Search results for: generic protocol
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1407

Search results for: generic protocol

687 Routing Protocol in Ship Dynamic Positioning Based on WSN Clustering Data Fusion System

Authors: Zhou Mo, Dennis Chow

Abstract:

In the dynamic positioning system (DPS) for vessels, the reliable information transmission between each note basically relies on the wireless protocols. From the perspective of cluster-based routing protocols for wireless sensor networks, the data fusion technology based on the sleep scheduling mechanism and remaining energy in network layer is proposed, which applies the sleep scheduling mechanism to the routing protocols, considering the remaining energy of node and location information when selecting cluster-head. The problem of uneven distribution of nodes in each cluster is solved by the Equilibrium. At the same time, Classified Forwarding Mechanism as well as Redelivery Policy strategy is adopted to avoid congestion in the transmission of huge amount of data, reduce the delay in data delivery and enhance the real-time response. In this paper, a simulation test is conducted to improve the routing protocols, which turn out to reduce the energy consumption of nodes and increase the efficiency of data delivery.

Keywords: DPS for vessel, wireless sensor network, data fusion, routing protocols

Procedia PDF Downloads 512
686 A Coupled Model for Two-Phase Simulation of a Heavy Water Pressure Vessel Reactor

Authors: D. Ramajo, S. Corzo, M. Nigro

Abstract:

A Multi-dimensional computational fluid dynamics (CFD) two-phase model was developed with the aim to simulate the in-core coolant circuit of a pressurized heavy water reactor (PHWR) of a commercial nuclear power plant (NPP). Due to the fact that this PHWR is a Reactor Pressure Vessel type (RPV), three-dimensional (3D) detailed modelling of the large reservoirs of the RPV (the upper and lower plenums and the downcomer) were coupled with an in-house finite volume one-dimensional (1D) code in order to model the 451 coolant channels housing the nuclear fuel. Regarding the 1D code, suitable empirical correlations for taking into account the in-channel distributed (friction losses) and concentrated (spacer grids, inlet and outlet throttles) pressure losses were used. A local power distribution at each one of the coolant channels was also taken into account. The heat transfer between the coolant and the surrounding moderator was accurately calculated using a two-dimensional theoretical model. The implementation of subcooled boiling and condensation models in the 1D code along with the use of functions for representing the thermal and dynamic properties of the coolant and moderator (heavy water) allow to have estimations of the in-core steam generation under nominal flow conditions for a generic fission power distribution. The in-core mass flow distribution results for steady state nominal conditions are in agreement with the expected from design, thus getting a first assessment of the coupled 1/3D model. Results for nominal condition were compared with those obtained with a previous 1/3D single-phase model getting more realistic temperature patterns, also allowing visualize low values of void fraction inside the upper plenum. It must be mentioned that the current results were obtained by imposing prescribed fission power functions from literature. Therefore, results are showed with the aim of point out the potentiality of the developed model.

Keywords: PHWR, CFD, thermo-hydraulic, two-phase flow

Procedia PDF Downloads 463
685 Research on Routing Protocol in Ship Dynamic Positioning Based on WSN Clustering Data Fusion System

Authors: Zhou Mo, Dennis Chow

Abstract:

In the dynamic positioning system (DPS) for vessels, the reliable information transmission between each note basically relies on the wireless protocols. From the perspective of cluster-based routing pro-tocols for wireless sensor networks, the data fusion technology based on the sleep scheduling mechanism and remaining energy in network layer is proposed, which applies the sleep scheduling mechanism to the routing protocols, considering the remaining energy of node and location information when selecting cluster-head. The problem of uneven distribution of nodes in each cluster is solved by the Equilibrium. At the same time, Classified Forwarding Mechanism as well as Redelivery Policy strategy is adopted to avoid congestion in the transmission of huge amount of data, reduce the delay in data delivery and enhance the real-time response. In this paper, a simulation test is conducted to improve the routing protocols, which turns out to reduce the energy consumption of nodes and increase the efficiency of data delivery.

Keywords: DPS for vessel, wireless sensor network, data fusion, routing protocols

Procedia PDF Downloads 440
684 Fluorometric Aptasensor: Evaluation of Stability and Comparison to Standard Enzyme-Linked Immunosorbent Assay

Authors: J. Carlos Kuri, Varun Vij, Raymond J. Turner, Orly Yadid-Pecht

Abstract:

Celiac disease (CD) is an immune system disorder that is triggered by ingesting gluten. As a gluten-free (GF) diet has become a concern of many people for health reasons, a gold standard had to be nominated. Enzyme-linked immunosorbent assay (ELISA) has taken the seat of this role. However, multiple limitations were discovered, and with that, the desire for an alternative method now exists. Nucleic acid-based aptamers have become of great interest due to their selectivity, specificity, simplicity, and rapid-testing advantages. However, fluorescence-based aptasensors have been tagged as unstable, but lifespan details are rarely stated. In this work, the lifespan stability of a fluorescence-based aptasensor is shown over an 8-week-long study displaying the accuracy of the sensor and false negatives. This study follows 22 different samples, including GF and gluten-rich (GR) and soy sauce products, off-the-shelf products, and reference material from laboratories, giving a total of 836 tests. The analysis shows an accuracy of correctly classifying GF and GR products of 96.30% and 100%, respectively when the protocol is augmented with molecular sieves. The overall accuracy remains around 94% within the first four weeks and then decays to 63%.

