Search results for: sun protection factor
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7339

Search results for: sun protection factor

6199 Creating Risk Maps on the Spatiotemporal Occurrence of Agricultural Insecticides in Sub-Saharan Africa

Authors: Chantal Hendriks, Harry Gibson, Anna Trett, Penny Hancock, Catherine Moyes

Abstract:

The use of modern inputs for crop protection, such as insecticides, is strongly underestimated in Sub-Saharan Africa. Several studies measured toxic concentrations of insecticides in fruits, vegetables and fish that were cultivated in Sub-Saharan Africa. The use of agricultural insecticides has impact on human and environmental health, but it also has the potential to impact on insecticide resistance in malaria transmitting mosquitos. To analyse associations between historic use of agricultural insecticides and the distribution of insecticide resistance through space and time, the use and environmental fate of agricultural insecticides needs to be mapped through the same time period. However, data on the use and environmental fate of agricultural insecticides in Africa are limited and therefore risk maps on the spatiotemporal occurrence of agricultural insecticides are created using environmental data. Environmental data on crop density and crop type were used to select the areas that most likely receive insecticides. These areas were verified by a literature review and expert knowledge. Pesticide fate models were compared to select most dominant processes that are involved in the environmental fate of insecticides and that can be mapped at a continental scale. The selected processes include: surface runoff, erosion, infiltration, volatilization and the storing and filtering capacity of soils. The processes indicate the risk for insecticide accumulation in soil, water, sediment and air. A compilation of all available data for traces of insecticides in the environment was used to validate the maps. The risk maps can result in space and time specific measures that reduce the risk of insecticide exposure to non-target organisms.

Keywords: crop protection, pesticide fate, tropics, insecticide resistance

Procedia PDF Downloads 123
6198 Power Reduction of Hall-Effect Sensor by Pulse Width Modulation of Spinning-Current

Authors: Hyungil Chae

Abstract:

This work presents a method to reduce spinning current of a Hall-effect sensor for low-power magnetic sensor applications. Spinning current of a Hall-effect sensor changes the direction of bias current periodically and can separate signals from DC-offset. The bias current is proportional to the sensor sensitivity but also increases the power consumption. To achieve both high sensitivity and low power consumption, the bias current can be pulse-width modulated. When the bias current duration Tb is reduced by a factor of N compared to the spinning current period of Tₛ/2, the total power consumption can be saved by N times. N can be large as long as the Hall-effect sensor settles down within Tb. The proposed scheme is implemented and simulated in a 0.18um CMOS process, and the power saving factor is 9.6 when N is 10. Acknowledgements: This work was supported by Institute for Information & communications Technology Promotion (IITP) grant funded by the Korea government (MSIP) (20160001360022003, Development of Hall Semi-conductor for Smart Car and Device).

Keywords: chopper stabilization, Hall-effect sensor, pulse width modulation, spinning current

Procedia PDF Downloads 465
6197 A Statistical Analysis on Relationship between Temperature Variations with Latitude and Altitude regarding Total Amount of Atmospheric Carbon Dioxide in Iran

Authors: Masoumeh Moghbel

Abstract:

Nowadays, carbon dioxide which is produced by human activities is considered as the main effective factor in the global warming occurrence. Regarding to the role of CO2 and its ability in trapping the heat, the main objective of this research is study the effect of atmospheric CO2 (which is recorded in Manaloa) on variations of temperature parameters (daily mean temperature, minimum temperature and maximum temperature) in 5 meteorological stations in Iran which were selected according to the latitude and altitude in 40 years statistical period. Firstly, the trend of temperature parameters was studied by Regression and none-graphical Man-Kendal methods. Then, relation between temperature variations and CO2 were studied by Correlation technique. Also, the impact of CO2 amount on temperature in different atmospheric levels (850 and 500 hpa) was analyzed. The results illustrated that correlation coefficient between temperature variations and CO2 in low latitudes and high altitudes is more significant rather than other regions. it is important to note that altitude as the one of the main geographic factor has limitation in affecting the temperature variations, so that correlation coefficient between these two parameters in 850 hpa (r=0.86) is more significant than 500 hpa (r = 0.62).

Keywords: altitude, atmospheric carbon dioxide, latitude, temperature variations

Procedia PDF Downloads 383
6196 Optimizing Performance of Tablet's Direct Compression Process Using Fuzzy Goal Programming

Authors: Abbas Al-Refaie

Abstract:

This paper aims at improving the performance of the tableting process using statistical quality control and fuzzy goal programming. The tableting process was studied. Statistical control tools were used to characterize the existing process for three critical responses including the averages of a tablet’s weight, hardness, and thickness. At initial process factor settings, the estimated process capability index values for the tablet’s averages of weight, hardness, and thickness were 0.58, 3.36, and 0.88, respectively. The L9 array was utilized to provide experimentation design. Fuzzy goal programming was then employed to find the combination of optimal factor settings. Optimization results showed that the process capability index values for a tablet’s averages of weight, hardness, and thickness were improved to 1.03, 4.42, and 1.42, respectively. Such improvements resulted in significant savings in quality and production costs.

Keywords: fuzzy goal programming, control charts, process capability, tablet optimization

Procedia PDF Downloads 248
6195 “It Just Feels Risky”: Intuition vs Evidence in Child Sexual Abuse Cases. Proposing an Empirically Derived Risk and Protection Protocol

Authors: Christian Perrin, Nicholas Blagden, Louise Allen, Sarah Impey

Abstract:

Social workers in the UK and professionals globally are faced with a particular challenge when dealing with allegations of child sexual abuse (CSA) in the community. In the absence of a conviction or incontestable evidence, staff can often find themselves unable to take decisive action to remove a child from harm, even though there may be a credible threat to their welfare. Conversely, practitioners may over-calculate risk through fear of being accountable for harm. This is, in part, due to the absence of a structured and evidence-based risk assessment tool which can predict the likelihood of a person committing child sexual abuse. Such assessments are often conducted by forensic professionals who utilise offence-specific data and personal history information to calculate risk. In situations where only allegations underpin a case, this mode of assessment is not viable. There are further ethical issues surrounding the assessment of risk in this area which require expert consideration and sensitive planning. This paper explores this entangled problem extant in the wider call to prevent sexual and child sexual abuse in the community. To this end, 32 qualitative interviews were undertaken with social workers dealing with CSA cases. Results were analysed using thematic analysis and operationalised to formulate a risk and protection protocol for use in case management. This paper reports on the early findings associated with the initial indications of protocol reliability. Implications for further research and practice are discussed.

