Search results for: neural network architecture
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6520

Search results for: neural network architecture

1300 Microfluidized Fiber Based Oleogels for Encapsulation of Lycopene

Authors: Behic Mert

Abstract:

This study reports a facile approach to structure soft solids from microfluidizer lycopene-rich plant based structure and oil. First carotenoid-rich plant material (pumpkin was used in this study) processed with high-pressure microfluidizer to release lycopene molecules, then an emulsion was formed by mixing processed plant material and oil. While, in emulsion state lipid soluble carotenoid molecules were allowed to dissolve in the oil phase, the fiber material of plant material provided the network which was required for emulsion stabilization. Additional hydrocolloids (gelatin, xhantan, and pectin) up to 0.5% were also used to reinforce the emulsion stability and their impact on final product properties were evaluated via rheological, textural and oxidation studies. Finally, water was removed from emulsion phase by drying in a tray dryer at 40°C for 36 hours, and subsequent shearing resulted in soft solid (ole gel) structures. The microstructure of these systems was revealed by cryo-scanning electron microscopy. Effect of hydrocolloids on total lycopene and surface lycopene contents were also evaluated. The surface lycopene was lowest in gelatin containing oleo gels and highest in pectin-containing oleo gels. This study outlines the novel emulsion-based structuring method that can be used to encapsulate lycopene without the need of separate extraction of them.

Keywords: lycopene, encapsulation, fiber, oleo gel

Procedia PDF Downloads 249
1299 An Enhanced Hybrid Backoff Technique for Minimizing the Occurrence of Collision in Mobile Ad Hoc Networks

Authors: N. Sabiyath Fatima, R. K. Shanmugasundaram

Abstract:

In Mobile Ad-hoc Networks (MANETS), every node performs both as transmitter and receiver. The existing backoff models do not exactly forecast the performance of the wireless network. Also, the existing models experience elevated packet collisions. Every time a collision happens, the station’s contention window (CW) is doubled till it arrives at the utmost value. The main objective of this paper is to diminish collision by means of contention window Multiplicative Increase Decrease Backoff (CWMIDB) scheme. The intention of rising CW is to shrink the collision possibility by distributing the traffic into an outsized point in time. Within wireless Ad hoc networks, the CWMIDB algorithm dynamically controls the contention window of the nodes experiencing collisions. During packet communication, the backoff counter is evenly selected from the given choice of [0, CW-1]. At this point, CW is recognized as contention window and its significance lies on the amount of unsuccessful transmission that had happened for the packet. On the initial transmission endeavour, CW is put to least amount value (C min), if transmission effort fails, subsequently the value gets doubled, and once more the value is set to least amount on victorious broadcast. CWMIDB is simulated inside NS2 environment and its performance is compared with Binary Exponential Backoff Algorithm. The simulation results show improvement in transmission probability compared to that of the existing backoff algorithm.

Keywords: backoff, contention window, CWMIDB, MANET

Procedia PDF Downloads 259
1298 Microseismicity of the Tehran Region Based on Three Seismic Networks

Authors: Jamileh Vasheghani Farahani

Abstract:

The main purpose of this research is to show the current active faults and active tectonic of the area by three seismic networks in Tehran region: 1-Tehran Disaster Mitigation and Management Organization (TDMMO), 2-Broadband Iranian National Seismic Network Center (BIN), 3-Iranian Seismological Center (IRSC). In this study, we analyzed microearthquakes happened in Tehran city and its surroundings using the Tehran networks from 1996 to 2015. We found some active faults and trends in the region. There is a 200-year history of historical earthquakes in Tehran. Historical and instrumental seismicity show that the east of Tehran is more active than the west. The Mosha fault in the North of Tehran is one of the active faults of the central Alborz. Moreover, other major faults in the region are Kahrizak, Eyvanakey, Parchin and North Tehran faults. An important seismicity region is an intersection of the Mosha and North Tehran fault systems (Kalan village in Lavasan). This region shows a cluster of microearthquakes. According to the historical and microseismic events analyzed in this research, there is a seismic gap in SE of Tehran. The empirical relationship is used to assess the Mmax based on the rupture length. There is a probability of occurrence of a strong motion of 7.0 to 7.5 magnitudes in the region (based on the assessed capability of the major faults such as Parchin and Eyvanekey faults and historical earthquakes).

Keywords: Iran, major faults, microseismicity, Tehran

Procedia PDF Downloads 353
1297 Exploring Social Impact of Emerging Technologies from Futuristic Data

Authors: Heeyeul Kwon, Yongtae Park

Abstract:

Despite the highly touted benefits, emerging technologies have unleashed pervasive concerns regarding unintended and unforeseen social impacts. Thus, those wishing to create safe and socially acceptable products need to identify such side effects and mitigate them prior to the market proliferation. Various methodologies in the field of technology assessment (TA), namely Delphi, impact assessment, and scenario planning, have been widely incorporated in such a circumstance. However, literatures face a major limitation in terms of sole reliance on participatory workshop activities. They unfortunately missed out the availability of a massive untapped data source of futuristic information flooding through the Internet. This research thus seeks to gain insights into utilization of futuristic data, future-oriented documents from the Internet, as a supplementary method to generate social impact scenarios whilst capturing perspectives of experts from a wide variety of disciplines. To this end, network analysis is conducted based on the social keywords extracted from the futuristic documents by text mining, which is then used as a guide to produce a comprehensive set of detailed scenarios. Our proposed approach facilitates harmonized depictions of possible hazardous consequences of emerging technologies and thereby makes decision makers more aware of, and responsive to, broad qualitative uncertainties.

