Search results for: open and distant learning programme
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 10264

Search results for: open and distant learning programme

4174 BFDD-S: Big Data Framework to Detect and Mitigate DDoS Attack in SDN Network

Authors: Amirreza Fazely Hamedani, Muzzamil Aziz, Philipp Wieder, Ramin Yahyapour

Abstract:

Software-defined networking in recent years came into the sight of so many network designers as a successor to the traditional networking. Unlike traditional networks where control and data planes engage together within a single device in the network infrastructure such as switches and routers, the two planes are kept separated in software-defined networks (SDNs). All critical decisions about packet routing are made on the network controller, and the data level devices forward the packets based on these decisions. This type of network is vulnerable to DDoS attacks, degrading the overall functioning and performance of the network by continuously injecting the fake flows into it. This increases substantial burden on the controller side, and the result ultimately leads to the inaccessibility of the controller and the lack of network service to the legitimate users. Thus, the protection of this novel network architecture against denial of service attacks is essential. In the world of cybersecurity, attacks and new threats emerge every day. It is essential to have tools capable of managing and analyzing all this new information to detect possible attacks in real-time. These tools should provide a comprehensive solution to automatically detect, predict and prevent abnormalities in the network. Big data encompasses a wide range of studies, but it mainly refers to the massive amounts of structured and unstructured data that organizations deal with on a regular basis. On the other hand, it regards not only the volume of the data; but also that how data-driven information can be used to enhance decision-making processes, security, and the overall efficiency of a business. This paper presents an intelligent big data framework as a solution to handle illegitimate traffic burden on the SDN network created by the numerous DDoS attacks. The framework entails an efficient defence and monitoring mechanism against DDoS attacks by employing the state of the art machine learning techniques.

Keywords: apache spark, apache kafka, big data, DDoS attack, machine learning, SDN network

Procedia PDF Downloads 157
4173 Agricultural Mechanization for Transformation

Authors: Lawrence Gumbe

Abstract:

Kenya Vision 2030 is the country's programme for transformation covering the period 2008 to 2030. Its objective is to help transform Kenya into a newly industrializing, middle-income, exceeding US$10000, country providing a high quality of life to all its citizens by 2030, in a clean and secure environment. Increased agricultural and production and productivity is crucial for the realization of Vision 2030. Mechanization of agriculture in order to achieve greater yields is the only way to achieve these objectives. There are contending groups and views on the strategy for agricultural mechanization. The first group are those who oppose the widespread adoption of advanced technologies (mostly internal combustion engines and tractors) in agricultural mechanization as entirely inappropriate in most situations in developing countries. This group argues that mechanically powered -agricultural mechanization often leads to displacement of labour and hence increased unemployment, and this results in a host of other socio-economic problems, amongst them, rural-urban migration, inequitable distribution of wealth and in many cases an increase in absolute poverty, balance of payments due to the need to import machinery, fuel and sometimes technical assistance to manage them. The second group comprises of those who view the use of the improved hand tools and animal powered technology as transitional step between the most rudimentary step in technological development (characterized by entire reliance on human muscle power) and the advanced technologies (characterized 'by reliance on tractors and other machinery). The third group comprises those who regard these intermediate technologies (ie. improved hand tools and draught animal technology in agriculture) as a ‘delaying’ tactic and they advocate the use of mechanical technologies as-the most appropriate. This group argues that alternatives to the mechanical technologies do not just exist as a practical matter, or, if they are available, they are inefficient and they cannot be compared to the mechanical technologies in terms of economics and productivity. The fourth group advocates a compromise between groups two and third above. This group views the improved hand tools and draught animal technology as more of an 18th century technology and the modem tractor and combine harvester as too advanced for developing countries. This group has been busy designing an ‘intermediate’, ‘appropriate’, ‘mini’, ‘micro’ tractor for use by farmers in developing countries. This paper analyses and concludes on the different agricultural mechanization strategies available to Kenya and other third world countries

Keywords: agriculture, mechanazation, transformation, industrialization

Procedia PDF Downloads 323
4172 Physiological Indicators and Stress Index of Scavenging Chickens at Lafarge and Dangote Cement Factory Areas of Ogun State

Authors: Oluwadele Joshua Femi, Akinlabi Ebenezer Yemi, Onaopemipo Adeitan, Kazeem Bello, Anthony Ekeocha, Miraim Tawose

Abstract:

This study was carried out to determine the physiological and stress index of scavenging chickens in LAFARGE (Ewekoro) and Dangote (Ibese) Cement Factories Area of Ogun State. One hundred adult scavenging chickens comprising of 25 chickens from LAFARGE, Dangote and respective adjourning communities (Imasayi and Wasimi) were used. Experimental birds were caught at night on their perch and kept in cages till the next morning. Data were collected on rectal temperature, pulse rate, and respiratory rate of the birds. Also, 5ml blood was collected through the wing vein of the chickens in each location using a sterilized needle and syringe and transported to laboratory for analysis. Significant (P<0.05) highest pulse rate (215.64 beat/minute) and respiratory rate (19.90 breaths/minute) were recorded among scavenging chickens at LAFARGE (Ewekoro) Area and the least (198.61 beat/minute and 16.93 breaths/minute, respectively) at Imasayi. There was no significant (P>0.05) difference in the rectal temperature of the birds in the study area. Significant (P<0.05) differences were also recorded in the Packed Cell Volume (PCV), Hemoglobin (Hb), White Blood Cell (WBC), Monocyte, and Glucose level of the chickens in study area with the highest (P<0.05) Packed Cell Volume (28.06%) and Haemoglobin (4.01g/dl) recorded in Ibese and the least Packed Cell Volume (22.00%) and Haemoglobin (288g/dl) in Imasayi. Highest (P<0.05) Monocyte (4.28%) and glucose (256.53g/dl) were recorded among scavenging chickens at Dangote (Ibese) while the least Monocyte (0.00%) and Glucose (194.53g/dl) was recorded among chickens at Wasimi. Highest (P<0.05) White Blood Cell (6488.89×103µl) was recorded among chickens at Ewekoro and the lowest value in Ibese (4388.44×103µl). There was no significant (P>0.05) difference in the Heterophyl, Lymphocyte, Basophyl and Heterophyl/Lymphocyte ratio of the chickens in the study Area. The study concluded that chickens reared at LAFARGE (Ewekoro) were stressed and had comprised welfare and health status compared to Dangote (Ibese) cement area and other agrarian communities. Effective environmental mitigation programme should be put in place to enhance the welfare of the scavenging chickens in LAFARGE Cement Factory Area.

