Search results for: event sequence
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2311

Search results for: event sequence

1321 Task Based Language Learning: A Paradigm Shift in ESL/EFL Teaching and Learning: A Case Study Based Approach

Authors: Zehra Sultan

Abstract:

The study is based on the task-based language teaching approach which is found to be very effective in the EFL/ESL classroom. This approach engages learners to acquire the usage of authentic language skills by interacting with the real world through sequence of pedagogical tasks. The use of technology enhances the effectiveness of this approach. This study throws light on the historical background of TBLT and its efficacy in the EFL/ESL classroom. In addition, this study precisely talks about the implementation of this approach in the General Foundation Programme of Muscat College, Oman. It furnishes the list of the pedagogical tasks embedded in the language curriculum of General Foundation Programme (GFP) which are skillfully allied to the College Graduate Attributes. Moreover, the study also discusses the challenges pertaining to this approach from the point of view of teachers, students, and its classroom application. Additionally, the operational success of this methodology is gauged through formative assessments of the GFP, which is apparent in the students’ progress.

Keywords: task-based language teaching, authentic language, communicative approach, real world activities, ESL/EFL activities

Procedia PDF Downloads 112
1320 The Distribution of HLA-B*15:01 and HLA-B*51:01 Alleles in Thai Population: Clinical Implementation and Diagnostic Process of COVID-19 Severity

Authors: Aleena Rena Onozuka, Patompong Satapornpong

Abstract:

Introduction: In a Human Leukocyte Antigen (HLA)’s immune response, HLA alleles (HLA class I and class II) play a crucial role in fighting against pathogens. HLA-B*15:01 allele had a significant association with asymptomatic COVID-19 infection (p-value = 5.67 x 10-5 ; OR = 2.40 and 95% CI = 1.54 - 3.64). There was also a notable linkage between HLA-B*51:01 allele and critically ill patients with COVID-19 (p-value = 0.007 and OR = 3.38). This study has described the distribution of HLA marker alleles in Thais and sub-groups. Objective: We want to investigate the prevalence of HLA-B*15:01 and HLA-B*51:01 alleles in the Thai population. Materials and Methods: 200 healthy Thai population were included in this study from the College of Pharmacy, Rangsit University. HLA-B alleles were genotyped using the sequence-specific oligonucleotides process (PCR-SSOs). Results: We found out that HLA-B*46:01 (12.00%), HLA-B*15:02 (9.25%), HLA-B*40:01 (6.50%), HLA-B*13:01 (6.25%), and HLA-B* 38:02 (5.50%) alleles were more common than other alleles in Thai population. HLA-B*46:01 and HLA-B*15:02 were the most common allele found across four regions. Moreover, the frequency of HLA-B*15:01 and HLA-B*51:01 alleles were similarly distributed in Thai population (0.50, 5.25 %) and (p-value > 0.05), respectively. The frequencies of HLA-B*15:01 and HLA-B*51:01 alleles were not significantly different from other populations compared to the Thai population. Conclusions: We can screen for HLA-B*15:01 and HLA-B*51:01 alleles to determine the symptoms of COVID-19 since they are universal HLA-B markers. Importantly, the database of HLA markers indicates the association between HLA frequency and populations. However, we need further research on larger numbers of COVID-19 patients and in different populations.

Keywords: HLA-B*15:01, HLA-B*51:01, COVID-19, HLA-B alleles

Procedia PDF Downloads 109
1319 Protein Remote Homology Detection by Using Profile-Based Matrix Transformation Approaches

Authors: Bin Liu

Abstract:

As one of the most important tasks in protein sequence analysis, protein remote homology detection has been studied for decades. Currently, the profile-based methods show state-of-the-art performance. Position-Specific Frequency Matrix (PSFM) is widely used profile. However, there exists noise information in the profiles introduced by the amino acids with low frequencies. In this study, we propose a method to remove the noise information in the PSFM by removing the amino acids with low frequencies called Top frequency profile (TFP). Three new matrix transformation methods, including Autocross covariance (ACC) transformation, Tri-gram, and K-separated bigram (KSB), are performed on these profiles to convert them into fixed length feature vectors. Combined with Support Vector Machines (SVMs), the predictors are constructed. Evaluated on two benchmark datasets, and experimental results show that these proposed methods outperform other state-of-the-art predictors.

