Search results for: bloom's taxonomy
101 Response of Chickpea (Cicer arietinum L.) Genotypes to Drought Stress at Different Growth Stages
Authors: Ali. Marjani, M. Farsi, M. Rahimizadeh
Abstract:
Chickpea (Cicer arietinum L.) is one of the important grain legume crops in the world. However, drought stress is a serious threat to chickpea production, and development of drought-resistant varieties is a necessity. Field experiments were conducted to evaluate the response of 8 chickpea genotypes (MCC* 696, 537, 80, 283, 392, 361, 252, 397) and drought stress (S1: non-stress, S2: stress at vegetative growth stage, S3: stress at early bloom, S4: stress at early pod visible) at different growth stages. Experiment was arranged in split plot design with four replications. Difference among the drought stress time was found to be significant for investigated traits except biological yield. Differences were observed for genotypes in flowering time, pod information time, physiological maturation time and yield. Plant height reduced due to drought stress in vegetative growth stage. Stem dry weight reduced due to drought stress in pod visibly. Flowering time, maturation time, pod number, number of seed per plant and yield cause of drought stress in flowering was also reduced. The correlation between yield and number of seed per plant and biological yield was positive. The MCC283 and MCC696 were the high-tolerance genotypes. These results demonstrated that drought stress delayed phonological growth in chickpea and that flowering stage is sensitive.Keywords: chickpea, drought stress, growth stage, tolerance
Procedia PDF Downloads 261100 Ex Situ Conservation Practices for Rare Plants in Living Collections
Authors: Erika Pénzesné Kónya
Abstract:
The conservation programme of various vascular plant species has been started in the Botanical garden o fEszterházy College in Eger cooperating with two national parks in the Northern mountain region and Botanical garden of Eötvös Lóránd University in Budapest. The seeds of the species were collected in the chosen habitats with the permission determined by the National Parks and the conservation specialists. Now we have different numbers of individuals from mainly endemic and relict species. We took some experiments to know how can we germinate and grow up this species succesfully up to blooming and fruiting. In the temperate zone the majority of species after ripening the seeds or corps get dormancy to avoid the inadequate period to germinate. The seeds of species need variously pre-treatment (for example pre-chill) and suitable environment (for example basic medium) to unlock the seed dormancy and germinate in large scale. This impacts are often similar to in their originally habitat. To bloom the plants need suitable types of soil, but we couldn’t grow them in the most fruitful soil of habitat. Suitable microclimate is usually more important for some relict species than the soil, that’s why should we make experiments to find the suitable essential conditions for different species and know all of fenological states of them. These experiments can start a method for growing common wild native plants as food materials.Keywords: ex situ conservation, germination success, soil preference Hungary, regionality, native wild plants
Procedia PDF Downloads 29099 Variation of Phytoplankton Biomass in the East China Sea Based on MODIS Data
Authors: Yumei Wu, Xiaoyan Dang, Shenglong Yang, Shengmao Zhang
Abstract:
The East China Sea is one of four main seas in China, where there are many fishery resources. Some important fishing grounds, such as Zhousan fishing ground important to society. But the eco-environment is destroyed seriously due to the rapid developing of industry and economy these years. In this paper, about twenty-year satellite data from MODIS and the statistical information of marine environment from the China marine environmental quality bulletin were applied to do the research. The chlorophyll-a concentration data from MODIS were dealt with in the East China Sea and then used to analyze the features and variations of plankton biomass in recent years. The statistics method was used to obtain their spatial and temporal features. The plankton biomass in the Yangtze River estuary and the Taizhou region were highest. The high phytoplankton biomass usually appeared between the 88th day to the 240th day (end-March - August). In the peak time of phytoplankton blooms, the Taizhou islands was the earliest, and the South China Sea was the latest. The intensity and period of phytoplankton blooms were connected with the global climate change. This work give us confidence to use satellite data to do more researches about the China Sea, and it also provides some help for us to know about the eco-environmental variation of the East China Sea and regional effect from global climate change.Keywords: the East China Sea, phytoplankton biomass, temporal and spatial variation, phytoplankton bloom
Procedia PDF Downloads 32998 Description of a New Fruit Fly Species within Genus Bactrocera Macquart (Diptera: Tephritidae: Dacinae) Detected in Pakistan
Authors: Muhammad Riaz, Muhammad Sarwar
Abstract:
As a result of broad trapping program for the collection of fruit flies fauna of Pakistan, adults or larvae samples of fruit flies were collected from different localities. After sampling, to characterize fruit fly fauna involved, the collected samples were brought to the laboratory for their species identification. In this study, based on extensive literature records, the presence of one fruit fly species Bactrocera abbasi (Diptera: Tephritidae: Dacinae) belonging to genus Bactrocera Macquar was recognized for the first time. This new species is described and illustrated on the basis of morphological characters, supported by data on its ecology and geographic distribution. Information is also given on host plant and location of type specimen, distinguish remarks and diagnosis are as well included.Keywords: diptera, tephritidae, bactrocera, new species, taxonomy, Pakistan
Procedia PDF Downloads 35597 Under the Veneer of Words Lies Power: Foucauldian Analysis of Oleanna
Authors: Diba Arjmandi
Abstract:
The notion of power and gender domination is one of the inseparable aspects of themes in postmodern literature. The reason of its importance has been discussed frequently since the rise of Michel Foucault and his vantage point toward the circulation of power and the transgression of forces. The language and society act as the basic grounds for the study, as all human beings are bound to the set of rules and norms which shape them in the acceptable way in the macrocosm. How different genders in different positions behave and show reactions to the provocation of social forces and superiority of one another, is of great interest to writers and literary critics. Mamet’s works are noticeable for their controversial but timely themes which illustrate the human conflict with the community and greed for power. Many critics like Christopher Bigsby and Harold Bloom have been discussing Mamet and his ideas during recent years. This paper is the study of Oleanna, Mamet’s masterpiece about teacher-student relationship and the circulation of power between a man and woman. He shows the very breakable boundaries in domination of a gender and the downfall of speech as the consequence of transgression and freedom. The failure of the language the teacher uses and the abuses of his own words by a student who seeks superiority and knowledge are the main subjects of discussion. Supported by the ideas of Foucault, the language Mamet uses to represent his characters becomes the fundamental element of this survey. As a result, language becomes both the means of achievement and also downfall.Keywords: domination, foucault, language, mamet, oleanna, power, transgression
Procedia PDF Downloads 48596 Taxonomy of Threats and Vulnerabilities in Smart Grid Networks
Authors: Faisal Al Yahmadi, Muhammad R. Ahmed
Abstract:
Electric power is a fundamental necessity in the 21st century. Consequently, any break in electric power is probably going to affect the general activity. To make the power supply smooth and efficient, a smart grid network is introduced which uses communication technology. In any communication network, security is essential. It has been observed from several recent incidents that adversary causes an interruption to the operation of networks. In order to resolve the issues, it is vital to understand the threats and vulnerabilities associated with the smart grid networks. In this paper, we have investigated the threats and vulnerabilities in Smart Grid Networks (SGN) and the few solutions in the literature. Proposed solutions showed developments in electricity theft countermeasures, Denial of services attacks (DoS) and malicious injection attacks detection model, as well as malicious nodes detection using watchdog like techniques and other solutions.Keywords: smart grid network, security, threats, vulnerabilities
Procedia PDF Downloads 13995 Classification of Construction Projects
Authors: M. Safa, A. Sabet, S. MacGillivray, M. Davidson, K. Kaczmarczyk, C. T. Haas, G. E. Gibson, D. Rayside
Abstract:
To address construction project requirements and specifications, scholars and practitioners need to establish a taxonomy according to a scheme that best fits their need. While existing characterization methods are continuously being improved, new ones are devised to cover project properties which have not been previously addressed. One such method, the Project Definition Rating Index (PDRI), has received limited consideration strictly as a classification scheme. Developed by the Construction Industry Institute (CII) in 1996, the PDRI has been refined over the last two decades as a method for evaluating a project's scope definition completeness during front-end planning (FEP). The main contribution of this study is a review of practical project classification methods, and a discussion of how PDRI can be used to classify projects based on their readiness in the FEP phase. The proposed model has been applied to 59 construction projects in Ontario, and the results are discussed.Keywords: project classification, project definition rating index (PDRI), risk, project goals alignment
Procedia PDF Downloads 67794 The Study of Biodiversity of Thirty Two Families of Useful Plants Existed in Georgia
Authors: Kacharava Tamar, Korakhashvili Avtandil, Epitashvili Tinatin
Abstract:
The article deals with the database, which was created by the authors, related to biodiversity of some families of useful plants (medicinal, aromatic, spices, dye and poisonous) existing in Georgia considering important taxonomy. Our country is also rich with endemic genera. The results of monitoring of the phytogenetic resources to reveal perspective species and situation of endemic species and resources are also discussed in this paper. To get some new medicinal and preventive treatments using plant raw material in the phytomedicine, phytocosmetics and phytoculinary, the unique phytogenetic resources should be protected because the application of useful plants is becoming irreversible. This can be observed along with intensification and sustainable use of ethnobotanical traditions and promotion of phytoproduction based on the international requirements on biodiversity (Convention on Biological Diversity - CBD). Though Georgian phytopharmacy has the centuries-old traditions, today it is becoming the main concern.Keywords: aromatic, medicinal, poisonous, spicy, dye plants, endemic biodiversity, endemic, ELISA, GIS
Procedia PDF Downloads 15793 Genetic Diversity of Termite (Isoptera) Fauna of Western Ghats of India
Authors: A. S. Vidyashree, C. M. Kalleshwaraswamy, R. Asokan, H. M. Mahadevaswamy
Abstract:
Termites are very vital ecological thespians in tropical ecosystem, having been designated as “ecosystem engineers”, due to their significant role in providing soil ecosystem services. Despite their importance, our understanding of a number of their basic biological processes in termites is extremely limited. Developing a better understanding of termite biology is closely dependent upon consistent species identification. At present, identification of termites is relied on soldier castes. But for many species, soldier caste is not reported, that creates confusion in identification. The use of molecular markers may be helpful in estimating phylogenetic relatedness between the termite species and estimating genetic differentiation among local populations within each species. To understand this, termites samples were collected from various places of Western Ghats covering four states namely Karnataka, Kerala, Tamil Nadu, Maharashtra during 2013-15. Termite samples were identified based on their morphological characteristics, molecular characteristics, or both. Survey on the termite fauna in Karnataka, Kerala, Maharashtra and Tamil Nadu indicated the presence of a 16 species belongs to 4 subfamilies under two families viz., Rhinotermitidae and Termitidae. Termititidae was the dominant family which was belonging to 4 genera and four subfamilies viz., Macrotermitinae, Amitermitinae, Nasutitermitinae and Termitinae. Amitermitinae had three species namely, Microcerotermes fletcheri, M. pakistanicus and Speculitermes sinhalensis. Macrotermitinae had the highest number of species belonging two genera, namely Microtermes and Odontotermes. Microtermes genus was with only one species i.e., Microtermes obesi. The genus Odontotermes was represented by the highest number of species (07), namely, O. obesus was the dominant (41 per cent) and the most widely distributed species in Karnataka, Karala, Maharashtra and Tamil nadu followed by O. feae (19 per cent), O.assmuthi (11 per cent) and others like O. bellahunisensis O. horni O. redemanni, O. yadevi. Nasutitermitinae was represented by two genera namely Nasutitermes anamalaiensis and Trinervitermes biformis. Termitinae subfamily was represented by Labiocapritermes distortus. Rhinotermitidae was represented by single subfamily Heterotermetinae. In Heterotermetinae, two species namely Heterotermes balwanthi and H. malabaricus were recorded. Genetic relationship among termites collected from various locations of Western Ghats of India was characterized based on mitochondrial DNA sequences (12S, 16S, and COII). Sequence analysis and divergence among the species was assessed. These results suggest that the use of both molecular and morphological approaches is crucial in ensuring accurate species identification. Efforts were made to understand their evolution and to address the ambiguities in morphological taxonomy. The implication of the study in revising the taxonomy of Indian termites, their characterization and molecular comparisons between the sequences are discussed.Keywords: isoptera, mitochondrial DNA sequences, rhinotermitidae, termitidae, Western ghats
Procedia PDF Downloads 26692 Distribution and Diversity of Pyrenocarpous Lichens in India with Special Reference to Forest Health
Authors: Gaurav Kumar Mishra, Sanjeeva Nayaka, Dalip Kumar Upreti
Abstract:
Our nature exhibited presence of a number of unique plants which can be used as indicator of environmental condition of particular place. Lichens are unique plant which has an ability to absorb not only organic, inorganic and metaloties but also absorb radioactive nuclide substances present in the environment. In the present study pyrenocarpous lichens will used as indicator of good forest health in a particular place. The Pyrenocarpous lichens are simple crust forming with black dot like perithecia have few characters for their taxonomical segregation as compared to their foliose and fruticose brethrean. The thallus colour and nature, presence and absence of hypothallus are only few characters of thallus are used to segregate the pyrenocarpous taxa. The fruiting bodies of pyrenolichens i.e. ascocarps are perithecia. The perithecia and the contents found within them posses many important criteria for the segregation of pyrenocarpous lichen taxa. The ascocarp morphology, ascocarp arrangement, the perithecial wall, ascocarp shape and colour, ostiole shape and position, ostiole colour, ascocarp anatomy including type of paraphyses, asci shape and size, ascospores septation, ascospores wall and periphyses are the valuable charcters used for segregation of different pyrenocarpous lichen taxa. India is represented by the occurrence of the 350 species of 44 genera and eleven families. Among the different genera Pyrenula is dominant with 82 species followed by the Porina with 70 species. Recently, systematic of the pyrenocarpous lichens have been revised by American and European lichenologists using phylogenetic methods. Still the taxonomy of pyrenocarpous lichens is in flux and information generated after the completion of this study will play vital role in settlement of the taxonomy of this peculiar group of lichens worldwide. The Indian Himalayan region exhibit rich diversity of pyrenocarpous lichens in India. The western Himalayan region has luxuriance of pyrenocarpous lichens due to its unique topography and climate condition. However, the eastern Himalayan region has rich diversity of pyrenocarpous lichens due to its warmer and moist climate condition. The rich moist and warmer climate in eastern Himalayan region supports forest with dominance of evergreen tree vegetation. The pyrenocarpous lichens communities are good indicator of young and regenerated forest type. The rich diversity of lichens clearly indicates that moist of the forest within the eastern Himalayan region has good health of forest. Due to fast pace of urbanization and other developmental activities will defiantly have adverse effects on the diversity and distribution of pyrenocarpous lichens in different forest type and the present distribution pattern will act as baseline data for carried out future biomonitoring studies in the area.Keywords: lichen diversity, indicator species, environmental factors, pyrenocarpous
Procedia PDF Downloads 14791 Three-Dimensional Model of Leisure Activities: Activity, Relationship, and Expertise
Authors: Taekyun Hur, Yoonyoung Kim, Junkyu Lim
Abstract:
Previous works on leisure activities had been categorizing activities arbitrarily and subjectively while focusing on a single dimension (e.g. active-passive, individual-group). To overcome these problems, this study proposed a Korean leisure activities’ matrix model that considered multidimensional features of leisure activities, which was comprised of 3 main factors and 6 sub factors: (a) Active (physical, mental), (b) Relational (quantity, quality), (c) Expert (entry barrier, possibility of improving). We developed items for measuring the degree of each dimension for every leisure activity. Using the developed Leisure Activities Dimensions (LAD) questionnaire, we investigated the presented dimensions of a total of 78 leisure activities which had been enjoyed by most Koreans recently (e.g. watching movie, taking a walk, watching media). The study sample consisted of 1348 people (726 men, 658 women) ranging in age from teenagers to elderlies in their seventies. This study gathered 60 data for each leisure activity, a total of 4860 data, which were used for statistical analysis. First, this study compared 3-factor model (Activity, Relation, Expertise) fit with 6-factor model (physical activity, mental activity, relational quantity, relational quality, entry barrier, possibility of improving) fit by using confirmatory factor analysis. Based on several goodness-of-fit indicators, the 6-factor model for leisure activities was a better fit for the data. This result indicates that it is adequate to take account of enough dimensions of leisure activities (6-dimensions in our study) to specifically apprehend each leisure attributes. In addition, the 78 leisure activities were cluster-analyzed with the scores calculated based on the 6-factor model, which resulted in 8 leisure activity groups. Cluster 1 (e.g. group sports, group musical activity) and Cluster 5 (e.g. individual sports) had generally higher scores on all dimensions than others, but Cluster 5 had lower relational quantity than Cluster 1. In contrast, Cluster 3 (e.g. SNS, shopping) and Cluster 6 (e.g. playing a lottery, taking a nap) had low scores on a whole, though Cluster 3 showed medium levels of relational quantity and quality. Cluster 2 (e.g. machine operating, handwork/invention) required high expertise and mental activity, but low physical activity. Cluster 4 indicated high mental activity and relational quantity despite low expertise. Cluster 7 (e.g. tour, joining festival) required not only moderate degrees of physical activity and relation, but low expertise. Lastly, Cluster 8 (e.g. meditation, information searching) had the appearance of high mental activity. Even though clusters of our study had a few similarities with preexisting taxonomy of leisure activities, there was clear distinctiveness between them. Unlike the preexisting taxonomy that had been created subjectively, we assorted 78 leisure activities based on objective figures of 6-dimensions. We also could identify that some leisure activities, which used to belong to the same leisure group, were included in different clusters (e.g. filed ball sports, net sports) because of different features. In other words, the results can provide a different perspective on leisure activities research and be helpful for figuring out what various characteristics leisure participants have.Keywords: leisure, dimensional model, activity, relationship, expertise
Procedia PDF Downloads 31090 Understanding and Improving Neural Network Weight Initialization
Authors: Diego Aguirre, Olac Fuentes
Abstract:
In this paper, we present a taxonomy of weight initialization schemes used in deep learning. We survey the most representative techniques in each class and compare them in terms of overhead cost, convergence rate, and applicability. We also introduce a new weight initialization scheme. In this technique, we perform an initial feedforward pass through the network using an initialization mini-batch. Using statistics obtained from this pass, we initialize the weights of the network, so the following properties are met: 1) weight matrices are orthogonal; 2) ReLU layers produce a predetermined number of non-zero activations; 3) the output produced by each internal layer has a unit variance; 4) weights in the last layer are chosen to minimize the error in the initial mini-batch. We evaluate our method on three popular architectures, and a faster converge rates are achieved on the MNIST, CIFAR-10/100, and ImageNet datasets when compared to state-of-the-art initialization techniques.Keywords: deep learning, image classification, supervised learning, weight initialization
Procedia PDF Downloads 13589 Development of a Rating Scale for Elementary EFL Writing
Authors: Mohammed S. Assiri
Abstract:
In EFL programs, rating scales used in writing assessment are often constructed by intuition. Intuition-based scales tend to provide inaccurate and divisive ratings of learners’ writing performance. Hence, following an empirical approach, this study attempted to develop a rating scale for elementary-level writing at an EFL program in Saudi Arabia. Towards this goal, 98 students’ essays were scored and then coded using comprehensive taxonomy of writing constructs and their measures. An automatic linear modeling was run to find out which measures would best predict essay scores. A nonparametric ANOVA, the Kruskal-Wallis test, was then used to determine which measures could best differentiate among scoring levels. Findings indicated that there were certain measures that could serve as either good predictors of essay scores or differentiators among scoring levels, or both. The main conclusion was that a rating scale can be empirically developed using predictive and discriminative statistical tests.Keywords: analytic scoring, rating scales, writing assessment, writing constructs, writing performance
Procedia PDF Downloads 46388 Classifying ERP Implementation’s Risks in Banking Sectors Based on Different Implementation Phases
Authors: Farnaz Farzadnia, Ahmad Alibabaei
Abstract:
Enterprise Resource Planning (ERP) systems are considered as complicated information systems. Many organizations failed implementing ERP systems because it is a very difficult, time-consuming and expensive process. Enterprise resource planning system is appropriate for organizations in all economic sectors. As banking is currently considered a non-typical area for ERP usage, there are very little studies on ERP implementation in banking. This paper presents a general risks taxonomy. In this research, after identifying implementation risks, a process quality management method has been applied to identify relations between risks of implementation ERP in banking sectors and implementation phases. Oracle application implementation method titled as AIM used in this research for classifying the risks. These findings will help managers to develop better strategies for supervising and controlling ERP implementation projects.Keywords: AIM implementation, bank, enterprise resource planning, risk, process quality management method
