Search results for: discrete breeding swarm
730 Correlations and Impacts Of Optimal Rearing Parameters on Nutritional Value Of Mealworm (Tenebrio Molitor)
Authors: Fabienne Vozy, Anick Lepage
Abstract:
Insects are displaying high nutritional value, low greenhouse gas emissions, low land use requirements and high food conversion efficiency. They can contribute to the food chain and be one of many solutions to protein shortages. Currently, in North America, nutritional entomology is under-developed and the needs to better understand its benefits remain to convince large-scale producers and consumers (both for human and agricultural needs). As such, large-scale production of mealworms offers a promising alternative to replacing traditional sources of protein and fatty acids. To proceed orderly, it is required to collect more data on the nutritional values of insects such as, a) Evaluate the diets of insects to improve their dietary value; b) Test the breeding conditions to optimize yields; c) Evaluate the use of by-products and organic residues as sources of food. Among the featured technical parameters, relative humidity (RH) percentage and temperature, optimal substrates and hydration sources are critical elements, thus establishing potential benchmarks for to optimize conversion rates of protein and fatty acids. This research is to establish the combination of the most influential rearing parameters with local food residues, to correlate the findings with the nutritional value of the larvae harvested. 125 same-monthly old adults/replica are randomly selected in the mealworm breeding pool then placed to oviposit in growth chambers preset at 26°C and 65% RH. Adults are removed after 7 days. Larvae are harvested upon the apparition of the first nymphosis signs and batches, are analyzed for their nutritional values using wet chemistry analysis. The first samples analyses include total weight of both fresh and dried larvae, residual humidity, crude proteins (CP%), and crude fats (CF%). Further analyses are scheduled to include soluble proteins and fatty acids. Although they are consistent with previous published data, the preliminary results show no significant differences between treatments for any type of analysis. Nutritional properties of each substrate combination have yet allowed to discriminate the most effective residue recipe. Technical issues such as the particles’ size of the various substrate combinations and larvae screen compatibility are to be investigated since it induced a variable percentage of lost larvae upon harvesting. To address those methodological issues are key to develop a standardized efficient procedure. The aim is to provide producers with easily reproducible conditions, without incurring additional excessive expenditure on their part in terms of equipment and workforce.Keywords: entomophagy, nutritional value, rearing parameters optimization, Tenebrio molitor
Procedia PDF Downloads 111729 A Review on Agricultural Landscapes as a Habitat of Rodents
Authors: Nadeem Munawar, Tariq Mahmood, Paula Rivadeneira, Ali Akhter
Abstract:
In this paper, we review on rodent species which are common inhabitants of agricultural landscapes where they are an important prey source for a wide variety of avian, reptilian, and mammalian predators. Agricultural fields are surrounded by fallow land, which provide suitable sites for shelter and breeding for rodents, while shrubs, grasses, annual weeds and forbs may provide supplementary food. The assemblage of rodent’s fauna in the cropland habitats including cropped fields, meadows and adjacent field structures like hedgerows, woodland and field margins fluctuates seasonally. The mature agricultural crops provides good source of food and shelter to the rodents and these factors along with favorable climatic factors/season facilitate breeding activities of these rodent species. Changes in vegetation height and vegetative cover affect two important aspects of a rodent’s life: food and shelter. In addition, during non-crop period vegetation can be important for building nests above or below ground and it provides thermal protection for rodents from heat and cold. The review revealed that rodents form a very diverse group of mammals, ranging from tiny pigmy mice to big capybaras, from arboreal flying squirrels to subterranean mole rats, from opportunistic omnivores (e.g. Norway rats) to specialist feeders (e.g. the North African fat sand rats that feed on a single family of plants only). It is therefore no surprise that some species thrive well under the conditions that are found in agricultural fields. The review on the population dynamics of the rodent species indicated that they are agricultural pests probably due to the heterogeneous landscape and to the high rotativity of vegetable crop cultivation. They also cause damage to various crops, directly and indirectly, by gnawing, spoilage, contamination and hoarding activities, besides this behavior they have also significance importance in agricultural habitat. The burrowing activities of rodents alter the soil properties around their burrows which improve its aeration, infiltration, increase the water holding capacity and thus encourage plant growth. These properties are beneficial for the soil because they affect absorption of phosphorus, absorption zinc, copper, other nutrients and the uptake of water and thus rodents are known as indicator species in agricultural fields. Our review suggests that wide crop field’s borders, particularly those contiguous to various cropland fields, should be understood as priority sites for nesting, feeding, and cover for the rodent’s fauna. The goal of this review paper is to provide a comprehensive synthesis of understanding regarding rodent habitat and biodiversity in agricultural landscapes.Keywords: agricultural landscapes, food, indicator species, shelter