Keywords: protein remote homology detection, protein fold recognition, top frequency profile, support vector machines

Procedia PDF Downloads 114
1318 Molecular Characterization of Echinococcus granulosus through Amplification of 12S rRNA Gene and Cox1 Gene Fragments from Cattle in Chittagong, Bangladesh

Authors: M. Omer Faruk, A. M. A. M. Zonaed Siddiki, M. Fazal Karim, Md. Masuduzzaman, S. Chowdhury, Md. Shafiqul Islam, M. Alamgir Hossain

Abstract:

The dog tapeworms Echinococcus granulosus develop hydatid cysts in various organs in human and domestic animals worldwide including Bangladesh. The aim of this study was to identify and characterize the genotype of E. granulosus isolated from cattle using 12S rRNA and Cytochrome oxidase 1 (COX 1) genes. A total of 43 hydatid cyst samples were collected from 390 examined cattle samples derived from slaughterhouses. Among them, three cysts were fertile. Genomic DNA was extracted from germinal membrane and/or protoscoleces followed by PCR amplification of mitochondrial 12S rRNA and Cytochrome oxidase 1 gene fragments. The sequence data revealed existence of G1 (64.28%) and possible G3 (21.43%) genotypes for the first time in Bangladesh. The study indicates that common sheep strain G1 is the dominant subtype of E. granulosus in Chittagong region of Bangladesh. This will increase our understanding of the epidemiology of hydatidosis in the southern part of the country and will be useful to plan suitable control measures in the long run.

Keywords: Echinococcus granulosus, Cox1, 12S rRNA, molecular characterization, Bangladesh

Procedia PDF Downloads 330
1317 Predicting Machine-Down of Woodworking Industrial Machines

Authors: Matteo Calabrese, Martin Cimmino, Dimos Kapetis, Martina Manfrin, Donato Concilio, Giuseppe Toscano, Giovanni Ciandrini, Giancarlo Paccapeli, Gianluca Giarratana, Marco Siciliano, Andrea Forlani, Alberto Carrotta

Abstract:

In this paper we describe a machine learning methodology for Predictive Maintenance (PdM) applied on woodworking industrial machines. PdM is a prominent strategy consisting of all the operational techniques and actions required to ensure machine availability and to prevent a machine-down failure. One of the challenges with PdM approach is to design and develop of an embedded smart system to enable the health status of the machine. The proposed approach allows screening simultaneously multiple connected machines, thus providing real-time monitoring that can be adopted with maintenance management. This is achieved by applying temporal feature engineering techniques and training an ensemble of classification algorithms to predict Remaining Useful Lifetime of woodworking machines. The effectiveness of the methodology is demonstrated by testing an independent sample of additional woodworking machines without presenting machine down event.

Keywords: predictive maintenance, machine learning, connected machines, artificial intelligence

Procedia PDF Downloads 212
1316 New Isolate of Cucumber Mosaic Virus Infecting Banana

Authors: Abdelsabour G. A. Khaled, Ahmed W. A. Abdalla And Sabry Y. M. Mahmoud

Abstract:

Banana plants showing typical mosaic and yellow stripes on leaves as symptoms were collected from Assiut Governorate in Egypt. The causal agent was identified as Cucumber mosaic virus (CMV) on the basis of symptoms, transmission, serology, transmission electron microscopy and reverse transcription polymerase chain reaction (RT-PCR). Coat protein (CP) gene was amplified using gene specific primers for coat protein (CP), followed by cloning into desired cloning vector for sequencing. In this study the CMV was transmitted into propagation host either by aphid or mechanically. The transmission was confirmed through Direct Antigen Coating Enzyme Linked Immuno Sorbent Assay (DAC-ELISA). Analysis of the 120 deduced amino acid sequence of the coat protein gene revealed that the EG-A strain of CMV shared from 97.50 to 98.33% with those strains belonging to subgroup IA. The cluster analysis grouped the Egyptian isolate with strains Fny and Ri8 belonging sub-group IA. It appears that there occurs a high incidence of CMV infecting banana belonging to IA subgroup in most parts of Egypt.

Keywords: banana, CMV, transmission, CP gene, RT-PCR

Procedia PDF Downloads 332
1315 Desire as Psychological Case against Nihilism and a Clear Mechanism as Evidence for Moral Realism

Authors: Paul Pistone

Abstract:

Nihilism claims that there are no actual intrinsic goods. Desire, however, directly contradicts this claim. To desire, something is more than to be motivated to bring about the desired ends. It is more than to take pleasure in it, seeming that one has obtained her desired end. Desire is, further, more than believing that something is good. Desire is the perception that something is good for the self. In this paper, it is argued that desire is an agent-relative value seeming. This implies that there are intrinsic values. It will be argued that: (1) there are intrinsic values related to life and flourishing, (2) that it is metaphysically impossible that there are no intrinsic values, (3) that desire is our psychological mechanism which enables us to perceive a state of affairs or event as an agent-relative good, and (4) while we can be wrong about the large scale object of desire (i.e., the instrumental desire) we cannot be wrong about what is at the root of our desire (i.e., the intrinsic desire). The method of this paper will be to examine the claims of nihilism and moral realism in recent literature, present a case for moral realism, discuss a few theories of desire, connect moral realism to an evaluative perceptual model of desire, and conclude that not only is this the best theory of desire but that this psychological faculty offers a clear counterexample to nihilism.