Keywords: aptasensor, PEG, rGO, FAM, RM, ELISA

Procedia PDF Downloads 116
683 A Platform for Managing Residents' Carbon Trajectories Based on the City Intelligent Model (CIM) 4.0

Authors: Chen Xi, Liu Xuebing, Lao Xuerui, Kuan Sinman, Jiang Yike, Wang Hanwei, Yang Xiaolang, Zhou Junjie, Xie Jinpeng

Abstract:

Climate change is a global problem facing humanity and this is now the consensus of the mainstream scientific community. In accordance with the carbon peak and carbon neutral targets and visions set out in the United Nations Framework Convention on Climate Change, the Kyoto Protocol and the Paris Agreement, this project uses the City Intelligent Model (CIM) and Artificial Intelligence Machine Vision (ICR) as the core technologies to accurately quantify low carbon behaviour into green corn, which is a means of guiding ecologically sustainable living patterns. Using individual communities as management units and blockchain as a guarantee of fairness in the whole cycle of green currency circulation, the project will form a modern resident carbon track management system based on the principle of enhancing the ecological resilience of communities and the cohesiveness of community residents, ultimately forming an ecologically sustainable smart village that can be self-organised and managed.

Keywords: urban planning, urban governance, CIM, artificial Intelligence, sustainable development

Procedia PDF Downloads 73
682 Molecular Screening of Piroplasm from Ticks Collected from Sialkot, Gujranwala and Gujarat Districts of Punjab, Pakistan

Authors: Mahvish Maqbool, Muhmmad Sohail Sajid

Abstract:

Ticks (Acari: Ixodidae); bloodsucking parasites of domestic animals, have significant importance in the transmission of diseases and causing huge economic losses. This study aimed to screen endophilic ticks for the Piroplasms using polymerase chain reaction in three districts Sialkot, Gujranwala and Gujarat of Punjab, Pakistan. Ticks were dissected under a stereomicroscope, and internal organs (midguts& salivary glands) were procured to generate pools of optimum weights. DNA extraction was done through standard protocol followed by primer specific PCR for Piroplasma spp. A total of 22.95% tick pools were found positive for piroplasma spp. In districts, Sialkot and Gujranwala Piroplasma prevalence are higher in riverine animals while in Gujarat Prevalence is higher in non-riverine animals. Female animals were found more prone to piroplasma as compared to males. This study will provide useful data on the distribution of Piroplasma in the vector population of the study area and devise future recommendations for better management of ruminants to avoid subclinical and clinical infections and vector transmitted diseases.

Keywords: babesia, hyalomma, piroplasmposis, tick infectivity

Procedia PDF Downloads 161
681 Zero Energy Buildings in Hot-Humid Tropical Climates: Boundaries of the Energy Optimization Grey Zone

Authors: Nakul V. Naphade, Sandra G. L. Persiani, Yew Wah Wong, Pramod S. Kamath, Avinash H. Anantharam, Hui Ling Aw, Yann Grynberg

Abstract:

Achieving zero-energy targets in existing buildings is known to be a difficult task requiring important cuts in the building energy consumption, which in many cases clash with the functional necessities of the building wherever the on-site energy generation is unable to match the overall energy consumption. Between the building’s consumption optimization limit and the energy, target stretches a case-specific optimization grey zone, which requires tailored intervention and enhanced user’s commitment. In the view of the future adoption of more stringent energy-efficiency targets in the context of hot-humid tropical climates, this study aims to define the energy optimization grey zone by assessing the energy-efficiency limit in the state-of-the-art typical mid- and high-rise full AC office buildings, through the integration of currently available technologies. Energy models of two code-compliant generic office-building typologies were developed as a baseline, a 20-storey ‘high-rise’ and a 7-storey ‘mid-rise’. Design iterations carried out on the energy models with advanced market ready technologies in lighting, envelope, plug load management and ACMV systems and controls, lead to a representative energy model of the current maximum technical potential. The simulations showed that ZEB targets could be achieved in fully AC buildings under an average of seven floors only by compromising on energy-intense facilities (as full AC, unlimited power-supply, standard user behaviour, etc.). This paper argues that drastic changes must be made in tropical buildings to span the energy optimization grey zone and achieve zero energy. Fully air-conditioned areas must be rethought, while smart technologies must be integrated with an aggressive involvement and motivation of the users to synchronize with the new system’s energy savings goal.

Keywords: energy simulation, office building, tropical climate, zero energy buildings

Procedia PDF Downloads 171
680 Paraplegic Dimensions of Asymmetric Warfare: A Strategic Analysis for Resilience Policy Plan

Authors: Sehrish Qayyum

Abstract:

In this age of constant technology, asymmetrical warfare could not be won. Attuned psychometric study confirms that screaming sometimes is more productive than active retaliation against strong adversaries. Asymmetric warfare is a game of nerves and thoughts with least vigorous participation for large anticipated losses. It creates the condition of paraplegia with partial but permanent immobility, which effects the core warfare operations, being screams rather than active retaliation. When one’s own power is doubted, it gives power to one’s own doubt to ruin all planning either done with superlative cost-benefit analysis. Strategically calculated estimation of asymmetric warfare since the early WWI to WWII, WWII-to Cold War, and then to the current era in three chronological periods exposits that courage makes nations win the battle of warriors to battle of comrades. Asymmetric warfare has been most difficult to fight and survive due to unexpectedness and being lethal despite preparations. Thoughts before action may be the best-assumed strategy to mix Regional Security Complex Theory and OODA loop to develop the Paraplegic Resilience Policy Plan (PRPP) to win asymmetric warfare. PRPP may serve to control and halt the ongoing wave of terrorism, guerilla warfare, and insurgencies, etc. PRPP, along with a strategic work plan, is based on psychometric analysis to deal with any possible war condition and tactic to save millions of innocent lives such that lost in Christchurch New Zealand in 2019, November 2015 Paris attacks, and Berlin market attacks in 2016, etc. Getting tangled into self-imposed epistemic dilemmas results in regret that becomes the only option of performance. It is a descriptive psychometric analysis of war conditions with generic application of probability tests to find the best possible options and conditions to develop PRPP for any adverse condition possible so far. Innovation in technology begets innovation in planning and action-plan to serve as a rheostat approach to deal with asymmetric warfare.

