Search results for: IVF techniques evolution
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 8280

Search results for: IVF techniques evolution

7230 Effect of Gas-Diffusion Oxynitriding on Microstructure and Hardness of Ti-6Al-4V Alloys

Authors: Dong Bok Lee, Min Jung Kim

Abstract:

The commercially available titanium alloy, Ti-6Al-4V, was oxynitrided in the deoxygenated nitrogen gas at high temperatures followed by cooling in oxygen-containing nitrogen in order to analyze the influence of oxynitriding parameters on the phase modification, hardness, and the microstructural evolution of the oxynitrided coating. The surface microhardness of the oxynitrided alloy increased due to the strengthening effect of the formed titanium oxynitrides, TiNxOy. The maximum microhardness was obtained, when TiNxOy had near equiatomic composition of nitrogen and oxygen. It could be attained under the optimum oxygen partial pressure and temperature-time condition.

Keywords: titanium alloy, oxynitriding, gas diffusion, surface treatment

Procedia PDF Downloads 313
7229 Collation between the Architecture of the Churches and Housing from Antiquity to the Present Day

Authors: Shaloom Mbambu Kabeya, Léonard Kabeya Mukeba

Abstract:

Churches, cathedrals and castles beaten from antiquity to modern times were relevant from that time to the present day, and preserved as cultural heritage. Our predecessors as François 1er1, Michelangelo2, and Giotto3 left us traces. Gustave Eiffel4, Hector Guimard5 did not decrease their time to show modernization (evolution) in architecture. Plagiarism is a brake on architectural development, construction works of spirits is necessary architecture. This work explains the relationship between ancient and modern architecture. It also shows the power of mathematics in modern architecture.

Keywords: architectural modernization, heritage, mathematical architecture, materials

Procedia PDF Downloads 591
7228 Fe Modified Tin Oxide Thin Film Based Matrix for Reagentless Uric Acid Biosensing

Authors: Kashima Arora, Monika Tomar, Vinay Gupta

Abstract:

Biosensors have found potential applications ranging from environmental testing and biowarfare agent detection to clinical testing, health care, and cell analysis. This is driven in part by the desire to decrease the cost of health care and to obtain precise information more quickly about the health status of patient by the development of various biosensors, which has become increasingly prevalent in clinical testing and point of care testing for a wide range of biological elements. Uric acid is an important byproduct in human body and a number of pathological disorders are related to its high concentration in human body. In past few years, rapid growth in the development of new materials and improvements in sensing techniques have led to the evolution of advanced biosensors. In this context, metal oxide thin film based matrices due to their bio compatible nature, strong adsorption ability, high isoelectric point (IEP) and abundance in nature have become the materials of choice for recent technological advances in biotechnology. In the past few years, wide band-gap metal oxide semiconductors including ZnO, SnO₂ and CeO₂ have gained much attention as a matrix for immobilization of various biomolecules. Tin oxide (SnO₂), wide band gap semiconductor (Eg =3.87 eV), despite having multifunctional properties for broad range of applications including transparent electronics, gas sensors, acoustic devices, UV photodetectors, etc., it has not been explored much for biosensing purpose. To realize a high performance miniaturized biomolecular electronic device, rf sputtering technique is considered to be the most promising for the reproducible growth of good quality thin films, controlled surface morphology and desired film crystallization with improved electron transfer property. Recently, iron oxide and its composites have been widely used as matrix for biosensing application which exploits the electron communication feature of Fe, for the detection of various analytes using urea, hemoglobin, glucose, phenol, L-lactate, H₂O₂, etc. However, to the authors’ knowledge, no work is being reported on modifying the electronic properties of SnO₂ by implanting with suitable metal (Fe) to induce the redox couple in it and utilizing it for reagentless detection of uric acid. In present study, Fe implanted SnO₂ based matrix has been utilized for reagentless uric acid biosensor. Implantation of Fe into SnO₂ matrix is confirmed by energy-dispersive X-Ray spectroscopy (EDX) analysis. Electrochemical techniques have been used to study the response characteristics of Fe modified SnO₂ matrix before and after uricase immobilization. The developed uric acid biosensor exhibits a high sensitivity to about 0.21 mA/mM and a linear variation in current response over concentration range from 0.05 to 1.0 mM of uric acid besides high shelf life (~20 weeks). The Michaelis-Menten kinetic parameter (Km) is found to be relatively very low (0.23 mM), which indicates high affinity of the fabricated bioelectrode towards uric acid (analyte). Also, the presence of other interferents present in human serum has negligible effect on the performance of biosensor. Hence, obtained results highlight the importance of implanted Fe:SnO₂ thin film as an attractive matrix for realization of reagentless biosensors towards uric acid.

Keywords: Fe implanted tin oxide, reagentless uric acid biosensor, rf sputtering, thin film

Procedia PDF Downloads 177
7227 The Effect of Program Type on Mutation Testing: Comparative Study

Authors: B. Falah, N. E. Abakouy

Abstract:

Due to its high computational cost, mutation testing has been neglected by researchers. Recently, many cost and mutants’ reduction techniques have been developed, improved, and experimented, but few of them has relied the possibility of reducing the cost of mutation testing on the program type of the application under test. This paper is a comparative study between four operators’ selection techniques (mutants sampling, class level operators, method level operators, and all operators’ selection) based on the program code type of each application under test. It aims at finding an alternative approach to reveal the effect of code type on mutation testing score. The result of our experiment shows that the program code type can affect the mutation score and that the programs using polymorphism are best suited to be tested with mutation testing.

