Search results for: dynamic host client protocol
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6199

Search results for: dynamic host client protocol

6109 Movies and Dynamic Mathematical Objects on Trigonometry for Mobile Phones

Authors: Kazuhisa Takagi

Abstract:

This paper is about movies and dynamic objects for mobile phones. Dynamic objects are the software programmed by JavaScript. They consist of geometric figures and work on HTML5-compliant browsers. Mobile phones are very popular among teenagers. They like watching movies and playing games on them. So, mathematics movies and dynamic objects would enhance teaching and learning processes. In the movies, manga characters speak with artificially synchronized voices. They teach trigonometry together with dynamic mathematical objects. Many movies are created. They are Windows Media files or MP4 movies. These movies and dynamic objects are not only used in the classroom but also distributed to students. By watching movies, students can study trigonometry before or after class.

Keywords: dynamic mathematical object, javascript, google drive, transfer jet

Procedia PDF Downloads 260
6108 Moderating Effect of Owner's Influence on the Relationship between the Probability of Client Failure and Going Concern Opinion Issuance

Authors: Mohammad Noor Hisham Osman, Ahmed Razman Abdul Latiff, Zaidi Mat Daud, Zulkarnain Muhamad Sori

Abstract:

The problem that Malaysian auditors do not issue going concern opinion (GC opinion) to seriously financially distressed companies is still a pressing issue. Policy makers, particularly the Financial Statement Review Committee (FSRC) of Malaysian Institute of Accountant, have raised this issue as early as in 2009. Similar problem happened in the US, UK, and many developing countries. It is important for auditors to issue GC opinion properly because such opinion is one signal about the viability of a company much needed by stakeholders. There are at least two unanswered questions or research gaps in the literature on determinants of GC opinion. Firstly, is client’s probability of failure associated with GC opinion issuance? Secondly, to what extent influential owners (management, family, and institution) moderate the association between client probability of failure and GC opinion issuance. The objective of this study is, therefore, twofold; (1) To examine the extent of the relationship between the probability of client failure and the issuance of GC opinion and (2) To examine the level of management, family, and institutional ownerships moderate the association between client probability of failure and the issuance of GC opinion. This study is quantitative in nature, and the sources of data are secondary (mainly company’s annual reports). A total of four hypotheses have been developed and tested on data accumulated from annual reports of seriously financially distressed Malaysian public listed companies. Data from 2006 to 2012 on a sample of 644 observations have been analyzed using panel logistic regression. It is found that certainty (rather than probability) of client failure affects the issuance of GC opinion. In addition, it is found that only the level of family ownership does positively moderate the relationship between client probability of failure and GC opinion issuance. This study is a contribution to auditing literature as its findings can enhance our understanding about audit quality; particularly on the variables that are associated with the issuance of GC opinion. The findings of this study shed light on the roles family owners in GC opinion issuance process, and this would open ways for the researcher to suggest measures that can be used to tackle the problem of auditors do not want to issue GC opinion to financially distressed clients. The measures to be suggested can be useful to policy makers in formulating future promulgations.

Keywords: audit quality, auditing, auditor characteristics, going concern opinion, Malaysia

Procedia PDF Downloads 260
6107 Performance Analysis of Deterministic Stable Election Protocol Using Fuzzy Logic in Wireless Sensor Network

Authors: Sumanpreet Kaur, Harjit Pal Singh, Vikas Khullar

Abstract:

In Wireless Sensor Network (WSN), the sensor containing motes (nodes) incorporate batteries that can lament at some extent. To upgrade the energy utilization, clustering is one of the prototypical approaches for split sensor motes into a number of clusters where one mote (also called as node) proceeds as a Cluster Head (CH). CH selection is one of the optimization techniques for enlarging stability and network lifespan. Deterministic Stable Election Protocol (DSEP) is an effectual clustering protocol that makes use of three kinds of nodes with dissimilar residual energy for CH election. Fuzzy Logic technology is used to expand energy level of DSEP protocol by using fuzzy inference system. This paper presents protocol DSEP using Fuzzy Logic (DSEP-FL) CH by taking into account four linguistic variables such as energy, concentration, centrality and distance to base station. Simulation results show that our proposed method gives more effective results in term of a lifespan of network and stability as compared to the performance of other clustering protocols.

Keywords: DSEP, fuzzy logic, energy model, WSN

Procedia PDF Downloads 207
6106 The Impact of Human Resources Management on the Job Security of Self-Initiated Expatriates after the Brexit

Authors: Yllka Hysaj, Ylberina Hysaj Arifi

Abstract:

Recently, with BREXIT taking place, organizations and employees have been affected in the way of job and employment security. Career-oriented human resources management (HRM) practices are likely to facilitate self-initiated expatriates’ adjustment to the host country. This was related to the career security (job security and employment security), which were missing in their home country and seemed to be important elements to adjust to the host country. The aim of this study is to assess whether the perception of career security by Frances self-initiated expatriates (SIEs) have changed in the wake of the referendum result. Quantitative research method will be used, and the data will be collected through electronic questionnaires. Data will be analyzed through Statistical Package for the Social Sciences (SPSS). The study variables will include an adjustment to the host country, HRM practices, employability, and job security. Predicted results consist that career-oriented HRM practices are positively related to the adjustment to the host country, employability, and job security. However, with Brexit, there might be a negative relationship between career-oriented HRM practices and job security.