Keywords: asymmetric warfare, psychometric analysis, PRPP, security

Procedia PDF Downloads 125
679 Public Wi-Fi Security Threat Evil Twin Attack Detection Based on Signal Variant and Hop Count

Authors: Said Abdul Ahad Ahadi, Elyas Baray, Nitin Rakesh, Sudeep Varshney

Abstract:

Wi-Fi is a widely used internet source that is used to provide internet access in many areas such as Stores, Cafes, University campuses, Restaurants and so on. This technology brought more facilities in communication and networking. On the other hand, due to the transmission of data over the air, which makes the network vulnerable, so it becomes prone to various threats such as Evil Twin and etc. The Evil Twin is a kind of adversary which impersonates a legitimate access point (LAP) as it can happen by spoofing the name (SSID) and MAC address (BSSID) of a legitimate access point (LAP). And this attack can cause many threats such as MITM, Service Interruption, Access point service blocking. Various Evil Twin Attack Detection Techniques are proposed, but they require additional hardware, or they require protocol modification. In this paper, we proposed a new technique based on Access Point’s two fingerprints, Received Signal Strength Indicator (RSSI) and Hop Count, that is hard to copy by an adversary. And we implemented the technique in a system called “ETDetector,” which can detect and prevent the attack.

Keywords: evil twin, LAP, SSID, Wi-Fi security, signal variation, ETAD, kali linux, scapy, python

Procedia PDF Downloads 134
678 Analysis of the Use of a NAO Robot to Improve Social Skills in Children with Autism Spectrum Disorder in Saudi Arabia

Authors: Eman Alarfaj, Hissah Alabdullatif, Huda Alabdullatif, Ghazal Albakri, Nor Shahriza Abdul Karim

Abstract:

Autism Spectrum Disorder is extensively spread amid children; it affects their social, communication and interactive skills. As robotics technology has been proven to be a significant helpful utility those able individuals to overcome their disabilities. Robotic technology is used in ASD therapy. The purpose of this research is to show how Nao robots can improve the social skills for children who suffer from autism in Saudi Arabia by interacting with the autistic child and perform a number of tasks. The objective of this research is to identify, implement, and test the effectiveness of the module for interacting with ASD children in an autism center in Saudi Arabia. The methodology in this study followed the ten layers of protocol that needs to be followed during any human-robot interaction. Also, in order to elicit the scenario module, TEACCH Autism Program was adopted. Six different qualified interaction modules have been elicited and designed in this study; the robot will be programmed to perform these modules in a series of controlled interaction sessions with the Autistic children to enhance their social skills.

Keywords: humanoid robot Nao, ASD, human-robot interaction, social skills

Procedia PDF Downloads 254
677 Application of Liquid Chromatographic Method for the in vitro Determination of Gastric and Intestinal Stability of Pure Andrographolide in the Extract of Andrographis paniculata

Authors: Vijay R. Patil, Sathiyanarayanan Lohidasan, K. R. Mahadik

Abstract:

Gastrointestinal stability of andrographolide was evaluated in vitro in simulated gastric (SGF) and intestinal (SIF) fluids using a validated HPLC-PDA method. The method was validated using a 5μm ThermoHypersil GOLD C18column (250 mm × 4.0 mm) and mobile phase consisting of water: acetonitrile; 70: 30 (v/v) delivered isocratically at a flow rate of 1 mL/min with UV detection at 228 nm. Andrographolide in pure form and extract Andrographis paniculata was incubated at 37°C in an incubator shaker in USP simulated gastric and intestinal fluids with and without enzymes. Systematic protocol as per FDA Guidance System was followed for stability study and samples were assayed at 0, 15, 30 and 60 min intervals for gastric and at 0, 15, 30, 60 min, 1, 2 and 3 h for intestinal stability study. Also, the stability study was performed up to 24 h to see the degradation pattern in SGF and SIF (with enzyme and without enzyme). The developed method was found to be accurate, precise and robust. Andrographolide was found to be stable in SGF (pH ∼ 1.2) for 1h and SIF (pH 6.8) up to 3 h. The relative difference (RD) of amount of drug added and found at all time points was found to be < 3%. The present study suggests that drug loss in the gastrointestinal tract takes place may be by membrane permeation rather than a degradation process.

Keywords: andrographolide, Andrographis paniculata, in vitro, stability, gastric, Intestinal HPLC-PDA

Procedia PDF Downloads 236
676 Biological Activity of Mesenchymal Stem Cells in the Surface of Implants

Authors: Saimir Heta, Ilma Robo, Dhimiter Papakozma, Eduart Kapaj, Vera Ostreni

Abstract:

Introduction: The biocompatible materials applied to the implant surfaces are the target of recent literature studies. Methodologies: Modification of implant surfaces in different ways such as application of additional ions, surface microstructure change, surface or laser ultrasound alteration, or application of various substances such as recombinant proteins are among the most affected by articles published in the literature. The study is of review type with the main aim of finding the different ways that the mesenchymal cell reaction to these materials is, according to the literature, in the same percentage positive to the osteointegration process. Results: It is emphasized in the literature that implant success as a key evaluation key has more to implement implant treatment protocol ranging from dental health amenity and subsequent of the choice of implant type depending on the alveolar shape of the ridge level. Conclusions: Osteointegration is a procedure that should initially be physiologically independent of the type of implant pile material. With this physiological process, it can not "boast" for implant success or implantation depending on the brand of the selected implant, as the breadth of synthetic or natural materials that promote osteointegration is relatively large.