Keywords: sexual offending, child sexual offence, offender rehabilitation, risk assessment, offence prevention

Procedia PDF Downloads 90
6194 Extent to Which Various Academic Factors Cause Stress in Undergraduate Students at a University in Karachi and What Unhealthy Coping Strategies They Use

Authors: Sumara Khanzada

Abstract:

This research investigated how much stress is induced by various study-related factors, in undergraduate students belonging to a renowned university in Karachi along with the unhealthy coping strategy the students use to manage the stress. The study related factors considered for the purpose of the study were curriculum and instruction based stress, teacher-student relationship, assessment system and different components related to academic work. A survey in which questionnaires were administered to hundred students was conducted. The data were analyzed quantitatively to determine the percentages of stress induced by the various factors. The study found that student-teacher relationship is the strongest factor that causes stress in the undergraduate students specifically when teachers do not deliver the lectures effectively and give assignments and presentations to students without clear guidelines and instructions. The second important factor that causes stress was the different components of academic life, such as, parental expectations and pressures to achieve one's goals. Assessment system was found to be the third key factor inducing stress and affecting students' cognitive and psychological functioning. The most commonly used unhealthy coping strategy for stress management was procrastination. In light of the findings, it is recommended that importance be given to teacher training to ensure that instruction is proper and healthy teacher student relationship exists. Effective support programs, workshops, seminars, and different awareness programs should be arranged for promoting awareness regarding mental health in educational institutions. Moreover, additional zero credit courses should be offered to teach students how to learn stress management and healthy coping skills. Sumara Khanzada Clinical Psychologist [email protected]

Keywords: Stress, coping stretigies, acadamic stress, relationship

Procedia PDF Downloads 55
6193 A Case Study Approach on Co-Constructing the Idea of 'Safety' with Children

Authors: Beng Zhen Yeow

Abstract:

In most work that involves children, the voice of the children is often not heard. This is ironic since a lot of discussions might involve their welfare and safety. It might seem natural that the professionals should hear from them about what they wish for instead of deciding what is best for them. However, this, unfortunately, might be more the exception than the norm in most case and hence in many instances, children are merely 'subjects' in conversations about safety instead of active participants in the construction or creation of safety in the family. There might be many reasons why it does not happen in our work. Firstly, professionals have learnt how to 'socialise' into their professional roles and hence in the process become 'un-childlike'. Secondly, there is also a lack of professional training with regards to how to talk with children. Finally, there might be also a lack of concrete tools and techniques that are developed to facilitate the process. In this paper, the case study method is used to show how the idea of safety could be concretised and discussed with children and their family members, and hence making them active participants and co-creators of their own safety. Specific skills and techniques are highlighted through the case study. In this case, there was improvement in outcomes like no repeated offence or abuse. In addition, children were also able to advocate for their own safety after six months of intervention and how the family members were able to explicitly say what they can do to improve safety. The professionals in the safety network reported significant improvements. On top of that, the abused child who was removed due to child protection concerns, had verbalized observations of change in mother’s parenting abilities, and has requested for home leave to begin due to ownership of safety planning and having confidence to co-create safety for her siblings and herself together with the professionals in the safety network. Children becoming active participants in the co-creation of safety not only serve the purpose in allowing them to own a 'voice' but at the same time, give them greater confidence to protect themselves at home and in other contexts outside of home.

Keywords: partnering for safety, collaborative social work, family and systemic psychotherapy, child protection

Procedia PDF Downloads 105
6192 An Exploration of Renewal Utilization of Under-bridge Space Based on Spatial Potential Evaluation - Taking Chongqing Municipality as an Example

Authors: Xuelian Qin

Abstract:

Urban "organic renewal" based on the development of existing resources in high-density urban areas has become the mainstream of urban development in the new era. As an important stock resource of public space in high-density urban areas, promoting its value remodeling is an effective way to alleviate the shortage of public space resources. However, due to the lack of evaluation links in the process of underpass space renewal, a large number of underpass space resources have been left idle, facing the problems of low space conversion efficiency, lack of accuracy in development decision-making, and low adaptability of functional positioning to citizens' needs. Therefore, it is of great practical significance to construct the evaluation system of under-bridge space renewal potential and explore the renewal mode. In this paper, some of the under-bridge spaces in the main urban area of Chongqing are selected as the research object. Through the questionnaire interviews with the users of the built excellent space under the bridge, three types of six levels and twenty-two potential evaluation indexes of "objective demand factor, construction feasibility factor and construction suitability factor" are selected, including six levels of land resources, infrastructure, accessibility, safety, space quality and ecological environment. The analytical hierarchy process and expert scoring method are used to determine the index weight, construct the potential evaluation system of the space under the bridge in high-density urban areas of Chongqing, and explore the direction of renewal and utilization of its suitability. To provide feasible theoretical basis and scientific decision support for the use of under bridge space in the future.