Procedia PDF Downloads 169728 Water Use Efficiency of Sunflower Genotypes Under Drip Irrigation
Authors: Adel M. Mahmoud
Abstract:
This Investigation was conducted to determine the productivity and water use efficiency for new sunflower genotypes. Ten sunflower genotypes were evaluated under drip irrigation using two treatments of. Results indicate that decreasing the amount of irrigation water from 1500 to 1130 mm/hectar significantly reduced all studied traits. Mutation (M1-63) surpassed all the other one genotypes in seed yield and WUE. Lines which gave the highest yield of the seed have water use efficiency under drought conditions higher than water use efficiency under normal irrigation. The lowest depression in seed yield due to drought conditions has been registered for Line 20, Line M1-63 and Sakha 53 genotypes (11 , 18 and 16 %, respectively). Genotypes (Line 20 , Line M1-63 and Sakha 53) are more tolerant to drought than others and we can used its in breeding program to develop sunflower hybrids suitable for cultivation under drought condition.Keywords: sunflower genotypes, water use efficiency, mutation, inbred lines
Procedia PDF Downloads 378727 Utilization of Developed Single Sequence Repeats Markers for Dalmatian Pyrethrum (Tanacetum cinerariifolium) in Preliminary Genetic Diversity Study on Natural Populations
Authors: F. Varga, Z. Liber, J. Jakše, A. Turudić, Z. Šatović, I. Radosavljević, N. Jeran, M. Grdiša
Abstract:
Dalmatian pyrethrum (Tanacetum cinerariifolium (Trevir.) Sch. Bip.; Asteraceae), a source of the commercially dominant plant insecticide pyrethrin, is a species endemic to the eastern Adriatic. Genetic diversity of T. cinerariifolium was previously studied using amplified fragment length polymorphism (AFLP) markers. However, microsatellite markers (single sequence repeats - SSRs) are more informative because they are codominant, highly polymorphic, locus-specific, and more reproducible, and thus are most often used to assess the genetic diversity of plant species. Dalmatian pyrethrum is an outcrossing diploid (2n = 18) whose large genome size and high repeatability have prevented the success of the traditional approach to SSR markers development. The advent of next-generation sequencing combined with the specifically developed method recently enabled the development of, to the author's best knowledge, the first set of SSRs for genomic characterization of Dalmatian pyrethrum, which is essential from the perspective of plant genetic resources conservation. To evaluate the effectiveness of the developed SSR markers in genetic differentiation of Dalmatian pyrethrum populations, a preliminary genetic diversity study was conducted on 30 individuals from three geographically distinct natural populations in Croatia (northern Adriatic island of Mali Lošinj, southern Adriatic island of Čiovo, and Mount Biokovo) based on 12 SSR loci. Analysis of molecular variance (AMOVA) by randomization test with 10,000 permutations was performed in Arlequin 3.5. The average number of alleles per locus, observed and expected heterozygosity, probability of deviations from Hardy-Weinberg equilibrium, and inbreeding coefficient was calculated using GENEPOP 4.4. Genetic distance based on the proportion of common alleles (DPSA) was calculated using MICROSAT. Cluster analysis using the neighbor-joining method with 1,000 bootstraps was performed with PHYLIP to generate a dendrogram. The results of the AMOVA analysis showed that the total SSR diversity was 23% within and 77% between the three populations. A slight deviation from Hardy-Weinberg equilibrium was observed in the Mali Lošinj population. Allele richness ranged from 2.92 to 3.92, with the highest number of private alleles observed in the Mali Lošinj population (17). The average observed DPSA between 30 individuals was 0.557. The highest DPSA (0.875) was observed between several pairs of Dalmatian pyrethrum individuals from the Mali Lošinj and Mt. Biokovo populations, and the lowest between two individuals from the Čiovo population. Neighbor-joining trees, based on DPSA, grouped individuals into clusters according to their population affiliation. The separation of Mt. Biokovo clade was supported (bootstrap value 58%), which is consistent with the previous study on AFLP markers, where isolated populations from Mt. Biokovo differed from the rest of the populations. The developed SSR markers are an effective tool for assessing the genetic diversity and structure of natural Dalmatian pyrethrum populations. These preliminary results are encouraging for a future comprehensive study with a larger sample size across the species' range. Combined with the biochemical data, these highly informative markers could help identify potential genotypes of interest for future development of breeding lines and cultivars that are both resistant to environmental stress and high in pyrethrins. Acknowledgment: This work has been supported by the Croatian Science Foundation under the project ‘Genetic background of Dalmatian pyrethrum (Tanacetum cinerariifolium /Trevir./ Sch. Bip.) insecticidal potential’- (PyrDiv) (IP-06-2016-9034) and by project KK.01.1.1.01.0005, Biodiversity and Molecular Plant Breeding, at the Centre of Excellence for Biodiversity and Molecular Plant Breeding (CoE CroP-BioDiv), Zagreb, Croatia.Keywords: Asteraceae, genetic diversity, genomic SSRs, NGS, pyrethrum, Tanacetum cinerariifolium
