Search results for: protocol analysis
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 28382

Search results for: protocol analysis

27632 Damage Detection in Beams Using Wavelet Analysis

Authors: Goutham Kumar Dogiparti, D. R. Seshu

Abstract:

In the present study, wavelet analysis was used for locating damage in simply supported and cantilever beams. Study was carried out varying different levels and locations of damage. In numerical method, ANSYS software was used for modal analysis of damaged and undamaged beams. The mode shapes obtained from numerical analysis is processed using MATLAB wavelet toolbox to locate damage. Effect of several parameters such as (damage level, location) on the natural frequencies and mode shapes were also studied. The results indicated the potential of wavelets in identifying the damage location.

Keywords: damage, detection, beams, wavelets

Procedia PDF Downloads 362
27631 Application Potential of Selected Tools in Context of Critical Infrastructure Protection and Risk Analysis

Authors: Hromada Martin

Abstract:

Risk analysis is considered as a fundamental aspect relevant for ensuring the level of critical infrastructure protection, where the critical infrastructure is seen as system, asset or its part which is important for maintaining the vital societal functions. Article actually discusses and analyzes the potential application of selected tools of information support for the implementation and within the framework of risk analysis and critical infrastructure protection. Use of the information in relation to their risk analysis can be viewed as a form of simplifying the analytical process. It is clear that these instruments (information support) for these purposes are countless, so they were selected representatives who have already been applied in the selected area of critical infrastructure, or they can be used. All presented fact were the basis for critical infrastructure resilience evaluation methodology development.

Keywords: critical infrastructure, protection, resilience, risk analysis

Procedia PDF Downloads 634
27630 Immersive and Non-Immersive Virtual Reality Applied to the Cervical Spine Assessment

Authors: Pawel Kiper, Alfonc Baba, Mahmoud Alhelou, Giorgia Pregnolato, Michela Agostini, Andrea Turolla

Abstract:

Impairment of cervical spine mobility is often related to pain triggered by musculoskeletal disorders or direct traumatic injuries of the spine. To date, these disorders are assessed with goniometers and inclinometers, which are the most popular devices used in clinical settings. Nevertheless, these technologies usually allow measurement of no more than two-dimensional range of motion (ROM) quotes in static conditions. Conversely, the wide use of motion tracking systems able to measure 3 to 6 degrees of freedom dynamically, while performing standard ROM assessment, are limited due to technical complexities in preparing the setup and high costs. Thus, motion tracking systems are primarily used in research. These systems are an integral part of virtual reality (VR) technologies, which can be used for measuring spine mobility. To our knowledge, the accuracy of VR measure has not yet been studied within virtual environments. Thus, the aim of this study was to test the reliability of a protocol for the assessment of sensorimotor function of the cervical spine in a population of healthy subjects and to compare whether using immersive or non-immersive VR for visualization affects the performance. Both VR assessments consisted of the same five exercises and random sequence determined which of the environments (i.e. immersive or non-immersive) was used as first assessment. Subjects were asked to perform head rotation (right and left), flexion, extension and lateral flexion (right and left side bending). Each movement was executed five times. Moreover, the participants were invited to perform head reaching movements i.e. head movements toward 8 targets placed along a circular perimeter each 45°, visualized one-by-one in random order. Finally, head repositioning movement was obtained by head movement toward the same 8 targets as for reaching and following reposition to the start point. Thus, each participant performed 46 tasks during assessment. Main measures were: ROM of rotation, flexion, extension, lateral flexion and complete kinematics of the cervical spine (i.e. number of completed targets, time of execution (seconds), spatial length (cm), angle distance (°), jerk). Thirty-five healthy participants (i.e. 14 males and 21 females, mean age 28.4±6.47) were recruited for the cervical spine assessment with immersive and non-immersive VR environments. Comparison analysis demonstrated that: head right rotation (p=0.027), extension (p=0.047), flexion (p=0.000), time (p=0.001), spatial length (p=0.004), jerk target (p=0.032), trajectory repositioning (p=0.003), and jerk target repositioning (p=0.007) were significantly better in immersive than non-immersive VR. A regression model showed that assessment in immersive VR was influenced by height, trajectory repositioning (p<0.05), and handedness (p<0.05), whereas in non-immersive VR performance was influenced by height, jerk target (p=0.002), head extension, jerk target repositioning (p=0.002), and by age, head flex/ext, trajectory repositioning, and weight (p=0.040). The results of this study showed higher accuracy of cervical spine assessment when executed in immersive VR. The assessment of ROM and kinematics of the cervical spine can be affected by independent and dependent variables in both immersive and non-immersive VR settings.

