Search results for: control process
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 23840

Search results for: control process

13940 Effect of Reminiscence Therapy on the Sleep Quality of the Elderly Living in Nursing Homes

Authors: Güler Duru Aşiret

Abstract:

Introduction: Poor sleep quality is a common problem among the older people living in nursing homes. Our study aimed at assessing the effect of individual reminiscence therapy on the sleep quality of the elderly living in nursing homes. Methods: The study had 22 people in the intervention group and 24 people in the control group. The intervention group had reminiscence therapy once a week for 12 weeks in the form of individual sessions of 25-30 minutes. In our study, we first determined the dates suitable for the intervention group and researcher and planned the date and time of individual reminiscence therapies, which would take 12 weeks. While preparing this schedule, we considered subjects’ time schedules for their regular visits to health facilities and the arrival of their visitors. At this stage, the researcher informed the participants that their regular attendance in sessions would affect the intervention outcome. One topic was discussed every week. Weekly topics included: introduction in the first week; childhood and family life, school days, starting work and work life (a day at home for housewives), a fun day out of home, marriage (friendship for the singles), plants and animals they loved, babies and children, food and cooking, holidays and travelling, special days and celebrations, assessment and closure, in the following weeks respectively. The control group had no intervention. Study data was collected by using an introductory information form and the Pittsburgh Sleep Quality Index (PSQI). Results: In our study, participants’ average age was 76.02 ± 7.31. 58.7% of them were male and 84.8% were single. All of them had at least one chronic disease. 76.1% did not need help for performing their daily life activities. The length of stay in the institution was 6.32 ± 3.85 years. According to the participants’ descriptive characteristics, there was no difference between groups. While there was no statistically significant difference between the pretest PSQI median scores (p > 0.05) of both groups, PSQI median score had a statistically significant decrease after 12 weeks of reminiscence therapy (p < 0.05). There was no statistically significant change in the median scores of the subcomponents of sleep latency, sleep duration, sleep efficiency, sleep disturbance and use of sleep medication before and after reminiscence therapy. After the 12-weeks reminiscence therapy, there was a statistically significant change in the median scores for the PSQI subcomponents of subjective sleep quality (p<0.05). Conclusion: Our study found that reminiscence therapy increased the sleep quality of the elderly living in nursing homes. Acknowledgment: This study (project no 2017-037) was supported by the Scientific Research Projects Coordination Unit of Aksaray University. We thank the elderly subjects for their kind participation.

Keywords: nursing, older people, reminiscence therapy, sleep

Procedia PDF Downloads 113
13939 Designing and Implementing a Tourist-Guide Web Service Based on Volunteer Geographic Information Using Open-Source Technologies

Authors: Javad Sadidi, Ehsan Babaei, Hani Rezayan

Abstract:

The advent of web 2.0 gives a possibility to scale down the costs of data collection and mapping, specifically if the process is done by volunteers. Every volunteer can be thought of as a free and ubiquitous sensor to collect spatial, descriptive as well as multimedia data for tourist services. The lack of large-scale information, such as real-time climate and weather conditions, population density, and other related data, can be considered one of the important challenges in developing countries for tourists to make the best decision in terms of time and place of travel. The current research aims to design and implement a spatiotemporal web map service using volunteer-submitted data. The service acts as a tourist-guide service in which tourists can search interested places based on their requested time for travel. To design the service, three tiers of architecture, including data, logical processing, and presentation tiers, have been utilized. For implementing the service, open-source software programs, client and server-side programming languages (such as OpenLayers2, AJAX, and PHP), Geoserver as a map server, and Web Feature Service (WFS) standards have been used. The result is two distinct browser-based services, one for sending spatial, descriptive, and multimedia volunteer data and another one for tourists and local officials. Local official confirms the veracity of the volunteer-submitted information. In the tourist interface, a spatiotemporal search engine has been designed to enable tourists to find a tourist place based on province, city, and location at a specific time of interest. Implementing the tourist-guide service by this methodology causes the following: the current tourists participate in a free data collection and sharing process for future tourists, a real-time data sharing and accessing for all, avoiding a blind selection of travel destination and significantly, decreases the cost of providing such services.

Keywords: VGI, tourism, spatiotemporal, browser-based, web mapping

Procedia PDF Downloads 77
13938 The Internet of Things Ecosystem: Survey of the Current Landscape, Identity Relationship Management, Multifactor Authentication Mechanisms, and Underlying Protocols

Authors: Nazli W. Hardy

Abstract:

A critical component in the Internet of Things (IoT) ecosystem is the need for secure and appropriate transmission, processing, and storage of the data. Our current forms of authentication, and identity and access management do not suffice because they are not designed to service cohesive, integrated, interconnected devices, and service applications. The seemingly endless opportunities of IoT are in fact circumscribed on multiple levels by concerns such as trust, privacy, security, loss of control, and related issues. This paper considers multi-factor authentication (MFA) mechanisms and cohesive identity relationship management (IRM) standards. It also surveys messaging protocols that are appropriate for the IoT ecosystem.