Procedia PDF Downloads 114726 A Comparative Study on a Tilt-Integral-Derivative Controller with Proportional-Integral-Derivative Controller for a Pacemaker
Authors: Aysan Esgandanian, Sabalan Daneshvar
Abstract:
The study is done to determine the comparison between proportional-integral-derivative controller (PID controller) and tilt-integral-derivative (TID controller) for cardiac pacemaker systems, which can automatically control the heart rate to accurately track a desired preset profile. The controller offers good adaption of heart to the physiological needs of the patient. The parameters of the both controllers are tuned by particle swarm optimization (PSO) algorithm which uses the integral of time square error as a fitness function to be minimized. Simulation results are performed on the developed cardiovascular system of humans and results demonstrate that the TID controller produces superior control performance than PID controllers. In this paper, all simulations were performed in Matlab.Keywords: integral of time square error, pacemaker systems, proportional-integral-derivative controller, PSO algorithm, tilt-integral-derivative controller
Procedia PDF Downloads 462725 Feigenbaum Universality, Chaos and Fractal Dimensions in Discrete Dynamical Systems
Authors: T. K. Dutta, K. K. Das, N. Dutta
Abstract:
The salient feature of this paper is primarily concerned with Ricker’s population model: f(x)=x e^(r(1-x/k)), where r is the control parameter and k is the carrying capacity, and some fruitful results are obtained with the following objectives: 1) Determination of bifurcation values leading to a chaotic region, 2) Development of Statistical Methods and Analysis required for the measure of Fractal dimensions, 3) Calculation of various fractal dimensions. These results also help that the invariant probability distribution on the attractor, when it exists, provides detailed information about the long-term behavior of a dynamical system. At the end, some open problems are posed for further research.Keywords: Feigenbaum universality, chaos, Lyapunov exponent, fractal dimensions
Procedia PDF Downloads 302724 Determination of Genetic Markers, Microsatellites Type, Liked to Milk Production Traits in Goats
Authors: Mohamed Fawzy Elzarei, Yousef Mohammed Al-Dakheel, Ali Mohamed Alseaf
Abstract:
Modern molecular techniques, like single marker analysis for linked traits to these markers, can provide us with rapid and accurate genetic results. In the last two decades of the last century, the applications of molecular techniques were reached a faraway point in cattle, sheep, and pig. In goats, especially in our region, the application of molecular techniques is still far from other species. As reported by many researchers, microsatellites marker is one of the suitable markers for lie studies. The single marker linked to traits of interest is one technique allowed us to early select animals without the necessity for mapping the entire genome. Simplicity, applicability, and low cost of this technique gave this technique a wide range of applications in many areas of genetics and molecular biology. Also, this technique provides a useful approach for evaluating genetic differentiation, particularly in populations that are poorly known genetically. The expected breeding value (EBV) and yield deviation (YD) are considered as the most parameters used for studying the linkage between quantitative characteristics and molecular markers, since these values are raw data corrected for the non-genetic factors. A total of 17 microsatellites markers (from chromosomes 6, 14, 18, 20 and 23) were used in this study to search for areas that could be responsible for genetic variability for some milk traits and search of chromosomal regions that explain part of the phenotypic variance. Results of single-marker analyses were used to identify the linkage between microsatellite markers and variation in EBVs of these traits, Milk yield, Protein percentage, Fat percentage, Litter size and weight at birth, and litter size and weight at weaning. The estimates of the parameters from forward and backward solutions using stepwise regression procedure on milk yield trait, only two markers, OARCP9 and AGLA29, showed a highly significant effect (p≤0.01) in backward and forward solutions. The forward solution for different equations conducted that R2 of these equations were highly depending on only two partials regressions coefficient (βi,) for these markers. For the milk protein trait, four marker showed significant effect BMS2361, CSSM66 (p≤0.01), BMS2626, and OARCP9 (p≤0.05). By the other way, four markers (MCM147, BM1225, INRA006, andINRA133) showed highly significant effect (p≤0.01) in both backward and forward solutions in association with milk fat trait. For both litter size at birth and at weaning traits, only one marker (BM143(p≤0.01) and RJH1 (p≤0.05), respectively) showed a significant effect in backward and forward solutions. The estimates of the parameters from forward and backward solution using stepwise regression procedure on litter weight at birth (LWB) trait only one marker (MCM147) showed highly significant effect (p≤0.01) and two marker (ILSTS011, CSSM66) showed a significant effect (p≤0.05) in backward and forward solutions.Keywords: microsatellites marker, estimated breeding value, stepwise regression, milk traits
Procedia PDF Downloads 93723 Distributed Key Management With Less Transmitted Messaged In Rekeying Process To Secure Iot Wireless Sensor Networks In Smart-Agro
Authors: Safwan Mawlood Hussien
Abstract:
Internet of Things (IoT) is a promising technology has received considerable attention in different fields such as health, industry, defence, and agro, etc. Due to the limitation capacity of computing, storage, and communication, IoT objects are more vulnerable to attacks. Many solutions have been proposed to solve security issues, such as key management using symmetric-key ciphers. This study provides a scalable group distribution key management based on ECcryptography; with less transmitted messages The method has been validated through simulations in OMNeT++.Keywords: elliptic curves, Diffie–Hellman, discrete logarithm problem, secure key exchange, WSN security, IoT security, smart-agro
Procedia PDF Downloads 119722 Problems of Boolean Reasoning Based Biclustering Parallelization
Authors: Marcin Michalak
Abstract:
Biclustering is the way of two-dimensional data analysis. For several years it became possible to express such issue in terms of Boolean reasoning, for processing continuous, discrete and binary data. The mathematical backgrounds of such approach — proved ability of induction of exact and inclusion–maximal biclusters fulfilling assumed criteria — are strong advantages of the method. Unfortunately, the core of the method has quite high computational complexity. In the paper the basics of Boolean reasoning approach for biclustering are presented. In such context the problems of computation parallelization are risen.Keywords: Boolean reasoning, biclustering, parallelization, prime implicant
Procedia PDF Downloads 125721 A Comparison of YOLO Family for Apple Detection and Counting in Orchards
Authors: Yuanqing Li, Changyi Lei, Zhaopeng Xue, Zhuo Zheng, Yanbo Long
Abstract:
In agricultural production and breeding, implementing automatic picking robot in orchard farming to reduce human labour and error is challenging. The core function of it is automatic identification based on machine vision. This paper focuses on apple detection and counting in orchards and implements several deep learning methods. Extensive datasets are used and a semi-automatic annotation method is proposed. The proposed deep learning models are in state-of-the-art YOLO family. In view of the essence of the models with various backbones, a multi-dimensional comparison in details is made in terms of counting accuracy, mAP and model memory, laying the foundation for realising automatic precision agriculture.Keywords: agricultural object detection, deep learning, machine vision, YOLO family
Procedia PDF Downloads 197720 Energy Content and Spectral Energy Representation of Wave Propagation in a Granular Chain
Authors: Rohit Shrivastava, Stefan Luding
Abstract:
A mechanical wave is propagation of vibration with transfer of energy and momentum. Studying the energy as well as spectral energy characteristics of a propagating wave through disordered granular media can assist in understanding the overall properties of wave propagation through inhomogeneous materials like soil. The study of these properties is aimed at modeling wave propagation for oil, mineral or gas exploration (seismic prospecting) or non-destructive testing for the study of internal structure of solids. The study of Energy content (Kinetic, Potential and Total Energy) of a pulse propagating through an idealized one-dimensional discrete particle system like a mass disordered granular chain can assist in understanding the energy attenuation due to disorder as a function of propagation distance. The spectral analysis of the energy signal can assist in understanding dispersion as well as attenuation due to scattering in different frequencies (scattering attenuation). The selection of one-dimensional granular chain also helps in studying only the P-wave attributes of the wave and removing the influence of shear or rotational waves. Granular chains with different mass distributions have been studied, by randomly selecting masses from normal, binary and uniform distributions and the standard deviation of the distribution is considered as the disorder parameter, higher standard deviation means higher disorder and lower standard deviation means lower disorder. For obtaining macroscopic/continuum properties, ensemble averaging has been used. Interpreting information from a Total Energy signal turned out to be much easier in comparison to displacement, velocity or acceleration signals of the wave, hence, indicating a better analysis method for wave propagation through granular materials. Increasing disorder leads to faster attenuation of the signal and decreases the Energy of higher frequency signals transmitted, but at the same time the energy of spatially localized high frequencies also increases. An ordered granular chain exhibits ballistic propagation of energy whereas, a disordered granular chain exhibits diffusive like propagation, which eventually becomes localized at long periods of time.Keywords: discrete elements, energy attenuation, mass disorder, granular chain, spectral energy, wave propagation
Procedia PDF Downloads 290719 Machine Learning Approach for Lateralization of Temporal Lobe Epilepsy
Authors: Samira-Sadat JamaliDinan, Haidar Almohri, Mohammad-Reza Nazem-Zadeh
Abstract:
Lateralization of temporal lobe epilepsy (TLE) is very important for positive surgical outcomes. We propose a machine learning framework to ultimately identify the epileptogenic hemisphere for temporal lobe epilepsy (TLE) cases using magnetoencephalography (MEG) coherence source imaging (CSI) and diffusion tensor imaging (DTI). Unlike most studies that use classification algorithms, we propose an effective clustering approach to distinguish between normal and TLE cases. We apply the famous Minkowski weighted K-Means (MWK-Means) technique as the clustering framework. To overcome the problem of poor initialization of K-Means, we use particle swarm optimization (PSO) to effectively select the initial centroids of clusters prior to applying MWK-Means. We demonstrate that compared to K-means and MWK-means independently, this approach is able to improve the result of a benchmark data set.Keywords: temporal lobe epilepsy, machine learning, clustering, magnetoencephalography