Keywords: desire, moral realism, nihilism, perception

Procedia PDF Downloads 115
1314 Robust Heart Sounds Segmentation Based on the Variation of the Phonocardiogram Curve Length

Authors: Mecheri Zeid Belmecheri, Maamar Ahfir, Izzet Kale

Abstract:

Automatic cardiac auscultation is still a subject of research in order to establish an objective diagnosis. Recorded heart sounds as Phonocardiogram signals (PCG) can be used for automatic segmentation into components that have clinical meanings. These are the first sound, S1, the second sound, S2, and the systolic and diastolic components, respectively. In this paper, an automatic method is proposed for the robust segmentation of heart sounds. This method is based on calculating an intermediate sawtooth-shaped signal from the length variation of the recorded Phonocardiogram (PCG) signal in the time domain and, using its positive derivative function that is a binary signal in training a Recurrent Neural Network (RNN). Results obtained in the context of a large database of recorded PCGs with their simultaneously recorded ElectroCardioGrams (ECGs) from different patients in clinical settings, including normal and abnormal subjects, show a segmentation testing performance average of 76 % sensitivity and 94 % specificity.

Keywords: heart sounds, PCG segmentation, event detection, recurrent neural networks, PCG curve length

Procedia PDF Downloads 169
1313 Mentorship and Feelings of Identify and Self-Efficacy in Women Returning to the Workforce after an Extended Child-Rearing Leave

Authors: Jacquelyn Irene Eidson

Abstract:

Women who leave the workforce due to motherhood and wish to return are a valuable, untapped resource for organizations. Levinson’s theory of adult development defines life as a sequence of transitions requiring difficult decisions that prompt humans to question their identity and their self-efficacy. The experience of being a working mother and the experience of workplace mentorship have received extensive research attention. Merging the two experiences and focusing on feelings of identity and self-efficacy provides a unique and focused opportunity for learning. Through one-on-one interviews and focus group discussion with working mothers that had previously left the workforce for an extended leave due to child-rearing, a meaningful description of their experiences will be obtained. Data is currently being collected via a collaboration with state banking associations in the United States. Results from the study will enable organizations worldwide to more effectively provide mentorship opportunities built around a culture of understanding while more effectively recruiting, supporting, developing, and retaining this valuable talent pool.

Keywords: identity, mentorship, self-efficacy, working mother

Procedia PDF Downloads 181
1312 Automated CNC Part Programming and Process Planning for Turned Components

Authors: Radhey Sham Rajoria

Abstract:

Pressure to increase the competitiveness in the manufacturing sector and for the survival in the market has led to the development of machining centres, which enhance productivity, improve quality, shorten the lead time, and reduce the manufacturing cost. With the innovation of machining centres in the manufacturing sector the production lines have been replaced by these machining centers, having the ability to machine various processes and multiple tooling with automatic tool changer (ATC) for the same part. Also the process plans can be easily generated for complex components. Some means are required to utilize the machining center at its best. The present work is concentrated on the automated part program generation, and in turn automated process plan generation for the turned components on Denford “MIRAC” 8 stations ATC lathe machining centre. A package in C++ on DOS platform is developed which generates the complete CNC part program, process plan and process sequence for the turned components. The input to this system is in the form of a blueprint in graphical format with machining parameters and variables, and the output is the CNC part program which is stored in a .mir file, ready for execution on the machining centre.

Keywords: CNC, MIRAC, ATC, process planning

Procedia PDF Downloads 257
1311 DNA Vaccine Study against Vaccinia Virus Using In vivo Electroporation

Authors: Jai Myung Yang, Na Young Kim, Sung Ho Shin

Abstract:

The adverse reactions of current live smallpox vaccines and potential use of smallpox as a bioterror weapon have heightened the development of new effective vaccine for this infectious disease. In the present study, DNA vaccine vector was produced which was optimized for expression of the vaccinia virus L1 antigen in the mouse model. A plasmid IgM-tL1R, which contains codon-optimized L1R gene, was constructed and fused with an IgM signal sequence under the regulation of a SV40 enhancer. The expression and secretion of recombinant L1 protein was confirmed in vitro 293 T cell. Mice were administered the DNA vaccine by electroporation and challenged with vaccinia virus. We observed that immunization with IgM-tL1R induced potent neutralizing antibody responses and provided complete protection against lethal vaccinia virus challenge. Isotyping studies reveal that immunoglobulin G2 (IgG2) antibody predominated after the immunization, indicative of a T helper type 1 response. Our results suggest that an optimized DNA vaccine, IgM-tL1R, can be effective in stimulating anti-vaccinia virus immune response and provide protection against lethal orthopoxvirus challenge.