Keywords: blood, chicken, poisonous substances, pack cell volume, communities

Procedia PDF Downloads 70
4171 Factors Leading to Teenage Pregnancy in the Selected Villages of Mopani District, in Limpopo Province

Authors: Z. N. Salim, R. T. Lebese, M. S. Maputle

Abstract:

Background: The international community has been concerned about population growth for more than a century. Teenagers in sub-Saharan Africa continue to be at high risk of HIV infection, and this is exacerbated by poverty, whereby many teenagers in Africa come from disadvantaged families/background, which leads them to engage in sexual activities at an early age for survival hence leading to increased rate of teenage pregnancy. Purpose: The study sought to explore, describe and to identify the factors that lead to teenage pregnancy in the selected villages in Mopani District. Design: The study was conducted using a qualitative, explorative, descriptive and contextual approach. A non-probability purposive sampling approach was used. Researcher collected the data with the assistance of research assistant. Participants were interviewed and information was captured on a tape recorder and analysed using open coding and thereafter collected into main themes, themes and sub-themes. The researcher conducted four focus groups, Participants aged between 10-19 years of age. Results: The finding of the study revealed that there are several factors that is contributing to teenagers falling pregnant. Personal, intuitional, and cultural were identified to be the factors leading to teenage pregnancy.

Keywords: factors, leading, pregnancy, teenage

Procedia PDF Downloads 185
4170 Supersymmetry versus Compositeness: 2-Higgs Doublet Models Tell the Story

Authors: S. De Curtis, L. Delle Rose, S. Moretti, K. Yagyu

Abstract:

Supersymmetry and compositeness are the two prevalent paradigms providing both a solution to the hierarchy problem and motivation for a light Higgs boson state. An open door towards the solution is found in the context of 2-Higgs Doublet Models (2HDMs), which are necessary to supersymmetry and natural within compositeness in order to enable Electro-Weak Symmetry Breaking. In scenarios of compositeness, the two isospin doublets arise as pseudo Nambu-Goldstone bosons from the breaking of SO(6). By calculating the Higgs potential at one-loop level through the Coleman-Weinberg mechanism from the explicit breaking of the global symmetry induced by the partial compositeness of fermions and gauge bosons, we derive the phenomenological properties of the Higgs states and highlight the main signatures of this Composite 2-Higgs Doublet Model at the Large Hadron Collider. These include modifications to the SM-like Higgs couplings as well as production and decay channels of heavier Higgs bosons. We contrast the properties of this composite scenario to the well-known ones established in supersymmetry, with the MSSM being the most notorious example. We show how 2HDM spectra of masses and couplings accessible at the Large Hadron Collider may allow one to distinguish between the two paradigms.

Keywords: beyond the standard model, composite Higgs, supersymmetry, Two-Higgs Doublet Model

Procedia PDF Downloads 112
4169 The Layout Analysis of Handwriting Characters and the Fusion of Multi-style Ancient Books’ Background

Authors: Yaolin Tian, Shanxiong Chen, Fujia Zhao, Xiaoyu Lin, Hailing Xiong

Abstract:

Ancient books are significant culture inheritors and their background textures convey the potential history information. However, multi-style texture recovery of ancient books has received little attention. Restricted by insufficient ancient textures and complex handling process, the generation of ancient textures confronts with new challenges. For instance, training without sufficient data usually brings about overfitting or mode collapse, so some of the outputs are prone to be fake. Recently, image generation and style transfer based on deep learning are widely applied in computer vision. Breakthroughs within the field make it possible to conduct research upon multi-style texture recovery of ancient books. Under the circumstances, we proposed a network of layout analysis and image fusion system. Firstly, we trained models by using Deep Convolution Generative against Networks (DCGAN) to synthesize multi-style ancient textures; then, we analyzed layouts based on the Position Rearrangement (PR) algorithm that we proposed to adjust the layout structure of foreground content; at last, we realized our goal by fusing rearranged foreground texts and generated background. In experiments, diversified samples such as ancient Yi, Jurchen, Seal were selected as our training sets. Then, the performances of different fine-turning models were gradually improved by adjusting DCGAN model in parameters as well as structures. In order to evaluate the results scientifically, cross entropy loss function and Fréchet Inception Distance (FID) are selected to be our assessment criteria. Eventually, we got model M8 with lowest FID score. Compared with DCGAN model proposed by Radford at el., the FID score of M8 improved by 19.26%, enhancing the quality of the synthetic images profoundly.

Keywords: deep learning, image fusion, image generation, layout analysis

Procedia PDF Downloads 140
4168 Visible Expression of Social Identity: The Clothing and Fashion

Authors: Nihan Akdemir

Abstract:

Clothes are more than a piece of fabric, and the most visible material item of the fashion symbol is the garment, which carries multiple and various meanings. The dynamism of the clothing symbol can carry open or closed codes depending on culture, gender, and social location. And each one can be the expression of social identity over ethnicity, religious beliefs, age, education and social class. Through observation of clothing styles over these items, the assumptions could be made about a person’s identity. A distinctive and typical style, form or character of the clothing such as ‘zoot suits’, ‘ao dai’, removes the garment from functional and ordinary element to the symbolic area. Clothing is an 'identification' tool that functions in determining the symbolic boundaries between people in a sense. And this paper includes the investigation of the relation between social identity and clothing and also fashion. And this relationship has been taken into consideration over the visual expression because even during the ancient times, the clothes were the basic and simple way of representing the identity and social classes. The visible expression of identity over clothing from Ancient Egypt to today’s clothing and fashion has been researched in this article. And all these items have been explained with visual images and supported by the literature investigations. Then the results have shown that every piece of clothing from fabric to coloring have visual significations about social identity.

