 and 300 ppm of nanoparticles and control was also maintained for comparison. In the second phase of experiment, seeds were soaked for 4 hours, 6 hours and 8 hours with 50 ppm nanoparticles of TiO2, ZnO, nickel and chitosan along with control treatment to identify the soaking time for better seed germination. Experiment revealed that the application of nanoparticles help to enhance seed germination. The study revealed that seed treatment with  nanoparticles at 50 ppm concentration increases root length, shoot length, seedling length, shoot dry weight, seedling dry weight, seedling vigour index I and seedling vigour index II as compared to seed soaking at 300 ppm concentration. This experiment showed that seed soaking up to 4 hr was better as compared to 6 and 8 hrs. Seed soaking with nanoparticles specially TiO2, ZnO, and chitosan proved to enhance germination and seedling growth indices of wheat crop.

Keywords: nanoparticles, seed germination, seed soaking, wheat

Procedia PDF Downloads 219
899 A Practical Approach Towards Disinfection Challenges in Sterile Manufacturing Area

Authors: Doris Lacej, Eni Bushi

Abstract:

Cleaning and disinfection procedures are essential for maintaining the cleanliness status of the pharmaceutical manufacturing environment particularly of the cleanrooms and sterile unit area. The Good Manufacturing Practice (GMP) Annex 1 recommendation highly requires the implementation of the standard and validated cleaning and disinfection protocols. However, environmental monitoring has shown that even a validated cleaning method with certified agents may result in the presence of atypical microorganisms’ colony that exceeds GMP limits for a specific cleanroom area. In response to this issue, this case study aims to arrive at the root cause of the microbial contamination observed in the sterile production environment in Profarma pharmaceutical industry in Albania through applying a problem-solving practical approach that ensures the appropriate sterility grade. The guidelines and literature emphasize the importance of several factors in the prevention of possible microbial contamination occurring in cleanrooms, grade A and C. These factors are integrated into a practical framework, to identify the root cause of the presence of Aspergillus Niger colony in the sterile production environment in Profarma pharmaceutical industry in Albania. In addition, the application of a semi-automatic disinfecting system such as H2O2 FOG into sterile grade A and grade C cleanrooms has been an effective solution in eliminating the atypical colony of Aspergillus Niger. Selecting the appropriate detergents and disinfectants at the right concentration, frequency, and combination; the presence of updated and standardized guidelines for cleaning and disinfection as well as continuous training of operators on these practices in accordance with the updated GMP guidelines are some of the identified factors that influence the success of achieving sterility grade. However, to ensure environmental sustainability it is important to be prepared for identifying the source of contamination and making the appropriate decision. The proposed case-based practical approach may help pharmaceutical companies to achieve sterile production and cleanliness environmental sustainability in challenging situations. Apart from the integration of valid agents and standardized cleaning and disinfection protocols according to GMP Annex 1, pharmaceutical companies must be careful and investigate the source and all the steps that can influence the results of an abnormal situation. Subsequently apart from identifying the root cause it is important to solve the problem with a successful alternative approach.

Keywords: cleanrooms, disinfectants, environmental monitoring, GMP Annex 1

Procedia PDF Downloads 205
898 Design and Implementation of Generative Models for Odor Classification Using Electronic Nose

Authors: Kumar Shashvat, Amol P. Bhondekar

Abstract:

In the midst of the five senses, odor is the most reminiscent and least understood. Odor testing has been mysterious and odor data fabled to most practitioners. The delinquent of recognition and classification of odor is important to achieve. The facility to smell and predict whether the artifact is of further use or it has become undesirable for consumption; the imitation of this problem hooked on a model is of consideration. The general industrial standard for this classification is color based anyhow; odor can be improved classifier than color based classification and if incorporated in machine will be awfully constructive. For cataloging of odor for peas, trees and cashews various discriminative approaches have been used Discriminative approaches offer good prognostic performance and have been widely used in many applications but are incapable to make effectual use of the unlabeled information. In such scenarios, generative approaches have better applicability, as they are able to knob glitches, such as in set-ups where variability in the series of possible input vectors is enormous. Generative models are integrated in machine learning for either modeling data directly or as a transitional step to form an indeterminate probability density function. The algorithms or models Linear Discriminant Analysis and Naive Bayes Classifier have been used for classification of the odor of cashews. Linear Discriminant Analysis is a method used in data classification, pattern recognition, and machine learning to discover a linear combination of features that typifies or divides two or more classes of objects or procedures. The Naive Bayes algorithm is a classification approach base on Bayes rule and a set of qualified independence theory. Naive Bayes classifiers are highly scalable, requiring a number of restraints linear in the number of variables (features/predictors) in a learning predicament. The main recompenses of using the generative models are generally a Generative Models make stronger assumptions about the data, specifically, about the distribution of predictors given the response variables. The Electronic instrument which is used for artificial odor sensing and classification is an electronic nose. This device is designed to imitate the anthropological sense of odor by providing an analysis of individual chemicals or chemical mixtures. The experimental results have been evaluated in the form of the performance measures i.e. are accuracy, precision and recall. The investigational results have proven that the overall performance of the Linear Discriminant Analysis was better in assessment to the Naive Bayes Classifier on cashew dataset.