Keywords: DNA vaccine, electroporation, L1R, vaccinia virus

Procedia PDF Downloads 252
1310 Frequent Itemset Mining Using Rough-Sets

Authors: Usman Qamar, Younus Javed

Abstract:

Frequent pattern mining is the process of finding a pattern (a set of items, subsequences, substructures, etc.) that occurs frequently in a data set. It was proposed in the context of frequent itemsets and association rule mining. Frequent pattern mining is used to find inherent regularities in data. What products were often purchased together? Its applications include basket data analysis, cross-marketing, catalog design, sale campaign analysis, Web log (click stream) analysis, and DNA sequence analysis. However, one of the bottlenecks of frequent itemset mining is that as the data increase the amount of time and resources required to mining the data increases at an exponential rate. In this investigation a new algorithm is proposed which can be uses as a pre-processor for frequent itemset mining. FASTER (FeAture SelecTion using Entropy and Rough sets) is a hybrid pre-processor algorithm which utilizes entropy and rough-sets to carry out record reduction and feature (attribute) selection respectively. FASTER for frequent itemset mining can produce a speed up of 3.1 times when compared to original algorithm while maintaining an accuracy of 71%.

Keywords: rough-sets, classification, feature selection, entropy, outliers, frequent itemset mining

Procedia PDF Downloads 423
1309 Subband Coding and Glottal Closure Instant (GCI) Using SEDREAMS Algorithm

Authors: Harisudha Kuresan, Dhanalakshmi Samiappan, T. Rama Rao

Abstract:

In modern telecommunication applications, Glottal Closure Instants location finding is important and is directly evaluated from the speech waveform. Here, we study the GCI using Speech Event Detection using Residual Excitation and the Mean Based Signal (SEDREAMS) algorithm. Speech coding uses parameter estimation using audio signal processing techniques to model the speech signal combined with generic data compression algorithms to represent the resulting modeled in a compact bit stream. This paper proposes a sub-band coder SBC, which is a type of transform coding and its performance for GCI detection using SEDREAMS are evaluated. In SBCs code in the speech signal is divided into two or more frequency bands and each of these sub-band signal is coded individually. The sub-bands after being processed are recombined to form the output signal, whose bandwidth covers the whole frequency spectrum. Then the signal is decomposed into low and high-frequency components and decimation and interpolation in frequency domain are performed. The proposed structure significantly reduces error, and precise locations of Glottal Closure Instants (GCIs) are found using SEDREAMS algorithm.

Keywords: SEDREAMS, GCI, SBC, GOI

Procedia PDF Downloads 343
1308 A Proposal to Integrate Spatially Explicit Ecosystem Services with Urban Metabolic Modelling

Authors: Thomas Elliot, Javier Babi Almenar, Benedetto Rugani

Abstract:

The integration of urban metabolism (UM) with spatially explicit ecosystem service (ES) stocks has the potential to advance sustainable urban development. It will correct the lack of spatially specificity of current urban metabolism models. Furthermore, it will include into UM not only the physical properties of material and energy stocks and flows, but also the implications to the natural capital that provides and maintains human well-being. This paper presents the first stages of a modelling framework by which urban planners can assess spatially the trade-offs of ES flows resulting from urban interventions of different character and scale. This framework allows for a multi-region assessment which takes into account sustainability burdens consequent to an urban planning event occurring elsewhere in the environment. The urban boundary is defined as the Functional Urban Audit (FUA) method to account for trans-administrative ES flows. ES are mapped using CORINE land use within the FUA. These stocks and flows are incorporated into a UM assessment method to demonstrate the transfer and flux of ES arising from different urban planning implementations.

Keywords: ecological economics, ecosystem services, spatial planning, urban metabolism

Procedia PDF Downloads 320
1307 Physical Education Teacher's Interpretation toward Teaching Games for Understanding Model

Authors: Soni Nopembri

Abstract:

The objective of this research is to evaluate the implementation of teaching games for Understanding model by conducting action to physical education teacher who have got long teaching experience. The research applied Participatory Action Research. The subjects of this research were 19 physical education teachers who had got training of Teaching Games for Understanding. Data collection was conducted intensively through a questionnaire, in-depth interview, Focus Group Discussion (FGD), observation, and documentation. The collected data was analysis zed qualitatively and quantitatively. The result showed that physical education teachers had got an appropriate interpretation on TGfU model. Some indicators that were the focus of this research indicated this points; they are: (1) physical education teachers had good understanding toward TGfU model, (2) PE teachers’ competence in applying TGfU model on Physical Education at school were adequate, though some improvement were needed, (3) the influence factors in the implementation of TGfU model, in sequence, were teacher, facilities, environment, and students factors, (4) PE teachers’ perspective toward TGfU model were positively good, although some teachers were less optimistic toward the development of TGfU model in the future.

Keywords: TGfU, physical education teacher, teaching games, FGD

Procedia PDF Downloads 536
1306 Unveiling Cardiovascular and Behavioral Effects of Aerobic Exercise: Insights from Morocco

Authors: Ahmed Boujdad

Abstract:

Morocco, situated in North Africa and celebrated for its diverse landscapes and vibrant cultural heritage, confronts evolving challenges in the realms of cardiovascular well-being and psychological health. In this context, this article aims to highlight distinctive findings stemming from Moroccan research concerning the effects of aerobic exercise on cardiovascular physiology and psychological states. The discourse will encompass a wide array of subjects, including adaptations in cardiac function due to exercise, management of blood pressure, and vascular well-being tailored to the Moroccan populace. A prominent focal point of the article will be the exploration of the interplay between aerobic exercise and Moroccan behavioral tendencies and socio-cultural influences. The research will delve into the correlations between consistent physical activity and its potential to mitigate stress, anxiety, and depression within the Moroccan framework. This inquiry will also extend to examining how exercise contributes to strengthening the societal tapestry of Morocco, fostering community involvement, and cultivating a sense of holistic wellness.

