Search results for: transient ischaemic attack
422 Synthesis, Characterization, and Quantum Investigations on [3+2] Cycloaddition Reaction of Nitrile Oxide with 1,5-Benzodiazepine
Authors: Samir Hmaimou, Marouane Ait Lahcen, Mohamed Adardour, Mohamed Maatallah, Abdesselam Baouid
Abstract:
Due to (3 + 2) cycloaddition and condensation reaction, a wide range of synthetic routes can be used to obtain biologically active heterocyclic compounds. Condensation and (3+2) cycloaddition reactions in heterocyclic syntheses are versatile due to the wide variety of possible combinations of several atoms of the reactants. In this article, we first outline the synthesis of benzodiazepine 4 with two dipolarophilic centers (C=C and C=N) by condensation reaction. Then, we use it for cycloaddition reactions (3+2) with nitrile oxides to prepare oxadiazole-benzodiazepines and pyrazole-benzodiazepine compounds. ¹H and ¹³C NMR are used to establish all the structures of the synthesized products. These condensation and cycloaddition reactions were then analyzed using density functional theory (DFT) calculations at the B3LYP/6-311G(d,p) theoretical level. In this study, the mechanism of the one-step cycloaddition reaction was investigated. Molecular electrostatic potential (MEP) was used to identify the electrophilic and nucleophilic attack sites of the molecules studied. Additionally, Fukui investigations (electrophilic f- and nucleophilic f+) in the various reaction centers of the reactants demonstrate that, whether in the condensation reaction or cycloaddition, the reaction proceeds through the atomic centers with the most important Fukui functions, which is in full agreement with experimental observations. In the condensation reaction, thermodynamic control of regio, chemo, and stereoselectivity is observed, while those of cycloaddition are subject to kinetic control.Keywords: cycloaddition reaction, regioselectivity, mechanism reaction, NMR analysis
Procedia PDF Downloads 17421 Stack Overflow Detection and Prevention on Operating Systems Using Machine Learning and Control-Flow Enforcement Technology
Authors: Cao Jiayu, Lan Ximing, Huang Jingjia, Burra Venkata Durga Kumar
Abstract:
The first virus to attack personal computers was born in early 1986, called C-Brain, written by a pair of Pakistani brothers. In those days, people still used dos systems, manipulating computers with the most basic command lines. In the 21st century today, computer performance has grown geometrically. But computer viruses are also evolving and escalating. We never stop fighting against security problems. Stack overflow is one of the most common security vulnerabilities in operating systems. It may result in serious security issues for an operating system if a program in it has a vulnerability with administrator privileges. Certain viruses change the value of specific memory through a stack overflow, allowing computers to run harmful programs. This study developed a mechanism to detect and respond to time whenever a stack overflow occurs. We demonstrate the effectiveness of standard machine learning algorithms and control flow enforcement techniques in predicting computer OS security using generating suspicious vulnerability functions (SVFS) and associated suspect areas (SAS). The method can minimize the possibility of stack overflow attacks occurring.Keywords: operating system, security, stack overflow, buffer overflow, machine learning, control-flow enforcement technology
Procedia PDF Downloads 115420 Simulation of Laser Structuring by Three Dimensional Heat Transfer Model
Authors: Bassim Shaheen Bachy, Jörg Franke
Abstract:
In this study, a three dimensional numerical heat transfer model has been used to simulate the laser structuring of polymer substrate material in the Three-Dimensional Molded Interconnect Device (3D MID) which is used in the advanced multi-functional applications. A finite element method (FEM) transient thermal analysis is performed using APDL (ANSYS Parametric Design Language) provided by ANSYS. In this model, the effect of surface heat source was modeled with Gaussian distribution, also the effect of the mixed boundary conditions which consist of convection and radiation heat transfers have been considered in this analysis. The model provides a full description of the temperature distribution, as well as calculates the depth and the width of the groove upon material removal at different set of laser parameters such as laser power and laser speed. This study also includes the experimental procedure to study the effect of laser parameters on the depth and width of the removal groove metal as verification to the modeled results. Good agreement between the experimental and the model results is achieved for a wide range of laser powers. It is found that the quality of the laser structure process is affected by the laser scan speed and laser power. For a high laser structured quality, it is suggested to use laser with high speed and moderate to high laser power.Keywords: laser structuring, simulation, finite element analysis, thermal modeling
Procedia PDF Downloads 349419 Quantifying the Protein-Protein Interaction between the Ion-Channel-Forming Colicin A and the Tol Proteins by Potassium Efflux in E. coli Cells
Authors: Fadilah Aleanizy
Abstract:
Colicins are a family of bacterial toxins that kill Escherichia coli and other closely related species. The mode of action of colicins involves binding to an outer membrane receptor and translocation across the cell envelope, leading to cytotoxicity through specific targets. The mechanism of colicin cytotoxicity includes a non-specific endonuclease activity or depolarization of the cytoplasmic membrane by pore-forming activity. For Group A colicins, translocation requires an interaction between the N-terminal domain of the colicin and a series of membrane- bound and periplasmic proteins known as the Tol system (TolB, TolR, TolA, TolQ, and Pal and the active domain must be translocated through the outer membranes. Protein-protein interactions are intrinsic to virtually every cellular process. The transient protein-protein interactions of the colicin include the interaction with much more complicated assemblies during colicin translocation across the cellular membrane to its target. The potassium release assay detects variation in the K+ content of bacterial cells (K+in). This assays is used to measure the effect of pore-forming colicins such as ColA on an indicator organism by measuring the changes of the K+ concentration in the external medium (K+out ) that are caused by cell killing with a K+ selective electrode. One of the goals of this work is to employ a quantifiable in-vivo method to spot which Tol protein are more implicated in the interaction with colicin A as it is translocated to its target.Keywords: K+ efflux, Colicin A, Tol-proteins, E. coli
