Search results for: man in middle attack
1079 Time-Domain Expressions for Bridge Self-Excited Aerodynamic Forces by Modified Particle Swarm Optimizer
Authors: Hao-Su Liu, Jun-Qing Lei
Abstract:
This study introduces the theory of modified particle swarm optimizer and its application in time-domain expressions for bridge self-excited aerodynamic forces. Based on the indicial function expression and the rational function expression in time-domain expression for bridge self-excited aerodynamic forces, the characteristics of the two methods, i.e. the modified particle swarm optimizer and conventional search method, are compared in flutter derivatives’ fitting process. Theoretical analysis and numerical results indicate that adopting whether the indicial function expression or the rational function expression, the fitting flutter derivatives obtained by modified particle swarm optimizer have better goodness of fit with ones obtained from experiment. As to the flutter derivatives which have higher nonlinearity, the self-excited aerodynamic forces, using the flutter derivatives obtained through modified particle swarm optimizer fitting process, are much closer to the ones simulated by the experimental. The modified particle swarm optimizer was used to recognize the parameters of time-domain expressions for flutter derivatives of an actual long-span highway-railway truss bridge with double decks at the wind attack angle of 0°, -3° and +3°. It was found that this method could solve the bounded problems of attenuation coefficient effectively in conventional search method, and had the ability of searching in unboundedly area. Accordingly, this study provides a method for engineering industry to frequently and efficiently obtain the time-domain expressions for bridge self-excited aerodynamic forces.Keywords: time-domain expressions, bridge self-excited aerodynamic forces, modified particle swarm optimizer, long-span highway-railway truss bridge
Procedia PDF Downloads 3141078 Studying the Moisture Sources and the Stable Isotope Characteristic of Moisture in Northern Khorasan Province, North-Eastern Iran
Authors: Mojtaba Heydarizad, Hamid Ghalibaf Mohammadabadi
Abstract:
Iran is a semi-arid and arid country in south-western Asia in the Middle East facing intense climatological drought from the early times. Therefore, studying the precipitation events and the moisture sources and air masses causing precipitation has great importance in this region. In this study, the moisture sources and stable isotope content of precipitation moisture in three main events in 2015 have been studied in North-Eastern Iran. HYSPLIT model backward trajectories showed that the Caspian Sea and the mixture of the Caspian and Mediterranean Seas are dominant moisture sources for the studied events. This showed the role of cP (Siberian) and Mediterranean (MedT) air masses. Stable isotope studies showed that precipitation events originated from the Caspian Sea with lower Sea Surface Temperature (SST) have more depleted isotope values. However, precipitation events sourced from the mixture of the Caspian and the Mediterranean Seas (with higher SST) showed more enriched isotope values.Keywords: HYSPLIT, Iran, Northern Khorasan, stable isotopes
Procedia PDF Downloads 1321077 Repeatable Scalable Business Models: Can Innovation Drive an Entrepreneurs Un-Validated Business Model?
Authors: Paul Ojeaga
Abstract:
Can the level of innovation use drive un-validated business models across regions? To what extent does industrial sector attractiveness drive firm’s success across regions at the time of start-up? This study examines the role of innovation on start-up success in six regions of the world (namely Sub Saharan Africa, the Middle East and North Africa, Latin America, South East Asia Pacific, the European Union and the United States representing North America) using macroeconomic variables. While there have been studies using firm level data, results from such studies are not suitable for national policy decisions. The need to drive a regional innovation policy also begs for an answer, therefore providing room for this study. Results using dynamic panel estimation show that innovation counts in the early infancy stage of new business life cycle. The results are robust even after controlling for time fixed effects and the study present variance-covariance estimation robust standard errors.Keywords: industrial economics, un-validated business models, scalable models, entrepreneurship
Procedia PDF Downloads 2831076 Rhizosphere Microbiome Involvement in the Natural Suppression of Soybean Cyst Nematode in Disease Suppressive Soil
Authors: M. Imran Hamid, Muzammil Hussain, Yunpeng Wu, Meichun Xiang, Xingzhong Liu
Abstract:
The rhizosphere microbiome elucidate multiple functioning in the soil suppressiveness against plant pathogens. Soybean rhizosphere microbial communities may involve in the natural suppression of soybean cyst nematode (SCN) populations in disease suppressive soils. To explore these ecological mechanisms of microbes, a long term monoculture suppressive soil were taken into account for further investigation to test the disease suppressive ability by using different treatments. The designed treatments are as, i) suppressive soil (S), ii) conducive soil (C), iii) conducive soil mixed with 10% (w/w) suppressive soil (CS), iv) suppressive soil treated at 80°C for 1 hr (S80), and v) suppressive soil treated with formalin (SF). By using an ultra-high-throughput sequencing approach, we identified the key bacterial and fungal taxa involved in SCN suppression. The Phylum-level investigation of bacteria revealed that Actinobacteria, Bacteroidetes, and Proteobacteria in the rhizosphere soil of soybean seedlings were more abundant in the suppressive soil than in the conducive soil. The phylum-level analysis of fungi in rhizosphere soil indicated that relative abundance of Ascomycota was higher in suppressive soil than in the conducive soil, where Basidiomycota was more abundant. Transferring suppressive soil to conducive soil increased the population of Ascomycota in the conducive soil by lowering the populations of Basidiomycota. The genera, such as, Pochonia, Purpureocillium, Fusarium, Stachybotrys that have been well documented as bio-control agents of plant nematodes were far more in the disease suppressive soils. Our results suggested that the plants engage a subset of functional microbial groups in the rhizosphere for initial defense upon nematode attack and protect the plant roots later on by nematodes to response for suppression of SCN in disease-suppressive soils.Keywords: disease suppressive soil, high-throughput sequencing, rhizosphere microbiome, soybean cyst nematode