Keywords: kinesiology, cardiovascular, event-related potential‎, physical activity

Procedia PDF Downloads 50
1305 Investigation of Arson Fire Incident in Textile Garment Building Using Fire Dynamic Simulation

Authors: Mohsin Ali Shaikh, Song Weiguo, Muhammad Kashan Surahio, Usman Shahid, Rehmat Karim

Abstract:

This study investigated a catastrophic arson fire incident that occurred at a textile garment building in Karachi, Pakistan. Unfortunately, a catastrophic event led to the loss of 262 lives and caused 55 severe injuries. The primary objective is to analyze the aspects of the fire incident and understand the causes of arson fire disasters. The study utilized Fire Dynamic Simulation (F.D.S) was employed to simulate fire propagation, visibility, harmful gas concentration, fire temperature, and numerical results. The analysis report has determined the specific circumstances that created the unpleasant incident in the present study. The significance of the current findings lies in their potential to prevent arson fires, improve fire safety measures, and the development of safety plans in building design. The fire dynamic simulation findings can serve as a theoretical basis for the investigation of arson fires and evacuation planning in textile garment buildings.

Keywords: investigation, fire arson incident, textile garment, fire dynamic simulation (FDS)

Procedia PDF Downloads 79
1304 Flight Safety Hazard: An Investigation into Bird Strike Prevention in the Vicinity of Suvarnabhumi Airport, Thailand

Authors: Chantarat Manvichien

Abstract:

The purpose of this research paper was aimed to examine the bird strike prevention in the vicinity of Suvarnabhumi Airport, Thailand. A bird strike event occurs when a bird or a flock of birds collide with an operating airplane and results in flight interruption. This is the reason why International Civil Aviation Organization (ICAO), a part of the United Nations, has an assumption that birds, including other wildlife, are a serious hazard to aircraft and attempts should be accomplished to overcome this hazard. ICAO requires all airports worldwide to set up proactive countermeasures in order to reduce the risk from bird strike and wildlife hazard. In Thailand, the Airports of Thailand Public Company Limited which manages Suvarnabhumi Airport, also known as Bangkok International Airport, responds to the requirements and spends a lot of effort to ensure this hazard is manageable. An intensive study on the countermeasures to prevent aircraft accident from bird strike and other wildlife have been continuously executed since the early construction of the Airport until nowadays.

Keywords: bird strike, flight safety, wildlife hazard, Suvarnabhumi airport

Procedia PDF Downloads 351
1303 Classifying and Analysis 8-Bit to 8-Bit S-Boxes Characteristic Using S-Box Evaluation Characteristic

Authors: Muhammad Luqman, Yusuf Kurniawan

Abstract:

S-Boxes is one of the linear parts of the cryptographic algorithm. The existence of S-Box in the cryptographic algorithm is needed to maintain non-linearity of the algorithm. Nowadays, modern cryptographic algorithms use an S-Box as a part of algorithm process. Despite the fact that several cryptographic algorithms today reuse theoretically secure and carefully constructed S-Boxes, there is an evaluation characteristic that can measure security properties of S-Boxes and hence the corresponding primitives. Analysis of an S-Box usually is done using manual mathematics calculation. Several S-Boxes are presented as a Truth Table without any mathematical background algorithm. Then, it’s rather difficult to determine the strength of Truth Table S-Box without a mathematical algorithm. A comprehensive analysis should be applied to the Truth Table S-Box to determine the characteristic. Several important characteristics should be owned by the S-Boxes, they are Nonlinearity, Balancedness, Algebraic degree, LAT, DAT, differential delta uniformity, correlation immunity and global avalanche criterion. Then, a comprehensive tool will be present to automatically calculate the characteristics of S-Boxes and determine the strength of S-Box. Comprehensive analysis is done on a deterministic process to produce a sequence of S-Boxes characteristic and give advice for a better S-Box construction.

