Search results for: food systems
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 12240

Search results for: food systems

4980 Impact of Different Rearing Diets on the Performance of Adult Mealworms Tenebrio molitor

Authors: Caroline Provost, Francois Dumont

Abstract:

Production of insects for human and animal consumption is an increasingly important activity in Canada. Protein production is more efficient and less harmful to the environment using insect rearing compared to the impact of traditional livestock, poultry and fish farms. Insects are rich in essential amino acids, essential fatty acids and trace elements. Thus, insect-based products could be used as a food supplement for livestock and domestic animals and may even find their way into the diets of high performing athletes or fine dining. Nevertheless, several parameters remain to be determined to ensure efficient and profitable production that meet the potential of these sectors. This project proposes to improve the production processes, rearing diets and processing methods for three species with valuable gastronomic and nutritional potential: the common mealworms (Tenebrio molitor), the small mealworm (Alphitobius diaperinus), and the giant mealworm (Zophobas morio). The general objective of the project is to acquire specific knowledge for mass rearing of insects dedicated to animal and human consumption in order to respond to current market opportunities and meet a growing demand for these products. Mass rearing of the three species of mealworm was produced to provide the individuals needed for the experiments. Mealworms eat flour from different cereals (e.g. wheat, barley, buckwheat). These cereals vary in their composition (protein, carbohydrates, fiber, vitamins, antioxidant, etc.), but also in their purchase cost. Seven different diets were compared to optimize the yield of the rearing. Diets were composed of cereal flour (e.g. wheat, barley) and were either mixed or left alone. Female fecundity, larvae mortality and growing curves were observed. Some flour diets have positive effects on female fecundity and larvae performance while each mealworm was found to have specific diet requirements. Trade-offs between mealworm performance and costs need to be considered. Experiments on the effect of flour composition on several parameters related to performance and nutritional and gastronomic value led to the identification of a more appropriate diet for each mealworm.

Keywords: mass rearing, mealworm, human consumption, diet

Procedia PDF Downloads 133
4979 Oxidovanadium(IV) and Dioxidovanadium(V) Complexes: Efficient Catalyst for Peroxidase Mimetic Activity and Oxidation

Authors: Mannar R. Maurya, Bithika Sarkar, Fernando Avecilla

Abstract:

Peroxidase activity is possibly successfully used for different industrial processes in medicine, chemical industry, food processing and agriculture. However, they bear some intrinsic drawback associated with denaturation by proteases, their special storage requisite and cost factor also. Now a day’s artificial enzyme mimics are becoming a research interest because of their significant applications over conventional organic enzymes for ease of their preparation, low price and good stability in activity and overcome the drawbacks of natural enzymes e.g serine proteases. At present, a large number of artificial enzymes have been synthesized by assimilating a catalytic center into a variety of schiff base complexes, ligand-anchoring, supramolecular complexes, hematin, porphyrin, nanoparticles to mimic natural enzymes. Although in recent years a several number of vanadium complexes have been reported by a continuing increase in interest in bioinorganic chemistry. To our best of knowledge, the investigation of artificial enzyme mimics of vanadium complexes is very less explored. Recently, our group has reported synthetic vanadium schiff base complexes capable of mimicking peroxidases. Herein, we have synthesized monoidovanadium(IV) and dioxidovanadium(V) complexes of pyrazoleone derivateis ( extensively studied on account of their broad range of pharmacological appication). All these complexes are characterized by various spectroscopic techniques like FT-IR, UV-Visible, NMR (1H, 13C and 51V), Elemental analysis, thermal studies and single crystal analysis. The peroxidase mimic activity has been studied towards oxidation of pyrogallol to purpurogallin with hydrogen peroxide at pH 7 followed by measuring kinetic parameters. The Michaelis-Menten behavior shows an excellent catalytic activity over its natural counterparts, e.g. V-HPO and HRP. The obtained kinetic parameters (Vmax, Kcat) were also compared with peroxidase and haloperoxidase enzymes making it a promising mimic of peroxidase catalyst. Also, the catalytic activity has been studied towards the oxidation of 1-phenylethanol in presence of H2O2 as an oxidant. Various parameters such as amount of catalyst and oxidant, reaction time, reaction temperature and solvent have been taken into consideration to get maximum oxidative products of 1-phenylethanol.

Keywords: oxovanadium(IV)/dioxidovanadium(V) complexes, NMR spectroscopy, Crystal structure, peroxidase mimic activity towards oxidation of pyrogallol, Oxidation of 1-phenylethanol

Procedia PDF Downloads 324
4978 Ultra-Low Chromatic Dispersion, Low Confinement Loss, and Low Nonlinear Effects Index-Guiding Photonic Crystal Fiber

Authors: S. Olyaee, M. Seifouri, A. Nikoosohbat, M. Shams Esfand Abadi

Abstract:

Photonic Crystal Fibers (PCFs) can be used in optical communications as transmission lines. For this reason, the PCFs with low confinement loss, low chromatic dispersion, and low nonlinear effects are highly suitable transmission media. In this paper, we introduce a new design of index-guiding photonic crystal fiber (IG-PCF) with ultra-low chromatic dispersion, low nonlinearity effects, and low confinement loss. Relatively low dispersion is achieved in the wavelength range of 1200 to 1600 nm using the proposed design. According to the new structure of IG-PCF presented in this study, the chromatic dispersion slope is -30(ps/km.nm) and the confinement loss reaches below 10-7 dB/km. While in the wavelength range mentioned above at the same time an effective area of more than 50.2μm2 is obtained.

