Search results for: open source information
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 16735

Search results for: open source information

16015 Thermoelectric Generators as Alternative Source for Electric Power

Authors: L. C. Ding, Bradley G. Orr, K. Rahauoi, S. Truza, A. Date, A. Akbarzadeh

Abstract:

The research on thermoelectric has been a blooming field of research for the latest decade, owing to large amount of heat source available to be harvested, being eco-friendly and static in operation. This paper provides the performance of thermoelectric generator (TEG) with bulk material of bismuth telluride, Bi2Te3. Later, the performance of the TEGs is evaluated by considering attaching the TEGs on a plastic (polyethylene sheet) in contrast to the common method of attaching the TEGs on the metal surface.

Keywords: electric power, heat transfer, renewable energy, thermoelectric generator

Procedia PDF Downloads 276
16014 Quantitative Detection of the Conformational Transitions between Open and Closed Forms of Cytochrome P450 Oxidoreductase (CYPOR) at the Membrane Surface in Different Functional States

Authors: Sara Arafeh, Kovriguine Evguine

Abstract:

Cytochromes P450 are enzymes that require a supply of electrons to catalyze the synthesis of steroid hormones, fatty acids, and prostaglandin hormone. Cytochrome P450 Oxidoreductase (CYPOR), a membrane bound enzyme, provides these electrons in its open conformation. CYPOR has two cytosolic domains (FAD domain and FMN domain) and an N-terminal in the membrane. In its open conformation, electrons flow from NADPH, FAD, and finally to FMN where cytochrome P450 picks up these electrons. In the closed conformation, cytochrome P450 does not bind to the FMN domain to take the electrons. It was found that when the cytosolic domains are isolated, CYPOR could not bind to cytochrome P450. This suggested that the membrane environment is important for CYPOR function. This project takes the initiative to better understand the dynamics of CYPOR in its full length. Here, we determine the distance between specific sites in the FAD and FMN binding domains in CYPOR by Forster Resonance Energy Transfer (FRET) and Ultrafast TA spectroscopy with and without NADPH. The approach to determine these distances will rely on labeling these sites with red and infrared fluorophores. Mimic membrane attachment is done by inserting CYPOR in lipid nanodiscs. By determining the distances between the donor-acceptor sites in these domains, we can observe the open/closed conformations upon reducing CYPOR in the presence and absence of cytochrome P450. Such study is important to better understand CYPOR mechanism of action in various endosomal membranes including hepatic CYPOR which is vital in plasma cholesterol homeostasis. By investigating the conformational cycles of CYPOR, we can synthesize drugs that would be more efficient in affecting the steroid hormonal levels and metabolism of toxins catalyzed by Cytochrome P450.

Keywords: conformational cycle of CYPOR, cytochrome P450, cytochrome P450 oxidoreductase, FAD domain, FMN domain, FRET, Ultrafast TA Spectroscopy

Procedia PDF Downloads 275
16013 Development of an Automatic Monitoring System Based on the Open Architecture Concept

Authors: Andrii Biloshchytskyi, Serik Omirbayev, Alexandr Neftissov, Sapar Toxanov, Svitlana Biloshchytska, Adil Faizullin

Abstract:

Kazakhstan has adopted a carbon neutrality strategy until 2060. In accordance with this strategy, it is necessary to introduce various tools to maintain the environmental safety of the environment. The use of IoT, in combination with the characteristics and requirements of Kazakhstan's environmental legislation, makes it possible to develop a modern environmental monitoring system. The article proposes a solution for developing an example of an automated system for the continuous collection of data on the concentration of pollutants in the atmosphere based on an open architecture. The Audino-based device acts as a microcontroller. It should be noted that the transmission of measured values is carried out via an open wireless communication protocol. The architecture of the system, which was used to build a prototype based on sensors, an Arduino microcontroller, and a wireless data transmission module, is presented. The selection of elementary components may change depending on the requirements of the system; the introduction of new units is limited by the number of ports. The openness of solutions allows you to change the configuration depending on the conditions. The advantages of the solutions are openness, low cost, versatility and mobility. However, there is no comparison of the working processes of the proposed solution with traditional ones.

Keywords: environmental monitoring, greenhouse gases emissions, environmental pollution, Industry 4.0, IoT, microcontroller, automated monitoring system.