Procedia PDF Downloads 1531075 PMEL Marker Identification of Dark and Light Feather Colours in Local Canary
Authors: Mudawamah Mudawamah, Muhammad Z. Fadli, Gatot Ciptadi, Aulanni’am
Abstract:
Canary breeders have spread throughout Indonesian regions for the low-middle society and become an income source for them. The interesting phenomenon of the canary market is the feather colours become one of determining factor for the price. The advantages of this research were contributed to the molecular database as a base of selection and mating for the Indonesia canary breeder. The research method was experiment with the genome obtained from canary blood isolation. The genome did the PCR amplification with PMEL marker followed by sequencing. Canaries were used 24 heads of light and dark colour feathers. Research data analyses used BioEdit and Network 4.6.0.0 software. The results showed that all samples were amplification with PMEL gene with 500 bp fragment length. In base sequence of 40 was found Cytosine(C) in the light colour canaries, while the dark colour canaries was obtained Thymine (T) in same base sequence. Sequence results had 286-415 bp fragment and 10 haplotypes. The conclusions were the PMEL gene (gene of white pigment) was likely to be used PMEL gene to detect molecular genetic variation of dark and light colour feather.Keywords: canary, haplotype, PMEL, sequence
Procedia PDF Downloads 2371074 Numerical and Experimental Analysis of Temperature Distribution and Electric Field in a Natural Rubber Glove during Microwave Heating
Authors: U. Narumitbowonkul, P. Keangin, P. Rattanadecho
Abstract:
Both numerical and experimental investigation of the temperature distribution and electric field in a natural rubber glove (NRG) during microwave heating are studied. A three-dimensional model of NRG and microwave oven are considered in this work. The influences of position, heating time and rotation angle of NRG on temperature distribution and electric field are presented in details. The coupled equations of electromagnetic wave propagation and heat transfer are solved using the finite element method (FEM). The numerical model is validated with an experimental study at a frequency of 2.45 GHz. The results show that the numerical results closely match the experimental results. Furthermore, it is found that the temperature distribution and electric field increases with increasing heating time. The hot spot zone appears in NRG at the tip of middle finger while the maximum temperature occurs in case of rotation angle of NRG = 60 degree. This investigation provides the essential aspects for a fundamental understanding of heat transport of NRG using microwave energy in industry.Keywords: electric field, finite element method, microwave energy, natural rubber glove
Procedia PDF Downloads 2631073 Finite Element Simulation of Four Point Bending of Laminated Veneer Lumber (LVL) Arch
Authors: Eliska Smidova, Petr Kabele
Abstract:
This paper describes non-linear finite element simulation of laminated veneer lumber (LVL) under tensile and shear loads that induce cracking along fibers. For this purpose, we use 2D homogeneous orthotropic constitutive model of tensile and shear fracture in timber that has been recently developed and implemented into ATENA® finite element software by the authors. The model captures (i) material orthotropy for small deformations in both linear and non-linear range, (ii) elastic behavior until anisotropic failure criterion is fulfilled, (iii) inelastic behavior after failure criterion is satisfied, (iv) different post-failure response for cracks along and across the grain, (v) unloading/reloading behavior. The post-cracking response is treated by fixed smeared crack model where Reinhardt-Hordijk function is used. The model requires in total 14 input parameters that can be obtained from standard tests, off-axis test results and iterative numerical simulation of compact tension (CT) or compact tension-shear (CTS) test. New engineered timber composites, such as laminated veneer lumber (LVL), offer improved structural parameters compared to sawn timber. LVL is manufactured by laminating 3 mm thick wood veneers aligned in one direction using water-resistant adhesives (e.g. polyurethane). Thus, 3 main grain directions, namely longitudinal (L), tangential (T), and radial (R), are observed within the layered LVL product. The core of this work consists in 3 numerical simulations of experiments where Radiata Pine LVL and Yellow Poplar LVL were involved. The first analysis deals with calibration and validation of the proposed model through off-axis tensile test (at a load-grain angle of 0°, 10°, 45°, and 90°) and CTS test (at a load-grain angle of 30°, 60°, and 90°), both of which were conducted for Radiata Pine LVL. The second finite element simulation reproduces load-CMOD curve of compact tension (CT) test of Yellow Poplar with the aim of obtaining cohesive law parameters to be used as an input in the third finite element analysis. That is four point bending test of small-size arch of 780 mm span that is made of Yellow Poplar LVL. The arch is designed with a through crack between two middle layers in the crown. Curved laminated beams are exposed to high radial tensile stress compared to timber strength in radial tension in the crown area. Let us note that in this case the latter parameter stands for tensile strength in perpendicular direction with respect to the grain. Standard tests deliver most of the relevant input data whereas traction-separation law for crack along the grain can be obtained partly by inverse analysis of compact tension (CT) test or compact tension-shear test (CTS). The initial crack was modeled as a narrow gap separating two layers in the middle the arch crown. Calculated load-deflection curve is in good agreement with the experimental ones. Furthermore, crack pattern given by numerical simulation coincides with the most important observed crack paths.Keywords: compact tension (CT) test, compact tension shear (CTS) test, fixed smeared crack model, four point bending test, laminated arch, laminated veneer lumber LVL, off-axis test, orthotropic elasticity, orthotropic fracture criterion, Radiata Pine LVL, traction-separation law, yellow poplar LVL, 2D constitutive model
Procedia PDF Downloads 2901072 Modeling of Steady State Creep in Thick-Walled Cylinders under Internal Pressure