Keywords: high density urban area, potential evaluation, space under bridge, updated using

Procedia PDF Downloads 65
6191 Particle Swarm Optimization Algorithm vs. Genetic Algorithm for Image Watermarking Based Discrete Wavelet Transform

Authors: Omaima N. Ahmad AL-Allaf

Abstract:

Over communication networks, images can be easily copied and distributed in an illegal way. The copyright protection for authors and owners is necessary. Therefore, the digital watermarking techniques play an important role as a valid solution for authority problems. Digital image watermarking techniques are used to hide watermarks into images to achieve copyright protection and prevent its illegal copy. Watermarks need to be robust to attacks and maintain data quality. Therefore, we discussed in this paper two approaches for image watermarking, first is based on Particle Swarm Optimization (PSO) and the second approach is based on Genetic Algorithm (GA). Discrete wavelet transformation (DWT) is used with the two approaches separately for embedding process to cover image transformation. Each of PSO and GA is based on co-relation coefficient to detect the high energy coefficient watermark bit in the original image and then hide the watermark in original image. Many experiments were conducted for the two approaches with different values of PSO and GA parameters. From experiments, PSO approach got better results with PSNR equal 53, MSE equal 0.0039. Whereas GA approach got PSNR equal 50.5 and MSE equal 0.0048 when using population size equal to 100, number of iterations equal to 150 and 3×3 block. According to the results, we can note that small block size can affect the quality of image watermarking based PSO/GA because small block size can increase the search area of the watermarking image. Better PSO results were obtained when using swarm size equal to 100.

Keywords: image watermarking, genetic algorithm, particle swarm optimization, discrete wavelet transform

Procedia PDF Downloads 207
6190 Evaluation of Groundwater Quality and Contamination Sources Using Geostatistical Methods and GIS in Miryang City, Korea

Authors: H. E. Elzain, S. Y. Chung, V. Senapathi, Kye-Hun Park

Abstract:

Groundwater is considered a significant source for drinking and irrigation purposes in Miryang city, and it is attributed to a limited number of a surface water reservoirs and high seasonal variations in precipitation. Population growth in addition to the expansion of agricultural land uses and industrial development may affect the quality and management of groundwater. This research utilized multidisciplinary approaches of geostatistics such as multivariate statistics, factor analysis, cluster analysis and kriging technique in order to identify the hydrogeochemical process and characterizing the control factors of the groundwater geochemistry distribution for developing risk maps, exploiting data obtained from chemical investigation of groundwater samples under the area of study. A total of 79 samples have been collected and analyzed using atomic absorption spectrometer (AAS) for major and trace elements. Chemical maps using 2-D spatial Geographic Information System (GIS) of groundwater provided a powerful tool for detecting the possible potential sites of groundwater that involve the threat of contamination. GIS computer based map exhibited that the higher rate of contamination observed in the central and southern area with relatively less extent in the northern and southwestern parts. It could be attributed to the effect of irrigation, residual saline water, municipal sewage and livestock wastes. At wells elevation over than 85m, the scatter diagram represents that the groundwater of the research area was mainly influenced by saline water and NO3. Level of pH measurement revealed low acidic condition due to dissolved atmospheric CO2 in the soil, while the saline water had a major impact on the higher values of TDS and EC. Based on the cluster analysis results, the groundwater has been categorized into three group includes the CaHCO3 type of the fresh water, NaHCO3 type slightly influenced by sea water and Ca-Cl, Na-Cl types which are heavily affected by saline water. The most predominant water type was CaHCO3 in the study area. Contamination sources and chemical characteristics were identified from factor analysis interrelationship and cluster analysis. The chemical elements that belong to factor 1 analysis were related to the effect of sea water while the elements of factor 2 associated with agricultural fertilizers. The degree level, distribution, and location of groundwater contamination have been generated by using Kriging methods. Thus, geostatistics model provided more accurate results for identifying the source of contamination and evaluating the groundwater quality. GIS was also a creative tool to visualize and analyze the issues affecting water quality in the Miryang city.

Keywords: groundwater characteristics, GIS chemical maps, factor analysis, cluster analysis, Kriging techniques

Procedia PDF Downloads 152
6189 Modern Information Security Management and Digital Technologies: A Comprehensive Approach to Data Protection

Authors: Mahshid Arabi

Abstract:

With the rapid expansion of digital technologies and the internet, information security has become a critical priority for organizations and individuals. The widespread use of digital tools such as smartphones and internet networks facilitates the storage of vast amounts of data, but simultaneously, vulnerabilities and security threats have significantly increased. The aim of this study is to examine and analyze modern methods of information security management and to develop a comprehensive model to counteract threats and information misuse. This study employs a mixed-methods approach, including both qualitative and quantitative analyses. Initially, a systematic review of previous articles and research in the field of information security was conducted. Then, using the Delphi method, interviews with 30 information security experts were conducted to gather their insights on security challenges and solutions. Based on the results of these interviews, a comprehensive model for information security management was developed. The proposed model includes advanced encryption techniques, machine learning-based intrusion detection systems, and network security protocols. AES and RSA encryption algorithms were used for data protection, and machine learning models such as Random Forest and Neural Networks were utilized for intrusion detection. Statistical analyses were performed using SPSS software. To evaluate the effectiveness of the proposed model, T-Test and ANOVA statistical tests were employed, and results were measured using accuracy, sensitivity, and specificity indicators of the models. Additionally, multiple regression analysis was conducted to examine the impact of various variables on information security. The findings of this study indicate that the comprehensive proposed model reduced cyber-attacks by an average of 85%. Statistical analysis showed that the combined use of encryption techniques and intrusion detection systems significantly improves information security. Based on the obtained results, it is recommended that organizations continuously update their information security systems and use a combination of multiple security methods to protect their data. Additionally, educating employees and raising public awareness about information security can serve as an effective tool in reducing security risks. This research demonstrates that effective and up-to-date information security management requires a comprehensive and coordinated approach, including the development and implementation of advanced techniques and continuous training of human resources.