Keywords: mesenchymal cells, implants, review, biocompatible materials

Procedia PDF Downloads 75
675 Examining E-learning Capability in Chinese Higher Education: A Case Study of Hong Kong

Authors: Elson Szeto

Abstract:

Over the past 15 years, digital technology has ubiquitously penetrated societies around the world. New values of e-learning are emerging in the preparation of future talents, while e-learning is a key driver of widening participation and knowledge transfer in Chinese higher education. As a vibrant, Chinese society in Asia, Hong Kong’s new generation university students, perhaps the digital natives, have been learning with e-learning since their basic education. They can acquire new knowledge with the use of different forms of e-learning as a generic competence. These students who embrace this competence further their study journeys in higher education. This project reviews the Government’s policy of Information Technology in Education which has largely put forward since 1998. So far, primary to secondary education has embraced advantages of e-learning capability to advance the learning of different subject knowledge. Yet, e-learning capacity in higher education is yet to be fully examined in Hong Kong. The study reported in this paper is a pilot investigation into e-learning capacity in Chinese higher education in the region. By conducting a qualitative case study of Hong Kong, the investigation focuses on (1) the institutional ICT settings in general; (2) the pedagogic responses to e-learning in specific; and (3) the university students’ satisfaction of e-learning. It is imperative to revisit the e-learning capacity for promoting effective learning amongst university students, supporting new knowledge acquisition and embracing new opportunities in the 21st century. As a pilot case study, data will be collected from individual interviews with the e-learning management team members of a university, teachers who use e-learning for teaching and students who attend courses comprised of e-learning components. The findings show the e-learning capacity of the university and the key components of leveraging e-learning capability as a university-wide learning settings. The findings will inform institutions’ senior management, enabling them to effectively enhance institutional e-learning capacity for effective learning and teaching and new knowledge acquisition. Policymakers will be aware of new potentials of e-learning for the preparation of future talents in this society at large.

Keywords: capability, e-learning, higher education, student learning

Procedia PDF Downloads 262
674 An Interactive Online Academic Writing Resource for Research Students in Engineering

Authors: Eleanor K. P. Kwan

Abstract:

English academic writing, it has been argued, is an acquired language even for English speakers. For research students whose English is not their first language, however, the acquisition process is often more challenging. Instead of hoping that students would acquire the conventions themselves through extensive reading, there is a need for the explicit teaching of linguistic conventions in academic writing, as explicit teaching could help students to be more aware of the different generic conventions in different disciplines in science. This paper presents an interuniversity effort to develop an online academic writing resource for research students in five subdisciplines in engineering, upon the completion of the needs analysis which indicates that students and faculty members are more concerned about students’ ability to organize an extended text than about grammatical accuracy per se. In particular, this paper focuses on the materials developed for thesis writing (also called dissertation writing in some tertiary institutions), as theses form an essential graduation requirement for all research students and this genre is also expected to demonstrate the writer’s competence in research and contributions to the research community. Drawing on Swalesian move analysis of research articles, this online resource includes authentic materials written by students and faculty members from the participating institutes. Highlight will be given to several aspects and challenges of developing this online resource. First, as the online resource aims at moving beyond providing instructions on academic writing, a range of interactive activities need to be designed to engage the users, which is one feature which differentiates this online resource from other equally informative websites on academic writing. Second, it will also include discussion on divergent textual practices in different subdisciplines, which help to illustrate different practices among these subdisciplines. Third, since theses, probably one of the most extended texts a research student will complete, require effective use of signposting devices to facility readers’ understanding, this online resource will also provide both explanation and activities on different components that contribute to text coherence. Finally results from piloting will also be included to shed light on the effectiveness of the materials, which could be useful for future development.

Keywords: academic writing, English for academic purposes, online language learning materials, scientific writing

Procedia PDF Downloads 256
673 Symbol Synchronization and Resource Reuse Schemes for Layered Video Multicast Service in Long Term Evolution Networks

Authors: Chung-Nan Lee, Sheng-Wei Chu, You-Chiun Wang

Abstract:

LTE (Long Term Evolution) employs the eMBMS (evolved Multimedia Broadcast/Multicast Service) protocol to deliver video streams to a multicast group of users. However, it requires all multicast members to receive a video stream in the same transmission rate, which would degrade the overall service quality when some users encounter bad channel conditions. To overcome this problem, this paper provides two efficient resource allocation schemes in such LTE network: The symbol synchronization (S2) scheme assumes that the macro and pico eNodeBs use the same frequency channel to deliver the video stream to all users. It then adopts a multicast transmission index to guarantee the fairness among users. On the other hand, the resource reuse (R2) scheme allows eNodeBs to transmit data on different frequency channels. Then, by introducing the concept of frequency reuse, it can further improve the overall service quality. Extensive simulation results show that the S2 and R2 schemes can respectively improve around 50% of fairness and 14% of video quality as compared with the common maximum throughput method.

Keywords: LTE networks, multicast, resource allocation, layered video

Procedia PDF Downloads 379
672 Deep Learning and Accurate Performance Measure Processes for Cyber Attack Detection among Web Logs

Authors: Noureddine Mohtaram, Jeremy Patrix, Jerome Verny

Abstract:

As an enormous number of online services have been developed into web applications, security problems based on web applications are becoming more serious now. Most intrusion detection systems rely on each request to find the cyber-attack rather than on user behavior, and these systems can only protect web applications against known vulnerabilities rather than certain zero-day attacks. In order to detect new attacks, we analyze the HTTP protocols of web servers to divide them into two categories: normal attacks and malicious attacks. On the other hand, the quality of the results obtained by deep learning (DL) in various areas of big data has given an important motivation to apply it to cybersecurity. Deep learning for attack detection in cybersecurity has the potential to be a robust tool from small transformations to new attacks due to its capability to extract more high-level features. This research aims to take a new approach, deep learning to cybersecurity, to classify these two categories to eliminate attacks and protect web servers of the defense sector which encounters different web traffic compared to other sectors (such as e-commerce, web app, etc.). The result shows that by using a machine learning method, a higher accuracy rate, and a lower false alarm detection rate can be achieved.

