Search results for: adjusted structural number (SNP)
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 14166

Search results for: adjusted structural number (SNP)

5526 WSN System Warns Atta Cephalotes Climbing in Mango Fruit Trees

Authors: Federico Hahn Schlam, Fermín Martínez Solís

Abstract:

Leaf-cutting ants (Atta cephalotes) forage from mango tree leaves and flowers to feed their colony. Farmers find it difficult to control ants due to the great quantity of trees grown in commercial orchards. In this article, IoT can support farmers for ant detection in real time, as production losses can be considered of 324 US per tree.A wireless sensor network, WSN, was developed to warn the farmer from ant presence in trees during a night. Mango trees were gathered into groups of 9 trees, where the central tree holds the master microcontroller, and the other eight trees presented slave microcontrollers (nodes). At each node, anemitter diode-photodiode unitdetects ants climbing up. A capacitor is chargedand discharged after being sampled every ten minutes. The system usesBLE (Bluetooth Low Energy) to communicate between the master microcontroller by BLE.When ants were detected the number of the tree was transmitted via LoRa from the masterto the producer smartphone to warn him. In this paper, BLE, LoRa, and energy consumption were studied under variable vegetation in the orchard. During 2018, 19 trees were attacked by ants, and ants fed 26.3% of flowers and 73.7% of leaves.

Keywords: BLE, atta cephalotes, LoRa, WSN-smartphone, energy consumption

Procedia PDF Downloads 142
5525 Global LGBTQ+ Civic Engagement and Volunteerism: Research Insights and Future Directions

Authors: Trevor G. Gates

Abstract:

In global communities, volunteering is an important yet rapidly changing mechanism of civic engagement. However, the volunteer rate in the US significantly declined by as much as five percent during the last two decades, resulting in increased interest in what it takes to attract and recruit volunteers. Volunteers are utilized across a number of sectors, including working within the social welfare sector either with disadvantaged individuals and communities or indirectly through advocacy As with many mainstream community groups, lesbian, gay, bisexual, transgender, and queer+ (LGBTQ+) organizations actively rely on the contributions of volunteers. Consequently, community organizations must adopt strategies to attract and retain volunteers to continue to deliver their services and remain competitive. For LGBTQ+ organizations, this means an increased understanding of volunteers’ motivations and, in particular, LGBTQ+ volunteers, as they have historically been more involved due to ongoing stigmatization. In this paper, I reviewed existing literature in order to provide insights for non-profits who are managing volunteer resources for LGBTQ+ people by identifying important characteristics of LGBTQ+ volunteers and discussing what volunteering entails. Motivational factors are outlined, and the role of volunteerism in the LGBTQ+ community is explored. The benefits of volunteering and the needs of volunteers are discussed.

Keywords: volunteer, lesbian, gay, bisexual, transgender

Procedia PDF Downloads 78
5524 Searchable Encryption in Cloud Storage

Authors: Ren Junn Hwang, Chung-Chien Lu, Jain-Shing Wu

Abstract:

Cloud outsource storage is one of important services in cloud computing. Cloud users upload data to cloud servers to reduce the cost of managing data and maintaining hardware and software. To ensure data confidentiality, users can encrypt their files before uploading them to a cloud system. However, retrieving the target file from the encrypted files exactly is difficult for cloud server. This study proposes a protocol for performing multikeyword searches for encrypted cloud data by applying k-nearest neighbor technology. The protocol ranks the relevance scores of encrypted files and keywords, and prevents cloud servers from learning search keywords submitted by a cloud user. To reduce the costs of file transfer communication, the cloud server returns encrypted files in order of relevance. Moreover, when a cloud user inputs an incorrect keyword and the number of wrong alphabet does not exceed a given threshold; the user still can retrieve the target files from cloud server. In addition, the proposed scheme satisfies security requirements for outsourced data storage.

Keywords: fault-tolerance search, multi-keywords search, outsource storage, ranked search, searchable encryption

Procedia PDF Downloads 363
5523 Using the Nonlocal Theory of Free Vibrations Nanobeam

Authors: Ali Oveysi Sarabi

Abstract:

The dimensions of nanostructures are in the range of inter-atomic spacing of the structures which makes them impossible to be modeled as a continuum. Nanoscale size-effects on vibration analysis of nanobeams embedded in an elastic medium is investigated using different types of beam theory. To this end, Eringen’s nonlocal elasticity is incorporated to various beam theories namely as Euler-Bernoulli beam theory (EBT), Timoshenko beam theory (TBT), Reddy beam theory (RBT), and Levinson beam theory (LBT). The surrounding elastic medium is simulated with both Winkler and Pasternak foundation models and the difference between them is studies. Explicit formulas are presented to obtain the natural frequencies of nanobeam corresponding to each nonlocal beam theory. Selected numerical results are given for different values of the non-local parameter, Winkler modulus parameter, Pasternak modulus parameter and aspect ratio of the beam that imply the effects of them, separately. It is observed that the values of natural frequency are strongly dependent on the stiffness of elastic medium and the value of the non-local parameter and these dependencies varies with the value of aspect ratio and mode number.