Keywords: data protection, digital technologies, information security, modern management

Procedia PDF Downloads 10
6188 Ways for Improving Citation of the Cyrillic Publications

Authors: Victoria Y. Garnova, Vladimir G. Merzlikin, Denis G. Yakovlev, Andrei А. Amelenkov, Sergey V. Khudyakov

Abstract:

Assessment of novelty of studies submitted in Russian publications is given by the method citation analysis to identify scientific research with a high degree of innovation. This may be the basis of recommendations for subjects new joint projects setting of the RF and the EU. Apart from not the best rating of Russian publications (may even its lack) current IT ensure open access to the WEB-sites of these journals that make possible own expertise selective rapid assessment of the advanced developments in Russia by interested foreign investors. Cited foreign literature in Russian journals can become the subject of study to determine the innovative attractiveness of scientific research on the background a specific future-proof abroad. Authors introduced: (1) linguistic impact factor Li-f of journals for describing the share of publications in the majority language; (2) linguistic citation index Lact characterizing the significance of scientific research and linguistic top ones Ltop for evaluation of the spectral width of citing of foreign journals.

Keywords: citation analysis, linguistic citation indexes, linguistic impact factor, innovative projects

Procedia PDF Downloads 299
6187 The Loss of Oral Performative Semantic Influence of the Qur'an in Its Translations

Authors: Alalddin Al-Tarawneh

Abstract:

In its literal translation, the Qur’an is frequently subject to misinterpretation as a result of failures to deliver its meaning into any language. This paper relies on the genuine aspect that the Qur’an is an oral performance in its nature; and the objective of any Qur’an translation is to deliver its meaning in English. Therefore, it approaches the translation of the Qur’an beyond the usual formal linguistic approach in order to include an extra-textual factor. This factor is the recitation or oral performance of the Qur’an, that is, tajweed as it is termed in Arabic. The translations used in this paper to apply the suggested approach were carefully chosen to be representative of the problems that exist in many Qur’an translations. These translations are The Meaning of the Holy Quran: Translation and Commentary by Ali (1989), The Meaning of the Glorious Koran by Pickthall (1997/1930), and The Quran: Arabic Text with Corresponding English Meanings by Sahih (2010). Through the examples cited in this paper, it is suggested that the agents involved in producing a ‘translation’ of the Holy Qur’an have to take into account its oral aspect which yields additional senses and meanings that are not being captured by adhering to the words of the ‘written’ discourse. This paper attempts in its translation into English.

Keywords: oral performance, tajweed, Qur'an translation, recitation

Procedia PDF Downloads 133
6186 Varieties of State Role: Through the Case of East Asia's Broadband Policy

Authors: Heesu Kim

Abstract:

This paper determines the varieties of state roles played in East Asia’s telecommunication market, regarding broadband industry. Technological capacity and the relationship between state and market affect the varieties of state role. In explaining the state’s engagement in the market, technology has always been considered as a necessary and sufficient condition. However technology variable has been useful in only explaining the extent of state’s involvement. This paper contributes by bringing in the political-economic factor, which is the relationship between state and market. This factor aids in distinguishing the varieties of state role played in emerging industries. Interaction between these two variables distinguishes 4 types of state roles played in the broadband industry. These roles are distinguished and characterized by the intensity of state’s intervention and the existence of technological capacity. This paper classifies four types of state role through the case of Singapore, China, Taiwan and Korea’s broadband industrial policy.

Keywords: East Asia, entrpreneurial state, industrial policy, regulatory state, technological capacity

Procedia PDF Downloads 150
6185 Negative Pressure Waves in Hydraulic Systems

Authors: Fuad H. Veliev

Abstract:

Negative pressure phenomenon appears in many thermodynamic, geophysical and biophysical processes in the Nature and technological systems. For more than 100 years of the laboratory researches beginning from F. M. Donny’s tests, the great values of negative pressure have been achieved. But this phenomenon has not been practically applied, being only a nice lab toy due to the special demands for the purity and homogeneity of the liquids for its appearance. The possibility of creation of direct wave of negative pressure in real heterogeneous liquid systems was confirmed experimentally under the certain kinetic and hydraulic conditions. The negative pressure can be considered as the factor of both useful and destroying energies. The new approach to generation of the negative pressure waves in impure, unclean fluids has allowed the creation of principally new energy saving technologies and installations to increase the effectiveness and efficiency of different production processes. It was proved that the negative pressure is one of the main factors causing hard troubles in some technological and natural processes. Received results emphasize the necessity to take into account the role of the negative pressure as an energy factor in evaluation of many transient thermohydrodynamic processes in the Nature and production systems.

Keywords: liquid systems, negative pressure, temperature, wave, metastable state

Procedia PDF Downloads 398
6184 Platelet-Derived Growth Factor-Β Receptor/P38 Pathway May Be the Potential Liver Damage Mechanisms Caused by Saikosaponin D

Authors: Li Chen, Feng Zhang, Shizhong Zheng

Abstract:

SaikosaponinD (SSD) is a major component of saikosaponins isolated from Bupleurumfalactum. Our current study was to examine the toxic effect of SSD on liver cells and explore the possible mechanism. The results demonstrated that SSD induced mouse liver injury and led to apoptosis in LO2 cells. HE staining and TUNEL analyses showed that SSD stimulated liver injury and hepatocyte apoptosis in vivo. Subsequent experiments showed that SSD down-regulated Bcl-2 but up-regulated Bax. In vitro, SSD-treated LO2 cells exhibited apparent down-regulated expression of p-p38. Moreover, PDGF-βR agonist PDGF-BB alone significantly upregulated p38 phosphorylation, while combined with SSD, p38 phosphorylation expression was reduced. Furthermore, shRNA-mediated PDGF-βR knockdown augmented the inactivation of p-p38 and Bcl2 but abrogated the activation of Bax, these results were more obvious when shRNA combined with SSD. These data indicated that SSD stimulated liver injury and apoptosis in hepatocytes and PDGF-βR /p38 pathway may be the potential mechanistic.