Keywords: equivalent mutant, killed mutant, mutation score, mutation testing, program code type, software testing

Procedia PDF Downloads 549
7226 A Study on Interaction between Traditional Culture and Modern Womenswear

Authors: Yu-Wei Chu, Marie Aja-Herrera, Denis Antoine, Mengjie Di

Abstract:

The purpose of this paper is to explore the innovative perspective of the local traditional culture of garments from different continents. The relationship between the local culture, the indigenous traditional technique of textile manufacture, and modern womenswear will be investigated. This will include exploring and discussing traditional techniques to create textiles reflecting different cultures and relevant handicrafts, including the history of these different peoples and regions. However, along with the improvement of technology, the diversity of culture is usually unified into a single aesthetic element, which makes fashion lack traditional cultural layers. Local cultural awareness has been gradually emerging in womenswear in recent years with the strong sweep of globalization. The possible loss of traditional art and crafts became an awareness for different cultures, who realized the necessity to protect and preserve their individual uniqueness. Modern womenswear is one of the largest markets in the fashion and apparel marketplace. Therefore, the commonalities of traditional textiles and garments for modern womenswear will be researched. Localized traditional fabrics have some elements, such as weaving techniques and other related crafts, in common with more modern manufacturing methods. In addition, the common point of traditional clothing is the use of draping, construction, and fabric manipulation. This paper aims to explore these factors, as discussed above, and also apply, in an innovative and creative manner, some of these traditional arts and crafts to modern womenswear. The combination of textile manipulation and different construction techniques can support the development of innovative womenswear to include a diversity of aesthetics. The main contribution of the paper is to find out the solution to bring local culture into the formal womenswear market with modern aesthetics to realize the ideal of traditional culture reconstruction.

Keywords: traditional culture, modern womenswear, diversity, aesthetics

Procedia PDF Downloads 112
7225 The Effectiveness of Energy Index Technique in Bearing Condition Monitoring

Authors: Faisal Alshammari, Abdulmajid Addali, Mosab Alrashed, Taihiret Alhashan

Abstract:

The application of acoustic emission techniques is gaining popularity, as it can monitor the condition of gears and bearings and detect early symptoms of a defect in the form of pitting, wear, and flaking of surfaces. Early detection of these defects is essential as it helps to avoid major failures and the associated catastrophic consequences. Signal processing techniques are required for early defect detection – in this article, a time domain technique called the Energy Index (EI) is used. This article presents an investigation into the Energy Index’s effectiveness to detect early-stage defect initiation and deterioration, and compares it with the common r.m.s. index, Kurtosis, and the Kolmogorov-Smirnov statistical test. It is concluded that EI is a more effective technique for monitoring defect initiation and development than other statistical parameters.

Keywords: acoustic emission, signal processing, kurtosis, Kolmogorov-Smirnov test

Procedia PDF Downloads 358
7224 A Review of Methods for Handling Missing Data in the Formof Dropouts in Longitudinal Clinical Trials

Authors: A. Satty, H. Mwambi

Abstract:

Much clinical trials data-based research are characterized by the unavoidable problem of dropout as a result of missing or erroneous values. This paper aims to review some of the various techniques to address the dropout problems in longitudinal clinical trials. The fundamental concepts of the patterns and mechanisms of dropout are discussed. This study presents five general techniques for handling dropout: (1) Deletion methods; (2) Imputation-based methods; (3) Data augmentation methods; (4) Likelihood-based methods; and (5) MNAR-based methods. Under each technique, several methods that are commonly used to deal with dropout are presented, including a review of the existing literature in which we examine the effectiveness of these methods in the analysis of incomplete data. Two application examples are presented to study the potential strengths or weaknesses of some of the methods under certain dropout mechanisms as well as to assess the sensitivity of the modelling assumptions.

Keywords: incomplete longitudinal clinical trials, missing at random (MAR), imputation, weighting methods, sensitivity analysis

Procedia PDF Downloads 409
7223 Wastes of Oil Drilling: Treatment Techniques and Their Effectiveness

Authors: Abbas Hadj Abbas, Hacini Massaoud, Aiad Lahcen

Abstract:

In Hassi-Messoud’s oil industry, the systems which are water based (WBM) are generally used for drilling in the first phase. For the rest of the well, the oil mud systems are employed (OBM). In the field of oil exploration, panoply of chemical products is employed in the drilling fluids formulation. These components of different natures and whose toxicity and biodegradability are of ill-defined parameters are; however, thrown into nature. In addition to the hydrocarbon (HC, such as diesel) which is a major constituent of oil based mud, we also can notice spills as well as a variety of other products and additives on the drilling sites. These wastes are usually stored in places called (crud wastes). These may cause major problems to the ecosystem. To treat these wastes, we have considered two methods which are: solidification/ stabilization (chemical) and thermal. So that we can evaluate the techniques of treatment, a series of analyses are performed on dozens of specimens of wastes before treatment. After that, and on the basis of our analyses of wastes, we opted for diagnostic treatments of pollution before and after solidification and stabilization. Finally, we have done some analyses before and after the thermal treatment to check the efficiency of the methods followed in the study.