Keywords: anomaly detection, HTTP protocol, logs, cyber attack, deep learning

Procedia PDF Downloads 197
671 From Data Processing to Experimental Design and Back Again: A Parameter Identification Problem Based on FRAP Images

Authors: Stepan Papacek, Jiri Jablonsky, Radek Kana, Ctirad Matonoha, Stefan Kindermann

Abstract:

FRAP (Fluorescence Recovery After Photobleaching) is a widely used measurement technique to determine the mobility of fluorescent molecules within living cells. While the experimental setup and protocol for FRAP experiments are usually fixed, data processing part is still under development. In this paper, we formulate and solve the problem of data selection which enhances the processing of FRAP images. We introduce the concept of the irrelevant data set, i.e., the data which are almost not reducing the confidence interval of the estimated parameters and thus could be neglected. Based on sensitivity analysis, we both solve the problem of the optimal data space selection and we find specific conditions for optimizing an important experimental design factor, e.g., the radius of bleach spot. Finally, a theorem announcing less precision of the integrated data approach compared to the full data case is proven; i.e., we claim that the data set represented by the FRAP recovery curve lead to a larger confidence interval compared to the spatio-temporal (full) data.

Keywords: FRAP, inverse problem, parameter identification, sensitivity analysis, optimal experimental design

Procedia PDF Downloads 265
670 Simultaneous Production of Forskolin and Rosmarinic Acid in vitro Cultures of Coleus Forskohlii Briq

Authors: Ennus Tajuddin Tamboli, Madhukar Garg, Mohd. Mujeeb, Sayeed Ahmad

Abstract:

An efficient protocol for simultaneous production of forskolin and rosmarinic acid in in vitro callus derived from the leaves of Coleus forskohlii Briq. has been developed. MS media was used for the establishment of cultures and NAA + 6-BA (1.0 ppm) was found best for callus growth. The callus was further subjected to treatment with various elicitor/precursors viz. chitosan, thidiazuron and methyl jasmonate to observe their effect on production of biomass and accumulation of secondary metabolites. The content of forskolin and rosmarinic acid were estimated by HPTLC, in comparison to natural explant which showed 2 fold and 10 fold rise in forskolin and rosmarinic acid content, respectively. Methy1 jasmonate 50 µM was found best for production of forskolin, whereas thidiazuron showed best results in the yield of rosmarinic acid, separately in static culture. However, combined treatment in suspension culture showed moderated effect for increase in secondary metabolites but the biomass increased significantly as compared to static culture.

Keywords: plant tissue culture, secondary metabolites, coleus, forskolin, rosmarinic acid, HPTLC

Procedia PDF Downloads 332
669 ArcGIS as a Tool for Infrastructure Documentation and Asset Management: Establishing a GIS for Computer Network Documentation

Authors: John Segars

Abstract:

Built out of a real-world need to have better, more detailed, asset and infrastructure documentation, this project will lay out the case for using the database functionality of ArcGIS as a tool to track and maintain infrastructure location, status, maintenance and serviceability. Workflows and processes will be presented and detailed which may be applied to an organizations’ infrastructure needs that might allow them to make use of the robust tools which surround the ArcGIS platform. The end result is a value-added information system framework with a geographic component e.g., the spatial location of various I.T. assets, a detailed set of records which not only documents location but also captures the maintenance history for assets along with photographs and documentation of these various assets as attachments to the numerous feature class items. In addition to the asset location and documentation benefits, the staff will be able to log into the devices and pull SNMP (Simple Network Management Protocol) based query information from within the user interface. The entire collection of information may be displayed in ArcGIS, via a JavaScript based web application or via queries to the back-end database. The project is applicable to all organizations which maintain an IT infrastructure but specifically targets post-secondary educational institutions where access to ESRI resources is generally already available in house.

Keywords: ESRI, GIS, infrastructure, network documentation, PostgreSQL

Procedia PDF Downloads 170
668 Packet Fragmentation Caused by Encryption and Using It as a Security Method

Authors: Said Rabah Azzam, Andrew Graham

Abstract:

Fragmentation of packets caused by encryption applied on the network layer of the IOS model in Internet Protocol version 4 (IPv4) networks as well as the possibility of using fragmentation and Access Control Lists (ACLs) as a method of restricting network access to certain hosts or areas of a network.Using default settings, fragmentation is expected to occur and each fragment to be reassembled at the other end. If this does not occur then a high number of ICMP messages should be generated back towards the source host indicating that the packet is too large and that it needs to be made smaller. This result is also expected when the MTU is changed for certain links between devices.When using ACLs and packet fragments to restrict access to hosts or network segments it is possible that ACLs cannot be set up in this way. If ACLs cannot be setup to allow only fragments then it is a limitation of the hardware’s firmware holding back this particular method. If the ACL on the restricted switch can be set up in such a way to allow only fragments then a connection that forces packets to fragment should be allowed to pass through the ACL. This should then make a network connection to the destination machine allowing data to be sent to and from the destination machine. ICMP messages from the restricted access switch and host should also be blocked from being sent back across the link which will be shown in an SSH session into the switch.