Keywords: nanobeams, free vibration, nonlocal elasticity, winkler foundation model, Pasternak foundation model, beam theories

Procedia PDF Downloads 522
5522 Dendrimer-Encapsulated N, Pt Co-Doped TiO₂ for the Photodegration of Contaminated Wastewater

Authors: S. K. M. Nzaba, H. H. Nyoni, B. Ntsendwana, B. B. Mamba, A. T. Kuvarega

Abstract:

Azo dye effluents, released into water bodies are not only toxic to the ecosystem but also pose a serious impact on human health due to the carcinogenic and mutagenic effects of the compounds present in the dye discharge. Conventional water treatment methods such as adsorption, flocculation/coagulation and biological processes are not effective in completely removing most of the dyes and their natural degradation by-products. Advanced oxidation processes (AOPs) have proven to be effective technologies for complete mineralization of these recalcitrant pollutants. Therefore, there is a need for new technology that can solve the problem. Thus, this study examined the photocatalytic degradation of an azo dye brilliant black (BB) using non-metal/metal codoped TiO₂. N, Pt co-doped TiO₂ photocatalysts were prepared by a modified sol-gel method using amine-terminated polyamidoamine dendrimer generation 0 (PAMAM G0), amine-terminated polyamidoamine dendrimer generation 1 ( PAMAM G1) and hyperbranched polyethyleneimine (HPEI) as templates and source of nitrogen. Structural, morphological, and textural properties were evaluated using scanning electron microscopy coupled to energy dispersive X-ray spectroscopy (SEM/EDX), high-resolution transmission electron microscopy (HRTEM), X-ray diffraction spectroscopy (XRD), X-ray photoelectron spectroscopy (XPS), thermal gravimetric analysis (TGA), Fourier- transform infrared (FTIR), Raman spectroscopy (RS), photoluminescence (PL) and ultra-violet /visible spectroscopy (UV-Vis). The synthesized photocatalysts exhibited lower band gap energies as compared to the Degussa P-25 revealing a red shift in band gap towards the visible light absorption region. Photocatalytic activity of N, Pt co-doped TiO₂ was measured by the reaction of photocatalytic degradation of brilliant black (BB) dye. The N, metal codoped TiO₂ containing 0.5 wt. % of the metal consisted mainly of the anatase phase as confirmed by XRD results of all three samples, with a particle size range of 13–30 nm. The particles were largely spherical and shifted the absorption edge well into the visible region. Band gap reduction was more pronounced for the N, Pt HPEI (Pt 0.5 wt. %) codoped TiO₂ compared to PAMAM G0 and PAMAM G1. Consequently, codoping led to an enhancement in the photocatalytic activity of the materials for the degradation of brilliant black (BB).

Keywords: codoped TiO₂, dendrimer, photodegradation, wastewater

Procedia PDF Downloads 158
5521 Deep Learning and Accurate Performance Measure Processes for Cyber Attack Detection among Web Logs

Authors: Noureddine Mohtaram, Jeremy Patrix, Jerome Verny

Abstract:

As an enormous number of online services have been developed into web applications, security problems based on web applications are becoming more serious now. Most intrusion detection systems rely on each request to find the cyber-attack rather than on user behavior, and these systems can only protect web applications against known vulnerabilities rather than certain zero-day attacks. In order to detect new attacks, we analyze the HTTP protocols of web servers to divide them into two categories: normal attacks and malicious attacks. On the other hand, the quality of the results obtained by deep learning (DL) in various areas of big data has given an important motivation to apply it to cybersecurity. Deep learning for attack detection in cybersecurity has the potential to be a robust tool from small transformations to new attacks due to its capability to extract more high-level features. This research aims to take a new approach, deep learning to cybersecurity, to classify these two categories to eliminate attacks and protect web servers of the defense sector which encounters different web traffic compared to other sectors (such as e-commerce, web app, etc.). The result shows that by using a machine learning method, a higher accuracy rate, and a lower false alarm detection rate can be achieved.

Keywords: anomaly detection, HTTP protocol, logs, cyber attack, deep learning

Procedia PDF Downloads 194
5520 CMT4G: Rare Form of Charcot-Marie-Tooth Disease in Slovak Roma Patient

Authors: Dana Gabriková, Martin Mistrík, Jarmila Bernasovská, Iveta Tóthová, Jana Kisková

Abstract:

The Roma (Gypsies) is a transnational minority with a high degree of consanguineous marriages. Similar to other genetically isolated founder populations, the Roma harbor a number of unique or rare genetic disorders. This paper discusses about a rare form of Charcot-Marie-Tooth disease – type 4G (CMT4G), also called Hereditary Motor and Sensory Neuropathy type Russe, an autosomal recessive disease caused by mutation private to Roma characterized by abnormally increased density of non-myelinated axons. CMT4G was originally found in Bulgarian Roma and in 2009 two putative causative mutations in the HK1 gene were identified. Since then, several cases were reported in Roma families mainly from Bulgaria and Spain. Here we present a Slovak Roma family in which CMT4G was diagnosed on the basis of clinical examination and genetic testing. This case is a further proof of the role of the HK1 gene in pathogenesis of the disease. It confirms that mutation in the HK1 gene is a common cause of autosomal recessive CMT disease in Roma and should be considered as a common part of a diagnostic procedure.