Keywords: cryptographic properties, Truth Table S-Boxes, S-Boxes characteristic, deterministic process

Procedia PDF Downloads 353
1302 ISSR-PCR Based Genetic Diversity Analysis on Copper Tolerant versus Wild Type Strains of Unicellular alga Chlorella Vulgaris

Authors: Abdullah M. Alzahrani

Abstract:

The unicellular alga Chlorella vulgaris was isolated from Al-Asfar Lake, which is located in the Al-Ahsa province of Saudi Arabia. Two different isolates were sub-cultured under laboratory conditions. The wild type was grown under a regular concentration of copper, whereas the other isolate was grown under a progressively increasing copper concentration. An Inter Simple Sequence Repeats (ISSR) analysis was performed using DNA isolated from the wild type and tolerant strains. The sum of the scored bands of the wild type was 155, with 100 (64.5%) considered to be polymorphic bands, whereas the resistant strain displayed 147 bands, with 92 (62.6%) considered to be polymorphic bands. The sum of the scored bands of a mixed sample was 117 bands, of which only 4 (3.4%) were considered to be polymorphic. The average Nei's genetic diversity (h) and Shannon-Weiner diversity indices (I) were 0.3891 and 0.5394, respectively. These results clearly indicate that the adaptation to a high level of copper in Chlorella vulgaris is not merely physiological but rather driven by modifications at the genomic level.

Keywords: chlorella vulgaris, copper tolerance, genetic diversity, green algae

Procedia PDF Downloads 421
1301 Integration GIS–SCADA Power Systems to Enclosure Air Dispersion Model

Authors: Ibrahim Shaker, Amr El Hossany, Moustafa Osman, Mohamed El Raey

Abstract:

This paper will explore integration model between GIS–SCADA system and enclosure quantification model to approach the impact of failure-safe event. There are real demands to identify spatial objects and improve control system performance. Nevertheless, the employed methodology is predicting electro-mechanic operations and corresponding time to environmental incident variations. Open processing, as object systems technology, is presented for integration enclosure database with minimal memory size and computation time via connectivity drivers such as ODBC:JDBC during main stages of GIS–SCADA connection. The function of Geographic Information System is manipulating power distribution in contrast to developing issues. In other ward, GIS-SCADA systems integration will require numerical objects of process to enable system model calibration and estimation demands, determine of past events for analysis and prediction of emergency situations for response training.

Keywords: air dispersion model, environmental management, SCADA systems, GIS system, integration power system

Procedia PDF Downloads 353
1300 Deterministic Random Number Generator Algorithm for Cryptosystem Keys

Authors: Adi A. Maaita, Hamza A. A. Al Sewadi

Abstract:

One of the crucial parameters of digital cryptographic systems is the selection of the keys used and their distribution. The randomness of the keys has a strong impact on the system’s security strength being difficult to be predicted, guessed, reproduced or discovered by a cryptanalyst. Therefore, adequate key randomness generation is still sought for the benefit of stronger cryptosystems. This paper suggests an algorithm designed to generate and test pseudo random number sequences intended for cryptographic applications. This algorithm is based on mathematically manipulating a publically agreed upon information between sender and receiver over a public channel. This information is used as a seed for performing some mathematical functions in order to generate a sequence of pseudorandom numbers that will be used for encryption/decryption purposes. This manipulation involves permutations and substitutions that fulfills Shannon’s principle of “confusion and diffusion”. ASCII code characters wereutilized in the generation process instead of using bit strings initially, which adds more flexibility in testing different seed values. Finally, the obtained results would indicate sound difficulty of guessing keys by attackers.

Keywords: cryptosystems, information security agreement, key distribution, random numbers

Procedia PDF Downloads 256
1299 Search for Flavour Changing Neutral Current Couplings of Higgs-up Sector Quarks at Future Circular Collider (FCC-eh)

Authors: I. Turk Cakir, B. Hacisahinoglu, S. Kartal, A. Yilmaz, A. Yilmaz, Z. Uysal, O. Cakir

Abstract:

In the search for new physics beyond the Standard Model, Flavour Changing Neutral Current (FCNC) is a good research field in terms of the observability at future colliders. Increased Higgs production with higher energy and luminosity in colliders is essential for verification or falsification of our knowledge of physics and predictions, and the search for new physics. Prospective electron-proton collider constituent of the Future Circular Collider project is FCC-eh. It offers great sensitivity due to its high luminosity and low interference. In this work, thq FCNC interaction vertex with off-shell top quark decay at electron-proton colliders is studied. By using MadGraph5_aMC@NLO multi-purpose event generator, observability of tuh and tch couplings are obtained with equal coupling scenario. Upper limit on branching ratio of tree level top quark FCNC decay is determined as 0.012% at FCC-eh with 1 ab ^−1 luminosity.

Keywords: FCC, FCNC, Higgs Boson, Top Quark

Procedia PDF Downloads 203
1298 Switched System Diagnosis Based on Intelligent State Filtering with Unknown Models

Authors: Nada Slimane, Foued Theljani, Faouzi Bouani

Abstract:

The paper addresses the problem of fault diagnosis for systems operating in several modes (normal or faulty) based on states assessment. We use, for this purpose, a methodology consisting of three main processes: 1) sequential data clustering, 2) linear model regression and 3) state filtering. Typically, Kalman Filter (KF) is an algorithm that provides estimation of unknown states using a sequence of I/O measurements. Inevitably, although it is an efficient technique for state estimation, it presents two main weaknesses. First, it merely predicts states without being able to isolate/classify them according to their different operating modes, whether normal or faulty modes. To deal with this dilemma, the KF is endowed with an extra clustering step based fully on sequential version of the k-means algorithm. Second, to provide state estimation, KF requires state space models, which can be unknown. A linear regularized regression is used to identify the required models. To prove its effectiveness, the proposed approach is assessed on a simulated benchmark.