Keywords: migration, self-initiated expatriates, Brexit, job security

Procedia PDF Downloads 170
6105 Mechanism for Network Security via Routing Protocols Estimated with Network Simulator 2 (NS-2)

Authors: Rashid Mahmood, Muhammad Sufyan, Nasir Ahmed

Abstract:

The MANETs have lessened transportation and decentralized network. There are numerous basis of routing protocols. We derived the MANETs protocol into three major categories like Reactive, Proactive and hybrid. In these protocols, we discussed only some protocols like Distance Sequenced Distance Vector (DSDV), Ad hoc on Demand Distance Vector (AODV) and Dynamic Source Routing (DSR). The AODV and DSR are both reactive type of protocols. On the other hand, DSDV is proactive type protocol here. We compare these routing protocols for network security estimated by network simulator (NS-2). In this dissertation some parameters discussed such as simulation time, packet size, number of node, packet delivery fraction, push time and speed etc. We will construct all these parameters on routing protocols under suitable conditions for network security measures.

Keywords: DSDV, AODV, DSR NS-2, PDF, push time

Procedia PDF Downloads 433
6104 Acculturation Profiles of Syrian Refugees in Turkey

Authors: Abdurrahim Guler

Abstract:

Immigrants who came to a new country experience some socio-cultural difficulties which are different from theirs. The study aims to investigate how Syrian Refugees manage their life in Turkey and the relationship between acculturation profiles and demographic background of Syrian refugees who came to Turkey after civil war has intensified in Syria. Data are collected from 280 adult Syrian refugees who were born in Syria. The study adopts bi-dimensional acculturation approach stating that both heritage and dominant host cultures can live together. Results suggest that demographic backgrounds, religion, and religiosity are significantly linked to both heritage and dominant host culture. Syrian refugees who are not affiliated with Islam are found to significantly preserve their ethnic/heritage culture. Generally, Syrian refugees are more willing to integrate Turkish society but not to assimilate. The results also confirmed acculturation process as a bi-dimensional, not a zero-sum game since we found a significant positive correlation between the heritage and the dominant host cultures which assume the independence and orthogonal of involvements in the dominant host and heritage cultures.

Keywords: acculturation, demographic backgrounds, heritage culture, religion, Syrian refugees

Procedia PDF Downloads 220
6103 Market Access for Foreign Investment in Host States: Municipal Law and International Law

Authors: Qiang Ren

Abstract:

A growing number of states are improving domestic law to better protect and promote foreign investment by changing/upgrading the existing law. However, inconsistency occurs because the new law is different from the ‘old’ law. For example, China has issued an unprecedented Foreign Investment Law and several regulations allowing comprehensive market access for foreign investment in most energy sectors since 2020. However, some laws, rules, regulations, etc. enacted previously remain valid, and the provisions regulating foreign investment do not grant full market access to foreign investment as such. The inconsistency above makes it necessary to investigatehow the international investment treaty law and dispute settlement practice respond to the ‘inconsistency and conflict’ in municipal law andwhat remedy foreign investors can seek under international law if the investment is denied due to inconsistency. Ultimately, it aims to examine how international tribunals should balance the gradually developing legal system of host states and the protection of foreign investors and investments if the host states cannot provide consistency during such a transition period of law development. The research seeks to answer these questions by making a comparative analysis of domestic law on market access to foreign investment, international investment treaties, and dispute arbitral practice. The objective is to examine how international investment treaty law and international investment dispute settlement practice evaluate the conflicts in the municipal law of host states in the admission of foreign investment. It also explores the possibility of harmonisation among them.

Keywords: municipal law, protect and promote foreign investment, international law, host states

Procedia PDF Downloads 94
6102 Development of a Nurse Led Tranexamic Acid Administration Protocol for Trauma Patients in Rural South Africa

Authors: Christopher Wearmouth, Jacob Smith

Abstract:

Administration of tranexamic acid (TXA) reduces all-cause mortality in trauma patients when given within 3 hours of injury. Due to geographical distance and lack of emergency medical services patients often present late, following trauma, to our emergency department. Additionally, we found patients that may have benefited from TXA did not receive it, often due to lack of staff awareness, staff shortages out of hours and lack of equipment for delivering infusions. Our objective was to develop a protocol for nurse-led administration of TXA in the emergency department. We developed a protocol using physiological observations along with criteria from the South African Triage Scale to allow nursing staff to identify patients with, or at risk of, significant haemorrhage. We will monitor the use of the protocol to ensure appropriate compliance and for any adverse events reported.