Keywords: social identity, clothing, fashion, visual expression, visual signification

Procedia PDF Downloads 591
4167 Machine Learning Analysis of Eating Disorders Risk, Physical Activity and Psychological Factors in Adolescents: A Community Sample Study

Authors: Marc Toutain, Pascale Leconte, Antoine Gauthier

Abstract:

Introduction: Eating Disorders (ED), such as anorexia, bulimia, and binge eating, are psychiatric illnesses that mostly affect young people. The main symptoms concern eating (restriction, excessive food intake) and weight control behaviors (laxatives, vomiting). Psychological comorbidities (depression, executive function disorders, etc.) and problematic behaviors toward physical activity (PA) are commonly associated with ED. Acquaintances on ED risk factors are still lacking, and more community sample studies are needed to improve prevention and early detection. To our knowledge, studies are needed to specifically investigate the link between ED risk level, PA, and psychological risk factors in a community sample of adolescents. The aim of this study is to assess the relation between ED risk level, exercise (type, frequency, and motivations for engaging in exercise), and psychological factors based on the Jacobi risk factors model. We suppose that a high risk of ED will be associated with the practice of high caloric cost PA, motivations oriented to weight and shape control, and psychological disturbances. Method: An online survey destined for students has been sent to several middle schools and colleges in northwest France. This survey combined several questionnaires, the Eating Attitude Test-26 assessing ED risk; the Exercise Motivation Inventory–2 assessing motivations toward PA; the Hospital Anxiety and Depression Scale assessing anxiety and depression, the Contour Drawing Rating Scale; and the Body Esteem Scale assessing body dissatisfaction, Rosenberg Self-esteem Scale assessing self-esteem, the Exercise Dependence Scale-Revised assessing PA dependence, the Multidimensional Assessment of Interoceptive Awareness assessing interoceptive awareness and the Frost Multidimensional Perfectionism Scale assessing perfectionism. Machine learning analysis will be performed in order to constitute groups with a tree-based model clustering method, extract risk profile(s) with a bootstrap method comparison, and predict ED risk with a prediction method based on a decision tree-based model. Expected results: 1044 complete records have already been collected, and the survey will be closed at the end of May 2022. Records will be analyzed with a clustering method and a bootstrap method in order to reveal risk profile(s). Furthermore, a predictive tree decision method will be done to extract an accurate predictive model of ED risk. This analysis will confirm typical main risk factors and will give more data on presumed strong risk factors such as exercise motivations and interoceptive deficit. Furthermore, it will enlighten particular risk profiles with a strong level of proof and greatly contribute to improving the early detection of ED and contribute to a better understanding of ED risk factors.

Keywords: eating disorders, risk factors, physical activity, machine learning

Procedia PDF Downloads 70
4166 Effect of Women`s Autonomy on Unmet Need for Contraception and Family Size in India

Authors: Anshita Sharma

Abstract:

India is one of the countries to initiate family planning with intention to control the growing population by reducing fertility. In effort to this, India had introduced the National family planning programme in 1952. The level of unmet need in India shows a reducing trend with increasing effectiveness of family planning services as in NFHS-1 the unmet need for limiting, spacing and total was 46 percent, 14 percent & 9 percent, respectively. The demand for spacing has reduced to at 8 percent, 8 percent for limiting and total unmet need was 16 percent in NFHS-2. The total unmet need has reduced to 13 percent in NFHS-3 for all currently married women and the demand for limiting and spacing is 7 percent and 6 percent respectively. The level of unmet need in India shows a reducing trend with increasing effectiveness of family planning services. Despite the progress, there is chunk of women who are deprived of controlling unintended and unwanted pregnancies. The present paper examines the socio-cultural and economic and demographic correlates of unmet need for contraception in India. It also examines the effect of women’s autonomy and unmet need for contraception on family size among different socio-economic groups of population. It uses data from national family health survey-3 carried out in 2005-06 and employs bi-variate techniques and multivariate techniques for analysis. The multiple regression analysis has done to seek the level and direction of relationship among various socio-economic and demographic factors. The result reveals that women with higher level of education and economic status have low level of unmet need for family planning. Women living in non-nuclear family have high unmet need for spacing and women living in nuclear family have high unmet need for limiting and family size is slightly higher of women of nuclear family. In India, the level of autonomy varies at different life point; usually women with higher age enjoy higher autonomy than their junior female member in the family. The finding shows that women with higher autonomy have large family size counter to women with low autonomy have low family size. Unmet need for family planning decrease with women’s increasing exposure to mass- media. The demographic factors like experience of child loss are directly related to family size. Women who experience higher child loss have low unmet need for spacing and limiting. Thus, It is established with the help that women’s autonomy status play substantial role in fulfilling demand of contraception for limiting and spacing which affect the family size.

Keywords: family size, socio-economic correlates, unmet need for limiting, unmet need for spacing, women`s autonomy

Procedia PDF Downloads 256
4165 Facade Design Impact on the Urban Landscape

Authors: Seyyed Hossein Alavi, Soudabe Mehri Talarposhti

Abstract:

Passages urban landscape is made up of various components that the component parts of the whole and vice versa has relationships. In today’s cities, we have not seen a dual relationship and only one side of the equation which is the relationships of the component parts are considered. However, the effect of the component to whole is stronger and also longer. This means that every time the outer shell of the building was constructed instant impact on the viewers while it takes a long time to understand the impact of the building in its environment and basically, it seems city portrait has the sensory and untouchable effect on observer. Today, building facades are designated individually and in isolation from the context. Designers are familiar with the details of the facade, but they are not informed with the science of combination and its impact on portrait. The importance of city and also more important than that, the city portrait haven’t confirmed for those involved in the building and authorities and the construction been changed to a market for more glaring taste of designers and attracting more business and the city and its landscape has been forgotten. This essay is an attempt to collect a part of the principles and definitions needed on perspective issues and portrait, and it is hoped that it will open arena for more research and studies in this field and other related fields.

Keywords: facade, urban housing, urban design, sustainable architecture

Procedia PDF Downloads 469
4164 Air Conditioning Variation of 1kW Open-Cathode Proton Exchange Membrane (PEM) Fuel Cell

Authors: Mohammad Syahirin Aisha, Khairul Imran Sainan

Abstract:

The PEM fuel cell is a device that generate electric by electrochemical reaction between hydrogen fuel and oxygen in the fuel cell stack. PEM fuel cell consists of an anode (hydrogen supply), a cathode (oxygen supply) and an electrolyte that allow charges move between the two positions of the fuel cell. The only product being developed after the reaction is water (H2O) and heat as the waste which does not emit greenhouse gasses. The performance of fuel cell affected by numerous parameters. This study is restricted to cathode parameters that affect fuel cell performance. At the anode side, the reactant is not going through any changes. Experiments with variation in air velocity (3m/s, 6m/s and 9m/s), temperature (10oC, 20oC, 35oC) and relative humidity (50%, 60%, and 70%) have been carried out. The experiments results are presented in the form of fuel cell stack power output over time, which demonstrate the impacts of the various air condition on the execution of the PEM fuel cell. In this study, the experimental analysis shows that with variation of air conditions, it gives different fuel cell performance behavior. The maximum power output of the experiment was measured at an ambient temperature of 25oC with relative humidity and 9m/s velocity of air.