Authors: Tejeet Singh, Ishavneet Singh
Abstract:
The present study focused on carrying out the creep analysis in an isotropic thick-walled composite cylindrical pressure vessel composed of aluminum matrix reinforced with silicon-carbide in particulate form. The creep behavior of the composite material has been described by the threshold stress based creep law. The values of stress exponent appearing in the creep law were selected as 3, 5 and 8. The constitutive equations were developed using well known von-Mises yield criteria. Models were developed to find out the distributions of creep stress and strain rate in thick-walled composite cylindrical pressure vessels under internal pressure. In order to obtain the stress distributions in the cylinder, the equilibrium equation of the continuum mechanics and the constitutive equations are solved together. It was observed that the radial stress, tangential stress and axial stress increases along with the radial distance. The cross-over was also obtained almost at the middle region of cylindrical vessel for tangential and axial stress for different values of stress exponent. The strain rates were also decreasing in nature along the entire radius.Keywords: steady state creep, composite, cylinder, pressure
Procedia PDF Downloads 4191071 The Security Trade-Offs in Resource Constrained Nodes for IoT Application
Authors: Sultan Alharby, Nick Harris, Alex Weddell, Jeff Reeve
Abstract:
The concept of the Internet of Things (IoT) has received much attention over the last five years. It is predicted that the IoT will influence every aspect of our lifestyles in the near future. Wireless Sensor Networks are one of the key enablers of the operation of IoTs, allowing data to be collected from the surrounding environment. However, due to limited resources, nature of deployment and unattended operation, a WSN is vulnerable to various types of attack. Security is paramount for reliable and safe communication between IoT embedded devices, but it does, however, come at a cost to resources. Nodes are usually equipped with small batteries, which makes energy conservation crucial to IoT devices. Nevertheless, security cost in terms of energy consumption has not been studied sufficiently. Previous research has used a security specification of 802.15.4 for IoT applications, but the energy cost of each security level and the impact on quality of services (QoS) parameters remain unknown. This research focuses on the cost of security at the IoT media access control (MAC) layer. It begins by studying the energy consumption of IEEE 802.15.4 security levels, which is followed by an evaluation for the impact of security on data latency and throughput, and then presents the impact of transmission power on security overhead, and finally shows the effects of security on memory footprint. The results show that security overhead in terms of energy consumption with a payload of 24 bytes fluctuates between 31.5% at minimum level over non-secure packets and 60.4% at the top security level of 802.15.4 security specification. Also, it shows that security cost has less impact at longer packet lengths, and more with smaller packet size. In addition, the results depicts a significant impact on data latency and throughput. Overall, maximum authentication length decreases throughput by almost 53%, and encryption and authentication together by almost 62%.Keywords: energy consumption, IEEE 802.15.4, IoT security, security cost evaluation
Procedia PDF Downloads 1681070 Fast Aerodynamic Evaluation of Transport Aircraft in Early Phases
Authors: Xavier Bertrand, Alexandre Cayrel
Abstract:
The early phase of an aircraft development is instrumental as it really drives the potential of a new concept. Any weakness in the high-level design (wing planform, moveable surfaces layout etc.) will be extremely difficult and expensive to recover later in the aircraft development process. Aerodynamic evaluation in this very early development phase is driven by two main criteria: a short lead-time to allow quick iterations of the geometrical design, and a high quality of the calculations to get an accurate & reliable assessment of the current status. These two criteria are usually quite contradictory. Actually, short lead time of a couple of hours from end-to-end can be obtained with very simple tools (semi-empirical methods for instance) although their accuracy is limited, whereas higher quality calculations require heavier/more complex tools, which obviously need more complex inputs as well, and a significantly longer lead time. At this point, the choice has to be done between accuracy and lead-time. A brand new approach has been developed within Airbus, aiming at obtaining quickly high quality evaluations of the aerodynamic of an aircraft. This methodology is based on a joint use of Surrogate Modelling and a lifting line code. The Surrogate Modelling is used to get the wing sections characteristics (e.g. lift coefficient vs. angle of attack), whatever the airfoil geometry, the status of the moveable surfaces (aileron/spoilers) or the high-lift devices deployment. From these characteristics, the lifting line code is used to get the 3D effects on the wing whatever the flow conditions (low/high Mach numbers etc.). This methodology has been applied successfully to a concept of medium range aircraft.Keywords: aerodynamics, lifting line, surrogate model, CFD
Procedia PDF Downloads 3591069 Congestion Mitigation on an Urban Arterial through Infrastructure Intervention
Authors: Attiq Ur Rahman Dogar, Sohaib Ishaq
Abstract:
Pakistan had experienced rapid motorization in the last decade. Due to the soft leasing schemes of banks and increase in average household income, even the middle class can now afford cars. The public transit system is inadequate and sparse. Due to these reasons, traffic demand on urban arterials has increased manifold. Poor urban transit planning and aging transportation systems have resulted in traffic congestion. The focus of this study is to improve traffic flow on a section of N-5 passing through the Rawalpindi downtown. Present efforts aim to carry out the analysis of traffic conditions on this section and to investigate the impact of traffic signal co-ordination on travel time. In addition to signal co-ordination, we also examined the effect of different infrastructure improvements on the travel time. After the economic analysis of alternatives and discussions, the improvement plan for Rawalpindi downtown urban arterial section is proposed for implementation.Keywords: signal coordination, infrastructure intervention, infrastructure improvement, cycle length, fuel consumption cost, travel time cost, economic analysis, travel time, Rawalpindi, Pakistan, traffic signals
