Search results for: internal attack
2112 Human Wildlife Conflict Outside Protected Areas of Nepal: Causes, Consequences and Mitigation Strategies
Authors: Kedar Baral
Abstract:
This study was carried out in Mustang, Kaski, Tanahun, Baitadi, and Jhapa districts of Nepal. The study explored the spatial and temporal pattern of HWC, socio economic factors associated with it, impacts of conflict on life / livelihood of people and survival of wildlife species, and impact of climate change and forest fire onHWC. Study also evaluated people’s attitude towards wildlife conservation and assessed relevant policies and programs. Questionnaire survey was carried out with the 250 respondents, and both socio-demographic and HWC related information werecollected. Secondary information were collected from Divisional Forest Offices and Annapurna Conservation Area Project.HWC events were grouped by season /months/sites (forest type, distances from forest, and settlement), and the coordinates of the events were exported to ArcGIS. Collected data were analyzed using descriptive statistics in Excel and R Program. A total of 1465 events were recorded in 5 districts during 2015 and 2019. Out of that, livestock killing, crop damage, human attack, and cattle shed damage events were 70 %, 12%, 11%, and 7%, respectively. Among 151 human attack cases, 23 people were killed, and 128 were injured. Elephant in Terai, common leopard and monkey in Middle Mountain, and snow leopard in high mountains were found as major problematic animals. Common leopard attacks were found more in the autumn, evening, and on human settlement area. Whereas elephant attacks were found higher in winter, day time, and on farmland. Poor people farmers were found highly victimized, and they were losing 26% of their income due to crop raiding and livestock depredation. On the other hand, people are killing many wildlife in revenge, and this number is increasing every year. Based on the people's perception, climate change is causing increased temperature and forest fire events and decreased water sources within the forest. Due to the scarcity of food and water within forests, wildlife are compelled to dwell at human settlement area, hence HWC events are increasing. Nevertheless, more than half of the respondents were found positive about conserving entire wildlife species. Forests outside PAs are under the community forestry (CF) system, which restored the forest, improved the habitat, and increased the wildlife.However, CF policies and programs were found to be more focused on forest management with least priority on wildlife conservation and HWC mitigation. Compensation / relief scheme of government for wildlife damage was found some how effective to manage HWC, but the lengthy process, being applicable to the damage of few wildlife species and highly increasing events made it necessary to revisit. Based on these facts, the study suggest to carry out awareness generation activities to the poor farmers, linking the property of people with the insurance scheme, conducting habitat management activities within CF, promoting the unpalatable crops, improvement of shed house of livestock, simplifying compensation scheme and establishing a fund at the district level and incorporating the wildlife conservation and HWCmitigation programs in CF. Finally, the study suggests to carry out rigorous researches to understand the impacts of current forest management practices on forest, biodiversity, wildlife, and HWC.Keywords: community forest, conflict mitigation, wildlife conservation, climate change
Procedia PDF Downloads 1172111 Multiscale Modeling of Damage in Textile Composites
Authors: Jaan-Willem Simon, Bertram Stier, Brett Bednarcyk, Evan Pineda, Stefanie Reese
Abstract:
Textile composites, in which the reinforcing fibers are woven or braided, have become very popular in numerous applications in aerospace, automotive, and maritime industry. These textile composites are advantageous due to their ease of manufacture, damage tolerance, and relatively low cost. However, physics-based modeling of the mechanical behavior of textile composites is challenging. Compared to their unidirectional counterparts, textile composites introduce additional geometric complexities, which cause significant local stress and strain concentrations. Since these internal concentrations are primary drivers of nonlinearity, damage, and failure within textile composites, they must be taken into account in order for the models to be predictive. The macro-scale approach to modeling textile-reinforced composites treats the whole composite as an effective, homogenized material. This approach is very computationally efficient, but it cannot be considered predictive beyond the elastic regime because the complex microstructural geometry is not considered. Further, this approach can, at best, offer a phenomenological treatment of nonlinear deformation and failure. In contrast, the mesoscale approach to modeling textile composites explicitly considers the internal geometry of the reinforcing tows, and thus, their interaction, and the effects of their curved paths can be modeled. The tows are treated as effective (homogenized) materials, requiring the use of anisotropic material models to capture their behavior. Finally, the micro-scale approach goes one level lower, modeling the individual filaments that constitute the tows. This paper will compare meso- and micro-scale approaches to modeling the deformation, damage, and failure of textile-reinforced polymer matrix composites. For the mesoscale approach, the woven composite architecture will be modeled using the finite element method, and an anisotropic damage model for the tows will be employed to capture the local nonlinear behavior. For the micro-scale, two different models will be used, the one being based on the finite element method, whereas the other one makes use of an embedded semi-analytical approach. The goal will be the comparison and evaluation of these approaches to modeling textile-reinforced composites in terms of accuracy, efficiency, and utility.Keywords: multiscale modeling, continuum damage model, damage interaction, textile composites