Keywords: identity relation management, multifactor authentication, protocols, survey of internet of things ecosystem

Procedia PDF Downloads 337
13937 Performance Analysis of Double Gate FinFET at Sub-10NM Node

Authors: Suruchi Saini, Hitender Kumar Tyagi

Abstract:

With the rapid progress of the nanotechnology industry, it is becoming increasingly important to have compact semiconductor devices to function and offer the best results at various technology nodes. While performing the scaling of the device, several short-channel effects occur. To minimize these scaling limitations, some device architectures have been developed in the semiconductor industry. FinFET is one of the most promising structures. Also, the double-gate 2D Fin field effect transistor has the benefit of suppressing short channel effects (SCE) and functioning well for less than 14 nm technology nodes. In the present research, the MuGFET simulation tool is used to analyze and explain the electrical behaviour of a double-gate 2D Fin field effect transistor. The drift-diffusion and Poisson equations are solved self-consistently. Various models, such as Fermi-Dirac distribution, bandgap narrowing, carrier scattering, and concentration-dependent mobility models, are used for device simulation. The transfer and output characteristics of the double-gate 2D Fin field effect transistor are determined at 10 nm technology node. The performance parameters are extracted in terms of threshold voltage, trans-conductance, leakage current and current on-off ratio. In this paper, the device performance is analyzed at different structure parameters. The utilization of the Id-Vg curve is a robust technique that holds significant importance in the modeling of transistors, circuit design, optimization of performance, and quality control in electronic devices and integrated circuits for comprehending field-effect transistors. The FinFET structure is optimized to increase the current on-off ratio and transconductance. Through this analysis, the impact of different channel widths, source and drain lengths on the Id-Vg and transconductance is examined. Device performance was affected by the difficulty of maintaining effective gate control over the channel at decreasing feature sizes. For every set of simulations, the device's features are simulated at two different drain voltages, 50 mV and 0.7 V. In low-power and precision applications, the off-state current is a significant factor to consider. Therefore, it is crucial to minimize the off-state current to maximize circuit performance and efficiency. The findings demonstrate that the performance of the current on-off ratio is maximum with the channel width of 3 nm for a gate length of 10 nm, but there is no significant effect of source and drain length on the current on-off ratio. The transconductance value plays a pivotal role in various electronic applications and should be considered carefully. In this research, it is also concluded that the transconductance value of 340 S/m is achieved with the fin width of 3 nm at a gate length of 10 nm and 2380 S/m for the source and drain extension length of 5 nm, respectively.

Keywords: current on-off ratio, FinFET, short-channel effects, transconductance

Procedia PDF Downloads 52
13936 Hermitical Landscapes: The Congregation of Saint Paul of Serra De Ossa

Authors: Rolando Volzone

Abstract:

The Congregation of Saint Paul of Serra de Ossa (Ossa Mountain) was founded in 1482, originated by the eremitic movement of the homens da pobre vida (poor life men), which is documented since 1366. The community of hermits expanded up to the first half of the 15th century, mostly in southern Portugal in the Alentejo region. In 1578, following a process of institutionalization led by the Church, an autonomous congregation was set up, affiliated in the Hungarian Order of Saint Paul the First Hermit, until 1834, when the decree of dissolution of the religious orders disbanded all the convents and monasteries in Portugal. The architectural evidences that reached our days as a legacy of the hermitical movement in Serra de Ossa, although studied and analysed from an historical point of view, are still little known with respect to the architectural characteristics of its physical implantation and its relationship with the natural systems. This research intends to expose the appropriation process of the locus eremus as a starting point for the interpretation of this landscape, evidencing the close relationship between the religious experience and the physical space chosen to reach the perfection of the soul. The locus eremus is thus determined not only by practical aspects such as the absolute and relative location, orography, existence of water resources, or the King’s favoring to the religious and settlement action of the hermits, but also by spiritual aspects related to the symbolism of the physical elements present and the solitary walk of these men. These aspects, combined with the built architectural elements and other exerted human action, may be fertile ground for the definition of a hypothetical hermitical landscape based on the sufficiently distinctive characteristics that sustain it. The landscape built by these hermits is established as a cultural and material heritage, and its preservation is of utmost importance. They deeply understood this place and took advantage of its natural resources, manipulating them in an ecological and economically sustainable way, respecting the place, without overcoming its own genius loci but becoming part of it.

Keywords: architecture, congregation of Saint Paul of Serra de Ossa, heremitical landscape, locus eremus

Procedia PDF Downloads 216
13935 Transparency of Algorithmic Decision-Making: Limits Posed by Intellectual Property Rights

Authors: Olga Kokoulina

Abstract:

Today, algorithms are assuming a leading role in various areas of decision-making. Prompted by a promise to provide increased economic efficiency and fuel solutions for pressing societal challenges, algorithmic decision-making is often celebrated as an impartial and constructive substitute for human adjudication. But in the face of this implied objectivity and efficiency, the application of algorithms is also marred with mounting concerns about embedded biases, discrimination, and exclusion. In Europe, vigorous debates on risks and adverse implications of algorithmic decision-making largely revolve around the potential of data protection laws to tackle some of the related issues. For example, one of the often-cited venues to mitigate the impact of potentially unfair decision-making practice is a so-called 'right to explanation'. In essence, the overall right is derived from the provisions of the General Data Protection Regulation (‘GDPR’) ensuring the right of data subjects to access and mandating the obligation of data controllers to provide the relevant information about the existence of automated decision-making and meaningful information about the logic involved. Taking corresponding rights and obligations in the context of the specific provision on automated decision-making in the GDPR, the debates mainly focus on efficacy and the exact scope of the 'right to explanation'. In essence, the underlying logic of the argued remedy lies in a transparency imperative. Allowing data subjects to acquire as much knowledge as possible about the decision-making process means empowering individuals to take control of their data and take action. In other words, forewarned is forearmed. The related discussions and debates are ongoing, comprehensive, and, often, heated. However, they are also frequently misguided and isolated: embracing the data protection law as ultimate and sole lenses are often not sufficient. Mandating the disclosure of technical specifications of employed algorithms in the name of transparency for and empowerment of data subjects potentially encroach on the interests and rights of IPR holders, i.e., business entities behind the algorithms. The study aims at pushing the boundaries of the transparency debate beyond the data protection regime. By systematically analysing legal requirements and current judicial practice, it assesses the limits of the transparency requirement and right to access posed by intellectual property law, namely by copyrights and trade secrets. It is asserted that trade secrets, in particular, present an often-insurmountable obstacle for realising the potential of the transparency requirement. In reaching that conclusion, the study explores the limits of protection afforded by the European Trade Secrets Directive and contrasts them with the scope of respective rights and obligations related to data access and portability enshrined in the GDPR. As shown, the far-reaching scope of the protection under trade secrecy is evidenced both through the assessment of its subject matter as well as through the exceptions from such protection. As a way forward, the study scrutinises several possible legislative solutions, such as flexible interpretation of the public interest exception in trade secrets as well as the introduction of the strict liability regime in case of non-transparent decision-making.