Keywords: virtual reality, cervical spine, motion analysis, range of motion, measurement validity

Procedia PDF Downloads 161
27629 Public Wi-Fi Security Threat Evil Twin Attack Detection Based on Signal Variant and Hop Count

Authors: Said Abdul Ahad Ahadi, Elyas Baray, Nitin Rakesh, Sudeep Varshney

Abstract:

Wi-Fi is a widely used internet source that is used to provide internet access in many areas such as Stores, Cafes, University campuses, Restaurants and so on. This technology brought more facilities in communication and networking. On the other hand, due to the transmission of data over the air, which makes the network vulnerable, so it becomes prone to various threats such as Evil Twin and etc. The Evil Twin is a kind of adversary which impersonates a legitimate access point (LAP) as it can happen by spoofing the name (SSID) and MAC address (BSSID) of a legitimate access point (LAP). And this attack can cause many threats such as MITM, Service Interruption, Access point service blocking. Various Evil Twin Attack Detection Techniques are proposed, but they require additional hardware, or they require protocol modification. In this paper, we proposed a new technique based on Access Point’s two fingerprints, Received Signal Strength Indicator (RSSI) and Hop Count, that is hard to copy by an adversary. And we implemented the technique in a system called “ETDetector,” which can detect and prevent the attack.

Keywords: evil twin, LAP, SSID, Wi-Fi security, signal variation, ETAD, kali linux, scapy, python

Procedia PDF Downloads 141
27628 Sentence vs. Keyword Content Analysis in Intellectual Capital Disclosures Study

Authors: Martin Surya Mulyadi, Yunita Anwar, Rosinta Ria Panggabean

Abstract:

Major transformations in economic activity from an agricultural economy to knowledge economy have led to an increasing focus on intellectual capital (IC) that has been characterized by continuous innovation, the spread of digital and communication technologies, intangible and human factors. IC is defined as the possession of knowledge and experience, professional knowledge and skill, proper relationships and technological capacities, which when applied will give organizations a competitive advantage. All of IC report/disclosure could be captured from the corporate annual report as it is a communication device that allows a corporation to connect with various external and internal stakeholders. This study was conducted using sentence-content analysis of IC disclosure in the annual report. This research aims to analyze whether the keyword-content analysis is reliable research methodology for IC disclosure related research.

Keywords: intellectual capital, intellectual capital disclosure, content analysis, annual report, sentence analysis, keyword analysis

Procedia PDF Downloads 365
27627 Application of Liquid Chromatographic Method for the in vitro Determination of Gastric and Intestinal Stability of Pure Andrographolide in the Extract of Andrographis paniculata

Authors: Vijay R. Patil, Sathiyanarayanan Lohidasan, K. R. Mahadik

Abstract:

Gastrointestinal stability of andrographolide was evaluated in vitro in simulated gastric (SGF) and intestinal (SIF) fluids using a validated HPLC-PDA method. The method was validated using a 5μm ThermoHypersil GOLD C18column (250 mm × 4.0 mm) and mobile phase consisting of water: acetonitrile; 70: 30 (v/v) delivered isocratically at a flow rate of 1 mL/min with UV detection at 228 nm. Andrographolide in pure form and extract Andrographis paniculata was incubated at 37°C in an incubator shaker in USP simulated gastric and intestinal fluids with and without enzymes. Systematic protocol as per FDA Guidance System was followed for stability study and samples were assayed at 0, 15, 30 and 60 min intervals for gastric and at 0, 15, 30, 60 min, 1, 2 and 3 h for intestinal stability study. Also, the stability study was performed up to 24 h to see the degradation pattern in SGF and SIF (with enzyme and without enzyme). The developed method was found to be accurate, precise and robust. Andrographolide was found to be stable in SGF (pH ∼ 1.2) for 1h and SIF (pH 6.8) up to 3 h. The relative difference (RD) of amount of drug added and found at all time points was found to be < 3%. The present study suggests that drug loss in the gastrointestinal tract takes place may be by membrane permeation rather than a degradation process.

Keywords: andrographolide, Andrographis paniculata, in vitro, stability, gastric, Intestinal HPLC-PDA

Procedia PDF Downloads 242
27626 Biological Activity of Mesenchymal Stem Cells in the Surface of Implants

Authors: Saimir Heta, Ilma Robo, Dhimiter Papakozma, Eduart Kapaj, Vera Ostreni

Abstract:

Introduction: The biocompatible materials applied to the implant surfaces are the target of recent literature studies. Methodologies: Modification of implant surfaces in different ways such as application of additional ions, surface microstructure change, surface or laser ultrasound alteration, or application of various substances such as recombinant proteins are among the most affected by articles published in the literature. The study is of review type with the main aim of finding the different ways that the mesenchymal cell reaction to these materials is, according to the literature, in the same percentage positive to the osteointegration process. Results: It is emphasized in the literature that implant success as a key evaluation key has more to implement implant treatment protocol ranging from dental health amenity and subsequent of the choice of implant type depending on the alveolar shape of the ridge level. Conclusions: Osteointegration is a procedure that should initially be physiologically independent of the type of implant pile material. With this physiological process, it can not "boast" for implant success or implantation depending on the brand of the selected implant, as the breadth of synthetic or natural materials that promote osteointegration is relatively large.