Procedia PDF Downloads 409418 Development of Biodegradable Plastic as Mango Fruit Bag
Authors: Andres M. Tuates Jr., Ofero A. Caparino
Abstract:
Plastics have achieved a dominant position in agriculture because of their transparency, lightness in weight, impermeability to water and their resistance to microbial attack. However, this generates a higher quantity of wastes that are difficult to dispose of by farmers. To address these problems, the project aim to develop and evaluate the biodegradable film for mango fruit bag during development. The PBS and starch were melt-blended in a twin-screw extruder and then blown into film extrusion machine. The physic-chemical-mechanical properties of biodegradable fruit bag were done following standard methods of test. Field testing of fruit bag was also conducted to evaluate its durability and efficiency field condition. The PHilMech-FiC fruit bag is made of biodegradable material measuring 6 x 8 inches with a thickness of 150 microns. The tensile strength is within the range of LDPE while the elongation is within the range of HDPE. It is projected that after thirty-six (36) weeks, the film will be totally degraded. Results of field testing show that the quality of harvested fruits using PHilMech-FiC biodegradable fruit bag in terms of percent marketable, non-marketable and export, peel color at the ripe stage, flesh color, TSS, oBrix, percent edible portion is comparable with the existing bagging materials such as Chinese brown paper bag and old newspaper.Keywords: cassava starch, PBS, biodegradable, chemical, mechanical properties
Procedia PDF Downloads 278417 Towards the Management of Cybersecurity Threats in Organisations
Authors: O. A. Ajigini, E. N. Mwim
Abstract:
Cybersecurity is the protection of computers, programs, networks, and data from attack, damage, unauthorised, unintended access, change, or destruction. Organisations collect, process and store their confidential and sensitive information on computers and transmit this data across networks to other computers. Moreover, the advent of internet technologies has led to various cyberattacks resulting in dangerous consequences for organisations. Therefore, with the increase in the volume and sophistication of cyberattacks, there is a need to develop models and make recommendations for the management of cybersecurity threats in organisations. This paper reports on various threats that cause malicious damage to organisations in cyberspace and provides measures on how these threats can be eliminated or reduced. The paper explores various aspects of protection measures against cybersecurity threats such as handling of sensitive data, network security, protection of information assets and cybersecurity awareness. The paper posits a model and recommendations on how to manage cybersecurity threats in organisations effectively. The model and the recommendations can then be utilised by organisations to manage the threats affecting their cyberspace. The paper provides valuable information to assist organisations in managing their cybersecurity threats and hence protect their computers, programs, networks and data in cyberspace. The paper aims to assist organisations to protect their information assets and data from cyberthreats as part of the contributions toward community engagement.Keywords: confidential information, cyberattacks, cybersecurity, cyberspace, sensitive information
Procedia PDF Downloads 259416 Hydrogeophysical Investigations of Groundwater Resources and Demarcation of Saltwater-Freshwater Interface in Kilwa Kisiwani Island, Se Tanzania
Authors: Simon R. Melchioly, Ibrahimu C. Mjemah, Isaac M. Marobhe
Abstract:
The main objective of this research was to identify new potential sources of groundwater resources using geophysical methods and also to demarcate the saltwater - freshwater interface. Kilwa Kisiwani Island geologically is covered mostly by Quaternary alluvial sediments, sand, and gravel. The geophysical techniques employed during the research include Vertical Electrical Sounding (VES), Earth Resistivity Tomography (ERT), and Transient Electromagnetics (TEM). Two-dimensional interpolated geophysical results show that there exist freshwater lenses formations that are potential aquifers on the Island with resistivity values ranging from 11.68 Ωm to 46.71 Ωm. These freshwater lenses are underlain by formation with brackish water in which the resistivity values are varying between 3.89 Ωm and 1.6 Ωm. Saltwater with resistivity less than 1 Ωm is found at the bottom being overlaid by brackish saturated formation. VES resistivity results show that 89% (16 out of 18) of the VES sites are potential for groundwater resources drilling while TEM results indicate that 75% (12 out of 16) of TEM sites are potential for groundwater borehole drilling. The recommended drilling depths for potential sites in Kilwa Kisiwani Island show that the maximum depth is 25 m and the minimum being 10 m below ground surface. The aquifer structure in Kilwa Kisiwani Island is a shallow, unconfined freshwater lenses floating above the seawater and the maximum thickness of the aquifer is 25 m for few selected VES and TEM sites while the minimum thickness being 10 m.Keywords: groundwater, hydrogeophysical, Kilwa Kisiwani, freshwater, saltwater, resistivity
Procedia PDF Downloads 200415 Detection of Elephant Endotheliotropic Herpes Virus in a Wild Asian Elephant Calf in Thailand by Using Real-Time PCR
Authors: Bopit Puyati, Anchittha Kaewchana, Nuntita Ruksachat
Abstract:
In January 2018, a male wild elephant, approximately 2 years old, was found dead in Phu Luang Wildlife Sanctuary, Loei province. The elephant was likely to die around 2 weeks earlier. The carcass was decayed without any signs of attack or bullet. No organs were removed. A deadly viral disease was suspected. Different organs including lung, liver, intestine and tongue were collected and submitted to the veterinary research and development center, Surin province for viral detection. The samples were then examined with real-time PCR for detecting U41 Major DNA binding protein (MDBP) gene and with conventional PCR for the presence of specific polymerase gene. We used tumor necrosis factor (TNF) gene as the internal control. In our real-time PCR, elephant endotheliotropic herpesvirus (EEHV) was recovered from lung, liver, and tongue whereas only tongue provided a positive result in the conventional PCR. All samples were positive with TNF gene detection. To our knowledge, this is the first report of EEHV detection in wild elephant in Thailand. EEHV surveillance in this wild population is strongly suggested. Linkage between EEHV in wild and domestic elephants should be further explored.Keywords: elephant endotheliotropic herpes virus, PCR, Thailand, wild Asian elephant
Procedia PDF Downloads 143414 Dynamic Analysis of the Heat Transfer in the Magnetically Assisted Reactor
Authors: Tomasz Borowski, Dawid Sołoducha, Rafał Rakoczy, Marian Kordas
Abstract:
The application of magnetic field is essential for a wide range of technologies or processes (i.e., magnetic hyperthermia, bioprocessing). From the practical point of view, bioprocess control is often limited to the regulation of temperature at constant values favourable to microbial growth. The main aim of this study is to determine the effect of various types of electromagnetic fields (i.e., static or alternating) on the heat transfer in a self-designed magnetically assisted reactor. The experimental set-up is equipped with a measuring instrument which controlled the temperature of the liquid inside the container and supervised the real-time acquisition of all the experimental data coming from the sensors. Temperature signals are also sampled from generator of magnetic field. The obtained temperature profiles were mathematically described and analyzed. The parameters characterizing the response to a step input of a first-order dynamic system were obtained and discussed. For example, the higher values of the time constant means slow signal (in this case, temperature) increase. After the period equal to about five-time constants, the sample temperature nearly reached the asymptotic value. This dynamical analysis allowed us to understand the heating effect under the action of various types of electromagnetic fields. Moreover, the proposed mathematical description can be used to compare the influence of different types of magnetic fields on heat transfer operations.Keywords: heat transfer, magnetically assisted reactor, dynamical analysis, transient function
Procedia PDF Downloads 171413 Context Aware Anomaly Behavior Analysis for Smart Home Systems
Authors: Zhiwen Pan, Jesus Pacheco, Salim Hariri, Yiqiang Chen, Bozhi Liu
Abstract:
The Internet of Things (IoT) will lead to the development of advanced Smart Home services that are pervasive, cost-effective, and can be accessed by home occupants from anywhere and at any time. However, advanced smart home applications will introduce grand security challenges due to the increase in the attack surface. Current approaches do not handle cybersecurity from a holistic point of view; hence, a systematic cybersecurity mechanism needs to be adopted when designing smart home applications. In this paper, we present a generic intrusion detection methodology to detect and mitigate the anomaly behaviors happened in Smart Home Systems (SHS). By utilizing our Smart Home Context Data Structure, the heterogeneous information and services acquired from SHS are mapped in context attributes which can describe the context of smart home operation precisely and accurately. Runtime models for describing usage patterns of home assets are developed based on characterization functions. A threat-aware action management methodology, used to efficiently mitigate anomaly behaviors, is proposed at the end. Our preliminary experimental results show that our methodology can be used to detect and mitigate known and unknown threats, as well as to protect SHS premises and services.Keywords: Internet of Things, network security, context awareness, intrusion detection
Procedia PDF Downloads 191412 The Evaluation of Children Who Had Chest Pain on Pediatric Emergency Department
Authors: Sabiha Sahin
Abstract:
Background: Chest pain is a common complaint in children visiting the emergency department (ED). True organic problems like cardiac disease are rare. We assess the etiology of chest pain among children visiting a Pediatric ED in Eskisehir Osmangazi University. Method: We prospectively evaluated of children with chest pain who visited our Pediatric ED between 1 January 2013 and 31 December 2014. Any case of trauma-associated chest pain was excluded from this study. Results: A total of 100 patients (54 boys, 46 girls), mean age: 11,86±3,51 (age range, 6–17 years) were enrolled into this study; 100 patients had chest radiograms (100 %). Pneumonia was identified in 15 patients. All patients had electrocardiogram study (100 %) and 16 of them showed abnormalities. Additional diagnostic tests were performed on all patients including complete blood count analysis, cardiac markers (CK-MB, Troponin I) and lactate (blood gas analysis). Echocardiograms were performed on all patients and 16 of them showed abnormality (five of majör abnormality). Panendoscopy was done in 20 patients, and gastroesophageal reflux was found in 12 (%12). Overall, idiopathic chest pain and myalgia was the most common diagnosis (32 %). Other associated disorders were asthma (12 %), panic attack (13 %). Conclusion: The most common cause of chest pain prompting a child to visit the ED is idiopathic chest pain. Careful physical examination can reveal important clues and save many unnecessary examinations.Keywords: child, chest pain, pediatric emergency department, evaluation
Procedia PDF Downloads 253411 A Novel PfkB Gene Cloning and Characterization for Expression in Potato Plants
Authors: Arfan Ali, Idrees Ahmad Nasir
Abstract:
Potato (Solanum tuberosum) is an important cash crop and popular vegetable in Pakistan and throughout the world. Cold storage of potatoes accelerates the conversion of starch into reduced sugars (glucose and fructose). This process causes dry mass and bitter taste in the potatoes that are not acceptable to end consumers. In the current study, the phosphofructokinase B gene was cloned into the pET-30 vector for protein expression and the pCambia-1301 vector for plant expression. Amplification of a 930bp product from an E. coli strain determined the successful isolation of the phosphofructokinase B gene. Restriction digestion using NcoI and BglII along with the amplification of the 930bp product using gene specific primers confirmed the successful cloning of the PfkB gene in both vectors. The protein was expressed as a His-PfkB fusion protein. Western blot analysis confirmed the presence of the 35 Kda PfkB protein when hybridized with anti-His antibodies. The construct Fani-01 was evaluated transiently using a histochemical gus assay. The appearance of blue color in the agroinfiltrated area of potato leaves confirmed the successful expression of construct Fani-01. Further, the area displaying gus expression was evaluated for PfkB expression using ELISA. Moreover, PfkB gene expression evaluated through transient expression determined successful gene expression and highlighted its potential utilization for stable expression in potato to reduce sweetening due to long-term storage.Keywords: potato, Solanum tuberosum, transformation, PfkB, anti-sweetening
Procedia PDF Downloads 472410 Analysis of the Effects of Vibrations on Tractor Drivers by Measurements With Wearable Sensors
Authors: Gubiani Rino, Nicola Zucchiatti, Da Broi Ugo, Bietresato Marco
Abstract:
The problem of vibrations in agriculture is very important due to the different types of machinery used for the different types of soil in which work is carried out. One of the most commonly used machines is the tractor, where the phenomenon has been studied for a long time by measuring the whole body and placing the sensor on the seat. However, this measurement system does not take into account the characteristics of the drivers, such as their body index (BMI), their gender (male, female) or the muscle fatigue they are subjected to, which is highly dependent on their age for example. The aim of the research was therefore to place sensors not only on the seat but along the spinal column to check the transmission of vibration on drivers with different BMI on different tractors and at different travel speeds and of different genders. The test was also done using wearable sensors such as a dynamometer applied to the muscles, the data of which was correlated with the vibrations produced by the tractor. Initial data show that even on new tractors with pneumatic seats, the vibrations attenuate little and are still correlated with the roughness of the track travelled and the forward speed. Another important piece of data are the root-mean square values referred to 8 hours (A(8)x,y,z) and the maximum transient vibration values (MTVVx,y,z) and, the latter, the MTVVz values were problematic (limiting factor in most cases) and always aggravated by the speed. The MTVVx values can be lowered by having a tyre-pressure adjustment system, able to properly adjust the tire pressure according to the specific situation (ground, speed) in which a tractor is operating.Keywords: fatigue, effect vibration on health, tractor driver vibrations, vibration, muscle skeleton disorders
Procedia PDF Downloads 71409 The Application of Insects in Forensic Investigations
Authors: Shirin Jalili, Hadi Shirzad, Samaneh Nabavi, Somayeh Khanjani
Abstract:
Forensic entomology is the science of study and analysis of insects evidences to aid in criminal investigation. Being aware of the distribution, biology, ecology and behavior of insects, which are founded at crime scene can provide information about when, where and how the crime has been committed. It has many application in criminal investigations. Its main use is estimation of the minimum time after death in suspicious death. The close association between insects and corpses and the use of insects in criminal investigations is the subject of forensic entomology. Because insects attack to the decomposing corpse and spawning on it from the initial stages. Forensic scientists can estimate the postmortem index by studying the insects population and the developing larval stages.In addition, toxicological and molecular studies of these insects can reveal the cause of death or even the identity of a victim. It also be used to detect drugs and poisons, and determination of incident location. Gathering robust entomological evidences is made possible for experts by recent Techniques. They can provide vital information about death, corpse movement or burial, submersion interval, time of decapitation, identification of specific sites of trauma, post-mortem artefacts on the body, use of drugs, linking a suspect to the scene of a crime, sexual molestations and the identification of suspects.Keywords: Forensic entomology, post mortem interval, insects, larvae
Procedia PDF Downloads 503408 Contribution of Crime Scene and Autopsy Investigation to the Solving of the Case in the Case of Death as a Result of Self-Harm
Authors: Murat Mert, Yusuf Ozer, Fatih Kolay
Abstract:
Behaviour of giving harm to the body in literature has been named as “self-injury”, “self-mutilation” ve “self-harm”. “Self-injury”, or “self-mutilation” is generally used for the same meaning and mentioned as an action which is committed to the body itself directly. As is seen that alcohol and drug users have injured their bodies because of deprivation, whereas behaviour of self-injury in some societies is accepted as religious and cultural, it has nevertheless been diagnosed in people who have a borderline personality disorder, histrionic personality disorder, psychotic personality disorder and mood disorder. There has not been any direct self-murder tendency in people having self-harmed. However, death cases can be seen together with loss of consciousness depending on loss of blood by exceeding the limit in the course of injury action. 34- year old – male person who was alcohol addicted, having had a psycological treatment beforehand, had mutilated his small intestine together with fatty tissue by cutting his body with a razor-blade at the thought of insects strolling around the body (delirium tremens) due to deprivation attack and had died in the result of various cuts. In this study, crime scene investigation and death mechanism of the person having had self-harmed in a result of abstinence syndrome will be explained. Relevant criteria which differentiate this case from homicide will be examined.Keywords: self-injury, autopsy, abstinence syndrome, CSI