Keywords: gypsies, HK1, HSMN-Russe, rare disease

Procedia PDF Downloads 370
5519 Control of IL-23 Release in Dendritic Cells Protects Mice from Imiquimod-Induced Psoriasis

Authors: Xingxin Wu, Fenli Shao, Tao Tan, Yang Tan, Yang Sun, Qiang Xu

Abstract:

Psoriasis is a chronic inflammatory skin disease that affects about 2% of the world's population. IL-23 signaling plays a key role in the pathogenesis of psoriasis. Control of IL-23 release by small molecule compounds during developing psoriasis has not been well established. Here, we show that compound 1, a small molecule nature product, protected mice from imiquimod-induced psoriasis with improved skin lesions, reduced skin thickness, and reduced IL-23 mRNA expression in the skin tissue. FACS results showed compound 1 reduced the number of dendritic cells in the skin. Interestingly, compound 1 was not able to ameliorate IL-23-induced psoriasis-like skin inflammation in mice. Further, compound 1 inhibited MyD88-dependent IL-23 mRNA expression induced by LPS, CpG and imiquimod in BMDC cells, but not MyD88-independent CD80 and CD86 expression induced by LPS. The methods included real-time PCR, western blot, H & E staining, FACS and ELISA et al. In conclusion, compound 1 regulates MyD88-dependent signaling to control IL-23 release in dendritic cells, which improves imiquimod-induced psoriasis.

Keywords: dendritic cells, IL-23, toll-like receptor signaling, psoriasis

Procedia PDF Downloads 630
5518 Synthesis and Analgesic activity of 2-(p-Substituted phenyl)-3-[4-(N-Substituted amino) methyl-2-oxo indoilin-3-ylidene]benzenesulfonyl Quinazolin-4(3H)-One Derivatives

Authors: N. Gopal, K. Jaasminerjiit, L. Z. Xiang

Abstract:

Quinazoline-4(3H)-one ring system has been consistently regarded as promising privileged structural icon owing to its pharmacodynamic versatility in many of its synthetic derivatives as well as in several naturally occurring alkaloids. The literature reveals that 2nd & 3rd positions of the quinazolin-4(3H)-one pharmacophore are the target for substitution with other moieties. On the other hand, sulphanilamide derivatives and isatin moiety also displayed valuable biological activities. Hence, it was thought worthwhile to study the effects of three pharmacophoric moieties like quinazolinone, sulphanilamide and isatin in a single molecule for the better analgesic activity with lower toxicity. Series of novel 2,3-disubstituted quinazolin-4(3H)-one derivatives have been synthesised from the intermediate Schiff base of 2-(4’-substitutedphenyl)-3-[(N-2-oxoindolin-3-ylidene)-4”-sulphonamidophenyl]-quinazolin-4(3H)-one derivatives, which was prepared from reacting 2-(substituted phenyl)-4H-benzo[d][1,3]-oxazin-4-one with sulphanilamide. The required benzoxazinone derivatives were prepared by reacting anthranilic acid with benzoyl chloride. All the compounds structure was characterised by using H1 NMR, IR and Mass spectroscopy. The intermediate Schiff base and final Mannich base compounds were evaluated for their analgesic activity by acetic acid-induced writhing method at the dose of 25mg/kg, 50 mg/kg, and 100 mg/kg (bw) and Diclofenac (25mg/kg of body weight) will be used as the reference drugs. From the results of the study, it has been observed that final Mannich base showed a better analgesic activity when compared to the parent Schiff bases, it was found that compound substituted with N-methyl piperazine at 1st position of the indole nucleus of the final quinazolinone derivatives (GA4B1) i.e. 2-(4’-methoxy phenyl)-3-[4-(N-(1-N-methyl piperazine amine) methyl-2-oxo indoilin-3-ylidene] benzenesulfonyl quinazolin-4(3H)-one increases the analgesic activity and among the synthesised compounds, GA4B1 exhibited quite superior analgesic activity. The remaining Schiff bases and Mannich base derivatives exhibited moderate analgesic activity. All the compounds showed a dose dependent activity. None of the synthesised compound showed ulcer index whereas the standard drug, diclofenac [25 mg/kg (bw)] showed significantly higher gross ulcer index values.

Keywords: analgesic activity, isatin, mannich base, quinazolin-4(3H)-one

Procedia PDF Downloads 327
5517 DEM Simulation of the Formation of Seed Granules in Twin-Screw Granulation Process

Authors: Tony Bediako Arthur, Nejat Rahmanian, Nana Gyan Sekyi

Abstract:

The possibility of producing seeded granules from fine and course powders is a major challenge as the control parameters that affect its producibility is still under investigation. The seeded granulation is a novel form of producing granules where the granule is made up of larger particles at the core, which are surrounded by fine particles. The possibility of managing granulation through course particle feed rate control makes seeded granulation in continuous granulation useful in terms of process control. Twin screw granulation is now a major process of choice for the wet continuous granulation process in the industry. It is, therefore, imperative to investigate the process control parameters that influence the formation of seeded granules in twin screw granulation. In this paper, the effect of the twin screws rotating speed on the production of seeded granules has been examined. Pictorial and quantitative analysis indicates a high number of seeded granules forming at low screw rotating speeds. It is also instructive to say that higher tensile stress occurs at the kneading section of the screws; thus, higher rotating speed courses the fines for breaking off from the seed particle.

