Search results for: teaching methods
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 17257

Search results for: teaching methods

8677 Histopathological Features of Infections Caused by Fusarium equiseti (Mart.) Sacc. in Onion Plants from Kebbi State, Northern Nigeria

Authors: Wadzani Dauda Palnam, Alao S. Emmanuel Laykay, Afiniki Bawa Zarafi, Olufunmilola Alabi, Dora N. Iortsuun

Abstract:

Onion production is affected by several diseases including fusariosis. Study was conducted to investigate the histopathological features of different onion tissues infected with Fusarium equiseti by inoculation with soil drench, root dip and mycelia paste methods. This was carried out by fixation, dehydration, clearing, wax embedding, sectioning, staining and mounting of leaf and root sections for microscopical examination at 400x. Once infection occurred in the roots, the pathogen moved through the vascular system to colonize the whole plant. At first, it grew in the intercellular spaces of the root cortex but soon invaded the cells, followed by colonization of the cells by its hyphae and microconidia. At later stages of infection, the cortex tissue became completely disorganized and decomposed as the pathogen advance to the shoot system via the vessel elements; this may be responsible for the early wilting symptom of infected plants arising from the severe water stress due to blockage of the xylem tissues.

Keywords: onion, histopathology, infection, fusaria, inoculation

Procedia PDF Downloads 263
8676 Qualitative and Quantitative Assessment of Sexual Dysfunction in Primary Obesity through an Observational Study

Authors: Aravind Bagade Shankaranarayana, Parampalli Geetha, Pallavi Gupta

Abstract:

Objective: This study intends to evaluate sexual dysfunction qualitatively and quantitatively in males suffering from primary obesity through a single centered, observational study. Design and Methods: Sexual function of 33 obese males from the outpatient department of the hospital was assessed using IIEF questionnaire and semen analysis and the results were assessed for statistical significance. Results: A varying degree of sexual dysfunction was observed in four out of five areas of sexual functioning viz. erectile function (p<0.02), orgasmic function (p<0.02), sexual desire (p<0.08) and overall satisfaction (p<0.000) in obese individuals. Statistically significant dysfunction was not observed in intercourse satisfaction. Semen analysis was normal in 19 individuals (63.3%) and abnormal in 11 individuals (36.7%), with statistically insignificant p value 0.144, suggesting mild to moderate variation in semen parameters. Conclusions: Varying degree of sexual dysfunction is present in obese males, suggesting that obesity has a possible role in reducing the quality of sexual functioning in males as indicated in the classical Ayurvedic literature.

Keywords: erectile dysfunction, krucchra vyavaya, obesity, sthoulya

Procedia PDF Downloads 319
8675 Abortion Care Education in U.S. Accreditation Commission for Midwifery Education Certified Nurse Midwifery Programs: A Call For Expansion

Authors: Maggie Hall, Haley O'Neill

Abstract:

The U.S. faces a severe shortage of abortion providers, exacerbated by the June 2022 Dobbs v. Jackson Women’s Health Organization decision. Midwives, especially certified nurse midwives, are well-positioned to fill this gap in abortion care. However, a lack of clinical education and training prevents midwives from exercising their full scope of practice. National and international organizations that set obstetrics and midwifery education standards, including the International Confederation of Midwives, American College of Obstetricians and Gynecologists, and American Public Health Association, call for expansion of midwifery-managed abortion care through the first trimester. In the U.S., midwifery programs are accredited based on compliance with ACME standards and compliance is a prerequisite for the American Midwifery Certification Board exams. We conducted a literature review of studies in the last five years regarding abortion didactic and clinical education barriers via CINAHL, EBSCO and PubMed database reviews. We gave preference for primary sources within the last five years; however, due to the rapid changes in abortion education and access, we also included literature from 2012-2022. We evaluated ACME-accredited programs in relation to their geography within abortion-protected or restricted states and assessed state-specific barriers to abortion care education and provision as clinical students. There are 43 AMCB-accredited midwifery schools in 28 states across the U.S. Twenty schools (47%) are in the 15 states in which advanced practice clinicians can provide non-surgical abortion care, such as medication abortion and MVA procedures. Twenty-four schools (56%) are in the 16 states in which abortion care provision is restricted to Licensed Physicians and cannot offer in-state clinical training opportunities for midwifery students. Six schools are in the five states in which abortion is completely banned and are geographically concentrated in the southernmost region of the U.S., including Alabama, Kentucky, Louisiana, Tennessee, and Texas. Subsequently, these programs cannot offer in-state clinical training opportunities for midwifery students. Notably, there are seven ACME programs in six states that do not restrict abortion access by gestational age, including Colorado, Connecticut, Washington, D.C., New Jersey, New Mexico, and Oregon. These programs may be uniquely positioned for midwifery involvement in abortion care beyond the first trimester. While the following states don’t house ACME programs, abortion care can be provided by advanced practice clinicians in Rhode Island, Delaware, Hawaii, Maine, Maryland, Montana, New Hampshire, and Vermont, offering clinical placement and/or new ACME program development opportunities. We identify existing barriers to clinical education and training opportunities for midwifery-managed abortion care, which are both geographic and institutional in nature. We recommend expansion and standardization of clinical education and training opportunities for midwifery-managed abortion care in ACME-accredited programs to improve access to abortion care. Midwifery programs and teaching hospitals need to expand education, training, and residency opportunities for midwifery students to strengthen access to midwife-managed abortion care. ACNM and ACME should re-evaluate accreditation criteria and the implications of ACME programs in states where students are not able to learn abortion care in clinical contexts due to state-specific abortion restrictions.