Keywords: optical communication systems, index-guiding, dispersion, confinement loss, photonic crystal fiber

Procedia PDF Downloads 595
4977 Impacts on Regional Economy by the Upgrade of Railway Infrastructure

Authors: Dimitrios J. Dimitriou, Maria F. Sartzetaki

Abstract:

Transport is often the key driver for growth, especially for regions providing key opportunities for connectivity between busy areas and mature markets. Even though the benefits of transports are essential, limited research is published regarding the linkage of inland transport systems and other business sectors, the spillover effects on regional economy and the overall contribution to regional development. This paper deals with the determination of the key socioeconomic benefits on regions caused by the upgrade and the modernization of a railway corridor. The analysis framework is following a four-step analysis, providing key messages to planners, managers and decision makers. The provided case study is the upgrade of the railway corridor in North Greece, which is a very sensitive region suffering long time from economic stress. The application results are essential for comparisons with other destinations and provide key messages regarding the relationship of railway and economic development.

Keywords: regional development, economic impact assessment variables, railway infrastructure, strategic planning

Procedia PDF Downloads 287
4976 A New Design Methodology for Partially Reconfigurable Systems-on-Chip

Authors: Roukaya Dalbouchi, Abdelkrin Zitouni

Abstract:

In this paper, we propose a novel design methodology for Dynamic Partial Reconfigurable (DPR) system. This type of system has the property of being able to be modified after its design and during its execution. The suggested design methodology is generic in terms of granularity, number of modules, and reconfigurable region and suitable for any type of modern application. It is based on the interconnection between several design stages. The recommended methodology represents a guide for the design of DPR architectures that meet compromise reconfiguration/performance. To validate the proposed methodology, we use as an application a video watermarking. The comparison result shows that the proposed methodology supports all stages of DPR architecture design and characterized by a high abstraction level. It provides a dynamic/partial reconfigurable architecture; it guarantees material efficiency, the flexibility of reconfiguration, and superior performance in terms of frequency and power consumption.

Keywords: dynamically reconfigurable system, block matching algorithm, partial reconfiguration, motion vectors, video watermarking

Procedia PDF Downloads 81
4975 Binarization and Recognition of Characters from Historical Degraded Documents

Authors: Bency Jacob, S.B. Waykar

Abstract:

Degradations in historical document images appear due to aging of the documents. It is very difficult to understand and retrieve text from badly degraded documents as there is variation between the document foreground and background. Thresholding of such document images either result in broken characters or detection of false texts. Numerous algorithms exist that can separate text and background efficiently in the textual regions of the document; but portions of background are mistaken as text in areas that hardly contain any text. This paper presents a way to overcome these problems by a robust binarization technique that recovers the text from a severely degraded document images and thereby increases the accuracy of optical character recognition systems. The proposed document recovery algorithm efficiently removes degradations from document images. Here we are using the ostus method ,local thresholding and global thresholding and after the binarization training and recognizing the characters in the degraded documents.

Keywords: binarization, denoising, global thresholding, local thresholding, thresholding

Procedia PDF Downloads 332
4974 Static and Dynamic Analysis of Timoshenko Microcantilever Using the Finite Element Method

Authors: Mohammad Tahmasebipour, Hosein Salarpour

Abstract:

Micro cantilevers are one of the components used in the manufacture of micro-electromechanical systems. Epoxy microcantilevers have a variety of applications in the manufacture of micro-sensors and micro-actuators. In this paper, the Timoshenko Micro cantilever was statically and dynamically analyzed using the finite element method. First, all boundary conditions and initial conditions governing micro cantilevers were considered. The effect of size on the deflection, angle of rotation, natural frequencies, and mode shapes were then analyzed and evaluated under different frequencies. It was observed that an increased micro cantilever thickness reduces the deflection, rotation, and resonant frequency. A good agreement was observed between our results and those obtained by the couple stress theory, the classical theory, and the strain gradient elasticity theory.

Keywords: microcantilever, microsensor; epoxy, dynamic behavior, static behavior, finite element method

Procedia PDF Downloads 404
4973 Loss of Control Eating as a Key Factor of the Psychological Symptomatology Related to Childhood Obesity

Authors: L. Beltran, S. Solano, T. Lacruz, M. Blanco, M. Rojo, M. Graell, A. R. Sepulveda

Abstract:

Introduction and Objective: Given the difficulties of assessing Binge Eating Disorder during childhood, episodes of Loss of Control (LOC) eating can be a key symptom. The objective is to know the prevalence of food psychopathology depending on the type of evaluation and find out which psychological characteristics differentiate overweight or obese children who present LOC from those who do not. Material and Methods: 170 children from 8 to 12 years of age with overweight or obesity (P > 85) were evaluated through the Primary Care Centers of Madrid. Sociodemographic data and psychological measures were collected through the Kiddie-Schedule for Affective Disorders & Schizophrenia, Present & Lifetime Version (K-SADS-PL) diagnostic interview and self-applied questionnaires: Children's eating attitudes (ChEAT), depressive symptomatology (CDI), anxiety (STAIC), general self-esteem (LAWSEQ), body self-esteem (BES), perceived teasing (POTS) and perfectionism (CAPS). Results: 15.2% of the sample exceeded the ChEAT cut-off point, presenting a risk of pathological eating; 5.88% presented an Eating Disorder through the diagnostic interview (2.35% Binge Eating disorder), and 33.53% had LOC episodes. No relationship was found between the presence of LOC and clinical diagnosis of eating disorders according to DSM-V; however, the group with LOC presented a higher risk of eating psychopathology using the ChEAT (p < .02). Significant differences were found in the group with LOC (p < .02): higher z-BMI, lower body self-esteem, greater anxious symptomatology, greater frequency of teasing towards weight, and greater effect of teasing both towards weight and competitions; compared to their peers without LOC. Conclusion: According to previous studies in samples with overweight children, in this Spanish sample of children with obesity, we found a prevalence of moderate eating disorder and a high presence of LOC episodes, which is related to both eating and general psychopathology. These findings confirm that the exclusion of LOC episodes as a diagnostic criterion can underestimate the presence of eating psychopathology during this developmental stage. According to these results, it is highly recommended to promote school context programs that approach LOC episodes in order to reduce associated symptoms. This study is included in a Project funded by the Ministry of Innovation and Science (PSI2011-23127).

Keywords: childhood obesity, eating psychopathology, loss-of-control eating, psychological symptomatology

Procedia PDF Downloads 92
4972 Low Nonlinear Effects Index-Guiding Nanostructured Photonic Crystal Fiber

Authors: S. Olyaee, M. Seifouri, A. Nikoosohbat, M. Shams Esfand Abadi

Abstract:

Photonic Crystal Fibers (PCFs) can be used in optical communications as transmission lines. For this reason, the PCFs with low confinement loss, low chromatic dispersion, and low nonlinear effects are highly suitable transmission media. In this paper, we introduce a new design of index-guiding nanostructured photonic crystal fiber (IG-NPCF) with ultra-low chromatic dispersion, low nonlinearity effects, and low confinement loss. Relatively low dispersion is achieved in the wavelength range of 1200 to 1600nm using the proposed design. According to the new structure of nanostructured PCF presented in this study, the chromatic dispersion slope is -30(ps/km.nm) and the confinement loss reaches below 10-7 dB/km. While in the wavelength range mentioned above at the same time an effective area of more than 50.2μm2 is obtained.

Keywords: optical communication systems, nanostructured, index-guiding, dispersion, confinement loss, photonic crystal fiber

Procedia PDF Downloads 546
4971 Laboratory Diagnostic Testing of Peste des Petits Ruminants in Georgia

Authors: Nino G. Vepkhvadze, Tea Enukidze

Abstract:

Every year the number of countries around the world face the risk of the spread of infectious diseases that bring significant ecological and social-economic damage. Hence, the importance of food product safety is emphasized that is the issue of interest for many countries. To solve them, it’s necessary to conduct preventive measures against the diseases, have accurate diagnostic results, leadership, and management. The Peste des petits ruminants (PPR) disease is caused by a morbillivirus closely related to the rinderpest virus. PPR is a transboundary disease as it emerges and evolves, considered as one of the top most damaging animal diseases. The disease imposed a serious threat to sheep-breeding when the farms of sheep, goats are significantly growing within the country. In January 2016, PPR was detected in Georgia. Up to present the origin of the virus, the age relationship of affected ruminants and the distribution of PPRV in Georgia remains unclear. Due to the nature of PPR, and breeding practices in the country, reemerging of the disease in Georgia is highly likely. The purpose of the studies is to provide laboratories with efficient tools allowing the early detection of PPR emergence and re-emergences. This study is being accomplished under the Biological Threat Reduction Program project with the support of the Defense Threat Reduction Agency (DTRA). The purpose of the studies is to investigate the samples and identify areas at high risk of the disease. Georgia has a high density of small ruminant herds bred as free-ranging, close to international borders. Kakheti region, Eastern Georgia, will be considered as area of high priority for PPR surveillance. For this reason, in 2019, in Kakheti region investigated n=484 sheep and goat serum and blood samples from the same animals, utilized serology and molecular biology methods. All samples were negative by RT-PCR, and n=6 sheep samples were seropositive by ELISA-Ab. Future efforts will be concentrated in areas where the risk of PPR might be high such as international bordering regions of Georgia. For diagnostics, it is important to integrate the PPRV knowledge with epidemiological data. Based on these diagnostics, the relevant agencies will be able to control the disease surveillance.

