Search results for: MATRIX method
10485 Nanotechnology-Based Treatment of Klebsiella pneumoniae Infections
Authors: Lucian Mocan, Teodora Mocan, Matea Cristian, Cornel Iancu
Abstract:
We present method of nanoparticle enhanced laser thermal ablation of Klebsiella pneumoniae infections, using gold nanoparticles combined with a specific growth factor and demonstrate its selective therapeutic efficacy. Ab (antibody solution) bound to GNPs (gold nanoparticles) was administered in vitro and determined the specific delivery of the nano-bioconjugate into the microorganism. The extent of necrosis was considerable following laser therapy, and at the same time, normal cells were not seriously affected. The selective photothermal ablation of the infected tissue was obtained after the selective accumulation of Ab bound to GNPs into bacteria following perfusion. These results may represent a major step in antibiotherapy treatment using nanolocalized thermal ablation by laser heating.Keywords: gold nanoparticles, Klebsiella pneumoniae, nanoparticle functionalization, laser irradiation, antibody
Procedia PDF Downloads 42410484 Ethno-Medical Potentials of Tacazzea apiculata Oliv. (Periplocaceae)
Authors: Abubakar Ahmed, Zainab Mohammed, Hadiza D. Nuhu, Hamisu Ibrahim
Abstract:
Introduction: The plant Tacazzea apiculata Oliv (Periplocaceae) is widely distributed in tropical West Africa. It is claimed to have multiple uses in traditional medicine among which are its use to treat hemorrhoids, inflammations and cancers. Methods: Ethno-botanical survey through interview and using show-and-tell method of data collection were conducted among Hausa and Fulani tribes of northern Nigeria with the view to document useful information on the numerous claims by the local people on the plant. Results: The results revealed that the plant T. apiculata has relative popularity among the herbalist (38.2 %), nomads (14.8 %) and fishermen (16.0%). The most important uses of the plant in traditional medicine are inflammation (Fedelity level: 25.7 %) and Haemorrhoids (Fedelity level: 17.1 %) Conclusion: These results suggest the relevance of T. apiculata in traditional medicine and as a good candidate for drug Development.Keywords: ethno-botany, periplocaceae, Tacazzea apiculata, traditional medicine
Procedia PDF Downloads 51810483 A Cloud-Based Federated Identity Management in Europe
Authors: Jesus Carretero, Mario Vasile, Guillermo Izquierdo, Javier Garcia-Blas
Abstract:
Currently, there is a so called ‘identity crisis’ in cybersecurity caused by the substantial security, privacy and usability shortcomings encountered in existing systems for identity management. Federated Identity Management (FIM) could be solution for this crisis, as it is a method that facilitates management of identity processes and policies among collaborating entities without enforcing a global consistency, that is difficult to achieve when there are ID legacy systems. To cope with this problem, the Connecting Europe Facility (CEF) initiative proposed in 2014 a federated solution in anticipation of the adoption of the Regulation (EU) N°910/2014, the so-called eIDAS Regulation. At present, a network of eIDAS Nodes is being deployed at European level to allow that every citizen recognized by a member state is to be recognized within the trust network at European level, enabling the consumption of services in other member states that, until now were not allowed, or whose concession was tedious. This is a very ambitious approach, since it tends to enable cross-border authentication of Member States citizens without the need to unify the authentication method (eID Scheme) of the member state in question. However, this federation is currently managed by member states and it is initially applied only to citizens and public organizations. The goal of this paper is to present the results of a European Project, named eID@Cloud, that focuses on the integration of eID in 5 cloud platforms belonging to authentication service providers of different EU Member States to act as Service Providers (SP) for private entities. We propose an initiative based on a private eID Scheme both for natural and legal persons. The methodology followed in the eID@Cloud project is that each Identity Provider (IdP) is subscribed to an eIDAS Node Connector, requesting for authentication, that is subscribed to an eIDAS Node Proxy Service, issuing authentication assertions. To cope with high loads, load balancing is supported in the eIDAS Node. The eID@Cloud project is still going on, but we already have some important outcomes. First, we have deployed the federation identity nodes and tested it from the security and performance point of view. The pilot prototype has shown the feasibility of deploying this kind of systems, ensuring good performance due to the replication of the eIDAS nodes and the load balance mechanism. Second, our solution avoids the propagation of identity data out of the native domain of the user or entity being identified, which avoids problems well known in cybersecurity due to network interception, man in the middle attack, etc. Last, but not least, this system allows to connect any country or collectivity easily, providing incremental development of the network and avoiding difficult political negotiations to agree on a single authentication format (which would be a major stopper).Keywords: cybersecurity, identity federation, trust, user authentication