Keywords: clustering, diagnosis, Kalman Filtering, k-means, regularized regression

Procedia PDF Downloads 171
1297 Detecting Paraphrases in Arabic Text

Authors: Amal Alshahrani, Allan Ramsay

Abstract:

Paraphrasing is one of the important tasks in natural language processing; i.e. alternative ways to express the same concept by using different words or phrases. Paraphrases can be used in many natural language applications, such as Information Retrieval, Machine Translation, Question Answering, Text Summarization, or Information Extraction. To obtain pairs of sentences that are paraphrases we create a system that automatically extracts paraphrases from a corpus, which is built from different sources of news article since these are likely to contain paraphrases when they report the same event on the same day. There are existing simple standard approaches (e.g. TF-IDF vector space, cosine similarity) and alignment technique (e.g. Dynamic Time Warping (DTW)) for extracting paraphrase which have been applied to the English. However, the performance of these approaches could be affected when they are applied to another language, for instance Arabic language, due to the presence of phenomena which are not present in English, such as Free Word Order, Zero copula, and Pro-dropping. These phenomena will affect the performance of these algorithms. Thus, if we can analysis how the existing algorithms for English fail for Arabic then we can find a solution for Arabic. The results are promising.

Keywords: natural language processing, TF-IDF, cosine similarity, dynamic time warping (DTW)

Procedia PDF Downloads 365
1296 Identification of Failures Occurring on a System on Chip Exposed to a Neutron Beam for Safety Applications

Authors: S. Thomet, S. De-Paoli, F. Ghaffari, J. M. Daveau, P. Roche, O. Romain

Abstract:

In this paper, we present a hardware module dedicated to understanding the fail reason of a System on Chip (SoC) exposed to a particle beam. Impact of Single-Event Effects (SEE) on processor-based SoCs is a concern that has increased in the past decade, particularly for terrestrial applications with automotive safety increasing requirements, as well as consumer and industrial domains. The SEE created by the impact of a particle on an SoC may have consequences that can end to instability or crashes. Specific hardening techniques for hardware and software have been developed to make such systems more reliable. SoC is then qualified using cosmic ray Accelerated Soft-Error Rate (ASER) to ensure the Soft-Error Rate (SER) remains in mission profiles. Understanding where errors are occurring is another challenge because of the complexity of operations performed in an SoC. Common techniques to monitor an SoC running under a beam are based on non-intrusive debug, consisting of recording the program counter and doing some consistency checking on the fly. To detect and understand SEE, we have developed a module embedded within the SoC that provide support for recording probes, hardware watchpoints, and a memory mapped register bank dedicated to software usage. To identify CPU failure modes and the most important resources to probe, we have carried out a fault injection campaign on the RTL model of the SoC. Probes are placed on generic CPU registers and bus accesses. They highlight the propagation of errors and allow identifying the failure modes. Typical resulting errors are bit-flips in resources creating bad addresses, illegal instructions, longer than expected loops, or incorrect bus accesses. Although our module is processor agnostic, it has been interfaced to a RISC-V by probing some of the processor registers. Probes are then recorded in a ring buffer. Associated hardware watchpoints are allowing to do some control, such as start or stop event recording or halt the processor. Finally, the module is also providing a bank of registers where the firmware running on the SoC can log information. Typical usage is for operating system context switch recording. The module is connected to a dedicated debug bus and is interfaced to a remote controller via a debugger link. Thus, a remote controller can interact with the monitoring module without any intrusiveness on the SoC. Moreover, in case of CPU unresponsiveness, or system-bus stall, the recorded information can still be recovered, providing the fail reason. A preliminary version of the module has been integrated into a test chip currently being manufactured at ST in 28-nm FDSOI technology. The module has been triplicated to provide reliable information on the SoC behavior. As the primary application domain is automotive and safety, the efficiency of the module will be evaluated by exposing the test chip under a fast-neutron beam by the end of the year. In the meantime, it will be tested with alpha particles and electromagnetic fault injection (EMFI). We will report in the paper on fault-injection results as well as irradiation results.