Keywords: mesenchymal cells, implants, review, biocompatible materials

Procedia PDF Downloads 84
27625 Vulnerability Assessment of Reinforced Concrete Frames Based on Inelastic Spectral Displacement

Authors: Chao Xu

Abstract:

Selecting ground motion intensity measures reasonably is one of the very important issues to affect the input ground motions selecting and the reliability of vulnerability analysis results. In this paper, inelastic spectral displacement is used as an alternative intensity measure to characterize the ground motion damage potential. The inelastic spectral displacement is calculated based modal pushover analysis and inelastic spectral displacement based incremental dynamic analysis is developed. Probability seismic demand analysis of a six story and an eleven story RC frame are carried out through cloud analysis and advanced incremental dynamic analysis. The sufficiency and efficiency of inelastic spectral displacement are investigated by means of regression and residual analysis, and compared with elastic spectral displacement. Vulnerability curves are developed based on inelastic spectral displacement. The study shows that inelastic spectral displacement reflects the impact of different frequency components with periods larger than fundamental period on inelastic structural response. The damage potential of ground motion on structures with fundamental period prolonging caused by structural soften can be caught by inelastic spectral displacement. To be compared with elastic spectral displacement, inelastic spectral displacement is a more sufficient and efficient intensity measure, which reduces the uncertainty of vulnerability analysis and the impact of input ground motion selection on vulnerability analysis result.

Keywords: vulnerability, probability seismic demand analysis, ground motion intensity measure, sufficiency, efficiency, inelastic time history analysis

Procedia PDF Downloads 350
27624 Requirement Analysis for Emergency Management Software

Authors: Tomáš Ludík, Jiří Barta, Sabina Chytilová, Josef Navrátil

Abstract:

Emergency management is a discipline of dealing with and avoiding risks. Appropriate emergency management software allows better management of these risks and has a direct influence on reducing potential negative impacts. Although there are several emergency management software products in the Czech Republic, they cover user requirements from the emergency management field only partially. Therefore, the paper focuses on the issues of requirement analysis within development of emergency management software. Analysis of the current state describes the basic features and properties of user requirements for software development as well as basic methods and approaches for gathering these requirements. Then, the paper presents more specific mechanisms for requirement analysis based on chosen software development approach: structured, object-oriented or agile. Based on these experiences it is designed new methodology for requirement analysis. Methodology describes how to map user requirements comprehensively in the field of emergency management and thus reduce misunderstanding between software analyst and emergency manager. Proposed methodology was consulted with department of fire brigade and also has been applied in the requirements analysis for their current emergency management software. The proposed methodology has general character and can be used also in other specific areas during requirement analysis.

Keywords: emergency software, methodology, requirement analysis, stakeholders, use case diagram, user stories

Procedia PDF Downloads 537
27623 An Architectural Model for APT Detection

Authors: Nam-Uk Kim, Sung-Hwan Kim, Tai-Myoung Chung

Abstract:

Typical security management systems are not suitable for detecting APT attack, because they cannot draw the big picture from trivial events of security solutions. Although SIEM solutions have security analysis engine for that, their security analysis mechanisms need to be verified in academic field. Although this paper proposes merely an architectural model for APT detection, we will keep studying on correlation analysis mechanism in the future.

Keywords: advanced persistent threat, anomaly detection, data mining

Procedia PDF Downloads 524
27622 Critical Analysis of Heat Exchanger Cycle for its Maintainability Using Failure Modes and Effect Analysis and Pareto Analysis

Authors: Sayali Vyas, Atharva Desai, Shreyas Badave, Apurv Kulkarni, B. Rajiv

Abstract:

The Failure Modes and Effect Analysis (FMEA) is an efficient evaluation technique to identify potential failures in products, processes, and services. FMEA is designed to identify and prioritize failure modes. It proves to be a useful method for identifying and correcting possible failures at its earliest possible level so that one can avoid consequences of poor performance. In this paper, FMEA tool is used in detection of failures of various components of heat exchanger cycle and to identify critical failures of the components which may hamper the system’s performance. Further, a detailed Pareto analysis is done to find out the most critical components of the cycle, the causes of its failures, and possible recommended actions. This paper can be used as a checklist which will help in maintainability of the system.