Keywords: wastes treatment, the oil pollution, the norms, wastes drilling

Procedia PDF Downloads 286
7222 The Immunology Evolutionary Relationship between Signal Transducer and Activator of Transcription Genes from Three Different Shrimp Species in Response to White Spot Syndrome Virus Infection

Authors: T. C. C. Soo, S. Bhassu

Abstract:

Unlike the common presence of both innate and adaptive immunity in vertebrates, crustaceans, in particular, shrimps, have been discovered to possess only innate immunity. This further emphasizes the importance of innate immunity within shrimps in pathogenic resistance. Under the study of pathogenic immune challenge, different shrimp species actually exhibit varying degrees of immune resistance towards the same pathogen. Furthermore, even within the same shrimp species, different batches of challenged shrimps can have different strengths of immune defence. Several important pathways are activated within shrimps during pathogenic infection. One of them is JAK-STAT pathway that is activated during bacterial, viral and fungal infections by which STAT(Signal Transducer and Activator of Transcription) gene is the core element of the pathway. Based on theory of Central Dogma, the genomic information is transmitted in the order of DNA, RNA and protein. This study is focused in uncovering the important evolutionary patterns present within the DNA (non-coding region) and RNA (coding region). The three shrimp species involved are Macrobrachium rosenbergii, Penaeus monodon and Litopenaeus vannamei which all possess commercial significance. The shrimp species were challenged with a famous penaeid shrimp virus called white spot syndrome virus (WSSV) which can cause serious lethality. Tissue samples were collected during time intervals of 0h, 3h, 6h, 12h, 24h, 36h and 48h. The DNA and RNA samples were then extracted using conventional kits from the hepatopancreas tissue samples. PCR technique together with designed STAT gene conserved primers were utilized for identification of the STAT coding sequences using RNA-converted cDNA samples and subsequent characterization using various bioinformatics approaches including Ramachandran plot, ProtParam and SWISS-MODEL. The varying levels of immune STAT gene activation for the three shrimp species during WSSV infection were confirmed using qRT-PCR technique. For one sample, three biological replicates with three technical replicates each were used for qRT-PCR. On the other hand, DNA samples were important for uncovering the structural variations within the genomic region of STAT gene which would greatly assist in understanding the STAT protein functional variations. The partially-overlapping primers technique was used for the genomic region sequencing. The evolutionary inferences and event predictions were then conducted through the Bayesian Inference method using all the acquired coding and non-coding sequences. This was supplemented by the construction of conventional phylogenetic trees using Maximum likelihood method. The results showed that adaptive evolution caused STAT gene sequence mutations between different shrimp species which led to evolutionary divergence event. Subsequently, the divergent sites were correlated to the differing expressions of STAT gene. Ultimately, this study assists in knowing the shrimp species innate immune variability and selection of disease resistant shrimps for breeding purpose. The deeper understanding of STAT gene evolution from the perspective of both purifying and adaptive approaches not only can provide better immunological insight among shrimp species, but also can be used as a good reference for immunological studies in humans or other model organisms.

Keywords: gene evolution, JAK-STAT pathway, immunology, STAT gene

Procedia PDF Downloads 147
7221 Lamb Waves Wireless Communication in Healthy Plates Using Coherent Demodulation

Authors: Rudy Bahouth, Farouk Benmeddour, Emmanuel Moulin, Jamal Assaad

Abstract:

Guided ultrasonic waves are used in Non-Destructive Testing (NDT) and Structural Health Monitoring (SHM) for inspection and damage detection. Recently, wireless data transmission using ultrasonic waves in solid metallic channels has gained popularity in some industrial applications such as nuclear, aerospace and smart vehicles. The idea is to find a good substitute for electromagnetic waves since they are highly attenuated near metallic components due to Faraday shielding. The proposed solution is to use ultrasonic guided waves such as Lamb waves as an information carrier due to their capability of propagation for long distances. In addition to this, valuable information about the health of the structure could be extracted simultaneously. In this work, the reliable frequency bandwidth for communication is extracted experimentally from dispersion curves at first. Then, an experimental platform for wireless communication using Lamb waves is described and built. After this, coherent demodulation algorithm used in telecommunications is tested for Amplitude Shift Keying, On-Off Keying and Binary Phase Shift Keying modulation techniques. Signal processing parameters such as threshold choice, number of cycles per bit and Bit Rate are optimized. Experimental results are compared based on the average Bit Error Rate. Results have shown high sensitivity to threshold selection for Amplitude Shift Keying and On-Off Keying techniques resulting a Bit Rate decrease. Binary Phase Shift Keying technique shows the highest stability and data rate between all tested modulation techniques.

Keywords: lamb waves communication, wireless communication, coherent demodulation, bit error rate

Procedia PDF Downloads 248
7220 Optimized and Secured Digital Watermarking Using Fuzzy Entropy, Bezier Curve and Visual Cryptography

Authors: R. Rama Kishore, Sunesh

Abstract:

Recent development in the usage of internet for different purposes creates a great threat for the copyright protection of the digital images. Digital watermarking can be used to address the problem. This paper presents detailed review of the different watermarking techniques, latest trends in the field of secured, robust and imperceptible watermarking. It also discusses the different optimization techniques used in the field of watermarking in order to improve the robustness and imperceptibility of the method. Different measures are discussed to evaluate the performance of the watermarking algorithm. At the end, this paper proposes a watermarking algorithm using (2, 2) share visual cryptography and Bezier curve based algorithm to improve the security of the watermark. The proposed method uses fractional transformation to improve the robustness of the copyright protection of the method. The algorithm is optimized using fuzzy entropy for better results.