Keywords: algorithms, public interest, trade secrets, transparency

Procedia PDF Downloads 114
13934 Using Lysosomal Immunogenic Cell Death to Target Breast Cancer via Xanthine Oxidase/Micro-Antibody Fusion Protein

Authors: Iulianna Taritsa, Kuldeep Neote, Eric Fossel

Abstract:

Lysosome-induced immunogenic cell death (LIICD) is a powerful mechanism of targeting cancer cells that kills circulating malignant cells and primes the host’s immune cells against future remission. Current immunotherapies for cancer are limited in preventing recurrence – a gap that can be bridged by training the immune system to recognize cancer neoantigens. Lysosomal leakage can be induced therapeutically to traffic antigens from dying cells to dendritic cells, which can later present those tumorigenic antigens to T cells. Previous research has shown that oxidative agents administered in the tumor microenvironment can initiate LIICD. We generated a fusion protein between an oxidative agent known as xanthine oxidase (XO) and a mini-antibody specific for EGFR/HER2-sensitive breast tumor cells. The anti-EGFR single domain antibody fragment is uniquely sourced from llama, which is functional without the presence of a light chain. These llama micro-antibodies have been shown to be better able to penetrate tissues and have improved physicochemical stability as compared to traditional monoclonal antibodies. We demonstrate that the fusion protein created is stable and can induce early markers of immunogenic cell death in an in vitro human breast cancer cell line (SkBr3). Specifically, we measured overall cell death, as well as surface-expressed calreticulin, extracellular ATP release, and HMGB1 production. These markers are consensus indicators of ICD. Flow cytometry, luminescence assays, and ELISA were used respectively to quantify biomarker levels between treated versus untreated cells. We also included a positive control group of SkBr3 cells dosed with doxorubicin (a known inducer of LIICD) and a negative control dosed with cisplatin (a known inducer of cell death, but not of the immunogenic variety). We looked at each marker at various time points after cancer cells were treated with the XO/antibody fusion protein, doxorubicin, and cisplatin. Upregulated biomarkers after treatment with the fusion protein indicate an immunogenic response. We thus show the potential for this fusion protein to induce an anticancer effect paired with an adaptive immune response against EGFR/HER2+ cells. Our research in human cell lines here provides evidence for the success of the same therapeutic method for patients and serves as the gateway to developing a new treatment approach against breast cancer.

Keywords: apoptosis, breast cancer, immunogenic cell death, lysosome

Procedia PDF Downloads 189
13933 Computational Linguistic Implications of Gender Bias: Machines Reflect Misogyny in Society

Authors: Irene Yi

Abstract:

Machine learning, natural language processing, and neural network models of language are becoming more and more prevalent in the fields of technology and linguistics today. Training data for machines are at best, large corpora of human literature and at worst, a reflection of the ugliness in society. Computational linguistics is a growing field dealing with such issues of data collection for technological development. Machines have been trained on millions of human books, only to find that in the course of human history, derogatory and sexist adjectives are used significantly more frequently when describing females in history and literature than when describing males. This is extremely problematic, both as training data, and as the outcome of natural language processing. As machines start to handle more responsibilities, it is crucial to ensure that they do not take with them historical sexist and misogynistic notions. This paper gathers data and algorithms from neural network models of language having to deal with syntax, semantics, sociolinguistics, and text classification. Computational analysis on such linguistic data is used to find patterns of misogyny. Results are significant in showing the existing intentional and unintentional misogynistic notions used to train machines, as well as in developing better technologies that take into account the semantics and syntax of text to be more mindful and reflect gender equality. Further, this paper deals with the idea of non-binary gender pronouns and how machines can process these pronouns correctly, given its semantic and syntactic context. This paper also delves into the implications of gendered grammar and its effect, cross-linguistically, on natural language processing. Languages such as French or Spanish not only have rigid gendered grammar rules, but also historically patriarchal societies. The progression of society comes hand in hand with not only its language, but how machines process those natural languages. These ideas are all extremely vital to the development of natural language models in technology, and they must be taken into account immediately.

Keywords: computational analysis, gendered grammar, misogynistic language, neural networks

Procedia PDF Downloads 102
13932 Performance Analysis of Transformerless DC-DC Boost Converter

Authors: Nidhi Vijay, A. K. Sharma

Abstract:

Many industrial applications require power from dc source. DC-DC boost converters are now being used all over the world for rapid transit system. Although these provide high efficiency, smooth control, fast response and regeneration, conventional DC-DC boost converters are unable to provide high step up voltage gain due to effect of power switches, rectifier diodes and equivalent series resistance of inductor and capacitor. This paper proposes new transformerless dc-dc converters to achieve high step up voltage gain as compared to the conventional converter without an extremely high duty ratio. Only one power stage is used in this converter. Steady-state analysis of voltage gain is discussed in brief. Finally, a comparative analysis is given in order to verify the results.