Procedia PDF Downloads 42
16012 Impact of Water Storage Structures on Groundwater Recharge in Jeloula Basin, Central Tunisia

Authors: I. Farid, K. Zouari

Abstract:

An attempt has been made to examine the effect of water storage structures on groundwater recharge in a semi-arid agroclimatic setting in Jeloula Basin (Central Tunisia). In this area, surface water in rivers is seasonal, and therefore groundwater is the perennial source of water supply for domestic and agricultural purposes. Three pumped storage water power plants (PSWPP) have been built to increase the overall water availability in the basin and support agricultural livelihoods of rural smallholders. The scale and geographical dispersion of these multiple lakes restrict the understanding of these coupled human-water systems and the identification of adequate strategies to support riparian farmers. In the present review, hydrochemistry and isotopic tools were combined to get an insight into the processes controlling mineralization and recharge conditions in the investigated aquifer system. This study showed a slight increase in the groundwater level, especially after the artificial recharge operations and a decline when the water volume moves down during drought periods. Chemical data indicate that the main sources of salinity in the waters are related to water-rock interactions. Data inferred from stable isotopes in groundwater samples indicated recharge with modern rainfall. The investigated surface water samples collected from the PSWPP are affected by a significant evaporation and reveal large seasonal variations, which could be controlled by the water volume changes in the open surface reservoirs and the meteorological conditions during evaporation, condensation, and precipitation. The geochemical information is comparable to the isotopic results and illustrates that the chemical and isotopic signatures of reservoir waters differ clearly from those of groundwaters. These data confirm that the contribution of the artificial recharge operations from the PSWPP is very limited.

Keywords: Jeloula basin, recharge, hydrochemistry, isotopes

Procedia PDF Downloads 146
16011 Mesoporous Material Nanofibers by Electrospinning

Authors: Sh. Sohrabnezhad, A. Jafarzadeh

Abstract:

In this paper, MCM-41 mesoporous material nanofibers were synthesized by an electrospinning technique. The nanofibers were characterized by scanning electron microscopy (SEM), transmission electron microscopy (TEM), x-ray diffraction (XRD), and nitrogen adsorption–desorption measurement. Tetraethyl orthosilicate (TEOS) and polyvinyl alcohol (PVA) were used as a silica source and fiber forming source, respectively. TEM and SEM images showed synthesis of MCM-41 nanofibers with a diameter of 200 nm. The pore diameter and surface area of calcined MCM-41 nanofibers was 2.2 nm and 970 m2/g, respectively. The morphology of the MCM-41 nanofibers depended on spinning voltages.

Keywords: electrospinning, electron microscopy, fiber technology, porous materials, X-ray techniques

Procedia PDF Downloads 245
16010 Low-Cost IoT System for Monitoring Ground Propagation Waves due to Construction and Traffic Activities to Nearby Construction

Authors: Lan Nguyen, Kien Le Tan, Bao Nguyen Pham Gia

Abstract:

Due to the high cost, specialized dynamic measurement devices for industrial lands are difficult for many colleges to equip for hands-on teaching. This study connects a dynamic measurement sensor and receiver utilizing an inexpensive Raspberry Pi 4 board, some 24-bit ADC circuits, a geophone vibration sensor, and embedded Python open-source programming. Gather and analyze signals for dynamic measuring, ground vibration monitoring, and structure vibration monitoring. The system may wirelessly communicate data to the computer and is set up as a communication node network, enabling real-time monitoring of background vibrations at various locations. The device can be utilized for a variety of dynamic measurement and monitoring tasks, including monitoring earthquake vibrations, ground vibrations from construction operations, traffic, and vibrations of building structures.

Keywords: sensors, FFT, signal processing, real-time data monitoring, ground propagation wave, python, raspberry Pi 4

Procedia PDF Downloads 97
16009 The Information-Seeking Behaviour of Kuwaiti Judges (KJs)

Authors: Essam Mansour

Abstract:

The key purpose of this study is to show information-seeking behaviour of Kuwaiti Judges (KJs). Being one of the few studies about the information needs and information-seeking behaviour conducted in Arab and developing countries, this study is a pioneer one among many studies conducted in information seeking, especially with this significant group of information users. The authors tried to investigate this seeking behavior in terms of KJs' thoughts, perceptions, motivations, techniques, preferences, tools and barriers met when seeking information. The authors employed a questionnaire, with a response rate 77.2 percent. This study showed that most of KJs were likely to be older, educated and with a work experience ranged from new to old experience. There is a statistically reliable significant difference between KJs' demographic characteristics and some sources of information, such as books, encyclopedias, references and mass media. KJs were using information moderately to make a decision, to be in line with current events, to collect statistics and to make a specific/general research. The office and home were the most frequent location KJs were accessing information from. KJs' efficiency level of the English language is described to be moderately good, and a little number of them confirmed that their efficiency level of French was not bad. The assistance provided by colleagues, followed by consultants, translators, sectaries and librarians were found to be most strong types of assistance needed when seeking information. Mobile apps, followed by PCs, information networks (the Internet) and information databases were the highest technology tool used by KJs. Printed materials, followed by non-printed and audiovisual materials were the most preferred information formats KJs use. The use of languages, the recency of information and the place of information, the deficit role of the library to deliver information were at least significant barriers to KJs when seeking information.