Procedia PDF Downloads 3151068 Acoustic Characteristics of Ḫijaiyaḫ Letters Pronunciation by Indonesian Native Speaker
Authors: Romi Hardiyansyah, Raden Sugeng Joko Sarwono, Agus Samsi
Abstract:
Indonesian people have a mother language but not Arabic. Meanwhile, they must be able to pronounce the Arabic because Islam is the biggest religion in Indonesia. Arabic is composed by ḫijaiyaḫ letters which has its own pronunciation. Sound production process in humans can be divided into three physiological processes, namely: the formation of airflow from the lungs, the change in airflow from the lungs into the sound, and articulation (the modulation/sound setting into a specific sound). Ḫijaiyaḫ letters has its own articulation, some of which seem strange for most people in Indonesia. Those letters come out from the middle and upper throat so that the letters has its own acoustic characteristics. Acoustic characteristics of voice can be observed by source-filter approach that has parameters: pitch, formant, and formant bandwidth. Pitch is the basic tone in every human being. Formant is the resonance frequency of the human voice. Formant bandwidth is the time-width of a formant. After recording the sound from 21 subjects, data is processed by software Praat version 5.3.39. The analysis showed that each pronunciation, syakal (vowel changer), and the place of discharge letters has the same timbre which are determined by third and fourth formant.Keywords: ḫijaiyaḫ, articulation, pitch, formant, formant bandwidth, timbre
Procedia PDF Downloads 3961067 Engineering the Human Mind: Social Engineering Attack Using Kali Linux
Authors: Joy Winston James, Abdul Kadher Jilani
Abstract:
This review article provides a comprehensive overview of social engineering attacks, specifically those executed through the Kali Linux operating system. It aims to present an in-depth analysis of the background and importance of social engineering in cybersecurity, the tools, and techniques used in these attacks, real-world case studies that demonstrate their effectiveness, and ethical considerations that need to be taken into account while using them. The article highlights the Kali Linux tools that are commonly used in social engineering attacks, including SET, Metasploit, and BeEF, and discusses techniques such as phishing, pretexting, and baiting that are crucial in conducting successful social engineering attacks. It further explores real-world case studies that demonstrate the effectiveness of these techniques, emphasizing the importance of implementing effective countermeasures to reduce the risk of successful social engineering attacks. Moreover, the article sheds light on ethical considerations that need to be taken into account while using social engineering tools, emphasizing the importance of using them ethically and legally. Finally, the article provides potential countermeasures such as two-factor authentication, strong password policies, and regular security audits to help individuals and organizations better protect themselves against this growing threat. By understanding the tools and techniques used in social engineering attacks and implementing appropriate countermeasures, individuals and organizations can minimize the risk of successful social engineering attacks and improve their cybersecurity posture. To illustrate the effectiveness of social engineering attacks, we present real-world case studies that demonstrate how easily individuals and organizations can fall prey to these attacks. We also discuss ethical considerations that must be taken into account while using social engineering tools, emphasizing the need for responsible and legal use of these tools.Keywords: pen testing, hacking, Kali Linux, social engineering
Procedia PDF Downloads 1001066 Art and Society: Greek Migrant Artists in Paris during 1970s
Authors: Sapfo A. Mortaki
Abstract:
From the early 1960s and until the middle of the next decade, the lack of favorable conditions for the development of art along with the imposition of the 1967 military dictatorship resulted in a great flow of Greek artists abroad. The fall of the dictatorship and the change of the political scene after 1974 constitute crucial milestones in the cultural life of the country. In the field of visual arts significant changes are attempted in the state's effort to formulate a national cultural policy. This article examines the presence of Greek migrant artists (painters and sculptors) in Paris during the 1970s. Since the mid-1970s, and particularly in the early 1980s, Modern Greek Diaspora undergoes a new transition phase, when the concept of immigration changes. The aim of this study is to record and give prominence to the presence of the Greek artists -through archival research in the daily and periodical press- as well as present the impact of their artistic activity on French intellectual life and on the country’s society during this period. Furthermore, the presence and work of these artists are discussed in an environment of cultural coexistence which, to a certain extent, can be regarded as the result of the social phenomenon of their migration in the era of postmodernity. Finally, their contribution to the development of the cultural life of Greece, inside and outside its borders, is also being examined.Keywords: art and society, cultural policy, Greek artists, postmodernity
Procedia PDF Downloads 2331065 Archaeology Study of Soul Houses in Ancient Egypt on Five Models in the Grand Egyptian Museum
Authors: Ayman Aboelkassem, Mahmoud Ali
Abstract:
Introduction: The models of soul houses have appeared in the prehistory, old kingdom and middle kingdom period. These soul houses represented the imagination of the deceased about his house in the afterlife, some of these soul houses were two floors and the study will examine five models of soul houses which were discovered near Saqqara site by an Egyptian mission. These models had been transferred to The Grand Egyptian Museum (GEM) to be ready to display at the new museum. We focus on models of soul houses (GEM Numbers, 1276, 1280, 1281, 1282, 8711) these models of soul houses were related to the old kingdom period. These models were all made of pottery, the five models have an oval shape and were decorated with relief. Methodology: The study will focus on the development of soul houses during the different periods in ancient Egypt, the function of soul houses, the kind of offerings which were put in it and the symbolism of the offerings colors in ancient Egyptian believe. Conclusion: This study is useful for the heritage and ancient civilizations especially when we talk about opening new museums like The Grand Egyptian Museum which will display a new collection of soul houses. The study of soul houses and The kinds of offerings which put in it reflect the economic situation in the Egyptian society and kinds of oils which were famous in ancient Egypt.Keywords: archaeology study, Grand Egyptian Museum, relief, soul houses
Procedia PDF Downloads 2551064 Effectiveness of the Flavonoids Isolated from Thymus inodorus by Different Solvents against Some Pathogenis Microorganisms
Authors: N. Behidj, K. Benyounes, T. Dahmane, A. Allem
Abstract:
The aim of this study was to investigate the antimicrobial activity of flavonoids isolated from the aerial part of a medicinal plant which is Thymus inodorusby the middle agar diffusion method on following microorganisms. We have Staphylococcus aureus, Escherichia coli, Pseudomonas fluorescens, AspergillusNiger, Aspergillus fumigatus and Candida albicans. During this study, flavonoids extracted by stripping with steam are performed. The yields of flavonoids is 7.242% for the aqueous extract and 28.86% for butanol extract, 29.875% for the extract of ethyl acetate and 22.9% for the extract of di - ethyl. The evaluation of the antibacterial effect shows that the diameter of the zone of inhibition varies from one microorganism to another. The operation values obtained show that the bacterial strain P fluoresces, and 3 yeasts and molds; A. Niger, A. fumigatus and C. albicansare the most resistant. But it is noted that, S. aureus is shown more sensitive to crude extracts, the stock solution and the various dilutions. Finally for the minimum inhibitory concentration is estimated only with the crude extract of Thymus inodorus flavonoid.Indeed, these extracts inhibit the growth of Gram + bacteria at a concentration varying between 0.5% and 1%. While for bacteria to Gram -, it is limited to a concentration of 0.5%.Keywords: antimicrobial activity, organic extracts, aqueous extracts, Thymus numidicus
Procedia PDF Downloads 1851063 The Shrinking Nature of Parliamentary Immunity in Kenya: A Proposal for Judicial Restraint
Authors: Oscar Sang, Shadrack David Rotich
Abstract:
Parliamentary immunity is grounded on the notion that parliaments need certain rights or immunities to ensure they can operate independently make fair and impartial decisions without capitulating to political pressure or intimidation. The 2013 election in Kenya marked an important milestone in the development of the law of parliamentary privilege. Such importance relates to the dramatic increase in the number of legislatures in the country from one unicameral parliament, to a bicameral national parliament and forty-seven other regional legislative assemblies. The increase in legislatures has resulted in a dramatic increase in political contestations which have led to legal wrangles. The judiciary in Kenya, once considered submissive, has been invited to arbitrate on various matters pitting individual rights and parliamentary privilege and have invalidated a number of legislative action. While judicial intervention is indeed necessary to ensure that legislatures in Kenya live true to the constitutional aspirations of the Kenyan people, certain judicial decisions have had an effect on eroding parliamentary immunity. This paper highlights a number of instances in which it could be argued that parliamentary privilege came under attack by the courts in Kenya. The paper aims to make a case that while Kenya’s progressive constitution necessitates the scope and extent of legislature’s immunities and privilege to be determined by the courts, it is important that courts exercise restraint in its review of legislative action. The paper makes the argument that unrestrained judicial action in Kenya on questions within the realm parliamentary privilege may undermine the functioning of Kenya’s legislatures. The paper explores approaches taken by a number of jurisdictions in establishing a proper balance between maintaining a viable parliamentary privilege regime in a rights-based constitutional system.Keywords: Kenya, constitution, judicial restraint, parliamentary privilege
Procedia PDF Downloads 1701062 The Effect of Aerobic Training Program on Some Pro-Inflammatory Cytokine in Smokers
Authors: Laleh Behboudi Tabrizi, Melika Naserzare
Abstract:
Accumulating experimental and epidemiologic data smoker individuals are more prone to systemic inflammation than non-smokers. In this study we aimed to determine serum TNF-α and C-reactive protein (CRP) as pro-inflammatory cytokines in response to 3 months aerobic training in smoker men. A total 30 middle-aged healthy smokers selected for participate in this study and were divided into either control or exercise groups. The subjects in exercise group were completed a 3 months aerobic training program for 3 sessions per week at 60 – 80 % of maximal heart rate. Those in control group did nit participated in exercise training. Pre and post-training of CRP and TNF-α were measured in two groups. Student’s t-tests for paired samples were performed to determine whether there were signigcant within-group changes in the outcomes. P value of <0.05 was accepted as significant. No significant differences were found in anthropometrical and biochemical markers between two groups at baseline. Aerobic training program resulted in a significant decrease in anthropometrical markers and serum TNF-α but not in serum CRP in exercise group. All variables remained without changes in control groups. Based on these finding, it is concluded that aerobic training can be improve inflammatory cytokine with emphasis on TNF-α in smokers.Keywords: cigarette, cytokine, chronic training, inflammation
Procedia PDF Downloads 3131061 Home-based Production of the Southern Dialect Dong Minority Women in Rural Hunan, China
Authors: Sze Wai Veera Fung, Peter W. Ferretto
Abstract:
Since the economic reform in 1980s, many men and women of the southern dialect Dong minority have migrated to coastal cities for employment. Responding to the outgoing providers of the families, women, especially those at the middle age, resort to the informal home-based services and goods production for income generation. Homework, therefore, becomes a key economic strategy in supporting the household expenses in rural China, where formal employment is often inadequate for local women. This paper seeks to examine the intersection between gender and household strategy in the broader economic context of rural China. Based on the interviews and site survey in Tongdao Dong Autonomous County, the study analyses the variety of the home-based production activities, the experience of women in the production process, and the impact on familial relation and gender division of labor at home. The objective of this research is to advance the understanding of the informal economic landscape in the contemporary rural China, through which an alternative and possibly a more appropriate mode of development can be investigated.Keywords: gender relation, home-based production, household strategy, informal economy, rural China, dong minority
Procedia PDF Downloads 1301060 Risk Management in an Islamic Framework
Authors: Magid Maatallah
Abstract:
The problem is, investment management in modern conditions boils down to risk management which is very underdeveloped in Islamic financial theory and practice. Add to this the fact that, in Islamic perception, this is one of the areas of conventional finance in need of drastic reforms. This need was recently underlined by the story of Long Term Capital Management (LTCM ), ( told by Roger Lowenstein in his book, When Genius Failed, Random House, 2000 ). So we face a double challenge, to develop Islamic techniques of risk management and to see that these new techniques are free from the ills with which conventional methods are suffering. This is different from the challenge faced in the middle of twentieth century, to develop a method of financial intermediation free of interest.Risk was always there, especially in business. But industrialization brought risks unknown in trade and agriculture. Industrial production often involves long periods of time .The longer the period of production the more the uncertainty. The scope of the market has expanded to cover the whole world, introducing new kinds of risk. More than a thousand years ago, when Islamic laws were being written, the nature and scope of risk and uncertainty was different. However, something can still be learnt which, in combination with the modern experience, should enable us to realize the Shariah objectives of justice, fairness and efficiency.Keywords: financial markets, Islamic framework, risk management, investment
Procedia PDF Downloads 5521059 Study of Microbial Diversity Associated with Tarballs and Their Exploitation in Crude Oil Degradation
Authors: Varsha Shinde, Belle Damodara Shenoy
Abstract:
Tarballs are crude oil remnants found in oceans after long term weathering process and are a global concern since several decades as potential marine pollutant. Being complicated in structure microbial remediation of tarballs in natural environment is a slow process. They are rich in high molecular weight alkanes and poly aromatic hydrocarbons which are resistant to microbial attack and other environmental factors, therefore remain in environment for long time. However, it has been found that many bacteria and fungi inhabit on tarballs for nutrients and shelter. Many of them are supposed to be oil degraders, while others are supposed to be getting benefited by byproducts formed during hydrocarbon metabolism. Thus tarballs are forming special interesting ecological niche of microbes. This work aimed to study diversity of bacteria and fungi from tarballs and to see their potential application in crude oil degradation. The samples of tarballs were collected from Betul beach of south Goa (India). Different methods were used to isolate culturable fraction of bacteria and fungi from it. Those were sequenced for 16S rRNA gene and ITS for molecular level identification. The 16S rRNA gene sequence analysis revealed the presence of 13 bacterial genera/clades (Alcanivorax, Brevibacterium, Bacillus, Cellulomonas, Enterobacter, Klebsiella, Marinobacter, Nitratireductor, Pantoea, Pseudomonas, Pseudoxanthomonas, Tistrella and Vibrio), while the ITS sequence analysis placed the fungi in 8 diverse genera/ clades (Aspergillus, Byssochlamys, Monascus, Paecilomyces, Penicillium, Scytalidium/ Xylogone, Talaromyces and Trichoderma). All bacterial isolates were screened for oil degradation capacity. Potential strains were subjected to crude oil degradation experiment for quantification. Results were analyzed by GC-MS-MS.Keywords: bacteria, biodegradation, crude oil, diversity, fungi, tarballs
Procedia PDF Downloads 2221058 A Middle Way Approach for the Conflicts between Death, Impermanence and Non-Self in Buddhist Philosophy
Authors: Ruotian Wang
Abstract:
Since the birth of the Buddha himself more than 2000 years ago, Buddhism has continued to lead many people’s lives. Scholars and Buddhists have contributed to give detailed explanations to all kinds of issues within the structure of Buddhist philosophy to make Buddhism more complete. Different schools have developed, therefore leading to a lot of different branches within Buddhism. Although they all follow what the Buddha himself taught, they still have various explanations to even fundamental issues. As one of the fundamental problems regarding our lives, death is widely discussed in Buddhism. The controversy regarding death is its seemly incompatibility with the idea of non-self and impermanence, which is what I will discuss in this essay. The idea of rebirth is the basic structure of birth and death, which suggests a connection between this life and the next. Therefore, according to common logic, we should tell that there is something that connects each life, an agent that receives the process of rebirth, which is normally known as a soul. In Buddhism, non-self is also an important concept which speaks to the illusion of a self or soul. The idea of rebirth and non-self seems contradicted. Many different schools of Buddhism attempt to resolve such conflicts, but there are logical flaws within the arguments they made. Thus, I raise a better solution: Different from the annihilationist view, non-self in Buddhism speaks only to the illusion of a self in each moment. There is a self that exists as a sum of all our karmas which we can achieve after Nirvana. However, the nature of such a self is still emptiness. There are no agents needed as one rebirth since the whole cycle of rebirth is the self. Then, the contradiction between rebirth and non-self can be resolved.Keywords: Buddhism, impermanence, non-self, reincarnation