Keywords: FMEA, heat exchanger cycle, Ishikawa diagram, pareto analysis, RPN (Risk Priority Number)

Procedia PDF Downloads 399
27621 Symbol Synchronization and Resource Reuse Schemes for Layered Video Multicast Service in Long Term Evolution Networks

Authors: Chung-Nan Lee, Sheng-Wei Chu, You-Chiun Wang

Abstract:

LTE (Long Term Evolution) employs the eMBMS (evolved Multimedia Broadcast/Multicast Service) protocol to deliver video streams to a multicast group of users. However, it requires all multicast members to receive a video stream in the same transmission rate, which would degrade the overall service quality when some users encounter bad channel conditions. To overcome this problem, this paper provides two efficient resource allocation schemes in such LTE network: The symbol synchronization (S2) scheme assumes that the macro and pico eNodeBs use the same frequency channel to deliver the video stream to all users. It then adopts a multicast transmission index to guarantee the fairness among users. On the other hand, the resource reuse (R2) scheme allows eNodeBs to transmit data on different frequency channels. Then, by introducing the concept of frequency reuse, it can further improve the overall service quality. Extensive simulation results show that the S2 and R2 schemes can respectively improve around 50% of fairness and 14% of video quality as compared with the common maximum throughput method.

Keywords: LTE networks, multicast, resource allocation, layered video

Procedia PDF Downloads 387
27620 Deep Learning and Accurate Performance Measure Processes for Cyber Attack Detection among Web Logs

Authors: Noureddine Mohtaram, Jeremy Patrix, Jerome Verny

Abstract:

As an enormous number of online services have been developed into web applications, security problems based on web applications are becoming more serious now. Most intrusion detection systems rely on each request to find the cyber-attack rather than on user behavior, and these systems can only protect web applications against known vulnerabilities rather than certain zero-day attacks. In order to detect new attacks, we analyze the HTTP protocols of web servers to divide them into two categories: normal attacks and malicious attacks. On the other hand, the quality of the results obtained by deep learning (DL) in various areas of big data has given an important motivation to apply it to cybersecurity. Deep learning for attack detection in cybersecurity has the potential to be a robust tool from small transformations to new attacks due to its capability to extract more high-level features. This research aims to take a new approach, deep learning to cybersecurity, to classify these two categories to eliminate attacks and protect web servers of the defense sector which encounters different web traffic compared to other sectors (such as e-commerce, web app, etc.). The result shows that by using a machine learning method, a higher accuracy rate, and a lower false alarm detection rate can be achieved.

Keywords: anomaly detection, HTTP protocol, logs, cyber attack, deep learning

Procedia PDF Downloads 207
27619 Comparison between Pushover Analysis Techniques and Validation of the Simplified Modal Pushover Analysis

Authors: N. F. Hanna, A. M. Haridy

Abstract:

One of the main drawbacks of the Modal Pushover Analysis (MPA) is the need to perform nonlinear time-history analysis, which complicates the analysis method and time. A simplified version of the MPA has been proposed based on the concept of the inelastic deformation ratio. Furthermore, the effect of the higher modes of vibration is considered by assuming linearly-elastic responses, which enables the use of standard elastic response spectrum analysis. In this thesis, the simplified MPA (SMPA) method is applied to determine the target global drift and the inter-story drifts of steel frame building. The effect of the higher vibration modes is considered within the framework of the SMPA. A comprehensive survey about the inelastic deformation ratio is presented. After that, a suitable expression from literature is selected for the inelastic deformation ratio and then implemented in the SMPA. The estimated seismic demands using the SMPA, such as target drift, base shear, and the inter-story drifts, are compared with the seismic responses determined by applying the standard MPA. The accuracy of the estimated seismic demands is validated by comparing with the results obtained by the nonlinear time-history analysis using real earthquake records.

Keywords: modal analysis, pushover analysis, seismic performance, target displacement

Procedia PDF Downloads 360
27618 Failure Analysis and Fatigue Life Estimation of a Shaft of a Rotary Draw Bending Machine

Authors: B. Engel, Sara Salman Hassan Al-Maeeni

Abstract:

Human consumption of the Earth's resources increases the need for a sustainable development as an important ecological, social, and economic theme. Re-engineering of machine tools, in terms of design and failure analysis, is defined as steps performed on an obsolete machine to return it to a new machine with the warranty that matches the customer requirement. To understand the future fatigue behavior of the used machine components, it is important to investigate the possible causes of machine parts failure through design, surface, and material inspections. In this study, the failure modes of the shaft of the rotary draw bending machine are inspected. Furthermore, stress and deflection analysis of the shaft subjected to combined torsion and bending loads are carried out by an analytical method and compared with a finite element analysis method. The theoretical fatigue strength, correction factors, and fatigue life sustained by the shaft before damaged are estimated by creating a stress-cycle (S-N) diagram. In conclusion, it is seen that the shaft can work in the second life, but it needs some surface treatments to increase the reliability and fatigue life.