Keywords: information users, information-seeking behaviour, information needs, judges, Kuwait

Procedia PDF Downloads 304
16008 Data Confidentiality in Public Cloud: A Method for Inclusion of ID-PKC Schemes in OpenStack Cloud

Authors: N. Nalini, Bhanu Prakash Gopularam

Abstract:

The term data security refers to the degree of resistance or protection given to information from unintended or unauthorized access. The core principles of information security are the confidentiality, integrity and availability, also referred as CIA triad. Cloud computing services are classified as SaaS, IaaS and PaaS services. With cloud adoption the confidential enterprise data are moved from organization premises to untrusted public network and due to this the attack surface has increased manifold. Several cloud computing platforms like OpenStack, Eucalyptus, Amazon EC2 offer users to build and configure public, hybrid and private clouds. While the traditional encryption based on PKI infrastructure still works in cloud scenario, the management of public-private keys and trust certificates is difficult. The Identity based Public Key Cryptography (also referred as ID-PKC) overcomes this problem by using publicly identifiable information for generating the keys and works well with decentralized systems. The users can exchange information securely without having to manage any trust information. Another advantage is that access control (role based access control policy) information can be embedded into data unlike in PKI where it is handled by separate component or system. In OpenStack cloud platform the keystone service acts as identity service for authentication and authorization and has support for public key infrastructure for auto services. In this paper, we explain OpenStack security architecture and evaluate the PKI infrastructure piece for data confidentiality. We provide method to integrate ID-PKC schemes for securing data while in transit and stored and explain the key measures for safe guarding data against security attacks. The proposed approach uses JPBC crypto library for key-pair generation based on IEEE P1636.3 standard and secure communication to other cloud services.

Keywords: data confidentiality, identity based cryptography, secure communication, open stack key stone, token scoping

Procedia PDF Downloads 381
16007 Landfill Leachate: A Promising Substrate for Microbial Fuel Cells

Authors: Jayesh M. Sonawane, Prakash C. Ghosh

Abstract:

Landfill leachate emerges as a promising feedstock for microbial fuel cells (MFCs). In the present investigation, direct air-breathing cathode-based MFCs are fabricated to investigate the potential of landfill leachate. Three MFCs that have different cathode areas are fabricated and investigated for 17 days under open circuit conditions. The maximum open circuit voltage (OCV) is observed to be as high as 1.29 V. The maximum cathode area specific power density achieved in the reactor is 1513 mW m-2. Further studies are under progress to understand the origin of high OCV obtained from landfill leachate-based MFCs.

Keywords: microbial fuel cells, landfill leachate, air-breathing cathode, performance study

Procedia PDF Downloads 304
16006 Classification of Traffic Complex Acoustic Space

Authors: Bin Wang, Jian Kang

Abstract:

After years of development, the study of soundscape has been refined to the types of urban space and building. Traffic complex takes traffic function as the core, with obvious design features of architectural space combination and traffic streamline. The acoustic environment is strongly characterized by function, space, material, user and other factors. Traffic complex integrates various functions of business, accommodation, entertainment and so on. It has various forms, complex and varied experiences, and its acoustic environment is turned rich and interesting with distribution and coordination of various functions, division and unification of the mass, separation and organization of different space and the cross and the integration of multiple traffic flow. In this study, it made field recordings of each space of various traffic complex, and extracted and analyzed different acoustic elements, including changes in sound pressure, frequency distribution, steady sound source, sound source information and other aspects, to make cluster analysis of each independent traffic complex buildings. It divided complicated traffic complex building space into several typical sound space from acoustic environment perspective, mainly including stable sound space, high-pressure sound space, rhythm sound space and upheaval sound space. This classification can further deepen the study of subjective evaluation and control of the acoustic environment of traffic complex.

Keywords: soundscape, traffic complex, cluster analysis, classification

Procedia PDF Downloads 247
16005 Exploring Students' Alternative Conception in Vector Components

Authors: Umporn Wutchana

Abstract:

An open ended problem and unstructured interview had been used to explore students’ conceptual and procedural understanding of vector components. The open ended problem had been designed based on research instrument used in previous physics education research. Without physical context, we asked students to find out magnitude and draw graphical form of vector components. The open ended problem was given to 211 first year students of faculty of science during the third (summer) semester in 2014 academic year. The students spent approximately 15 minutes of their second time of the General Physics I course to complete the open ended problem after they had failed. Consequently, their responses were classified based on the similarity of errors performed in the responses. Then, an unstructured interview was conducted. 7 students were randomly selected and asked to reason and explain their answers. The study results showed that 53% of 211 students provided correct numerical magnitude of vector components while 10.9% of them confused and punctuated the magnitude of vectors in x- with y-components. Others 20.4% provided just symbols and the last 15.6% gave no answer. When asking to draw graphical form of vector components, only 10% of 211 students made corrections. A majority of them produced errors and revealed alternative conceptions. 46.5% drew longer and/or shorter magnitude of vector components. 43.1% drew vectors in different forms or wrote down other symbols. Results from the unstructured interview indicated that some students just memorized the method to get numerical magnitude of x- and y-components. About graphical form of component vectors, some students though that the length of component vectors should be shorter than those of the given one. So then, it could be combined to be equal length of the given vectors while others though that component vectors should has the same length as the given vectors. It was likely to be that many students did not develop a strong foundation of understanding in vector components but just learn by memorizing its solution or the way to compute its magnitude and attribute little meaning to such concept.