Keywords: digital watermarking, fractional transform, visual cryptography, Bezier curve, fuzzy entropy

Procedia PDF Downloads 359
7219 Redefining Lesbian Representation: The Evolution of Queer Female Desire in the Films of Céline Sciamma

Authors: Athira Sanjeev

Abstract:

The portrayal of lesbianism in cinema has undergone significant transformations. This study explores the evolving portrayal of lesbianism in the films of French director Céline Sciamma, focusing on how her works have redefined the representation of queer women in contemporary cinema. Through an analysis of Water Lilies (2007), Tomboy (2011), and Portrait of a Lady on Fire (2019), the study investigates the ways in which Sciamma’s films diverge from traditional depictions of lesbianism in film, which often relied on either fetishization or tragedy. Instead, Sciamma adopts a quiet, minimalist style that foregrounds emotional intimacy, offering a more nuanced and authentic portrayal of lesbian relationships. Through a comparative analysis of these films, this research explores the thematic and stylistic progression of Sciamma’s portrayal of lesbianism, highlighting her commitment to centering queer female experiences. The research highlights Sciamma's commitment to focusing on the complexities of desire, identity formation, and the female gaze, particularly through her use of visual storytelling, character development, and narrative silence. Her films emphasize the fluidity of gender and sexuality, portraying lesbianism not as a fixed identity but as part of a broader spectrum of human desire. Sciamma’s nuanced approach resists the traditional marginalization of lesbian characters, allowing them to exist as individuals rather than as plot devices or objects of spectacle. This study draws from queer theory and feminist film criticism to examine how Sciamma challenges conventional heteronormative narratives, prioritizes the female gaze, and subverts traditional cinematic representations of lesbian desire. It also explores how her work contributes to a broader conversation on the representation of queerness in contemporary French cinema, challenging heteronormative paradigms and offering new possibilities for depicting female relationships on screen. By tracing the evolution of her films, this research contributes to broader discussions on LGBTQ+ visibility in cinema and the cultural significance of lesbian representation in contemporary cinema.

Keywords: female gaze, feminist film criticism, lesbianism in cinema, queer theory

Procedia PDF Downloads 3
7218 Quality Assurance as an Educational Development Tool: Case from the European Higher Education

Authors: Maha Mourad

Abstract:

Higher education in any competitive European economy should serve the new information society by increasing the supply of good quality education services and by creating good international brands in the international higher education market. Hence, continuous risk management techniques through higher educational reforms programs became one of the top priorities within the European Union to control the quality of higher education. Risk is higher education is studies by several researchers who agreed that the risk in higher education has a direct influence on continuity of quality education and research contribution. The focus of this research is to highlights the Internal Quality Assurance (IQA) activities in the Polish higher education system as a risk management tool used to control the quality of education. This paper presents a qualitative empirical analysis in 5 different universities in Poland. In addition, it aims to help in finding global practical and create benchmark for policy makers concerning the risk management techniques based on the Polish experience.

Keywords: education development, quality assurance, sustainability, european higher education

Procedia PDF Downloads 461
7217 Latitudinal Impact on Spatial and Temporal Variability of 7Be Activity Concentrations in Surface Air along Europe

Authors: M. A. Hernández-Ceballos, M. Marín-Ferrer, G. Cinelli, L. De Felice, T. Tollefsen, E. Nweke, P. V. Tognoli, S. Vanzo, M. De Cort

Abstract:

This study analyses the latitudinal impact of the spatial and temporal distribution on the cosmogenic isotope 7Be in surface air along Europe. The long-term database of the 6 sampling sites (Ivalo, Helsinki, Berlin, Freiburg, Sevilla and La Laguna), that regularly provide data to the Radioactivity Environmental Monitoring (REM) network managed by the Joint Research Centre (JRC) in Ispra, were used. The selection of the stations was performed attending to different factors, such as 1) heterogeneity in terms of latitude and altitude, and 2) long database coverage. The combination of these two parameters ensures a high degree of representativeness of the results. In the later, the temporal coverage varies between stations, being used in the present study sampling stations with a database more or less continuously from 1984 to 2011. The mean values of 7Be activity concentration presented a spatial distribution value ranging from 2.0 ± 0.9 mBq/m3 (Ivalo, north) to 4.8 ± 1.5 mBq/m3 (La Laguna, south). An increasing gradient with latitude was observed from the north to the south, 0.06 mBq/m3. However, there was no correlation with altitude, since all stations are sited within the atmospheric boundary layer. The analyses of the data indicated a dynamic range of 7Be activity for solar cycle and phase (maximum or minimum), having been observed different impact on stations according to their location. The results indicated a significant seasonal behavior, with the maximum concentrations occurring in the summer and minimum in the winter, although with differences in the values reached and in the month registered. Due to the large heterogeneity in the temporal pattern with which the individual radionuclide analyses were performed in each station, the 7Be monthly index was calculated to normalize the measurements and perform the direct comparison of monthly evolution among stations. Different intensity and evolution of the mean monthly index were observed. The knowledge of the spatial and temporal distribution of this natural radionuclide in the atmosphere is a key parameter for modeling studies of atmospheric processes, which are important phenomena to be taken into account in the case of a nuclear accident.