Keywords: odor classification, generative models, naive bayes, linear discriminant analysis

Procedia PDF Downloads 376
897 Enhancing Robustness in Federated Learning through Decentralized Oracle Consensus and Adaptive Evaluation

Authors: Peiming Li

Abstract:

This paper presents an innovative blockchain-based approach to enhance the reliability and efficiency of federated learning systems. By integrating a decentralized oracle consensus mechanism into the federated learning framework, we address key challenges of data and model integrity. Our approach utilizes a network of redundant oracles, functioning as independent validators within an epoch-based training system in the federated learning model. In federated learning, data is decentralized, residing on various participants' devices. This scenario often leads to concerns about data integrity and model quality. Our solution employs blockchain technology to establish a transparent and tamper-proof environment, ensuring secure data sharing and aggregation. The decentralized oracles, a concept borrowed from blockchain systems, act as unbiased validators. They assess the contributions of each participant using a Hidden Markov Model (HMM), which is crucial for evaluating the consistency of participant inputs and safeguarding against model poisoning and malicious activities. Our methodology's distinct feature is its epoch-based training. An epoch here refers to a specific training phase where data is updated and assessed for quality and relevance. The redundant oracles work in concert to validate data updates during these epochs, enhancing the system's resilience to security threats and data corruption. The effectiveness of this system was tested using the Mnist dataset, a standard in machine learning for benchmarking. Results demonstrate that our blockchain-oriented federated learning approach significantly boosts system resilience, addressing the common challenges of federated environments. This paper aims to make these advanced concepts accessible, even to those with a limited background in blockchain or federated learning. We provide a foundational understanding of how blockchain technology can revolutionize data integrity in decentralized systems and explain the role of oracles in maintaining model accuracy and reliability.

Keywords: federated learning system, block chain, decentralized oracles, hidden markov model

Procedia PDF Downloads 52
896 Policy Recommendations for Reducing CO2 Emissions in Kenya's Electricity Generation, 2015-2030

Authors: Paul Kipchumba

Abstract:

Kenya is an East African Country lying at the Equator. It had a population of 46 million in 2015 with an annual growth rate of 2.7%, making a population of at least 65 million in 2030. Kenya’s GDP in 2015 was about 63 billion USD with per capita GDP of about 1400 USD. The rural population is 74%, whereas urban population is 26%. Kenya grapples with not only access to energy but also with energy security. There is direct correlation between economic growth, population growth, and energy consumption. Kenya’s energy composition is at least 74.5% from renewable energy with hydro power and geothermal forming the bulk of it; 68% from wood fuel; 22% from petroleum; 9% from electricity; and 1% from coal and other sources. Wood fuel is used by majority of rural and poor urban population. Electricity is mostly used for lighting. As of March 2015 Kenya had installed electricity capacity of 2295 MW, making a per capital electricity consumption of 0.0499 KW. The overall retail cost of electricity in 2015 was 0.009915 USD/ KWh (KES 19.85/ KWh), for installed capacity over 10MW. The actual demand for electricity in 2015 was 3400 MW and the projected demand in 2030 is 18000 MW. Kenya is working on vision 2030 that aims at making it a prosperous middle income economy and targets 23 GW of generated electricity. However, cost and non-cost factors affect generation and consumption of electricity in Kenya. Kenya does not care more about CO2 emissions than on economic growth. Carbon emissions are most likely to be paid by future costs of carbon emissions and penalties imposed on local generating companies by sheer disregard of international law on C02 emissions and climate change. The study methodology was a simulated application of carbon tax on all carbon emitting sources of electricity generation. It should cost only USD 30/tCO2 tax on all emitting sources of electricity generation to have solar as the only source of electricity generation in Kenya. The country has the best evenly distributed global horizontal irradiation. Solar potential after accounting for technology efficiencies such as 14-16% for solar PV and 15-22% for solar thermal is 143.94 GW. Therefore, the paper recommends adoption of solar power for generating all electricity in Kenya in order to attain zero carbon electricity generation in the country.

Keywords: co2 emissions, cost factors, electricity generation, non-cost factors

Procedia PDF Downloads 353