Keywords: emerging technologies, futuristic data, scenario, text mining

Procedia PDF Downloads 479
1296 Effect of Natural Molecular Crowding on the Structure and Stability of DNA Duplex

Authors: Chaudhari S. G., Saxena, S.

Abstract:

We systematically and quantitatively investigated the effect of glucose as a model of natural molecular crowding agent on the structure and thermodynamics of Watson-Crick base paired three duplexes (named as D1, D2 and D3) of different base compositions and lengths. Structural analyses demonstrated that duplexes (D1 and D2) folded into B-form with different cations in the absence and presence of glucose while duplex (D3) folded into mixed A and B-form. Moreover, we demonstrated that the duplex was more stable in the absence of glucose, and marginally destabilized in its presence because glucose act as a weak structure breaker on the tetrahedral network of water. In the absence of glucose, the values of ΔG°25 for duplex (D1) were -13.56, -13.76, -12.46, and -12.36 kcal/mol, for duplex (D2) were -13.64, -12.93, -12.86, and -12.30 kcal/mol, for duplex (D3) were -10.05, -11.76, -9.91, -9.70 kcal/mol in the presence of Na+, K+, Na+ + Mg++ and K+ + Mg++ respectively. At high concentration of glucose (1:10000), there was increase in ΔG°25 for duplex (D1) -12.47, -12.37, -11.96, -11.55 kcal/mol, for duplex (D2) -12.37, -11.47, -11.98, -11.01 kcal/mol and for duplex (D3) -8.47, -9.17, -9.16, -8.66 kcal/mol. Our results provide the information that structure and stability of DNA duplex depends on the structure of molecular crowding agent present in its close vicinity. In this study, I have taken the hydration of simple sugar as an essential model for understanding interactions between hydrophilic groups and interfacial water molecules and its effect on hydrogen bonded DNA duplexes. On the basis of these relatively simple building blocks I hope to gain some insights for understanding more generally the properties of sugar–water–salt systems with DNA duplexes.

Keywords: natural molecular crowding, DNA Duplex, structure of DNA, bioengineering and life sciences

Procedia PDF Downloads 453
1295 Mesoscopic Defects of Forming and Induced Properties on the Impact of a Composite Glass/Polyester

Authors: Bachir Kacimi, Fatiha Teklal, Arezki Djebbar

Abstract:

Forming processes induce residual deformations on the reinforcement and sometimes lead to mesoscopic defects, which are more recurrent than macroscopic defects during the manufacture of complex structural parts. This study deals with the influence of the fabric shear and buckles defects, which appear during draping processes of composite, on the impact behavior of a glass fiber reinforced polymer. To achieve this aim, we produced several specimens with different amplitude of deformations (shear) and defects on the fabric using a specific bench. The specimens were manufactured using the contact molding and tested with several impact energies. The results and measurements made on tested specimens were compared to those of the healthy material. The results showed that the buckle defects have a negative effect on elastic parameters and revealed a larger damage with significant out-of-plane mode relatively to the healthy composite material. This effect is the consequence of a local fiber impoverishment and a disorganization of the fibrous network, with a reorientation of the fibers following the out-of-plane buckling of the yarns, in the area where the defects are located. For the material with calibrated shear of the reinforcement, the increased local fiber rate due to the shear deformations and the contribution to stiffness of the transverse yarns led to an increase in mechanical properties.

Keywords: Defects, Forming, Impact, Induced properties, Textiles

Procedia PDF Downloads 126
1294 Polyacrylates in Poly (Lactic Acid) Matrix, New Biobased Polymer Material

Authors: Irena Vuković-Kwiatkowska, Halina Kaczmarek

Abstract:

Poly (lactic acid) is well known polymer, often called green material because of its origin (renewable resources) and biodegradability. This biopolymer can be used in the packaging industry very often. Poor resistance to permeation of gases is the disadvantage of poly (lactic acid). The permeability of gases and vapor through the films applied for packages and bottles generally should be very low to prolong products shelf-life. We propose innovation method of PLA gas barrier modification using electromagnetic radiation in ultraviolet range. Poly (lactic acid) (PLA) and multifunctional acrylate monomers were mixed in different composition. Final films were obtained by photochemical reaction (photocrosslinking). We tested permeability to water vapor and carbon dioxide through these films. Also their resistance to UV radiation was also studied. The samples were conditioned in the activated sludge and in the natural soil to test their biodegradability. An innovative method of PLA modification allows to expand its usage, and can reduce the future costs of waste management what is the result of consuming such materials like PET and HDPE. Implementation of our material for packaging will contribute to the protection of the environment from the harmful effects of extremely difficult to biodegrade materials made from PET or other plastic

Keywords: interpenetrating polymer network, packaging films, photocrosslinking, polyacrylates dipentaerythritol pentaacrylate DPEPA, poly (lactic acid), polymer biodegradation

Procedia PDF Downloads 462
1293 Integrated Waste-to-Energy Approach: An Overview

Authors: Tsietsi J. Pilusa, Tumisang G. Seodigeng

Abstract:

This study evaluates the benefits of advanced waste management practices in unlocking waste-to-energy opportunities within the solid waste industry. The key drivers of sustainable waste management practices, specifically with respect to packaging waste-to-energy technology options are discussed. The success of a waste-to-energy system depends significantly on the appropriateness of available technologies, including those that are well established as well as those that are less so. There are hard and soft interventions to be considered when packaging an integrated waste treatment solution. Technology compatibility with variation in feedstock (waste) quality and quantities remains a key factor. These factors influence the technology reliability in terms of production efficiencies and product consistency, which in turn, drives the supply and demand network. Waste treatment technologies rely on the waste material as feedstock; the feedstock varies in quality and quantities depending on several factors; hence, the technology fails, as a result. It is critical to design an advanced waste treatment technology in an integrated approach to minimize the possibility of technology failure due to unpredictable feedstock quality, quantities, conversion efficiencies, and inconsistent product yield or quality. An integrated waste-to-energy approach offers a secure system design that considers sustainable waste management practices.