Keywords: midwifery education, abortion, abortion education, abortion access

Procedia PDF Downloads 63
8674 Influence of Bacterial Biofilm on the Corrosive Processes in Electronic Equipment

Authors: Iryna P. Dzieciuch, Michael D. Putman

Abstract:

Humidity is known to degrade Navy ship electronic equipment, especially in hot moist environments. If left untreated, it can cause significant and permanent damage. Even rigorous inspection and frequent clean-up would not prevent further equipment contamination and degradation because of the constant presence of favorable growth conditions for many microorganisms. Generally, relative humidity levels of less than 60% will inhibit corrosion in electronic equipment, but because NAVY electronics often operate in hot and humid environments, prevention via dehumidification is not always possible. Currently, there is no defined research that fully describes key mechanisms which cause electronics and its coating degradation. The corrosive action of most bacteria is mainly developed through (i) mycelium adherence to the metal plates, (ii) facilitation the formation of pitting areas, (iii) production of organic acids such as citric, iso-citric, cis-aconitic, alpha-ketoglutaric, which are corrosive to electronic equipment and its components. Our approach studies corrosive action in electronic equipment: circuit-board, wires and connections that are exposed in the humid environment that gets worse during condensation. In our new approach the technical task is built on work with the bacterial communities in public areas, bacterial genetics, bioinformatics, biostatistics and Scanning Electron Microscopy (SEM) of corroded circuit boards. Based on these methods, we collect and examine environmental samples from biofilms of the corroded and non-corroded sites, where bacterial contamination of electronic equipment, such as machine racks and shore boats, is an ongoing concern. Sample collection and sample analysis is focused on addressing the key questions identified above through the following tasks: laboratory sample processing and evaluation under scanning electron microscopy, initial sequencing and data evaluation; bioinformatics and data analysis. Preliminary results from scanning electron microscopy (SEM) have revealed that metal particulates and alloys in corroded samples consists mostly of Tin ( < 40%), Silicon ( < 4%), Sulfur ( < 1%), Aluminum ( < 2%), Magnesium ( < 2%), Copper ( < 1%), Bromine ( < 2%), Barium ( <1%) and Iron ( < 2%) elements. We have also performed X 12000 magnification of the same sites and that proved existence of undisrupted biofilm organelles and crystal structures. Non-corrosion sites have revealed high presence of copper ( < 47%); other metals remain at the comparable level as on the samples with corrosion. We have performed X 1000 magnification on the non-corroded at the sites and have documented formation of copper crystals. The next step of this study, is to perform metagenomics sequencing at all sites and to compare bacterial composition present in the environment. While copper is nontoxic to the living organisms, the process of bacterial adhesion creates acidic environment by releasing citric, iso-citric, cis-aconitic, alpha-ketoglutaric acidics, which in turn release copper ions Cu++, which that are highly toxic to the bacteria and higher order living organisms. This phenomenon, might explain natural “antibiotic” properties that are lacking in elements such as tin. To prove or deny this hypothesis we will use next - generation sequencing (NGS) methods to investigate types and growth cycles of bacteria that from bacterial biofilm the on corrosive and non-corrosive samples.

Keywords: bacteria, biofilm, circuit board, copper, corrosion, electronic equipment, organic acids, tin

Procedia PDF Downloads 141
8673 Decision Tree Model for the Recommendation of Digital and Alternate Payment Methods for SMEs

Authors: Arturo J. Anci Alméstar, Jose D. Fernandez Huapaya, David Mauricio

Abstract:

Companies make erroneous decisions by not evaluating the inherent difficulties of entering electronic commerce without a prior review of current digital and alternate means of payment. For this reason, it is very important for businesses to have reliable, complete and integrated information on the means of current digital and alternate payments that allow decisions to be made about which of these to use. However, there is no such consolidated information or criteria that companies use to make decisions about the means of payment according to their needs. In this paper, we propose a decision tree model based on a taxonomy that presents us with a categorization of digital and alternative means of payment, as well as the visualization of the flow of information at a high level from the company to obtain a recommendation. This will allow the company to make the most appropriate decision about the implementation of the digital means of payment or alternative ideal for their needs, which allows a reduction in costs and complexity of the payment process. Likewise, the efficiency of the proposed model was evaluated through a satisfaction survey presented to company personnel, confirming the satisfactory quality level of the recommendations obtained by the model.

Keywords: digital payment medium, decision tree, decision making, digital payments taxonomy

Procedia PDF Downloads 162
8672 Forecast Based on an Empirical Probability Function with an Adjusted Error Using Propagation of Error

Authors: Oscar Javier Herrera, Manuel Angel Camacho

Abstract:

This paper addresses a cutting edge method of business demand forecasting, based on an empirical probability function when the historical behavior of the data is random. Additionally, it presents error determination based on the numerical method technique ‘propagation of errors’. The methodology was conducted characterization and process diagnostics demand planning as part of the production management, then new ways to predict its value through techniques of probability and to calculate their mistake investigated, it was tools used numerical methods. All this based on the behavior of the data. This analysis was determined considering the specific business circumstances of a company in the sector of communications, located in the city of Bogota, Colombia. In conclusion, using this application it was possible to obtain the adequate stock of the products required by the company to provide its services, helping the company reduce its service time, increase the client satisfaction rate, reduce stock which has not been in rotation for a long time, code its inventory, and plan reorder points for the replenishment of stock.

Keywords: demand forecasting, empirical distribution, propagation of error, Bogota

Procedia PDF Downloads 612
8671 LGG Architecture for Brain Tumor Segmentation Using Convolutional Neural Network

Authors: Sajeeha Ansar, Asad Ali Safi, Sheikh Ziauddin, Ahmad R. Shahid, Faraz Ahsan

Abstract:

The most aggressive form of brain tumor is called glioma. Glioma is kind of tumor that arises from glial tissue of the brain and occurs quite often. A fully automatic 2D-CNN model for brain tumor segmentation is presented in this paper. We performed pre-processing steps to remove noise and intensity variances using N4ITK and standard intensity correction, respectively. We used Keras open-source library with Theano as backend for fast implementation of CNN model. In addition, we used BRATS 2015 MRI dataset to evaluate our proposed model. Furthermore, we have used SimpleITK open-source library in our proposed model to analyze images. Moreover, we have extracted random 2D patches for proposed 2D-CNN model for efficient brain segmentation. Extracting 2D patched instead of 3D due to less dimensional information present in 2D which helps us in reducing computational time. Dice Similarity Coefficient (DSC) is used as performance measure for the evaluation of the proposed method. Our method achieved DSC score of 0.77 for complete, 0.76 for core, 0.77 for enhanced tumor regions. However, these results are comparable with methods already implemented 2D CNN architecture.