Procedia PDF Downloads 54387 Human Errors in IT Services, HFACS Model in Root Cause Categorization
Authors: Kari Saarelainen, Marko Jantti
Abstract:
IT service trending of root causes of service incidents and problems is an important part of proactive problem management and service improvement. Human error related root causes are an important root cause category also in IT service management, although it’s proportion among root causes is smaller than in the other industries. The research problem in this study is: How root causes of incidents related to human errors should be categorized in an ITSM organization to effectively support service improvement. Categorization based on IT service management processes and based on Human Factors Analysis and Classification System (HFACS) taxonomy was studied in a case study. HFACS is widely used in human error root cause categorization across many industries. Combining these two categorization models in a two dimensional matrix was found effective, yet impractical for daily work.Keywords: IT service management, ITIL, incident, problem, HFACS, swiss cheese model
Procedia PDF Downloads 48886 Reconceptualizing Evidence and Evidence Types for Digital Journalism Studies
Authors: Hai L. Tran
Abstract:
In the digital age, evidence-based reporting is touted as a best practice for seeking the truth and keeping the public well-informed. Journalists are expected to rely on evidence to demonstrate the validity of a factual statement and lend credence to an individual account. Evidence can be obtained from various sources, and due to a rich supply of evidence types available, the definition of this important concept varies semantically. To promote clarity and understanding, it is necessary to break down the various types of evidence and categorize them in a more coherent, systematic way. There is a wide array of devices that digital journalists deploy as proof to back up or refute a truth claim. Evidence can take various formats, including verbal and visual materials. Verbal evidence encompasses quotes, soundbites, talking heads, testimonies, voice recordings, anecdotes, and statistics communicated through written or spoken language. There are instances where evidence is simply non-verbal, such as when natural sounds are provided without any verbalized words. On the other hand, other language-free items exhibited in photos, video footage, data visualizations, infographics, and illustrations can serve as visual evidence. Moreover, there are different sources from which evidence can be cited. Supporting materials, such as public or leaked records and documents, data, research studies, surveys, polls, or reports compiled by governments, organizations, and other entities, are frequently included as informational evidence. Proof can also come from human sources via interviews, recorded conversations, public and private gatherings, or press conferences. Expert opinions, eye-witness insights, insider observations, and official statements are some of the common examples of testimonial evidence. Digital journalism studies tend to make broad references when comparing qualitative versus quantitative forms of evidence. Meanwhile, limited efforts are being undertaken to distinguish between sister terms, such as “data,” “statistical,” and “base-rate” on one side of the spectrum and “narrative,” “anecdotal,” and “exemplar” on the other. The present study seeks to develop the evidence taxonomy, which classifies evidence through the quantitative-qualitative juxtaposition and in a hierarchical order from broad to specific. According to this scheme, data, statistics, and base rate belong to the quantitative evidence group, whereas narrative, anecdote, and exemplar fall into the qualitative evidence group. Subsequently, the taxonomical classification arranges data versus narrative at the top of the hierarchy of types of evidence, followed by statistics versus anecdote and base rate versus exemplar. This research reiterates the central role of evidence in how journalists describe and explain social phenomena and issues. By defining the various types of evidence and delineating their logical connections it helps remove a significant degree of conceptual inconsistency, ambiguity, and confusion in digital journalism studies.Keywords: evidence, evidence forms, evidence types, taxonomy
Procedia PDF Downloads 6785 Modeling and Monitoring of Agricultural Influences on Harmful Algal Blooms in Western Lake Erie
Authors: Xiaofang Wei
Abstract:
Harmful Algal Blooms are a recurrent disturbing occurrence in Lake Erie that has caused significant negative impacts on water quality and aquatic ecosystem around Great Lakes areas in the United States. Targeting the recent HAB events in western Lake Erie, this paper utilizes satellite imagery and hydrological modeling to monitor HAB cyanobacteria blooms and analyze the impacts of agricultural activities from Maumee watershed, the biggest watershed of Lake Erie and agriculture dominant.SWAT (Soil & Water Assessment Tool) Model for Maumee watershed was established with DEM, land use data, crop data layer, soil data, and weather data, and calibrated with Maumee River gauge stations data for streamflow and nutrients. Fast Line-of-sight Atmospheric Analysis of Hypercubes (FLAASH) was applied to remove atmospheric attenuation and cyanobacteria Indices were calculated from Landsat OLI imagery to study the intensity of HAB events in the years 2015, 2017, and 2019. The agricultural practice and nutrients management within the Maumee watershed was studied and correlated with HAB cyanobacteria indices to study the relationship between HAB intensity and nutrient loadings. This study demonstrates that hydrological models and satellite imagery are effective tools in HAB monitoring and modeling in rivers and lakes.Keywords: harmful algal bloom, landsat OLI imagery, SWAT, HAB cyanobacteria
Procedia PDF Downloads 17484 Morphological Study of Trichomes in Indigofera wightii Grah. ex Wigh & Arn., Indigo Dye Species, Traditionally Used by “Thaisongdam” Thailand
Authors: Supanyika Sengsai, Aree Thongpukdee, Chalermchai Kanchanakachain
Abstract:
The study aimed to collect morphological data of secretory structures that contribute to taxonomy of Indigofera. Detail features of trichomes occurrence in vegetative and reproductive organs of Indigofera wightii Grah. ex Wigh & Arn., a species traditionally used as source of indigo to dye “Thaisongdam” clothing were investigated. Examination through light microscopy and scanning electrom microscopy were done. Non secretory, T-shaped trichomes appeared throughout surfaces of stems, leaves, flowers and fruits. Secretory or glandular trichomes occurred in two types; one has big cylindrical head and short peduncle, distributed on adaxial surface of sepals and around the pedicel, whereas another possesses smaller cylindrical head but long peduncle. The latter was found on apical surface of immature pods. No phenolic and lipophilic compounds were detected from these glands.Keywords: indigofera, trichome, Thaisongdam, Thailand
Procedia PDF Downloads 30683 Review of Cyber Security in Oil and Gas Industry with Cloud Computing Perspective: Taxonomy, Issues and Future Direction
Authors: Irfan Mohiuddin, Ahmad Al Mogren
Abstract:
In recent years, cloud computing has earned substantial attention in the Oil and Gas Industry and provides services in all the phases of the industry lifecycle. Oil and gas supply infrastructure, in particular, is more vulnerable to accidental, natural and intentional threats because of its widespread distribution. Numerous surveys have been conducted on cloud security and privacy. However, to the best of our knowledge, hardly any survey is carried out that reviews cyber security in all phases with a cloud computing perspective. Moreover, a distinctive classification is performed for all the cloud-based cyber security measures based on the cloud component in use. The classification approach will enable researchers to identify the required technique used to enhance the security in specific cloud components. Also, the limitation of each component will allow the researchers to design optimal algorithms. Lastly, future directions are given to point out the imminent challenges that can pave the way for researchers to further enhance the resilience to cyber security threats in the oil and gas industry.Keywords: cyber security, cloud computing, safety and security, oil and gas industry, security threats, oil and gas pipelines
Procedia PDF Downloads 14382 Taxonomic Classification for Living Organisms Using Convolutional Neural Networks
Authors: Saed Khawaldeh, Mohamed Elsharnouby, Alaa Eddin Alchalabi, Usama Pervaiz, Tajwar Aleef, Vu Hoang Minh
Abstract:
Taxonomic classification has a wide-range of applications such as finding out more about the evolutionary history of organisms that can be done by making a comparison between species living now and species that lived in the past. This comparison can be made using different kinds of extracted species’ data which include DNA sequences. Compared to the estimated number of the organisms that nature harbours, humanity does not have a thorough comprehension of which specific species they all belong to, in spite of the significant development of science and scientific knowledge over many years. One of the methods that can be applied to extract information out of the study of organisms in this regard is to use the DNA sequence of a living organism as a marker, thus making it available to classify it into a taxonomy. The classification of living organisms can be done in many machine learning techniques including Neural Networks (NNs). In this study, DNA sequences classification is performed using Convolutional Neural Networks (CNNs) which is a special type of NNs.Keywords: deep networks, convolutional neural networks, taxonomic classification, DNA sequences classification
Procedia PDF Downloads 44281 Bioinformatics Analysis of DGAT1 Gene in Domestic Ruminnants
Authors: Sirous Eydivandi
Abstract:
Diacylglycerol-O-acyltransferase (DGAT1) gene encodes diacylglycerol transferase enzyme that plays an important role in glycerol lipid metabolism. DGAT1 is considered to be the key enzyme in controlling the synthesis of triglycerides in adipocytes. This enzyme catalyzes the final step of triglyceride synthesis (transform triacylglycerol (DAG) into triacylglycerol (TAG). A total of 20 DGAT1 gene sequences and corresponding amino acids belonging to 4 species include cattle, goats, sheep and yaks were analyzed, and the differentiation within and among the species was also studied. The length of the DGAT1 gene varies greatly, from 1527 to 1785 bp, due to deletion, insertion, and stop codon mutation resulting in elongation. Observed genetic diversity was higher among species than within species, and Goat had more polymorphisms than any other species. Novel amino acid variation sites were detected within several species which might be used to illustrate the functional variation. Differentiation of the DGAT1 gene was obvious among species, and the clustering result was consistent with the taxonomy in the National Center for Biotechnology Information.Keywords: DGAT1gene, bioinformatic, ruminnants, biotechnology information
Procedia PDF Downloads 49180 Human Motion Capture: New Innovations in the Field of Computer Vision
Authors: Najm Alotaibi
Abstract:
Human motion capture has become one of the major area of interest in the field of computer vision. Some of the major application areas that have been rapidly evolving include the advanced human interfaces, virtual reality and security/surveillance systems. This study provides a brief overview of the techniques and applications used for the markerless human motion capture, which deals with analyzing the human motion in the form of mathematical formulations. The major contribution of this research is that it classifies the computer vision based techniques of human motion capture based on the taxonomy, and then breaks its down into four systematically different categories of tracking, initialization, pose estimation and recognition. The detailed descriptions and the relationships descriptions are given for the techniques of tracking and pose estimation. The subcategories of each process are further described. Various hypotheses have been used by the researchers in this domain are surveyed and the evolution of these techniques have been explained. It has been concluded in the survey that most researchers have focused on using the mathematical body models for the markerless motion capture.Keywords: human motion capture, computer vision, vision-based, tracking