Keywords: saikosaponin D, hepatotoxicity, liver injury, apoptosis, platelet-derived growth factor-β receptor, p38

Procedia PDF Downloads 383
6183 Identification of Shocks from Unconventional Monetary Policy Measures

Authors: Margarita Grushanina

Abstract:

After several prominent central banks including European Central Bank (ECB), Federal Reserve System (Fed), Bank of Japan and Bank of England employed unconventional monetary policies in the aftermath of the financial crisis of 2008-2009 the problem of identification of the effects from such policies became of great interest. One of the main difficulties in identification of shocks from unconventional monetary policy measures in structural VAR analysis is that they often are anticipated, which leads to a non-fundamental MA representation of the VAR model. Moreover, the unconventional monetary policy actions may indirectly transmit to markets information about the future stance of the interest rate, which raises a question of the plausibility of the assumption of orthogonality between shocks from unconventional and conventional policy measures. This paper offers a method of identification that takes into account the abovementioned issues. The author uses factor-augmented VARs to increase the information set and identification through heteroskedasticity of error terms and rank restrictions on the errors’ second moments’ matrix to deal with the cross-correlation of the structural shocks.

Keywords: factor-augmented VARs, identification through heteroskedasticity, monetary policy, structural VARs

Procedia PDF Downloads 331
6182 Acylated Ghrelin in Response to Aerobic Training Induced Weight Loss in Obese Men

Authors: Masoumeh Hosseini

Abstract:

Obesity is known to be associated with cardiovascular diseases and metabolic syndrome. This study aimed to assess the effect of a long term aerobic training program on serum ghrelin in obese men. For this purpose, twenty four sedentary adult obese men aged 30-40 years and body mass index 30-36 kg/m2 were participated in this study and divided randomly into exercise (3 months aerobic training, 3 times/weekly) or control (no training) groups. Serum ghrelin and cardiovascular risk factor (TG, TC, LDL, and HDL) were measured before and after treatment. Anthropometrical markers were measured at two occasions. Data were analyzed by independent-paired T-test. Significance was accepted at P < 0.05. Aerobic training resulted in significant decrease in serum ghrelin and TG in exercise group. All anthropometrical markers decreased significantly in exercise group but not in control subjects. Based on these data, it is concluded that weight loss by aerobic training can be affect serum ghrelin in obese subject, although some cardiovascular risk factor remained without changed.

Keywords: aerobic training, homeostasis, lipid profile, obesity

Procedia PDF Downloads 446
6181 Extended Strain Energy Density Criterion for Fracture Investigation of Orthotropic Materials

Authors: Mahdi Fakoor, Hannaneh Manafi Farid

Abstract:

In order to predict the fracture behavior of cracked orthotropic materials under mixed-mode loading, well-known minimum strain energy density (SED) criterion is extended. The crack is subjected along the fibers at plane strain conditions. Despite the complicities to solve the nonlinear equations which are requirements of SED criterion, SED criterion for anisotropic materials is derived. In the present research, fracture limit curve of SED criterion is depicted by a numerical solution, hence the direction of crack growth is figured out by derived criterion, MSED. The validated MSED demonstrates the improvement in prediction of fracture behavior of the materials. Also, damaged factor that plays a crucial role in the fracture behavior of quasi-brittle materials is derived from this criterion and proved its dependency on mechanical properties and direction of crack growth.

Keywords: mixed-mode fracture, minimum strain energy density criterion, orthotropic materials, fracture limit curve, mode II critical stress intensity factor

Procedia PDF Downloads 149
6180 Computational Analysis of Thermal Degradation in Wind Turbine Spars' Equipotential Bonding Subjected to Lightning Strikes

Authors: Antonio A. M. Laudani, Igor O. Golosnoy, Ole T. Thomsen

Abstract:

Rotor blades of large, modern wind turbines are highly susceptible to downward lightning strikes, as well as to triggering upward lightning; consequently, it is necessary to equip them with an effective lightning protection system (LPS) in order to avoid any damage. The performance of existing LPSs is affected by carbon fibre reinforced polymer (CFRP) structures, which lead to lightning-induced damage in the blades, e.g. via electrical sparks. A solution to prevent internal arcing would be to electrically bond the LPS and the composite structures such that to obtain the same electric potential. Nevertheless, elevated temperatures are achieved at the joint interfaces because of high contact resistance, which melts and vaporises some of the epoxy resin matrix around the bonding. The produced high-pressure gasses open up the bonding and can ignite thermal sparks. The objective of this paper is to predict the current density distribution and the temperature field in the adhesive joint cross-section, in order to check whether the resin pyrolysis temperature is achieved and any damage is expected. The finite element method has been employed to solve both the current and heat transfer problems, which are considered weakly coupled. The mathematical model for electric current includes Maxwell-Ampere equation for induced electric field solved together with current conservation, while the thermal field is found from heat diffusion equation. In this way, the current sub-model calculates Joule heat release for a chosen bonding configuration, whereas the thermal analysis allows to determining threshold values of voltage and current density not to be exceeded in order to maintain the temperature across the joint below the pyrolysis temperature, therefore preventing the occurrence of outgassing. In addition, it provides an indication of the minimal number of bonding points. It is worth to mention that the numerical procedures presented in this study can be tailored and applied to any type of joints other than adhesive ones for wind turbine blades. For instance, they can be applied for lightning protection of aerospace bolted joints. Furthermore, they can even be customized to predict the electromagnetic response under lightning strikes of other wind turbine systems, such as nacelle and hub components.

Keywords: carbon fibre reinforced polymer, equipotential bonding, finite element method, FEM, lightning protection system, LPS, wind turbine blades

Procedia PDF Downloads 143
6179 The Effect of Support Program Based on The Health Belief Model on Reproductive Health Behavior in Women with Orthopedic Disabled

Authors: Eda Yakit Ak, Ergül Aslan

Abstract:

The study was conducted using the quasi-experimental design to determine the influence of the nursing support program prepared according to the Health Belief Model on reproductive health behaviors of orthopedically disabled women in the physical therapy and rehabilitation clinic at a university hospital between August 2019-October, 2020. The research sample included 50 women (35 in the control group and 15 in the experimental group with orthopedic disability). A 3-week nursing support program was applied to the experimental group of women. To collect the data, Introductory Information Form and Scale for Determining the Protective Attitudes of Married Women towards Reproductive Health (SDPAMW) were applied. The evaluation was made with a follow-up form for four months. In the first evaluation, the total SDPAMW scores were 119.93±20.59 for the experimental group and 122.20±16.71 for the control group. In the final evaluation, the total SDPAMW scores were 144.27±11.95 for the experimental group and 118.00±16.43 for the control group. The difference between the groups regarding the first and final evaluations for the total SDPAMW scores was statistically significant (p<0.01). In the experimental group, between the first and final evaluations regarding the sub-dimensions of SDPAMW, an increase was found in the behavior of seeing the doctor on reproductive health issues, protection from reproductive organ and breast cancer, general health behaviors to protect reproductive health, and protection from genital tract infections (p<0.05). Consequently, the nursing support program based on the Health Belief Model applied to orthopedically disabled women positively affected reproductive health behaviors.