Keywords: brain tumor segmentation, convolutional neural networks, deep learning, LGG

Procedia PDF Downloads 167
8670 Internet of Things, Edge and Cloud Computing in Rock Mechanical Investigation for Underground Surveys

Authors: Esmael Makarian, Ayub Elyasi, Fatemeh Saberi, Olusegun Stanley Tomomewo

Abstract:

Rock mechanical investigation is one of the most crucial activities in underground operations, especially in surveys related to hydrocarbon exploration and production, geothermal reservoirs, energy storage, mining, and geotechnics. There is a wide range of traditional methods for driving, collecting, and analyzing rock mechanics data. However, these approaches may not be suitable or work perfectly in some situations, such as fractured zones. Cutting-edge technologies have been provided to solve and optimize the mentioned issues. Internet of Things (IoT), Edge, and Cloud Computing technologies (ECt & CCt, respectively) are among the most widely used and new artificial intelligence methods employed for geomechanical studies. IoT devices act as sensors and cameras for real-time monitoring and mechanical-geological data collection of rocks, such as temperature, movement, pressure, or stress levels. Structural integrity, especially for cap rocks within hydrocarbon systems, and rock mass behavior assessment, to further activities such as enhanced oil recovery (EOR) and underground gas storage (UGS), or to improve safety risk management (SRM) and potential hazards identification (P.H.I), are other benefits from IoT technologies. EC techniques can process, aggregate, and analyze data immediately collected by IoT on a real-time scale, providing detailed insights into the behavior of rocks in various situations (e.g., stress, temperature, and pressure), establishing patterns quickly, and detecting trends. Therefore, this state-of-the-art and useful technology can adopt autonomous systems in rock mechanical surveys, such as drilling and production (in hydrocarbon wells) or excavation (in mining and geotechnics industries). Besides, ECt allows all rock-related operations to be controlled remotely and enables operators to apply changes or make adjustments. It must be mentioned that this feature is very important in environmental goals. More often than not, rock mechanical studies consist of different data, such as laboratory tests, field operations, and indirect information like seismic or well-logging data. CCt provides a useful platform for storing and managing a great deal of volume and different information, which can be very useful in fractured zones. Additionally, CCt supplies powerful tools for predicting, modeling, and simulating rock mechanical information, especially in fractured zones within vast areas. Also, it is a suitable source for sharing extensive information on rock mechanics, such as the direction and size of fractures in a large oil field or mine. The comprehensive review findings demonstrate that digital transformation through integrated IoT, Edge, and Cloud solutions is revolutionizing traditional rock mechanical investigation. These advanced technologies have empowered real-time monitoring, predictive analysis, and data-driven decision-making, culminating in noteworthy enhancements in safety, efficiency, and sustainability. Therefore, by employing IoT, CCt, and ECt, underground operations have experienced a significant boost, allowing for timely and informed actions using real-time data insights. The successful implementation of IoT, CCt, and ECt has led to optimized and safer operations, optimized processes, and environmentally conscious approaches in underground geological endeavors.

Keywords: rock mechanical studies, internet of things, edge computing, cloud computing, underground surveys, geological operations

Procedia PDF Downloads 40
8669 Molecular Detection and Antibiotics Resistance Pattern of Extended-Spectrum Beta-Lactamase Producing Escherichia coli in a Tertiary Hospital in Enugu, Nigeria

Authors: I. N. Nwafia, U. C. Ozumba, M. E. Ohanu, S. O. Ebede

Abstract:

Antibiotic resistance is increasing globally and has become a major health challenge. Extended-spectrum beta-lactamase is clinically important because the ESBL gene are mostly plasmid encoded and these plasmids frequently carry genes encoding resistance to other classes of antimicrobials thereby limiting antibiotic options in the treatment of infections caused by these organisms. The specific objectives of this study were to determine the prevalence of ESBLs production in Escherichia coli, to determine the antibiotic susceptibility pattern of ESBLs producing Escherichia coli, to detect TEM, SHV and CTX-M genes and the risk factors to acquisition of ESBL producing Escherichia coli. The protocol of the study was approved by Health Research and Ethics committee of the University of Nigeria Teaching Hospital (UNTH), Enugu. It was a descriptive cross-sectional study that involved all hospitalized patients in UNTH from whose specimens Escherichia coli was isolated during the period of the study. The samples analysed were urine, wound swabs, blood and cerebrospinal fluid. These samples were cultured in 5% sheep Blood agar and MacConkey agar (Oxoid Laboratories, Cambridge UK) and incubated at 35-370C for 24 hours. Escherichia coli was identified with standard biochemical tests and confirmed using API 20E auxanogram (bioMerieux, Marcy 1'Etoile, France). The antibiotic susceptibility testing was done by disc diffusion method and interpreted according to the Clinical and Laboratory Standard Institute guideline. ESBL production was confirmed using ESBL Epsilometer test strips (Liofilchem srl, Italy). The ESBL bla genes were detected with polymerase chain reaction, after extraction of DNA with plasmid mini-prep kit (Jena Bioscience, Jena, Germany). Data analysis was with appropriate descriptive and inferential statistics. One hundred and six isolates (53.00%) out of the 200 were from urine, followed by isolates from different swabs specimens 53(26.50%) and the least number of the isolates 4(2.00) were from blood (P value = 0.096). Seventy (35.00%) out of the 200 isolates, were confirmed positive for ESBL production. Forty-two (60.00%) of the isolates were from female patients while 28(40.00%) were from male patients (P value = 0.13). Sixty-eight (97.14%) of the isolates were susceptible to imipenem while all of the isolates were resistant to ampicillin, chloramphenicol and tetracycline. From the 70 positive isolates the ESBL genes detected with polymerase chain reaction were blaCTX-M (n=26; 37.14%), blaTEM (n=7; 10.00%), blaSHV (n=2; 2.86%), blaCTX-M/TEM (n=7; 10.0%), blaCTX-M/SHV (n=14; 20.0%) and blaCTX-M/TEM/SHV (n=10; 14.29%). There was no gene detected in 4(5.71%) of the isolates. The most associated risk factors to infections caused by ESBL producing Escherichia coli was previous antibiotics use for the past 3 months followed by admission in the intensive care unit, recent surgery, and urinary catheterization. In conclusion, ESBLs was detected in 4 of every 10 Escherichia coli with the predominant gene detected being CTX-M. This knowledge will enable appropriate measures towards improvement of patient health care, antibiotic stewardship, research and infection control in the hospital.