Keywords: emerging markets, evaluation tool, interventions, waste treatment technologies

Procedia PDF Downloads 256
1292 Corridor Densification Option as a Means for Restructuring South African Cities

Authors: T. J. B. van Niekerk, J. Viviers, E. J. Cilliers

Abstract:

Substantial efforts were made in South Africa, stemming from a historic political change in 1994, to remedy the inequality and injustice, resulting from a dispensation where spatial patterns were largely based on racial segregation. Spatially distorted patterns predominantly originated from colonialism in the beginning of the twentieth century, ensuing a physical imprint on South African cities relating to architecture, urban layout and planning, frequently reflecting European norms and standards. As a consequence of physical and land use barriers, and well-established dual cities, attempts to address spatial injustices, apart from limited occurrences in metropolitan areas, gravely failed. Interception of incessant segregated growth, combined with urban sprawl is becoming increasingly evident. Intervention is a prerequisite to duly address the impact of colonial planning and its legacy still prevalent in most urban areas. During 1998, the National Department of Transport prepared the “Moving South Africa” strategy; presenting the Corridor Densification Option Model for the first time, as it was deemed more fitting to the existing South African urban tenure patterns than more familiar planning approaches. Urban planners are progressively contemplating the Corridor Densification Option Model and its attributes, besides its transportation emphasis, as an alternative approach to address spatial imbalances and to attain the physical integration of contemporary urban forms. In attaining a clearer understanding of the Corridor Densification Option Model, its rationale was analysed in greater detail. This research further investigated the provisional applications of the model in spatially segregated cities and illustrated that viable options are present to effectively employ it. Research revealed that the application of the model will, however, be dependent on the occurrence of specific characteristics in spatially segregated cities to warrant augmentation thereof.

Keywords: corridor densification option model, spatially segregated settlements, integration, urban restructuring

Procedia PDF Downloads 200
1291 Artificial Bee Colony Optimization for SNR Maximization through Relay Selection in Underlay Cognitive Radio Networks

Authors: Babar Sultan, Kiran Sultan, Waseem Khan, Ijaz Mansoor Qureshi

Abstract:

In this paper, a novel idea for the performance enhancement of secondary network is proposed for Underlay Cognitive Radio Networks (CRNs). In Underlay CRNs, primary users (PUs) impose strict interference constraints on the secondary users (SUs). The proposed scheme is based on Artificial Bee Colony (ABC) optimization for relay selection and power allocation to handle the highlighted primary challenge of Underlay CRNs. ABC is a simple, population-based optimization algorithm which attains global optimum solution by combining local search methods (Employed and Onlooker Bees) and global search methods (Scout Bees). The proposed two-phase relay selection and power allocation algorithm aims to maximize the signal-to-noise ratio (SNR) at the destination while operating in an underlying mode. The proposed algorithm has less computational complexity and its performance is verified through simulation results for a different number of potential relays, different interference threshold levels and different transmit power thresholds for the selected relays.

Keywords: artificial bee colony, underlay spectrum sharing, cognitive radio networks, amplify-and-forward

Procedia PDF Downloads 559
1290 Legal Regulation of Personal Information Data Transmission Risk Assessment: A Case Study of the EU’s DPIA

Authors: Cai Qianyi

Abstract:

In the midst of global digital revolution, the flow of data poses security threats that call China's existing legislative framework for protecting personal information into question. As a preliminary procedure for risk analysis and prevention, the risk assessment of personal data transmission lacks detailed guidelines for support. Existing provisions reveal unclear responsibilities for network operators and weakened rights for data subjects. Furthermore, the regulatory system's weak operability and a lack of industry self-regulation heighten data transmission hazards. This paper aims to compare the regulatory pathways for data information transmission risks between China and Europe from a legal framework and content perspective. It draws on the “Data Protection Impact Assessment Guidelines” to empower multiple stakeholders, including data processors, controllers, and subjects, while also defining obligations. In conclusion, this paper intends to solve China's digital security shortcomings by developing a more mature regulatory framework and industry self-regulation mechanisms, resulting in a win-win situation for personal data protection and the development of the digital economy.

Keywords: personal information data transmission, risk assessment, DPIA, internet service provider, personal information data transimission, risk assessment

Procedia PDF Downloads 35
1289 In vitro Characterization of Mice Bone Microstructural Changes by Low-Field and High-Field Nuclear Magnetic Resonance

Authors: Q. Ni, J. A. Serna, D. Holland, X. Wang

Abstract:

The objective of this study is to develop Nuclear Magnetic Resonance (NMR) techniques to enhance bone related research applied on normal and disuse (Biglycan knockout) mice bone in vitro by using both low-field and high-field NMR simultaneously. It is known that the total amplitude of T₂ relaxation envelopes, measured by the Carr-Purcell-Meiboom-Gill NMR spin echo train (CPMG), is a representation of the liquid phase inside the pores. Therefore, the NMR CPMG magnetization amplitude can be transferred to the volume of water after calibration with the NMR signal amplitude of the known volume of the selected water. In this study, the distribution of mobile water, porosity that can be determined by using low-field (20 MHz) CPMG relaxation technique, and the pore size distributions can be determined by a computational inversion relaxation method. It is also known that the total proton intensity of magnetization from the NMR free induction decay (FID) signal is due to the water present inside the pores (mobile water), the water that has undergone hydration with the bone (bound water), and the protons in the collagen and mineral matter (solid-like protons). Therefore, the components of total mobile and bound water within bone that can be determined by low-field NMR free induction decay technique. Furthermore, the bound water in solid phase (mineral and organic constituents), especially, the dominated component of calcium hydroxyapatite (Ca₁₀(OH)₂(PO₄)₆) can be determined by using high-field (400 MHz) magic angle spinning (MAS) NMR. With MAS technique reducing NMR spectral linewidth inhomogeneous broadening and susceptibility broadening of liquid-solid mix, in particular, we can conduct further research into the ¹H and ³¹P elements and environments of bone materials to identify the locations of bound water such as OH- group within minerals and bone architecture. We hypothesize that with low-field and high-field magic angle spinning NMR can provide a more complete interpretation of water distribution, particularly, in bound water, and these data are important to access bone quality and predict the mechanical behavior of bone.