Keywords: graphical vectors, vectors, vector components, misconceptions, alternative conceptions

Procedia PDF Downloads 183
16004 E-government Status and Impact on Development in the Arab Region

Authors: Sukaina Al-Nasrawi, Maysoun Ibrahim

Abstract:

Information and communication technologies (ICT) have affected recent public administration and governance. Electronic Government (e-government) services were developed to simplify government procedures and improve interaction with citizens on one hand and to create new governance models to empower citizens and involve them in the decision-making process while increasing transparency on another hand. It is worth noting that efficient governance models enable sustainable development at the social and economic levels. Currently, the status of e-government national strategies and implementation programs vary from one country to another. This variance in the development levels of e-government initiatives and applications noted the digital divide between countries of the same region, thereby highlighting the difficulty to reach regional integration. Many Arab countries realized the need for a well-articulated e-government strategy and launched national e-government initiatives. In selected Arab countries, the focus of e-government initiatives and programs shifted from the provision of services to advanced concepts such as open data initiatives. This paper aims at over viewing the e-government achievements of Arab countries and areas for enhancement, and share best practices in the area.of the best e-government programmes from the Arab region the world. It will also shed the light on the impact of the information society in general and e-government, in specific, on the social and economic development in the Arab region.

Keywords: Information and Communication Technologies (ICT), services, e-government, development, Arab region, digital divide, citizens

Procedia PDF Downloads 287
16003 Building Organisational Culture That Stimulates Creativity and Innovation

Authors: Ala Hanetite

Abstract:

The purpose of this article is to present, by means of a model, the determinants of organisational culture which influence creativity and innovation. A literature study showed that a model, based on the open systems theory and the work of Schein, can offer a holistic approach in describing organisational culture. The relationship between creativity, innovation and culture is discussed in this context. Against the background of this model, the determinants of organisational culture were identified. The determinants are strategy, structure, support mechanisms, behaviour that encourages innovation, and open communication. The influence of each determinant on creativity and innovation is discussed. Values, norms and beliefs that play a role in creativity and innovation can either support or inhibit creativity and innovation depending on how they influence individual and group behaviour. This is also explained in the article.

Keywords: attitudes, creativity, innovation, organisational culture

Procedia PDF Downloads 585
16002 Bringing German History to Tourists

Authors: Gudrun Görlitz, Christian Schölzel, Alexander Vollmar

Abstract:

Sites of Jewish Life in Berlin 1933-1945. Between Persecution and Self-assertion” was realized in a project funded by the European Regional Development Fund. A smartphone app, and a associated web site enable tourists and other participants of this educational offer to learn in a serious way more about the life of Jews in the German capital during the Nazi era. Texts, photos, video and audio recordings communicate the historical content. Interactive maps (both current and historical) make it possible to use predefined or self combined routes. One of the manifold challenges was to create a broad ranged guide, in which all detailed information are well linked with each other. This enables heterogeneous groups of potential users to find a wide range of specific information, corresponding with their particular wishes and interests. The multitude of potential ways to navigate through the diversified information causes (hopefully) the users to utilize app and web site for a second or third time and with a continued interest. Therefore 90 locations, a lot of them situated in Berlin’s city centre, have been chosen. For all of them text-, picture and/or audio/video material gives extensive information. Suggested combinations of several of these “site stories” are leading to the offer of detailed excursion routes. Events and biographies are also presented. A few of the implemented biographies are especially enriched with source material concerning the aspect of (forced) migration of these persons during the Nazi time. All this was done in a close and fruitful interdisciplinary cooperation of computer scientists and historians. The suggested conference paper aims to show the challenges shaping complex source material for practical use by different user-groups in a proper technical and didactic way. Based on the historical research in archives, museums, libraries and digital resources the quantitative dimension of the project can be sized as follows: The paper focuses on the following historiographical and technical aspects: - Shaping the text material didactically for the use in new media, especially a Smartphone-App running on differing platforms; - Geo-referencing of the sites on historical and current map material; - Overlay of old and new maps to present and find the sites; - Using Augmented Reality technologies to re-visualize destroyed buildings; - Visualization of black-/white-picture-material; - Presentation of historical footage and the resulting problems to need too much storage space; - Financial and juridical aspects in gaining copyrights to present archival material.