Keywords: antimicrobial, Escherichia coli, extended spectrum beta lactamase, resistance

Procedia PDF Downloads 281
8668 Creating a Quasi-Folklore as a Tool for Knowledge Sharing in a Family-Based Business

Authors: Chico A. E. Hindarto

Abstract:

Knowledge management practices are more contextual when they combine with the corporate culture. Each entity has a specific cultural climate that enables knowledge sharing in both functional and individual levels. The interactions between people within organization can be influenced by the culture and how the knowledge is transmitted. On the other hand, these interactions have impacts in culture modification as well. Storytelling is one of the methods in delivering the knowledge throughout the organization. This paper aims to explore the possibility in using a quasi-folklore in the family-based business. Folklore is defined as informal tradition culture that spreading through a word-of-mouth, without knowing the source of the story. In this paper, the quasi-folklore term is used to differentiate it with the original term of folklore. The story is created by somebody in the organization, not like the folklore with unknown source. However, the source is not disclosed, in order to avoid the predicted interest from the story origin. The setting of family-based business is deliberately chosen, since the kinship is considerably strong in this type of entity. Through a thorough literature review that relates to knowledge management, storytelling, and folklore, this paper determines how folklore can be an option for knowledge sharing within the organization.

Keywords: folklore, family business, organizational culture, knowledge management, storytelling

Procedia PDF Downloads 268
8667 CT Images Based Dense Facial Soft Tissue Thickness Measurement by Open-source Tools in Chinese Population

Authors: Ye Xue, Zhenhua Deng

Abstract:

Objectives: Facial soft tissue thickness (FSTT) data could be obtained from CT scans by measuring the face-to-skull distances at sparsely distributed anatomical landmarks by manually located on face and skull. However, automated measurement using 3D facial and skull models by dense points using open-source software has become a viable option due to the development of computed assisted imaging technologies. By utilizing dense FSTT information, it becomes feasible to generate plausible automated facial approximations. Therefore, establishing a comprehensive and detailed, densely calculated FSTT database is crucial in enhancing the accuracy of facial approximation. Materials and methods: This study utilized head CT scans from 250 Chinese adults of Han ethnicity, with 170 participants originally born and residing in northern China and 80 participants in southern China. The age of the participants ranged from 14 to 82 years, and all samples were divided into five non-overlapping age groups. Additionally, samples were also divided into three categories based on BMI information. The 3D Slicer software was utilized to segment bone and soft tissue based on different Hounsfield Unit (HU) thresholds, and surface models of the face and skull were reconstructed for all samples from CT data. Following procedures were performed unsing MeshLab, including converting the face models into hollowed cropped surface models amd automatically measuring the Hausdorff Distance (referred to as FSTT) between the skull and face models. Hausdorff point clouds were colorized based on depth value and exported as PLY files. A histogram of the depth distributions could be view and subdivided into smaller increments. All PLY files were visualized of Hausdorff distance value of each vertex. Basic descriptive statistics (i.e., mean, maximum, minimum and standard deviation etc.) and distribution of FSTT were analysis considering the sex, age, BMI and birthplace. Statistical methods employed included Multiple Regression Analysis, ANOVA, principal component analysis (PCA). Results: The distribution of FSTT is mainly influenced by BMI and sex, as further supported by the results of the PCA analysis. Additionally, FSTT values exceeding 30mm were found to be more sensitive to sex. Birthplace-related differences were observed in regions such as the forehead, orbital, mandibular, and zygoma. Specifically, there are distribution variances in the depth range of 20-30mm, particularly in the mandibular region. Northern males exhibit thinner FSTT in the frontal region of the forehead compared to southern males, while females shows fewer distribution differences between the northern and southern, except for the zygoma region. The observed distribution variance in the orbital region could be attributed to differences in orbital size and shape. Discussion: This study provides a database of Chinese individuals distribution of FSTT and suggested opening source tool shows fine function for FSTT measurement. By incorporating birthplace as an influential factor in the distribution of FSTT, a greater level of detail can be achieved in facial approximation.

Keywords: forensic anthropology, forensic imaging, cranial facial reconstruction, facial soft tissue thickness, CT, open-source tool

Procedia PDF Downloads 48
8666 Comparison Of Data Mining Models To Predict Future Bridge Conditions

Authors: Pablo Martinez, Emad Mohamed, Osama Mohsen, Yasser Mohamed

Abstract:

Highway and bridge agencies, such as the Ministry of Transportation in Ontario, use the Bridge Condition Index (BCI) which is defined as the weighted condition of all bridge elements to determine the rehabilitation priorities for its bridges. Therefore, accurate forecasting of BCI is essential for bridge rehabilitation budgeting planning. The large amount of data available in regard to bridge conditions for several years dictate utilizing traditional mathematical models as infeasible analysis methods. This research study focuses on investigating different classification models that are developed to predict the bridge condition index in the province of Ontario, Canada based on the publicly available data for 2800 bridges over a period of more than 10 years. The data preparation is a key factor to develop acceptable classification models even with the simplest one, the k-NN model. All the models were tested, compared and statistically validated via cross validation and t-test. A simple k-NN model showed reasonable results (within 0.5% relative error) when predicting the bridge condition in an incoming year.

Keywords: asset management, bridge condition index, data mining, forecasting, infrastructure, knowledge discovery in databases, maintenance, predictive models

Procedia PDF Downloads 175
8665 A Self Organized Map Method to Classify Auditory-Color Synesthesia from Frontal Lobe Brain Blood Volume

Authors: Takashi Kaburagi, Takamasa Komura, Yosuke Kurihara

Abstract:

Absolute pitch is the ability to identify a musical note without a reference tone. Training for absolute pitch often occurs in preschool education. It is necessary to clarify how well the trainee can make use of synesthesia in order to evaluate the effect of the training. To the best of our knowledge, there are no existing methods for objectively confirming whether the subject is using synesthesia. Therefore, in this study, we present a method to distinguish the use of color-auditory synesthesia from the separate use of color and audition during absolute pitch training. This method measures blood volume in the prefrontal cortex using functional Near-infrared spectroscopy (fNIRS) and assumes that the cognitive step has two parts, a non-linear step and a linear step. For the linear step, we assume a second order ordinary differential equation. For the non-linear part, it is extremely difficult, if not impossible, to create an inverse filter of such a complex system as the brain. Therefore, we apply a method based on a self-organizing map (SOM) and are guided by the available data. The presented method was tested using 15 subjects, and the estimation accuracy is reported.