Keywords: bone, mice bone, NMR, water in bone

Procedia PDF Downloads 159
1288 Learning, Teaching and Assessing Students’ ESP Skills via Exe and Hot Potatoes Software Programs

Authors: Naira Poghosyan

Abstract:

In knowledge society the content of the studies, the methods used and the requirements for an educator’s professionalism regularly undergo certain changes. It follows that in knowledge society the aim of education is not only to educate professionals for a certain field but also to help students to be aware of cultural values, form human mutual relationship, collaborate, be open, adapt to the new situation, creatively express their ideas, accept responsibility and challenge. In this viewpoint, the development of communicative language competence requires a through coordinated approach to ensure proper comprehension and memorization of subject-specific words starting from high school level. On the other hand, ESP (English for Specific Purposes) teachers and practitioners are increasingly faced with the task of developing and exploiting new ways of assessing their learners’ literacy while learning and teaching ESP. The presentation will highlight the latest achievements in this field. The author will present some practical methodological issues and principles associated with learning, teaching and assessing ESP skills of the learners, using the two software programs of EXE 2.0 and Hot Potatoes 6. On the one hand the author will display the advantages of the two programs as self-learning and self-assessment interactive tools in the course of academic study and professional development of the CLIL learners, on the other hand, she will comprehensively shed light upon some methodological aspects of working out appropriate ways of selection, introduction, consolidation of subject specific materials via EXE 2.0 and Hot Potatoes 6. Then the author will go further to distinguish ESP courses by the general nature of the learners’ specialty identifying three large categories of EST (English for Science and Technology), EBE (English for Business and Economics) and ESS (English for the Social Sciences). The cornerstone of the presentation will be the introduction of the subject titled “The methodology of teaching ESP in non-linguistic institutions”, where a unique case of teaching ESP on Architecture and Construction via EXE 2.0 and Hot Potatoes 6 will be introduced, exemplifying how the introduction, consolidation and assessment can be used as a basis for feedback to the ESP learners in a particular professional field.

Keywords: ESP competences, ESP skill assessment/ self-assessment tool, eXe 2.0 / HotPotatoes software program, ESP teaching strategies and techniques

Procedia PDF Downloads 364
1287 Metabolomics Profile Recognition for Cancer Diagnostics

Authors: Valentina L. Kouznetsova, Jonathan W. Wang, Igor F. Tsigelny

Abstract:

Metabolomics has become a rising field of research for various diseases, particularly cancer. Increases or decreases in metabolite concentrations in the human body are indicative of various cancers. Further elucidation of metabolic pathways and their significance in cancer research may greatly spur medicinal discovery. We analyzed the metabolomics profiles of lung cancer. Thirty-three metabolites were selected as significant. These metabolites are involved in 37 metabolic pathways delivered by MetaboAnalyst software. The top pathways are glyoxylate and dicarboxylate pathway (its hubs are formic acid and glyoxylic acid) along with Citrate cycle pathway followed by Taurine and hypotaurine pathway (the hubs in the latter are taurine and sulfoacetaldehyde) and Glycine, serine, and threonine pathway (the hubs are glycine and L-serine). We studied interactions of the metabolites with the proteins involved in cancer-related signaling networks, and developed an approach to metabolomics biomarker use in cancer diagnostics. Our analysis showed that a significant part of lung-cancer-related metabolites interacts with main cancer-related signaling pathways present in this network: PI3K–mTOR–AKT pathway, RAS–RAF–ERK1/2 pathway, and NFKB pathway. These results can be employed for use of metabolomics profiles in elucidation of the related cancer proteins signaling networks.

Keywords: cancer, metabolites, metabolic pathway, signaling pathway

Procedia PDF Downloads 381
1286 Treating Voxels as Words: Word-to-Vector Methods for fMRI Meta-Analyses

Authors: Matthew Baucum

Abstract:

With the increasing popularity of fMRI as an experimental method, psychology and neuroscience can greatly benefit from advanced techniques for summarizing and synthesizing large amounts of data from brain imaging studies. One promising avenue is automated meta-analyses, in which natural language processing methods are used to identify the brain regions consistently associated with certain semantic concepts (e.g. “social”, “reward’) across large corpora of studies. This study builds on this approach by demonstrating how, in fMRI meta-analyses, individual voxels can be treated as vectors in a semantic space and evaluated for their “proximity” to terms of interest. In this technique, a low-dimensional semantic space is built from brain imaging study texts, allowing words in each text to be represented as vectors (where words that frequently appear together are near each other in the semantic space). Consequently, each voxel in a brain mask can be represented as a normalized vector sum of all of the words in the studies that showed activation in that voxel. The entire brain mask can then be visualized in terms of each voxel’s proximity to a given term of interest (e.g., “vision”, “decision making”) or collection of terms (e.g., “theory of mind”, “social”, “agent”), as measured by the cosine similarity between the voxel’s vector and the term vector (or the average of multiple term vectors). Analysis can also proceed in the opposite direction, allowing word cloud visualizations of the nearest semantic neighbors for a given brain region. This approach allows for continuous, fine-grained metrics of voxel-term associations, and relies on state-of-the-art “open vocabulary” methods that go beyond mere word-counts. An analysis of over 11,000 neuroimaging studies from an existing meta-analytic fMRI database demonstrates that this technique can be used to recover known neural bases for multiple psychological functions, suggesting this method’s utility for efficient, high-level meta-analyses of localized brain function. While automated text analytic methods are no replacement for deliberate, manual meta-analyses, they seem to show promise for the efficient aggregation of large bodies of scientific knowledge, at least on a relatively general level.