Keywords: air-breathing PEM fuel cell, cathode side, performance, variation in air condition

Procedia PDF Downloads 446
4163 Networking the Biggest Challenge in Hybrid Cloud Deployment

Authors: Aishwarya Shekhar, Devesh Kumar Srivastava

Abstract:

Cloud computing has emerged as a promising direction for cost efficient and reliable service delivery across data communication networks. The dynamic location of service facilities and the virtualization of hardware and software elements are stressing the communication networks and protocols, especially when data centres are interconnected through the internet. Although the computing aspects of cloud technologies have been largely investigated, lower attention has been devoted to the networking services without involving IT operating overhead. Cloud computing has enabled elastic and transparent access to infrastructure services without involving IT operating overhead. Virtualization has been a key enabler for cloud computing. While resource virtualization and service abstraction have been widely investigated, networking in cloud remains a difficult puzzle. Even though network has significant role in facilitating hybrid cloud scenarios, it hasn't received much attention in research community until recently. We propose Network as a Service (NaaS), which forms the basis of unifying public and private clouds. In this paper, we identify various challenges in adoption of hybrid cloud. We discuss the design and implementation of a cloud platform.

Keywords: cloud computing, networking, infrastructure, hybrid cloud, open stack, naas

Procedia PDF Downloads 405
4162 Seismic Perimeter Surveillance System (Virtual Fence) for Threat Detection and Characterization Using Multiple ML Based Trained Models in Weighted Ensemble Voting

Authors: Vivek Mahadev, Manoj Kumar, Neelu Mathur, Brahm Dutt Pandey

Abstract:

Perimeter guarding and protection of critical installations require prompt intrusion detection and assessment to take effective countermeasures. Currently, visual and electronic surveillance are the primary methods used for perimeter guarding. These methods can be costly and complicated, requiring careful planning according to the location and terrain. Moreover, these methods often struggle to detect stealthy and camouflaged insurgents. The object of the present work is to devise a surveillance technique using seismic sensors that overcomes the limitations of existing systems. The aim is to improve intrusion detection, assessment, and characterization by utilizing seismic sensors. Most of the similar systems have only two types of intrusion detection capability viz., human or vehicle. In our work we could even categorize further to identify types of intrusion activity such as walking, running, group walking, fence jumping, tunnel digging and vehicular movements. A virtual fence of 60 meters at GCNEP, Bahadurgarh, Haryana, India, was created by installing four underground geophones at a distance of 15 meters each. The signals received from these geophones are then processed to find unique seismic signatures called features. Various feature optimization and selection methodologies, such as LightGBM, Boruta, Random Forest, Logistics, Recursive Feature Elimination, Chi-2 and Pearson Ratio were used to identify the best features for training the machine learning models. The trained models were developed using algorithms such as supervised support vector machine (SVM) classifier, kNN, Decision Tree, Logistic Regression, Naïve Bayes, and Artificial Neural Networks. These models were then used to predict the category of events, employing weighted ensemble voting to analyze and combine their results. The models were trained with 1940 training events and results were evaluated with 831 test events. It was observed that using the weighted ensemble voting increased the efficiency of predictions. In this study we successfully developed and deployed the virtual fence using geophones. Since these sensors are passive, do not radiate any energy and are installed underground, it is impossible for intruders to locate and nullify them. Their flexibility, quick and easy installation, low costs, hidden deployment and unattended surveillance make such systems especially suitable for critical installations and remote facilities with difficult terrain. This work demonstrates the potential of utilizing seismic sensors for creating better perimeter guarding and protection systems using multiple machine learning models in weighted ensemble voting. In this study the virtual fence achieved an intruder detection efficiency of over 97%.

Keywords: geophone, seismic perimeter surveillance, machine learning, weighted ensemble method

Procedia PDF Downloads 64
4161 Comparative Analysis of Ranunculus muricatus and Typha latifolia as Wetland Plants Applied for Domestic Wastewater Treatment in a Mesocosm Scale Study

Authors: Sadia Aziz, Mahwish Ali, Safia Ahmed

Abstract:

Comparing other methods of waste water treatment, constructed wetlands are one of the most fascinating practices because being a natural process they are eco-friendly have low construction and maintenance cost and have considerable capability of wastewater treatment. The current research was focused mainly on comparison of Ranunculus muricatus and Typha latifolia as wetland plants for domestic wastewater treatment by designing and constructing efficient pilot scale HSSF mesocosms. Parameters like COD, BOD5, PO4, SO4, NO3, NO2, and pathogenic indicator microbes were studied continuously with successive treatments. Treatment efficiency of the system increases with passage of time and with increase in temperature. Efficiency of T. latifolia planted setups in open environment was fairly good for parameters like COD and BOD5 which was showing up to 82.5% for COD and 82.6% for BOD5 while DO was increased up to 125%. Efficiency of R. muricatus vegetated setup was also good but lowers than that of T. latifolia planted showing 80.95% removal of COD and BOD5. Ranunculus muricatus was found effective in reducing bacterial count in wastewater. Both macrophytes were found promising in wastewater treatment.

Keywords: wastewater treatment, wetland, mesocosms study, wetland plants

Procedia PDF Downloads 295
4160 T-S Fuzzy Modeling Based on Power Coefficient Limit Nonlinearity Applied to an Isolated Single Machine Load Frequency Deviation Control

Authors: R. S. Sheu, H. Usman, M. S. Lawal

Abstract:

Takagi-Sugeno (T-S) fuzzy model based control of a load frequency deviation in a single machine with limit nonlinearity on power coefficient is presented in the paper. Two T-S fuzzy rules with only rotor angle variable as input in the premise part, and linear state space models in the consequent part involving characteristic matrices determined from limits set on the power coefficient constant are formulated, state feedback control gains for closed loop control was determined from the formulated Linear Matrix Inequality (LMI) with eigenvalue optimization scheme for asymptotic and exponential stability (speed of esponse). Numerical evaluation of the closed loop object was carried out in Matlab. Simulation results generated of both the open and closed loop system showed the effectiveness of the control scheme in maintaining load frequency stability.