Procedia PDF Downloads 3542110 Effectiveness of Centromedullary Fixation by Metaizeau Technique in Challenging Pediatric Fractures
Authors: Mohammad Arshad Ikram
Abstract:
We report three cases of challenging fractures in children treated by intramedullary fixation using the Metaizeau method and achieved anatomical reduction with excellent clinical results. Jean-Paul Metaizeau described the centromedullary fixation for the radial neck in 1980 using K-wires Radial neck fractures are uncommon in children. Treatment of severely displaced fractures is always challenging. Closed reduction techniques are more popular as compared to open reduction due to the low risk of complications. Metaizeau technique of closed reduction with centromedullary pinning is a commonly preferred method of treatment. We present two cases with a severely displaced radial neck fracture, treated by this method and achieved sound union; anatomical position of the radial head and full function were observed two months after surgery. Proximal humerus fractures are another uncommon injury in children accounting for less than 5% of all pediatric fractures. Most of these injuries occur through the growth plate because of its relative weakness. Salter-Harris type I is commonly seen in the younger age group, whereas type II & III occurs in older children and adolescents. In contrast to adults, traumatic glenohumeral dislocation is an infrequently observed condition among children. A combination of proximal humerus fracture and glenohumeral dislocation is extremely rare and occurs in less than 2% of the pediatric population. The management of this injury is always challenging. Treatment ranged from closed reduction with and without internal fixation and open reduction with internal fixation. The children who had closed reduction with centromedullary fixation by the Metaizeau method showed excellent results with the return of full movements at the shoulder in a short time without any complication. We present the case of a child with anterior dislocation of the shoulder associated with a complete displaced proximal humerus metaphyseal fracture. The fracture was managed by closed reduction and then fixation by two centromedullary K-wires using the Metaizeau method, achieving the anatomical reduction of the fracture and dislocation. This method of treatment enables us to achieve excellent radiological and clinical results in a short time.Keywords: glenohumeral, Metaizeau method, pediatric fractures, radial neck
Procedia PDF Downloads 1052109 Transformation of the Traditional Landscape of Kabul Old City: A Study for Its Conservation
Authors: Mohammad Umar Azizi, Tetsuya Ando
Abstract:
This study investigates the transformation of the traditional landscape of Kabul Old City through an examination of five case study areas. Based on physical observation, three types of houses are found: traditional, mixed and modern. Firstly, characteristics of the houses are described according to construction materials and the number of stories. Secondly, internal and external factors are considered in order to implement a conservation plan. Finally, an adaptive conservation plan is suggested to protect the traditional landscape of Kabul Old City.Keywords: conservation, district 1, Kabul Old City, landscape, transformation, traditional houses
Procedia PDF Downloads 2212108 Implementation of 4-Bit Direct Charge Transfer Switched Capacitor DAC with Mismatch Shaping Technique
Authors: Anuja Askhedkar, G. H. Agrawal, Madhu Gudgunti
Abstract:
Direct Charge Transfer Switched Capacitor (DCT-SC) DAC is the internal DAC used in Delta-Sigma (∆∑) DAC which works on Over-Sampling concept. The Switched Capacitor DAC mainly suffers from mismatch among capacitors. Mismatch among capacitors in DAC, causes non linearity between output and input. Dynamic Element Matching (DEM) technique is used to match the capacitors. According to element selection logic there are many types. In this paper, Data Weighted Averaging (DWA) technique is used for mismatch shaping. In this paper, the 4 bit DCT-SC-DAC with DWA-DEM technique is implemented using WINSPICE simulation software in 180nm CMOS technology. DNL for DAC with DWA is ±0.03 LSB and INL is ± 0.02LSB.Keywords: ∑-Δ DAC, DCT-SC-DAC, mismatch shaping, DWA, DEM
Procedia PDF Downloads 3492107 Knowledge Management at Spanish Higher Education Institutions
Authors: Yolanda Ramirez, Angel Tejada, Agustin Baidez
Abstract:
In the knowledge-based economy, intangible elements are considered essential in order to achieve competitive advantage in organizations. In this sense, the Balanced Scorecard is a very suitable tool to recognize value and manage intangibles because it translates an organization’s strategic objectives into a set of performance indicators from a financial, as well as customer perspective, internal process and learning and growth perspectives. The aim of this paper is to expose and justify the benefits that the Balanced Scorecard might have for identifying, measuring and managing intellectual capital at universities, by means of reviewing the most important Balanced Scorecard implementations at Spanish public universities.Keywords: knowledge management, balanced scorecard, universities, Spain