Keywords: emergency department, emergency nursing, rural healthcare, tranexamic acid, trauma, triage

Procedia PDF Downloads 230
6101 [Keynote Talk]: Formal Specification and Description Language and Message Sequence Chart to Model and Validate Session Initiation Protocol Services

Authors: Sa’ed Abed, Mohammad H. Al Shayeji, Ovais Ahmed, Sahel Alouneh

Abstract:

Session Initiation Protocol (SIP) is a signaling layer protocol for building, adjusting and ending sessions among participants including Internet conferences, telephone calls and multimedia distribution. SIP facilitates user movement by proxying and forwarding requests to the present location of the user. In this paper, we provide a formal Specification and Description Language (SDL) and Message Sequence Chart (MSC) to model and define the Internet Engineering Task Force (IETF) SIP protocol and its sample services resulted from informal SIP specification. We create an “Abstract User Interface” using case analysis so that can be applied to identify SIP services more explicitly. The issued sample SIP features are then used as case scenarios; they are revised in MSCs format and validated to their corresponding SDL models.

Keywords: modeling, MSC, SDL, SIP, validating

Procedia PDF Downloads 210
6100 Identifying the Host Substrates for the Mycobacterial Virulence Factor Protein Kinase G

Authors: Saha Saradindu, Das Payel, Somdeb BoseDasgupta

Abstract:

Tuberculosis caused by Mycobacteria tuberculosis is a dreadful disease and more so with the advent of extreme and total drug-resistant species. Mycobacterial pathogenesis is an ever-changing paradigm from phagosome maturation block to phagosomal escape into macrophage cytosol and finally acid tolerance and survival inside the lysosome. Mycobacteria are adept at subverting the host immune response by highjacking host cell signaling and secreting virulence factors. One such virulence factor is a ser/thr kinase; Protein kinase G (PknG), which is known to prevent phagosome maturation. The host substrates of PknG, allowing successful pathogenesis still remain an enigma. Hence we carried out a comparative phosphoproteomic screen and identified a number of substrates phosphorylated by PknG. We characterized some of these substrates in vivo and in vitro and observed that PknG mediated phosphorylation of these substrates leads to reduced TNFa production as well as decreased response to TNFa induced macrophage necroptosis, thus enabling mycobacterial survival and proliferation.

Keywords: mycobacteria, Protein kinase G, phosphoproteomics, necroptosis

Procedia PDF Downloads 146
6099 Acute Effects of Active Dynamic, Static Stretching and Passive Static Stretching Exercise on Hamstrings Flexibility and Muscle Strength

Authors: Yi Tse Wang, Che Hsiu Chen, Zih Jian Huang, Hon Wen Cheng

Abstract:

Stretching treatments enhanced flexibility. On the other hand, decreases in hamstrings strength have been reported after stretching, especially with static stretching or passive stretching. Stretching has been shown to be more effective than static stretching to improve muscle performance, but a clear consensus for the effect of dynamic stretching on muscle performance has not been achieved. The purpose of this study was to compare the acute effect of a dynamic stretching, static stretching and eccentric exercise protocol on hamstrings stiffness, flexibility and muscle strength. Forty-five healthy active men (height 179.9 cm; weight 71.5 kg; age 22.5 years) were participated in 3 randomly ordered testing sessions: dynamic stretching (DS), active static stretching (ASS), and passive static stretching (PSS). All the stretch were performed 30 seconds and repeated 6 times. There was a 30-second interval between repetitions. The outcome measures were isokinetic concentric contraction (60°/s), eccentric contraction (30°/s) peak torque, muscle flexibility after stretching. The results showed that the muscle flexibility (3.6%, 3.9% and 1.59%, respectively) increased significantly after DS, PSS and ASS. Hamstring isokinetic concentric peak torque (-6.4%, -8.0% and -5.8%, respectively) and eccentric peak torque (-5.8%, -4.5% and -5.4%, respectively) decreased significantly after DS, PSS and ASS. Hence, although the stretching protocols improve hamstrings flexibility immediately, reduced hamstring muscle eccentric and concentric peak torque.

Keywords: hamstrings injury, warm-up, muscle performance, muscle stretching

Procedia PDF Downloads 383
6098 Reactive Analysis of Different Protocol in Mobile Ad Hoc Network

Authors: Manoj Kumar

Abstract:

Routing protocols have a central role in any mobile ad hoc network (MANET). There are many routing protocols that exhibit different performance levels in different scenarios. In this paper, we compare AODV, DSDV, DSR, and ZRP routing protocol in mobile ad hoc networks to determine the best operational conditions for each protocol. We analyze these routing protocols by extensive simulations in OPNET simulator and show how to pause time and the number of nodes affect their performance. In this study, performance is measured in terms of control traffic received, control traffic sent, data traffic received, sent data traffic, throughput, retransmission attempts.