Keywords: orthopedically disabled, woman, reproductive health, nursing support program, health belief model

Procedia PDF Downloads 126
6178 Stress-Controlled Senescence and Development in Arabidopsis thaliana by Root Associated Factor (RAF), a NAC Transcription Regulator

Authors: Iman Kamranfar, Gang-Ping Xue, Salma Balazadeh, Bernd Mueller-Roeber

Abstract:

Adverse environmental conditions such as salinity stress, high temperature and drought limit plant growth and typically lead to precocious tissue degeneration and leaf senescence, a process by which nutrients from photosynthetic organs are recycled for the formation of flowers and seeds to secure reaching the next generation under such harmful conditions. In addition, abiotic stress affects developmental patterns that help the plant to withstand unfavourable environmental conditions. We discovered an NAC (for NAM, ATAF1, 2, and CUC2) transcription factor (TF), called RAF in the following, which plays a central role in abiotic drought stress-triggered senescence and the control of developmental adaptations to stressful environments. RAF is an ABA-responsive TF; RAF overexpressors are hypersensitive to abscisic acid (ABA) and exhibit precocious senescence while knock-out mutants show delayed senescence. To explore the RAF gene regulatory network (GRN), we determined its preferred DNA binding sites by binding site selection assay (BSSA) and performed microarray-based expression profiling using inducible RAF overexpression lines and chromatin immunoprecipitation (ChIP)-PCR. Our studies identified several direct target genes, including those encoding for catabolic enzymes acting during stress-induced senescence. Furthermore, we identified various genes controlling drought stress-related developmental changes. Based on our results, we conclude that RAF functions as a central transcriptional regulator that coordinates developmental programs with stress-related inputs from the environment. To explore the potential agricultural applications of our findings, we are currently extending our studies towards crop species.

Keywords: abiotic stress, Arabidopsis, development, transcription factor

Procedia PDF Downloads 175
6177 Analysis and Design Modeling for Next Generation Network Intrusion Detection and Prevention System

Authors: Nareshkumar Harale, B. B. Meshram

Abstract:

The continued exponential growth of successful cyber intrusions against today’s businesses has made it abundantly clear that traditional perimeter security measures are no longer adequate and effective. We evolved the network trust architecture from trust-untrust to Zero-Trust, With Zero Trust, essential security capabilities are deployed in a way that provides policy enforcement and protection for all users, devices, applications, data resources, and the communications traffic between them, regardless of their location. Information exchange over the Internet, in spite of inclusion of advanced security controls, is always under innovative, inventive and prone to cyberattacks. TCP/IP protocol stack, the adapted standard for communication over network, suffers from inherent design vulnerabilities such as communication and session management protocols, routing protocols and security protocols are the major cause of major attacks. With the explosion of cyber security threats, such as viruses, worms, rootkits, malwares, Denial of Service attacks, accomplishing efficient and effective intrusion detection and prevention is become crucial and challenging too. In this paper, we propose a design and analysis model for next generation network intrusion detection and protection system as part of layered security strategy. The proposed system design provides intrusion detection for wide range of attacks with layered architecture and framework. The proposed network intrusion classification framework deals with cyberattacks on standard TCP/IP protocol, routing protocols and security protocols. It thereby forms the basis for detection of attack classes and applies signature based matching for known cyberattacks and data mining based machine learning approaches for unknown cyberattacks. Our proposed implemented software can effectively detect attacks even when malicious connections are hidden within normal events. The unsupervised learning algorithm applied to network audit data trails results in unknown intrusion detection. Association rule mining algorithms generate new rules from collected audit trail data resulting in increased intrusion prevention though integrated firewall systems. Intrusion response mechanisms can be initiated in real-time thereby minimizing the impact of network intrusions. Finally, we have shown that our approach can be validated and how the analysis results can be used for detecting and protection from the new network anomalies.

Keywords: network intrusion detection, network intrusion prevention, association rule mining, system analysis and design

Procedia PDF Downloads 213
6176 Study of Laminar Convective Heat Transfer, Friction Factor, and Pumping Power Advantage of Aluminum Oxide-Water Nanofluid through a Channel

Authors: M. Insiat Islam Rabby, M. Mahbubur Rahman, Eshanul Islam, A. K. M. Sadrul Islam

Abstract:

The numerical and simulative analysis of laminar heat exchange convection of aluminum oxide (Al₂O₃) - water nanofluid for the developed region through two parallel plates is presented in this present work. The second order single phase energy equation, mass and momentum equation are solved by using finite volume method with the ANSYS FLUENT 16 software. The distance between two parallel plates is 4 mm and length is 600 mm. Aluminum oxide (Al₂O₃) is used as nanoparticle and water is used as the base/working fluid for the investigation. At the time of simulation 1% to 5% volume concentrations of the Al₂O₃ nanoparticles are used for mixing with water to produce nanofluid and a wide range of interval of Reynolds number from 500 to 1100 at constant heat flux 500 W/m² at the channel wall has also been introduced. The result reveals that for increasing the Reynolds number the Nusselt number and heat transfer coefficient are increased linearly and friction factor decreased linearly in the developed region for both water and Al₂O₃-H₂O nanofluid. By increasing the volume fraction of Al₂O₃-H₂O nanofluid from 1% to 5% the value of Nusselt number increased rapidly from 0.7 to 7.32%, heat transfer coefficient increased 7.14% to 31.5% and friction factor increased very little from 0.1% to 4% for constant Reynolds number compared to pure water. At constant heat transfer coefficient 700 W/m2-K the pumping power advantages have been achieved 20% for 1% volume concentration and 62% for 3% volume concentration of nanofluid compared to pure water.