Procedia PDF Downloads 155718 DCT and Stream Ciphers for Improved Image Encryption Mechanism
Authors: T. R. Sharika, Ashwini Kumar, Kamal Bijlani
Abstract:
Encryption is the process of converting crucial information’s unreadable to unauthorized persons. Image security is an important type of encryption that secures all type of images from cryptanalysis. A stream cipher is a fast symmetric key algorithm which is used to convert plaintext to cipher text. In this paper we are proposing an image encryption algorithm with Discrete Cosine Transform and Stream Ciphers that can improve compression of images and enhanced security. The paper also explains the use of a shuffling algorithm for enhancing securing.Keywords: decryption, DCT, encryption, RC4 cipher, stream cipher
Procedia PDF Downloads 361717 Behavior Loss Aversion Experimental Laboratory of Financial Investments
Authors: Jihene Jebeniani
Abstract:
We proposed an approach combining both the techniques of experimental economy and the flexibility of discrete choice models in order to test the loss aversion. Our main objective was to test the loss aversion of the Cumulative Prospect Theory (CPT). We developed an experimental laboratory in the context of the financial investments that aimed to analyze the attitude towards the risk of the investors. The study uses the lotteries and is basing on econometric modeling. The estimated model was the ordered probit.Keywords: risk aversion, behavioral finance, experimental economic, lotteries, cumulative prospect theory
Procedia PDF Downloads 471716 Should the U.S. Rely on Drone Strikes to Combat the Islamic State? Why Deploying a Drone Campaign against ISIS Will Do Nothing to Address the Causes of the Insurgency or Prevent Its Resurgence?
Authors: Danielle Jablanski
Abstract:
This article addresses the use of drone strikes under international law and the intersection between Islamic law and current terrorist trends worldwide. It breaks down the legality of drone strikes under international law and dissects certain aspects of their usage in modern warfare; i.e. concepts of directly participating in hostilities and the role of CIA operators. The article then looks at international paradigms of law enforcement versus the use of military force in relation to terrorism. Lastly, it describes traditional aspects of Islamic law and several interpretations of the law today as applied to widespread campaigns of terrorism, namely that of the recent group ISIS or ISIL operating between the battlegrounds of Iraq and Syria. The piece concludes with appraisals for moving forward on the basis of honing in on reasons for terrorism and negative opinions of solely military campaigns to dismantle or disrupt terror organizations and breeding grounds.Keywords: international law, terrorism, ISIS, islamic law
Procedia PDF Downloads 475715 Conceptualizing Conflict in the Gray Zone: A Comparative Analysis of Diplomatic, Military and Political Lenses
Authors: John Hardy, Paul Lushenko
Abstract:
he twenty-first century international security order has been fraught with challenges to the credibility and stability of the post-Cold War status quo. Although the American-led international system has rarely been threatened directly by dissatisfied states, an underlying challenge to the international security order has emerged in the form of a slow-burning abnegation of small but significant aspects of the status quo. Meanwhile, those security challenges which have threatened to destabilize order in the international system have not clearly belonged to the traditional notions of diplomacy and armed conflict. Instead, the main antagonists have been both states and non-state actors, the issues have crossed national and international boundaries, and contestation has occurred in a ‘gray zone’ between peace and war. Gray zone conflicts are not easily categorized as military operations, national security policies or political strategies, because they often include elements of diplomacy, military operations, and statecraft in complex combinations. This study applies three approaches to conceptualizing the gray zone in which many contemporary conflicts take place. The first approach frames gray zone conflicts as a form of coercive diplomacy, in which armed force is used to add credibility and commitment to political threats. The second approach frames gray zone conflicts as a form of discrete military operation, in which armed force is used sparingly and is limited to a specific issue. The third approach frames gray zones conflicts as a form of proxy war, in which armed force is used by or through third parties, rather than directly between belligerents. The study finds that each approach to conceptualizing the gray zone accounts for only a narrow range of issues which fall within the gap between traditional notions of peace and war. However, in combination, all three approaches are useful in explicating the gray zone and understanding the character of contemporary security challenges which defy simple categorization. These findings suggest that coercive diplomacy, discrete military operations, and proxy warfare provide three overlapping lenses for conceptualizing the gray zone and for understanding the gray zone conflicts which threaten international security in the early twenty-first century.Keywords: gray zone, international security, military operations, national security, strategy