Keywords: AODV, DSDV, DSR, ZRP

Procedia PDF Downloads 518
6097 Population Growth of Bracon hebetor Say. under the Influence of Various Lepidopteran Host

Authors: Mohammad Muslim, M. Shafiq Ansari, Fazil Hasan

Abstract:

Bracon hebetor Say (Hymenoptera: Braconidae) is considered as a highly cosmopolitan ecto-parasitoid of various species of order Lepidoptera. To study the influence of lepidopteran hosts on population growth of B. hebetor, the newly mated gravid females were released on various host and the eggs laid by such females on respective host were counted and a single egg was allow to develop on single host larvae. The experiment was conducted at 27 ± 1°C, 65 ± 5% RH and 14L: 10D hr in Biological Oxygen Demand (BOD) chamber. Upon hatching the tiny larvae of parasitoid pierced the body of insect host, enter into them and consumed the internal body contents of paralyzed host larvae. Present findings showed that B. hebetor took ~36 days to complete its survivorship on Corcyra cephalonica and Galleria mellonella. However, on Spodoptera littoralis the survivorship decreased to 24 days. Nevertheless, development of H. hebetor’s immature was significantly prolonged on S. littoralis and S. litura compared to other insect hosts tested. Female of B. hebetor took longer time to lay eggs on C. cephalonica and G. mellonella than other hosts tested in this study. Longevity of male and female is significantly prolonged on C. cephalonica and G. mellonella compared to others insect hosts tested. Population growth parameters like mx Ro, rm, Tc, and τ was considerably highest on C. cephalonica and lowest on S. littoralis. Based on the demographic studies C. cephalonica and H. armegera were proved to be the most suitable host for the mass rearing of B. hebetor. Nevertheless, results of present investigation could be utilized to improve the mass-breeding program of B. hebetor, so that sufficient number of B. hebetor’s adults could be provided time to time for the effective control of lepidopteran pests of various economically important crops.

Keywords: Bracon hebetor, lepidopteran hosts, demography, biology, development

Procedia PDF Downloads 258
6096 Security in Resource Constraints Network Light Weight Encryption for Z-MAC

Authors: Mona Almansoori, Ahmed Mustafa, Ahmad Elshamy

Abstract:

Wireless sensor network was formed by a combination of nodes, systematically it transmitting the data to their base stations, this transmission data can be easily compromised if the limited processing power and the data consistency from these nodes are kept in mind; there is always a discussion to address the secure data transfer or transmission in actual time. This will present a mechanism to securely transmit the data over a chain of sensor nodes without compromising the throughput of the network by utilizing available battery resources available in the sensor node. Our methodology takes many different advantages of Z-MAC protocol for its efficiency, and it provides a unique key by sharing the mechanism using neighbor node MAC address. We present a light weighted data integrity layer which is embedded in the Z-MAC protocol to prove that our protocol performs well than Z-MAC when we introduce the different attack scenarios.

Keywords: hybrid MAC protocol, data integrity, lightweight encryption, neighbor based key sharing, sensor node dataprocessing, Z-MAC

Procedia PDF Downloads 144
6095 A Software Tool for Computer Forensic Investigation Using Client-Side Web History Visualization

Authors: Francisca Onaolapo Oladipo, Peter Afam Ugwu

Abstract:

Records of user activities which are valuable for forensic investigation purposes are provided by web browsers -these records in most cases are not in visual formats that are easily understood, thereby requiring some extra processes. This paper describes the implementation of a software tool for client-side web history visualization providing suitable forensic evidence for investigative purposes. Visual C#, Perl and gnuplot were deployed on Windows Operating System (OS) environment to implement the system and the resulting tool parses and transforms a web browser history into a visual format that enables an investigator to quickly and efficiently explore, understand, and interpret the user online activities in the context of a specific investigation. The system was tested using two forensic cases: the client-side web history files generated by Mozilla Firefox browser was extracted using MozillaHistoryView utility, then parsed and visualized using bar and stacked column charts. From the visual representation, results of user web activities across various productive and non-productive websites were obtained.

Keywords: history, forensics, visualization, web activities

Procedia PDF Downloads 297
6094 Male Sex Workers’ Constructions of Selling Sex in South Africa

Authors: Tara Panday, Despina Learmonth

Abstract:

Sex work is often constructed as being an interaction between male clients and female sex workers. As a result, street-based male sex workers are continuously overlooked in the South African literature. This qualitative study explored male sex workers’ subjective experiences and constructions of their male clients’ identities and the client-sex worker relationship. This research was conducted from a social-constructionist perspective, which allowed for a deeper understanding of the reasons and context driving the choices and actions of male sex workers. Semi-structured face-to-face interviews were conducted with 10 South African men working as sex workers in Cape Town. Data was analysed through thematic analysis. The findings of the study construct the client-sex worker relationship in terms of a professional relationship, constrained choice, sexual identity and need, as well as companionship for pay, potentially highlighting underlying reasons for supply and demand. The data which emerged around the client-sex worker relationship and the clients’ identities also served to illuminate the power-dynamics in the client-sex worker relationship. This data increases insight into the exploitation and disempowerment experienced by male sex workers through verbal abuse, physical and sexual violence, and unfairly enforced laws and regulations. The findings of this study suggest that, in the context of South Africa, male sex workers' experiences of the client-sex worker relationship cannot be completely understood without considering the intersectionality of the triple stigmatisation of: the criminality of sex work, race, and the lack of economic power, which systematically maintains marginalization. Motivating for the Law Reform Commission to continue to review all emerging research may assist with guiding related policy and thereby, the provision of equal human rights and adequate health and social interventions for all sex workers in South Africa.