Procedia PDF Downloads 2722106 Investigation of the Flow in Impeller Sidewall Gap of a Centrifugal Pump Using CFD
Authors: Mohammadreza DaqiqShirazi, Rouhollah Torabi, Alireza Riasi, Ahmad Nourbakhsh
Abstract:
In this paper, the flow in a sidewall gap of an impeller which belongs to a centrifugal pump is studied using numerical method. The flow in sidewall gap forms internal leakage and is the source of “disk friction loss” which is the most important cause of reduced efficiency in low specific speed centrifugal pumps. Simulation is done using CFX software and a high quality mesh, therefore the modeling error has been reduced. Navier-Stokes equations have been solved for this domain. In order to predict the turbulence effects the SST model has been employed.Keywords: numerical study, centrifugal pumps, disk friction loss, sidewall gap
Procedia PDF Downloads 5292105 Interrogating the Impact of Insurgency Attacks on Vulnerable Groups in West Africa: Implications for Global Security
Authors: Godiya Atsiya Pius
Abstract:
The recent dimension of terrorist attacks and violence in West Africa and Nigeria in particular has attracted both academic and global concerns. Children, young girls and women are now victims of violent attacks and insurgency in their own country. Today, we have a reverse situation where women and children were spared during violence in the past. Empirical evidence shows that millions of children, young girls and women are caught up in violent attacks in which they are not merely spectatorial, but victims of circumstance. Some fall victims of a general onslaught against civilians by the drivers of such conflicts. Others die as part of a calculated genocide. Still others are taken as hostages as part of a deliberate attack on them. With particular reference to over 200 Chibok school girls that were abducted by the Boko Haram Islamic sect in Maiduguri, Borno state, Nigeria, this study shall attempt a theoretical exploration of the circumstances surrounding the insurgency attacks on these categories of vulnerable groups in Nigeria. This paper also intends to examine the nature, dimensions, causes, effects as well as implications of these attacks on women and children in West Africa. The paper shall sum up with conclusion and possible recommendations that could help the region in the 21st century and beyond.Keywords: insurgency, gender, violence, security, vulnerable groups
Procedia PDF Downloads 4722104 An Improved Method on Static Binary Analysis to Enhance the Context-Sensitive CFI
Authors: Qintao Shen, Lei Luo, Jun Ma, Jie Yu, Qingbo Wu, Yongqi Ma, Zhengji Liu
Abstract:
Control Flow Integrity (CFI) is one of the most promising technique to defend Code-Reuse Attacks (CRAs). Traditional CFI Systems and recent Context-Sensitive CFI use coarse control flow graphs (CFGs) to analyze whether the control flow hijack occurs, left vast space for attackers at indirect call-sites. Coarse CFGs make it difficult to decide which target to execute at indirect control-flow transfers, and weaken the existing CFI systems actually. It is an unsolved problem to extract CFGs precisely and perfectly from binaries now. In this paper, we present an algorithm to get a more precise CFG from binaries. Parameters are analyzed at indirect call-sites and functions firstly. By comparing counts of parameters prepared before call-sites and consumed by functions, targets of indirect calls are reduced. Then the control flow would be more constrained at indirect call-sites in runtime. Combined with CCFI, we implement our policy. Experimental results on some popular programs show that our approach is efficient. Further analysis show that it can mitigate COOP and other advanced attacks.Keywords: contex-sensitive, CFI, binary analysis, code reuse attack
Procedia PDF Downloads 3232103 Mechanical Strengths of Self-Compacting Mortars Prepared with the Pozzolanic Cement in Aggressive Environments
Authors: M. Saidi, I. Djefour, F. Ait Medjber, A. Melouane, A. Gacem
Abstract:
The objective of this research is to study the physical and mechanical properties and durability of self-compacting mortars prepared by substituting a part of cement up to a percentage of 30% pozzolan according to different Blaine specific surface area (SSB1=7000 cm2/g and SSB=9000 cm2/g)). Order to evaluate durability, mortars were subjected to chemical attacks in various aggressive environments, a solution of a mixture of nitric acid and ammonium nitrate (HNO3 + NH4NO3) and a magnesium sulfate salt solution (MgSO4)) with a concentration of 10%, for a period of one month. This study is complemented by a comparative study of the durability of mortars elaborated with sulphate resistant cement (SRC). The results show that these mortars develop long-term, mechanical and chemical resistance better than mortars based Portland cement with 5% gypsum (CEM 1) and SRC. We found that the mass losses are lowest in mortars elaborated with pozzolanic cement (30% substitution with SSB2) in both of chemical attack solutions (3.28% in the solution acid and 1.16% in the salt solution) and the compressive strength gains of 14.68% and 8.5% respectively in the two media. This is due to the action of pozzolan which fixes portlandite to form hydrated calcium silicate (CSH) from the hydration of tricalcic silicate (C3S).Keywords: aggressive environments, durability, mechanical strengths, pozzolanic cement, self-compacting mortar
Procedia PDF Downloads 2352102 Adapting Depression and Anxiety Questionnaire for Children into Turkish: Reliability and Validity Studies
Authors: İsmail Seçer
Abstract:
Although depression and anxiety disorders are considered to be adult disorders, the evidence obtained from several studies conducted recently shows that the roots of depression and anxiety disorders go back to childhood years. Thus, it is thought that analyzing depressive symptoms and anxiety disorders observed in the childhood is an important necessity. In the direction of the problem status of the study, the purpose of this study is to adapt anxiety and depression questionnaire for children into Turkish culture and analyze the psychometric characteristics of it on clinical and nonclinical samples separately. The study is a descriptive survey research. The study was conducted on two different sample groups, clinical and nonclinical. The clinical sample is formed of 205 individuals and the nonclinical sample is formed of 630 individuals. Through the study, anxiety and depression questionnaire for children, anxiety sensitivity index and obsessive compulsive disorder questionnaire for children were used. Experts’ opinions were asked to provide language validity of the scale. Confirmatory factor analysis and criterion-related validity to analyze construct validity and internal consistency and split-half reliability analyses were done for reliability. In the direction of experts’ opinions, construct validity of the scale was analyzed with simple confirmatory factor analysis and it was determined that the model fit of the two-factor structure of the scale gives good fit on both the clinical and nonclinical samples after determining that the language validity of the scale is provided. In criterion-related validity, it was determined that there are positive and significant relations between anxiety and depression questionnaire for children and anxiety sensitivity and obsessive compulsive disorder. The results of internal consistency and half-split reliability analyses also show that the scale has adequate reliability value. It can be said that depression and anxiety questionnaire for children which was adapted to determine depressive symptoms and anxiety disorders observed in childhood has adequate reliability and validity values and it can be used in future studies. It can be recommended that the psychometric characteristics of the scale can be analyzed and reported on new samples in the future studies.Keywords: scale adapting, construct validity, confirmatory factor analysis, childhood depression
Procedia PDF Downloads 3342101 Total Arterial Coronary Revascularization with Aorto-Bifemoral Bipopliteal Bypass: A Case Report
Authors: Nuruddin Mohammod Zahangir, Syed Tanvir Ahmady, Firoz Ahmed, Mainul Kabir, Tamjid Mohammad Najmus Sakib Khan, Nazmul Hossain, Niaz Ahmed, Madhava Janardhan Naik
Abstract:
The management of combined Coronary Artery Disease and Peripheral Vascular Disease is a challenge and brings with it numerous clinical dilemmas.The 56 year old gentleman presented to our department with significant triple vessel disease with occluded lower end of aorta just before bifurcation and bilateral superficial femoral arteries. Operation was done on 11.03.14. The The Left Internal Mammary Artery (LIMA) and the Right Internal Mammary Artery (RIMA) were harvested in skeletonized manner. The free RIMA was then anastomosed with LIMA to make LIMA-RIMA Y. Cardio Pulmonary Bypass was then established and coronary artery bypass grafts performed. LIMA was anastomosed to the Left Anterior Descending artery. RIMA was anastomosed to Posterior Descending Artery, 1st and 2nd Obtuse Marginal arteries in a sequential manner. Abdomen was opened by midline incision. The infrarenal aorta exposed and was found to be severely diseased. A Vascular Clamp was applied infrarenally, aortotomy done and limited endarterectomy performed. An end-to-side anastomosis was done with upper end of PTFE synthetic Y-graft (14/7 mm) to the infarenal Aorta and the Clamp released. Good flow noted in both limbs of the graft. Patient was then slowly weaned off from Cardio Pulmonary Bypass without difficulty. The distal two limbs of the Y graft were passed to the groin through retroperitoneal tunnels and anastomosed end-to-side with the common femoral arteries. Saphenous vein was interposed between common femoral and popliteal arteries bilaterally through subfascial tunnels in both thigh. On 12th postoperative day he was discharged from hospital in good general condition. Follow up after 3 months of operation the patient is doing good and free of chest pain and claudication pain.Keywords: total arterial, coronary revascularization, aorto-bifemoral bypass, bifemoro-bipopliteal bypass
Procedia PDF Downloads 4722100 The Impacts of Technology on Operations Costs: The Mediating Role of Operation Flexibility
Authors: Fazli Idris, Jihad Mohammad
Abstract:
The study aims to determine the impact of technology and service operations flexibility, which is divided into external flexibility and internal robustness, on operations costs. A mediation model is proposed that links technology to operations costs via operation flexibility. Drawing on a sample of 475 of operations managers of various service sectors in Malaysia and South Africa, Structural Equation Modeling (SEM) was employed to test the relationship using Smart-PLS procedures. It was found that a significant relationship was established between technologies to operations costs via both operations flexibility dimensions. Theoretical and managerial implications are offered to explain the results.Keywords: Operations flexibility, technology, costs, mediation
Procedia PDF Downloads 6132099 Laser Cooling of Internal Degrees of Freedom of Molecules: Cesium Case
Authors: R. Horchani
Abstract:
Optical pumping technique with laser fields combined with photo-association of ultra-cold atoms leads to control on demand the vibrational and/or the rotational population of molecules. Here, we review the basic concepts and main steps should be followed, including the excitation schemes and detection techniques we use to achieve the ro-vibrational cooling of Cs2 molecules. We also discuss the extension of this technique to other molecules. In addition, we present a theoretical model used to support the experiment. These simulations can be widely used for the preparation of various experiments since they allow the optimization of several important experimental parameters.Keywords: cold molecule, photo-association, optical pumping, vibrational and rotational cooling
Procedia PDF Downloads 3002098 Numerical Study on Parallel Rear-Spoiler on Super Cars
Authors: Anshul Ashu
Abstract:
Computers are applied to the vehicle aerodynamics in two ways. One of two is Computational Fluid Dynamics (CFD) and other is Computer Aided Flow Visualization (CAFV). Out of two CFD is chosen because it shows the result with computer graphics. The simulation of flow field around the vehicle is one of the important CFD applications. The flow field can be solved numerically using panel methods, k-ε method, and direct simulation methods. The spoiler is the tool in vehicle aerodynamics used to minimize unfavorable aerodynamic effects around the vehicle and the parallel spoiler is set of two spoilers which are designed in such a manner that it could effectively reduce the drag. In this study, the standard k-ε model of the simplified version of Bugatti Veyron, Audi R8 and Porsche 911 are used to simulate the external flow field. Flow simulation is done for variable Reynolds number. The flow simulation consists of three different levels, first over the model without a rear spoiler, second for over model with single rear spoiler, and third over the model with parallel rear-spoiler. The second and third level has following parameter: the shape of the spoiler, the angle of attack and attachment position. A thorough analysis of simulations results has been found. And a new parallel spoiler is designed. It shows a little improvement in vehicle aerodynamics with a decrease in vehicle aerodynamic drag and lift. Hence, it leads to good fuel economy and traction force of the model.Keywords: drag, lift, flow simulation, spoiler
Procedia PDF Downloads 5002097 A Critical Genre Analysis of Negative Parts in CSR Reports
Authors: Shuai Liu
Abstract:
In corporate social responsibility (CSR) reporting, companies are expected to present both the positive and negative parts of the social and environmental impacts of their performance. This study investigates how the companies that listed in fortune 500 respond to this challenge by analyzing the representations of negative part especially the safety performance. It has found that in the level of genre analysis, it presented 3 major moves and 11 steps in terms of the interdiscursivity analysis. It was made up of three dominant discourse.. The study calls for greater focus on the internal and external analysis of the negative aspect of aspects of companies’ self-disclosure.Keywords: CSR reports, negative parts, critical genre analysis, interdiscursivity
Procedia PDF Downloads 4272096 Modeling of the Energy Storage Device: LTC3588
Authors: Mojtaba Ghodsi, Morteza Mohammadzaheri, Payam Soltani
Abstract:
This research aims to the characterisation of LTC3588 as a low-power energy storage model. A simple architecture of its internal circuit was presented. The effect of the storage capacitor (Cᵢₙ) and output capacitor (Cₒᵤₜ) on the output voltage (Vₒᵤₜ) when the vibration frequency was fixed at 3.2 Hz was investigated. The dependency of the rise time of the output voltage on the LTC3588's input and output capacitors was highlighted. It was found that by increasing the input capacitance from 1μF to 220μF, lower oscillation in the output voltage combined with a lower rate in the input voltage can be detected. Additionally, the smaller Cₒᵤₜ causes fewer jumps to meet the final output value (i.e., 3.2 V).Keywords: LTC3588, modeling, zener diode, LED
Procedia PDF Downloads 12095 Human Security: The Boko Haram Menace in Northern Nigeria in the 21st Century
Authors: Jimoh Yusuf Amuda
Abstract:
Human security is a great panacea for sustainable development of world societies. Today the whole globe cum human species is living in nightmares of insecurity. This is due to acts of terrorism by various terrorists’ organization worldwide. The situation is on the increase daily. The number of lives and properties lost to religious insurgency cannot be quantifiably analyzed. It is on this note that this paper examine the book haram menace in northern Nigerian vis-à-vis it’s threat to the existence of human lives. The methodology applied for this research is the multi-disciplinary approach, the use journal articles, news papers, magazines, oral interview. Field trips to areas of terrorist attack and the use of text books. The following recommendations were made base on the findings. First of all the Nigerian government should declare total war on the book haram terrorist, then secondly the source of armament coming to this terrorist should be blocked, thirdly the European world should also place an arms embargo on terrorist source arms demands, also security agencies-police, the military, immigration, customs, state security service should work hand-in-hand, in a security tight measures to reduce the penetration of insurgent into the society.Keywords: human, insecurity, security, terrorism
Procedia PDF Downloads 3412094 Optimized and Secured Digital Watermarking Using Entropy, Chaotic Grid Map and Its Performance Analysis