Keywords: DEM, twin-screw, Seeded granules, Simulation

Procedia PDF Downloads 67
5516 Increasing the Use of LNG on the Java Island (Bali Province) through the Development of Small-Scale LNG Projects

Authors: Herman Susilo, Rahmat Budiman

Abstract:

Bali province is one of the most famous tourist destinations in Indonesia. As a central tourist destination, Bali is very concerned about the use of clean energy. Since Bali is an area that does not have natural resources, so all of its energy sources are imported from java island and other islands. As an example, currently, Pertagas is developing the use of LNG for the needs of the retail industry. Right now, LNG is transported from the LNG plant facility in Bontang (Kalimantan Province) using ISO Tanks which are transported by cargo ships and then transported by trucks to the island of Bali. After that, LNG from ISO Tank is breakbulk into LNG Cylinders for distribution to retail customers. The existing distribution scheme is very long and costly since the source of LNG is come from another island (Kalimantan) and is relatively far away. To solve this problem, we plan to build the mini-LNG plant on Java Island since there are lots of gas sources available. There are some small gas reserves (flared or stranded gas) that are not yet monetized and are less valuable (cheaper) because the volume is very small. After liquifying the gas from the gas field, the LNG is transported by the truck using ISO Tank. After that, LNG from ISO Tank is breakbulk into LNG Cylinders for distribution to retail customers. From this new LNG distribution scheme, there are 4-5 USD/MMBTU saving compared to the existing distribution scheme. It is hoped that with these cost savings, the number of retail LNG sales can increase rapidly.

Keywords: LNG, LNG retail, mini LNG, small scale LNG

Procedia PDF Downloads 83
5515 Tackling the Decontamination Challenge: Nanorecycling of Plastic Waste

Authors: Jocelyn Doucet, Jean-Philippe Laviolette, Ali Eslami

Abstract:

The end-of-life management and recycling of polymer wastes remains a key environment issue in on-going efforts to increase resource efficiency and attaining GHG emission reduction targets. Half of all the plastics ever produced were made in the last 13 years, and only about 16% of that plastic waste is collected for recycling, while 25% is incinerated, 40% is landfilled, and 19% is unmanaged and leaks in the environment and waterways. In addition to the plastic collection issue, the UN recently published a report on chemicals in plastics, which adds another layer of challenge when integrating recycled content containing toxic products into new products. To tackle these important issues, innovative solutions are required. Chemical recycling of plastics provides new complementary alternatives to the current recycled plastic market by converting waste material into a high value chemical commodity that can be reintegrated in a variety of applications, making the total market size of the output – virgin-like, high value products - larger than the market size of the input – plastic waste. Access to high-quality feedstock also remains a major obstacle, primarily due to material contamination issues. Pyrowave approaches this challenge with its innovative nano-recycling technology, which purifies polymers at the molecular level, removing undesirable contaminants and restoring the resin to its virgin state without having to depolymerise it. This breakthrough approach expands the range of plastics that can be effectively recycled, including mixed plastics with various contaminants such as lead, inorganic pigments, and flame retardants. The technology allows yields below 100ppm, and purity can be adjusted to an infinitesimal level depending on the customer's specifications. The separation of the polymer and contaminants in Pyrowave's nano-recycling process offers the unique ability to customize the solution on targeted additives and contaminants to be removed based on the difference in molecular size. This precise control enables the attainment of a final polymer purity equivalent to virgin resin. The patented process involves dissolving the contaminated material using a specially formulated solvent, purifying the mixture at the molecular level, and subsequently extracting the solvent to yield a purified polymer resin that can directly be reintegrated in new products without further treatment. Notably, this technology offers simplicity, effectiveness, and flexibility while minimizing environmental impact and preserving valuable resources in the manufacturing circuit. Pyrowave has successfully applied this nano-recycling technology to decontaminate polymers and supply purified, high-quality recycled plastics to critical industries, including food-contact compliance. The technology is low-carbon, electrified, and provides 100% traceable resins with properties identical to those of virgin resins. Additionally, the issue of low recycling rates and the limited market for traditionally hard-to-recycle plastic waste has fueled the need for new complementary alternatives. Chemical recycling, such as Pyrowave's microwave depolymerization, presents a sustainable and efficient solution by converting plastic waste into high-value commodities. By employing microwave catalytic depolymerization, Pyrowave enables a truly circular economy of plastics, particularly in treating polystyrene waste to produce virgin-like styrene monomers. This revolutionary approach boasts low energy consumption, high yields, and a reduced carbon footprint. Pyrowave offers a portfolio of sustainable, low-carbon, electric solutions to give plastic waste a second life and paves the way to the new circular economy of plastics. Here, particularly for polystyrene, we show that styrene monomer yields from Pyrowave’s polystyrene microwave depolymerization reactor is 2,2 to 1,5 times higher than that of the thermal conventional pyrolysis. In addition, we provide a detailed understanding of the microwave assisted depolymerization via analyzing the effects of microwave power, pyrolysis time, microwave receptor and temperature on the styrene product yields. Furthermore, we investigate life cycle environmental impact assessment of microwave assisted pyrolysis of polystyrene in commercial-scale production. Finally, it is worth pointing out that Pyrowave is able to treat several tons of polystyrene to produce virgin styrene monomers and manage waste/contaminated polymeric materials as well in a truly circular economy.

Keywords: nanorecycling, nanomaterials, plastic recycling, depolymerization

Procedia PDF Downloads 55
5514 Effect of Tilt Angle of Herringbone Microstructures on Enhancement of Heat and Mass Transfer

Authors: Nathan Estrada, Fangjun Shu, Yanxing Wang

Abstract:

The heat and mass transfer characteristics of a simple shear flow over a surface covered with staggered herringbone structures are numerically investigated using the lattice Boltzmann method. The focus is on the effect of ridge angle of the structures on the enhancement of heat and mass transfer. In the simulation, the temperature and mass concentration are modeled as a passive scalar released from the moving top wall and absorbed at the structured bottom wall. Reynolds number is fixed at 100. Two Prandtl or Schmidt numbers, 1 and 10, are considered. The results show that the advective scalar transport plays a more important role at larger Schmidt numbers. The fluid travels downward with higher scalar concentration into the grooves at the backward grove tips and travel upward with lower scalar concentration at the forward grove tips. Different tile angles result in different flow advection in wall-normal direction and thus different heat and mass transport efficiencies. The maximum enhancement is achieved at an angle between 15o and 30o. The mechanism of heat and mass transfer is analyzed in detail.