Keywords: human rights, prostitution, power relations, sex work

Procedia PDF Downloads 483
6093 Investigations of Inclusion Complexes of Imazapyr with 2-Hydroxypropyl(β/γ) Cyclodextrin Experimental and Molecular Modeling Approach

Authors: Abdalla A. Elbashir, Maali Saad Mokhtar, FakhrEldin O. Suliman

Abstract:

The inclusion complexes of imazapyr (IMA) with 2-hydroxypropyl(β/γ) cyclodextrins (HP β/γ-CD), have been studied in aqueous media and in the solid state. In this work, fluorescence spectroscopy, electrospray-ionization mass spectrometry (ESI-MS), and HNMR were used to investigate and characterize the inclusion complexes of IMA with the cyclodextrins in solutions. The solid-state complexes were obtained by freeze-drying and were characterized by Fourier transform infrared spectroscopy (FTIR), and powder X-ray diffraction (PXRD). The most predominant complexes of IMA with both hosts are the 1:1 guest: host complexes. The association constants of IMA-HP β-CD and IMA-HP γ -CD were 115 and 215 L mol⁻¹, respectively. Molecular dynamic (MD) simulations were used to monitor the mode of inclusion and also to investigate the stability of these complexes in aqueous media at atomistic levels. The results obtained have indicated that these inclusion complexes are highly stable in aqueous media, thereby corroborating the experimental results. Additionally, it has been demonstrated that in addition to hydrophobic interactions and van der Waals interactions the presence of hydrogen bonding interactions of the type H---O and CH---O between the guest and the host have enhanced the stability of these complexes remarkably.

Keywords: imazapyr, inclusion complex, herbicides, 2-hydroxypropyl-β/γ-cyclodextrin

Procedia PDF Downloads 171
6092 Orphan Node Inclusion Protocol for Wireless Sensor Network

Authors: Sandeep Singh Waraich

Abstract:

Wireless sensor network (WSN ) consists of a large number of sensor nodes. The disparity in their energy consumption usually lead to the loss of equilibrium in wireless sensor network which may further results in an energy hole problem in wireless network. In this paper, we have considered the inclusion of orphan nodes which usually remain unutilized as intermediate nodes in multi-hop routing. The Orphan Node Inclusion (ONI) Protocol lets the cluster member to bring the orphan nodes into their clusters, thereby saving important resources and increasing network lifetime in critical applications of WSN.

Keywords: wireless sensor network, orphan node, clustering, ONI protocol

Procedia PDF Downloads 420
6091 A Low Power Consumption Routing Protocol Based on a Meta-Heuristics

Authors: Kaddi Mohammed, Benahmed Khelifa D. Benatiallah

Abstract:

A sensor network consists of a large number of sensors deployed in areas to monitor and communicate with each other through a wireless medium. The collected routing data in the network consumes most of the energy of the sensor nodes. For this purpose, multiple routing approaches have been proposed to conserve energy resource at the sensors and to overcome the challenges of its limitation. In this work, we propose a new low energy consumption routing protocol for wireless sensor networks based on a meta-heuristic methods. Our protocol is to operate more fairly energy when routing captured data to the base station.

Keywords: WSN, routing, energy, heuristic

Procedia PDF Downloads 343
6090 Comparison of Authentication Methods in Internet of Things Technology

Authors: Hafizah Che Hasan, Fateen Nazwa Yusof, Maslina Daud

Abstract:

Internet of Things (IoT) is a powerful industry system, which end-devices are interconnected and automated, allowing the devices to analyze data and execute actions based on the analysis. The IoT technology leverages the technology of Radio-Frequency Identification (RFID) and Wireless Sensor Network (WSN), including mobile and sensor. These technologies contribute to the evolution of IoT. However, due to more devices are connected each other in the Internet, and data from various sources exchanged between things, confidentiality of the data becomes a major concern. This paper focuses on one of the major challenges in IoT; authentication, in order to preserve data integrity and confidentiality are in place. A few solutions are reviewed based on papers from the last few years. One of the proposed solutions is securing the communication between IoT devices and cloud servers with Elliptic Curve Cryptograhpy (ECC) based mutual authentication protocol. This solution focuses on Hyper Text Transfer Protocol (HTTP) cookies as security parameter.  Next proposed solution is using keyed-hash scheme protocol to enable IoT devices to authenticate each other without the presence of a central control server. Another proposed solution uses Physical Unclonable Function (PUF) based mutual authentication protocol. It emphasizes on tamper resistant and resource-efficient technology, which equals a 3-way handshake security protocol.