Keywords: failure analysis, fatigue life, FEM analysis, shaft, stress analysis

Procedia PDF Downloads 294
27617 Simultaneous Production of Forskolin and Rosmarinic Acid in vitro Cultures of Coleus Forskohlii Briq

Authors: Ennus Tajuddin Tamboli, Madhukar Garg, Mohd. Mujeeb, Sayeed Ahmad

Abstract:

An efficient protocol for simultaneous production of forskolin and rosmarinic acid in in vitro callus derived from the leaves of Coleus forskohlii Briq. has been developed. MS media was used for the establishment of cultures and NAA + 6-BA (1.0 ppm) was found best for callus growth. The callus was further subjected to treatment with various elicitor/precursors viz. chitosan, thidiazuron and methyl jasmonate to observe their effect on production of biomass and accumulation of secondary metabolites. The content of forskolin and rosmarinic acid were estimated by HPTLC, in comparison to natural explant which showed 2 fold and 10 fold rise in forskolin and rosmarinic acid content, respectively. Methy1 jasmonate 50 µM was found best for production of forskolin, whereas thidiazuron showed best results in the yield of rosmarinic acid, separately in static culture. However, combined treatment in suspension culture showed moderated effect for increase in secondary metabolites but the biomass increased significantly as compared to static culture.

Keywords: plant tissue culture, secondary metabolites, coleus, forskolin, rosmarinic acid, HPTLC

Procedia PDF Downloads 341
27616 A Proposed Approach for Emotion Lexicon Enrichment

Authors: Amr Mansour Mohsen, Hesham Ahmed Hassan, Amira M. Idrees

Abstract:

Document Analysis is an important research field that aims to gather the information by analyzing the data in documents. As one of the important targets for many fields is to understand what people actually want, sentimental analysis field has been one of the vital fields that are tightly related to the document analysis. This research focuses on analyzing text documents to classify each document according to its opinion. The aim of this research is to detect the emotions from text documents based on enriching the lexicon with adapting their content based on semantic patterns extraction. The proposed approach has been presented, and different experiments are applied by different perspectives to reveal the positive impact of the proposed approach on the classification results.

Keywords: document analysis, sentimental analysis, emotion detection, WEKA tool, NRC lexicon

Procedia PDF Downloads 440
27615 ArcGIS as a Tool for Infrastructure Documentation and Asset Management: Establishing a GIS for Computer Network Documentation

Authors: John Segars

Abstract:

Built out of a real-world need to have better, more detailed, asset and infrastructure documentation, this project will lay out the case for using the database functionality of ArcGIS as a tool to track and maintain infrastructure location, status, maintenance and serviceability. Workflows and processes will be presented and detailed which may be applied to an organizations’ infrastructure needs that might allow them to make use of the robust tools which surround the ArcGIS platform. The end result is a value-added information system framework with a geographic component e.g., the spatial location of various I.T. assets, a detailed set of records which not only documents location but also captures the maintenance history for assets along with photographs and documentation of these various assets as attachments to the numerous feature class items. In addition to the asset location and documentation benefits, the staff will be able to log into the devices and pull SNMP (Simple Network Management Protocol) based query information from within the user interface. The entire collection of information may be displayed in ArcGIS, via a JavaScript based web application or via queries to the back-end database. The project is applicable to all organizations which maintain an IT infrastructure but specifically targets post-secondary educational institutions where access to ESRI resources is generally already available in house.

Keywords: ESRI, GIS, infrastructure, network documentation, PostgreSQL

Procedia PDF Downloads 177
27614 Packet Fragmentation Caused by Encryption and Using It as a Security Method

Authors: Said Rabah Azzam, Andrew Graham

Abstract:

Fragmentation of packets caused by encryption applied on the network layer of the IOS model in Internet Protocol version 4 (IPv4) networks as well as the possibility of using fragmentation and Access Control Lists (ACLs) as a method of restricting network access to certain hosts or areas of a network.Using default settings, fragmentation is expected to occur and each fragment to be reassembled at the other end. If this does not occur then a high number of ICMP messages should be generated back towards the source host indicating that the packet is too large and that it needs to be made smaller. This result is also expected when the MTU is changed for certain links between devices.When using ACLs and packet fragments to restrict access to hosts or network segments it is possible that ACLs cannot be set up in this way. If ACLs cannot be setup to allow only fragments then it is a limitation of the hardware’s firmware holding back this particular method. If the ACL on the restricted switch can be set up in such a way to allow only fragments then a connection that forces packets to fragment should be allowed to pass through the ACL. This should then make a network connection to the destination machine allowing data to be sent to and from the destination machine. ICMP messages from the restricted access switch and host should also be blocked from being sent back across the link which will be shown in an SSH session into the switch.

Keywords: fragmentation, encryption, security, switch

Procedia PDF Downloads 331
27613 Scaling Analysis for the Liquefaction Phenomena Generated by Water Waves

Authors: E. Arcos, E. Bautista, F. Méndez

Abstract:

In this work, a scaling analysis of the liquefaction phenomena is presented. The characteristic scales are obtained by balancing term by term of the well-known partial dynamics governing equations, (U − P). From the above, the order of magnitude of the horizontal displacement is very smaller compared with the vertical displacement and therefore the governing equation is only a function of the dependent vertical variables. The U − P approximation is reduced and presented in its dimensionless version. This scaling analysis can be used to obtain analytical solutions of the liquefaction phenomena under the action of the water waves.