Keywords: convective heat transfer, pumping power, constant heat flux, nanofluid, nanoparticles, volume concentration, thermal conductivity

Procedia PDF Downloads 146
6175 3D-Printed Collagen/Chitosan Scaffolds Loaded with Exosomes Derived from Neural Stem Cells Pretreated with Insulin Growth Factor-1 for Neural Regeneration after Traumatic Brain Injury

Authors: Xiao-Yin Liu, Liang-Xue Zhou

Abstract:

Traumatic brain injury (TBI), as a kind of nerve trauma caused by an external force, affects people all over the world and is a global public health problem. Although there are various clinical treatments for brain injury, including surgery, drug therapy, and rehabilitation therapy, the therapeutic effect is very limited. To improve the therapeutic effect of TBI, scaffolds combined with exosomes are a promising but challenging method for TBI repair. In this study, we examined whether a novel 3D-printed collagen/chitosan scaffold/exosomes derived from neural stem cells (NSCs) pretreated with insulin growth factor-1 (IGF-I) scaffolds (3D-CC-INExos) could be used to improve TBI repair and functional recovery after TBI. Our results showed that composite scaffolds of collagen-, chitosan- and exosomes derived from NSCs pretreated with IGF-I (INExos) could continuously release the exosomes for two weeks. In the rat TBI model, 3D-CC-INExos scaffold transplantation significantly improved motor and cognitive function after TBI, as assessed by the Morris water maze test and modified neurological severity scores. In addition, immunofluorescence staining and transmission electron microscopy showed that the recovery of damaged nerve tissue in the injured area was significantly improved by 3D-CC-INExos implantation. In conclusion, our data suggest that 3D-CC-INExos might provide a potential strategy for the treatment of TBI and lay a solid foundation for clinical translation.

Keywords: traumatic brain injury, exosomes, insulin growth factor-1, neural stem cells, collagen, chitosan, 3D printing, neural regeneration, angiogenesis, functional recovery

Procedia PDF Downloads 58
6174 Statistical Optimization of Vanillin Production by Pycnoporus Cinnabarinus 1181

Authors: Swarali Hingse, Shraddha Digole, Uday Annapure

Abstract:

The present study investigates the biotransformation of ferulic acid to vanillin by Pycnoporus cinnabarinus and its optimization using one-factor-at-a-time method as well as statistical approach. Effect of various physicochemical parameters and medium components was studied using one-factor-at-a-time method. Screening of the significant factors was carried out using L25 Taguchi orthogonal array and then these selected significant factors were further optimized using response surface methodology (RSM). Significant media components obtained using Taguchi L25 orthogonal array were glucose, KH2PO4 and yeast extract. Further, a Box Behnken design was used to investigate the interactive effects of the three most significant media components. The final medium obtained after optimization using RSM containing glucose (34.89 g/L), diammonium tartrate (1 g/L), yeast extract (1.47 g/L), MgSO4•7H2O (0.5 g/L), KH2PO4 (0.15 g/L), and CaCl2•2H2O (20 mg/L) resulted in amplification of vanillin production from 30.88 mg/L to 187.63 mg/L.

Keywords: ferulic acid, pycnoporus cinnabarinus, response surface methodology, vanillin

Procedia PDF Downloads 361
6173 Dimethyl fumarate Alleviates Valproic Acid-Induced Autism in Wistar Rats via Activating NRF-2 and Inhibiting NF-κB Pathways

Authors: Sandy Elsayed, Aya Mohamed, Noha Nassar

Abstract:

Introduction: Autism spectrum disorder (ASD) is a neurodevelopmental disorder characterized by social deficits and repetitive behavior. Multiple studies suggest that oxidative stress and neuroinflammation are key factors in the etiology of ASD and often associated with worsening of ASD-related behaviors. Nuclear factor erythroid 2-related factor 2 (NRF-2) is a transcription factor that promotes expression of antioxidant response element genes in oxidative stress. In ASD subjects, decreased expression of NRF-2 in frontal cortex shifted the redox homeostasis towards oxidative stress, and resulted in inflammation evidenced by elevation of nuclear factor kappa B (NF-κB) transcriptional activity. Dimethyl fumarate (DMF) is a NRF-2 activator that is used in the treatment of psoriasis and multiple sclerosis. It participates in the transcriptional control of inflammatory factors via inhibition of NF-κB and its downstream targets. This study aimed to investigate the role of DMF in alleviating the cognitive impairments and behavior deficits associated with ASD through mitigation of oxidative stress and inflammation in prenatal valproic acid (VPA) rat model of autism. Methods: Pregnant female Wistar rats received a single intraperitoneal injection of VPA (600 mg/kg) to induce autistic-like-behavioral and neurobiological alterations in their offspring. Chronic oral gavage of DMF (150mg/kg/day) started from postnatal day (PND) 24 till PND62 (39 days). Prenatal VPA exposure elicited autistic behaviors including decreased social interaction and stereotyped behavior. Social interaction was evaluated using three-chamber sociability test and calculation of sociability index (SI), while stereotyped repetitive behavior and anxiety associated with ASD were assessed using marble burying test (MBT). Biochemical analyses were done on prefrontal cortex homogenates including NRF-2, and NF-κB expression. Moreover, inducible nitric oxide synthase (iNOS) gene expression and tumor necrosis factor (TNF-) protein expression were evaluated as markers of inflammation. Results: Prenatal VPA elicited decreased social interaction shown by decreased SI compared to control group (p < 0.001) and DMF enhanced SI (p < 0.05). In MBT, prenatal injection of VPA manifested stereotyped behavior and enhanced number of buried marbles compared to control (p < 0.05) and DMF reduced the anxiety-related behavior in rats exhibiting ASD-like behaviors (p < 0.05). In prefrontal cortex, NRF-2 expression was downregulated in prenatal VPA model (p < 0.0001) and DMF reversed this effect (p < 0.0001). The inflammatory transcription factor NF-κB was elevated in prenatal VPA model (p < 0.0001) and reduced (p < 0.0001) upon NRF-2 activation by DMF. Prenatal VPA expressed higher levels of proinflammatory cytokine TNF- compared to control group (p < 0.0001) and DMF reduced it (p < 0.0001). Finally, the gene expression of iNOS was downregulated upon NRF-2 activation by DMF (p < 0.01). Conclusion: This study proposes that DMF is a potential agent that can be used to ameliorate autistic-like-changes through NRF-2 activation along with NF-κB downregulation and therefore, it is a promising novel therapy for ASD.