Keywords: Internet of Things (IoT), authentication, PUF ECC, keyed-hash scheme protocol

Procedia PDF Downloads 264
6089 Brevicoryne brassicae Compatibility with Maize in Multiple Cropping System

Authors: Zunnu Raen Akhtar

Abstract:

Brevicoryne brassicae, aphid feeds on cabbage and Brassica sp. as preferred host. Brassica plants usually ripen when maize starts growing in multiple cropping systems. Experiment was conducted to observe suitability of B. brassicae by rearing it on maize as host. In a tritrophic eco-system, predator coccinellids can be found in the fields of brassica and maize. This experiment emphasized on issue of aphids growing incidence in a cropping system. Brassica is sown and harvested earlier than maize and is attacked by aphids, while maize is also attacked by aphids. Five mortality tests were conducted of B. brassicae fed on maize. Out of five mortality tests, 3 tests were conducted using 1st instar, while in two mortality tests, 2nd instars of aphids were used. Mortality tests revealed that first instar mortality was quite high on the second day, while in second instar larvae mortality was delayed up to third to the fourth day. These experiments reveal that aphids can use maize as substitute host at later instars as compared to young ones. These experiments can be foundation for studying further crop-insect interaction and sampling techniques used for this purpose.

Keywords: host suitability, B. brassicae, maize, tritrophic interaction

Procedia PDF Downloads 194
6088 Dynamic Amplification Factors of Some City Bridges

Authors: I. Paeglite, A. Paeglitis

Abstract:

The paper presents a study of dynamic effects obtained from the dynamic load testing of the city highway bridges in Latvia carried out from 2005 to 2012. 9 pre-stressed concrete bridges and 4 composite bridges were considered. 11 of 13 bridges were designed according to the Eurocodes but two according to the previous structural codes used in Latvia (SNIP 2.05.03-84). The dynamic properties of the bridges were obtained by heavy vehicles passing the bridge roadway with different driving speeds and with or without even pavement. The obtained values of the Dynamic amplification factor (DAF) and bridge natural frequency were analyzed and compared to the values of built-in traffic load models provided in Eurocode 1. The actual DAF values for even bridge deck in the most cases are smaller than the value adopted in Eurocode 1. Vehicle speed for uneven pavements significantly influence Dynamic amplification factor values.

Keywords: bridge, dynamic effects, load testing, dynamic amplification factor

Procedia PDF Downloads 383
6087 Fabrication of Coatable Polarizer by Guest-Host System for Flexible Display Applications

Authors: Rui He, Seung-Eun Baik, Min-Jae Lee, Myong-Hoon Lee

Abstract:

The polarizer is one of the most essential optical elements in LCDs. Currently, the most widely used polarizers for LCD is the derivatives of the H-sheet polarizer. There is a need for coatable polarizers which are much thinner and more stable than H-sheet polarizers. One possible approach to obtain thin, stable, and coatable polarizers is based on the use of highly ordered guest-host system. In our research, we aimed to fabricate coatable polarizer based on highly ordered liquid crystalline monomer and dichroic dye ‘guest-host’ system, in which the anisotropic absorption of light could be achieved by aligning a dichroic dye (guest) in the cooperative motion of the ordered liquid crystal (host) molecules. Firstly, we designed and synthesized a new reactive liquid crystalline monomer containing polymerizable acrylate groups as the ‘host’ material. The structure was confirmed by 1H-NMR and IR spectroscopy. The liquid crystalline behavior was studied by differential scanning calorimetry (DSC) and polarized optical microscopy (POM). It was confirmed that the monomers possess highly ordered smectic phase at relatively low temperature. Then, the photocurable ‘guest-host’ system was prepared by mixing the liquid crystalline monomer, dichroic dye and photoinitiator. Coatable polarizers were fabricated by spin-coating above mixture on a substrate with alignment layer. The in-situ photopolymerization was carried out at room temperature by irradiating UV light, resulting in the formation of crosslinked structure that stabilized the aligned dichroic dye molecules. Finally, the dichroic ratio (DR), order parameter (S) and polarization efficiency (PE) were determined by polarized UV/Vis spectroscopy. We prepared the coatable polarizers by using different type of dichroic dyes to meet the requirement of display application. The results reveal that the coatable polarizers at a thickness of 8μm exhibited DR=12~17 and relatively high PE (>96%) with the highest PE=99.3%, which possess potential for the LCD or flexible display applications.

Keywords: coatable polarizer, display, guest-host, liquid crystal

Procedia PDF Downloads 251
6086 Dynamic Fault Tree Analysis of Dynamic Positioning System through Monte Carlo Approach

Authors: A. S. Cheliyan, S. K. Bhattacharyya

Abstract:

Dynamic Positioning System (DPS) is employed in marine vessels of the offshore oil and gas industry. It is a computer controlled system to automatically maintain a ship’s position and heading by using its own thrusters. Reliability assessment of the same can be analyzed through conventional fault tree. However, the complex behaviour like sequence failure, redundancy management and priority of failing of events cannot be analyzed by the conventional fault trees. The Dynamic Fault Tree (DFT) addresses these shortcomings of conventional Fault Tree by defining additional gates called dynamic gates. Monte Carlo based simulation approach has been adopted for the dynamic gates. This method of realistic modeling of DPS gives meaningful insight into the system reliability and the ability to improve the same.