Keywords: Berilium-7, latitudinal impact in Europe, seasonal and monthly variability, solar cycle

Procedia PDF Downloads 333
7216 Composite Components Manufacturing in SAE Formula Student, a Case Study of AGH Racing

Authors: Hanna Faron, Wojciech Marcinkowski, Daniel Prusak, Władysław Hamiga

Abstract:

Interest in composite materials comes out of two basic premises: their supreme mechanical and strength properties,combined with a small specific weight. Origin and evolution of modern composite materials bonds with development of manufacturing of synthetic fibers, which have begun during Second World War. Main condition to achieve intended properties of composite materials is proper bonding of reinforcing layer with appropriate adhesive in manufacturing process. It is one of the fundamental quality evaluation criterion of fabrication processes.

Keywords: SAE, formula student, composite materials, carbon fiber, Aramid fiber, hot wire cutter

Procedia PDF Downloads 507
7215 The Conservation of the Roman Mosaics in the Museum of Sousse, Tunisia: Between Doctrines and Practices

Authors: Zeineb Yousse, Fakher Kharrat

Abstract:

Mosaic is a part of a broad universal cultural heritage; sometimes it represents a rather essential source for the researches on the everyday life of some of the previous civilizations. Tunisia has one of the finest and largest collections of mosaics in the world, which is essentially exhibited in the Museums of Bardo and Sousse. Restored and reconstituted, they bear witnesses to hard work. Our paper deals with the discipline of conservation of Roman mosaics based on the proceedings of the workshop of the Museum of Sousse. Thus, we highlight two main objectives. In the first place, it is a question of revealing the techniques adopted by professionals to handle mosaics and to which school of conservation these techniques belong. In the second place, we are going to interpret the works initiated to preserve the archaeological heritage in order to protect it in present time and transmit it to future generations. To this end, we paid attention to four Roman mosaics currently exhibited in the Museum of Sousse. These Mosaics show different voids or gaps at the level of their surfaces and the method used to fill these gaps seems to be interesting to analyze. These mosaics are known under the names of: Orpheus Charming the Animals, Gladiator and Bears, Stud farm of Sorothus and finally Head of Medusa. The study on the conservation passes through two chained phases. We start with a small historical overview in order to gather information related to the original location, the date of its composition as well as the description of its image. Afterward, the intervention process is analyzed by handling three complementary elements which are: diagnosis of the existing state, the study of the medium processing and the study of the processing of the tesselatum surface which includes the pictorial composition of the mosaic. Furthermore, we have implemented an evaluation matrix with six operating principles allowing the assessment of the appropriateness of the intervention. These principles are the following: minimal intervention, reversibility, compatibility, visibility, durability, authenticity and enhancement. Various accumulated outcomes are pointing out the techniques used to fill the gaps as well as the level of compliance with the principles of conservation. Accordingly, the conservation of mosaics in Tunisia is a practice that combines various techniques without really arguing about the choice of a particular theory.

Keywords: conservation, matrix, museum of Sousse, operating particular theory, principles, Roman mosaics

Procedia PDF Downloads 325
7214 Implementation of Computer-Based Technologies into Foreign Language Teaching Process

Authors: Golovchun Aleftina, Dabyltayeva Raikhan

Abstract:

Nowadays, in the world of widely developing cross-cultural interactions and rapidly changing demands of the global labor market, foreign language teaching and learning has taken a special role not only in school education but also in everyday life. Cognitive Lingua-Cultural Methodology of Foreign Language Teaching originated in Kazakhstan brings a communicative approach to the forefront in foreign language teaching that gives raise a variety of techniques to make the language learning a real communication. One of these techniques is Computer Assisted Language Learning. In our article, we aim to: demonstrate what learning benefits students are likely to get by teachers having implemented computer-based technologies into foreign language teaching process; prove that technology-based classroom serves as the best tool for interactive and efficient language learning; give examples of classroom sufficient organization with computer-based activities.

Keywords: computer assisted language learning, learning benefits, foreign language teaching process, implementation, communicative approach

Procedia PDF Downloads 467
7213 Zinc (II) Complexes of Nitrogen, Oxygen and Sulfur Coordination Modes: Synthesis, Spectral Studies and Antibacterial Activities

Authors: Ayodele Odularu, Peter Ajibade, Albert Bolhuis

Abstract:

This study aimed at assessing the antibacterial activities of four zinc (II) complexes. Zinc (II) complexes of nitrogen, oxygen and sulfur coordination modes were synthesized using direct substitution reaction. The characterization techniques involved physicochemical properties (molar conductivity) and spectroscopic techniques. The molar conductivity gave the non-electrolytic nature of zinc (II) complexes. The spectral studies of zinc (II) complexes were done using electronic spectra (UV-Vis) and Fourier Transform Infra-red Spectroscopy (FT-IR). Spectral data from the spectroscopic studies confirmed the coordination of the mixed ligands with zinc (II) ion. The antibacterial activities of zinc(II) complexes of were all in supportive of Overtone’s concept and Tweedy’s theory of chelation for bacterial strains of S. aureus MRSA252 and E coli MC4100 because the zones of inhibition were greater than the corresponding ligands. In summary, all zinc (II) complexes of ZEPY, ZE1PH, ZE1PY and ZE135PY all have potentials for antibacterial activities.