Keywords: fluid mechanics, heat and mass transfer, microfluidics, staggered herringbone mixer

Procedia PDF Downloads 94
5513 Modern Nahwu's View about the Theory of Amil

Authors: Kisno Umbar

Abstract:

Arabic grammar (nahwu) is one of the most important disciplines to learn about the Islamic literature (kitab al-turats). In the last century, learning Arabic grammar was difficult for both the Arabian or non-Arabian native. Most of the traditional nahwu scholars viewed that the theory of amil is a major problem. The views had influenced large number of modern nahwu scholars, and some of them refuse the theory of amil to simplify Arabic grammar to make it easier. The aim of the study is to compare many views of the modern nahwu scholars about the theory of amil including their reasons. In addition, the study is to reveal whether they follow classic scholars or give a view. The author uses literature study approach to get data of modern nahwu scholars from their books as a primary resource. As a secondary resource, the author uses the updated relevant researches from journals about the theory of amil. Besides, the author put on several resources from the traditional nahwu scholars to compare the views. The analysis showed the contrasting views about the theory of amil. Most of the scholars refuse the amil because it isn’t originally derived from Arabic tradition, but it is influenced by Aristotelian philosophy. The others persistently use the amil inasmuch as it is one of the characteristics that differ Arabic language and other languages.

Keywords: Arabic grammar, Amil, Arabic tradition, Aristotelian philosophy

Procedia PDF Downloads 137
5512 Employing a Knime-based and Open-source Tools to Identify AMI and VER Metabolites from UPLC-MS Data

Authors: Nouf Alourfi

Abstract:

This study examines the metabolism of amitriptyline (AMI) and verapamil (VER) using a KNIME-based method. KNIME improved workflow is an open-source data-analytics platform that integrates a number of open-source metabolomics tools such as CFMID and MetFrag to provide standard data visualisations, predict candidate metabolites, assess them against experimental data, and produce reports on identified metabolites. The use of this workflow is demonstrated by employing three types of liver microsomes (human, rat, and Guinea pig) to study the in vitro metabolism of the two drugs (AMI and VER). This workflow is used to create and treat UPLC-MS (Orbitrap) data. The formulas and structures of these drugs' metabolites can be assigned automatically. The key metabolic routes for amitriptyline are hydroxylation, N-dealkylation, N-oxidation, and conjugation, while N-demethylation, O-demethylation and N-dealkylation, and conjugation are the primary metabolic routes for verapamil. The identified metabolites are compatible to the published, clarifying the solidity of the workflow technique and the usage of computational tools like KNIME in supporting the integration and interoperability of emerging novel software packages in the metabolomics area.

Keywords: KNIME, CFMID, MetFrag, Data Analysis, Metabolomics

Procedia PDF Downloads 100
5511 Identifying the Level of Awareness on Value Management Practice amongst Construction Practitioners in Nigeria

Authors: Alhassan Dahiru

Abstract:

Value management is widely accepted technique of eliminating unnecessary cost at different stages of project development that maximizes the functional value of a project by managing its evolution and development from concept to completion. Many construction industry practitioners are not aware of Value Management practice, and its use is less widespread in Nigeria. The aim of this research is to identify the level of awareness on value management practice amongst construction practitioners with a view to contribute to the improvement of the implementation of value management practice in the Nigerian construction industry. In this study, construction practitioners have been chosen as respondents from the 6 geopolitical zones of the federation including FCT Abuja. Through the survey, a total number of 360 semi-structured questionnaires were administered and 284 were returned and remained good for the analysis. The results indicate that most of the respondents were aware of the value management concept and issues surrounding construction industry in Nigeria, while about 32% of the respondents were not aware of its potential benefits. Therefore, organisations should review their techniques and processes from time to time for improvement on effective service delivery. Additionally, a change management strategy should also be part of every organization to ease the introduction of new techniques such as value management. There is also the need for more value management training workshops and seminars in order to enlighten the participants of the construction industry on the principles, concept, and techniques involved in the value management process.

Keywords: sustainability, value management, construction practitioners, Nigeria

Procedia PDF Downloads 214
5510 Assertion-Driven Test Repair Based on Priority Criteria

Authors: Ruilian Zhao, Shukai Zhang, Yan Wang, Weiwei Wang

Abstract:

Repairing broken test cases is an expensive and challenging task in evolving software systems. Although an automated repair technique with intent preservation has been proposed, but it does not take into account the association between test repairs and assertions, leading to a large number of irrelevant candidates and decreasing the repair capability. This paper proposes an assertion-driven test repair approach. Furthermore, an intent-oriented priority criterion is raised to guide the repair candidate generation, making the repairs closer to the intent of the test. In more detail, repair targets are determined through post-dominance relations between assertions and the methods that directly cause compilation errors. Then, test repairs are generated from the target in a bottom-up way, guided by the intent-oriented priority criteria. Finally, the generated repair candidates are prioritized to match the original test intent. The approach is implemented and evaluated on the benchmark of 4 open-source programs and 91 broken test cases. The result shows that the approach can fix 89% (81/91) of broken test cases, which is more effective than the existing intentpreserved test repair approach, and our intent-oriented priority criteria work well.