Keywords: T-S fuzzy model, state feedback control, linear matrix inequality (LMI), frequency deviation control

Procedia PDF Downloads 379
4159 Automated Prediction of HIV-associated Cervical Cancer Patients Using Data Mining Techniques for Survival Analysis

Authors: O. J. Akinsola, Yinan Zheng, Rose Anorlu, F. T. Ogunsola, Lifang Hou, Robert Leo-Murphy

Abstract:

Cervical Cancer (CC) is the 2nd most common cancer among women living in low and middle-income countries, with no associated symptoms during formative periods. With the advancement and innovative medical research, there are numerous preventive measures being utilized, but the incidence of cervical cancer cannot be truncated with the application of only screening tests. The mortality associated with this invasive cervical cancer can be nipped in the bud through the important role of early-stage detection. This study research selected an array of different top features selection techniques which was aimed at developing a model that could validly diagnose the risk factors of cervical cancer. A retrospective clinic-based cohort study was conducted on 178 HIV-associated cervical cancer patients in Lagos University teaching Hospital, Nigeria (U54 data repository) in April 2022. The outcome measure was the automated prediction of the HIV-associated cervical cancer cases, while the predictor variables include: demographic information, reproductive history, birth control, sexual history, cervical cancer screening history for invasive cervical cancer. The proposed technique was assessed with R and Python programming software to produce the model by utilizing the classification algorithms for the detection and diagnosis of cervical cancer disease. Four machine learning classification algorithms used are: the machine learning model was split into training and testing dataset into ratio 80:20. The numerical features were also standardized while hyperparameter tuning was carried out on the machine learning to train and test the data. Logistic Regression (LR), Decision Tree (DT), Random Forest (RF), and K-Nearest Neighbor (KNN). Some fitting features were selected for the detection and diagnosis of cervical cancer diseases from selected characteristics in the dataset using the contribution of various selection methods for the classification cervical cancer into healthy or diseased status. The mean age of patients was 49.7±12.1 years, mean age at pregnancy was 23.3±5.5 years, mean age at first sexual experience was 19.4±3.2 years, while the mean BMI was 27.1±5.6 kg/m2. A larger percentage of the patients are Married (62.9%), while most of them have at least two sexual partners (72.5%). Age of patients (OR=1.065, p<0.001**), marital status (OR=0.375, p=0.011**), number of pregnancy live-births (OR=1.317, p=0.007**), and use of birth control pills (OR=0.291, p=0.015**) were found to be significantly associated with HIV-associated cervical cancer. On top ten 10 features (variables) considered in the analysis, RF claims the overall model performance, which include: accuracy of (72.0%), the precision of (84.6%), a recall of (84.6%) and F1-score of (74.0%) while LR has: an accuracy of (74.0%), precision of (70.0%), recall of (70.0%) and F1-score of (70.0%). The RF model identified 10 features predictive of developing cervical cancer. The age of patients was considered as the most important risk factor, followed by the number of pregnancy livebirths, marital status, and use of birth control pills, The study shows that data mining techniques could be used to identify women living with HIV at high risk of developing cervical cancer in Nigeria and other sub-Saharan African countries.

Keywords: associated cervical cancer, data mining, random forest, logistic regression

Procedia PDF Downloads 69
4158 Restoring, Revitalizing and Recovering Brazilian Rivers: Application of the Concept to Small Basins in the City of São Paulo, Brazil

Authors: Juliana C. Alencar, Monica Ferreira do Amaral Porto

Abstract:

Watercourses in Brazilian urban areas are constantly being degraded due to the unplanned use of the urban space; however, due to the different contexts of land use and occupation in the river watersheds, different intervention strategies are required to requalify them. When it comes to requalifying watercourses, we can list three main techniques to fulfill this purpose: restoration, revitalization and recovery; each one being indicated for specific contexts of land use and occupation in the basin. In this study, it was demonstrated that the application of these three techniques to three small basins in São Paulo city, listing the aspects involved in each of the contexts and techniques of requalification. For a protected watercourse within a forest park, renaturalization was proposed, where the watercourse is preserved in a state closer to the natural one. For a watercourse in an urban context that still preserves open spaces for its maintenance as a landscape element, an intervention was proposed following the principles of revitalization, integrating the watercourse with the landscape and the population. In the case of a watercourse in a harder context, only recovery was proposed, since the watercourse is found under the road system, which makes it difficult to integrate it into the landscape.

Keywords: sustainable drainage, river restoration, river revitalization, river recovery

Procedia PDF Downloads 144
4157 An Intelligence-Led Methodologly for Detecting Dark Actors in Human Trafficking Networks

Authors: Andrew D. Henshaw, James M. Austin

Abstract:

Introduction: Human trafficking is an increasingly serious transnational criminal enterprise and social security issue. Despite ongoing efforts to mitigate the phenomenon and a significant expansion of security scrutiny over past decades, it is not receding. This is true for many nations in Southeast Asia, widely recognized as the global hub for trafficked persons, including men, women, and children. Clearly, human trafficking is difficult to address because there are numerous drivers, causes, and motivators for it to persist, such as non-military and non-traditional security challenges, i.e., climate change, global warming displacement, and natural disasters. These make displaced persons and refugees particularly vulnerable. The issue is so large conservative estimates put a dollar value at around $150 billion-plus per year (Niethammer, 2020) spanning sexual slavery and exploitation, forced labor, construction, mining and in conflict roles, and forced marriages of girls and women. Coupled with corruption throughout military, police, and civil authorities around the world, and the active hands of powerful transnational criminal organizations, it is likely that such figures are grossly underestimated as human trafficking is misreported, under-detected, and deliberately obfuscated to protect those profiting from it. For example, the 2022 UN report on human trafficking shows a 56% reduction in convictions in that year alone (UNODC, 2022). Our Approach: To better understand this, our research utilizes a bespoke methodology. Applying a JAM (Juxtaposition Assessment Matrix), which we previously developed to detect flows of dark money around the globe (Henshaw, A & Austin, J, 2021), we now focus on the human trafficking paradigm. Indeed, utilizing a JAM methodology has identified key indicators of human trafficking not previously explored in depth. Being a set of structured analytical techniques that provide panoramic interpretations of the subject matter, this iteration of the JAM further incorporates behavioral and driver indicators, including the employment of Open-Source Artificial Intelligence (OS-AI) across multiple collection points. The extracted behavioral data was then applied to identify non-traditional indicators as they contribute to human trafficking. Furthermore, as the JAM OS-AI analyses data from the inverted position, i.e., the viewpoint of the traffickers, it examines the behavioral and physical traits required to succeed. This transposed examination of the requirements of success delivers potential leverage points for exploitation in the fight against human trafficking in a new and novel way. Findings: Our approach identified new innovative datasets that have previously been overlooked or, at best, undervalued. For example, the JAM OS-AI approach identified critical 'dark agent' lynchpins within human trafficking that are difficult to detect and harder to connect to actors and agents within a network. Our preliminary data suggests this is in part due to the fact that ‘dark agents’ in extant research have been difficult to detect and potentially much harder to directly connect to the actors and organizations in human trafficking networks. Our research demonstrates that using new investigative techniques such as OS-AI-aided JAM introduces a powerful toolset to increase understanding of human trafficking and transnational crime and illuminate networks that, to date, avoid global law enforcement scrutiny.