Keywords: approximation U-P, porous seabed, scaling analysis, water waves

Procedia PDF Downloads 347
27612 Trabecular Texture Analysis Using Fractal Metrics for Bone Fragility Assessment

Authors: Khaled Harrar, Rachid Jennane

Abstract:

The purpose of this study is the discrimination of 28 postmenopausal with osteoporotic femoral fractures from an age-matched control group of 28 women using texture analysis based on fractals. Two pre-processing approaches are applied on radiographic images; these techniques are compared to highlight the choice of the pre-processing method. Furthermore, the values of the fractal dimension are compared to those of the fractal signature in terms of the classification of the two populations. In a second analysis, the BMD measure at proximal femur was compared to the fractal analysis, the latter, which is a non-invasive technique, allowed a better discrimination; the results confirm that the fractal analysis of texture on calcaneus radiographs is able to discriminate osteoporotic patients with femoral fracture from controls. This discrimination was efficient compared to that obtained by BMD alone. It was also present in comparing subgroups with overlapping values of BMD.

Keywords: osteoporosis, fractal dimension, fractal signature, bone mineral density

Procedia PDF Downloads 418
27611 Electrocatalytic Amino Acid Synthesis from Biomass-Derivable Keto Acids over Ball-Milled Carbon Nanotubes

Authors: Yiying Xiao, Chia Wei Lim, Jinquan Chang, Qixin Yuan, Lei Wang, Ning Yan

Abstract:

Electrocatalytic reductive amination (ERA) offers an attractive way to make organonitrogen chemicals from renewable feedstock. Here, we report carbon nanotube (CNT) as an effective catalyst for the ERA of biomass-derivable α-keto acids into amino acids using NH₃ as the nitrogen source. Through a facile ball milling (BM) treatment, the intrinsic defects in the CNTs were increased while the electrocatalytic activity of CNTs converting 2-ketoglutaric acid into glutamic acid was enhanced by approximately seven times. A high Faradaic efficiency (FE) of ~90% with a corresponding glutamic acid formation rate up to 180.9 mmol•g⁻¹𝒸ₐₜt•h⁻¹ was achieved, and ~60% molar yield of glutamic acid was obtained after 8 h of electrolysis. Electrokinetic analyses indicate that the BM-CNTs catalysed ERA exhibits first-order dependences on the substrate and NH₃, with a rate-determining step (RDS) involving the first electron transfer. Following this protocol, a number of amino acids were prepared with moderate to high FEs and formation rates. Significantly, we synthesised long carbon chain amino acids, which typically face lower yields using the existing methods.

Keywords: amino acids, carbon nanotubes, electrocatalysis, reductive amination, α-keto acids

Procedia PDF Downloads 80
27610 Morphological Analysis of English L1-Persian L2 Adult Learners’ Interlanguage: From the Perspective of SLA Variation

Authors: Maassoumeh Bemani Naeini

Abstract:

Studies on interlanguage have long been engaged in describing the phenomenon of variation in SLA. Pursuing the same goal and particularly addressing the role of linguistic features, this study describes the use of Persian morphology in the interlanguage of two adult English-speaking learners of Persian L2. Taking the general approach of a combination of contrastive analysis, error analysis and interlanguage analysis, this study focuses on the identification and prediction of some possible instances of transfer from English L1 to Persian L2 across six elicitation tasks aiming to investigate whether any of contextual features may variably influence the learners’ order of morpheme accuracy in the areas of copula, possessives, articles, demonstratives, plural form, personal pronouns, and genitive cases.  Results describe the existence of task variation in the interlanguage system of Persian L2 learners.

Keywords: English L1, Interlanguage Analysis, Persian L2, SLA variation

Procedia PDF Downloads 314
27609 Cardiometabolic Risk Factors Responses to Supplemental High Intensity Exercise in Middle School Children

Authors: R. M. Chandler, A. J. Stringer

Abstract:

In adults, short bursts of high-intensity exercise (intensities between 80-95% of maximum heart rates) increase cardiovascular and metabolic function without the time investment of traditional aerobic training. Similar improvements in various health indices are also becoming increasingly evident in children in countries other than the United States. In the United States, physical education programs have become shorter in length and fewer in frequency. With this in the background, it is imperative that health and physical educators delivered well-organized and focused fitness programs that can be tolerated across many different somatotypes. Perhaps the least effective lag-time in a US physical education (PE) class is the first 10 minutes, a time during which children warm up. Replacing a traditional PE warmup with a 10 min high-intensity excise protocol is a time-efficient method to impact health, leaving as much time for other PE material such as skill development, motor behavior development as possible. This supplemented 10 min high-intensity exercise increases cardiovascular function as well as induces favorable body composition changes in as little as six weeks with further enhancement throughout a semester of activity. The supplemental high-intensity exercise did not detract from the PE lesson outcomes.