Keywords: antibacterial activities, spectral studies, syntheses, zinc(II) complexes

Procedia PDF Downloads 271
7212 Digitizing Masterpieces in Italian Museums: Techniques, Challenges and Consequences from Giotto to Caravaggio

Authors: Ginevra Addis

Abstract:

The possibility of reproducing physical artifacts in a digital format is one of the opportunities offered by the technological advancements in information and communication most frequently promoted by museums. Indeed, the study and conservation of our cultural heritage have seen significant advancement due to the three-dimensional acquisition and modeling technology. A variety of laser scanning systems has been developed, based either on optical triangulation or on time-of-flight measurement, capable of producing digital 3D images of complex structures with high resolution and accuracy. It is necessary, however, to explore the challenges and opportunities that this practice brings within museums. The purpose of this paper is to understand what change is introduced by digital techniques in those museums that are hosting digital masterpieces. The methodology used will investigate three distinguished Italian exhibitions, related to the territory of Milan, trying to analyze the following issues about museum practices: 1) how digitizing art masterpieces increases the number of visitors; 2) what the need that calls for the digitization of artworks; 3) which techniques are most used; 4) what the setting is; 5) the consequences of a non-publication of hard copies of catalogues; 6) envision of these practices in the future. Findings will show how interconnection plays an important role in rebuilding a collection spread all over the world. Secondly how digital artwork duplication and extension of reality entail new forms of accessibility. Thirdly, that collection and preservation through digitization of images have both a social and educational mission. Fourthly, that convergence of the properties of different media (such as web, radio) is key to encourage people to get actively involved in digital exhibitions. The present analysis will suggest further research that should create museum models and interaction spaces that act as catalysts for innovation.

Keywords: digital masterpieces, education, interconnection, Italian museums, preservation

Procedia PDF Downloads 172
7211 Identification of Author and Reviewer from Single and Double Blind Paper

Authors: Jatinderkumar R. Saini, Nikita. R. Sonthalia, Khushbu. A. Dodiya

Abstract:

Research leads to development of science and technology and hence to the betterment of humankind. Journals and conferences provide a platform to receive large number of research papers for publications and presentations before the expert and scientific community. In order to assure quality of such papers, they are also sent to reviewers for their comments. In order to maintain good ethical standards, the research papers are sent to reviewers in such a way that they do not know each other’s identity. This technique is called double-blind review process. It is called single-blind review process, if identity of any one party (generally authors) is disclosed to the other. This paper presents the techniques by which identity of author as well as reviewer could be made out even through double-blind review process. It is proposed that the characteristics and techniques presented here will help journals and conferences in assuring intentional or unintentional disclosure of identity revealing information by either party to the other.

Keywords: author, conference, double blind paper, journal, reviewer, single blind paper

Procedia PDF Downloads 346
7210 Nickel-Titanium Endodontic Instruments: The Evolution

Authors: Fadwa Chtioui

Abstract:

The field of endodontics has witnessed constant advancements in treatment methods and instrument design, particularly for nickel-titanium (NiTi) files. Despite these developments, it remains crucial for clinicians to have a thorough understanding of their characteristics and behavior to choose the appropriate instruments for different clinical and anatomical situations. Research Aim: The aim of this work is to study and discuss the impact of heat treatment developments on the properties of endodontic NiTi files, with the ultimate goal of providing ways to adapt these files to the anatomical features of dental roots. Methodology: This study involves both clinical cases and extensive bibliographic research. Findings: The study highlights the importance of heat treatment in the design and manufacture of NiTi files, as it significantly affects their physical and mechanical properties. It also provides insights into the ways in which NiTi files can be adapted to the complex geometries of dental roots for more effective endodontic treatments. Theoretical Importance: Theoretical implications of this study include a better understanding of the relationship between heat treatment and the properties of NiTi files, leading to improvements in both their manufacturing methods and clinical applications. Data Collection and Analysis Procedures: The data for this study was collected through clinical cases and an extensive review of relevant literature. Analysis was performed through qualitative and quantitative methods, examining the impact of heat treatment on the physical and mechanical properties of NiTi files. Questions Addressed: This study aims to answer questions concerning the properties of NiTi files and the impact of heat treatment on their behavior. It also seeks to examine ways in which these files can be adapted to complex dental root geometries for more effective endodontic treatments. Conclusion: In conclusion, this study emphasizes the importance of heat treatment in the design and manufacture of NiTi files, as it significantly impacts their physical and mechanical properties. Further research is necessary to explore additional methods for adapting NiTi files to the unique anatomies of dental roots to improve endodontic treatments further. Ultimately, this study provides valuable insights into the continued evolution of endodontic treatment and instrument design.