Keywords: FMRI, machine learning, meta-analysis, text analysis

Procedia PDF Downloads 431
1285 Design of Direct Power Controller for a High Power Neutral Point Clamped Converter Using Real-Time Simulator

Authors: Amin Zabihinejad, Philippe Viarouge

Abstract:

In this paper, a direct power control (DPC) strategies have been investigated in order to control a high power AC/DC converter with time variable load. This converter is composed of a three level three phase neutral point clamped (NPC) converter as rectifier and an H-bridge four quadrant current control converter. In the high power application, controller not only must adjust the desired outputs but also decrease the level of distortions which are injected to the network from the converter. Regarding this reason and nonlinearity of the power electronic converter, the conventional controllers cannot achieve appropriate responses. In this research, the precise mathematical analysis has been employed to design the appropriate controller in order to control the time variable load. A DPC controller has been proposed and simulated using Matlab/Simulink. In order to verify the simulation result, a real-time simulator- OPAL-RT- has been employed. In this paper, the dynamic response and stability of the high power NPC with variable load has been investigated and compared with conventional types using a real-time simulator. The results proved that the DPC controller is more stable and has more precise outputs in comparison with the conventional controller.

Keywords: direct power control, three level rectifier, real time simulator, high power application

Procedia PDF Downloads 503
1284 The Determinant Factors of Technology Adoption for Improving Firm’s Performance; Toward a Conceptual Model

Authors: Zainal Arifin, Avanti Fontana

Abstract:

Considering that TOE framework is the most useful instrument for studying technology adoption in firm context, this paper will analyze the influence of technological, organizational and environmental (TOE) factors to the Dynamic capabilities (DCs) associated with technology adoption strategy for improving the firm’s performance. Focusing on the determinant factors of technology adoption at the firm level, the study will contribute to the broader study of resource base view (RBV) and dynamic capability (DC). There is no study connecting directly the TOE factors to the DCs, this paper proposes technology adoption as a functional competence/capability which mediates a relationship between technology adoptions with firm’s performance. The study wants to show a conceptual model of the indirect effects of DCs at the firm level, which can be key predictors of firm performance in dynamic business environment. The results of this research is mostly relevant to top corporate executives (BOD) or top management team (TMT) who seek to provide some supporting ‘hardware’ content and condition such as technological factors, organizational factors, environmental factors, and to improve firm's ‘software ‘ ability such as adaptive capability, absorptive capability and innovative capability, in order to achieve a successful technology adoption in organization. There are also mediating factors which are elaborated at this paper; timing and external network. A further research for showing its empirical results is highly recommended.

Keywords: technology adoption, TOE framework, dynamic capability, resources based view

Procedia PDF Downloads 314
1283 Applicability of Fuzzy Logic for Intrusion Detection in Mobile Adhoc Networks

Authors: Ruchi Makani, B. V. R. Reddy

Abstract:

Mobile Adhoc Networks (MANETs) are gaining popularity due to their potential of providing low-cost mobile connectivity solutions to real-world communication problems. Integrating Intrusion Detection Systems (IDS) in MANETs is a tedious task by reason of its distinctive features such as dynamic topology, de-centralized authority and highly controlled/limited resource environment. IDS primarily use automated soft-computing techniques to monitor the inflow/outflow of traffic packets in a given network to detect intrusion. Use of machine learning techniques in IDS enables system to make decisions on intrusion while continuous keep learning about their dynamic environment. An appropriate IDS model is essential to be selected to expedite this application challenges. Thus, this paper focused on fuzzy-logic based machine learning IDS technique for MANETs and presented their applicability for achieving effectiveness in identifying the intrusions. Further, the selection of appropriate protocol attributes and fuzzy rules generation plays significant role for accuracy of the fuzzy-logic based IDS, have been discussed. This paper also presents the critical attributes of MANET’s routing protocol and its applicability in fuzzy logic based IDS.

Keywords: AODV, mobile adhoc networks, intrusion detection, anomaly detection, fuzzy logic, fuzzy membership function, fuzzy inference system

Procedia PDF Downloads 162
1282 Novel IPN Hydrogel Beads as pH Sensitive Drug Delivery System for an Anti-Ulcer Drug

Authors: Vishal Kumar Gupta

Abstract:

Purpose: This study has been undertaken to develop novel pH sensitive interpenetrating network hydrogel beads. Methods: The pH sensitive PAAM-g-Guar gum copolymer was synthesized by free radical polymerization followed by alkaline hydrolysis. Beads of guar gum-grafted-polyacrylamide and sodium Carboxy methyl cellulose (Na CMC) loaded with Pantoprazole sodium were prepared and evaluated for pH sensitivity, swelling properties, drug entrapment efficiency and in vitro drug release characteristics. Seven formulations were prepared for the drug with varying polymer and cross linker concentrations. Results: The grafting and alkaline hydrolysis reactions were confirmed by FT-IR spectroscopy. Differential scanning calorimetry was carried out to know the compatibility of encapsulated drug with the polymers. Scanning electron microscopic study revealed that the IPN beads were spherical. The entrapment efficiency was found to be in the range of 85-92%. Particle size analysis was carried out by optical microscopy. As the pH of the medium was changed from 1.2 to 7.4, a considerable increase in swelling was observed for all beads. Increase in the copolymer concentration showed sustained the drug release up to 12 hrs. Drug release from the beads followed super case II transport mechanism. Conclusion: It was concluded that guar gum-acrylamide beads, cross-linked with aluminum chloride offer an opportunity for controlled drug release of pantoprazole sodium.