Procedia PDF Downloads 1231057 Viability of Zoning Reform in Tackling Urban Inequality in Louisville
Authors: Mojeed A. Oladele
Abstract:
The original zoning system in Louisville promoted social segregation among groups and remained a tool for social exclusion that strengthened preexisting inequalities. The current residential zoning system in Louisville is predominantly single-family residential housing. Of the 75% of total land allocated for residential purposes, 55% comprises single-family housing, constituting one form of development and ruminant problems of social segregation within the city. The zoning reform initiative birthed the spatial improvement and development of additional middle housing as a more generic and inclusive housing form. The paper investigates the basis of zoning reform relative to the interconnectedness amongst the discursive objects of analysis and the extensiveness as a strategic tool of structural adjustment. Qualitative methodological assessment generated by collective planning professionals reflects the effectiveness of the new zoning design in strengthening the socio-spatial interactions within the city. The zoning reform is currently at the early stage of implementation and requires more professional/public inputs and constant iterative processes for a more promising urban planning outcome.Keywords: zoning reform, viability, urban inequality, housing affordability, Louisville
Procedia PDF Downloads 2081056 Equivalent Circuit Representation of Lossless and Lossy Power Transmission Systems Including Discrete Sampler
Authors: Yuichi Kida, Takuro Kida
Abstract:
In a new smart society supported by the recent development of 5G and 6G Communication systems, the im- portance of wireless power transmission is increasing. These systems contain discrete sampling systems in the middle of the transmission path and equivalent circuit representation of lossless or lossy power transmission through these systems is an important issue in circuit theory. In this paper, for the given weight function, we show that a lossless power transmission system with the given weight is expressed by an equivalent circuit representation of the Kida’s optimal signal prediction system followed by a reactance multi-port circuit behind it. Further, it is shown that, when the system is lossy, the system has an equivalent circuit in the form of connecting a multi-port positive-real circuit behind the Kida’s optimal signal prediction system. Also, for the convenience of the reader, in this paper, the equivalent circuit expression of the reactance multi-port circuit and the positive- real multi-port circuit by Cauer and Ohno, whose information is currently being lost even in the world of the Internet.Keywords: signal prediction, pseudo inverse matrix, artificial intelligence, power transmission
Procedia PDF Downloads 1221055 Theory about the Gebel El-Arak Knife: Egyptian Knife with Canaanite Relief
Authors: Doaa El-Shereef
Abstract:
This paper will focus on proving a theory that it is an Egyptian knife with Canaanite relief and will discuss the nature of the Gebel el-Arak Knife and the civilization to which it belongs and the relationship of the Canaanite deity with Mount Abydos in Egypt, and the influence between the ancient Egyptian religion and the Canaanite religion and their effect on each other. Finally, the paper will discuss in full detail the engraving of the two faces of the knife handle and analyze the register on the front face, which is the scene of the two lions engraved, and between them, an old man symbolized as the deity in the middle and compared it with other drawings similar in the Egyptian civilization. The paper will also discuss the registers on the back face, which are the engravings of a battle, soldiers, uniforms, and boats, and how the back face describes a water battle between three Egyptian boats and two foreign ships. In addition, it will prove that those foreign ships were not Mesopotamian ships because, in the period to which the knife of Gebel Al-Arak belongs, between 3300-3100 BC, there were no battles or trade exchanges between Egypt and Mesopotamia on sea routes. However, there was already a strong land and sea trade between Canaan and Egypt during Chalcolithic Age (4500-3500 BC), as described in many primary sources.Keywords: Canaan, Egypt, Gebel el-Arak Knife, Louvre
Procedia PDF Downloads 1721054 Management of Insect Pests Using Baculovirus Based Biopesticides in India
Authors: Mudasir Gani, Rakesh Kumar Gupta, Kamlesh Bali, Abdul Rouf Wani
Abstract:
The gypsy moth (Lymantria obfuscata) and tent caterpillar (Malacosoma indicum) are serious pests that attack a wide range of fruit and forest trees in Jammu & Kashmir range of North-Western Himalayas in India. Investigations were carried out to isolate and bioprospect naturally occurring nucleopolyhedroviruses (NPVs) as potent biopesticides against these pests. The biological and molecular characterization of NPV isolates from different ecosystems was conducted, and the polh, lef-8 and lef-9 genes were sequenced and subjected to phylogenetic analysis. The L. obfuscata NPV was more closely related to the L. dispar NPV, whereas M. indicum NPV was more closely related to the M. californicum NPV in the NCBI taxonomy database. Among different isolates, Bhaderwah isolates exhibited highest virus activity (LD₅₀ = 250 POBs/larvae) and speed of kill (ST₅₀ = 6.80 days) against L. obfuscata whereas Mahor isolates proved most virulent against M. indicum, with lowest LD₅₀ (257 POBs/larva) and ST₅₀ (6.80 days). The in vivo mass production for highest productivity and quality revealed that the optimum yield was obtained when 3rd instar larvae were inoculated with a viral dose of 1.44 × 105 POBs/larva and allowed to incubate for nine days for L. obfuscata. However, for M. indicum larvae, a viral dose of 2.88 × 10⁶ POBs/larva and incubation period of 10 days were found optimum. It was found that harvesting of moribund larvae yields good quality NPV. The field application of L. obfuscata NPV and M. indicum NPV against the respective host populations on apple and willow with the pre-standardized dosage of 1 × 10¹² POBs/acre reduced the larval population density up to 25-63%.Keywords: baculoviruses, biopesticides, Lymantria obfuscata, Malacosoma indicum
Procedia PDF Downloads 1121053 Effect of Sowing Dates on Growth, Agronomic Traits and Yield of Tossa Jute (Corchorus olitorius L.)