Keywords: test repair, test intent, software test, test case evolution

Procedia PDF Downloads 110
5509 Application of Computer Aided Engineering Tools in Performance Prediction and Fault Detection of Mechanical Equipment of Mining Process Line

Authors: K. Jahani, J. Razavi

Abstract:

Nowadays, to decrease the number of downtimes in the industries such as metal mining, petroleum and chemical industries, predictive maintenance is crucial. In order to have efficient predictive maintenance, knowing the performance of critical equipment of production line such as pumps and hydro-cyclones under variable operating parameters, selecting best indicators of this equipment health situations, best locations for instrumentation, and also measuring of these indicators are very important. In this paper, computer aided engineering (CAE) tools are implemented to study some important elements of copper process line, namely slurry pumps and cyclone to predict the performance of these components under different working conditions. These modeling and simulations can be used in predicting, for example, the damage tolerance of the main shaft of the slurry pump or wear rate and location of cyclone wall or pump case and impeller. Also, the simulations can suggest best-measuring parameters, measuring intervals, and their locations.

Keywords: computer aided engineering, predictive maintenance, fault detection, mining process line, slurry pump, hydrocyclone

Procedia PDF Downloads 389
5508 The Role of Midwives in Promoting Childbearing in Respect to the Law of Population Youth in Iran

Authors: Parvin Abedi, Poorandokht Afshari

Abstract:

Introduction: In 2022, the Youth Law of the Population was notified to all organizations, including the Iranian Ministry of Health. Some of the articles of this law are about the role of midwives in health and treatment to promote childbearing. In this regard, articles number 45, 48, 49, and 50 are related to midwifery work that will be reviewed in this article. Methods: In this review, the law of population youth was reviewed. In this regard, the statistics of midwives working in the treatment and health sector were collected and analyzed according to the population youth law. Results: Nearly 47 000 midwives are working in the public and private sectors of the country and in the healthcare sector; according to Article 49, which states that there should be one midwife for every two parturient women, about 12,000 midwives are needed in the treatment department and about 8,000 midwives are needed in the health department. In Article 50 it is mentioned to modify tariffs and efficiency in order to increase natural childbirth, and in this field, insurance organizations should have sufficient cooperation with payments. The tariff for midwifery services has been increased, but it is not enough for the stressful job of midwifery. The labor incentive for delivery by midwives is also low. Conclusion: Midwives are one of the fundamental pillars of the law of the population, and without increasing the motivation of midwives, it is not possible to increase the rate of natural childbirth and make childbirth pleasant.

Keywords: law of the population, midwife, motivation, childbearing

Procedia PDF Downloads 21
5507 Antioxidant Activity of Launaea nudicaulis Growing in Southwest of Algeria

Authors: Abdelkrim Cheriti, Mebarka Belboukhari, Nasser Belboukhari

Abstract:

Launaea Cass. is a small genus of the family Asteraceae (tribe Lactuceae, subtribe Sonchinae), consisting of 54 species, of which 9 are presented in the flora of Algeria and is mainly distributed in the South Mediterranean, Africa and SW Asia. Plants in the Launaea genus have been used ethnobotanically as bitter stomachic, for treating diarrhea, gastrointestinal tracts, as anti-inflammatory, for skin diseases, treatment of infected wounds, hepatic pains, children fever, as soporific, lactagogue, diuretic and as insecticidal. Antioxidants are vital substances, which possess the ability to protect the body from damages caused by free radical induced oxidative stress. A variety of free radical scavenging antioxidants is found in a number of dietary sources. The main objective of this study focused on the screening of antioxidant activity of Launaea nudicaulis (Asteraceae) extracts. The in vitro antioxidant activity was investigated with DPPH radical scavenging assay. The quantitative evaluation of DPPH scavenging activity showed that n-BuOH and EtOAc extracts are the most active extracts with a percentage of antiradical activity of 89,62% and 71,57% respectively.

Keywords: Launaea, phytochemical, South Algeria, Sahara, endemic specie

Procedia PDF Downloads 431
5506 On the Network Packet Loss Tolerance of SVM Based Activity Recognition

Authors: Gamze Uslu, Sebnem Baydere, Alper K. Demir

Abstract:

In this study, data loss tolerance of Support Vector Machines (SVM) based activity recognition model and multi activity classification performance when data are received over a lossy wireless sensor network is examined. Initially, the classification algorithm we use is evaluated in terms of resilience to random data loss with 3D acceleration sensor data for sitting, lying, walking and standing actions. The results show that the proposed classification method can recognize these activities successfully despite high data loss. Secondly, the effect of differentiated quality of service performance on activity recognition success is measured with activity data acquired from a multi hop wireless sensor network, which introduces high data loss. The effect of number of nodes on the reliability and multi activity classification success is demonstrated in simulation environment. To the best of our knowledge, the effect of data loss in a wireless sensor network on activity detection success rate of an SVM based classification algorithm has not been studied before.