Procedia PDF Downloads 158714 Influence of Some Parameters on Embryonic Mortality of Barbary Partridge Alectoris barbara in a Semi-Captive Breeding
Authors: H. Idouhar-Saadi, A. Smaï, S. Zenia, F. Haddadj, M. Aissi, S. Doumandji
Abstract:
During the period of reproduction, the collection of eggs of the Barbary gambra partridge is made only once a week in the morning, considering the sensibility in the stress of this native species. The number of considered samples is 33 eggs. The duration of the incubation is of 18 days. Unhatched eggs and eggs eliminated previously at the time of the mirage are collected and forwarded to the laboratories of microbiology and parasitology. The average weight of the eggs of the Barbary Partridge vary much [20.08 ± 1.81 g. (2006) < Pm < 20.82 ± 2,11g. (2008)]. The percentage of unhatched eggs varies between 9.3% in 2005 and 15.55% in 2007. It appears that the rate of embryonic mortality is slightly higher compared to that of infertile eggs. Microbiological analysis of unhatched eggs showed the presence of pathogenic germs such as lute Chryseomonas luteola. Chryseomonas ola and Escherichia coli. As against the parasites research is negative.Keywords: barbary partridge, unhatched eggs, embryo mortality, pathogenic germs
Procedia PDF Downloads 535713 Social and Psychological Contexts of Male-Perpetrators of Violence against Women
Authors: Mythri Kukkaje
Abstract:
Information about the social and psychological contexts that operate as a breeding ground for perpetrators of violence against women in India is scarce. To understand the social and psychological contexts that form the bases of violent behaviour in male-perpetrators against women, interviews were conducted with 13 men above the age of 18 years, who were convicted for their crimes against women. Using thematic analysis, the nurturance and the social background of the perpetrators, determined by their social relationships, the socio-economic status, the extent of substance abuse, the history of experiencing and witnessing violence and their cultural context, were found to define the social context. The nature and the psychological background of the perpetrators determined by the thoughts and beliefs regarding gender and violence, the motivation behind their violent behaviour and a few specific personality traits were found to define the psychological context. These factors on their own, as well as an interaction between them, could be responsible for varying degrees of violence against women.Keywords: perpetrator, psychological, social, violence against women
Procedia PDF Downloads 227712 Impact Assessment of Plum Research Investments in South Africa
Authors: Precious M. Tshabalala, Thula S. Dlamini, Frikkie Liebenberg, Johann Kirsten
Abstract:
Numerous studies have been conducted, and the evidence has been unambiguous showing that investing in agricultural research and development increases productivity. Continued investments in agricultural research have led to the development of over 26 successful plum cultivars since 1980 at the Agricultural Research Council’s (ARC) Infruitec/Nietvoorbij in South Africa, and more continue to be developed to meet the specific needs of both producers and consumers. Yet very little is known about the returns on any of these research initiatives. The objective of the study was determine the economic impact of plum research investments at the ARC-the main plum breeding research organization in the country. The rate of return to plum research is estimated by estimating parameters in plum production and expressing research investment as an explanatory variable. The marginal rate of return is then determined to be 14.23 per cent. The rate of return to investment being this high is indicative of an under investment in plum research.Keywords: Agricultural research investments, productivity and rate of return, plum
Procedia PDF Downloads 486711 Fuzzy Wavelet Model to Forecast the Exchange Rate of IDR/USD
Authors: Tri Wijayanti Septiarini, Agus Maman Abadi, Muhammad Rifki Taufik
Abstract:
The exchange rate of IDR/USD can be the indicator to analysis Indonesian economy. The exchange rate as a important factor because it has big effect in Indonesian economy overall. So, it needs the analysis data of exchange rate. There is decomposition data of exchange rate of IDR/USD to be frequency and time. It can help the government to monitor the Indonesian economy. This method is very effective to identify the case, have high accurate result and have simple structure. In this paper, data of exchange rate that used is weekly data from December 17, 2010 until November 11, 2014.Keywords: the exchange rate, fuzzy mamdani, discrete wavelet transforms, fuzzy wavelet
Procedia PDF Downloads 570710 Some Studies on Endometritis in Pure Arabian Mares
Authors: Khairi El Battawy, Monika Skalicki
Abstract:
The present investigation has been done on pure Egyptian Arabian mares that reared in private horse studs. Fifty non-pregnant mares were selected and examined to classify them as either being reproductively healthy or subfertile mares including clinical endometritis, early embryonic death, granulosa cell tumor, repeat breeder (post-breeding endometritis), and anoestrus mares. The purpose of the study was to assess oxidative/antioxidant biochemical metabolites, lipogram, trace elements and reproductive hormones throughout reproductive conditions in mares during regular estrous, anestrum, early pregnancy, granulose cell tumor, ovulation failure, and endometritis. Results showed intensification of the free radical-dependent process in the blood of infertile mare, especially mares with endometritis. Ultrasonography as a diagnostic tool diagnosis of endometritis in mares was an important step as it revealed much information concerning infertility problem.Keywords: endometritis, ovulation, oxidative, mare