Keywords: fragmentation, encryption, security, switch

Procedia PDF Downloads 317
667 Exploring the Relationship between the Adoption of Environmental Processes, Policies, Techniques and Environmental Operational Performance

Authors: Renata Konadu

Abstract:

Over the last two decades, the concept of environmental management and its related issues have received increased attention in global discourse and on management research agenda due to climate change and other environmental challenges. To abate and avert these challenges, diverse environmental policies, strategies and practices have been adopted by businesses and economies as a whole. Extant literature has placed much emphasis on whether improved environmental operational performance improves firm performance. However, there is a huge gap in the literature with regards to whether the adoption of environmental management practices and policies has a direct relationship with environmental operational performance (EOP). The current paper is intended to provide a comprehensive perspective of how different aspects of environmental management can relate to firms EOP. Using a panel regression analysis of 149 large listed firms in the UK, the study found evidence of both negative and positive statistically significant link between some Environmental Policies (EP), Environmental Processes (EPR), Environmental Management Systems (EMS) and EOP. The findings suggest that in terms of relating EP, EPR and EMS to Greenhouse Gases (GHGs) emissions for instance, the latter should be viewed separately in Scopes 1, 2 and 3 as developed by GHG protocol. The results have useful implication for policy makers and managers when designing strategies and policies to reduce negative environmental impacts.

Keywords: environmental management, environmental operational performance, GHGs, large listed firms

Procedia PDF Downloads 243
666 Searching for Forensic Evidence in a Compromised Virtual Web Server against SQL Injection Attacks and PHP Web Shell

Authors: Gigih Supriyatno

Abstract:

SQL injection is one of the most common types of attacks and has a very critical impact on web servers. In the worst case, an attacker can perform post-exploitation after a successful SQL injection attack. In the case of forensics web servers, web server analysis is closely related to log file analysis. But sometimes large file sizes and different log types make it difficult for investigators to look for traces of attackers on the server. The purpose of this paper is to help investigator take appropriate steps to investigate when the web server gets attacked. We use attack scenarios using SQL injection attacks including PHP backdoor injection as post-exploitation. We perform post-mortem analysis of web server logs based on Hypertext Transfer Protocol (HTTP) POST and HTTP GET method approaches that are characteristic of SQL injection attacks. In addition, we also propose structured analysis method between the web server application log file, database application, and other additional logs that exist on the webserver. This method makes the investigator more structured to analyze the log file so as to produce evidence of attack with acceptable time. There is also the possibility that other attack techniques can be detected with this method. On the other side, it can help web administrators to prepare their systems for the forensic readiness.

Keywords: web forensic, SQL injection, investigation, web shell

Procedia PDF Downloads 142
665 Electrocatalytic Amino Acid Synthesis from Biomass-Derivable Keto Acids over Ball-Milled Carbon Nanotubes

Authors: Yiying Xiao, Chia Wei Lim, Jinquan Chang, Qixin Yuan, Lei Wang, Ning Yan

Abstract:

Electrocatalytic reductive amination (ERA) offers an attractive way to make organonitrogen chemicals from renewable feedstock. Here, we report carbon nanotube (CNT) as an effective catalyst for the ERA of biomass-derivable α-keto acids into amino acids using NH₃ as the nitrogen source. Through a facile ball milling (BM) treatment, the intrinsic defects in the CNTs were increased while the electrocatalytic activity of CNTs converting 2-ketoglutaric acid into glutamic acid was enhanced by approximately seven times. A high Faradaic efficiency (FE) of ~90% with a corresponding glutamic acid formation rate up to 180.9 mmol•g⁻¹𝒸ₐₜt•h⁻¹ was achieved, and ~60% molar yield of glutamic acid was obtained after 8 h of electrolysis. Electrokinetic analyses indicate that the BM-CNTs catalysed ERA exhibits first-order dependences on the substrate and NH₃, with a rate-determining step (RDS) involving the first electron transfer. Following this protocol, a number of amino acids were prepared with moderate to high FEs and formation rates. Significantly, we synthesised long carbon chain amino acids, which typically face lower yields using the existing methods.

Keywords: amino acids, carbon nanotubes, electrocatalysis, reductive amination, α-keto acids

Procedia PDF Downloads 69
664 Cardiometabolic Risk Factors Responses to Supplemental High Intensity Exercise in Middle School Children

Authors: R. M. Chandler, A. J. Stringer

Abstract:

In adults, short bursts of high-intensity exercise (intensities between 80-95% of maximum heart rates) increase cardiovascular and metabolic function without the time investment of traditional aerobic training. Similar improvements in various health indices are also becoming increasingly evident in children in countries other than the United States. In the United States, physical education programs have become shorter in length and fewer in frequency. With this in the background, it is imperative that health and physical educators delivered well-organized and focused fitness programs that can be tolerated across many different somatotypes. Perhaps the least effective lag-time in a US physical education (PE) class is the first 10 minutes, a time during which children warm up. Replacing a traditional PE warmup with a 10 min high-intensity excise protocol is a time-efficient method to impact health, leaving as much time for other PE material such as skill development, motor behavior development as possible. This supplemented 10 min high-intensity exercise increases cardiovascular function as well as induces favorable body composition changes in as little as six weeks with further enhancement throughout a semester of activity. The supplemental high-intensity exercise did not detract from the PE lesson outcomes.