Authors: R. Rama Kishore, Sunesh
Abstract:
This paper presents an optimized, robust, and secured watermarking technique. The methodology used in this work is the combination of entropy and chaotic grid map. The proposed methodology incorporates Discrete Cosine Transform (DCT) on the host image. To improve the imperceptibility of the method, the host image DCT blocks, where the watermark is to be embedded, are further optimized by considering the entropy of the blocks. Chaotic grid is used as a key to reorder the DCT blocks so that it will further increase security while selecting the watermark embedding locations and its sequence. Without a key, one cannot reveal the exact watermark from the watermarked image. The proposed method is implemented on four different images. It is concluded that the proposed method is giving better results in terms of imperceptibility measured through PSNR and found to be above 50. In order to prove the effectiveness of the method, the performance analysis is done after implementing different attacks on the watermarked images. It is found that the methodology is very strong against JPEG compression attack even with the quality parameter up to 15. The experimental results are confirming that the combination of entropy and chaotic grid map method is strong and secured to different image processing attacks.Keywords: digital watermarking, discreate cosine transform, chaotic grid map, entropy
Procedia PDF Downloads 2522093 Isolation and Characterization White Spot Syndrome Protein Envelope Protein 19 from Black Tiger Shrimp (Penaeus monodon)
Authors: Andi Aliah Hidayani, Asmi Citra Malina A. R. Tassakka, Andi Parenrengi
Abstract:
Vanname Shrimp is one of the high yielding varieties that are more resistant to virus attacks. However, now this shrimp more death due to virus attack such as white spot disease caused by white spot syndrome virus (WSSV). Various efforts have done to prevent the disease, like immunostimulatory, probiotics, and vaccine. White spot syndrome virus (WSSV) envelope protein VP19 gene is important because of its involvement in the system infection of shrimp. This study aimed to isolate and characterize an envelope protein VP19 – encoding gene of WSSV using WSSV infected Vanname Shrimp sample from some areas in South Sulawesi (Pangkep, Barru and Pinrang). The genomic of DNA were isolated from shrimp muscle using DTAB-CTAB method. Isolation of gene encoding envelope protein VP19 WSSV ws successfully performed with the results of the length of DNA fragment was 387 bp. The results of homology analysis using BLASTn homology suggested that these isolates genes from Barru, Pangkep and Pinrang have closest relationship with isolates from Mexican.Keywords: vanname, shrimp, WSSV, viral protein 19
Procedia PDF Downloads 5352092 High Viscous Oil–Water Flow: Experiments and CFD Simulations
Authors: A. Archibong-Eso, J. Shi, Y Baba, S. Alagbe, W. Yan, H. Yeung
Abstract:
This study presents over 100 experiments conducted in a 25.4 mm internal diameter (ID) horizontal pipeline. Oil viscosity ranging from 3.5 Pa.s–5.0 Pa.s are used with superficial velocities of oil and water ranging from 0.06 to 0.55 m/s and 0.01 m/s to 1.0 m/s, respectively. Pressure gradient measurements and flow pattern observations are discussed. Numerical simulation of some flow conditions is performed using the commercial CFD code ANSYS Fluent® and the simulation results are compared with experimental results. Results indicate that CFD numerical simulation performed moderately well in predicting the flow configurations observed in this study while discrepancies were observed in the pressure gradient predictions.Keywords: flow patterns, plug, pressure gradient, rivulet
Procedia PDF Downloads 4252091 Post 2014 Afghanistan and Its Implications on Pakistan
Authors: Naad-E-Ali Sulehria
Abstract:
This paper unfolds the facts and findings of Afghan scenario particularly its implications on Pakistan. At present, the Post 2014 withdrawal of US and ISAF combat forces from Afghan land is one of the up-to-the-minute issues among analysts of international relations. Deliberating from the current situation of Afghanistan towards its future prospects and the elements vibrating Afghanistan's internal dynamics, as well as exploitation of its resources by other states and non-state actors, are discussed accordingly. Moreover, the reasons behind such a paradigm shift in US foreign policy are tried to be contemplated with first hand knowledge. It is investigated that 'what is the current image of Afghanistan in today's world?', 'what will be its future aspects?', and 'what sort of Afghanistan does Pakistan foresees' as the concerned area of discussion.Keywords: Afghanistan, Pakistan, new great game, taliban
Procedia PDF Downloads 3002090 Protective Effect of hsa-miR-124 against to Bacillus anthracis Toxins on Human Macrophage Cells
Authors: Ali Oztuna, Meral Sarper, Deniz Torun, Fatma Bayrakdar, Selcuk Kilic, Mehmet Baysallar
Abstract:
Bacillus anthracis is one of the biological agents most likely to be used in case of bioterrorist attack as well as being the cause of anthrax. The bacterium's major virulence factors are the anthrax toxins and an antiphagocytic polyglutamic capsule. TEM8 (ANTXR1) and CMG2 (ANTXR2) are ubiquitously expressed type I transmembrane proteins, and ANTXR2 is the major receptor for anthrax toxins. MicroRNAs are 21-24 bp small noncoding RNAs that regulate gene expression by base pairing with the 3' UTR (untranslated regions) of their target mRNAs resulting in mRNA degradation and/or translational repression. MicroRNAs contribute to regulation of most biological processes and influence numerous pathological states like infectious disease. In this study, post-exposure (toxins) protective effect of the hsa-miR-124-3p against Bacillus anthracis was examined. In this context, i) THP-1 and U937 cells were differentiated to MΦ macrophage, ii) miRNA transfection efficiencies were evaluated by flow cytometry and qPCR, iii) protection against Bacillus anthracis toxins were investigated by XTT, cAMP ELISA and MEK2 cleavage assays. Acknowledgements: This work was supported by the Scientific and Technological Research Council of Turkey (TUBITAK) under Grant SBAG-218S467.Keywords: ANTXR2, hsa-miR-124-3p, MΦ macrophage, THP-1, U937
Procedia PDF Downloads 1532089 Study the Behavior of Different Composite Short Columns (DST) with Prismatic Sections under Bending Load
Authors: V. Sadeghi Balkanlou, M. Reza Bagerzadeh Karimi, A. Hasanbakloo, B. Bagheri Azar
Abstract:
In this paper, the behavior of different types of DST columns has been studied under bending load. Briefly, composite columns consist of an internal carbon steel tube and an external stainless steel wall that the between the walls are filled with concrete. Composite columns are expected to combine the advantages of all three materials and have the advantage of high flexural stiffness of CFDST columns. In this research, ABAQUS software is used for finite element analysis then the results of ultimate strength of the composite sections are illustrated.Keywords: DST, stainless steel, carbon steel, ABAQUS, straigh columns, tapered columns
Procedia PDF Downloads 3882088 Adopting Flocks of Birds Approach to Predator for Anomalies Detection on Industrial Control Systems
Abstract:
Industrial Control Systems (ICS) such as Supervisory Control And Data Acquisition (SCADA) can be seen in many different critical infrastructures, from nuclear management to utility, medical equipment, power, waste and engine management on ships and planes. The role SCADA plays in critical infrastructure has resulted in a call to secure them. Many lives depend on it for daily activities and the attack vectors are becoming more sophisticated. Hence, the security of ICS is vital as malfunction of it might result in huge risk. This paper describes how the application of Prey Predator (PP) approach in flocks of birds could enhance the detection of malicious activities on ICS. The PP approach explains how these animals in groups or flocks detect predators by following some simple rules. They are not necessarily very intelligent animals but their approach in solving complex issues such as detection through corporation, coordination and communication worth emulating. This paper will emulate flocking behavior seen in birds in detecting predators. The PP approach will adopt six nearest bird approach in detecting any predator. Their local and global bests are based on the individual detection as well as group detection. The PP algorithm was designed following MapReduce methodology that follows a Split Detection Convergence (SDC) approach.Keywords: artificial life, industrial control system (ICS), IDS, prey predator (PP), SCADA, SDC
Procedia PDF Downloads 3012087 Causes of Nigeria Unrest and Conflict Situation
Authors: Victor Osaghae
Abstract:
In 2005, the CIA published a report warning that Nigeria, the seventh most populous country in the world, could disintegrate within 15 years. Nigeria experiences civil unrest, violence and strikes. Nigeria has one of the highest rates of internal violence in the world, only unlike others with similar levels of bloodshed such as Colombia or Chechnya, there is not a civil war going on. The types of unrest observed in Nigeria from literatures consulted can be categorized into five namely: religious, social, political, labour, and communal or ethnic unrests. The cuases of the unrests are as follows: injustice, unemployment, religious intolerance, illiteracy and government not filling agreements reached with unions. The cost due to these unrests cannot be quantified because it affects human, material/properties and money.Keywords: unrest, conflicts, Boko Haram, disturbance
Procedia PDF Downloads 3872086 Detection of Powdery Mildew Disease in Strawberry Using Image Texture and Supervised Classifiers
Authors: Sultan Mahmud, Qamar Zaman, Travis Esau, Young Chang
Abstract:
Strawberry powdery mildew (PM) is a serious disease that has a significant impact on strawberry production. Field scouting is still a major way to find PM disease, which is not only labor intensive but also almost impossible to monitor disease severity. To reduce the loss caused by PM disease and achieve faster automatic detection of the disease, this paper proposes an approach for detection of the disease, based on image texture and classified with support vector machines (SVMs) and k-nearest neighbors (kNNs). The methodology of the proposed study is based on image processing which is composed of five main steps including image acquisition, pre-processing, segmentation, features extraction and classification. Two strawberry fields were used in this study. Images of healthy leaves and leaves infected with PM (Sphaerotheca macularis) disease under artificial cloud lighting condition. Colour thresholding was utilized to segment all images before textural analysis. Colour co-occurrence matrix (CCM) was introduced for extraction of textural features. Forty textural features, related to a physiological parameter of leaves were extracted from CCM of National television system committee (NTSC) luminance, hue, saturation and intensity (HSI) images. The normalized feature data were utilized for training and validation, respectively, using