Keywords: absolute pitch, functional near-infrared spectroscopy, prefrontal cortex, synesthesia

Procedia PDF Downloads 249
8664 Improving the Performance of DBE Structure in Pressure Flushing Using Submerged Vanes

Authors: Sepideh Beiramipour, Hadi Haghjouei, Kourosh Qaderi, Majid Rahimpour, Mohammad M. Ahmadi, Sameh A. Kantoush

Abstract:

Reservoir sedimentation is one of the main challenges by which the reservoir behind the dam is filled with sediments transferred through the river flow. Pressure flushing method is an effective way to drain the deposited sediments of the reservoirs through the bottom outlet. So far, several structural methods have been proposed to increase the efficiency of pressure flushing. The aim of this study is to increase the performance of Dendritic Bottomless Extended (DBE) structure on the efficiency of pressurized sediment flushing using submerged vanes. For this purpose, the physical model of the dam reservoir with dimensions of 7.5 m in length, 3.5 m in width, and 1.8 m in height in the hydraulic and water structures research laboratory of Shahid Bahonar University of Kerman was used. In order to investigate the influence of submerged vanes on the performance of DBE structure in pressure flushing, the best arrangement and geometric parameters of the vanes were selected and combined with the DBE structure. The results showed that the submerged vanes significantly increased the performance of the DBE structure so that the volume of the sediment flushing cone with the combination of two structures increased by 3.7 times compared to the DBE structure test.

Keywords: dendritic bottomless extended structure, flushing efficiency, sedimentation, sediment flushing

Procedia PDF Downloads 204
8663 Presentation of a Mix Algorithm for Estimating the Battery State of Charge Using Kalman Filter and Neural Networks

Authors: Amin Sedighfar, M. R. Moniri

Abstract:

Determination of state of charge (SOC) in today’s world becomes an increasingly important issue in all the applications that include a battery. In fact, estimation of the SOC is a fundamental need for the battery, which is the most important energy storage in Hybrid Electric Vehicles (HEVs), smart grid systems, drones, UPS and so on. Regarding those applications, the SOC estimation algorithm is expected to be precise and easy to implement. This paper presents an online method for the estimation of the SOC of Valve-Regulated Lead Acid (VRLA) batteries. The proposed method uses the well-known Kalman Filter (KF), and Neural Networks (NNs) and all of the simulations have been done with MATLAB software. The NN is trained offline using the data collected from the battery discharging process. A generic cell model is used, and the underlying dynamic behavior of the model has used two capacitors (bulk and surface) and three resistors (terminal, surface, and end), where the SOC determined from the voltage represents the bulk capacitor. The aim of this work is to compare the performance of conventional integration-based SOC estimation methods with a mixed algorithm. Moreover, by containing the effect of temperature, the final result becomes more accurate. 

Keywords: Kalman filter, neural networks, state-of-charge, VRLA battery

Procedia PDF Downloads 176
8662 Trends in Practical Research on Universal Design for Learning (UDL) in Japanese Elementary Schools

Authors: Zolzaya Badmaavanchig, Shoko Miyamoto

Abstract:

In recent years, universal design for learning (hereinafter referred to as "UDL"), which aims to establish an inclusive education system and to make all children, regardless of their disabilities, experts in learning, has been attracting attention, and there have been some attempts to incorporate it into regular classrooms where children with developmental disabilities and those who show such tendencies are enrolled. The purpose of this study was to examine the effectiveness and challenges of implementing UDL in Japanese elementary schools based on the previous literature. As a method, we first searched for articles on UDL for learning and UDL in the classroom from 2010 to 2022. In addition, we selected practice studies that targeted children with special educational support needs and the classroom as a whole. In response to the extracted literature, this bridge examined the following five perspectives: (1) subjects and grades in which UDL was practiced, (2) methods to grasp the actual conditions of the children, (3) consideration for children with special needs during class, (4) form of class, and (5) effects of the practice. Based on the results, we would like to present issues related to future UDL efforts in Japanese elementary schools.

Keywords: universal design for learning, regular elementary school class, children with special education needs, special educational support

Procedia PDF Downloads 39
8661 Numerical Analysis of Internal Cooled Turbine Blade Using Conjugate Heat Transfer

Authors: Bhavesh N. Bhatt, Zozimus D. Labana

Abstract:

This work is mainly focused on the analysis of heat transfer of blade by using internal cooling method. By using conjugate heat transfer technology we can effectively compute the cooling and heat transfer analysis of blade. Here blade temperature is limited by materials melting temperature. By using CFD code, we will analyze the blade cooling with the help of CHT method. There are two types of CHT methods. In the first method, we apply coupled CHT method in which all three domains modeled at once, and in the second method, we will first model external domain and then, internal domain of cooling channel. Ten circular cooling channels are used as a cooling method with different mass flow rate and temperature value. This numerical simulation is applied on NASA C3X turbine blade, and results are computed. Here results are showing good agreement with experimental results. Temperature and pressure are high at the leading edge of the blade on stagnation point due to its first faces the flow. On pressure side, shock wave is formed which also make a sudden change in HTC and other parameters. After applying internal cooling, we are succeeded in reducing the metal temperature of blade by some extends.

Keywords: gas turbine, conjugate heat transfer, NASA C3X Blade, circular film cooling channel

Procedia PDF Downloads 311
8660 Aggregate Fluctuations and the Global Network of Input-Output Linkages

Authors: Alexander Hempfing

Abstract:

The desire to understand business cycle fluctuations, trade interdependencies and co-movement has a long tradition in economic thinking. From input-output economics to business cycle theory, researchers aimed to find appropriate answers from an empirical as well as a theoretical perspective. This paper empirically analyses how the production structure of the global economy and several states developed over time, what their distributional properties are and if there are network specific metrics that allow identifying structurally important nodes, on a global, national and sectoral scale. For this, the World Input-Output Database was used, and different statistical methods were applied. Empirical evidence is provided that the importance of the Eastern hemisphere in the global production network has increased significantly between 2000 and 2014. Moreover, it was possible to show that the sectoral eigenvector centrality indices on a global level are power-law distributed, providing evidence that specific national sectors exist which are more critical to the world economy than others while serving as a hub within the global production network. However, further findings suggest, that global production cannot be characterized as a scale-free network.