Procedia PDF Downloads 178709 Multimodal Biometric Cryptography Based Authentication in Cloud Environment to Enhance Information Security
Authors: D. Pugazhenthi, B. Sree Vidya
Abstract:
Cloud computing is one of the emerging technologies that enables end users to use the services of cloud on ‘pay per usage’ strategy. This technology grows in a fast pace and so is its security threat. One among the various services provided by cloud is storage. In this service, security plays a vital factor for both authenticating legitimate users and protection of information. This paper brings in efficient ways of authenticating users as well as securing information on the cloud. Initial phase proposed in this paper deals with an authentication technique using multi-factor and multi-dimensional authentication system with multi-level security. Unique identification and slow intrusive formulates an advanced reliability on user-behaviour based biometrics than conventional means of password authentication. By biometric systems, the accounts are accessed only by a legitimate user and not by a nonentity. The biometric templates employed here do not include single trait but multiple, viz., iris and finger prints. The coordinating stage of the authentication system functions on Ensemble Support Vector Machine (SVM) and optimization by assembling weights of base SVMs for SVM ensemble after individual SVM of ensemble is trained by the Artificial Fish Swarm Algorithm (AFSA). Thus it helps in generating a user-specific secure cryptographic key of the multimodal biometric template by fusion process. Data security problem is averted and enhanced security architecture is proposed using encryption and decryption system with double key cryptography based on Fuzzy Neural Network (FNN) for data storing and retrieval in cloud computing . The proposing scheme aims to protect the records from hackers by arresting the breaking of cipher text to original text. This improves the authentication performance that the proposed double cryptographic key scheme is capable of providing better user authentication and better security which distinguish between the genuine and fake users. Thus, there are three important modules in this proposed work such as 1) Feature extraction, 2) Multimodal biometric template generation and 3) Cryptographic key generation. The extraction of the feature and texture properties from the respective fingerprint and iris images has been done initially. Finally, with the help of fuzzy neural network and symmetric cryptography algorithm, the technique of double key encryption technique has been developed. As the proposed approach is based on neural networks, it has the advantage of not being decrypted by the hacker even though the data were hacked already. The results prove that authentication process is optimal and stored information is secured.Keywords: artificial fish swarm algorithm (AFSA), biometric authentication, decryption, encryption, fingerprint, fusion, fuzzy neural network (FNN), iris, multi-modal, support vector machine classification
Procedia PDF Downloads 259708 A Study on Finite Element Modelling of Earth Retaining Wall Anchored by Deadman Anchor
Authors: K. S. Chai, S. H. Chan
Abstract:
In this paper, the earth retaining wall anchored by discrete deadman anchor to support excavations in sand is modelled and analysed by finite element analysis. A study is conducted to examine how deadman anchorage system helps in reducing the deflection of earth retaining wall. A simplified numerical model is suggested in order to reduce the simulation duration. A comparison between 3-D and 2-D finite element analyses is illustrated.Keywords: finite element, earth retaining wall, deadman anchor, sand
Procedia PDF Downloads 481707 The Realization of a System’s State Space Based on Markov Parameters by Using Flexible Neural Networks
Authors: Ali Isapour, Ramin Nateghi
Abstract:
— Markov parameters are unique parameters of the system and remain unchanged under similarity transformations. Markov parameters from a power series that is convergent only if the system matrix’s eigenvalues are inside the unity circle. Therefore, Markov parameters of a stable discrete-time system are convergent. In this study, we aim to realize the system based on Markov parameters by using Artificial Neural Networks (ANN), and this end, we use Flexible Neural Networks. Realization means determining the elements of matrices A, B, C, and D.Keywords: Markov parameters, realization, activation function, flexible neural network
Procedia PDF Downloads 194706 A New Tool for Global Optimization Problems: Cuttlefish Algorithm
Authors: Adel Sabry Eesa, Adnan Mohsin Abdulazeez Brifcani, Zeynep Orman
Abstract:
This paper presents a new meta-heuristic bio-inspired optimization algorithm which is called Cuttlefish Algorithm (CFA). The algorithm mimics the mechanism of color changing behavior of the cuttlefish to solve numerical global optimization problems. The colors and patterns of the cuttlefish are produced by reflected light from three different layers of cells. The proposed algorithm considers mainly two processes: reflection and visibility. Reflection process simulates light reflection mechanism used by these layers, while visibility process simulates visibility of matching patterns of the cuttlefish. To show the effectiveness of the algorithm, it is tested with some other popular bio-inspired optimization algorithms such as Genetic Algorithms (GA), Particle Swarm Optimization (PSO) and Bees Algorithm (BA) that have been previously proposed in the literature. Simulations and obtained results indicate that the proposed CFA is superior when compared with these algorithms.Keywords: Cuttlefish Algorithm, bio-inspired algorithms, optimization, global optimization problems