Keywords: endodontic files, nickel-titanium, tooth anatomy, heat treatment

Procedia PDF Downloads 58
7209 Performance Evaluation of Various Segmentation Techniques on MRI of Brain Tissue

Authors: U.V. Suryawanshi, S.S. Chowhan, U.V Kulkarni

Abstract:

Accuracy of segmentation methods is of great importance in brain image analysis. Tissue classification in Magnetic Resonance brain images (MRI) is an important issue in the analysis of several brain dementias. This paper portraits performance of segmentation techniques that are used on Brain MRI. A large variety of algorithms for segmentation of Brain MRI has been developed. The objective of this paper is to perform a segmentation process on MR images of the human brain, using Fuzzy c-means (FCM), Kernel based Fuzzy c-means clustering (KFCM), Spatial Fuzzy c-means (SFCM) and Improved Fuzzy c-means (IFCM). The review covers imaging modalities, MRI and methods for noise reduction and segmentation approaches. All methods are applied on MRI brain images which are degraded by salt-pepper noise demonstrate that the IFCM algorithm performs more robust to noise than the standard FCM algorithm. We conclude with a discussion on the trend of future research in brain segmentation and changing norms in IFCM for better results.

Keywords: image segmentation, preprocessing, MRI, FCM, KFCM, SFCM, IFCM

Procedia PDF Downloads 325
7208 Design and Construction Validation of Pile Performance through High Strain Pile Dynamic Tests for both Contiguous Flight Auger and Drilled Displacement Piles

Authors: S. Pirrello

Abstract:

Sydney’s booming real estate market has pushed property developers to invest in historically “no-go” areas, which were previously too expensive to develop. These areas are usually near rivers where the sites are underlain by deep alluvial and estuarine sediments. In these ground conditions, conventional bored pile techniques are often not competitive. Contiguous Flight Auger (CFA) and Drilled Displacement (DD) Piles techniques are on the other hand suitable for these ground conditions. This paper deals with the design and construction challenges encountered with these piling techniques for a series of high-rise towers in Sydney’s West. The advantages of DD over CFA piles such as reduced overall spoil with substantial cost savings and achievable rock sockets in medium strength bedrock are discussed. Design performances were assessed with PIGLET. Pile performances are validated in two stages, during constructions with the interpretation of real-time data from the piling rigs’ on-board computer data, and after construction with analyses of results from high strain pile dynamic testing (PDA). Results are then presented and discussed. High Strain testing data are presented as Case Pile Wave Analysis Program (CAPWAP) analyses.

Keywords: contiguous flight auger (CFA) , DEFPIG, case pile wave analysis program (CAPWAP), drilled displacement piles (DD), pile dynamic testing (PDA), PIGLET, PLAXIS, repute, pile performance

Procedia PDF Downloads 277
7207 A Fully-Automated Disturbance Analysis Vision for the Smart Grid Based on Smart Switch Data

Authors: Bernardo Cedano, Ahmed H. Eltom, Bob Hay, Jim Glass, Raga Ahmed

Abstract:

The deployment of smart grid devices such as smart meters and smart switches (SS) supported by a reliable and fast communications system makes automated distribution possible, and thus, provides great benefits to electric power consumers and providers alike. However, more research is needed before the full utility of smart switch data is realized. This paper presents new automated switching techniques using SS within the electric power grid. A concise background of the SS is provided, and operational examples are shown. Organization and presentation of data obtained from SS are shown in the context of the future goal of total automation of the distribution network. The description of application techniques, the examples of success with SS, and the vision outlined in this paper serve to motivate future research pertinent to disturbance analysis automation.

Keywords: disturbance automation, electric power grid, smart grid, smart switches

Procedia PDF Downloads 303
7206 Evaluation of Short-Term Load Forecasting Techniques Applied for Smart Micro-Grids

Authors: Xiaolei Hu, Enrico Ferrera, Riccardo Tomasi, Claudio Pastrone

Abstract:

Load Forecasting plays a key role in making today's and future's Smart Energy Grids sustainable and reliable. Accurate power consumption prediction allows utilities to organize in advance their resources or to execute Demand Response strategies more effectively, which enables several features such as higher sustainability, better quality of service, and affordable electricity tariffs. It is easy yet effective to apply Load Forecasting at larger geographic scale, i.e. Smart Micro Grids, wherein the lower available grid flexibility makes accurate prediction more critical in Demand Response applications. This paper analyses the application of short-term load forecasting in a concrete scenario, proposed within the EU-funded GreenCom project, which collect load data from single loads and households belonging to a Smart Micro Grid. Three short-term load forecasting techniques, i.e. linear regression, artificial neural networks, and radial basis function network, are considered, compared, and evaluated through absolute forecast errors and training time. The influence of weather conditions in Load Forecasting is also evaluated. A new definition of Gain is introduced in this paper, which innovatively serves as an indicator of short-term prediction capabilities of time spam consistency. Two models, 24- and 1-hour-ahead forecasting, are built to comprehensively compare these three techniques.

Keywords: short-term load forecasting, smart micro grid, linear regression, artificial neural networks, radial basis function network, gain

Procedia PDF Downloads 459
7205 Modern Spectrum Sensing Techniques for Cognitive Radio Networks: Practical Implementation and Performance Evaluation

Authors: Antoni Ivanov, Nikolay Dandanov, Nicole Christoff, Vladimir Poulkov

Abstract:

Spectrum underutilization has made cognitive radio a promising technology both for current and future telecommunications. This is due to the ability to exploit the unused spectrum in the bands dedicated to other wireless communication systems, and thus, increase their occupancy. The essential function, which allows the cognitive radio device to perceive the occupancy of the spectrum, is spectrum sensing. In this paper, the performance of modern adaptations of the four most widely used spectrum sensing techniques namely, energy detection (ED), cyclostationary feature detection (CSFD), matched filter (MF) and eigenvalues-based detection (EBD) is compared. The implementation has been accomplished through the PlutoSDR hardware platform and the GNU Radio software package in very low Signal-to-Noise Ratio (SNR) conditions. The optimal detection performance of the examined methods in a realistic implementation-oriented model is found for the common relevant parameters (number of observed samples, sensing time and required probability of false alarm).