Keywords: MATLAB, DC-DC boost converter, voltage gain, voltage stress

Procedia PDF Downloads 413
13931 Effect of the Workpiece Position on the Manufacturing Tolerances

Authors: Rahou Mohamed , Sebaa Fethi, Cheikh Abdelmadjid

Abstract:

Manufacturing tolerancing is intended to determine the intermediate geometrical and dimensional states of the part during its manufacturing process. These manufacturing dimensions also serve to satisfy not only the functional requirements given in the definition drawing but also the manufacturing constraints, for example geometrical defects of the machine, vibration, and the wear of the cutting tool. The choice of positioning has an important influence on the cost and quality of manufacture. To avoid this problem, a two-step approach have been developed. The first step is dedicated to the determination of the optimum position. As for the second step, a study was carried out for the tightening effect on the tolerance interval.

Keywords: dispersion, tolerance, manufacturing, position

Procedia PDF Downloads 325
13930 Mobile Payment over NFC: The M-Check System Case

Authors: Karima Maazouz, Habib Benlahmer, Naceur Achtaich

Abstract:

The realization of mobile payments will make possible new and unforeseen ways of convenience and m-commerce. Mobile payment today benefit from technology and trends. NFC technology is creating a new era of contactless mobile payment. the “M-check” is a mobile payment system provides a new way facilitating transaction with high valued payment and enable new m-commerce. The objective of the paper is to propose a new solution for m-payment. The proposed combination of m-check system and NFC offers acceptable security for payment mobile, client’s satisfaction, and simplifies the process payment between clients and merchants.

Keywords: M-payment, NFC, M-check, M-commerce, security

Procedia PDF Downloads 579
13929 Intersectional Bullying, LGBT Youth and the Construction of Power

Authors: Elle Hilke Dominski

Abstract:

This paper explores the impact of intersectional bullying of lesbian, gay, bisexual, transgender (LGBT) youth from a multi-layered experience perspective within bullying incidents at school. Present inclusionary measures at school may not be designed as a continuous process of finding better methods for responding to diversity, rather remain ‘fixed’ as singular solutions applied universally. This paper argues recognizing education through a lens of inclusion begins to realize most educational systems are poorly equipped to handle diversity.

Keywords: bullying, education, intersectional bullying, LGBT

Procedia PDF Downloads 207
13928 A Review of Literature for Online Social Network Business Continuance Intention and the Hypotheses Thereof

Authors: Akwesi Assensoh-Kodua

Abstract:

Online Social Networks (OSN) has come and gone, yet the explosion of business activities on such platforms continuous to surge high, giving advantage to the bold entrepreneurs. It is therefore a practical requirement that practitioners and researchers understand the key determinants of costumers’ online social network business activities and continuance intention. An exploratory literature research to examine OSN continuous intention of business participants on OSN revealed that the practice of doing business on social network has come to stay and the following factors are the likely drivers for this new business model: perceived trust, perceived ease of use, confirmation, habit, social norm, perceived behavioural control, expected benefit, and satisfaction are the most probable factors that can lead to online social network (OSN) continuance intention.

Keywords: online social network, continuance intention, business continuance

Procedia PDF Downloads 478
13927 Quality Assessment of Pedestrian Streets in Iran: Case Study of Saf, Tehran

Authors: Fstemeh Rais Esmaili, Ehsan Ranjbar

Abstract:

Pedestrian streets as one type of urban public spaces have an important role in improving the quality of urban life. In Iran, planning and designing of pedestrian streets is in its primary steps. In spite of starting this approach in Iran, and designing several pedestrian streets, there are still not organized studies about quality assessment of pedestrian streets. As a result, the strength and weakness points of the initial experiences have not been utilized. This inattention to quality assessment have caused designing pedestrian streets to be limited to just vehicles traffic control and preliminary actions like paving; so that, special potentials of pedestrian streets for creating social, livable and dynamic public spaces have not been used. This article, as an organized study about quality assessment of pedestrian streets in Iran, tries to reach two main goals: first, introducing a framework for quality assessment of pedestrian streets in Iran, and second, creating a context for improving the quality of pedestrian streets especially for further experiences. The main research methods are description and context analyzing. With respect to comparative analysis of ideas about quality, considering international and local case studies and analyzing existing condition of Saf Pedestrian Street, a particular model for quality assessment has been introduced. In this model, main components and assessment criteria have been presented. On the basis of this model, questionnaire and checklist for assessment have been prepared. The questionnaire and interview have been used to assess qualities which are in direct contact with people and the checklist has been used for analyzing visual qualities by authors through observation. Some results of questionnaire and checklist show that 7 of 11 primary components, diversity, flexibility, cleanness, legibility and imaginably, identity, livability, form and physical setting are rated low and very low in quality degree. Three components, efficiency, comfort and distinctiveness, have medium and low quality degree and one component, access, linkage and permeability has high quality degree. Therefore, based on implemented analyzing process, Saf Pedestrian Street needs to be improved and these quality improvement priorities are determined based on presented criteria. Adaption of final results with existing condition illustrates the shortage of services for satisfying user’s needs, inflexibility and impossibility of using spaces in various times, lack of facilities for different climatic conditions, lack of facilities such as drinking fountain, inappropriate designing of existing urban furniture like garbage cans, and creating pollution and unsuitable view, lack of visual attractions, neglecting disabled persons in designing entrances, shortage of benches and their undesirable designing, lack of vegetation, absence of special characters making it different from other streets, preventing people taking part in the space causing lack of affiliation, lack of appropriate elements for leisure time and lack of exhilaration in the space. On the other hand, these results present high access and permeability, high safety, less sound pollution and more relief, comfortable movement along the way due to suitable pavement and economic efficiency, as the strength points of Saf pedestrian street.