Keywords: activity recognition, support vector machines, acceleration sensor, wireless sensor networks, packet loss

Procedia PDF Downloads 460
5505 Unlocking Academic Success: A Comprehensive Exploration of Shaguf Bites’s Impact on Learning and Retention

Authors: Joud Zagzoog, Amira Aldabbagh, Radiyah Hamidaddin

Abstract:

This research aims to test out and observe whether artificial intelligence (AI) software and applications could actually be effective, useful, and time-saving for those who use them. Shaguf Bites, a web application that uses AI technology, claims to help students study and memorize information more effectively in less time. The website uses smart learning, or AI-powered bite-sized repetitive learning, by transforming documents or PDFs with the help of AI into summarized interactive smart flashcards (Bites, n.d.). To properly test out the websites’ effectiveness, both qualitative and quantitative methods were used in this research. An experiment was conducted on a number of students where they were first requested to use Shaguf Bites without any prior knowledge or explanation of how to use it. Second, they were asked for feedback through a survey on how their experience was after using it and whether it was helpful, efficient, time-saving, and easy to use for studying. After reviewing the collected data, we found out that the majority of students found the website to be straightforward and easy to use. 58% of the respondents agreed that the website accurately formulated the flashcard questions. And 53% of them reported that they are most likely to use the website again in the future as well as recommend it to others. Overall, from the given results, it is clear that Shaguf Bites have proved to be very beneficial, accurate, and time saving for the majority of the students.

Keywords: artificial intelligence (AI), education, memorization, spaced repetition, flashcards.

Procedia PDF Downloads 161
5504 Mooring Analysis of Duct-Type Tidal Current Power System in Shallow Water

Authors: Chul H. Jo, Do Y. Kim, Bong K. Cho, Myeong J. Kim

Abstract:

The exhaustion of oil and the environmental pollution from the use of fossil fuel are increasing. Tidal current power (TCP) has been proposed as an alternative energy source because of its predictability and reliability. By applying a duct and single point mooring (SPM) system, a TCP device can amplify the generating power and keep its position properly. Because the generating power is proportional to cube of the current stream velocity, amplifying the current speed by applying a duct to a TCP system is an effective way to improve the efficiency of the power device. An SPM system can be applied at any water depth and is highly cost effective. Simple installation and maintenance procedures are also merits of an SPM system. In this study, we designed an SPM system for a duct-type TCP device for use in shallow water. Motions of the duct are investigated to obtain the response amplitude operator (RAO) as the magnitude of the transfer function. Parameters affecting the stability of the SPM system such as the fairlead departure angle, current velocity, and the number of clamp weights are analyzed and/or optimized. Wadam and OrcaFlex commercial software is used to design the mooring line.

Keywords: mooring design, parametric analysis, RAO (Response Amplitude Operator), SPM (Single Point Mooring)

Procedia PDF Downloads 277
5503 A Chronological and Comparative Examination of Traditional American Post-Secondary Institutions of Higher Learning Delivery of Instruction for College Students with Autism Spectrum Disorders

Authors: Shannon Melideo

Abstract:

Post-secondary schools that provide specialized instruction for college students with special needs have been in existence for some time in the United States of America. Whether students experience learning disabilities, visual impairments, physical limitations, Autism Spectrum Disorders or any other issue that impacts their learning are able to attend universities that intentionally cater to their needs. While this selection of post-secondary education may be preferred by some students, other have sought a different experience. Over the last ten years, the number of students with Autism Spectrum Disorders (ASD) attending traditional universities in the United States of America has increased significantly. Students with ASD tend to select smaller, private institutions that appear to offer more personal attention and services. This paper will examine how traditional American universities are preparing for this relatively new group of students in their college classrooms. This paper will provide a brief historical timeline of access to university instruction for students with Autism Spectrum Disorders, and how and if students with ASD are received in colleges around the globe, and best research supported practices for success.

Keywords: autism spectrum disorders, access to learning, university instruction, accommodations

Procedia PDF Downloads 164
5502 Ecological and Economical Indicators of Successful Community Based Forest Management: A Case of Lowland Community Forestry in Nepal

Authors: Bikram Jung Kunwar, Pralhad Kunwor

Abstract:

The Community-Based Forest Management (CBFM) approach is often glorified as the best forest management alternatives in the developing countries. However, how the approach has been understood by the local user households, who implement it is remained unanswered for many planners, policy makers, and sometimes researcher as well. The study attempts to assess the understanding of ecology and economics of CBFM in Nepal, where community forest program has been implemented since the 1970s. In order to understand the impacts of the program, eight criteria and sixteen indicators for ecological conservation and similarly same number of criteria and indicators for socio-economic impacts of the program were designed and compared between before and after the program implementation. The community forestry program has positive effects in forest ecology conservation and at the same time rural livelihood improvement of local people. The study revealed that collective understanding of forest ecology and economics leads the CBFM approach towards the sustainability of the program in a win-win situation. The recommendations of the study are expected to be useful to natural resource managers, planners, and policy makers.

Keywords: community, forest management, ecology, economics, Nepal

Procedia PDF Downloads 379
5501 Operator Optimization Based on Hardware Architecture Alignment Requirements

Authors: Qingqing Gai, Junxing Shen, Yu Luo

Abstract:

Due to the hardware architecture characteristics, some operators tend to acquire better performance if the input/output tensor dimensions are aligned to a certain minimum granularity, such as convolution and deconvolution commonly used in deep learning. Furthermore, if the requirements are not met, the general strategy is to pad with 0 to satisfy the requirements, potentially leading to the under-utilization of the hardware resources. Therefore, for the convolution and deconvolution whose input and output channels do not meet the minimum granularity alignment, we propose to transfer the W-dimensional data to the C-dimension for computation (W2C) to enable the C-dimension to meet the hardware requirements. This scheme also reduces the number of computations in the W-dimension. Although this scheme substantially increases computation, the operator’s speed can improve significantly. It achieves remarkable speedups on multiple hardware accelerators, including Nvidia Tensor cores, Qualcomm digital signal processors (DSPs), and Huawei neural processing units (NPUs). All you need to do is modify the network structure and rearrange the operator weights offline without retraining. At the same time, for some operators, such as the Reducemax, we observe that transferring the Cdimensional data to the W-dimension(C2W) and replacing the Reducemax with the Maxpool can accomplish acceleration under certain circumstances.