Procedia PDF Downloads 16610482 Synthesis of Dispersion-Compensating Triangular Lattice Index-Guiding Photonic Crystal Fibers Using the Directed Tabu Search Method
Authors: F. Karim
Abstract:
In this paper, triangular lattice index-guiding photonic crystal fibers (PCFs) are synthesized to compensate the chromatic dispersion of a single mode fiber (SMF-28) for an 80 km optical link operating at 1.55 µm, by using the directed tabu search algorithm. Hole-to-hole distance, circular air-hole diameter, solid-core diameter, ring number and PCF length parameters are optimized for this purpose. Three Synthesized PCFs with different physical parameters are compared in terms of their objective functions values, residual dispersions and compensation ratios.Keywords: triangular lattice index-guiding photonic crystal fiber, dispersion compensation, directed tabu search, synthesis
Procedia PDF Downloads 43210481 Marketing in Post-Pandemic Environment
Authors: Mohammad Mehdizadeh
Abstract:
COVID-19 forced marketers to change their marketing strategies, focusing less on reactive approaches and more on proactive approaches, primarily social media. The next few years will be dominated by employee engagement and customer experience, leading to businesses focusing more on "long-term customer relationships." A large number of marketing strategies need to be employed in an ever-evolving online environment, which is both filled with opportunities and dangers, as well as being an intimidating platform to use, incorporating new and exciting opportunities for businesses and organizations as it constantly evolves. In this article, we examine the effect of social networks on marketing in post-pandemic environments. A descriptive survey is used as the research method. The results show that social networks have a positive and significant impact on marketing in a post-pandemic environment. Among the social networks studied, Instagram, Facebook, and Twitter have the most positive effect on marketing advancement.Keywords: COVID-19, customers, marketing, post-pandemic
Procedia PDF Downloads 8610480 Impact of Financial Factors on Total Factor Productivity: Evidence from Indian Manufacturing Sector
Authors: Lopamudra D. Satpathy, Bani Chatterjee, Jitendra Mahakud
Abstract:
The rapid economic growth in terms of output and investment necessitates a substantial growth of Total Factor Productivity (TFP) of firms which is an indicator of an economy’s technological change. The strong empirical relationship between financial sector development and economic growth clearly indicates that firms financing decisions do affect their levels of output via their investment decisions. Hence it establishes a linkage between the financial factors and productivity growth of the firms. To achieve the smooth and continuous economic growth over time, it is imperative to understand the financial channel that serves as one of the vital channels. The theoretical or logical argument behind this linkage is that when the internal financial capital is not sufficient enough for the investment, the firms always rely upon the external sources of finance. But due to the frictions and existence of information asymmetric behavior, it is always costlier for the firms to raise the external capital from the market, which in turn affect their investment sentiment and productivity. This kind of financial position of the firms puts heavy pressure on their productive activities. Keeping in view this theoretical background, the present study has tried to analyze the role of both external and internal financial factors (leverage, cash flow and liquidity) on the determination of total factor productivity of the firms of manufacturing industry and its sub-industries, maintaining a set of firm specific variables as control variables (size, age and disembodied technological intensity). An estimate of total factor productivity of the Indian manufacturing industry and sub-industries is computed using a semi-parametric approach, i.e., Levinsohn- Petrin method. It establishes the relationship between financial factors and productivity growth of 652 firms using a dynamic panel GMM method covering the time period between 1997-98 and 2012-13. From the econometric analyses, it has been found that the internal cash flow has a positive and significant impact on the productivity of overall manufacturing sector. The other financial factors like leverage and liquidity also play the significant role in the determination of total factor productivity of the Indian manufacturing sector. The significant role of internal cash flow on determination of firm-level productivity suggests that access to external finance is not available to Indian companies easily. Further, the negative impact of leverage on productivity could be due to the less developed bond market in India. These findings have certain implications for the policy makers to take various policy reforms to develop the external bond market and easily workout through which the financially constrained companies will be able to raise the financial capital in a cost-effective manner and would be able to influence their investments in the highly productive activities, which would help for the acceleration of economic growth.Keywords: dynamic panel, financial factors, manufacturing sector, total factor productivity