Keywords: fault injection, SoC fail reason, SoC soft error rate, terrestrial application

Procedia PDF Downloads 220
1295 Effect of Non-Genetic Factors and Heritability Estimate of Some Productive and Reproductive Traits of Holstein Cows in Middle of Iraq

Authors: Salim Omar Raoof

Abstract:

This study was conducted at the Al-Salam cows’ station for milk production located in Al-Latifiya district - Al-Mahmudiyah district (25 km south of Baghdad governorate) on a sample of (180) Holstein cows imported from Germany by Taj Al-Nahrain company in order to study the effect of the sequence, season and calving year on Total Milk Production (TMP). The lactation period (LP), calving interval, Services per conception and the estimate of the heritability of the studied traits. The results showed that the overall mean of TMP and LP were 3172.53 kg and 237.09-day respectively. The parity effect on TMP in Holstein cows was highly significant (P≤0.01). Total Milk production increased with the advance of parity and mostly reached its maximum value in the 4th and 3rd parity being 3305.87 kg and3286.35 kg per day, respectively. Season of calving has a highly significant (P≤0.01), effect on (TMP). Cows calved in spring had a highest milk production than those calved in other seasons. Season of calving had a highly significant (P≤0.01) effect on services per conception. The result of the study showed the heritability values for TMP, LP, SPC and CL were 0.21, 0.08, 0.08 and 0.07, respectively.

Keywords: cows, non genetic, milk production, heritability

Procedia PDF Downloads 65
1294 Subacute Thyroiditis Triggered by Sinovac and Oxford-AstraZeneca Vaccine

Authors: Ratchaneewan Salao, Steven W. Edwards, Kiatichai Faksri, Kanin Salao

Abstract:

Background: A two-dose regimen of COVID-19 vaccination (inactivated whole virion SARS-CoV-2 and adenoviral vector) has been widely used. Side effects are very low, but several adverse effects have been reported. Methods: A 40-year-old female patient, with a previous history of thyroid goitre, developed severe neck pain, headache, nausea and fatigue 7-days after receiving second vaccination with Vaxzevria® (Oxford-AstraZeneca). Clinical and laboratory findings, including thyroid function tests and ultrasound of thyroid glands, were performed. Results: Her left thyroid gland was multinodular enlarged, and severely tender on palpation. She had difficulty in swallowing and had tachycardia but no signs of hyperthyroidism. Laboratory results supported a diagnosis of subacute thyroiditis. She was prescribed NSAID (Ibuprofen 400 mg) and dexamethasone for 3-days and her symptoms resolved. Conclusions: Although this is an extremely rare event, physicians may encounter more cases of this condition due to the extensive vaccination program using this combination of vaccines.

Keywords: SARS-CoV-2, adenoviral vector vaccines, vaccination, subacute thyroiditis

Procedia PDF Downloads 58
1293 Securing Healthcare IoT Devices and Enabling SIEM Integration: Addressing

Authors: Mubarak Saadu Nabunkari, Abdullahi Abdu Ibrahim, Muhammad Ilyas

Abstract:

This study looks at how Internet of Things (IoT) devices are used in healthcare to monitor and treat patients better. However, using these devices in healthcare comes with security problems. The research explores using Security Information and Event Management (SIEM) systems with healthcare IoT devices to solve these security challenges. Reviewing existing literature shows the current state of IoT security and emphasizes the need for better protection. The main worry is that healthcare IoT devices can be easily hacked, putting patient data and device functionality at risk. To address this, the research suggests a detailed security framework designed for these devices. This framework, based on literature and best practices, includes important security measures like authentication, data encryption, access controls, and anomaly detection. Adding SIEM systems to this framework helps detect threats in real time and respond quickly to incidents, making healthcare IoT devices more secure. The study highlights the importance of this integration and offers guidance for implementing healthcare IoT securely, efficiently, and effectively.

Keywords: cyber security, threat intelligence, forensics, heath care

Procedia PDF Downloads 48
1292 Crop Water Productivity for Sunflower under Different Irrigation Regimes and Plant Spacing, at Gezira Clay Soil, Sudan

Authors: R. A. Eman Elsheikh, Bart Schultz, Abraham Mehari Haile, Hussein S. Adam

Abstract:

A field experiment was conducted at Gezira research station farm during the winter season in the third week of November 2012, in WadMedani, Sudan (Lat 14.23 W, Long 33.39 E and altitude 405 m above sea level, in deep cracking alkaline heavy clay Vertisols). The objective of this study was to determine the effect of three different irrigation for 10 days (W1), 15 days (W2) and 20 days (W3) and for two rows of 30 cm (S1) and 40 cm (S2), respectively. The experimental design was split plot with three replicates. The sunflower test variety was Hysun 33 cultivar. The seasonal water applied during the study was 6898, 6647, 5256, 5435, 5214, 5416 m3/ha for W1S1, W1S2, W2S1, W2S2, W3S1 and W3S2 respectively. The seed yield obtained for the above treatment in that sequence was 4208, 5542, 5167, 4579, 2931, 2936 kg/ha. The corresponding computed water productivity was 0.61, 0.82, 0.87, 0.95, 0.54, 0.56 kg/m3. The study clearly indicated that the highest seed yield was obtained when the crop was sown at 40 cm row spacing and was irrigated every 10 days (W1S2), followed by W2S1.

Keywords: water productivity, water deficit, sunflower, plant spacing

Procedia PDF Downloads 336