Keywords: cardiovascular fitness, high intensity interval training, high intensity exercise, pediatric

Procedia PDF Downloads 134
27608 Correlation between Nutritional Status and Length of Stay and Hospital Costs in Critical Care and IPD Patients of Somdech Phra Debaratana Medical Center (SDMC), Faculty of Medicine, Ramathibodi Hospital

Authors: Nuttapimon Bhirommuang, Kulapong Jayanama

Abstract:

Background: Prevalence of malnutrition in hospitalized patient is higher than general population. As a result of the unawareness of consequence and the more concerning in the other aspects of care, many patients with high risk of malnutrition are unrecognized. Even if malnutrition has been identified as affecting in many patient outcomes, the impact may differ in each population and group of patients. Objectives: The aims of this study were to examine the association between the nutritional status and the length of stay and hospital costs in hospitalized patients, to investigate the factors related these outcomes and to determine the frequency of malnutrition in hospitals. Method: This retrospective cohort study enrolled all patients aged 15 years old or older and admitted in SDMC, Ramathibodi Hospital between 1st January 2016 and 30th September 2016. The nutritional status assessment by Nutrition Alert Form (NAF) was performed by well-trained nurses in all patients at admission. Baseline characteristics were recorded. Length of stay and hospital costs were collected during their hospitalization. Univariate analysis, nonparametric rank test, Kruskal-Wallis test were used to compare means in the case of nonnormally and noncontinuously distributed data. Chi-square used to analyze categorical variables, the nutritional status and the length of stay and hospital costs and identify possible confounding factors (data were analyzed using SPSS version 18.0). Result: Of the 2,906 patients, 3.9% were severe malnutrition (NAF-C score > 10) and 11.4% were moderate malnutrition (NAF-B score 6 - 10). Both length of stay and hospital costs were found significantly higher in more severe malnutrition group (p < 0.001), NAF = A: 3.21 days, 95% CI 3.06-3.35 and 111,544.25 THB, 95% CI 106,994.41 – 116,094.1; NAF = B: 7.54 days, 95% CI 6.32 – 8.76 and 162,302.4 THB, 95% CI 129,557.88 – 195,046.92; NAF =C: 14.77 days, 95% CI 11.34 – 18.2 and 323,572.11 THB, 95% CI 226,958.1 – 420,096.13 (1 THB = 0.03019 USD). Age of each nutritional status group had also significant increase from NAF A to NAF C (p < 0.001): 55.07, 67.03 and 73.88 years old, respectively. Conclusion: The prevalence of malnutrition in Ramathibodi hospital is voluminous. Severe malnutrition screening by NAF is significantly correlated with worse clinical outcome, especially higher length of stay and hospital costs. Elderly is also a significant factor which correlates with malnutrition. The results of this study could change the awareness of health personnel and the practice protocol. Moreover, the further study concerning nutritional support in high-risk group of malnutrition is ongoing to confirm this hypothesis.

Keywords: malnutrition, NAF, length of stay, hospital costs

Procedia PDF Downloads 271
27607 Battling with Patriarchy: Political Sexuality and Gender Democracy in Nigeria

Authors: Lenshie, Nsemba Edward

Abstract:

This paper examines political sexuality as an identity construct, which imparts on democratic practices globally. The manifestation of political sexuality reflect on the dynamics of social, economic, cultural and political relations among different gender affecting a number of issues, such as the questions of citizenship, poverty alleviation, property rights, ownership and inheritance, rights to sexual consent, polygamous marriage, governance and representation among other issues. This paper is concerned with the aspect of political participation among different genders in Nigeria. This paper posit that political sexuality is an outcome of ‘sexuality differences’, which seeks to glorify and gratify the superiority of a particular sexuality over another. Political sexuality, therefore, motivate and exacerbate socio-cultural, economic, and political struggles among different sexualities. The paper asserts further that majority of women have been discriminated, sexually harassed, and are often denied certain rights and privileges in Nigeria. A few number of women who have found themselves at the corridors of government have used the Beijing protocol on Women to demand for ‘affirmative action’ to expand their political space. It contends that the ‘affirmative action’ in Nigeria is far from achieving it throughout the country. The paper conclude that women require more than just a ‘self-rediscovery’ to assertively demand for a more and proper inclusion in Nigeria’s democratic process.