Keywords: economic integration, industrial organization, input-output economics, network economics, production networks

Procedia PDF Downloads 255
8659 SIF Computation of Cracked Plate by FEM

Authors: Sari Elkahina, Zergoug Mourad, Benachenhou Kamel

Abstract:

The main purpose of this paper is to perform a computations comparison of stress intensity factor 'SIF' evaluation in case of cracked thin plate with Aluminum alloy 7075-T6 and 2024-T3 used in aeronautics structure under uniaxial loading. This evaluation is based on finite element method with a virtual power principle through two techniques: the extrapolation and G−θ. The first one consists to extrapolate the nodal displacements near the cracked tip using a refined triangular mesh with T3 and T6 special elements, while the second, consists of determining the energy release rate G through G−θ method by potential energy derivation which corresponds numerically to the elastic solution post-processing of a cracked solid by a contour integration computation via Gauss points. The SIF obtained results from extrapolation and G−θ methods will be compared to an analytical solution in a particular case. To illustrate the influence of the meshing kind and the size of integration contour position simulations are presented and analyzed.

Keywords: crack tip, SIF, finite element method, concentration technique, displacement extrapolation, aluminum alloy 7075-T6 and 2024-T3, energy release rate G, G-θ method, Gauss point numerical integration

Procedia PDF Downloads 327
8658 3D Simulation of the Twin-Aperture IRON Superconducting Quadrupole for Charm-Tau Factory

Authors: K. K. Riabchenko, T. V Rybitskaya, A. A. Starostenko

Abstract:

Sper Charm-Tau Factory is a double ring e+e- collider to be operated in the center-of-mass energy range from 2 to 6 GeV, with a peak luminosity of about 1035 cm-2s-1 (Crab Waist collision) and with longitudinally polarized electrons at the IP (interaction point). One of the important elements of the cτ-factory is the superconducting two-aperture quadrupole of the final focus. It was decided to make a full-scale prototype quadrupole. The main objectives of our study included: 1) 3D modeling of the quadrupole in the Opera program, 2) Optimization of the geometry of the quadrupole lens, 3) Study of the influence of magnetic properties and geometry of a quadrupole on integral harmonics. In addition to this, the ways of producing unwanted harmonics have been studied. In the course of this work, a 3D model of a two-aperture iron superconducting quadrupole lens was created. A three-dimensional simulation of the magnetic field was performed, and the geometrical parameters of the lens were selected. Calculations helped to find sources of possible errors and methods for correcting unwanted harmonics. In addition to this, calculations show that there are no obstacles to the production of a prototype lens.

Keywords: super cτ-factory, final focus, twin aperture quadrupole lens, integral harmonics

Procedia PDF Downloads 109
8657 Integrating the Modbus SCADA Communication Protocol with Elliptic Curve Cryptography

Authors: Despoina Chochtoula, Aristidis Ilias, Yannis Stamatiou

Abstract:

Modbus is a protocol that enables the communication among devices which are connected to the same network. This protocol is, often, deployed in connecting sensor and monitoring units to central supervisory servers in Supervisory Control and Data Acquisition, or SCADA, systems. These systems monitor critical infrastructures, such as factories, power generation stations, nuclear power reactors etc. in order to detect malfunctions and ignite alerts and corrective actions. However, due to their criticality, SCADA systems are vulnerable to attacks that range from simple eavesdropping on operation parameters, exchanged messages, and valuable infrastructure information to malicious modification of vital infrastructure data towards infliction of damage. Thus, the SCADA research community has been active over strengthening SCADA systems with suitable data protection mechanisms based, to a large extend, on cryptographic methods for data encryption, device authentication, and message integrity protection. However, due to the limited computation power of many SCADA sensor and embedded devices, the usual public key cryptographic methods are not appropriate due to their high computational requirements. As an alternative, Elliptic Curve Cryptography has been proposed, which requires smaller key sizes and, thus, less demanding cryptographic operations. Until now, however, no such implementation has been proposed in the SCADA literature, to the best of our knowledge. In order to fill this gap, our methodology was focused on integrating Modbus, a frequently used SCADA communication protocol, with Elliptic Curve based cryptography and develop a server/client application to demonstrate the proof of concept. For the implementation we deployed two C language libraries, which were suitably modify in order to be successfully integrated: libmodbus (https://github.com/stephane/libmodbus) and ecc-lib https://www.ceid.upatras.gr/webpages/faculty/zaro/software/ecc-lib/). The first library provides a C implementation of the Modbus/TCP protocol while the second one offers the functionality to develop cryptographic protocols based on Elliptic Curve Cryptography. These two libraries were combined, after suitable modifications and enhancements, in order to give a modified version of the Modbus/TCP protocol focusing on the security of the data exchanged among the devices and the supervisory servers. The mechanisms we implemented include key generation, key exchange/sharing, message authentication, data integrity check, and encryption/decryption of data. The key generation and key exchange protocols were implemented with the use of Elliptic Curve Cryptography primitives. The keys established by each device are saved in their local memory and are retained during the whole communication session and are used in encrypting and decrypting exchanged messages as well as certifying entities and the integrity of the messages. Finally, the modified library was compiled for the Android environment in order to run the server application as an Android app. The client program runs on a regular computer. The communication between these two entities is an example of the successful establishment of an Elliptic Curve Cryptography based, secure Modbus wireless communication session between a portable device acting as a supervisor station and a monitoring computer. Our first performance measurements are, also, very promising and demonstrate the feasibility of embedding Elliptic Curve Cryptography into SCADA systems, filling in a gap in the relevant scientific literature.