Keywords: autism spectrum disorders, dimethyl fumarate, neuroinflammation, NRF-2

Procedia PDF Downloads 18
6172 Evolution of DNA-Binding With-One-Finger Transcriptional Factor Family in Diploid Cotton Gossypium raimondii

Authors: Waqas Shafqat Chattha, Muhammad Iqbal, Amir Shakeel

Abstract:

Transcriptional factors are proteins that play a vital role in regulating the transcription of target genes in different biological processes and are being widely studied in different plant species. In the current era of genomics, plant genomes sequencing has directed to the genome-wide identification, analyses and categorization of diverse transcription factor families and hence provide key insights into their structural as well as functional diversity. The DNA-binding with One Finger (DOF) proteins belongs to C2-C2-type zinc finger protein family. DOF proteins are plant-specific transcription factors implicated in diverse functions including seed maturation and germination, phytohormone signalling, light-mediated gene regulation, cotton-fiber elongation and responses of the plant to biotic as well as abiotic stresses. In this context, a genome-wide in-silico analysis of DOF TF family in diploid cotton species i.e. Gossypium raimondii has enabled us to identify 55 non-redundant genes encoding DOF proteins renamed as GrDofs (Gossypium raimondii Dof). Gene distribution studies have shown that all of the GrDof genes are unevenly distributed across 12 out of 13 G. raimondii chromosomes. The gene structure analysis illustrated that 34 out of 55 GrDof genes are intron-less while remaining 21 genes have a single intron. Protein sequence-based phylogenetic analysis of putative 55 GrDOFs has divided these proteins into 5 major groups with various paralogous gene pairs. Molecular evolutionary studies aided with the conserved domain as well as gene structure analysis suggested that segmental duplications were the principal contributors for the expansion of Dof genes in G. raimondii.

Keywords: diploid cotton , G. raimondii, phylogenetic analysis, transcription factor

Procedia PDF Downloads 126
6171 The Yak of Thailand: Folk Icons Transcending Culture, Religion, and Media

Authors: David M. Lucas, Charles W. Jarrett

Abstract:

In the culture of Thailand, the Yak serve as a mediated icon representing strength, power, and mystical protection not only for the Buddha, but for population of worshipers. Originating from the forests of China, the Yak continue to stand guard at the gates of Buddhist temples. The Yak represents Thai culture in the hearts of Thai people. This paper presents a qualitative study regarding the curious mix of media, culture, and religion that projects the Yak of Thailand as a larger than life message throughout the political, cultural, and religious spheres. The gate guardians, or gods as they are sometimes called, appear throughout the religious temples of Asian cultures. However, the Asian cultures demonstrate differences in artistic renditions (or presentations) of such sentinels. Thailand gate guards (the Yak) stand in front of many Buddhist temples, and these iconic figures display unique features with varied symbolic significance. The temple (or wat), plays a vital role in every community; and, for many people, Thailand’s temples are the country’s most endearing sights. The authors applied folk-nography as a methodology to illustrate the importance of the Thai Yak in serving as meaningful icons that transcend not only time, but the culture, religion, and mass media. The Yak represent mythical, religious, artistic, cultural, and militaristic significance for the Thai people. Data collection included interviews, focus groups, and natural observations. This paper summarizes the perceptions of the Thai people concerning their gate sentries and the relationship, communication, connection, and the enduring respect that Thai people hold for their guardians of the gates.

Keywords: communication, culture, folknography, icon, image, media, protection, religion, yak

Procedia PDF Downloads 384
6170 The International Constitutional Order and Elements of Human Rights

Authors: Girma Y. Iyassu Menelik

Abstract:

“The world is now like a global village!” so goes the saying that shows that due to development and technology the countries of the world are now closely linked. In the field of Human rights there is a close relationship in the way that rights are recognised and enforced. This paper will show that human rights have evolved from ancient times through important landmarks such as the Magna Carta, the French Declaration of Rights of Man and of the Citizen and the American Bill of Rights. The formation of the United Nations after the Second World War resulted in the need to codify and protect human rights. There are some rights which are so fundamental that they are found in international and continental instruments, national constitutions and domestic legislation. In the civil and political sphere they include the right to vote, to freedom of association, speech and assembly, right to life, privacy and fair trial. In the economic and social sphere you have the right to work, protection of the family, social security and rights to education, health and shelter. In some instance some rights can be suspended in times of public emergency but such derogations shall be circumscribed by the law and in most constitutions such limitations are subject to judicial review. However, some rights are so crucial that they cannot be derogated from under any circumstances and these include the right to life, recognition before the law, freedom from torture and slavery and of thought, conscience and religion. International jurisprudence has been developed to protect fundamental rights and avoid discrimination on the grounds of race, colour, sex, language or social origin. The elaborate protection system go to show that these rights have become part of the international order and they have universal application. We have now got to a stage where UDHR, ICCPR and ICESCR and have come to be regarded as part of an international bill of rights with horizontal and vertical enforcement mechanisms involving state parties, NGO’s , international bodies and other organs.

Keywords: rights, international, constitutional, state, judiciary

Procedia PDF Downloads 432