Procedia PDF Downloads 33210479 Hydrothermal Synthesis of Mesoporous Carbon Nanospheres and Their Electrochemical Properties for Glucose Detection
Authors: Ali Akbar Kazemi Asl, Mansour Rahsepar
Abstract:
Mesoporous carbon nanospheres (MCNs) with uniform particle size distribution having an average of 290 nm and large specific surface area (274.4 m²/g) were synthesized by a one-step hydrothermal method followed by the calcination process and then utilized as an enzyme-free glucose biosensor. Morphology, crystal structure, and porous nature of the synthesized nanospheres were characterized by scanning electron microscopy (SEM), X-Ray diffraction (XRD), and Brunauer–Emmett–Teller (BET) analysis, respectively. Also, the electrochemical performance of the MCNs@GCE electrode for the measurement of glucose concentration in alkaline media was investigated by electrochemical impedance spectroscopy (EIS), cyclic voltammetry (CV), and chronoamperometry (CA). MCNs@GCE electrode shows good sensing performance, including a rapid glucose oxidation response within 3.1 s, a wide linear range of 0.026-12 mM, a sensitivity of 212.34 μA.mM⁻¹.cm⁻², and a detection limit of 25.7 μM with excellent selectivity.Keywords: biosensor, electrochemical, glucose, mesoporous carbon, non-enzymatic
Procedia PDF Downloads 19010478 Analysis of Expression Data Using Unsupervised Techniques
Authors: M. A. I Perera, C. R. Wijesinghe, A. R. Weerasinghe
Abstract:
his study was conducted to review and identify the unsupervised techniques that can be employed to analyze gene expression data in order to identify better subtypes of tumors. Identifying subtypes of cancer help in improving the efficacy and reducing the toxicity of the treatments by identifying clues to find target therapeutics. Process of gene expression data analysis described under three steps as preprocessing, clustering, and cluster validation. Feature selection is important since the genomic data are high dimensional with a large number of features compared to samples. Hierarchical clustering and K Means are often used in the analysis of gene expression data. There are several cluster validation techniques used in validating the clusters. Heatmaps are an effective external validation method that allows comparing the identified classes with clinical variables and visual analysis of the classes.Keywords: cancer subtypes, gene expression data analysis, clustering, cluster validation
Procedia PDF Downloads 14910477 Particle Filter Implementation of a Non-Linear Dynamic Fall Model
Authors: T. Kobayashi, K. Shiba, T. Kaburagi, Y. Kurihara
Abstract:
For the elderly living alone, falls can be a serious problem encountered in daily life. Some elderly people are unable to stand up without the assistance of a caregiver. They may become unconscious after a fall, which can lead to serious aftereffects such as hypothermia, dehydration, and sometimes even death. We treat the subject as an inverted pendulum and model its angle from the equilibrium position and its angular velocity. As the model is non-linear, we implement the filtering method with a particle filter which can estimate true states of the non-linear model. In order to evaluate the accuracy of the particle filter estimation results, we calculate the root mean square error (RMSE) between the estimated angle/angular velocity and the true values generated by the simulation. The experimental results give the highest accuracy RMSE of 0.0141 rad and 0.1311 rad/s for the angle and angular velocity, respectively.Keywords: fall, microwave Doppler sensor, non-linear dynamics model, particle filter
Procedia PDF Downloads 21310476 Microwave Assisted Growth of Varied Phases and Morphologies of Vanadium Oxides Nanostructures: Structural and Optoelectronic Properties
Authors: Issam Derkaoui, Mohammed Khenfouch, Bakang M. Mothudi, Malik Maaza, Izeddine Zorkani, Anouar Jorio
Abstract:
Transition metal oxides nanoparticles with different morphologies have attracted a lot of attention recently owning to their distinctive geometries, and demonstrated promising electrical properties for various applications. In this paper, we discuss the time and annealing effects on the structural and electrical properties of vanadium oxides nanoparticles (VO-NPs) prepared by microwave method. In this sense, transmission electron microscopy (TEM), X-ray diffraction (XRD), Raman Spectroscopy, Ultraviolet-visible absorbance spectra (Uv-Vis) and electrical conductivity were investigated. Hence, the annealing state and the time are two crucial parameters for the improvement of the optoelectronic properties. The use of these nanostructures is promising way for the development of technological applications especially for energy storage devices.Keywords: Vanadium oxide, Microwave, Electrical conductivity, Optoelectronic properties
Procedia PDF Downloads 19510475 Quality of Service of Transportation Networks: A Hybrid Measurement of Travel Time and Reliability
Authors: Chin-Chia Jane
Abstract:
In a transportation network, travel time refers to the transmission time from source node to destination node, whereas reliability refers to the probability of a successful connection from source node to destination node. With an increasing emphasis on quality of service (QoS), both performance indexes are significant in the design and analysis of transportation systems. In this work, we extend the well-known flow network model for transportation networks so that travel time and reliability are integrated into the QoS measurement simultaneously. In the extended model, in addition to the general arc capacities, each intermediate node has a time weight which is the travel time for per unit of commodity going through the node. Meanwhile, arcs and nodes are treated as binary random variables that switch between operation and failure with associated probabilities. For pre-specified travel time limitation and demand requirement, the QoS of a transportation network is the probability that source can successfully transport the demand requirement to destination while the total transmission time is under the travel time limitation. This work is pioneering, since existing literatures that evaluate travel time reliability via a single optimization path, the proposed QoS focuses the performance of the whole network system. To compute the QoS of transportation networks, we first transfer the extended network model into an equivalent min-cost max-flow network model. In the transferred network, each arc has a new travel time weight which takes value 0. Each intermediate node is replaced by two nodes u and v, and an arc directed from u to v. The newly generated nodes u and v are perfect nodes. The new direct arc has three weights: travel time, capacity, and operation probability. Then the universal set of state vectors is recursively decomposed into disjoint subsets of reliable, unreliable, and stochastic vectors until no stochastic vector is left. The decomposition is made possible by applying existing efficient min-cost max-flow algorithm. Because the reliable subsets are disjoint, QoS can be obtained directly by summing the probabilities of these reliable subsets. Computational experiments are conducted on a benchmark network which has 11 nodes and 21 arcs. Five travel time limitations and five demand requirements are set to compute the QoS value. To make a comparison, we test the exhaustive complete enumeration method. Computational results reveal the proposed algorithm is much more efficient than the complete enumeration method. In this work, a transportation network is analyzed by an extended flow network model where each arc has a fixed capacity, each intermediate node has a time weight, and both arcs and nodes are independent binary random variables. The quality of service of the transportation network is an integration of customer demands, travel time, and the probability of connection. We present a decomposition algorithm to compute the QoS efficiently. Computational experiments conducted on a prototype network show that the proposed algorithm is superior to existing complete enumeration methods.Keywords: quality of service, reliability, transportation network, travel time
Procedia PDF Downloads 22110474 Development of Construction Cost Optimization System Using Genetic Algorithm Method
Authors: Hyeon-Seung Kim, Young-Hwan Kim, Sang-Mi Park, Min-Seo Kim, Jong-Myeung Shin, Leen-Seok Kang
Abstract:
The project budget at the planned stage might be changed by the insufficient government budget or the design change. There are many cases more especially in the case of a project performed for a long period of time. If the actual construction budget is insufficient comparing with the planned budget, the construction schedule should also be changed to match the changed budget. In that case, most project managers change the planned construction schedule by a heuristic approach without a reasonable consideration on the work priority. This study suggests an optimized methodology to modify the construction schedule according to the changed budget. The genetic algorithm was used to optimize the modified construction schedule within the changed budget. And a simulation system of construction cost histogram in accordance with the construction schedule was developed in the BIM (Building Information Modeling) environment.Keywords: 5D, BIM, GA, cost optimization
Procedia PDF Downloads 58810473 [Keynote Talk]: Evidence Fusion in Decision Making
Authors: Mohammad Abdullah-Al-Wadud
Abstract:
In the current era of automation and artificial intelligence, different systems have been increasingly keeping on depending on decision-making capabilities of machines. Such systems/applications may range from simple classifiers to sophisticated surveillance systems based on traditional sensors and related equipment which are becoming more common in the internet of things (IoT) paradigm. However, the available data for such problems are usually imprecise and incomplete, which leads to uncertainty in decisions made based on traditional probability-based classifiers. This requires a robust fusion framework to combine the available information sources with some degree of certainty. The theory of evidence can provide with such a method for combining evidence from different (may be unreliable) sources/observers. This talk will address the employment of the Dempster-Shafer Theory of evidence in some practical applications.Keywords: decision making, dempster-shafer theory, evidence fusion, incomplete data, uncertainty
Procedia PDF Downloads 42510472 An Optimization Model for Maximum Clique Problem Based on Semidefinite Programming
Authors: Derkaoui Orkia, Lehireche Ahmed
Abstract:
The topic of this article is to exploring the potentialities of a powerful optimization technique, namely Semidefinite Programming, for solving NP-hard problems. This approach provides tight relaxations of combinatorial and quadratic problems. In this work, we solve the maximum clique problem using this relaxation. The clique problem is the computational problem of finding cliques in a graph. It is widely acknowledged for its many applications in real-world problems. The numerical results show that it is possible to find a maximum clique in polynomial time, using an algorithm based on semidefinite programming. We implement a primal-dual interior points algorithm to solve this problem based on semidefinite programming. The semidefinite relaxation of this problem can be solved in polynomial time.Keywords: semidefinite programming, maximum clique problem, primal-dual interior point method, relaxation
Procedia PDF Downloads 22210471 Profit Comparative of Fisheries in East Aceh Regency Aceh Province
Authors: Mawardati Mawardati
Abstract:
This research was carried out on the traditional milkfish and shrimp culture cultivation from March to May 2018 in East Aceh District. This study aims to to analyze the differences between traditional milkfish cultivation and shrimp farming in East Aceh District, Aceh Province. The analytical method used is acquisition analysis and Independent Sample T test analysis. The results showed a significant difference between milkfish farming and shrimp farming in East Aceh District, Aceh Province. Based on the results of the analysis, the average profit from shrimp farming is higher than that of milkfish farming. This demand exceeds market demand for exports. Thus the price of shrimp is still far higher than the price of milk fish.Keywords: comparative, profit, shrimp, milkfish
Procedia PDF Downloads 15410470 Phenols and Manganese Removal from Landfill Leachate and Municipal Waste Water Using the Constructed Wetland
Authors: Amin Mojiri, Lou Ziyang
Abstract:
Constructed wetland (CW) is a reasonable method to treat waste water. Current study was carried out to co-treat landfill leachate and domestic waste water using a CW system. Typha domingensis was transplanted to CW, which encloses two substrate layers of adsorbents named ZELIAC and zeolite. Response surface methodology and central composite design were employed to evaluate experimental data. Contact time (h) and leachate to waste water mixing ratio (%; v/v) were selected as independent factors. Phenols and manganese removal were selected as dependent responses. At optimum contact time (48.7 h) and leachate to waste water mixing ratio (20.0%), removal efficiencies of phenols and manganese removal efficiencies were 90.5%, and 89.4%, respectively.Keywords: constructed wetland, Manganese, phenols, Thypha domingensis
Procedia PDF Downloads 32210469 Gendered Labelling and Its Effects on Vhavenda Women
Authors: Matodzi Rapalalani
Abstract:
In context with Spencer's (2018) classic labelling theory, labels influence the perceptions of both the individual and other members of society. That is, once labelled, the individual act in ways that confirm the stereotypes attached to the label. This study, therefore, investigates the understanding of gendered labelling and its effects on Vhavenda women. Gender socialization and patriarchy have been viewed as the core causes of the problem. The literature presented the development of gendered labelling, forms of it, and other aspects. A qualitative method of data collection was used in this study, and semi-structural interviews were conducted. A total of 6 participants were used as it is easy to deal with a small sample. Thematic analysis was used as the data was interpreted and analyzed. Ethical issues such as confidentiality, informed consent, and voluntary participation were considered. Through the analysis and data interpretation, causes such as lack of Christian values, insecurities, and lust were mentioned as well as some of the effects such as frustrations, increased divorce, and low self-esteem.Keywords: gender, naming, Venda, women, African culture
Procedia PDF Downloads 9110468 Explaining E-Learning Systems Usage in Higher Education Institutions: UTAUT Model
Authors: Muneer Abbad
Abstract:
This research explains the e-learning usage in a university in Jordan. Unified theory of acceptance and use of technology (UTAUT) model has been used as a base model to explain the usage. UTAUT is a model of individual acceptance that is compiled mainly from different models of technology acceptance. This research is the initial part from full explanations of the users' acceptance model that use Structural Equation Modelling (SEM) method to explain the users' acceptance of the e-learning systems based on UTAUT model. In this part data has been collected and prepared for further analysis. The main factors of UTAUT model has been tested as different factors using exploratory factor analysis (EFA). The second phase will be confirmatory factor analysis (CFA) and SEM to explain the users' acceptance of e-learning systems.Keywords: e-learning, moodle, adoption, Unified Theory of Acceptance and Use of Technology (UTAUT)
Procedia PDF Downloads 40710467 Construction Sustainability Improvement through Using Recycled Aggregates in Concrete Production
Authors: Zhiqiang Zhu, Khalegh Barati, Xuesong Shen
Abstract:
Due to the energy consumption caused by the construction industry, the public is paying more and more attention to the sustainability of the buildings. With the advancement of research on recycled aggregates, it has become possible to replace natural aggregates with recycled aggregates and to achieve a reduction in energy consumption of materials during construction. The purpose of this paper is to quantitatively compare the emergy consumption of natural aggregate concrete (NAC) and recycled aggregate concrete (RAC). To do so, the emergy analysis method is adopted. Using this technique, it can effectively analyze different forms of energy and substance. The main analysis object is the direct and indirect emergy consumption of the stages in concrete production. Therefore, for indirect energy, consumption of production machinery and transportation vehicle also need to be considered. Finally, the emergy values required to produce the two concrete types are compared to analyze whether the RAC can reduce emergy consumption.Keywords: sustainable construction, NAC, RAC, emergy, concrete
Procedia PDF Downloads 15010466 Numerical Simulation of Filtration Gas Combustion: Front Propagation Velocity
Authors: Yuri Laevsky, Tatyana Nosova
Abstract:
The phenomenon of filtration gas combustion (FGC) had been discovered experimentally at the beginning of 80’s of the previous century. It has a number of important applications in such areas as chemical technologies, fire-explosion safety, energy-saving technologies, oil production. From the physical point of view, FGC may be defined as the propagation of region of gaseous exothermic reaction in chemically inert porous medium, as the gaseous reactants seep into the region of chemical transformation. The movement of the combustion front has different modes, and this investigation is focused on the low-velocity regime. The main characteristic of the process is the velocity of the combustion front propagation. Computation of this characteristic encounters substantial difficulties because of the strong heterogeneity of the process. The mathematical model of FGC is formed by the energy conservation laws for the temperature of the porous medium and the temperature of gas and the mass conservation law for the relative concentration of the reacting component of the gas mixture. In this case the homogenization of the model is performed with the use of the two-temperature approach when at each point of the continuous medium we specify the solid and gas phases with a Newtonian heat exchange between them. The construction of a computational scheme is based on the principles of mixed finite element method with the usage of a regular mesh. The approximation in time is performed by an explicit–implicit difference scheme. Special attention was given to determination of the combustion front propagation velocity. Straight computation of the velocity as grid derivative leads to extremely unstable algorithm. It is worth to note that the term ‘front propagation velocity’ makes sense for settled motion when some analytical formulae linking velocity and equilibrium temperature are correct. The numerical implementation of one of such formulae leading to the stable computation of instantaneous front velocity has been proposed. The algorithm obtained has been applied in subsequent numerical investigation of the FGC process. This way the dependence of the main characteristics of the process on various physical parameters has been studied. In particular, the influence of the combustible gas mixture consumption on the front propagation velocity has been investigated. It also has been reaffirmed numerically that there is an interval of critical values of the interfacial heat transfer coefficient at which a sort of a breakdown occurs from a slow combustion front propagation to a rapid one. Approximate boundaries of such an interval have been calculated for some specific parameters. All the results obtained are in full agreement with both experimental and theoretical data, confirming the adequacy of the model and the algorithm constructed. The presence of stable techniques to calculate the instantaneous velocity of the combustion wave allows considering the semi-Lagrangian approach to the solution of the problem.Keywords: filtration gas combustion, low-velocity regime, mixed finite element method, numerical simulation
Procedia PDF Downloads 30210465 Experimental Procedure of Identifying Ground Type by Downhole Test: A Case Study
Authors: Seyed Abolhassan Naeini, Maedeh Akhavan Tavakkoli
Abstract:
Evaluating the shear wave velocity (V_s) and primary wave velocity (Vₚ) is necessary to identify the ground type of the site. Identifying the soil type based on different codes can affect the dynamic analysis of geotechnical properties. This study aims to separate the underground layers at the project site based on the shear wave and primary wave velocity (Sₚ) in different depths and determine dynamic elastic modulus based on the shear wave velocity. Bandar Anzali is located in a tectonically very active area. Several active faults surround the study site. In this case, a field investigation of downhole testing is conducted as a geophysics method to identify the ground type.Keywords: downhole, geophysics, shear wave velocity, case-study
Procedia PDF Downloads 14010464 Angular Correlation and Independent Particle Model in Two-Electron Atomic Systems
Authors: Tokuei Sako
Abstract:
The ground and low-lying singly-excited states of He and He-like atomic ions have been studied by the Full Configuration Interaction (FCI) method focusing on the angular correlation between two electrons in the studied systems. The two-electron angle density distribution obtained by integrating the square-modulus of the FCI wave function over the coordinates other than the interelectronic angle shows a distinct trend between the singlet-triplet pair of states for different values of the nuclear charge Zn. Further, both of these singlet and triplet distributions tend to show an increasingly stronger dependence on the interelectronic angle as Zn increases, in contrast to the well-known fact that the correlation energy approaches towards zero for increasing Zn. This controversial observation has been rationalized on the basis of the recently introduced concept of so-called conjugate Fermi holes.Keywords: He-like systems, angular correlation, configuration interaction wave function, conjugate Fermi hole
Procedia PDF Downloads 41310463 Effect of Fault Depth on Near-Fault Peak Ground Velocity
Authors: Yanyan Yu, Haiping Ding, Pengjun Chen, Yiou Sun
Abstract:
Fault depth is an important parameter to be determined in ground motion simulation, and peak ground velocity (PGV) demonstrates good application prospect. Using numerical simulation method, the variations of distribution and peak value of near-fault PGV with different fault depth were studied in detail, and the reason of some phenomena were discussed. The simulation results show that the distribution characteristics of PGV of fault-parallel (FP) component and fault-normal (FN) component are distinctly different; the value of PGV FN component is much larger than that of FP component. With the increase of fault depth, the distribution region of the FN component strong PGV moves forward along the rupture direction, while the strong PGV zone of FP component becomes gradually far away from the fault trace along the direction perpendicular to the strike. However, no matter FN component or FP component, the strong PGV distribution area and its value are both quickly reduced with increased fault depth. The results above suggest that the fault depth have significant effect on both FN component and FP component of near-fault PGV.Keywords: fault depth, near-fault, PGV, numerical simulation
Procedia PDF Downloads 34710462 Instance Segmentation of Wildfire Smoke Plumes using Mask-RCNN
Authors: Jamison Duckworth, Shankarachary Ragi
Abstract:
Detection and segmentation of wildfire smoke plumes from remote sensing imagery are being pursued as a solution for early fire detection and response. Smoke plume detection can be automated and made robust by the application of artificial intelligence methods. Specifically, in this study, the deep learning approach Mask Region-based Convolutional Neural Network (RCNN) is being proposed to learn smoke patterns across different spectral bands. This method is proposed to separate the smoke regions from the background and return masks placed over the smoke plumes. Multispectral data was acquired using NASA’s Earthdata and WorldView and services and satellite imagery. Due to the use of multispectral bands along with the three visual bands, we show that Mask R-CNN can be applied to distinguish smoke plumes from clouds and other landscape features that resemble smoke.Keywords: deep learning, mask-RCNN, smoke plumes, spectral bands
Procedia PDF Downloads 12710461 The Differences in Skill Performance Between Online and Conventional Learning Among Nursing Students
Authors: Nurul Nadrah
Abstract:
As a result of the COVID-19 pandemic, a movement control order was implemented, leading to the adoption of online learning as a substitute for conventional classroom instruction. Thus, this study aims to determine the differences in skill performance between online learning and conventional methods among nursing students. We employed a quasi-experimental design with purposive sampling, involving a total of 59 nursing students, and used online learning as the intervention. As a result, the study found there was a significant difference in student skill performance between online learning and conventional methods. As a conclusion, in times of hardship, it is necessary to implement alternative pedagogical approaches, especially in critical fields like nursing, to ensure the uninterrupted progression of educational programs. This study suggests that online learning can be effectively employed as a means of imparting knowledge to nursing students during their training.Keywords: nursing education, online learning, skill performance, conventional learning method
Procedia PDF Downloads 4710460 Biomarkers, A Reliable Tool for Delineating Spill Trajectory
Authors: Okpor Victor, Selegha Abrakasa
Abstract:
Oil (Petroleum) spill occur frequently and in this era of a higher degree of awareness, it is pertinent that the trajectory of the spill is properly defined, to make certain of the area of impact by the spill. In this study, biomarkers that are known as the custodians of paleo information in oils are suggested to be used as reliable tools for defining the pathway of a spill. Samples were collected as tills alongside the GPS coordinates of the sample points suspected to have been impacted by a spill. Oils in the samples were extracted and analyzed as whole oil using GC–MS. Some biomarker parametric ratios were derived, and the ratio showed consistency of values along the sample trail from sample 1 to sample 20. The consistency of the values indicates that the oils at each sample point are the same hence the same value. This method can be used to validate the trajectory/pathway of a spill and also to define or establish a suspected pathway for a spill. The Oleanane/C30Hopane ratio showed good consistency and was suggested as a reliable parameter for establishing the trajectory of an oil spill.Keywords: spill, biomarkers, trajectory, pathway