Keywords: IPN, hydrogels, DSC, SEM

Procedia PDF Downloads 257
1281 Menopause Cultural Research: A Comparative Study of National and Diasporic Chinese Menopausal Women’s Perceptions and Lived Experience of Menopause

Authors: Yilin Wang, Ayumi Goto

Abstract:

Although most females will experience menopause due to social value habits of cultural factors, some Chinese women may lack the confidence to talk about the problems they are experiencing while going through menopause. Also, sometimes the inappropriateness of medical terminology leads to panic when women face the symptoms associated with menopause. On top of that, when women avoid discussing menopause as a topic, others are less likely to pay attention to the needs of menopausal women as their bodies change. This research will compare the experience of Chinese menopausal women and diasporic Chinese women's perceptions of menopause. A qualitative study will be conducted by collecting and analyzing experiences and perceptions to compare differences in women's perceptions of menopause, considering cultural and social factors. In addition, the study will gather information on the differences in the conceptualization of menopause between the Chinese and Canadian medical fields. Co-design sessions will be held to establish how to bring menopause to the attention of people other than women. Furthermore, a support network for menopause women will be created through these co-design sessions. It is hoped that this research will contribute to a proper understanding of menopause and provide support for Chinese women. This research is built upon feminist standpoint theory and inclusive design theory. The results of this study will be presented in this paper.

Keywords: menopause, feminist standpoint theory, Chinese national & diasporic women, inclusive design

Procedia PDF Downloads 91
1280 A Machine Learning Approach for Anomaly Detection in Environmental IoT-Driven Wastewater Purification Systems

Authors: Giovanni Cicceri, Roberta Maisano, Nathalie Morey, Salvatore Distefano

Abstract:

The main goal of this paper is to present a solution for a water purification system based on an Environmental Internet of Things (EIoT) platform to monitor and control water quality and machine learning (ML) models to support decision making and speed up the processes of purification of water. A real case study has been implemented by deploying an EIoT platform and a network of devices, called Gramb meters and belonging to the Gramb project, on wastewater purification systems located in Calabria, south of Italy. The data thus collected are used to control the wastewater quality, detect anomalies and predict the behaviour of the purification system. To this extent, three different statistical and machine learning models have been adopted and thus compared: Autoregressive Integrated Moving Average (ARIMA), Long Short Term Memory (LSTM) autoencoder, and Facebook Prophet (FP). The results demonstrated that the ML solution (LSTM) out-perform classical statistical approaches (ARIMA, FP), in terms of both accuracy, efficiency and effectiveness in monitoring and controlling the wastewater purification processes.

Keywords: environmental internet of things, EIoT, machine learning, anomaly detection, environment monitoring

Procedia PDF Downloads 137
1279 Analysis of Risks of Adopting Integrated Project Delivery: Application of Bayesian Theory

Authors: Shan Li, Qiuwen Ma

Abstract:

Integrated project delivery (IPD) is a project delivery method distinguished by a shared risk/rewards mechanism and multiparty agreement. IPD has drawn increasing attention from construction industry due to its reliability to deliver high-performing buildings. However, unavailable IPD specific insurance concerns the industry participants who are interested in IPD implementation. Even though the risk management capability can be enhanced using shared risk mechanism, some risks may occur when the partners do not commit themselves into the integrated practices in a desired manner. This is because the intense collaboration and close integration can not only create added value but bring new opportunistic behaviors and disputes. The study is aimed to investigate the risks of implementing IPD using Bayesian theory. IPD risk taxonomy is presented to identify all potential risks of implementing IPD and a risk network map is developed to capture the interdependencies between IPD risks. The conditional relations between risk occurrences and the impacts of IPD risks on project performances are evaluated and simulated based on Bayesian theory. The probability of project outcomes is predicted by simulation. In addition, it is found that some risks caused by integration are most possible occurred risks. This study can help the IPD project participants identify critical risks of adopting IPD to improve project performances. In addition, it is helpful to develop IPD specific insurance when the pertinent risks can be identified.

Keywords: Bayesian theory, integrated project delivery, project risks, project performances

Procedia PDF Downloads 283
1278 Synthesis, Characterization and Photocatalytic Activity of Electrospun Zinc and/or Titanium Oxide Nanofibers for Methylene Blue Degradation

Authors: Zainab Dahrouch, Beatrix Petrovičová, Claudia Triolo, Fabiola Pantò, Angela Malara, Salvatore Patanè, Maria Allegrini, Saveria Santangelo

Abstract:

Synthetic dyes dispersed in water cause environmental damage and have harmful effects on human health. Methylene blue (MB) is broadly used as a dye in the textile, pharmaceutical, printing, cosmetics, leather, and food industries. The complete removal of MB is difficult due to the presence of aromatic rings in its structure. The present study is focused on electrospun nanofibers (NFs) with engineered architecture and surface to be used as catalysts for the photodegradation of MB. Ti and/or Zn oxide NFs are produced by electrospinning precursor solutions with different Ti: Zn molar ratios (from 0:1 to 1:0). Subsequent calcination and cooling steps are operated at fast rates to generate porous NFs with capture centers to reduce the recombination rate of the photogenerated charges. The comparative evaluation of the NFs as photocatalysts for the removal of MB from an aqueous solution with a dye concentration of 15 µM under UV irradiation shows that the binary (wurtzite ZnO and anatase TiO₂) oxides exhibit higher catalytic activity compared to ternary (ZnTiO₃ and Zn₂TiO₄) oxides. The higher band gap and lower crystallinity of the ternary oxides are responsible for their lower photocatalytic activity. It has been found that the optimal load for the wurtzite ZnO is 0.66 mg mL⁻¹, obtaining a degradation rate of 7.94.10⁻² min⁻¹. The optimal load for anatase TiO₂ is lower (0.33 mg mL⁻¹) and the corresponding rate constant (1.12×10⁻¹ min⁻¹) is higher. This finding (higher activity with lower load) is of crucial importance for the scaling up of the process on an industrial scale. Indeed, the anatase NFs outperform even the commonly used P25-TiO₂ benchmark. Besides, they can be reused twice without any regeneration treatment, with 5.2% and 18.7% activity decrease after second and third use, respectively. Thanks to the scalability of the electrospinning technique, this laboratory-scale study provides a perspective towards the sustainable large-scale manufacture of photocatalysts for the treatment of industry effluents.

Keywords: anatase, capture centers, methylene blue dye, nanofibers, photodegradation, zinc oxide

Procedia PDF Downloads 140
1277 Basics of SCADA Security: A Technical Approach

Authors: Michał Witas

Abstract:

This paper presents a technical approach to analysis of security of SCADA systems. Main goal of the paper is to make SCADA administrators aware of risks resulting from SCADA systems usage and to familiarize with methods that can be adopt to existing or planned system, to increase overall system security level. Because SCADA based systems become a industrial standard, more attention should be paid to the security of that systems. Industrial Control Systems (ICS) like SCADA are responsible for controlling crucial aspects of wide range of industrial processes. In pair with that responsibility, goes a lot of money that can be earned or lost – this fact is main reason of increased interest of attackers. Additionally ICS are often responsible for maintaining resources strategic from the point of view of national economy, like electricity (including nuclear power plants), heating, water resources or military facilities, so they can be targets of terrorist cybernetic attacks. Without proper risk analysis and management, vulnerabilities resulting from the usage of SCADA can be easily exploited by potential attacker. Paper is based mostly on own experience in systems security, gathered during academic studies and professional work in international company. As title suggests, it will cover only basics of topic, because every of points mentioned in the document can be base for additional research and papers.

Keywords: denial of service, SCADA, security policy, distributed network

Procedia PDF Downloads 353
1276 Simulation of the FDA Centrifugal Blood Pump Using High Performance Computing

Authors: Mehdi Behbahani, Sebastian Rible, Charles Moulinec, Yvan Fournier, Mike Nicolai, Paolo Crosetto

Abstract:

Computational Fluid Dynamics blood-flow simulations are increasingly used to develop and validate blood-contacting medical devices. This study shows that numerical simulations can provide additional and accurate estimates of relevant hemodynamic indicators (e.g., recirculation zones or wall shear stresses), which may be difficult and expensive to obtain from in-vivo or in-vitro experiments. The most recent FDA (Food and Drug Administration) benchmark consisted of a simplified centrifugal blood pump model that contains fluid flow features as they are commonly found in these devices with a clear focus on highly turbulent phenomena. The FDA centrifugal blood pump study is composed of six test cases with different volumetric flow rates ranging from 2.5 to 7.0 liters per minute, pump speeds, and Reynolds numbers ranging from 210,000 to 293,000. Within the frame of this study different turbulence models were tested including RANS models, e.g. k-omega, k-epsilon and a Reynolds Stress Model (RSM) and, LES. The partitioners Hilbert, METIS, ParMETIS and SCOTCH were used to create an unstructured mesh of 76 million elements and compared in their efficiency. Computations were performed on the JUQUEEN BG/Q architecture applying the highly parallel flow solver Code SATURNE and typically using 32768 or more processors in parallel. Visualisations were performed by means of PARAVIEW. Different turbulence models including all six flow situations could be successfully analysed and validated against analytical considerations and from comparison to other data-bases. It showed that an RSM represents an appropriate choice with respect to modeling high-Reynolds number flow cases. Especially, the Rij-SSG (Speziale, Sarkar, Gatzki) variant turned out to be a good approach. Visualisation of complex flow features could be obtained and the flow situation inside the pump could be characterized.

Keywords: blood flow, centrifugal blood pump, high performance computing, scalability, turbulence

Procedia PDF Downloads 370
1275 Alkali Silica Reaction Mitigation and Prevention Measures for Arkansas Local Aggregates

Authors: Amin Kamal Akhnoukh, Lois Zaki Kamel, Magued Mourad Barsoum

Abstract:

The objective of this research is to mitigate and prevent the alkali silica reactivity (ASR) in highway construction projects. ASR is a deleterious reaction initiated when the silica content of the aggregate reacts with alkali hydroxides in cement in the presence of relatively high moisture content. The ASR results in the formation of an expansive white colored gel-like material which forms the destructive tensile stresses inside hardened concrete. In this research, different types of local aggregates available in the State of Arkansas were mixed and mortar bars were poured according to the ASTM specifications. Mortar bars expansion was measured versus time and aggregates with potential ASR problems were detected. Different types of supplementary cementitious materials (SCMs) were used in remixing mortar bars with highly reactive aggregates. Length changes for remixed bars proved that different types of SCMs can be successfully used in reducing the expansive effect of ASR. SCMs percentage by weight is highly dependent on the SCM type. The result of this study will help avoiding future losses due to ASR cracking in construction project and reduce the maintenance, repair, and replacement budgets required for highways network.