Keywords: smartphone app, history, tourists, German

Procedia PDF Downloads 371
16001 SCANet: A Workflow for Single-Cell Co-Expression Based Analysis

Authors: Mhaned Oubounyt, Jan Baumbach

Abstract:

Differences in co-expression networks between two or multiple cells (sub)types across conditions is a pressing problem in single-cell RNA sequencing (scRNA-seq). A key challenge is to define those co-variations that differ between or among cell types and/or conditions and phenotypes to examine small regulatory networks that can explain mechanistic differences. To this end, we developed SCANet, an all-in-one Python package that uses state-of-the-art algorithms to facilitate the workflow of a combined single-cell GCN (Gene Correlation Network) and GRN (Gene Regulatory Networks) pipeline, including inference of gene co-expression modules from scRNA-seq, followed by trait and cell type associations, hub gene detection, co-regulatory networks, and drug-gene interactions. In an example case, we illustrate how SCANet can be applied to identify regulatory drivers behind a cytokine storm associated with mortality in patients with acute respiratory illness. SCANet is available as a free, open-source, and user-friendly Python package that can be easily integrated into systems biology pipelines.

Keywords: single-cell, co-expression networks, drug-gene interactions, co-regulatory networks

Procedia PDF Downloads 141
16000 Nesting Habitat Preference of Indigenous Bumblebee, Bombus haemorrhoidalis in Himalayan Range of Azad Jammu and Kashmir, Pakistan

Authors: Umer Ayyaz Aslam Sheikh

Abstract:

Non Apis bee like the bumblebees are important due to their utilization of diverse floral plants and belong to the richest and most conspicuous flower visitors in alpine, temperate and arctic environments for pollination in both natural and managed cropping systems. These bees generally construct underground nests and habitat devastation and crumbling are major causes for their decline in nature. The present study was conducted in the Himalayan range of Azad Jammu, and Kashmir, Pakistan, surveys were conducted during the early spring season to observe maximum Bombus haemorrhoidalis queens (emerged after winter diapauses) searching for a nesting place. Whole study area was grouped into four types of landscape (open field, relatively open , relatively wooded and wooded), five habitat types (field, field boundary, pasture forest boundary and forest) and these habitat further grouped into four different patch types including withered grass, new grass, tussocks and stones and moss. Maximum nest seeking bumblebee queens preferred relatively open field landscape followed by open fields and forest boundaries. Field boundaries were recorded as most proffered habitat along with withered grasses for nesting sites of B. haemorrhoidalis queens. A wooded landscape with stone and moss type of patches were found least preferred nesting sites. This study will be helpful in the future for conservation program this for declining bumblebee species in this region. It will also provide the baseline for the conservation of other bumblebee species of the world.

Keywords: bumblebee, Bombus haemorrhoidalis, habitat, nest seeking preference, Pakistan

Procedia PDF Downloads 131
15999 Emerging Cyber Threats and Cognitive Vulnerabilities: Cyberterrorism

Authors: Oludare Isaac Abiodun, Esther Omolara Abiodun

Abstract:

The purpose of this paper is to demonstrate that cyberterrorism is existing and poses a threat to computer security and national security. Nowadays, people have become excitedly dependent upon computers, phones, the Internet, and the Internet of things systems to share information, communicate, conduct a search, etc. However, these network systems are at risk from a different source that is known and unknown. These network systems risk being caused by some malicious individuals, groups, organizations, or governments, they take advantage of vulnerabilities in the computer system to hawk sensitive information from people, organizations, or governments. In doing so, they are engaging themselves in computer threats, crime, and terrorism, thereby making the use of computers insecure for others. The threat of cyberterrorism is of various forms and ranges from one country to another country. These threats include disrupting communications and information, stealing data, destroying data, leaking, and breaching data, interfering with messages and networks, and in some cases, demanding financial rewards for stolen data. Hence, this study identifies many ways that cyberterrorists utilize the Internet as a tool to advance their malicious mission, which negatively affects computer security and safety. One could identify causes for disparate anomaly behaviors and the theoretical, ideological, and current forms of the likelihood of cyberterrorism. Therefore, for a countermeasure, this paper proposes the use of previous and current computer security models as found in the literature to help in countering cyberterrorism

Keywords: cyberterrorism, computer security, information, internet, terrorism, threat, digital forensic solution

Procedia PDF Downloads 92
15998 Public Perceptions of Solar Energy in South-West Nigeria

Authors: Kugbeme Isumonah

Abstract:

The Nigerian State has continued to battle huge power supply challenges. Erratic supply, low voltage, and billing issues characterize its power sector. Solar power is increasingly being advocated for as a potential to Nigeria’s energy crisis. This study investigates how the Nigerian public perceives solar power. It employs the use of an open-ended online survey eliciting responses from participants resident in two of South-West Nigeria’s largest cities (Lagos and Ibadan). The study found that general attitudes towards solar power are positive, and the energy source is viewed with great optimism within the context of solutions to Nigeria’s energy issues. It also found no significant variation in public perceptions of solar power along demographic lines. Further, it found that finance represents the biggest barrier to broader solar power adoption. The results of this study provide evidence for policy formulation geared towards addressing finance difficulties that currently impede expansion of solar power use in Nigeria.