Keywords: pedestrian streets, quality assessment, quality criteria, Saf Pedestrian Street

Procedia PDF Downloads 241
13926 Design and Implementation of a Memory Safety Isolation Method Based on the Xen Cloud Environment

Authors: Dengpan Wu, Dan Liu

Abstract:

In view of the present cloud security problem has increasingly become one of the major obstacles hindering the development of the cloud computing, put forward a kind of memory based on Xen cloud environment security isolation technology implementation. And based on Xen virtual machine monitor system, analysis of the model of memory virtualization is implemented, using Xen memory virtualization system mechanism of super calls and grant table, based on the virtual machine manager internal implementation of access control module (ACM) to design the security isolation system memory. Experiments show that, the system can effectively isolate different customer domain OS between illegal access to memory data.

Keywords: cloud security, memory isolation, xen, virtual machine

Procedia PDF Downloads 390
13925 Forensic Comparison of Facial Images for Human Identification

Authors: D. P. Gangwar

Abstract:

Identification of human through facial images has got great importance in forensic science. The video recordings, CCTV footage, passports, driver licenses and other related documents are invariably sent to the laboratory for comparison of the questioned photographs as well as video recordings with suspected photographs/recordings to prove the identity of a person. More than 300 questioned and 300 control photographs received in actual crime cases, received from various investigation agencies, have been compared by me so far using various familiar analysis and comparison techniques such as Holistic comparison, Morphological analysis, Photo-anthropometry and superimposition. On the basis of findings obtained during the examination huge photo exhibits, a realistic and comprehensive technique has been proposed which could be very useful for forensic.

Keywords: CCTV Images, facial features, photo-anthropometry, superimposition

Procedia PDF Downloads 516
13924 Physico-Mechanical Behavior of Indian Oil Shales

Authors: K. S. Rao, Ankesh Kumar

Abstract:

The search for alternative energy sources to petroleum has increased these days because of increase in need and depletion of petroleum reserves. Therefore the importance of oil shales as an economically viable substitute has increased many folds in last 20 years. The technologies like hydro-fracturing have opened the field of oil extraction from these unconventional rocks. Oil shale is a compact laminated rock of sedimentary origin containing organic matter known as kerogen which yields oil when distilled. Oil shales are formed from the contemporaneous deposition of fine grained mineral debris and organic degradation products derived from the breakdown of biota. Conditions required for the formation of oil shales include abundant organic productivity, early development of anaerobic conditions, and a lack of destructive organisms. These rocks are not gown through the high temperature and high pressure conditions in Mother Nature. The most common approach for oil extraction is drastically breaking the bond of the organics which involves retorting process. The two approaches for retorting are surface retorting and in-situ processing. The most environmental friendly approach for extraction is In-situ processing. The three steps involved in this process are fracturing, injection to achieve communication, and fluid migration at the underground location. Upon heating (retorting) oil shale at temperatures in the range of 300 to 400°C, the kerogen decomposes into oil, gas and residual carbon in a process referred to as pyrolysis. Therefore it is very important to understand the physico-mechenical behavior of such rocks, to improve the technology for in-situ extraction. It is clear from the past research and the physical observations that these rocks will behave as an anisotropic rock so it is very important to understand the mechanical behavior under high pressure at different orientation angles for the economical use of these resources. By knowing the engineering behavior under above conditions will allow us to simulate the deep ground retorting conditions numerically and experimentally. Many researchers have investigate the effect of organic content on the engineering behavior of oil shale but the coupled effect of organic and inorganic matrix is yet to be analyzed. The favourable characteristics of Assam coal for conversion to liquid fuels have been known for a long time. Studies have indicated that these coals and carbonaceous shale constitute the principal source rocks that have generated the hydrocarbons produced from the region. Rock cores of the representative samples are collected by performing on site drilling, as coring in laboratory is very difficult due to its highly anisotropic nature. Different tests are performed to understand the petrology of these samples, further the chemical analyses are also done to exactly quantify the organic content in these rocks. The mechanical properties of these rocks are investigated by considering different anisotropic angles. Now the results obtained from petrology and chemical analysis are correlated with the mechanical properties. These properties and correlations will further help in increasing the producibility of these rocks. It is well established that the organic content is negatively correlated to tensile strength, compressive strength and modulus of elasticity.

Keywords: oil shale, producibility, hydro-fracturing, kerogen, petrology, mechanical behavior

Procedia PDF Downloads 333
13923 Increasing Performance of Autopilot Guided Small Unmanned Helicopter

Authors: Tugrul Oktay, Mehmet Konar, Mustafa Soylak, Firat Sal, Murat Onay, Orhan Kizilkaya

Abstract:

In this paper, autonomous performance of a small manufactured unmanned helicopter is tried to be increased. For this purpose, a small unmanned helicopter is manufactured in Erciyes University, Faculty of Aeronautics and Astronautics. It is called as ZANKA-Heli-I. For performance maximization, autopilot parameters are determined via minimizing a cost function consisting of flight performance parameters such as settling time, rise time, overshoot during trajectory tracking. For this purpose, a stochastic optimization method named as simultaneous perturbation stochastic approximation is benefited. Using this approach, considerable autonomous performance increase (around %23) is obtained.