Keywords: animal disease, especially dangerous pathogen, laboratory diagnostics, virus

Procedia PDF Downloads 105
4970 Solar Architecture of Low-Energy Buildings for Industrial Applications

Authors: P. Brinks, O. Kornadt, R. Oly

Abstract:

This research focuses on the optimization of glazed surfaces and the assessment of possible solar gains in industrial buildings. Existing window rating methods for single windows were evaluated and a new method for a simple analysis of energy gains and losses by single windows was introduced. Furthermore extensive transient building simulations were carried out to appraise the performance of low cost polycarbonate multi-cell sheets in interaction with typical buildings for industrial applications. Mainly, energy-saving potential was determined by optimizing the orientation and area of such glazing systems in dependency on their thermal qualities. Moreover the impact on critical aspects such as summer overheating and daylight illumination was considered to ensure the user comfort and avoid additional energy demand for lighting or cooling. Hereby the simulated heating demand could be reduced by up to 1/3 compared to traditional architecture of industrial halls using mainly skylights.

Keywords: solar architecture, Passive Solar Building Design, glazing, Low-Energy Buildings, industrial buildings

Procedia PDF Downloads 225
4969 Optimization of a Combined Ejector-Vapor Compression Refrigeration Systems with R134a

Authors: Ilhem Ouelhazi, Mouna Elakhdar, Lakdar Kairouani

Abstract:

A computer simulation model for a combined ejector-vapor compression cycle that uses working fluid R134a. A refrigeration system was developed which combines a basic vapor compression refrigeration cycle with an ejector cooling cycle. A one-dimensional mathematical model was developed using the equations governing the flow and thermodynamics based on the constant area ejector flow model. The effects of the operating parameters on the cooling capacity, the performance coefficient, and the entrainment ratio are studied. The current model is based on the NIST-REFPROP database for refrigerants properties calculations. The simulated performance is compared with the available experimental data from the literature for validation.

Keywords: combined refrigeration cycle, constant area ejector, R134a, ejector-cooling cycle, performance, mathematical simulation, vapor compression cycle

Procedia PDF Downloads 210
4968 Real-Time Image Encryption Using a 3D Discrete Dual Chaotic Cipher

Authors: M. F. Haroun, T. A. Gulliver

Abstract:

In this paper, an encryption algorithm is proposed for real-time image encryption. The scheme employs a dual chaotic generator based on a three dimensional (3D) discrete Lorenz attractor. Encryption is achieved using non-autonomous modulation where the data is injected into the dynamics of the master chaotic generator. The second generator is used to permute the dynamics of the master generator using the same approach. Since the data stream can be regarded as a random source, the resulting permutations of the generator dynamics greatly increase the security of the transmitted signal. In addition, a technique is proposed to mitigate the error propagation due to the finite precision arithmetic of digital hardware. In particular, truncation and rounding errors are eliminated by employing an integer representation of the data which can easily be implemented. The simple hardware architecture of the algorithm makes it suitable for secure real-time applications.

Keywords: chaotic systems, image encryption, non-autonomous modulation, FPGA

Procedia PDF Downloads 495
4967 Preparing Young Adults with Disabilities for Lifelong Inclusivity through a College Level Mentor Program Using Technology: An Exploratory Study

Authors: Jenn Gallup, Onur Kocaoz, Onder Islek

Abstract:

In their pursuit of postsecondary transitions, individuals with disabilities tend to experience, academic, behavioral, and emotional challenges to a greater extent than their typically developing peers. These challenges result in lower rates of graduation, employment, independent living, and participation in college than their peers without disabilities. The lack of friendships and support systems has had a negative impact on those with a disability transitioning to postsecondary settings to include, employment, independent living, and university settings. Establishing friendships and support systems early on is an indicator of potential success and persistence in postsecondary education, employment, and independent living for typically developing college students. It is evident that a deficit in friendships and supports is a key deficit also for individuals with disabilities. To address the specific needs of this group, a mentor program was developed for a transition program held at the university for youth aged 18-21. Pre-service teachers enrolled in the special education program engaged with youth in the transition program in a variety of activities on campus. The mentorship program had two purposes: to assist young adults with disabilities who were transitioning to a workforce setting to help increase social skills, self-advocacy, supports and friendships, and confidence; and to give their peers without disabilities who were enrolled in a secondary special education course as a pre-service teacher the experience of interacting with and forming friendships with peers who had a disability for the purposes of career development. Additionally, according to researchers mobile technology has created a virtual world of equality and opportunity for a large segment of the population that was once marginalized due to physical and cognitive impairments. All of the participants had access to smart phones; therefore, technology was explored during this study to determine if it could be used as a compensatory tool to allow the young adults with disabilities to do things that otherwise would have been difficult because of their disabilities. Additionally, all participants were asked to incorporate technology such as smart phones to communicate beyond the activities, collaborate using virtual platform games which would support and promote social skills, soft-skills, socialization, and relationships. The findings of this study confirmed that a peer mentorship program that harnessed the power of technology supported outcomes specific to young adults with and without disabilities. Mobile technology and virtual game-based platforms, were identified as a significant contributor to personal, academic, and career growth for both groups. The technology encouraged friendships, provided an avenue for rich social interactions, and increased soft-skills. Results will be shared along with the development of the program and potential implications to the field.