Keywords: public perceptions, solar energy, Nigeria, attitudes

Procedia PDF Downloads 103
15997 Failure Localization of Bipolar Integrated Circuits by Implementing Active Voltage Contrast

Authors: Yiqiang Ni, Xuanlong Chen, Enliang Li, Linting Zheng, Shizheng Yang

Abstract:

Bipolar ICs are playing an important role in military applications, mainly used in logic gates, such as inverter and NAND gate. The defect of metal break located on the step is one of the main failure mechanisms of bipolar ICs, resulting in open-circuit or functional failure. In this situation, general failure localization methods like optical beam-induced resistance change (OBIRCH) and photon emission microscopy (PEM) might not be fully effective. However, active voltage contrast (AVC) can be used as a voltage probe, which may pinpoint the incorrect potential and thus locate the failure position. Two case studies will be present in this paper on how to implement AVC for failure localization, and the detailed failure mechanism will be discussed.

Keywords: bipolar IC, failure localization, metal break, open failure, voltage contrast

Procedia PDF Downloads 284
15996 Assessment of Nutrient Intake, Nutritional Knowledge and Dietary Habits of Omani University Student Athletes

Authors: Amanat Ali, Muhammad S. Al-Siyabi, Mostafa I. Waly, Hashem Al-Kilani

Abstract:

In a cross-sectional research design, we assessed the nutrient intake, nutritional status, nutritional knowledge and dietary habits of Sultan Qaboos University (SQU) student athletes. A total of 71 (49 male and 22 female) student athletes with a mean age of 21.0 ± 1.81 and 19.32 ± 0.72 years and body mass index (BMI) of 22.51 ± 1.98 and 20.34 ± 2.97 kg/m2 for male and female respectively, participated in this study. A study questionnaire consisting of 2 sections was distributed to the participants. Section I included 18 questions regarding the demographic information, whereas the Section II consisted of 20 questions regarding the nutrition knowledge. The dietary intake of participants was collected by using a 7-days food diary identifying the frequency as well as the variety of food consumption. Significant differences (P < 0.05) were observed in the main sources of nutrition information used by the male and female athletes. Male athletes mainly had most of the nutrition information from friends (17%) whereas female athletes relied mainly on the family (20%). More female athletes (20%) were using TV as a source of nutrition information as compared to male athletes (15%). Both male and female athletes had the minimum nutrition information from dietitians and physicians. Significant (P < 0.05) differences were also observed in the nutritional knowledge and dietary habits scores of male and female athletes, which were 57 % and 49 %, respectively. Male athletes were classified to have fair nutritional knowledge and dietary habits, whereas the female athletes had poor nutritional knowledge and dietary habits. The average daily energy intake of male athletes was 2595 ± 358 kcal/day. Carbohydrate, fat, and protein contributed 64%, 22%, and 14%, of the total energy intake for the male athletes, respectively. The energy and macronutrients intake of male athletes was within the recommended dietary intake. The results indicated some gaps in the nutritional knowledge of SQU student athletes and suggest that there is a need for developing strategies in counseling and teaching the athletes to improve their nutritional knowledge and dietary habits.

Keywords: nutrient assessment, nutritional knowledge, dietary habits, Omani University athletes

Procedia PDF Downloads 502
15995 A Numerical Study on the Effects of N2 Dilution on the Flame Structure and Temperature Distribution of Swirl Diffusion Flames

Authors: Yasaman Tohidi, Shidvash Vakilipour, Saeed Ebadi Tavallaee, Shahin Vakilipoor Takaloo, Hossein Amiri

Abstract:

The numerical modeling is performed to study the effects of N2 addition to the fuel stream on the flame structure and temperature distribution of methane-air swirl diffusion flames with different swirl intensities. The Open source Field Operation and Manipulation (OpenFOAM) has been utilized as the computational tool. Flamelet approach along with modified k-ε model is employed to model the flame characteristics.  The results indicate that the presence of N2 in the fuel stream leads to the flame temperature reduction. By increasing of swirl intensity, the flame structure changes significantly. The flame has a conical shape in low swirl intensity; however, it has an hour glass-shape with a shorter length in high swirl intensity. The effects of N2 dilution decrease the flame length in all swirl intensities; however, the rate of reduction is more noticeable in low swirl intensity.

Keywords: swirl diffusion flame, N2 dilution, OpenFOAM, swirl intensity

Procedia PDF Downloads 166
15994 Performance Evaluation of Distributed and Co-Located MIMO LTE Physical Layer Using Wireless Open-Access Research Platform

Authors: Ishak Suleiman, Ahmad Kamsani Samingan, Yeoh Chun Yeow, Abdul Aziz Bin Abdul Rahman

Abstract:

In this paper, we evaluate the benefits of distributed 4x4 MIMO LTE downlink systems compared to that of the co-located 4x4 MIMO LTE downlink system. The performance evaluation was carried out experimentally by using Wireless Open-Access Research Platform (WARP), where the comparison between the 4x4 MIMO LTE transmission downlink system in distributed and co-located techniques was examined. The measured Error Vector Magnitude (EVM) results showed that the distributed technique achieved better system performance compared to the co-located arrangement.