Keywords: gender democracy, identity, politics, political sexuality

Procedia PDF Downloads 434
27606 The Effect of Computer-Mediated vs. Face-to-Face Instruction on L2 Pragmatics: A Meta-Analysis

Authors: Marziyeh Yousefi, Hossein Nassaji

Abstract:

This paper reports the results of a meta-analysis of studies on the effects of instruction mode on learning second language pragmatics during the last decade (from 2006 to 2016). After establishing related inclusion/ exclusion criteria, 39 published studies were retrieved and included in the present meta-analysis. Studies were later coded for face-to-face and computer-assisted mode of instruction. Statistical procedures were applied to obtain effect sizes. It was found that Computer-Assisted-Language-Learning studies generated larger effects than Face-to-Face instruction.

Keywords: meta-analysis, effect size, L2 pragmatics, comprehensive meta-analysis, face-to-face, computer-assisted language learning

Procedia PDF Downloads 216
27605 Characterization of a Mesenchymal Stem Cells Pool in Killian Nasal Polyp

Authors: Emanuela Chiarella, Clelia Nisticò, Nicola Lombardo, Giovanna Lucia Piazzetta, Nadia Lobello, Maria Mesuraca

Abstract:

Killian’s Antrochoanal Polyp is a benign lesion of the maxillary sinus characterized by unilateral nasal obstruction, pus discharge, and headache. It affects, more commonly children and young adults. Although its etiology still remains unclear, chronic inflammation, autoreactivity, allergies, and viral infections are strongly associated with its formation and development, resulting in nasal tissue remodeling. We aimed to investigate the stem cells components which reside in this pathological tissue. In particular, we adopted a protocol for the isolation and culturing of mesenchymal stem cells from surgical biopsies of three Killian nasal polyp patients (KNP-MSCs) as well as from their healthy nasal tissue (HNT-MSCs) that were used as controls. The immunophenotype profile of HNT-MSCs and KNP-MSCs was more similar, with a marked positivity for CD73, CD90, and CD105 expression, while being negative for CD34 and CD14 haematopoietic genes. Cell proliferation assay showed that KNP-MSCs had a replicative disadvantage compared to HNT-MSCs, as evidenced by the significantly lower number of cells in the S-phase of the cell cycle. KNP-MSCs also took longer to close a wound than HNT-MSCs, indicating a partial epithelial phenotype in which low levels of ICAM-1 mRNA and a significant increase in E-CAD transcript were detectable. Subsequently, the differentiation potential of both MSCs populations was analyzed by inducing osteoblastic or adipocyte differentiation for up to 20 days. KNP-MSCs showed the ability to differentiate into osteoblasts, although ALP activity as well as the number and size of calcium deposits were lower than osteogenic induced-HNT-MSCs. Also, mRNA levels of osteoblastic marker genes (OCN, OPN, OSX, RUNX2) resulted lower compared to control cell population. Instead, the analysis of the adipogenic differentiation potential showed a similar behavior between KNP-MSCs and HNT-MSCs considering that the amount of lipid droplets, the expression of adipocyte-specific genes (FABP4, AdipoQ, PPARγ2, LPL) and the content of triacylglycerols were almost overlapping. Taken together, these results first demonstrated that Killian's nasal polyp is a source of mesenchymal stem cells with self-renewal and multi-differentiative capabilities.

Keywords: Mesenchymal stem cells, adipogenic differentiation, osteogenic differentiation, EMT

Procedia PDF Downloads 75
27604 The Relation Between Social Capital and Trust with Social Network Analysis (SNA)

Authors: Safak Baykal

Abstract:

The purpose of this study is analyzing the relationship between self leadership and social capital of people with using Social Network Analysis. In this study, two aspects of social capital will be focused: bonding, homophilous social capital (BoSC) which implies better, strong, dense or closed network ties, and bridging, heterophilous social capital (BrSC) which implies weak ties, bridging the structural holes. The other concept of the study is Trust (Tr), namely interpersonal trust, willingness to ascribe good intentions to and have confidence in the words and actions of other people. In this study, the sample group, 61 people, was selected from a private firm from the defense industry. The relation between BoSC/BrSC and Tr is shown by using Social Network Analysis (SNA) and statistical analysis with Likert type-questionnaire. The results of the analysis show the Cronbach’s alpha value is 0.73 and social capital values (BoSC/BrSC) is highly correlated with Tr values of the people.

Keywords: bonding social capital, bridging social capital, trust, social network analysis (SNA)

Procedia PDF Downloads 525
27603 Comparison of Analytical Method and Software for Analysis of Flat Slab Subjected to Various Parametric Loadings

Authors: Hema V. Vanar, R. K. Soni, N. D. Shah

Abstract:

Slabs supported directly on columns without beams are known as Flat slabs. Flat slabs are highly versatile elements widely used in construction, providing minimum depth, fast construction and allowing flexible column grids. The main objective of this thesis is comparison of analytical method and soft ware for analysis of flat slab subjected to various parametric loadings. Study presents analysis of flat slab is performed under different types of gravity.

Keywords: fat slab, parametric load, analysis, software

Procedia PDF Downloads 489