Keywords: convolution, deconvolution, W2C, C2W, alignment, hardware accelerator

Procedia PDF Downloads 89
5500 Algorithmic Generation of Carbon Nanochimneys

Authors: Sorin Muraru

Abstract:

Computational generation of carbon nanostructures is still a very demanding process. This work provides an alternative to manual molecular modeling through an algorithm meant to automate the design of such structures. Specifically, carbon nanochimneys are obtained through the bonding of a carbon nanotube with the smaller edge of an open carbon nanocone. The methods of connection rely on mathematical, geometrical and chemical properties. Non-hexagonal rings are used in order to perform the correct bonding of dangling bonds. Once obtained, they are useful for thermal transport, gas storage or other applications such as gas separation. The carbon nanochimneys are meant to produce a less steep connection between structures such as the carbon nanotube and graphene sheet, as in the pillared graphene, but can also provide functionality on its own. The method relies on connecting dangling bonds at the edges of the two carbon nanostructures, employing the use of two different types of auxiliary structures on a case-by-case basis. The code is implemented in Python 3.7 and generates an output file in the .pdb format containing all the system’s coordinates. Acknowledgment: This work was supported by a grant of the Executive Agency for Higher Education, Research, Development and innovation funding (UEFISCDI), project number PN-III-P1-1.1-TE-2016-24-2, contract TE 122/2018.

Keywords: carbon nanochimneys, computational, carbon nanotube, carbon nanocone, molecular modeling, carbon nanostructures

Procedia PDF Downloads 152
5499 Assessment of Exploitation Vulnerability of Quantum Communication Systems with Phase Encryption

Authors: Vladimir V. Nikulin, Bekmurza H. Aitchanov, Olimzhon A. Baimuratov

Abstract:

Quantum communication technology takes advantage of the intrinsic properties of laser carriers, such as very high data rates and low power requirements, to offer unprecedented data security. Quantum processes at the physical layer of encryption are used for signal encryption with very competitive performance characteristics. The ultimate range of applications for QC systems spans from fiber-based to free-space links and from secure banking operations to mobile airborne and space-borne networking where they are subjected to channel distortions. Under practical conditions, the channel can alter the optical wave front characteristics, including its phase. In addition, phase noise of the communication source and photo-detection noises alter the signal to bring additional ambiguity into the measurement process. If quantized values of photons are used to encrypt the signal, exploitation of quantum communication links becomes extremely difficult. In this paper, we present the results of analysis and simulation studies of the effects of noise on phase estimation for quantum systems with different number of encryption bases and operating at different power levels.

Keywords: encryption, phase distortion, quantum communication, quantum noise

Procedia PDF Downloads 538
5498 Comparison of Different k-NN Models for Speed Prediction in an Urban Traffic Network

Authors: Seyoung Kim, Jeongmin Kim, Kwang Ryel Ryu

Abstract:

A database that records average traffic speeds measured at five-minute intervals for all the links in the traffic network of a metropolitan city. While learning from this data the models that can predict future traffic speed would be beneficial for the applications such as the car navigation system, building predictive models for every link becomes a nontrivial job if the number of links in a given network is huge. An advantage of adopting k-nearest neighbor (k-NN) as predictive models is that it does not require any explicit model building. Instead, k-NN takes a long time to make a prediction because it needs to search for the k-nearest neighbors in the database at prediction time. In this paper, we investigate how much we can speed up k-NN in making traffic speed predictions by reducing the amount of data to be searched for without a significant sacrifice of prediction accuracy. The rationale behind this is that we had a better look at only the recent data because the traffic patterns not only repeat daily or weekly but also change over time. In our experiments, we build several different k-NN models employing different sets of features which are the current and past traffic speeds of the target link and the neighbor links in its up/down-stream. The performances of these models are compared by measuring the average prediction accuracy and the average time taken to make a prediction using various amounts of data.

Keywords: big data, k-NN, machine learning, traffic speed prediction

Procedia PDF Downloads 343
5497 The Effect of Energy Consumption and Losses on the Nigerian Manufacturing Sector: Evidence from the ARDL Approach

Authors: Okezie A. Ihugba

Abstract:

The bounds testing ARDL (2, 2, 2, 2, 0) technique to cointegration was used in this study to investigate the effect of energy consumption and energy loss on Nigeria's manufacturing sector from 1981 to 2020. The model was created to determine the relationship between these three variables while also accounting for interactions with control variables such as inflation and commercial bank loans to the manufacturing sector. When the dependent variables are energy consumption and energy loss, the bounds tests show that the variables of interest are bound together in the long run. Because electricity consumption is a critical factor in determining manufacturing value-added in Nigeria, some intriguing observations were made. According to the findings, the relationship between LELC and LMVA is statistically significant. According to the findings, electricity consumption reduces manufacturing value-added. The target variable (energy loss) is statistically significant and has a positive sign. In Nigeria, a 1% reduction in energy loss increases manufacturing value-added by 36% in the first lag and 35% in the second. According to the study, the government should speed up the ongoing renovation of existing power plants across the country, as well as the construction of new gas-fired power plants. This will address a number of issues, including overpricing of electricity as a result of grid failure.

Keywords: L60, Q43, H81, C52, E31, ARDL, cointegration, Nigeria's manufacturing

Procedia PDF Downloads 142