Keywords: elliptic curve cryptography, ICT security, modbus protocol, SCADA, TCP/IP protocol

Procedia PDF Downloads 245
8656 Modified Genome-Scale Metabolic Model of Escherichia coli by Adding Hyaluronic Acid Biosynthesis-Related Enzymes (GLMU2 and HYAD) from Pasteurella multocida

Authors: P. Pasomboon, P. Chumnanpuen, T. E-kobon

Abstract:

Hyaluronic acid (HA) consists of linear heteropolysaccharides repeat of D-glucuronic acid and N-acetyl-D-glucosamine. HA has various useful properties to maintain skin elasticity and moisture, reduce inflammation, and lubricate the movement of various body parts without causing immunogenic allergy. HA can be found in several animal tissues as well as in the capsule component of some bacteria including Pasteurella multocida. This study aimed to modify a genome-scale metabolic model of Escherichia coli using computational simulation and flux analysis methods to predict HA productivity under different carbon sources and nitrogen supplement by the addition of two enzymes (GLMU2 and HYAD) from P. multocida to improve the HA production under the specified amount of carbon sources and nitrogen supplements. Result revealed that threonine and aspartate supplement raised the HA production by 12.186%. Our analyses proposed the genome-scale metabolic model is useful for improving the HA production and narrows the number of conditions to be tested further.

Keywords: Pasteurella multocida, Escherichia coli, hyaluronic acid, genome-scale metabolic model, bioinformatics

Procedia PDF Downloads 113
8655 Polynomial Chaos Expansion Combined with Exponential Spline for Singularly Perturbed Boundary Value Problems with Random Parameter

Authors: W. K. Zahra, M. A. El-Beltagy, R. R. Elkhadrawy

Abstract:

So many practical problems in science and technology developed over the past decays. For instance, the mathematical boundary layer theory or the approximation of solution for different problems described by differential equations. When such problems consider large or small parameters, they become increasingly complex and therefore require the use of asymptotic methods. In this work, we consider the singularly perturbed boundary value problems which contain very small parameters. Moreover, we will consider these perturbation parameters as random variables. We propose a numerical method to solve this kind of problems. The proposed method is based on an exponential spline, Shishkin mesh discretization, and polynomial chaos expansion. The polynomial chaos expansion is used to handle the randomness exist in the perturbation parameter. Furthermore, the Monte Carlo Simulations (MCS) are used to validate the solution and the accuracy of the proposed method. Numerical results are provided to show the applicability and efficiency of the proposed method, which maintains a very remarkable high accuracy and it is ε-uniform convergence of almost second order.

Keywords: singular perturbation problem, polynomial chaos expansion, Shishkin mesh, two small parameters, exponential spline

Procedia PDF Downloads 146
8654 Health, Social Integration and Social Justice: The Lived Experiences of Young Middle-Eastern Refugees in Australia

Authors: Pranee Liamputtong, Hala Kurban

Abstract:

Based on the therapeutic landscape theory, this paper examines how young Middle-Eastern refugee individuals perceive their health and well-being and address the barriers they face in their new homeland and the means that helped them to form social connections in their new social environment. Qualitative methods (in-depth interviews and mapping activities) were conducted with ten young people from refugee backgrounds. Thematic analysis method was used to analyse the data. Findings suggested that the young refugees face various structural and cultural inequalities that significantly influenced their health and well-being. Mental health well-being was their greatest health concern. All reported the significant influence the English language had on their ability to adapt and form connections with their social environment. The presence of positive social support in their new social environment had a great impact on the health and well-being of the participants. The findings of this study have implications for social justice among refugees. They also contributed to the role of therapeutic landscapes and social support in helping young refugees to feel that they belonged to the society, and hence assisted them to adapt to their new living situation.

Keywords: young refugees, Middle-Eastern, social support, social justice

Procedia PDF Downloads 339
8653 Energy Efficient Assessment of Energy Internet Based on Data-Driven Fuzzy Integrated Cloud Evaluation Algorithm

Authors: Chuanbo Xu, Xinying Li, Gejirifu De, Yunna Wu

Abstract:

Energy Internet (EI) is a new form that deeply integrates the Internet and the entire energy process from production to consumption. The assessment of energy efficient performance is of vital importance for the long-term sustainable development of EI project. Although the newly proposed fuzzy integrated cloud evaluation algorithm considers the randomness of uncertainty, it relies too much on the experience and knowledge of experts. Fortunately, the enrichment of EI data has enabled the utilization of data-driven methods. Therefore, the main purpose of this work is to assess the energy efficient of park-level EI by using a combination of a data-driven method with the fuzzy integrated cloud evaluation algorithm. Firstly, the indicators for the energy efficient are identified through literature review. Secondly, the artificial neural network (ANN)-based data-driven method is employed to cluster the values of indicators. Thirdly, the energy efficient of EI project is calculated through the fuzzy integrated cloud evaluation algorithm. Finally, the applicability of the proposed method is demonstrated by a case study.

Keywords: energy efficient, energy internet, data-driven, fuzzy integrated evaluation, cloud model

Procedia PDF Downloads 182
8652 Meta-Analysis of Exercise Interventions for Children and Adolescents Diagnosed with Pediatric Metabolic Syndrome

Authors: James M. Geidner

Abstract:

Objective: The purpose of this meta-analysis was to examine the evidence for the effectiveness of exercise interventions on reducing metabolic components in children and/or adolescents diagnosed with Paediatric Metabolic Syndrome. Methods: A computerized search was made from four databases: PubMed, PsycInfo, SPORTDiscus, Cochrane Central Register. The analysis was restricted to children and adolescents with metabolic syndrome examining the effect of exercise interventions on metabolic components. Effect size and 95% confidence interval were calculated and the heterogeneity of the studies was estimated using Cochran’s Q-statistic and I2. Bias was assessed using multiple tools and statistical analyses. Results: Thirteen studies, consisting of 19 separate trials, were selected for the meta-analysis as they fulfilled the inclusion criteria (n=908). Exercise interventions resulted in decreased waist circumference, systolic blood pressure, diastolic blood pressure, fasting glucose, insulin resistance, triglycerides, and High-Density Lipoprotein Cholesterol (HDL-C). Conclusions: This meta-analysis provides insights into the effectiveness of exercise interventions on markers of Paediatric Metabolic Syndrome in children and adolescents.