Keywords: dynamic positioning system, dynamic fault tree, Monte Carlo simulation, reliability assessment

Procedia PDF Downloads 774
6085 The Monogeneans of the Genus Lamellodiscus, Parasites of Sparidae Fish of the Genus Dentex on the Coasts of Dakar (Sénégal)

Authors: Sikhou Drame, Arfang Diamanka

Abstract:

This study focuses on an examination of the Monogenea community of the Lamellodiscus genus, parasites of teleost fish of the Dentex genus (Sparidae): Dentex angolensis, Dentex canariensis, Dentex macrophthalmus, and Dentex maroccanus from two landing sites in Dakar: Soumbédioune landing and Hann Bel Air landing. Observing the morpho-anatomical criteria of the monogeneans collected from all host species reveals the presence of 6 species of the Lamellodiscus genus (Monogenea, Diplectanidae): Lamellodiscus euzeti in Dentex canariensis, Lamellodiscus dentexi, Lamellodiscus toguebayei, Lamellodiscus triacies, and Lamellodiscus vicinus in Dentex macrophthalmus; Lamellodiscus crampus in its usual host Dentex marrocanus and we found it in Dentex angolensis. The results of the study on the distribution of parasitic indices in the studied host species show that infestation rates and parasite burdens vary from one host species to another and from one season to another. However, it is during the hot season that the values of infestation intensity and abundance are highest. Additionally, we note that Dentex canariensis records the highest parasite burdens in both locations.

Keywords: lamellodiscus, fish, dentex, Dakar, Monogenea

Procedia PDF Downloads 43
6084 An In Situ Exploration of Practising Rugby Coaches’ Cognitions, Higher Psychological Functions and Actions Using Think Aloud Protocol

Authors: Simon Quick, John Lyle

Abstract:

Psychology-based research has been a characteristic of empirical enquiry in sport coaching for over fifty years and cognitive function is widely accepted as a fundamental component of sport coaching expertise. Within the academic literature, much empirical research on coaches’ cognitions has tended to adopt retrospective approaches, such as post-session interviews or stimulated recall, thus capturing coaches’ cognitions after the incident, training session or competition. Such methods are prone to a variety of issues, including memory decay and the reordering of accounts. The aim of this research was to overcome the limitations that exist with retrospective approaches and, rather, to capture coaching cognitions in situ using Think Aloud Protocol. Data that were captured was broken down into meaning units and analysed using a Thematic Analysis. Situated in the practice of 6 experienced rugby coaches, findings revealed that Think Aloud Protocol generated rich data, although problematic in a site of enquiry confounded by multiple social interactions and requiring coaches to provide frequent instruction and feedback. The resultant interaction between cognition and action is conceptualised by the tentative offering of a model that situates these elements in conjunction with cognitive triggers and thresholds. The implications of these findings can help academics and coaches to understand the dynamic relationship between types of coaching cognitions and the complexity of the coaching environment.

Keywords: sports coaching, Psychology, Pedagogy, cognition

Procedia PDF Downloads 67
6083 Identifying Unknown Dynamic Forces Applied on Two Dimensional Frames

Authors: H. Katkhuda

Abstract:

A time domain approach is used in this paper to identify unknown dynamic forces applied on two dimensional frames using the measured dynamic structural responses for a sub-structure in the two dimensional frame. In this paper a sub-structure finite element model with short length of measurement from only three or four accelerometers is required, and an iterative least-square algorithm is used to identify the unknown dynamic force applied on the structure. Validity of the method is demonstrated with numerical examples using noise-free and noise-contaminated structural responses. Both harmonic and impulsive forces are studied. The results show that the proposed approach can identify unknown dynamic forces within very limited iterations with high accuracy and shows its robustness even noise- polluted dynamic response measurements are utilized.

Keywords: dynamic force identification, dynamic responses, sub-structure, time domain

Procedia PDF Downloads 361
6082 Host Preference, Impact of Host Transfer and Insecticide Susceptibility among Aphis gossypii Group (Order: Hemiptera) in Jamaica

Authors: Desireina Delancy, Tannice Hall, Eric Garraway, Dwight Robinson

Abstract:

Aphis gossypii, as a pest, directly damages its host plant by extracting phloem sap (sucking) and indirectly damages it by the transmission of viruses, ultimately affecting the yield of the host. Due to its polyphagous nature, this species affects a wide range of host plants, some of which may serve as a reservoir for colonisation of important crops. In Jamaica, there have been outbreaks of viral plant pathogens that were transmitted by Aphis gossypii. Three such examples are Citrus tristeza virus, the Watermelon mosaic virus, and Papaya ringspot virus. Aphis gossypii also heavily colonized economically significant host plants, including pepper, eggplant, watermelon, cucumber, and hibiscus. To facilitate integrated pest management, it is imperative to understand the biology of the aphid and its host preference. Preliminary work in Jamaica has indicated differences in biology and host preference, as well as host variety within the species. However, specific details of fecundity, colony growth, host preference, distribution, and insecticide resistance of Aphis gossypii were unknown to the best of our knowledge. The aim was to investigate the following in relation to Aphis gossypii: influence of the host plant on colonization, life span, fecundity, population size, and morphology; the impact of host transfer on fecundity and population size as a measure of host preference and host transfer success and susceptibility to four commonly used insecticides. Fecundity and colony size were documented daily from aphids acclimatized on Capsicum chinense Jacquin 1776, Cucumis sativus Linnaeus 1630, Gossypium hirsutum Linnaeus 1751 and Abelmoschus esculentus (L.) Moench 1794 for three generations. The same measures were used after third instar aphids were transferred among the hosts as a measure of suitability and success. Mortality, and fecundity of survivors, were determined after aphids were exposed to varying concentrations of Actara®, Diazinon™, Karate Zeon®, and Pegasus®. Host preference results indicated that, over a 24-day period, Aphis gossypii reached its largest colony size on G. hirsutum (x̄ 381.80), with January – February being the most fecund period. Host transfer experiments were all significantly different, with the most significant occurring between transfers from C. chinense to C. sativus (p < 0.05). Colony sizes were found to increase significantly every 5 days, which has implications for regimes implemented to monitor and evaluate plots. Insecticides ranked on lethality are Karate Zeon®> Actara®> Pegasus® > Diazinon™. The highest LC50 values were obtained for aphids on G. hirsutum and C. chinense was with Pegasus® and for those on C. sativus with Diazinon™. Survivors of insecticide treatments had colony sizes on average that were 98 % less than untreated aphids. Cotton was preferred both in the field and in the glasshouse. It is on cotton the aphids settled first, had the highest fecundity, and the lowest mortality. Cotton can serve as reservoir for (re)populating other cotton or different host species based on migration due to overcrowding, heavy showers, high wind, or ant attendance. Host transfer success between all three hosts is highly probable within an intercropping system. Survivors of insecticide treatments can successfully repopulate host plants.

Keywords: Aphis gossypii, host-plant preference, colonization sequence, host transfers, insecticide susceptibility

Procedia PDF Downloads 95
6081 System Detecting Border Gateway Protocol Anomalies Using Local and Remote Data

Authors: Alicja Starczewska, Aleksander Nawrat, Krzysztof Daniec, Jarosław Homa, Kacper Hołda

Abstract:

Border Gateway Protocol is the main routing protocol that enables routing establishment between all autonomous systems, which are the basic administrative units of the internet. Due to the poor protection of BGP, it is important to use additional BGP security systems. Many solutions to this problem have been proposed over the years, but none of them have been implemented on a global scale. This article describes a system capable of building images of real-time BGP network topology in order to detect BGP anomalies. Our proposal performs a detailed analysis of BGP messages that come into local network cards supplemented by information collected by remote collectors in different localizations.

Keywords: BGP, BGP hijacking, cybersecurity, detection

Procedia PDF Downloads 77
6080 [Keynote Speech]: Risk Management during the Rendition Process: Use of Screen-Voice Recordings in Translator Training

Authors: Maggie Hui

Abstract:

Risk management is not a new concept; however, it is an uncharted area as applied to the translation process and translator training. Serving as one of the self-discovery activities in their practicum course, a two-cycle experiment was carried out with a class of 13 MA translation students with an attempt to explore their risk management while translating in a simulated setting that involves translator-client relations. To test the effects of the main variable of translators’ interaction with the simulated clients, the researcher employed control-group translators and two experiment groups (with Group A being the translator in Cycle 1 and the client in Cycle 2, and Group B on the client position in Cycle 1 and the translator position in Cycle 2). Experiment cycle 1 aims to explore if there would be any behavioral difference in risk management between translators with interaction with the simulated clients, i.e. experiment group A, and their counterparts without such interaction, i.e. control group. Design of Cycle 2 concerns the order of playing different roles of the translator and client in the experiment, and provides information to compare behavior of translators of the two experiment groups. Since this is process-oriented research, it is necessary to hypothesize what was happening in the translators’ minds. The researcher made use of a user-friendly screen-voice recording freeware to record subjects’ screen activities, including every word the translator typed and every change they made to the rendition, the websites they browsed and the reference tools they used, in addition to the verbalization of their thoughts throughout the process. The research observes the translation procedures subjects considered and finally adopted, and looks into the justifications for their procedures, in order to interpret their risk management. The qualitative and quantitative results of this study have some implications for translator training: (a) the experience of being a client seems to reinforce the translator’s risk aversion; (b) the use of role-playing simulation can empower students’ learning by enhancing their attitudinal or psycho-physiological competence, interpersonal competence and strategic competence; and (c) the screen-voice recordings serve as a helpful tool for learners to reflect on their rendition processes, i.e. what they performed satisfactorily and unsatisfactorily while translating and what they could do for improvement in future translation tasks.

Keywords: risk management, screen-voice recordings, simulated translator-client relations, translation pedagogy, translation process-oriented research

Procedia PDF Downloads 263