Authors: Amira Racha Ben Yakoub, Ali Ferchichi
Abstract:
In order to investigate the impact of sowing time on growth parameters, the length of the development cycle and yield of tossa jute (Corchorus olitorius L.), a field experiment was conducted from March to May 2011 at the Laboratoire d’Aridoculture et Cultures Oasiennes, ‘Institut des Régions Arides de Médénine’, Tunisia. Results of the experiment revealed that the early sowing (the middle of March, the beginning of April) induced a cycle of more than 100 days to reach the stage maturity and generates a marked drop in production. This period of plantation affects plant development and leads to a sharp drop in performance marked primarily by a reduction in growth, number and size of leaves, number of flowers and pods and weight of different parts of plant. Sowing from the end of April seems appropriate for shortening the development cycle and better profitability than the first two dates. Seeding of C. olitorius during May enhance the development of plants more dense, which explains the superiority of production marked by the increase of seed yield and leaf fresh and dry weight of this leafy vegetables.Keywords: tossa jute (Corchorus olitorius L), sowing date, growth, yield
Procedia PDF Downloads 3491052 Split-Flow Method to Reduce Duty Required in Amine Gas Sweetening Units
Authors: Abdallah Sofiane Berrouk, Dara Satyadileep
Abstract:
This paper investigates the feasibility of retrofitting a middle-east based commercial amine sweetening unit with a split-flow scheme which involves withdrawing a portion of partially stripped semi-lean solvent from the stripping column and re-injecting it in the absorption column to reduce the overall energy consumption of the unit. This method is comprehensively explored by performing parametric analysis of the split fraction of the semi-lean solvent using a kinetics based process simulator ProMax V 3.2. Re-boiler duty, condenser duty, solvent cooling and pumping loads are analysed as functions of a split fraction of the semi-lean solvent from the stripper. It is shown that the proposed method significantly reduces the overall energy consumption of the unit resulting in an annual savings of 325,000 USD. The thorough economic analysis is performed using Aspen Economic Evaluation V 8.4 to reveal that the retrofit scheme pays back the capital cost in less than eight years and is highly recommended for any commercial plant having suitable provisions for solvent inlet/withdrawal on the columns.Keywords: split flow, Amine, gas processing, optimization
Procedia PDF Downloads 3301051 Comparing Repaired and Undamaged Specimens Test Results of Post-Tensioned Beam to Column Connections
Authors: Mustafa Kaya
Abstract:
After the 1999 Marmara earthquake in Turkey research by the Turkish Precast Union stated that 24.50% of the precast structures were damaged with some of this damage being observed in the beam to column connections of the structures. Since it is essential to provide those rendered homeless by the earthquake with safe, habitable accommodation repairing medium and slight levels of damage at the connection parts should be undertaken. In order to prove that a repaired connection was sufficiently strong, a precast beam to column post tensioned connection was tested in three phases. In phase one, the middle level damage was observed at 6% drift at these connections. As a result of the extra loads applied, little damage was observed. In the last phase, the four connections tested in the first phase were repaired using epoxy resin and then retested. The results from the tests on the repaired precast and the undamaged specimens showed that the repaired specimens were sufficiently strong, thus proving that repair to damaged precast beam to column post tensioned connections can be undertaken.Keywords: precast beam to column connection, moment-resisting connection, post-tensioned connections, repair of precast connections
Procedia PDF Downloads 4461050 Factors Influencing International Second Language Student's Perceptions of Academic Writing Practices
Authors: A. Shannaq
Abstract:
English is the accepted lingua franca of the academic world, and English medium higher education institutions host many second-language speakers of English (L2) who wish to pursue their studies through the medium of English. Assessment in higher education institutions is largely done in writing, which makes the mastery of academic writing essential. While such mastery can be, and often is, difficult for students who speak English as a first language, it is undoubtedly more so for L2 students attempting to adopt Anglophone academic written norms. There does not appear to be a great deal of research with regard to L2 students’ perceptions of their academic writing practices. This research investigates the writing practices of international L2 students in their first year of undergraduate study at NZ universities. Qualitative longitudinal data in the form of semi-structured interviews and documentation (assignments’ written instructions, students’ written assignments, tutors’ feedback on the students’ assignments) were collected from 4 undergraduate international L2 students at the beginning, middle, and end of the academic year 2017. Findings reveal that motivation, agency, and self-efficacy impact students’ perceptions of their academic writing practices and define the course of actions learners take under the time constraints which are set for their assignments.Keywords: academic writing, English as a second language, international second language students, undergraduate writing practices
Procedia PDF Downloads 139