Procedia PDF Downloads 31979 Security Risks Assessment: A Conceptualization and Extension of NFC Touch-And-Go Application
Authors: Ku Aina Afiqah Ku Adzman, Manmeet Mahinderjit Singh, Zarul Fitri Zaaba
Abstract:
NFC operates on low-range 13.56 MHz frequency within a distance from 4cm to 10cm, and the applications can be categorized as touch and go, touch and confirm, touch and connect, and touch and explore. NFC applications are vulnerable to various security and privacy attacks such due to its physical nature; unprotected data stored in NFC tag and insecure communication between its applications. This paper aims to determine the likelihood of security risks happening in an NFC technology and application. We present an NFC technology taxonomy covering NFC standards, types of application and various security and privacy attack. Based on observations and the survey presented to evaluate the risk assessment within the touch and go application demonstrates two security attacks that are high risks namely data corruption and DOS attacks. After the risks are determined, risk countermeasures by using AHP is adopted. The guideline and solutions to these two high risks, attacks are later applied to a secure NFC-enabled Smartphone Attendance System.Keywords: Near Field Communication (NFC), risk assessment, multi-criteria decision making, Analytical Hierarchy Process (AHP)
Procedia PDF Downloads 30278 'Infection in the Sentence': The Castration of a Black Woman's Dream of Authorship as Manifested in Buchi Emecheta's Second Class Citizen
Authors: Aseel Hatif Jassam, Hadeel Hatif Jassam
Abstract:
The paper discusses the phallocentric discourse that is challenged by women in general and of women of color in particular in spite of the simultaneity of oppression due to race, class, and gender in the diaspora. Therefore, the paper gives a brief account of women's experience in the light of postcolonial feminist theory. The paper also cast light on the theories of Luce Irigaray and Helen Cixous, two Feminist theorists who support and advise women to have their own discourse to challenge the infectious patriarchal sentence advocated by Sigmund Freud and Harold Bloom's model of literary history. Black women authors like BuchiEmecheta as well as her alter ego Adah, a Nigerian-born girl and the protagonist of her semi-autobiographical novel, Second Class Citizen, suffer from this phallocentric and oppressive sentence and displacement as they migrate from Nigeria, a former British colony where they feel marginalized to North London with the hope of realizing their dreams. Yet, in the British diaspora, they get culturally shocked and continue to suffer from further marginalization due to class and race and are insulted and interiorized ironically by their patriarchal husbands who try to put an end to their dreams of authorship. With the phallocentric belief that women aren't capable of self-representation in the background of their mindsets, the violent Sylvester Onwordi and Francis Obi, the husbands of both Emecheta and Adah, respectively have practiced oppression on them by burning their own authoritative voice, represented by the novels they write while they are struggling with their economically atrocious living experience in the British diaspora.Keywords: authorship, British diaspora, discourse, phallocentric, patriarchy
Procedia PDF Downloads 17777 Developing an Integrated Seismic Risk Model for Existing Buildings in Northern Algeria
Authors: R. Monteiro, A. Abarca
Abstract:
Large scale seismic risk assessment has become increasingly popular to evaluate the physical vulnerability of a given region to seismic events, by putting together hazard, exposure and vulnerability components. This study, developed within the scope of the EU-funded project ITERATE (Improved Tools for Disaster Risk Mitigation in Algeria), explains the steps and expected results for the development of an integrated seismic risk model for assessment of the vulnerability of residential buildings in Northern Algeria. For this purpose, the model foresees the consideration of an updated seismic hazard model, as well as ad-hoc exposure and physical vulnerability models for local residential buildings. The first results of this endeavor, such as the hazard model and a specific taxonomy to be used for the exposure and fragility components of the model are presented, using as starting point the province of Blida, in Algeria. Specific remarks and conclusions regarding the characteristics of the Northern Algerian in-built are then made based on these results.Keywords: Northern Algeria, risk, seismic hazard, vulnerability
Procedia PDF Downloads 20176 An Architectural Study on the Railway Station Buildings in Malaysia during British Era, 1885-1957
Authors: Nor Hafizah Anuar, M. Gul Akdeniz
Abstract:
This paper attempted on emphasize on the station buildings façade elements. Station buildings were essential part of the transportation that reflected the technology. Comparative analysis on architectural styles will also be made between the railway station buildings of Malaysia and any railway station buildings which have similarities. The Malay Peninsula which is strategically situated between the Straits of Malacca and the South China Sea makes it an ideal location for trade. Malacca became an important trading port whereby merchants from around the world stopover to exchange various products. The Portuguese ruled Malacca for 130 years (1511–1641) and for the next century and a half (1641–1824), the Dutch endeavoured to maintain an economic monopoly along the coasts of Malaya. Malacca came permanently under British rule under the Anglo-Dutch Treaty, 1824. Up to Malaysian independence in 1957, Malaya saw a great influx of Chinese and Indian migrants as workers to support its growing industrial needs facilitated by the British. The growing tin ore mining and rubber industry resulted as the reason of the development of the railways as urgency to transport it from one place to another. The existence of railway transportation becomes more significant when the city started to bloom and the British started to build grandeur buildings that have different functions; administrative buildings, town and city halls, railway stations, public works department, courts, and post offices.