Keywords: cognitive radio, dynamic spectrum access, GNU Radio, spectrum sensing

Procedia PDF Downloads 238
7204 External Sulphate Attack: Advanced Testing and Performance Specifications

Authors: G. Massaad, E. Roziere, A. Loukili, L. Izoret

Abstract:

Based on the monitoring of mass, hydrostatic weighing, and the amount of leached OH- we deduced the nature of leached and precipitated minerals, the amount of lost aggregates and the evolution of porosity and cracking during the sulphate attack. Using these information, we are able to draw the volume / mass changes brought by mineralogical variations and cracking of the cement matrix. Then we defined a new performance indicator, the averaged density, capable to resume along the test of sulphate attack the occurred physicochemical variation occurred in the cementitious matrix and then highlight.

Keywords: monitoring strategy, performance indicator, sulphate attack, mechanism of degradation

Procedia PDF Downloads 317
7203 Intrusion Detection Using Dual Artificial Techniques

Authors: Rana I. Abdulghani, Amera I. Melhum

Abstract:

With the abnormal growth of the usage of computers over networks and under the consideration or agreement of most of the computer security experts who said that the goal of building a secure system is never achieved effectively, all these points led to the design of the intrusion detection systems(IDS). This research adopts a comparison between two techniques for network intrusion detection, The first one used the (Particles Swarm Optimization) that fall within the field (Swarm Intelligence). In this Act, the algorithm Enhanced for the purpose of obtaining the minimum error rate by amending the cluster centers when better fitness function is found through the training stages. Results show that this modification gives more efficient exploration of the original algorithm. The second algorithm used a (Back propagation NN) algorithm. Finally a comparison between the results of two methods used were based on (NSL_KDD) data sets for the construction and evaluation of intrusion detection systems. This research is only interested in clustering the two categories (Normal and Abnormal) for the given connection records. Practices experiments result in intrude detection rate (99.183818%) for EPSO and intrude detection rate (69.446416%) for BP neural network.

Keywords: IDS, SI, BP, NSL_KDD, PSO

Procedia PDF Downloads 377
7202 Development of National Scale Hydropower Resource Assessment Scheme Using SWAT and Geospatial Techniques

Authors: Rowane May A. Fesalbon, Greyland C. Agno, Jodel L. Cuasay, Dindo A. Malonzo, Ma. Rosario Concepcion O. Ang

Abstract:

The Department of Energy of the Republic of the Philippines estimates that the country’s energy reserves for 2015 are dwindling– observed in the rotating power outages in several localities. To aid in the energy crisis, a national hydropower resource assessment scheme is developed. Hydropower is a resource that is derived from flowing water and difference in elevation. It is a renewable energy resource that is deemed abundant in the Philippines – being an archipelagic country that is rich in bodies of water and water resources. The objectives of this study is to develop a methodology for a national hydropower resource assessment using hydrologic modeling and geospatial techniques in order to generate resource maps for future reference and use of the government and other stakeholders. The methodology developed for this purpose is focused on two models – the implementation of the Soil and Water Assessment Tool (SWAT) for the river discharge and the use of geospatial techniques to analyze the topography and obtain the head, and generate the theoretical hydropower potential sites. The methodology is highly coupled with Geographic Information Systems to maximize the use of geodatabases and the spatial significance of the determined sites. The hydrologic model used in this workflow is SWAT integrated in the GIS software ArcGIS. The head is determined by a developed algorithm that utilizes a Synthetic Aperture Radar (SAR)-derived digital elevation model (DEM) which has a resolution of 10-meters. The initial results of the developed workflow indicate hydropower potential in the river reaches ranging from pico (less than 5 kW) to mini (1-3 MW) theoretical potential.

Keywords: ArcSWAT, renewable energy, hydrologic model, hydropower, GIS

Procedia PDF Downloads 307
7201 The Journey of a Malicious HTTP Request

Authors: M. Mansouri, P. Jaklitsch, E. Teiniker

Abstract:

SQL injection on web applications is a very popular kind of attack. There are mechanisms such as intrusion detection systems in order to detect this attack. These strategies often rely on techniques implemented at high layers of the application but do not consider the low level of system calls. The problem of only considering the high level perspective is that an attacker can circumvent the detection tools using certain techniques such as URL encoding. One technique currently used for detecting low-level attacks on privileged processes is the tracing of system calls. System calls act as a single gate to the Operating System (OS) kernel; they allow catching the critical data at an appropriate level of detail. Our basic assumption is that any type of application, be it a system service, utility program or Web application, “speaks” the language of system calls when having a conversation with the OS kernel. At this level we can see the actual attack while it is happening. We conduct an experiment in order to demonstrate the suitability of system call analysis for detecting SQL injection. We are able to detect the attack. Therefore we conclude that system calls are not only powerful in detecting low-level attacks but that they also enable us to detect high-level attacks such as SQL injection.

Keywords: Linux system calls, web attack detection, interception, SQL

Procedia PDF Downloads 352