Procedia PDF Downloads 563705 The Permutation of Symmetric Triangular Equilateral Group in the Cryptography of Private and Public Key
Authors: Fola John Adeyeye
Abstract:
In this paper, we propose a cryptosystem private and public key base on symmetric group Pn and validates its theoretical formulation. This proposed system benefits from the algebraic properties of Pn such as noncommutative high logical, computational speed and high flexibility in selecting key which makes the discrete permutation multiplier logic (DPML) resist to attack by any algorithm such as Pohlig-Hellman. One of the advantages of this scheme is that it explore all the possible triangular symmetries. Against these properties, the only disadvantage is that the law of permutation multiplicity only allow an operation from left to right. Many other cryptosystems can be transformed into their symmetric group.Keywords: cryptosystem, private and public key, DPML, symmetric group Pn
Procedia PDF Downloads 202704 Linear Array Geometry Synthesis with Minimum Sidelobe Level and Null Control Using Taguchi Method
Authors: Amara Prakasa Rao, N. V. S. N. Sarma
Abstract:
This paper describes the synthesis of linear array geometry with minimum sidelobe level and null control using the Taguchi method. Based on the concept of the orthogonal array, Taguchi method effectively reduces the number of tests required in an optimization process. Taguchi method has been successfully applied in many fields such as mechanical, chemical engineering, power electronics, etc. Compared to other evolutionary methods such as genetic algorithms, simulated annealing and particle swarm optimization, the Taguchi method is much easier to understand and implement. It requires less computational/iteration processing to optimize the problem. Different cases are considered to illustrate the performance of this technique. Simulation results show that this method outperforms the other evolution algorithms (like GA, PSO) for smart antenna systems design.Keywords: array factor, beamforming, null placement, optimization method, orthogonal array, Taguchi method, smart antenna system
Procedia PDF Downloads 394703 Solutions to Probabilistic Constrained Optimal Control Problems Using Concentration Inequalities
Authors: Tomoaki Hashimoto
Abstract:
Recently, optimal control problems subject to probabilistic constraints have attracted much attention in many research field. Although probabilistic constraints are generally intractable in optimization problems, several methods haven been proposed to deal with probabilistic constraints. In most methods, probabilistic constraints are transformed to deterministic constraints that are tractable in optimization problems. This paper examines a method for transforming probabilistic constraints into deterministic constraints for a class of probabilistic constrained optimal control problems.Keywords: optimal control, stochastic systems, discrete-time systems, probabilistic constraints
Procedia PDF Downloads 278702 Integrating Technology in Teaching and Learning Mathematics
Authors: Larry Wang
Abstract:
The aim of this paper is to demonstrate how an online homework system is integrated in teaching and learning mathematics and how it improves the student success rates in some gateway mathematics courses. WeBWork provided by the Mathematical Association of America is adopted as the online homework system. During the period of 2010-2015, the system was implemented in classes of precalculus, calculus, probability and statistics, discrete mathematics, linear algebra, and differential equations. As a result, the passing rates of the sections with WeBWork are well above other sections without WeBWork (about 7-10% higher). The paper also shows how the WeBWork system was used.Keywords: gateway mathematics, online grading, pass rate, WeBWorK
Procedia PDF Downloads 299701 Presenting a Job Scheduling Algorithm Based on Learning Automata in Computational Grid
Authors: Roshanak Khodabakhsh Jolfaei, Javad Akbari Torkestani
Abstract:
As a cooperative environment for problem-solving, it is necessary that grids develop efficient job scheduling patterns with regard to their goals, domains and structure. Since the Grid environments facilitate distributed calculations, job scheduling appears in the form of a critical problem for the management of Grid sources that influences severely on the efficiency for the whole Grid environment. Due to the existence of some specifications such as sources dynamicity and conditions of the network in Grid, some algorithm should be presented to be adjustable and scalable with increasing the network growth. For this purpose, in this paper a job scheduling algorithm has been presented on the basis of learning automata in computational Grid which the performance of its results were compared with FPSO algorithm (Fuzzy Particle Swarm Optimization algorithm) and GJS algorithm (Grid Job Scheduling algorithm). The obtained numerical results indicated the superiority of suggested algorithm in comparison with FPSO and GJS. In addition, the obtained results classified FPSO and GJS in the second and third position respectively after the mentioned algorithm.Keywords: computational grid, job scheduling, learning automata, dynamic scheduling
Procedia PDF Downloads 343