Keywords: metabolic syndrome, syndrome x, pediatric, meta-analysis

Procedia PDF Downloads 153
8651 Experimental and Analytical Dose Assessment of Patient's Family Members Treated with I-131

Authors: Marzieh Ebrahimi, Vahid Changizi, Mohammad Reza Kardan, Seyed Mahdi Hosseini Pooya, Parham Geramifar

Abstract:

Radiation exposure to the patient's family members is one of the major concerns during thyroid cancer radionuclide therapy. The aim of this study was to measure the total effective dose of the family members by means of thermoluminescence personal dosimeter, and compare with those calculated by analytical methods. Eighty-five adult family members of fifty-one patients volunteered to participate in this research study. Considering the minimum and maximum range of dose rate from 15 µsv/h to 120 µsv/h at patients' release time, the calculated mean and median dose values of family members were 0.45 mSv and 0.28 mSv, respectively. Moreover, almost all family members’ doses were measured to be less than the dose constraint of 5 mSv recommended by Basic Safety Standards. Considering the influence parameters such as patient dose rate and administrated activity, the total effective doses of family members were calculated by TEDE and NRC formulas and compared with those of experimental results. The results indicated that, it is fruitful to use the quantitative calculations for releasing patients treated with I-131 and correct estimation of patients' family doses.

Keywords: effective dose, thermoluminescence, I-131, thyroid cancer

Procedia PDF Downloads 381
8650 Use of computer and peripherals in the Archaeological Surveys of Sistan in Eastern Iran

Authors: Mahyar Mehrafarin, Reza Mehrafarin

Abstract:

The Sistan region in eastern Iran is a significant archaeological area in Iran and the Middle East, encompassing 10,000 square kilometers. Previous archeological field surveys have identified 1662 ancient sites dating from prehistoric periods to the Islamic period. Research Aim: This article aims to explore the utilization of modern technologies and computers in archaeological field surveys in Sistan, Iran, and the benefits derived from their implementation. Methodology: The research employs a descriptive-analytical approach combined with field methods. New technologies and software, such as GPS, drones, magnetometers, equipped cameras, satellite images, and software programs like GIS, Map source, and Excel, were utilized to collect information and analyze data. Findings: The use of modern technologies and computers in archaeological field surveys proved to be essential. Traditional archaeological activities, such as excavation and field surveys, are time-consuming and costly. Employing modern technologies helps in preserving ancient sites, accurately recording archaeological data, reducing errors and mistakes, and facilitating correct and accurate analysis. Creating a comprehensive and accessible database, generating statistics, and producing graphic designs and diagrams are additional advantages derived from the use of efficient technologies in archaeology. Theoretical Importance: The integration of computers and modern technologies in archaeology contributes to interdisciplinary collaborations and facilitates the involvement of specialists from various fields, such as geography, history, art history, anthropology, laboratory sciences, and computer engineering. The utilization of computers in archaeology spanned across diverse areas, including database creation, statistical analysis, graphics implementation, laboratory and engineering applications, and even artificial intelligence, which remains an unexplored area in Iranian archaeology. Data Collection and Analysis Procedures: Information was collected using modern technologies and software, capturing geographic coordinates, aerial images, archeogeophysical data, and satellite images. This data was then inputted into various software programs for analysis, including GIS, Map source, and Excel. The research employed both descriptive and analytical methods to present findings effectively. Question Addressed: The primary question addressed in this research is how the use of modern technologies and computers in archeological field surveys in Sistan, Iran, can enhance archaeological data collection, preservation, analysis, and accessibility. Conclusion: The utilization of modern technologies and computers in archaeological field surveys in Sistan, Iran, has proven to be necessary and beneficial. These technologies aid in preserving ancient sites, accurately recording archaeological data, reducing errors, and facilitating comprehensive analysis. The creation of accessible databases, statistics generation, graphic designs, and interdisciplinary collaborations are further advantages observed. It is recommended to explore the potential of artificial intelligence in Iranian archaeology as an unexplored area. The research has implications for cultural heritage organizations, archaeology students, and universities involved in archaeological field surveys in Sistan and Baluchistan province. Additionally, it contributes to enhancing the understanding and preservation of Iran's archaeological heritage.

Keywords: archaeological surveys, computer use, iran, modern technologies, sistan

Procedia PDF Downloads 63
8649 An Adaptive Hybrid Surrogate-Assisted Particle Swarm Optimization Algorithm for Expensive Structural Optimization

Authors: Xiongxiong You, Zhanwen Niu

Abstract:

Choosing an appropriate surrogate model plays an important role in surrogates-assisted evolutionary algorithms (SAEAs) since there are many types and different kernel functions in the surrogate model. In this paper, an adaptive selection of the best suitable surrogate model method is proposed to solve different kinds of expensive optimization problems. Firstly, according to the prediction residual error sum of square (PRESS) and different model selection strategies, the excellent individual surrogate models are integrated into multiple ensemble models in each generation. Then, based on the minimum root of mean square error (RMSE), the best suitable surrogate model is selected dynamically. Secondly, two methods with dynamic number of models and selection strategies are designed, which are used to show the influence of the number of individual models and selection strategy. Finally, some compared studies are made to deal with several commonly used benchmark problems, as well as a rotor system optimization problem. The results demonstrate the accuracy and robustness of the proposed method.

Keywords: adaptive selection, expensive optimization, rotor system, surrogates assisted evolutionary algorithms

Procedia PDF Downloads 129
8648 Integrating Distributed Architectures in Highly Modular Reinforcement Learning Libraries

Authors: Albert Bou, Sebastian Dittert, Gianni de Fabritiis

Abstract:

Advancing reinforcement learning (RL) requires tools that are flexible enough to easily prototype new methods while avoiding impractically slow experimental turnaround times. To match the first requirement, the most popular RL libraries advocate for highly modular agent composability, which facilitates experimentation and development. To solve challenging environments within reasonable time frames, scaling RL to large sampling and computing resources has proved a successful strategy. However, this capability has been so far difficult to combine with modularity. In this work, we explore design choices to allow agent composability both at a local and distributed level of execution. We propose a versatile approach that allows the definition of RL agents at different scales through independent, reusable components. We demonstrate experimentally that our design choices allow us to reproduce classical benchmarks, explore multiple distributed architectures, and solve novel and complex environments while giving full control to the user in the agent definition and training scheme definition. We believe this work can provide useful insights to the next generation of RL libraries.

Keywords: deep reinforcement learning, Python, PyTorch, distributed training, modularity, library

Procedia PDF Downloads 67