developed classifiers. The classifiers have experimented with internal, external and cross-validations. The best classifier was selected based on their performance and accuracy. Experimental results suggested that SVMs classifier showed 98.33%, 85.33%, 87.33%, 93.33% and 95.0% of accuracy on internal, external-I, external-II, 4-fold cross and 5-fold cross-validation, respectively. Whereas, kNNs results represented 90.0%, 72.00%, 74.66%, 89.33% and 90.3% of classification accuracy, respectively. The outcome of this study demonstrated that SVMs classified PM disease with a highest overall accuracy of 91.86% and 1.1211 seconds of processing time. Therefore, overall results concluded that the proposed study can significantly support an accurate and automatic identification and recognition of strawberry PM disease with SVMs classifier.Keywords: powdery mildew, image processing, textural analysis, color co-occurrence matrix, support vector machines, k-nearest neighbors
Procedia PDF Downloads 1202085 Functional Beverage to Boosting Immune System in Elderly
Authors: Adineh Tajmousavilangerudi, Ali Zein Alabiden Tlais, Raffaella Di Cagno
Abstract:
The SARS-Cov-2 pandemic has exposed our vulnerability to new illnesses and novel viruses that attack our immune systems, particularly in the elderly. The vaccine is being gradually introduced over the world, but new strains of the virus and COVID-19 will emerge and continue to cause illness. Aging is associated with significant changes in intestinal physiology, which increases the production of inflammatory products, alters the gut microbiota, and consequently establish inadequate immune response to minimize symptoms and disease development. In this context, older people who followed a Mediterranean-style diet, rich in polyphenols and dietary fiber, performed better physically and mentally (1,2). This demonstrates the importance of the human gut microbiome in transforming complex dietary macromolecules into the most biologically available and active nutrients, which in turn help to regulate metabolism and both intestinal and systemic immune function (3,4). The role of lactic acid fermentation is prominent also as a powerful tool for improving the nutritional quality of the human diet by releasing nutrients and boosting the complex bioactive compounds and vitamin content. the PhD project aims to design fermented and functional foods/beverages capable of modulating human immune function via the gut microbiome.Keywords: functional bevarage, fermented beverage, gut microbiota functionality, immun system
Procedia PDF Downloads 1122084 A Computational Fluid Dynamics Study of Turbulence Flow and Parameterization of an Aerofoil
Authors: Mohamed Z. M. Duwahir, Shian Gao
Abstract:
The main objective of this project was to introduce and test a new scheme for parameterization of subsonic aerofoil, using a function called Shape Function. Python programming was used to create a user interactive environment for geometry generation of aerofoil using NACA and Shape Function methodologies. Two aerofoils, NACA 0012 and NACA 1412, were generated using this function. Testing the accuracy of the Shape Function scheme was done by Linear Square Fitting using Python and CFD modelling the aerofoil in Fluent. NACA 0012 (symmetrical aerofoil) was better approximated using Shape Function than NACA 1412 (cambered aerofoil). The second part of the project involved comparing two turbulent models, k-ε and Spalart-Allmaras (SA), in Fluent by modelling the aerofoils NACA 0012 and NACA 1412 in conditions of Reynolds number of 3 × 106. It was shown that SA modelling is better for aerodynamic purpose. The experimental coefficient of lift (Cl) and coefficient of drag (Cd) were compared with empirical wind tunnel data for a range of angle of attack (AOA). As a further step, this project involved drawing and meshing 3D wings in Gambit. The 3D wing flow was solved and compared with 2D aerofoil section experimental results and wind tunnel data.Keywords: CFD simulation, shape function, turbulent modelling, aerofoil
Procedia PDF Downloads 3582083 The Strategy of Orbit Avoidance for Optical Remote Sensing Satellite
Authors: Dianxun Zheng, Wuxing Jing, Lin Hetong
Abstract:
Optical remote sensing satellite, always running on the Sun-synchronous orbit, equipped laser warning equipment to alert CCD camera from laser attack. There have three ways to protect the CCD camera, closing the camera cover satellite attitude maneuver and satellite orbit avoidance. In order to enhance the safety of optical remote sensing satellite in orbit, this paper explores the strategy of satellite avoidance. The avoidance strategy is expressed as the evasion of pre-determined target points in the orbital coordinates of virtual satellite. The so-called virtual satellite is a passive vehicle which superposes a satellite at the initial stage of avoidance. The target points share the consistent cycle time and the same semi-major axis with the virtual satellite, which ensures the properties of the Sun-synchronous orbit remain unchanged. Moreover, to further strengthen the avoidance capability of satellite, it can perform multi-object avoid maneuvers. On occasions of fulfilling the orbit tasks of the satellite, the orbit can be restored back to virtual satellite through orbit maneuvers. There into, the avoid maneuvers adopts pulse guidance. and the fuel consumption is also optimized. The avoidance strategy discussed in this article is applicable to avoidance for optical remote sensing satellite when encounter the laser hostile attacks.Keywords: optical remote sensing satellite, always running on the sun-synchronous
Procedia PDF Downloads 400