Keywords: career outcomes, mentorship, soft-skills, technology, transition

Procedia PDF Downloads 147
4966 Synthesis of Cationic Bleach Activator for Textile Industry

Authors: Pelin Altay, Ahmed El-Shafei, Peter J. Hauser, Nevin Cigdem Gursoy

Abstract:

Exceedingly high temperatures are used (around 95 °C) to perform hydrogen peroxide bleaching of cotton fabrics in textile industry, which results in high energy consumption and also gives rise to significant fiber damage. Activated bleach systems have the potential to produce more efficient bleaching through increased oxidation rates with reducing energy cost, saving time and causing less fiber damage as compared to conventional hot peroxide bleaching. In this study, a cationic bleach activator was synthesized using caprolactam as a leaving group and triethylamine as a cationic group to establish an activated peroxide system for low temperature bleaching. Cationic bleach activator was characterized by FTIR, 1H NMR and mass spectrometry. The bleaching performance of the prototype cationic bleach activator was evaluated and optimizing the bleach recipe was performed.

Keywords: bleach activator, cotton bleaching, hydrogen peroxide bleaching, low temperature bleaching

Procedia PDF Downloads 249
4965 The Study of Security Techniques on Information System for Decision Making

Authors: Tejinder Singh

Abstract:

Information system is the flow of data from different levels to different directions for decision making and data operations in information system (IS). Data can be violated by different manner like manual or technical errors, data tampering or loss of integrity. Security system called firewall of IS is effected by such type of violations. The flow of data among various levels of Information System is done by networking system. The flow of data on network is in form of packets or frames. To protect these packets from unauthorized access, virus attacks, and to maintain the integrity level, network security is an important factor. To protect the data to get pirated, various security techniques are used. This paper represents the various security techniques and signifies different harmful attacks with the help of detailed data analysis. This paper will be beneficial for the organizations to make the system more secure, effective, and beneficial for future decisions making.

Keywords: information systems, data integrity, TCP/IP network, vulnerability, decision, data

Procedia PDF Downloads 286
4964 Single Cell Rna Sequencing Operating from Benchside to Bedside: An Interesting Entry into Translational Genomics

Authors: Leo Nnamdi Ozurumba-Dwight

Abstract:

Single-cell genomic analytical systems have proved to be a platform to isolate bulk cells into selected single cells for genomic, proteomic, and related metabolomic studies. This is enabling systematic investigations of the level of heterogeneity in a diverse and wide pool of cell populations. Single cell technologies, embracing techniques such as high parameter flow cytometry, single-cell sequencing, and high-resolution images are playing vital roles in these investigations on messenger ribonucleic acid (mRNA) molecules and related gene expressions in tracking the nature and course of disease conditions. This entails targeted molecular investigations on unit cells that help us understand cell behavoiur and expressions, which can be examined for their health implications on the health state of patients. One of the vital good sides of single-cell RNA sequencing (scRNA seq) is its probing capacity to detect deranged or abnormal cell populations present within homogenously perceived pooled cells, which would have evaded cursory screening on the pooled cell populations of biological samples obtained as part of diagnostic procedures. Despite conduction of just single-cell transcriptome analysis, scRNAseq now permits comparison of the transcriptome of the individual cells, which can be evaluated for gene expressional patterns that depict areas of heterogeneity with pharmaceutical drug discovery and clinical treatment applications. It is vital to strictly work through the tools of investigations from wet lab to bioinformatics and computational tooled analyses. In the precise steps for scRNAseq, it is critical to do thorough and effective isolation of viable single cells from the tissues of interest using dependable techniques (such as FACS) before proceeding to lysis, as this enhances the appropriate picking of quality mRNA molecules for subsequent sequencing (such as by the use of Polymerase Chain Reaction machine). Interestingly, scRNAseq can be deployed to analyze various types of biological samples such as embryos, nervous systems, tumour cells, stem cells, lymphocytes, and haematopoietic cells. In haematopoietic cells, it can be used to stratify acute myeloid leukemia patterns in patients, sorting them out into cohorts that enable re-modeling of treatment regimens based on stratified presentations. In immunotherapy, it can furnish specialist clinician-immunologist with tools to re-model treatment for each patient, an attribute of precision medicine. Finally, the good predictive attribute of scRNAseq can help reduce the cost of treatment for patients, thus attracting more patients who would have otherwise been discouraged from seeking quality clinical consultation help due to perceived high cost. This is a positive paradigm shift for patients’ attitudes primed towards seeking treatment.

Keywords: immunotherapy, transcriptome, re-modeling, mRNA, scRNA-seq

Procedia PDF Downloads 161
4963 The Use of Bituminaria bituminosa (L.) Stirton and Microbial Biotechnologies for Restoration of Degraded Pastoral Lands: The Case of the Middle Atlas of Morocco

Authors: O. Zennouhi, M. El Mderssa, J. Ibijbijen, E. Bouiamrine, L. Nassiri

Abstract:

Rangelands and silvopastoral systems of the middle Atlas are under a heavy pressure, which led to pasture degradation, invasion by non-palatable and toxic species and edaphic aridification due to the regression of the global vegetation cover. In this situation, the introduction of multipurpose leguminous shrubs, such as Bituminaria bituminosa (L.) Stirton, commonly known as bituminous clover, could be a promising socio-ecological alternative for the rehabilitation of these degraded areas. The application of biofertilizers like plant growth promoting rhizobacteria especially phosphate solubilizing bacteria (PSB) can ensure a successful installation of this plant in the selected degraded areas. The main objective of the present work is to produce well-inoculated seedlings using the best efficient PSB strains in the greenhouse to increase their ability to resist to environmental constraints once transplanted to the field in the central Middle Atlas.