Keywords: human trafficking, open-source intelligence, transnational crime, human security, international human rights, intelligence analysis, JAM OS-AI, Dark Money

Procedia PDF Downloads 74
4156 Performance Optimization of Low-Cost Solar Dryer Using Modified PI Controller

Authors: Rajesh Kondareddy, Prakash Kumar Nayak, Maunash Das, Vrinatri Velentina Boro

Abstract:

Today, there is a huge global concern for sustainable development which would include minimizing the consumption of non-renewable energies without affecting the basic global economy. Solar drying is one of the important processes used for extending the shelf life of agricultural products. The performance of a low cost automated solar dryer fitted with cascade control scheme and modified PI controller for drying chilli was investigated. The dryer was composed of designed solar collector (air heater) fitted with cylindrical pipes to improve the air velocity and a solar drying chamber containing rack of two cheese cloth (net) trays both being integrated together. The air allowed in through air inlet is heated up in the solar collector and channelled through the drying chamber where it is utilized in drying (removing the moisture content from the food substance or agricultural produce loaded). Here, to maintain the temperature in the heating chambers and to improve performance, a modified PI (Proportional–Integral) controller was used due its simplicity and robustness. Drying time for drying chilli from the initial moisture content of 88.5% (wb) to 7.3% (wb) was estimated to be 14 hours in solar dryer whereas 32 h was observed in the open sun drying.

Keywords: cascade control, chilli, PI controller, solar dryer

Procedia PDF Downloads 277
4155 Identification and Classification of Medicinal Plants of Indian Himalayan Region Using Hyperspectral Remote Sensing and Machine Learning Techniques

Authors: Kishor Chandra Kandpal, Amit Kumar

Abstract:

The Indian Himalaya region harbours approximately 1748 plants of medicinal importance, and as per International Union for Conservation of Nature (IUCN), the 112 plant species among these are threatened and endangered. To ease the pressure on these plants, the government of India is encouraging its in-situ cultivation. The Saussurea costus, Valeriana jatamansi, and Picrorhiza kurroa have also been prioritized for large scale cultivation owing to their market demand, conservation value and medicinal properties. These species are found from 1000 m to 4000 m elevation ranges in the Indian Himalaya. Identification of these plants in the field requires taxonomic skills, which is one of the major bottleneck in the conservation and management of these plants. In recent years, Hyperspectral remote sensing techniques have been precisely used for the discrimination of plant species with the help of their unique spectral signatures. In this background, a spectral library of the above 03 medicinal plants was prepared by collecting the spectral data using a handheld spectroradiometer (325 to 1075 nm) from farmer’s fields of Himachal Pradesh and Uttarakhand states of Indian Himalaya. The Random forest (RF) model was implied on the spectral data for the classification of the medicinal plants. The 80:20 standard split ratio was followed for training and validation of the RF model, which resulted in training accuracy of 84.39 % (kappa coefficient = 0.72) and testing accuracy of 85.29 % (kappa coefficient = 0.77). This RF classifier has identified green (555 to 598 nm), red (605 nm), and near-infrared (725 to 840 nm) wavelength regions suitable for the discrimination of these species. The findings of this study have provided a technique for rapid and onsite identification of the above medicinal plants in the field. This will also be a key input for the classification of hyperspectral remote sensing images for mapping of these species in farmer’s field on a regional scale. This is a pioneer study in the Indian Himalaya region for medicinal plants in which the applicability of hyperspectral remote sensing has been explored.

Keywords: himalaya, hyperspectral remote sensing, machine learning; medicinal plants, random forests

Procedia PDF Downloads 191
4154 Teachers' Accessibility to and Utilization of Electronic Media for Teaching Basic Science and Technology in Ilorin Metropolis, Kwara, Nigeria

Authors: Taibat Busari

Abstract:

Electronic media has created new options for enhancing education. It has long been providing innovative methods for arousing students’ attention in learning and improves teachers’ performance in disseminating instructional contents. However, the advancement of electronic media has increased the flexibility, availability, accessibility and improved communications among students-students, students-teacher, and teacher-students. This study investigated: (i) teachers’ accessibility to, and utilization of electronic media for teaching basic science and technology in Ilorin metropolis; (ii) the influence of school proprietorship on teachers’ access to and utilization of electronic media for teaching and; the influence of teachers’ gender on the use of electronic media. The research was a descriptive design using the survey method. The study sample was drawn for private and public secondary schools in Ilorin Metropolis. The respondents were 285 basic science and technology teachers, which comprised of 146 males and 139 females. A structured researcher designed questionnaire was used to gather data for the study. Pilot study was carried out on mini sample of 20 basic science and technology teachers in five schools which are not part of the study’s population. It was then subjected to Cronbach’s Alpha and yielded the values 0.794 for availability, 0.730 for accessibility and 0.84 for utilization of electronic media. The research questions were answered using mean and percentage while research hypotheses one and two was tested using t- test. The findings of the study showed that: (i) electronic media are available for teaching basic science and technology; (ii) teachers’ had access to electronic media for teaching; (iii) teachers’ utilized electronic media for teaching basic science and technology; (iv) there was no significant difference between teachers’ utilization of electronic media for teaching; (v) there was no significant difference between teachers’ utilization of electronic media for teaching based on school proprietorship. The study, therefore, concluded that teachers’ had access to electronic media and utilized it for teaching purposes. Gender had no influence on teachers’ access to and utilization on electronic media for teaching and also, school proprietorship had no influence on access and utilization of electronic media for teaching. Based on findings it was recommended that electronic media should be made available and utilized in all schools across the nation to improve the learning rate of the students.