Keywords: small helicopters, hierarchical control, stochastic optimization, autonomous performance maximization, autopilots

Procedia PDF Downloads 567
13922 Nyaya, Buddhist School Controversy regarding the Laksana of Pratyaksa: Causal versus Conceptual Analysis

Authors: Maitreyee Datta

Abstract:

Buddhist lakṣaņa of pratyakṣa pramā is not the result of the causal analysis of the genesis of it. Naiyāyikas, on the other hand, has provided the lakṣaņa of pratyakṣa in terms of the causal analysis of it. Thus, though in these two philosophical systems philosophers have discussed in detail the nature of pratyakṣa pramā (perception), yet their treatments and understanding of it vary according to their respective understanding of pramā and prmāņa and their relationship. In Nyāya school, the definition (lakṣņa) of perception (pratyakṣa) has been given in terms of the process by virtue of which it has been generated. Thus, Naiyāyikas were found to provide a causal account of perception (pratyakṣa) by virtue of their lakṣaņa of it. But in Buddhist epistemology perception has been defined by virtue of the nature of perceptual knowledge (pratyakṣa pramā) which is devoid of any vikalpa or cognition. These two schools differed due to their different metaphysical presuppositions which determine their epistemological pursuits. The Naiyāyikas admitted pramā and pramāņa as separate events and they have taken pramāņa to be the cause of pramā. These presuppositions enabled them to provide a lakṣaņa of pratyakṣa pramā in terms of the causes by which it is generated. Why did the Buddhist epistemologists define perception by the unique nature of perceptual knowledge instead of the process by which it is generated? This question will be addressed and dealt with in the present paper. In doing so, the unique purpose of Buddhist philosophy will be identified which will enable us to find out an answer to the above question. This enterprise will also reveal the close relationship among some basic Buddhist presuppositions like pratityasamutpādavāda and kṣaņikavāda with Buddhist epistemological positions. In other words, their distinctive notion of pramā (knowledge) indicates their unique epistemological position which is found to comply with their basic philosophical presuppositions. The first section of the paper will present the Buddhist epistemologists’ lakṣaņa of pratyakṣa. The analysis of the lakṣaņa will be given in clear terms to reveal the nature of pratyakṣa as an instance of pramā. In the second section, an effort will be made to identify the uniqueness of such a definition. Here an articulation will be made in which the relationship among basic Buddhist presuppositions and their unique epistemological positions are determined. In the third section of the paper, an effort will be made to compare Nyāya epistemologist’s position regarding pratyakṣa with that of the Buddhist epistemologist.

Keywords: laksana, prama, pramana, pratyksa

Procedia PDF Downloads 132
13921 Constructing a Semi-Supervised Model for Network Intrusion Detection

Authors: Tigabu Dagne Akal

Abstract:

While advances in computer and communications technology have made the network ubiquitous, they have also rendered networked systems vulnerable to malicious attacks devised from a distance. These attacks or intrusions start with attackers infiltrating a network through a vulnerable host and then launching further attacks on the local network or Intranet. Nowadays, system administrators and network professionals can attempt to prevent such attacks by developing intrusion detection tools and systems using data mining technology. In this study, the experiments were conducted following the Knowledge Discovery in Database Process Model. The Knowledge Discovery in Database Process Model starts from selection of the datasets. The dataset used in this study has been taken from Massachusetts Institute of Technology Lincoln Laboratory. After taking the data, it has been pre-processed. The major pre-processing activities include fill in missed values, remove outliers; resolve inconsistencies, integration of data that contains both labelled and unlabelled datasets, dimensionality reduction, size reduction and data transformation activity like discretization tasks were done for this study. A total of 21,533 intrusion records are used for training the models. For validating the performance of the selected model a separate 3,397 records are used as a testing set. For building a predictive model for intrusion detection J48 decision tree and the Naïve Bayes algorithms have been tested as a classification approach for both with and without feature selection approaches. The model that was created using 10-fold cross validation using the J48 decision tree algorithm with the default parameter values showed the best classification accuracy. The model has a prediction accuracy of 96.11% on the training datasets and 93.2% on the test dataset to classify the new instances as normal, DOS, U2R, R2L and probe classes. The findings of this study have shown that the data mining methods generates interesting rules that are crucial for intrusion detection and prevention in the networking industry. Future research directions are forwarded to come up an applicable system in the area of the study.

Keywords: intrusion detection, data mining, computer science, data mining

Procedia PDF Downloads 284
13920 Anti-Money Laundering and Countering of Terrorist Financing: The Role of Domestic Financial Institutions to Prevent Money Laundering

Authors: Dinesh Sivaguru, Kamal Thilakasiri

Abstract:

Preventing money laundering and terrorist financing is a major national and international problem today. Several attempts have been made to prevent money laundering by national and international dimension. These are often counteracted by the multi dynamic nature of the crimes. However, launders are often to use remittance systems to clean their ill-gotten money. This study presents the role of domestic financial institutions and the effective practices and actions should implement within domestic financial institutions to control and prevent financial crimes. This thesis highlights the progress that is required to prevent money laundering and terrorist financing, further it is an original contribution to the knowledge in an under researched field in Sri Lanka.

Keywords: money laundering, terrorists financing, financial institutions, regulatory bodies

Procedia PDF Downloads 212
13919 Bacteriophages for Sustainable Wastewater Treatment: Application in Black Water Decontamination with an Emphasis to DRDO Biotoilet

Authors: Sonika Sharma, Mohan G. Vairale, Sibnarayan Datta, Soumya Chatterjee, Dharmendra Dubey, Rajesh Prasad, Raghvendra Budhauliya, Bidisha Das, Vijay Veer

Abstract:

Bacteriophages are viruses that parasitize specific bacteria and multiply in metabolising host bacteria. Bacteriophages hunt for a single or a subset of bacterial species, making them potential antibacterial agents. Utilizing the ability of phages to control bacterial populations has several applications from medical to the fields of agriculture, aquaculture and the food industry. However, harnessing phage based techniques in wastewater treatments to improve quality of effluent and sludge release into the environment is a potential area for R&D application. Phage mediated bactericidal effect in any wastewater treatment process has many controlling factors that lead to treatment performance. In laboratory conditions, titer of bacteriophages (coliphages) isolated from effluent water of a specially designed anaerobic digester of human night soil (DRDO Biotoilet) was successfully increased with a modified protocol of the classical double layer agar technique. Enrichment of the same was carried out and efficacy of the phage enriched medium was evaluated at different conditions (specific media, temperature, storage conditions). Growth optimization study was carried out on different media like soybean casein digest medium (Tryptone soya medium), Luria-Bertani medium, phage deca broth medium and MNA medium (Modified nutrient medium). Further, temperature-phage yield relationship was also observed at three different temperatures 27˚C, 37˚C and 44˚C at laboratory condition. Results showed the higher activity of coliphage 27˚C and at 37˚C. Further, addition of divalent ions (10mM MgCl2, 5mM CaCl2) and 5% glycerol resulted in a significant increase in phage titer. Besides this, effect of antibiotics addition like ampicillin and kanamycin at different concentration on plaque formation was analysed and reported that ampicillin at a concentration of 1mg/ml ampicillin stimulates phage infection and results in more number of plaques. Experiments to test viability of phage showed that it can remain active for 6 months at 4˚C in fresh tryptone soya broth supplemented with fresh culture of coliforms (early log phase). The application of bacteriophages (especially coliphages) for treatment of effluent of human faecal matter contaminated effluent water is unique. This environment-friendly treatment system not only reduces the pathogenic coliforms, but also decreases the competition between nuisance bacteria and functionally important microbial populations. Therefore, the phage based cocktail to treat fecal pathogenic bacteria present in black water has many implication in wastewater treatment processes including ‘DRDO Biotoilet’, which is an ecofriendly appropriate and affordable human faecal matter treatment technology for different climates and situations.

Keywords: wastewater, microbes, virus, biotoilet, phage viability

Procedia PDF Downloads 424
13918 Primary Study of the Impact of the Riverfront Urban Transformations Inside Egyptian Cities in Future Urban Design Process: Case Study of North Asyut City

Authors: Islam Abouelhamd

Abstract:

Rives have long been recognized as one of the most important natural resources, They are important to ensure human health, civilization, and sustainable development, and the importance of rivers as the focal point of cities was established from the early times of civilization and will remain so. Urban design of Riverfront has been an issue of wide concern and extensive discussion since the 1970s, however, Cities seek a riverfront that is a place of public enjoyment, They want a Riverfront where there is ample visual and physical public access to both the water and the land, they want a place that contributes to the quality of life in all of its aspects; economic, social, and cultural, on another hand, Successful urban design of Riverfront requires an understanding of development processes, dimensions of urban design and an appreciation of the distinctiveness of Riverfront locations. A close association between cities and river is inherently over the history of civilization, and in fact, many urban cities in Egypt are located close to Nile River areas. Always trying to use the land closer to the river to take advantage of the benefits it provides, And in spite of the significant role played by the littoral fronts in the life of the city, the riverfronts have remained generally in Egypt and especially in Asyut city neglected. According to the knowledge gained from the literature review, review of case studies and the historical researches of Asyut Riverfront, this research aims to identify the urban transformations of Asyut riverfront and expect the Opportunities and Challenges which will play an important part of the future urban design issues and researches will prepare, especially in the case study area (northern areas of Asyut riverfront). After that, the case study data, historical framework and International experiences were collected and analyzed to Produce Primary indicators of the expectations of the riverfront urban design process inside the case study area, In addition to preparing the conclusions of the theoretical framework and recommendations for the paper.

Keywords: civilization, sustainable development, riverfront, urban transformations

Procedia PDF Downloads 165
13917 Mg AZ31B Alloy Processed through ECASD

Authors: P. Fernández-Morales, D. Peláez, C. Isaza, J. M. Meza, E. Mendoza

Abstract:

Mg AZ31B alloy sheets were processed through equal-channel angular sheet drawing (ECASD) process, following the route A and C at room temperature and varying the processing speed. SEM was used to analyze the microstructure. The grain size was refined and presence of twins was observed. Vickers microhardness and tensile testing were carried out to evaluate the mechanical properties, showing in general; a remarkable increase in the first pass and slight increases during subsequent passes and, that the route C produces better uniform properties distribution through the thickness of the samples.

Keywords: ECASD, Mg Alloy, mechanical properties, microstructure

Procedia PDF Downloads 347
13916 The Analysis of TRACE/PARCS in the Simulation of Ultimate Response Guideline for Lungmen ABWR

Authors: J. R. Wang, W. Y. Li, H. T. Lin, B. H. Lee, C. Shih, S. W. Chen

Abstract:

In this research, the TRACE/PARCS model of Lungmen ABWR has been developed for verification of ultimate response guideline (URG) efficiency. This ultimate measure was named as DIVing plan, abbreviated from system depressurization, water injection and containment venting. The simulation initial condition is 100% rated power/100% rated core flow. This research focuses on the estimation of the time when the fuel might be damaged with no water injection by using TRACE/PARCS first. Then, the effect of the reactor core isolation system (RCIC), control depressurization and ac-independent water addition system (ACIWA), which can provide the injection with 950 gpm are also estimated for the station blackout (SBO) transient.

Keywords: ABWR, TRACE, safety analysis, PARCS

Procedia PDF Downloads 444
13915 Contribution to the Success of the Energy Audit in the Industrial Environment: A Case Study about Audit of Interior Lighting for an Industrial Site in Morocco

Authors: Abdelkarim Ait Brik, Abdelaziz Khoukh, Mustapha Jammali, Hamid Chaikhy

Abstract:

The energy audit is the essential initial step to ensure a good definition of energy control actions. The in-depth study of the various energy-consuming equipments makes it possible to determine the actions and investments with best cost for the company. The analysis focuses on the energy consumption of production equipment and utilities (lighting, heating, air conditioning, ventilation, transport). Successful implementation of this approach requires, however, to take into account a number of prerequisites. This paper proposes a number of useful recommendations concerning the energy audit in order to achieve better results, and a case study concerning the lighting audit of a Moroccan company by showing the gains that can be made through this audit.