Keywords: Malaysia, station building, architectural styles, facade elements
Procedia PDF Downloads 16675 Ethnobotanical Study of Medicinal Plants of Leguminosae in Kantharalak Community Forest, Si Sa Ket Province, Thailand
Authors: W. Promprom, W. Chatan
Abstract:
Leguminosae is a large plant family and its members are important for local people utilization in the Northeast of Thailand. This research aimed to survey medicinal plants in this family in Kantharalak Community forest. The plant collection and exploration were made from October 2017 to September 2018. Folk medicinal uses were studied by interviewing villagers and folk medicine healers living around the community forest by asking about local names, using parts, preparation and properties. The results showed that 65 species belonging to 40 genera were found. Among these, 30 species were medicinal plant. The most used plant parts were leaf. Decoction and drinking were mostly preparation method and administration mode used. All medicinal plants could be categorized into 17 diseases/symptoms. Most plant (56.66%) were used for fever. The voucher specimens were deposited in Department of Biology, Faculty of Science, Mahasarakham University, Thailand. Therefore, the data from this study might be widely used by the local area and further scientific study.Keywords: ethnobotany, ethnophamacology, medicinal plant, taxonomy, utilization
Procedia PDF Downloads 15974 Systematic Taxonomy and Phylogenetic of Commercial Fish Species of Family Nemipetridae from Malaysian Waters and Neighboring Seas
Authors: Ayesha Imtiaz, Darlina Md. Naim
Abstract:
Family Nemipteridae is among the most abundantly distributed family in Malaysian fish markets due to its high contribution to landing sites of Malaysia. Using an advanced molecular approach that used two mitochondrial (Cytochrome oxidase c I and Cytochrome oxidase b) and one nuclear gene (Recombination activating gene, RAGI) to expose cryptic diversity and phylogenetic relationships among commercially important species of family Nemipteridae. Our research covered all genera (including 31 species out total 45 species) of family Nemipteridae, distributed in Malaysia. We also found certain type of geographical barriers in the South China sea that reduces dispersal and stops a few species to intermix. Northside of the South China Sea (near Vietnam) does not allow genetic diversity to mix with the Southern side of the South China sea (Sarawak) and reduces dispersal. Straits of Malacca reduce the intermixing genetic diversity of South China Sea and the Indian Ocean.Keywords: Nemipteridae, RAG I, south east Asia, Malaysia
Procedia PDF Downloads 14373 A Survey on the Blockchain Smart Contract System: Security Strengths and Weaknesses
Authors: Malaw Ndiaye, Karim Konate
Abstract:
Smart contracts are computer protocols that facilitate, verify, and execute the negotiation or execution of a contract, or that render a contractual term unnecessary. Blockchain and smart contracts can be used to facilitate almost any financial transaction. Thanks to these smart contracts, the settlement of dividends and coupons could be automated. Smart contracts have become lucrative and profitable targets for attackers because they can hold a great amount of money. Smart contracts, although widely used in blockchain technology, are far from perfect due to security concerns. Since there are recent studies on smart contract security, none of them systematically study the strengths and weaknesses of smart contract security. Some have focused on an analysis of program-related vulnerabilities by providing a taxonomy of vulnerabilities. Other studies are responsible for listing the series of attacks linked to smart contracts. Although a series of attacks are listed, there is a lack of discussions and proposals on improving security. This survey takes stock of smart contract security from a more comprehensive perspective by correlating the level of vulnerability and systematic review of security levels in smart contracts.Keywords: blockchain, Bitcoin, smart contract, criminal smart contract, security
Procedia PDF Downloads 16872 A Cross-Linguistic Comparison on Compliment Responses in Turkish-English Bilinguals
Authors: Elifcan Oztekin
Abstract:
Compliment response strategies in cross-linguistic contexts have received a considerable amount of interest in sociolinguistic research in various language settings. In this respect, a common finding of these studies indicates that speakers of different languages employ different patterns in strategies to respond to compliments. This has triggered varying theoretical approaches to compliment responses within theories of politeness and the universality of speech acts. In the light of previous studies, the present study investigates compliment response strategies that Turkish-English bilingual university students use in English and Turkish response conditions through a cross-linguistic discourse completion task and interviews. Data were analyzed using Holmes’ (1988) taxonomy and the results indicate a similar pattern to what has been observed in Turkish compliments responses in previous research. Turkish-English comparisons also display noticeable similarities in macro-level strategies, while subtle differences in micro-level strategies were also observed.Keywords: compliment response strategies, cross-cultural differences, bilingualism, sociolinguistics
Procedia PDF Downloads 211