Procedia PDF Downloads 94407 Soret and Dufour's Effects on Mixed Convection Unsteady MHD Boundary Layer Flow over a Stretching Sheet Embedded in a Porous Medium with Chemically Reactive Spices
Authors: Deva Kanta Phukan
Abstract:
An investigation is made to carry out to study the thermal-diffusion and diffusion thermo-effects in hydro-magnetic unsteady flow by a mixed convection boundary layer past an impermeable vertical stretching sheet embedded in a conducting fluid-saturated porous medium in the presence of a chemical reaction effect. The velocity of stretching surface, the surface temperature and the concentration are assumed to vary linearly with the distance along the surface. The governing partial differential equations are transformed in to self similar unsteady equations using similarity transformations and solved numerically by the Runge kutta fourth order scheme in association with the shooting method for the whole transient domain from the initial state to the final steady state flow. Numerical results for the velocity, temperature, the concentration, the skin friction , and the Nusselt and Sherwood numbers are shown graphically for various flow parameters. The results reveal that there is a smooth transition of flow from unsteady state to the final steady state. A special case of our results is in good agreement with an earlier published work.Keywords: heat and mass transfer, boundary layer flow, porous media, magnetic field, Soret number, Dufour’s number
Procedia PDF Downloads 445406 Investigation of the Inhibition Effect of 2,3-Diaminopyridine on Mild Steel Corrosion in Solution Simulating Water of Pores Concrete in Absence and Presence of Chloride Ions
Authors: Fatiha Benghanem, Mokhtar Berarma, Saida Keraghel, Ali Ourari
Abstract:
Corrosion is the result of the reaction between a material and its environment. Steel in concrete is protected from corrosion by a passive film promoted by concrete alkalinity. For the initiation of corrosion, this protective film must be destroyed and this can be mainly done in two ways: by the attack of chlorides on the steel or by carbonation of the cover concrete due the reaction with carbon dioxide, which causes reduction in the alkalinity of concrete. The literature reports several ways to decrease or to prevent reinforcement corrosion. Among them, the use of corrosion inhibitors has been an envisaged solution. Two approaches are generally used to evaluate the efficiency of inhibitors for concrete application; one uses simulated pore solution testing , and the other uses actual concrete or mortar specimens. Both methods are some times used in conjunction. The aim of this study is to investigate the use of 2,3-diaminopyridine as a corrosion inhibitors of steel in alkaline media which simulate the electrolyte in the concrete pores. The effectiveness of this compound as corrosion inhibitor was investigated by measuring the corrosion potentials, the polarization curves and the corrosion current densities of steel with and without chlorides. The study of corrosion inhibition by this compound led to the conclusion that he has low rates of inhibition in the absence of aggressive ions and high rates in their presence. This type of organic compounds are promoting for the protection of armatures in concrete.Keywords: corrosion, inhibitors, mild steel, conjunction
Procedia PDF Downloads 441405 Surface Pressure Distribution of a Flapped-Airfoil for Different Momentum Injection at the Leading Edge
Authors: Mohammad Mashud, S. M. Nahid Hasan
Abstract:
The aim of the research work is to modify the NACA 4215 airfoil with flap and rotary cylinder at the leading edge of the airfoil and experimentally study the static pressure distribution over the airfoil completed with flap and leading-edge vortex generator. In this research, NACA 4215 wing model has been constructed by generating the profile geometry using the standard equations and design software such as AutoCAD and SolidWorks. To perform the experiment, three wooden models are prepared and tested in subsonic wind tunnel. The experiments were carried out in various angles of attack. Flap angle and momentum injection rate are changed to observe the characteristics of pressure distribution. In this research, a new concept of flow separation control mechanism has been introduced to improve the aerodynamic characteristics of airfoil. Control of flow separation over airfoil which experiences a vortex generator (rotating cylinder) at the leading edge of airfoil is experimentally simulated under the effects of momentum injection. The experimental results show that the flow separation control is possible by the proposed mechanism, and benefits can be achieved by momentum injection technique. The wing performance is significantly improved due to control of flow separation by momentum injection method.Keywords: airfoil, momentum injection, flap, pressure distribution
Procedia PDF Downloads 140404 Computational Fluid Dynamics Simulation of Reservoir for Dwell Time Prediction
Authors: Nitin Dewangan, Nitin Kattula, Megha Anawat
Abstract:
Hydraulic reservoir is the key component in the mobile construction vehicles; most of the off-road earth moving construction machinery requires bigger side hydraulic reservoirs. Their reservoir construction is very much non-uniform and designers used such design to utilize the space available under the vehicle. There is no way to find out the space utilization of the reservoir by oil and validity of design except virtual simulation. Computational fluid dynamics (CFD) helps to predict the reservoir space utilization by vortex mapping, path line plots and dwell time prediction to make sure the design is valid and efficient for the vehicle. The dwell time acceptance criteria for effective reservoir design is 15 seconds. The paper will describe the hydraulic reservoir simulation which is carried out using CFD tool acuSolve using automated mesh strategy. The free surface flow and moving reference mesh is used to define the oil flow level inside the reservoir. The first baseline design is not able to meet the acceptance criteria, i.e., dwell time below 15 seconds because the oil entry and exit ports were very close. CFD is used to redefine the port locations for the reservoir so that oil dwell time increases in the reservoir. CFD also proposed baffle design the effective space utilization. The final design proposed through CFD analysis is used for physical validation on the machine.Keywords: reservoir, turbulence model, transient model, level set, free-surface flow, moving frame of reference