Keywords: alkali silica reaction, aggregates, misture, cracks, Mortar Bar Test, supplementary cementitious materials

Procedia PDF Downloads 318
1274 Providing a Road Pricing and Toll Allocation Method for Toll Roads

Authors: Ali Babaei

Abstract:

There is a worldwide growing tendency toward construction of infrastructures with the possibility of private sector participation instead of free exploitation of public infrastructures. The construction and development of roads through private sector participation is performed by different countries because of appropriate results and benefits such as compensation of public budget deficit in road construction and maintenance and responding to traffic growth (demand). Toll is the most definite form of budget provision in road development. There are two issues in the toll rate assignment: A. costing of transport, B. Cost allocation and distribution of cost between different types of vehicles as each vehicle pay its own share. There can be different goals in toll collection and its extent is variable according to the strategy of toll collection. Costing principles in different countries are based on inclusion of the whole transport and not peculiar to the toll roads. For example, fuel tax policy functions where the road network users pay transportation cost (not just users of toll road). Whereas transportation infrastructures in Iran are free, these methods are not applicable. In Iran, different toll freeways have built by public investment and government provides participation in the road construction through encouragement of financial institutions. In this paper, the existing policies about the toll roads are studied and then the appropriate method of costing and cost allocation to different vehicles is introduced.

Keywords: toll allocation, road pricing, transportation, financial and industrial systems

Procedia PDF Downloads 342
1273 Development of Fuzzy Logic and Neuro-Fuzzy Surface Roughness Prediction Systems Coupled with Cutting Current in Milling Operation

Authors: Joseph C. Chen, Venkata Mohan Kudapa

Abstract:

Development of two real-time surface roughness (Ra) prediction systems for milling operations was attempted. The systems used not only cutting parameters, such as feed rate and spindle speed, but also the cutting current generated and corrected by a clamp type energy sensor. Two different approaches were developed. First, a fuzzy inference system (FIS), in which the fuzzy logic rules are generated by experts in the milling processes, was used to conduct prediction modeling using current cutting data. Second, a neuro-fuzzy system (ANFIS) was explored. Neuro-fuzzy systems are adaptive techniques in which data are collected on the network, processed, and rules are generated by the system. The inference system then uses these rules to predict Ra as the output. Experimental results showed that the parameters of spindle speed, feed rate, depth of cut, and input current variation could predict Ra. These two systems enable the prediction of Ra during the milling operation with an average of 91.83% and 94.48% accuracy by FIS and ANFIS systems, respectively. Statistically, the ANFIS system provided better prediction accuracy than that of the FIS system.

Keywords: surface roughness, input current, fuzzy logic, neuro-fuzzy, milling operations

Procedia PDF Downloads 126
1272 Promoting Psychosocial Intervention in Social Work to Manage Intersectional Stigma among Sexual Minorities during COVID-19 Pandemic in Uganda: Implications for Social Work Practice

Authors: Simon Mwima, Kasule Solomon Kibirige, Evans Jennifer Mann, Bosco Mukuba, Edson Chipalo, Agnes Nzomene, Eusebius Small, Moses Okumu

Abstract:

Introduction: Social workers must create, implement, and evaluate client-centered psychosocial interventions (CCPI) to reduce the impact of intersectional stigma on HIV service utilization among sexual minorities. We contribute to the scarcity of evidence about sexual minorities in Uganda by using social support theory to explore clients' perceptions that shape CCPI. Based on Focused Group Discussion (FGD) with 31 adolescents recruited from Kampala's HIV clinics in 2021, our findings reveal the positive influence of instrumental, informational, esteem, emotional, and social network support as intersectional stigma reduction interventions. Men who have sex with men, lesbians, and bisexual women used such strategies to navigate a heavily criminalized and stigmatizing setting during the COVID-19 pandemic in Uganda. Conclusion: This study provides evidence for the social work profession to develop and implement psychosocial interventions that reduce HIV stigma and discrimination among MSM, lesbians, and bisexual young people living with HIV in Uganda.

Keywords: pyschosocial interventions, social work, intersectional stigma, HIV/AIDS, adolescents, sexual minorities, Uganda

Procedia PDF Downloads 92
1271 The Connection Between the International Law and the Legal Consultation on the Social Media

Authors: Amir Farouk Ahmed Ali Hussin

Abstract:

Social media, such as Facebook, LinkedIn and Ex-Twitter have experienced exponential growth and a remarkable adoption rate in recent years. They give fantastic means of online social interactions and communications with family, friends, and colleagues from around the corner or across the globe, and they have become an important part of daily digital interactions for more than one and a half billion users around the world. The personal information sharing practices that social network providers encourage have led to their success as innovative social interaction platforms. Moreover, these practices have outcome in concerns with respect to privacy and security from different stakeholders. Guiding these privacy and security concerns in social networks is a must for these networks to be sustainable. Real security and privacy tools may not be enough to address existing concerns. Some points should be followed to protect users from the existing risks. In this research, we have checked the various privacy and security issues and concerns pertaining to social media. However, we have classified these privacy and security issues and presented a thorough discussion of the effects of these issues and concerns on the future of the social networks. In addition, we have presented a set of points as precaution measures that users can consider to address these issues.

Keywords: international legal, consultation mix, legal research, small and medium-sized enterprises, strategic International law, strategy alignment, house of laws, deployment, production strategy, legal strategy, business strategy

Procedia PDF Downloads 40