Keywords: electronic media, basic science and technology, teachers' accessibility, Nigeria

Procedia PDF Downloads 133
4153 Evaluation of Teaching Performance in Higher Education: From the Students' Responsibility to Their Evaluative Competence

Authors: Natacha Jesus-Silva, Carla S. Pereira, Natercia Durao, Maria Das Dores Formosinho, Cristina Costa-Lobo

Abstract:

Any assessment process, by its very nature, raises a wide range of doubts, uncertainties, and insecurities of all kinds. The evaluation process should be ethically irreproachable, treating each and every one of the evaluated according to a conduct that ensures that the process is fair, contributing to all recognize and feel well with the processes and results of the evaluation. This is a very important starting point and implies that positive and constructive conceptions and attitudes are developed regarding the evaluation of teaching performance, where students' responsibility is desired. It is not uncommon to find teachers feeling threatened at various levels, in particular as regards their autonomy and their professional dignity. Evaluation must be useful in that it should enable decisions to be taken to improve teacher performance, the quality of teaching or the learning climate of the school. This study is part of a research project whose main objective is to identify, select, evaluate and synthesize the available evidence on Quality Indicators in Higher Education. In this work, the 01 parameters resulting from pedagogical surveys in a Portuguese higher education institution in the north of the country will be presented, surveys for the 2015/2016 school year, presented to 1751 students, in a total of 11 degrees and 18 master's degrees. It has analyzed the evaluation made by students with respect to the performance of a group of 68 teachers working full time. This paper presents the lessons learned in the last three academic years, allowing for the identification of the effects on the following areas: teaching strategies and methodologies, capacity of systematization, learning climate, creation of conditions for active student participation. This paper describes the procedures resulting from the descriptive analysis (frequency analysis, descriptive measures and association measures) and inferential analysis (ANOVA one-way, MANOVA one-way, MANOVA two-way and correlation analysis).

Keywords: teaching performance, higher education, students responsibility, indicators of teaching management

Procedia PDF Downloads 263
4152 Improving Numeracy Standards for UK Pharmacy Students

Authors: Luke Taylor, Samantha J. Hall, Kenneth I. Cumming, Jakki Bardsley, Scott S. P. Wildman

Abstract:

Medway School of Pharmacy, as part of an Equality Diversity and Inclusivity (EDI) initiative run by the University of Kent, decided to take steps to try and negate disparities in numeracy competencies within students undertaking the Master of Pharmacy degree in order to combat a trend in pharmacy students’ numerical abilities upon entry. This included a research driven project 1) to identify if pharmacy students are aware of weaknesses in their numeracy capabilities, and 2) recognise where their numeracy skillset is lacking. In addition to gaining this student perspective, a number of actions have been implemented to support students in improving their numeracy competencies. Reflective and quantitative analysis has shown promising improvements for the final year cohort of 2014/15 when compared to previous years. The method of involving student feedback into the structure of numeracy teaching/support has proven to be extremely beneficial to both students and teaching staff alike. Students have felt empowered and in control of their own learning requirements, leading to increased engagement and attainment. School teaching staff have received quality data to help improve existing initiatives and to innovate further in the area of numeracy teaching. In light of the recognised improvements, further actions are currently being trialled in the area of numeracy support. This involves utilising Virtual Learning Environment platforms to provide individualised support as a supplement to the increased numeracy mentoring (staff and peer) provided to students. Mentors who provide group or one-to-one sessions are now given significant levels of training in dealing with situations that commonly arise from mentoring schemes. They are also provided with continued support throughout the life of their degree. Following results from this study, Medway School of Pharmacy hopes to drive increasing numeracy standards within Pharmacy (primarily through championing peer mentoring) as well as other healthcare professions including Midwifery and Nursing.

Keywords: attainment, ethnicity, numeracy, pharmacy, support

Procedia PDF Downloads 227
4151 Multi Cloud Storage Systems for Resource Constrained Mobile Devices: Comparison and Analysis

Authors: Rajeev Kumar Bedi, Jaswinder Singh, Sunil Kumar Gupta

Abstract:

Cloud storage is a model of online data storage where data is stored in virtualized pool of servers hosted by third parties (CSPs) and located in different geographical locations. Cloud storage revolutionized the way how users access their data online anywhere, anytime and using any device as a tablet, mobile, laptop, etc. A lot of issues as vendor lock-in, frequent service outage, data loss and performance related issues exist in single cloud storage systems. So to evade these issues, the concept of multi cloud storage introduced. There are a lot of multi cloud storage systems exists in the market for mobile devices. In this article, we are providing comparison of four multi cloud storage systems for mobile devices Otixo, Unclouded, Cloud Fuze, and Clouds and evaluate their performance on the basis of CPU usage, battery consumption, time consumption and data usage parameters on three mobile phones Nexus 5, Moto G and Nexus 7 tablet and using Wi-Fi network. Finally, open research challenges and future scope are discussed.

Keywords: cloud storage, multi cloud storage, vendor lock-in, mobile devices, mobile cloud computing

Procedia PDF Downloads 389
4150 Leveraging Information for Building Supply Chain Competitiveness

Authors: Deepika Joshi

Abstract:

Operations in automotive industry rely greatly on information shared between Supply Chain (SC) partners. This leads to efficient and effective management of SC activity. Automotive sector in India is growing at 14.2 percent per annum and has huge economic importance. We find that no study has been carried out on the role of information sharing in SC management of Indian automotive manufacturers. Considering this research gap, the present study is planned to establish the significance of information sharing in Indian auto-component supply chain activity. An empirical research was conducted for large scale auto component manufacturers from India. Twenty four Supply Chain Performance Indicators (SCPIs) were collected from existing literature. These elements belong to eight diverse but internally related areas of SC management viz., demand management, cost, technology, delivery, quality, flexibility, buyer-supplier relationship, and operational factors. A pair-wise comparison and an open ended questionnaire were designed using these twenty four SCPIs. The questionnaire was then administered among managerial level employees of twenty-five auto-component manufacturing firms. Analytic Network Process (ANP) technique was used to analyze the response of pair-wise questionnaire. Finally, twenty-five priority indexes are developed, one for each respondent. These were averaged to generate an industry specific priority index. The open-ended questions depicted strategies related to information sharing between buyers and suppliers and their influence on supply chain performance. Results show that the impact of information sharing on certain performance indicators is relatively greater than their corresponding variables. For example, flexibility, delivery, demand and cost related elements have massive impact on information sharing. Technology is relatively less influenced by information sharing but it immensely influence the quality of information shared. Responses obtained from managers reveal that timely and accurate information sharing lowers the cost, increases flexibility and on-time delivery of auto parts, therefore, enhancing the competitiveness of Indian automotive industry. Any flaw in dissemination of information can disturb the cycle time of both the parties and thus increases the opportunity cost. Due to supplier’s involvement in decisions related to design of auto parts, quality conformance is found to improve, leading to reduction in rejection rate. Similarly, mutual commitment to share right information at right time between all levels of SC enhances trust level. SC partners share information to perform comprehensive quality planning to ingrain total quality management. This study contributes to operations management literature which faces scarcity of empirical examination on this subject. It views information sharing as a building block which firms can promote and evolve to leverage the operational capability of all SC members. It will provide insights for Indian managers and researchers as every market is unique and suppliers and buyers are driven by local laws, industry status and future vision. While major emphasis in this paper is given to SC operations happening between domestic partners, placing more focus on international SC can bring in distinguished results.