Keywords: biofertilizers, bituminaria bituminosa, phosphate solubilizing bacteria, rehabilitation

Procedia PDF Downloads 134
4962 Analysis of the Aquifer Vulnerability of a Miopliocene Arid Area Using Drastic and SI Models

Authors: H. Majour, L. Djabri

Abstract:

Many methods in the groundwater vulnerability have been developed in the world (methods like PRAST, DRIST, APRON/ARAA, PRASTCHIM, GOD). In this study, our choice dealt with two recent complementary methods using category mapping of index with weighting criteria (Point County Systems Model MSCP) namely the standard DRASTIC method and SI (Susceptibility Index). At present, these two methods are the most used for the mapping of the intrinsic vulnerability of groundwater. Two classes of groundwater vulnerability in the Biskra sandy aquifer were identified by the DRASTIC method (average and high) and the SI method (very high and high). Integrated analysis has revealed that the high class is predominant for the DRASTIC method whereas for that of SI the preponderance is for the very high class. Furthermore, we notice that the method SI estimates better the vulnerability for the pollution in nitrates, with a rate of 85 % between the concentrations in nitrates of groundwater and the various established classes of vulnerability, against 75 % for the DRASTIC method. By including the land use parameter, the SI method produced more realistic results.

Keywords: DRASTIC, SI, GIS, Biskra sandy aquifer, Algeria

Procedia PDF Downloads 470
4961 Numerical Computation of Sturm-Liouville Problem with Robin Boundary Condition

Authors: Theddeus T. Akano, Omotayo A. Fakinlede

Abstract:

The modelling of physical phenomena, such as the earth’s free oscillations, the vibration of strings, the interaction of atomic particles, or the steady state flow in a bar give rise to Sturm-Liouville (SL) eigenvalue problems. The boundary applications of some systems like the convection-diffusion equation, electromagnetic and heat transfer problems requires the combination of Dirichlet and Neumann boundary conditions. Hence, the incorporation of Robin boundary condition in the analyses of Sturm-Liouville problem. This paper deals with the computation of the eigenvalues and eigenfunction of generalized Sturm-Liouville problems with Robin boundary condition using the finite element method. Numerical solutions of classical Sturm–Liouville problems are presented. The results show an agreement with the exact solution. High results precision is achieved with higher number of elements.

Keywords: Sturm-Liouville problem, Robin boundary condition, finite element method, eigenvalue problems

Procedia PDF Downloads 347
4960 Bipolar Impulse Noise Removal and Edge Preservation in Color Images and Video Using Improved Kuwahara Filter

Authors: Reji Thankachan, Varsha PS

Abstract:

Both image capturing devices and human visual systems are nonlinear. Hence nonlinear filtering methods outperforms its linear counterpart in many applications. Linear methods are unable to remove impulsive noise in images by preserving its edges and fine details. In addition, linear algorithms are unable to remove signal dependent or multiplicative noise in images. This paper presents an approach to denoise and smoothen the Bipolar impulse noised images and videos using improved Kuwahara filter. It involves a 2 stage algorithm which includes a noise detection followed by filtering. Numerous simulation demonstrate that proposed method outperforms the existing method by eliminating the painting like flattening effect along the local feature direction while preserving edge with improvement in PSNR and MSE.

Keywords: bipolar impulse noise, Kuwahara, PSNR MSE, PDF

Procedia PDF Downloads 483
4959 Modal Analysis for Optimal Location of Doubly Fed Induction-Generator-Based Wind Farms for Reduction of Small Signal Oscillation

Authors: Meet Patel, Darshan Patel, Nilay Shah

Abstract:

Excess growth of wind-based renewable energy sources is required to identify the optimal location and damping capacity of doubly fed induction-generator-based (DFIG) wind farms while it penetrates into the transmission network. In this analysis, various ratings of DFIG wind farms are penetrated into the Single Machine Infinite Bus (SMIB ) at a different distance of the transmission line. On the basis of detailed examinations, a prime position is evaluated to maximize the stability of overall systems. A damping controller is designed at an optimum location to mitigate the small oscillations. The proposed model was validated using eigenvalue analysis, calculation of the participation factor, and time-domain simulation.