Procedia PDF Downloads 152403 A Functional Analysis of the 2016 United States Presidential Debates through the Application of the Functional Theory of Political Campaign Discourse
Authors: Maryam Vaezi
Abstract:
In this study, the Functional Theory of Political Campaign Discourse has been applied in order to investigate the 2016 Clinton-Trump presidential debates. All three kinds of utterances (acclaims, attacks, and defenses) were produced by the candidates supporting the usefulness of the Functional Theory of Political Campaign Discourse for the analysis of the presidential debates as a type of political discourse. Attacks comprised 45% of the candidates’ utterances, followed by acclaims at 33%; defenses were the least common function at 22%. The candidate from the Democratic Party, Hillary Clinton, acclaimed more, whereas the Republican Party presidential candidate, Donald Trump, attacked more. Simple denial was the most common form of defense used by the candidates. Both candidates directed more of their utterances to policy (past deeds, future plans, and general goals) than character (personal qualities, leadership abilities, and ideals). Analyzing debates in terms of the functions performed by the candidates to increase their desirability and chance of winning the election, can lead to a better understanding of these significant political events as well as other forms of political discourse.Keywords: acclaim, attack, defend, character, Democratic Party, Donald Trump, Hillary Clinton, policy, presidential debates, Republican Party
Procedia PDF Downloads 335402 Two-Stage Launch Vehicle Trajectory Modeling for Low Earth Orbit Applications
Authors: Assem M. F. Sallam, Ah. El-S. Makled
Abstract:
This paper presents a study on the trajectory of a two stage launch vehicle. The study includes dynamic responses of motion parameters as well as the variation of angles affecting the orientation of the launch vehicle (LV). LV dynamic characteristics including state vector variation with corresponding altitude and velocity for the different LV stages separation, as well as the angle of attack and flight path angles are also discussed. A flight trajectory study for the drop zone of first stage and the jettisoning of fairing are introduced in the mathematical modeling to study their effect. To increase the accuracy of the LV model, atmospheric model is used taking into consideration geographical location and the values of solar flux related to the date and time of launch, accurate atmospheric model leads to enhancement of the calculation of Mach number, which affects the drag force over the LV. The mathematical model is implemented on MATLAB based software (Simulink). The real available experimental data are compared with results obtained from the theoretical computation model. The comparison shows good agreement, which proves the validity of the developed simulation model; the maximum error noticed was generally less than 10%, which is a result that can lead to future works and enhancement to decrease this level of error.Keywords: launch vehicle modeling, launch vehicle trajectory, mathematical modeling, Matlab- Simulink
Procedia PDF Downloads 276401 Performance Analysis of Traffic Classification with Machine Learning
Authors: Htay Htay Yi, Zin May Aye
Abstract:
Network security is role of the ICT environment because malicious users are continually growing that realm of education, business, and then related with ICT. The network security contravention is typically described and examined centrally based on a security event management system. The firewalls, Intrusion Detection System (IDS), and Intrusion Prevention System are becoming essential to monitor or prevent of potential violations, incidents attack, and imminent threats. In this system, the firewall rules are set only for where the system policies are needed. Dataset deployed in this system are derived from the testbed environment. The traffic as in DoS and PortScan traffics are applied in the testbed with firewall and IDS implementation. The network traffics are classified as normal or attacks in the existing testbed environment based on six machine learning classification methods applied in the system. It is required to be tested to get datasets and applied for DoS and PortScan. The dataset is based on CICIDS2017 and some features have been added. This system tested 26 features from the applied dataset. The system is to reduce false positive rates and to improve accuracy in the implemented testbed design. The system also proves good performance by selecting important features and comparing existing a dataset by machine learning classifiers.Keywords: false negative rate, intrusion detection system, machine learning methods, performance
Procedia PDF Downloads 118400 Artificial Intelligence in Penetration Testing of a Connected and Autonomous Vehicle Network
Authors: Phillip Garrad, Saritha Unnikrishnan
Abstract:
The recent popularity of connected and autonomous vehicles (CAV) corresponds with an increase in the risk of cyber-attacks. These cyber-attacks have been instigated by both researchers or white-coat hackers and cyber-criminals. As Connected Vehicles move towards full autonomy, the impact of these cyber-attacks also grows. The current research details challenges faced in cybersecurity testing of CAV, including access and cost of the representative test setup. Other challenges faced are lack of experts in the field. Possible solutions to how these challenges can be overcome are reviewed and discussed. From these findings, a software simulated CAV network is established as a cost-effective representative testbed. Penetration tests are then performed on this simulation, demonstrating a cyber-attack in CAV. Studies have shown Artificial Intelligence (AI) to improve runtime, increase efficiency and comprehensively cover all the typical test aspects in penetration testing in other industries. There is an attempt to introduce similar AI models to the software simulation. The expectation from this implementation is to see similar improvements in runtime and efficiency for the CAV model. If proven to be an effective means of penetration test for CAV, this methodology may be used on a full CAV test network.Keywords: cybersecurity, connected vehicles, software simulation, artificial intelligence, penetration testing