Keywords: cardiovascular fitness, high intensity interval training, high intensity exercise, pediatric

Procedia PDF Downloads 130
663 Battling with Patriarchy: Political Sexuality and Gender Democracy in Nigeria

Authors: Lenshie, Nsemba Edward

Abstract:

This paper examines political sexuality as an identity construct, which imparts on democratic practices globally. The manifestation of political sexuality reflect on the dynamics of social, economic, cultural and political relations among different gender affecting a number of issues, such as the questions of citizenship, poverty alleviation, property rights, ownership and inheritance, rights to sexual consent, polygamous marriage, governance and representation among other issues. This paper is concerned with the aspect of political participation among different genders in Nigeria. This paper posit that political sexuality is an outcome of ‘sexuality differences’, which seeks to glorify and gratify the superiority of a particular sexuality over another. Political sexuality, therefore, motivate and exacerbate socio-cultural, economic, and political struggles among different sexualities. The paper asserts further that majority of women have been discriminated, sexually harassed, and are often denied certain rights and privileges in Nigeria. A few number of women who have found themselves at the corridors of government have used the Beijing protocol on Women to demand for ‘affirmative action’ to expand their political space. It contends that the ‘affirmative action’ in Nigeria is far from achieving it throughout the country. The paper conclude that women require more than just a ‘self-rediscovery’ to assertively demand for a more and proper inclusion in Nigeria’s democratic process.

Keywords: gender democracy, identity, politics, political sexuality

Procedia PDF Downloads 424
662 Constructing Practices for Lifestyle Journalism Education

Authors: Lucia Vodanovic, Bryan Pirolli

Abstract:

The London College of Communication is one of the only universities in the world to offer a lifestyle journalism master’s degree. A hybrid originally constructed largely out of a generic journalism program crossed with numerous cultural studies approaches, the degree has developed into a leading lifestyle journalism education attracting students worldwide. This research project seeks to present a framework for structuring the degree as well as to understand how students in this emerging field of study value the program. While some researchers have addressed questions about journalism and higher education, none have looked specifically at the increasingly important genre of lifestyle journalism, which Folker Hanusch defines as including notions of consumerism and critique among other identifying traits. Lifestyle journalism, itself poorly researched by scholars, can relate to topics including travel, fitness, and entertainment, and as such, arguably a lifestyle journalism degree should prepare students to engage with these topics. This research uses the existing Masters of Arts and Lifestyle Journalism at the London College of Communications as a case study to examine the school’s approach. Furthering Hanusch’s original definition, this master’s program attempts to characterizes lifestyle journalism by a specific voice or approach, as reflected in the diversity of student’s final projects. This framework echoes the ethos and ideas of the university, which focuses on creativity, design, and experimentation. By analyzing the current degree as well as student feedback, this research aims to assist future educators in pursuing the often neglected field of lifestyle journalism. Through a discovery of the unique mix of practical coursework, theoretical lessons, and broad scope of student work presented in this degree program, researchers strive to develop a framework for lifestyle journalism education, referring to Mark Deuze’s ten questions for journalism education development. While Hanusch began the discussion to legitimize the study of lifestyle journalism, this project strives to go one step further and open up a discussion about teaching of lifestyle journalism at the university level.

Keywords: education, journalism, lifestyle, university

Procedia PDF Downloads 291
661 CLOUD Japan: Prospective Multi-Hospital Study to Determine the Population-Based Incidence of Hospitalized Clostridium difficile Infections

Authors: Kazuhiro Tateda, Elisa Gonzalez, Shuhei Ito, Kirstin Heinrich, Kevin Sweetland, Pingping Zhang, Catia Ferreira, Michael Pride, Jennifer Moisi, Sharon Gray, Bennett Lee, Fred Angulo

Abstract:

Clostridium difficile (C. difficile) is the most common cause of antibiotic-associated diarrhea and infectious diarrhea in healthcare settings. Japan has an aging population; the elderly are at increased risk of hospitalization, antibiotic use, and C. difficile infection (CDI). Little is known about the population-based incidence and disease burden of CDI in Japan although limited hospital-based studies have reported a lower incidence than the United States. To understand CDI disease burden in Japan, CLOUD (Clostridium difficile Infection Burden of Disease in Adults in Japan) was developed. CLOUD will derive population-based incidence estimates of the number of CDI cases per 100,000 population per year in Ota-ku (population 723,341), one of the districts in Tokyo, Japan. CLOUD will include approximately 14 of the 28 Ota-ku hospitals including Toho University Hospital, which is a 1,000 bed tertiary care teaching hospital. During the 12-month patient enrollment period, which is scheduled to begin in November 2018, Ota-ku residents > 50 years of age who are hospitalized at a participating hospital with diarrhea ( > 3 unformed stools (Bristol Stool Chart 5-7) in 24 hours) will be actively ascertained, consented, and enrolled by study surveillance staff. A stool specimen will be collected from enrolled patients and tested at a local reference laboratory (LSI Medience, Tokyo) using QUIK CHEK COMPLETE® (Abbott Laboratories). which simultaneously tests specimens for the presence of glutamate dehydrogenase (GDH) and C. difficile toxins A and B. A frozen stool specimen will also be sent to the Pfizer Laboratory (Pearl River, United States) for analysis using a two-step diagnostic testing algorithm that is based on detection of C. difficile strains/spores harboring toxin B gene by PCR followed by detection of free toxins (A and B) using a proprietary cell cytotoxicity neutralization assay (CCNA) developed by Pfizer. Positive specimens will be anaerobically cultured, and C. difficile isolates will be characterized by ribotyping and whole genomic sequencing. CDI patients enrolled in CLOUD will be contacted weekly for 90 days following diarrhea onset to describe clinical outcomes including recurrence, reinfection, and mortality, and patient reported economic, clinical and humanistic outcomes (e.g., health-related quality of life, worsening of comorbidities, and patient and caregiver work absenteeism). Studies will also be undertaken to fully characterize the catchment area to enable population-based estimates. The 12-month active ascertainment of CDI cases among hospitalized Ota-ku residents with diarrhea in CLOUD, and the characterization of the Ota-ku catchment area, including estimation of the proportion of all hospitalizations of Ota-ku residents that occur in the CLOUD-participating hospitals, will yield CDI population-based incidence estimates, which can be stratified by age groups, risk groups, and source (hospital-acquired or community-acquired). These incidence estimates will be extrapolated, following age standardization using national census data, to yield CDI disease burden estimates for Japan. CLOUD also serves as a model for studies in other countries that can use the CLOUD protocol to estimate CDI disease burden.