Keywords: multiple-input-multiple-output (MIMO), distributed MIMO, co-located MIMO, LTE

Procedia PDF Downloads 418
15993 Investigation of Information Security Incident Management Based on International Standard ISO/IEC 27002 in Educational Hospitals in 2014

Authors: Nahid Tavakoli, Asghar Ehteshami, Akbar Hassanzadeh, Fatemeh Amini

Abstract:

Introduction: The Information security incident management guidelines was been developed to help hospitals to meet their information security event and incident management requirements. The purpose of this Study was to investigate on Information Security Incident Management in Isfahan’s educational hospitals in accordance to ISO/IEC 27002 standards. Methods: This was a cross-sectional study to investigate on Information Security Incident Management of educational hospitals in 2014. Based on ISO/IEC 27002 standards, two checklists were applied to check the compliance with standards on Reporting Information Security Events and Weakness and Management of Information Security Incidents and Improvements. One inspector was trained to carry out the assessments in the hospitals. The data was analyzed by SPSS. Findings: In general the score of compliance Information Security Incident Management requirements in two steps; Reporting Information Security Events and Weakness and Management of Information Security Incidents and Improvements was %60. There was the significant difference in various compliance levels among the hospitals (p-valueKeywords: information security incident management, information security management, standards, hospitals

Procedia PDF Downloads 573
15992 Numerical Study of Fire Propagation in Confined and Open Area

Authors: Hadj Miloua, Abbes Azzi

Abstract:

The objective of the present paper is to understand, predict and modeled the fire behavior in confined and open area in different conditions and diverse fuels such as liquid pool fire and the vegetative materials. The distinctive problems are a ventilated road tunnel used for urban transport, by the characterization installations of ventilation and his influence in the mode of smoke dispersion and the flame shape. A general investigation is relatively traditional, based on the modeling and simulation the scenario of the pool fire interacted with wind ventilation by the use of numerical software fire dynamic simulator FDS ver.5 to simulate the fire in ventilated tunnel. The second simulation by WFDS.5 is Wildland fire which is always occurs in forest and rangeland fire environments and will thus have an impact on people, property and resources.

Keywords: fire, road tunnel, simulation, vegetation, wildland

Procedia PDF Downloads 510
15991 A Laboratory Study into the Effects of Surface Waves on Freestyle Swimming

Authors: Scott Draper, Nat Benjanuvatra, Grant Landers, Terry Griffiths, Justin Geldard

Abstract:

Open water swimming has been an Olympic sport since 2008 and is growing in popularity world-wide as a low impact form of exercise. Unlike pool swimming, open water swimmers experience a range of different environmental conditions, including surface waves, variable water temperature, aquatic life, and ocean currents. This presentation will describe experimental research to investigate how freestyle swimming behaviour and performance is influenced by surface waves. A group of 12 swimmers were instructed to swim freestyle in the 54 m long wave flume located at The University of Western Australia’s Coastal and Offshore Engineering Laboratory. A variety of different regular waves were simulated, varying in height (up to 0.3 m), period (1.25 – 4s), and direction (with or against the swimmer). Swimmer’s velocity and acceleration, respectively, were determined from video recording and inertial sensors attached to five different parts of the swimmer’s body. The results illustrate how the swimmers stroke rate and the wave encounter frequency influence their forward speed and how particular wave conditions can benefit or hinder performance. Comparisons to simplified mathematical models provide insight into several aspects of performance, including: (i) how much faster swimmers can travel when swimming with as opposed to against the waves, and (ii) why swimmers of lesser ability are expected to be affected proportionally more by waves than elite swimmers. These findings have implications across the spectrum from elite to ‘weekend’ swimmers, including how they are coached and their ability to win (or just successfully complete) iconic open water events such as the Rottnest Channel Swim held annually in Western Australia.

Keywords: open water, surface waves, wave height/length, wave flume, stroke rate

Procedia PDF Downloads 108
15990 Variation of Streamwise and Vertical Turbulence Intensity in a Smooth and Rough Bed Open Channel Flow

Authors: M. Abdullah Al Faruque, Ram Balachandar

Abstract:

An experimental study with four different types of bed conditions was carried out to understand the effect of roughness in open channel flow at two different Reynolds numbers. The bed conditions include a smooth surface and three different roughness conditions which were generated using sand grains with a median diameter of 2.46 mm. The three rough conditions include a surface with distributed roughness, a surface with continuously distributed roughness and a sand bed with a permeable interface. A commercial two-component fibre-optic LDA system was used to conduct the velocity measurements. The variables of interest include the mean velocity, turbulence intensity, the correlation between the streamwise and the wall normal turbulence, Reynolds shear stress and velocity triple products. Quadrant decomposition was used to extract the magnitude of the Reynolds shear stress of the turbulent bursting events. The effect of roughness was evident throughout the flow depth. The results show that distributed roughness has the greatest roughness effect followed by the sand bed and the continuous roughness. Compared to the smooth bed, the streamwise turbulence intensity reduces but the vertical turbulence intensity increases at a location very close to the bed due to the introduction of roughness. Although the same sand grain is used to create the three different rough bed conditions, the difference in the turbulence intensity is an indication that the specific geometry of the roughness has an influence on turbulence structure.