Keywords: Indian auto component industry, information sharing, operations management, supply chain performance indicators

Procedia PDF Downloads 538
4149 A Brain Controlled Robotic Gait Trainer for Neurorehabilitation

Authors: Qazi Umer Jamil, Abubakr Siddique, Mubeen Ur Rehman, Nida Aziz, Mohsin I. Tiwana

Abstract:

This paper discusses a brain controlled robotic gait trainer for neurorehabilitation of Spinal Cord Injury (SCI) patients. Patients suffering from Spinal Cord Injuries (SCI) become unable to execute motion control of their lower proximities due to degeneration of spinal cord neurons. The presented approach can help SCI patients in neuro-rehabilitation training by directly translating patient motor imagery into walkers motion commands and thus bypassing spinal cord neurons completely. A non-invasive EEG based brain-computer interface is used for capturing patient neural activity. For signal processing and classification, an open source software (OpenVibe) is used. Classifiers categorize the patient motor imagery (MI) into a specific set of commands that are further translated into walker motion commands. The robotic walker also employs fall detection for ensuring safety of patient during gait training and can act as a support for SCI patients. The gait trainer is tested with subjects, and satisfactory results were achieved.

Keywords: brain computer interface (BCI), gait trainer, spinal cord injury (SCI), neurorehabilitation

Procedia PDF Downloads 144
4148 Discovery of Exoplanets in Kepler Data Using a Graphics Processing Unit Fast Folding Method and a Deep Learning Model

Authors: Kevin Wang, Jian Ge, Yinan Zhao, Kevin Willis

Abstract:

Kepler has discovered over 4000 exoplanets and candidates. However, current transit planet detection techniques based on the wavelet analysis and the Box Least Squares (BLS) algorithm have limited sensitivity in detecting minor planets with a low signal-to-noise ratio (SNR) and long periods with only 3-4 repeated signals over the mission lifetime of 4 years. This paper presents a novel precise-period transit signal detection methodology based on a new Graphics Processing Unit (GPU) Fast Folding algorithm in conjunction with a Convolutional Neural Network (CNN) to detect low SNR and/or long-period transit planet signals. A comparison with BLS is conducted on both simulated light curves and real data, demonstrating that the new method has higher speed, sensitivity, and reliability. For instance, the new system can detect transits with SNR as low as three while the performance of BLS drops off quickly around SNR of 7. Meanwhile, the GPU Fast Folding method folds light curves 25 times faster than BLS, a significant gain that allows exoplanet detection to occur at unprecedented period precision. This new method has been tested with all known transit signals with 100% confirmation. In addition, this new method has been successfully applied to the Kepler of Interest (KOI) data and identified a few new Earth-sized Ultra-short period (USP) exoplanet candidates and habitable planet candidates. The results highlight the promise for GPU Fast Folding as a replacement to the traditional BLS algorithm for finding small and/or long-period habitable and Earth-sized planet candidates in-transit data taken with Kepler and other space transit missions such as TESS(Transiting Exoplanet Survey Satellite) and PLATO(PLAnetary Transits and Oscillations of stars).

Keywords: algorithms, astronomy data analysis, deep learning, exoplanet detection methods, small planets, habitable planets, transit photometry

Procedia PDF Downloads 205
4147 Choice of Landscape Elements for Residents' Quality of Life Living in Apartment Housing: Case Study of Bhopal, India

Authors: Ankita Srivastava, Yogesh K. Garg

Abstract:

Housing provides comforts and well being leading towards the quality of life. Earlier research had established that landscape elements enhance the residents’ quality of life through its significant experiences occur due to their presence in the housing. This paper tries to identify the preference of landscape elements that enhance residents’ quality of life living in the apartment. Hence, landscape elements that can be planned in the open spaces of housing and quality of life components were identified from the secondary data sources. Experts’ were asked to identify the quality of life components with respect to landscape elements. A questionnaire survey of residents’ living in the apartment housing in Bhopal, India was conducted. The statistical analysis of survey data facilitated to explore the preference of landscape elements for the quality of life in the apartment housing. The final ranking compiled from the experts’ opinion, residents’ perception as well as factor analysis results to have an insight of the preference of landscape elements for the quality of life living in the apartment. Preference of landscape elements present in the paper may provide an overview of planning for apartment housing that may be used by architects, planners and developers for enhancing residents’ quality of life.

Keywords: landscape elements, quality of life, residents, housing

Procedia PDF Downloads 241
4146 Role of Consultancy in Engineering Education

Authors: V. Nalina, P. Jayarekha

Abstract:

Consultancy by an engineering faculty member of an institution undertakes consulting assignments to provide professional or technical solutions to specific fields. Consulting is providing an opportunity for the engineering faculty to share their insights for the real world problems. It is a dynamic learning process with respect to students and faculty as it increases the teaching and research activities. In this paper, we discuss the need for consultancy in engineering education with faculty contribution towards consultancy and advantages of consultancy to institutions. Balance the workload of the faculty consulting with the responsibilities of academics defined by the universities.

Keywords: consultancy, academic consulting, engineering consultancy, faculty consulting

Procedia PDF Downloads 429
4145 Controlling Dimensions and Shape of Carbon Nanotubes Using Nanoporous Anodic Alumina under Different Conditions

Authors: Amine Mezni, Merfat Algethami, Ali Aldalbahi, Arwa Alrooqi, Abel Santos, Dusan Losic, Sarah Alharthi, Tariq Altalhi

Abstract:

In situ synthesis of carbon nanotubes featuring different diameters (10-200 nm), lengths (1 to 100 µm) and periodically nanostructured shape was performed in a custom designed chemical vapor deposition (CVD) system using nanoporous anodic alumina (NAA) under different conditions. The morphology of the resulting CNTs/NAA composites and free-standing CNTs were analyzed by transmission electron microscopy (TEM) and scanning electron microscopy (SEM). The results confirm that highly ordered arrays of CNTs with precise control of nanotube dimensions in the range 20-200 nm with tube length in the range < 1 µm to > 100 μm and with periodically shaped morphology can be fabricated using nanostructured NAA templates prepared by anodization. This technique allows us to obtain tubes open at one / both ends with a uniform diameter along the pore length without using any metal catalyst. Our finding suggests that this fabrication strategy for designing new CNTs membranes and structures can be significant for emerging applications as molecular separation/transport, optical biosensing, and drug delivery.

Keywords: carbon nanotubes, CVD approach, composites membrane, nanoporous anodic alumina

Procedia PDF Downloads 266