Procedia PDF Downloads 6510459 Understanding Cyber Terrorism from Motivational Perspectives: A Qualitative Data Analysis
Authors: Yunos Zahri, Ariffin Aswami
Abstract:
Cyber terrorism represents the convergence of two worlds: virtual and physical. The virtual world is a place in which computer programs function and data move, whereas the physical world is where people live and function. The merging of these two domains is the interface being targeted in the incidence of cyber terrorism. To better understand why cyber terrorism acts are committed, this study presents the context of cyber terrorism from motivational perspectives. Motivational forces behind cyber terrorism can be social, political, ideological and economic. In this research, data are analyzed using a qualitative method. A semi-structured interview with purposive sampling was used for data collection. With the growing interconnectedness between critical infrastructures and Information & Communication Technology (ICT), selecting targets that facilitate maximum disruption can significantly influence terrorists. This work provides a baseline for defining the concept of cyber terrorism from motivational perspectives.Keywords: cyber terrorism, terrorism, motivation, qualitative analysis
Procedia PDF Downloads 42210458 Resource-Constrained Heterogeneous Workflow Scheduling Algorithms in Heterogeneous Computing Clusters
Authors: Lei Wang, Jiahao Zhou
Abstract:
The development of heterogeneous computing clusters provides a strong computility guarantee for large-scale workflows (e.g., scientific computing, artificial intelligence (AI), etc.). However, the tasks within large-scale workflows have also gradually become heterogeneous due to different demands on computing resources, which leads to the addition of a task resource-restricted constraint to the workflow scheduling problem on heterogeneous computing platforms. In this paper, we propose a heterogeneous constrained minimum makespan scheduling algorithm based on the idea of greedy strategy, which provides an efficient solution to the heterogeneous workflow scheduling problem in a heterogeneous platform. In this paper, we test the effectiveness of our proposed scheduling algorithm by randomly generating heterogeneous workflows with heterogeneous computing platform, and the experiments show that our method improves 15.2% over the state-of-the-art methods.Keywords: heterogeneous computing, workflow scheduling, constrained resources, minimal makespan
Procedia PDF Downloads 3410457 A Comparative Study of Mental Health and Well-Being between Qugong Practitioners and Non-Practitioners
Authors: Masoumeh Khosravi
Abstract:
Introduction: The complementary therapies and Qigong exercises is important in order to maintain physical and mental health. Objective: This study was done to compare and investigate well-being and mental health's state between practitioners of a Qigong practice (Falun Dafa) and non-practitioners. Method: It was a comparative study with 60 samples (30 practitioners of Falun Dafa, and 30 non-practitioners), who were selected by random sampling from Tehran city of Iran. Data were collected by mental health inventory (SCL90) and well-being questionnaire. Multivariate variance analyzing and t-test were used for analyzing data. Results: Results showed significant differences in most components of mental health including anxiety, aggressiveness, obsessive-compulsion, interpersonal sensitivity, somatization disorder, depression, phobia between practitioners and non-practitioners. Well-being was significantly higher in practitioners than non-practitioners. Conclusion: Accordingly, we concluded Falun Gong exercises have high impact on mental health and well-being in people.Keywords: mental health, well-being, Qigong, Falun Dafa
Procedia PDF Downloads 38010456 A Goal-Driven Crime Scripting Framework
Authors: Hashem Dehghanniri
Abstract:
Crime scripting is a simple and effective crime modeling technique that aims to improve understanding of security analysts about security and crime incidents. Low-quality scripts provide a wrong, incomplete, or sophisticated understanding of the crime commission process, which oppose the purpose of their application, e.g., identifying effective and cost-efficient situational crime prevention (SCP) measures. One important and overlooked factor in generating quality scripts is the crime scripting method. This study investigates the problems within the existing crime scripting practices and proposes a crime scripting approach that contributes to generating quality crime scripts. It was validated by experienced crime scripters. This framework helps analysts develop better crime scripts and contributes to their effective application, e.g., SCP measures identification or policy-making.Keywords: attack modelling, crime commission process, crime script, situational crime prevention
Procedia PDF Downloads 126