Keywords: energy audit, energy diagnosis, consumption, electricity, energy efficiency, lighting audit

Procedia PDF Downloads 683
13914 Effect of Tooth Bleaching Agents on Enamel Demineralisation

Authors: Najlaa Yousef Qusti, Steven J. Brookes, Paul A. Brunton

Abstract:

Background: Tooth discoloration can be an aesthetic problem, and tooth whitening using carbamide peroxide bleaching agents are a popular treatment option. However, there are concerns about possible adverse effects such as demineralisation of the bleached enamel; however, the cause of this demineralisation is unclear. Introduction: Teeth can become stained or discoloured over time. Tooth whitening is an aesthetic solution for tooth discoloration. Bleaching solutions of 10% carbamide peroxide (CP) have become the standard agent used in dentist-prescribed and home-applied ’vital bleaching techniques’. These materials release hydrogen peroxide (H₂O₂), the active whitening agent. However, there is controversy in the literature regarding the effect of bleaching agents on enamel integrity and enamel mineral content. The purpose of this study was to establish if carbamide peroxide bleaching agents affect the acid solubility of enamel (i.e., make teeth more prone to demineralisation). Materials and Methods: Twelve human premolar teeth were sectioned longitudinally along the midline and varnished to leave the natural enamel surface exposed. The baseline behavior of each tooth half in relation to its demineralisation in acid was established by sequential exposure to 4 vials containing 1ml of 10mM acetic acid (1 minute/vial). This was followed by exposure to 10% CP for 8 hours. After washing in distilled water, the tooth half was sequentially exposed to 4 further vials containing acid to test if the acid susceptibility of the enamel had been affected. The corresponding tooth half acted as a control and was exposed to distilled water instead of CP. The mineral loss was determined by measuring [Ca²⁺] and [PO₄³⁻] released in each vial using a calcium ion-selective electrode and the phosphomolybdenum blue method, respectively. The effect of bleaching on the tooth surfaces was also examined using SEM. Results: Exposure to carbamide peroxide did not significantly alter the susceptibility of enamel to acid attack, and SEM of the enamel surface revealed a slight alteration in surface appearance. SEM images of the control enamel surface showed a flat enamel surface with some shallow pits, whereas the bleached enamel appeared with an increase in surface porosity and some areas of mild erosion. Conclusions: Exposure to H₂O₂ equivalent to 10% CP does not significantly increase subsequent acid susceptibility of enamel as determined by Ca²⁺ release from the enamel surface. The effects of bleaching on mineral loss were indistinguishable from distilled water in the experimental system used. However, some surface differences were observed by SEM. The phosphomolybdenum blue method for phosphate is compromised by peroxide bleaching agents due to their oxidising properties. However, the Ca²⁺ electrode is unaffected by oxidising agents and can be used to determine the mineral loss in the presence of peroxides.

Keywords: bleaching, carbamide peroxide, demineralisation, teeth whitening

Procedia PDF Downloads 111
13913 Influence of Recycled Glass Content on the Properties of Concrete and Mortar

Authors: Bourmatte Nadjoua, Houari Hacène

Abstract:

The effect of replacement of fine aggregates with recycled glass on the fresh and hardened properties of concrete and mortar is studied. Percentages of replacement are 0–25% and 50% of aggregates with fine waste glass to produce concrete and percentage of replacement of 100% to produce mortar. As a result of the conducted study, the slump flow increased with the increase of recycled glass content. On the other hand, the compressive strength and tensile strength of recycled glass mixtures were decreased with the increase in the recycled glass content. The results showed that recycled glass aggregate can successfully be used with limited level for producing concrete. Mortar based on glass shows a compressive strength with 50% lower than that of control mortar.

Keywords: compressive strength, concrete, mortar, recycled glass

Procedia PDF Downloads 427
13912 In-Situ Synthesis of Zinc-Containing MCM-41 and Investigation of Its Capacity for Removal of Hydrogen Sulfide from Crude Oil

Authors: Nastaran Hazrati, Ali Akbar Miran Beigi, Majid Abdouss, Amir Vahid

Abstract:

Hydrogen sulfide is the most toxic gas of crude oil. Adsorption is an energy-efficient process used to remove undesirable compounds such as H2S in gas or liquid streams by passing the stream through a media bed composed of an adsorbent. In this study, H2S of Iran crude oil was separated via cold stripping then zinc incorporated MCM-41 was synthesized via an in-situ method. ZnO functionalized mesoporous silica samples were characterized by XRD, N2 adsorption and TEM. The obtained results of adsorption of H2S showed superior ability of all the materials and with an increase in ZnO amount adsorption was increased.

Keywords: MCM-41, ZnO, H2S removal, adsorption

Procedia PDF Downloads 448
13911 Top-Down Approach for Fabricating Hematite Nanowire Arrays

Authors: Seungmin Shin, Jin-Baek Kim

Abstract:

Hematite (α-Fe2O3) has very good semiconducting properties with a band gap of 2.1 eV and is antiferromagnetic. Due to its electrochemical stability, low toxicity, wide abundance, and low-cost, hematite, it is a particularly attractive material for photoelectrochemical cells. Additionally, hematite has also found applications in gas sensing, field emission, heterogeneous catalysis, and lithium-ion battery electrodes. Here, we discovered a new universal top-down method for the synthesis of one-dimensional hematite nanowire arrays. Various shapes and lengths of hematite nanowire have been easily fabricated over large areas by sequential processes. The obtained hematite nanowire arrays are promising candidates as photoanodes in photoelectrochemical solar cells.

Keywords: hematite, lithography, nanowire, top-down process

Procedia PDF Downloads 234