Procedia PDF Downloads 110399 Numerical Simulation of Lifeboat Launching Using Overset Meshing
Authors: Alok Khaware, Vinay Kumar Gupta, Jean Noel Pederzani
Abstract:
Lifeboat launching from marine vessel or offshore platform is one of the important areas of research in offshore applications. With the advancement of computational fluid dynamic simulation (CFD) technology to solve fluid induced motions coupled with Six Degree of Freedom (6DOF), rigid body dynamics solver, it is now possible to predict the motion of the lifeboat precisely in different challenging conditions. Traditionally dynamic remeshing approach is used to solve this kind of problems, but remeshing approach has some bottlenecks to control good quality mesh in transient moving mesh cases. In the present study, an overset method with higher-order interpolation is used to simulate a lifeboat launched from an offshore platform into calm water, and volume of fluid (VOF) method is used to track free surface. Overset mesh consists of a set of overlapping component meshes, which allows complex geometries to be meshed with lesser effort. Good quality mesh with local refinement is generated at the beginning of the simulation and stay unchanged throughout the simulation. Overset mesh accuracy depends on the precise interpolation technique; the present study includes a robust and accurate least square interpolation method and results obtained with overset mesh shows good agreement with experiment.Keywords: computational fluid dynamics, free surface flow, lifeboat launching, overset mesh, volume of fluid
Procedia PDF Downloads 277398 Behavioral Responses of Coccinella septempunctata and Diaeretiella rapae toward Semiochemicals and Plant Extract
Authors: Muhammad Tariq, Bushra Siddique, Muhammad Naeem, Asim Gulzar
Abstract:
The chemical ecology of natural enemies can play a pivotal role in any Integrated Pest Management (IPM) program. Different chemical cues help to correspond in the diversity of associations between prey and host plant species. Coccinellaseptempunctata and Diaeretiellarapae have the abilities to explore several chemical cues released by plants under herbivore attack that may enhance their efficiency of foraging. In this study, the behavioral responses of Coccinellaseptempunctata and Diaeretiellarapae were examined under the application of two semiochemicals and a plant extract and their combinations using four-arm olfactometer. The bioassay was consists of a pairwise treatment comparison. Data pertaining to the preference of C. septempunctata and D. rapae after treatment application were recorded and analyzed statistically. The mean number of entries and time spent of Coccinellaseptempunctata and D. rapaewere greater in arms treated with E-β-Farnesene. However, the efficacy of E-β-Farnesene was enhanced when combined with β-pinene. Thus, the mean number of entries and time spent of C. septempunctata and D. rapaewere highest in arms treated with the combination of E-β-Farnesene x β-pinene as compared with other treatments. The current work has demonstrated that the insect-derived semiochemicals may enhance the efficacy of natural enemies when applied in combination.Keywords: olfectometer, parasitoid, predator, preference
Procedia PDF Downloads 145397 On the Use of Machine Learning for Tamper Detection
Authors: Basel Halak, Christian Hall, Syed Abdul Father, Nelson Chow Wai Kit, Ruwaydah Widaad Raymode
Abstract:
The attack surface on computing devices is becoming very sophisticated, driven by the sheer increase of interconnected devices, reaching 50B in 2025, which makes it easier for adversaries to have direct access and perform well-known physical attacks. The impact of increased security vulnerability of electronic systems is exacerbated for devices that are part of the critical infrastructure or those used in military applications, where the likelihood of being targeted is very high. This continuously evolving landscape of security threats calls for a new generation of defense methods that are equally effective and adaptive. This paper proposes an intelligent defense mechanism to protect from physical tampering, it consists of a tamper detection system enhanced with machine learning capabilities, which allows it to recognize normal operating conditions, classify known physical attacks and identify new types of malicious behaviors. A prototype of the proposed system has been implemented, and its functionality has been successfully verified for two types of normal operating conditions and further four forms of physical attacks. In addition, a systematic threat modeling analysis and security validation was carried out, which indicated the proposed solution provides better protection against including information leakage, loss of data, and disruption of operation.Keywords: anti-tamper, hardware, machine learning, physical security, embedded devices, ioT
Procedia PDF Downloads 153396 Synthesis and Characterization of Some New Diamines and Their Thermally Stable Polyimides
Authors: Zill-E-Huma, Humaira Siddiqi
Abstract:
This paper comprises of synthesis of thermally stable, mechanically strong polyimides. The polyimides were considered as most diverse class of polymers having unlimited applications. They were widely used as optical wave guides, in aerospace, for gas separation, as biomaterials and in electronics. Here the focus was to increase thermal stability and mechanical strength of polyimides. For this purpose two monomers were synthesized and were further polymerized via anhydrides to polyimides. The monomer diamines were synthesized by nucleophilic attack of aniline/2-fluoro aniline on hydroxy benzaldehydes. The two diamines synthesized were 3-(bis(4-aminophenyl) methyl) phenol (3OHDA) and 4-(bis(4-amino-3-fluorophenyl) methyl) phenol (2F4OHDA). These diamines were then reacted with dianhydrides to get polyimides. Two neat polyimides of both diamines with pyromellitic dianhydride (PMDA) and one neat polyimide of 4'-(Hexafluoroisopropylidene) diphthalic dianhydride (6FDA) with 3OHDA were synthesized. To compare the properties of synthesized polyimides like thermal stability, rigidity, flexibility, toughness etc. a commercial diamine oxydianiline (ODA) was used. Polyimides from oxydianiline were basically rigid. Nine different polyimide blends were synthesized from 3OHDA and commercial diamines ODA to have a better comparison of properties. TGA and mechanical testing results showed that with the increase in the percentage of 3OHDA in comparison to ODA the flexibility, toughness, strength of polyimide, thermal stability goes on increasing. So, synthesized diamines were responsible for improvement of properties of polyimides.Keywords: diamines, dianhydrides, oxydianiline, polyimides
Procedia PDF Downloads 303395 Durability of a Cementitious Matrix Based on Treated Sediments
Authors: Mahfoud Benzerzour, Mouhamadou Amar, Amine Safhi, Nor-Edine Abriak
Abstract:
Significant volumes of sediment are annually dredged in France and all over the world. These materials may, in fact, be used beneficially as supplementary cementitious material. This paper studies the durability of a new cement matrix based on marine dredged sediment of Dunkirk-Harbor (north of France). Several techniques are used to characterize the raw sediment such as physical properties, chemical analyses, and mineralogy. The XRD analysis revealed quartz, calcite, kaolinite as main mineral phases. In order to eliminate organic matter and activate some of those minerals, the sediment is calcined at a temperature of 850°C for 1h. Moreover, four blended mortars were formulated by mixing a portland cement (CEM I 52,5 N) and the calcined sediment as partial cement substitute (0%, 10%, 20% and 30%). Reference mortars, based on the blended cement, were then prepared. This re-use cannot be substantiating and efficient without a durability study. In this purpose, the following tests, mercury porosity, accessible water porosity, chloride permeability, freezing and thawing, external sulfate attack, alkali aggregates reaction, compressive and bending strength tests were conducted on those mortars. The results of most of those tests evidenced the fact that the mortar that contains 10% of the treated sediment is efficient and durable as the reference mortar itself. That would infer that the presence of these calcined sediment improves mortar general behavior.Keywords: sediment, characterization, calcination, substitution, durability
Procedia PDF Downloads 257394 Newborn Hearing Screening: Experience from a Center in South part of Iran
Authors: Marzieh Amiri, Zahra Iranpour Mobarakeh, Fatemeh Mehrbakhsh, Mehran Amiri
Abstract:
Introduction: Early diagnosis and intervention of congenital hearing loss is necessary to minimize the adverse effects of hearing loss. The aim of the present study was to report the results of newborn hearing screening in a centerin the south part of Iran, Fasa. Material and methods: In this study, the data related to 6,144 newbornsduring September 2018 up to September2021, was analyzed. Hearing screening was performed using transient evoked otoacoustic emissions (TEOAEs) and automated auditory brainstem response (AABR) tests. Results: From all 6144 newborns,3752 and 2392referred to the center from urban and rural part of Fasa, respectively. There were 2958 female and 3186 male in this study. Of 6144 newborns, 6098 ones passed the screening tests, and 46 neonates were referred to a diagnostic audiology clinic. Finally, nine neonates were diagnosed with congenital hearing loss (seven with sensorineural hearing loss and two with conductive hearing loss). The severity of all the hearing impaired neonates was moderate and above. The most important risk factors were family history of hearing loss, low gestational age, NICU hospitalization, and hyperbilirubinemia. Conclusion: Our results showed that the prevalence of hearing loss was 1.46 per 1000 infants. Boosting public knowledge by providing families with proper education appears to be helpful in preventing the negative effects of delayed implementation of health screening programs.Keywords: newborn hearing screening, hearing loss, risk factor, prevalence
Procedia PDF Downloads 162393 Value-Based Argumentation Frameworks and Judicial Moral Reasoning
Authors: Sonia Anand Knowlton
Abstract:
As the use of Artificial Intelligence is becoming increasingly integrated in virtually every area of life, the need and interest to logically formalize the law and judicial reasoning is growing tremendously. The study of argumentation frameworks (AFs) provides promise in this respect. AF’s provide a way of structuring human reasoning using a formal system of non-monotonic logic. P.M. Dung first introduced this framework and demonstrated that certain arguments must prevail and certain arguments must perish based on whether they are logically “attacked” by other arguments. Dung labelled the set of prevailing arguments as the “preferred extension” of the given argumentation framework. Trevor Bench-Capon’s Value-based Argumentation Frameworks extended Dung’s AF system by allowing arguments to derive their force from the promotion of “preferred” values. In VAF systems, the success of an attack from argument A to argument B (i.e., the triumph of argument A) requires that argument B does not promote a value that is preferred to argument A. There has been thorough discussion of the application of VAFs to the law within the computer science literature, mainly demonstrating that legal cases can be effectively mapped out using VAFs. This article analyses VAFs from a jurisprudential standpoint to provide a philosophical and theoretical analysis of what VAFs tell the legal community about the judicial reasoning, specifically distinguishing between legal and moral reasoning. It highlights the limitations of using VAFs to account for judicial moral reasoning in theory and in practice.Keywords: nonmonotonic logic, legal formalization, computer science, artificial intelligence, morality
Procedia PDF Downloads 74