Keywords: Clostridium difficile, disease burden, epidemiology, study protocol

Procedia PDF Downloads 249
660 Thyroid Hormones and Thyrotropin Status in Nepalese Postmenopausal Women

Authors: S. A. Khan, B. Mishra, O. Sherchan

Abstract:

Background and Aims: Thyroid disorder is the most common endocrine disorder after diabetes mellitus. Females are more vulnerable to this disease, and old age is an important risk factor. This study was undertaken to investigate the burden of thyroid disorder in Nepalese postmenopausal women. Methods: In the present cross-sectional study, we included 271 post-menopausal women. Three ml of blood was collected following standard protocol after taking the written consent. Serum was separated and analyzed for free T3, free T4, and Thyroid Stimulating Hormone (TSH) by Chemiluminescence Immunoassay (CLIA) method in Snibe Maglumi 1000 analyzer. Data obtained was analyzed in SPSS Version 21. P < 0.05 was set for statistical significant at 95% Confidence Interval (CI). Results: Majority of the participants belong to Janjati (46.5%) ethnicity, followed by Brahmin/Chhetri (41.7%), residing either in urban or suburban locality. Most of them were non-vegetarian, non-smoker, and non-alcoholic. Subjects were divided into hyperthyroid (TSH < 0.3 uIU/ml), hypothyroid (TSH > 4.5 uIU/ml), and euthyroid (TSH=0.3-4.5 uIU/ml) based on TSH value. We reported 10.3% hyperthyroid and 29.2% hypothyroid cases. TSH was significantly correlated with T3 (r=-0.244; p < 0.001) T4 (r=-0.398; p < 0.001); age (r=-0.138; p=0.023) and BMI (r=0.123; p=0.043). Multiple linear regression model for TSH reveals only T3 and T4 were significantly associated with TSH (p < 0.001; p=0.001). Conclusion: To conclude, nearly 39.5% of the postmenopausal women had thyroid disorder. Postmenopausal women are vulnerable to thyroid disorder; therefore, requires regular thyroid monitoring.

Keywords: thyroid stimulating hormone, TSH, T3, T4, thyroid disorder

Procedia PDF Downloads 122
659 A Simulation of Patient Queuing System on Radiology Department at Tertiary Specialized Referral Hospital in Indonesia

Authors: Yonathan Audhitya Suthihono, Ratih Dyah Kusumastuti

Abstract:

The radiology department in a tertiary referral hospital faces service operation challenges such as huge and various patient arrival, which can increase the probability of patient queuing. During the COVID-19 pandemic, it is mandatory to apply social distancing protocol in the radiology department. A strategy to prevent the accumulation of patients at one spot would be required. The aim of this study is to identify an alternative solution which can reduce the patient’s waiting time in radiology department. Discrete event simulation (DES) is used for this study by constructing several improvement scenarios with Arena simulation software. Statistical analysis is used to test the validity of the base case scenario model and to investigate the performance of the improvement scenarios. The result of this study shows that the selected scenario is able to reduce patient waiting time significantly, which leads to more efficient services in a radiology department, be able to serve patients more effectively, and thus increase patient satisfaction. The result of the simulation can be used by the hospital management to improve the operational performance of the radiology department.

Keywords: discrete event simulation, hospital management patient queuing model, radiology department services

Procedia PDF Downloads 108
658 Mapping the Core Processes and Identifying Actors along with Their Roles, Functions and Linkages in Trout Value Chain in Kashmir, India

Authors: Stanzin Gawa, Nalini Ranjan Kumar, Gohar Bilal Wani, Vinay Maruti Hatte, A. Vinay

Abstract:

Rainbow trout (Oncorhynchus mykiss) and Brown trout (Salmo trutta fario) are the two species of trout which were once introduced by British in waters of Kashmir has well adapted to favorable climatic conditions. Cold water fisheries are one of the emerging sectors in Kashmir valley and trout holds an important place Jammu and Kashmir fisheries. Realizing the immense potential of trout culture in Kashmir region, the state fisheries department started privatizing trout culture under the centrally funded scheme of RKVY in which they provide 80 percent subsidy for raceway construction and supply of feed and seed for the first year since 2009-10 and at present there are 362 private trout farms. To cater the growing demand for trout in the valley, it is important to understand the bottlenecks faced in the propagation of trout culture. Value chain analysis provides a generic framework to understand the various activities and processes, mapping and studying linkages is first step that needs to be done in any value chain analysis. In Kashmir, it is found that trout hatcheries play a crucial role in insuring the continuous supply of trout seed in valley. Feed is most limiting factor in trout culture and the farmer has to incur high cost in payment and in the transportation of feed from the feed mill to farm. Lack of aqua clinic in the Kashmir valley needs to be addressed. Brood stock maintenance, breeding and seed production, technical assistance to private farmer, extension services have to be strengthened and there is need to development healthier environment for new entrepreneurs. It was found that trout farmers do not avail credit facility as there is no well define credit scheme for fisheries in the state. The study showed weak institutional linkages. Research and development should focus more on applied science rather than basic science.

Keywords: trout, Kashmir, value chain, linkages, culture

Procedia PDF Downloads 395