Keywords: open channel flow, smooth and rough bed, Reynolds number, turbulence

Procedia PDF Downloads 332
15989 Customizable Sonic EEG Neurofeedback Environment to Train Self-Regulation of Momentary Mental and Emotional State

Authors: Cyril Kaplan, Nikola Jajcay

Abstract:

We developed purely sonic, musical based, highly customizable EEG neurofeedback environment designed to administer a new neurofeedback training protocol. The training protocol concentrates on improving the ability to switch between several mental states characterized by different levels of arousal, each of them correlated to specific brain wave activity patterns in several specific regions of neocortex. This paper describes the neurofeedback training environment we developed and its specificities, thus can be helpful as a manual to guide other neurofeedback users (both researchers and practitioners) interested in our editable open source program (available to download and usage under CC license). Responses and reaction of first trainees that used our environment are presented in this article. Combination of qualitative methods (thematic analysis of neurophenomenological insights of trainees and post-session semi-structured interviews) and quantitative methods (power spectra analysis of EEG recorded during the training) were employed to obtain a multifaceted view on our new training protocol.

Keywords: EEG neurofeedback, mixed methods, self-regulation, switch-between-states training

Procedia PDF Downloads 219
15988 Generative AI: A Comparison of Conditional Tabular Generative Adversarial Networks and Conditional Tabular Generative Adversarial Networks with Gaussian Copula in Generating Synthetic Data with Synthetic Data Vault

Authors: Lakshmi Prayaga, Chandra Prayaga. Aaron Wade, Gopi Shankar Mallu, Harsha Satya Pola

Abstract:

Synthetic data generated by Generative Adversarial Networks and Autoencoders is becoming more common to combat the problem of insufficient data for research purposes. However, generating synthetic data is a tedious task requiring extensive mathematical and programming background. Open-source platforms such as the Synthetic Data Vault (SDV) and Mostly AI have offered a platform that is user-friendly and accessible to non-technical professionals to generate synthetic data to augment existing data for further analysis. The SDV also provides for additions to the generic GAN, such as the Gaussian copula. We present the results from two synthetic data sets (CTGAN data and CTGAN with Gaussian Copula) generated by the SDV and report the findings. The results indicate that the ROC and AUC curves for the data generated by adding the layer of Gaussian copula are much higher than the data generated by the CTGAN.

Keywords: synthetic data generation, generative adversarial networks, conditional tabular GAN, Gaussian copula

Procedia PDF Downloads 74
15987 Detecting Heartbeat Architectural Tactic in Source Code Using Program Analysis

Authors: Ananta Kumar Das, Sujit Kumar Chakrabarti

Abstract:

Architectural tactics such as heartbeat, ping-echo, encapsulate, encrypt data are techniques that are used to achieve quality attributes of a system. Detecting architectural tactics has several benefits: it can aid system comprehension (e.g., legacy systems) and in the estimation of quality attributes such as safety, security, maintainability, etc. Architectural tactics are typically spread over the source code and are implicit. For large codebases, manual detection is often not feasible. Therefore, there is a need for automated methods of detection of architectural tactics. This paper presents a formalization of the heartbeat architectural tactic and a program analytic approach to detect this tactic in source code. The experiment of the proposed method is done on a set of Java applications. The outcome of the experiment strongly suggests that the method compares well with a manual approach in terms of its sensitivity and specificity, and far supersedes a manual exercise in terms of its scalability.

Keywords: software architecture, architectural tactics, detecting architectural tactics, program analysis, AST, alias analysis

Procedia PDF Downloads 151
15986 The Implementation of Information Security Audits in Public Sector: Perspective from Indonesia

Authors: Nur Imroatun Sholihat, Gresika Bunga Sylvana

Abstract:

Currently, cyber attack became an incredibly serious problem due to its increasing trend all over the world. Therefore, information security becomes prominent for every organization including public sector organization. In Indonesia, unfortunately, Ministry of Finance (MoF) is the only public sector organization that has already formally established procedure to assess its information security adequacy by performing information security audits (November 2017). We assess the implementation of information security audits in the MoF using qualitative data obtained by interviewing IT auditors and by analysis of related documents. For this reason, information security audit practice in the MoF could become the acceptable benchmark for all other public sector organizations in Indonesia. This study is important because, to the best of the author’s knowledge, our research into information security audits practice in Indonesia’s public sector have not been found yet. Results showed that information security audits performed mostly by doing pentest (penetration testing) to MoF’s critical applications.

Keywords: information security audit, information technology, Ministry of Finance of Indonesia, public sector organization

Procedia PDF Downloads 228