Keywords: DFIG, small signal stability, eigenvalues, time domain simulation

Procedia PDF Downloads 95
4958 Modelling the Education Supply Chain with Network Data Envelopment Analysis

Authors: Sourour Ramzi, Claudia Sarrico

Abstract:

Little has been done on network DEA in education, and nobody has attempted to model the whole education supply chain using network DEA. As such the contribution of the present paper is to propose a model for measuring the efficiency of education supply chains using network DEA. First, we use a general survey of data envelopment analysis (DEA) to establish the emergent themes for research in DEA, and focus on the theme of Network DEA. Second, we use a survey on two-stage DEA models, and Network DEA to write a state of the art on Network DEA, particularly applied to supply chain management. Third, we use a survey on DEA applications to establish the most influential papers on DEA education applications, in order to establish the state of the art on applications of DEA in education, in general, and applications of DEA to education using network DEA, in particular. Finally, we propose a model for measuring the performance of education supply chains of different education systems (countries or states within a country, for instance). We then use this model on some empirical data.

Keywords: supply chain, education, data envelopment analysis, network DEA

Procedia PDF Downloads 354
4957 Integrating Blockchain and Internet of Things Platforms: An Empirical Study on Immunization Cold Chain

Authors: Fawzia Abujalala, Asma Elmangoush, Majdi Ashibani

Abstract:

The adoption of Blockchain technology introduces the possibility to decentralize cold chain systems. This adaptation enhances them to be more efficient, accessible, verifiable, and data security. Additionally, the Internet of Things (IoT) concept is considered as an added-value to various application domains. Cargo tracking and cold chain are a few to name. However, the security of the IoT transactions and integrated devices remains one of the key challenges to the IoT application’s success. Consequently, Blockchain technology and its consensus protocols have been used to solve many information security problems. In this paper, the researchers discussed the advantages of integrating Blockchain technology into IoT platform to improve security and provide an overview of existing literature on integrating Blockchain and IoT platforms. Then, presented the immunization cold chain solution as a use-case that could apply to any critical goods based on integrating hyperledger fabric platform and IoT platform.

Keywords: blockchain, hyperledger fabric, internet of things, security, traceability

Procedia PDF Downloads 132
4956 Optimization of Synergism Extraction of Toxic Metals (Lead, Copper) from Chlorides Solutions with Mixture of Cationic and Solvating Extractants

Authors: F. Hassaine-Sadi, S. Chelouaou

Abstract:

In recent years, environmental contamination by toxic metals such as Pb, Cu, Ni, Zn ... has become a worldwide crucial problem, particularly in some areas where the population depends on groundwater for drinking daily consumption. Thus, the sources of metal ions come from the metal manufacturing industry, fertilizers, batteries, paints, pigments and so on. Solvent extraction of metal ions has given an important role in the development of metal purification processes such as the synergistic extraction of some divalent cations metals ( M²⁺), the ions metals from various sources. This work consists of a water purification technique that involves the lead and copper systems: Pb²⁺, H₃O+, Cl⁻ and Cu²⁺, H₃O⁺, Cl⁻ for diluted solutions by a mixture of tri-n-octylphosphine oxide (TOPO) or Tri-n-butylphosphate(TBP) and di (2-ethyl hexyl) phosphoric acid (HDEHP) dissolved in kerosene. The study of the fundamental parameters influencing the extraction synergism: cation exchange/extraction solvent have been examined.

Keywords: synergistic extraction, lead, copper, environment

Procedia PDF Downloads 427
4955 Forthcoming Big Data on Smart Buildings and Cities: An Experimental Study on Correlations among Urban Data

Authors: Yu-Mi Song, Sung-Ah Kim, Dongyoun Shin

Abstract:

Cities are complex systems of diverse and inter-tangled activities. These activities and their complex interrelationships create diverse urban phenomena. And such urban phenomena have considerable influences on the lives of citizens. This research aimed to develop a method to reveal the causes and effects among diverse urban elements in order to enable better understanding of urban activities and, therefrom, to make better urban planning strategies. Specifically, this study was conducted to solve a data-recommendation problem found on a Korean public data homepage. First, a correlation analysis was conducted to find the correlations among random urban data. Then, based on the results of that correlation analysis, the weighted data network of each urban data was provided to people. It is expected that the weights of urban data thereby obtained will provide us with insights into cities and show us how diverse urban activities influence each other and induce feedback.

Keywords: big data, machine learning, ontology model, urban data model

Procedia PDF Downloads 397
4954 Machine Translation Analysis of Chinese Dish Names

Authors: Xinyu Zhang, Olga Torres-Hostench

Abstract:

This article presents a comparative study evaluating and comparing the quality of machine translation (MT) output of Chinese gastronomy nomenclature. Chinese gastronomic culture is experiencing an increased international acknowledgment nowadays. The nomenclature of Chinese gastronomy not only reflects a specific aspect of culture, but it is related to other areas of society such as philosophy, traditional medicine, etc. Chinese dish names are composed of several types of cultural references, such as ingredients, colors, flavors, culinary techniques, cooking utensils, toponyms, anthroponyms, metaphors, historical tales, among others. These cultural references act as one of the biggest difficulties in translation, in which the use of translation techniques is usually required. Regarding the lack of Chinese food-related translation studies, especially in Chinese-Spanish translation, and the current massive use of MT, the quality of the MT output of Chinese dish names is questioned. Fifty Chinese dish names with different types of cultural components were selected in order to complete this study. First, all of these dish names were translated by three different MT tools (Google Translate, Baidu Translate and Bing Translator). Second, a questionnaire was designed and completed by 12 Chinese online users (Chinese graduates of a Hispanic Philology major) in order to find out user preferences regarding the collected MT output. Finally, human translation techniques were observed and analyzed to identify what translation techniques would be observed more often in the preferred MT proposals. The result reveals that the MT output of the Chinese gastronomy nomenclature is not of high quality. It would be recommended not to trust the MT in occasions like restaurant menus, TV culinary shows, etc. However, the MT output could be used as an aid for tourists to have a general idea of a dish (the main ingredients, for example). Literal translation turned out to be the most observed technique, followed by borrowing, generalization and adaptation, while amplification, particularization and transposition were infrequently observed. Possibly because that the MT engines at present are limited to relate equivalent terms and offer literal translations without taking into account the whole context meaning of the dish name, which is essential to the application of those less observed techniques. This could give insight into the post-editing of the Chinese dish name translation. By observing and analyzing translation techniques in the proposals of the machine translators, the post-editors could better decide which techniques to apply in each case so as to correct mistakes and improve the quality of the translation.

Keywords: Chinese dish names, cultural references, machine translation, translation techniques

Procedia PDF Downloads 123
4953 Causes, Consequences, and Alternative Strategies of Illegal Migration in Ethiopia: The Case of Tigray Region

Authors: Muuz Abraha Meshesha

Abstract:

Illegal Migration, specifically Trafficking in person is one of the primary issues of the day affecting all states of the world with variation on the extent of the root causes and consequences that led people to migrate irregularly and the consequences it is costing on humanity. This paper intends to investigate the root causes and consequences of illegal migration in Ethiopia’s Tigray Regional state and come up with alternative intervening strategy. To come up with pertinent and robust research finding, this study employed mixed research approach involving qualitative and quantitative data in line with purposive and snow ball sampling selection technique. The study revealed that, though poverty is the most commonly sensed pushing factor for people to illegally migrate, the issue of psycho-social orientation and attitudinal immersion of the local community for illegal migration, both in thinking and action is the most pressing problem that urges serious intervention. Trafficking in persons and Illegal migration in general, is becoming the norm of the day in the study area that overtly reveal illegal migration is an issue beyond livelihood securing demand in practice. Basically, parties engaged in illegal migration and the accomplice with human traffickers these days in the study area are found to be more than urgency for food security and a need to escape from livelihood impoverishment. Therefore, this study come up with a new paradigm insight indicating that illegal migration is believed by the local community members as an optional path way of doing business in illegal way while the attitude of the community and officials authorized to regulate is being part of the channel or to the least tolerant of this grave global danger. The study also found that the effect of illegal migration is significantly manifested in long run than in short term periods. Therefore, a need for critical consideration on attitudinal based intervention and youth oriented and enforceable legal and policy framework accountability framework is required to face and control illegal migration by international, national, local stakeholders. Besides this, economy based development interventions that could engage and reorient the youth, as primary victims of trafficking, and expansion of large scale projects that can employ large number of youths at a time.

Keywords: human traficking, illegal migration, migration, tigray region

Procedia PDF Downloads 47
4952 Disintegration of Deuterons by Photons Reaction Model for GEANT4 with Dibaryon Formalism

Authors: Jae Won Shin, Chang Ho Hyun

Abstract:

A disintegration of deuterons by photons (dγ → np) reaction model for GEANT4 is developed in this work. An effective field theory with dibaryon fields Introducing a dibaryon field, we can take into account the effective range contribution to the propagator up to infinite order, and it consequently makes the convergence of the theory better than the pionless effective field theory without dibaryon fields. We develop a hadronic model for GEANT4 which is specialized for the disintegration of the deuteron by photons, dγ → np. For the description of two-nucleon interactions, we employ an effective field theory so called pionless theory with dibaryon fields (dEFT). In spite of its simplicity, the theory has proven very effective and useful in the applications to various two-nucleon systems and processes at low energies. We apply the new model of GEANT4 (G4dEFT) to the calculation of total and differential cross sections in dγ → np, and obtain good agreements to experimental data for a wide range of incoming photon energies.

Keywords: dγ → np, dibaryon fields, effective field theory, GEANT4

Procedia PDF Downloads 358
4951 Secure Transmission Scheme in Device-to-Device Multicast Communications

Authors: Bangwon Seo

Abstract:

In this paper, we consider multicast device-to-device (D2D) direct communication systems in cellular networks. In multicast D2D communications, nearby mobile devices exchanges, their data directly without going through a base station and a D2D transmitter send its data to multiple D2D receivers that compose of D2D multicast group. We consider wiretap channel where there is an eavesdropper that attempts to overhear the transmitted data of the D2D transmitter. In this paper, we propose a secure transmission scheme in D2D multicast communications in cellular networks. In order to prevent the eavesdropper from overhearing the transmitted data of the D2D transmitter, a precoding vector is employed at the D2D transmitter in the proposed scheme. We perform computer simulations to evaluate the performance of the proposed scheme. Through the simulation, we show that the secrecy rate performance can be improved by selecting an appropriate precoding vector.

Keywords: device-to-device communications, wiretap channel, secure transmission, precoding

Procedia PDF Downloads 275